test quarter 5 -1
TRANSCRIPT
-
8/2/2019 Test Quarter 5 -1
1/47
Which of the following organizations is a large working committee of operators, vendors, and researchers
concerned with the evolution of the Internet architecture and the smooth operation of the Internet?
a. Internet Engineering Task Force (IETF)
b. Internet Research Task Force (IRTF)
c. Internet Architecture Board (IAB)d. Internet Corporation for assigned Names and Numbers (ICANN)
Correct Answer: -> a
Which of the following protocols functions at the Internet Layer of the TCP/IP Architecture?
a. TCP
b. FTP
c. ICMP
d. SMTP
Correct Answer: -> c
Which of the following RFC Standards is achieved after the detailed assessment of at least two successful
independent and interoperable implementation of a specification?
a. Proposed Standard
b. Draft Standard
c. Historic Standard
d. Internet standard
Correct Answer: -> a
What is the minimum length of an Ethernet data field?
a. 1500 Bytes
b. 512 Bytes
c. 24 Bytes
d. 46 BytesCorrect Answer: -> d
Which of the following protocols lie above the Internet Protocol in the TCP/IP architecture?
a. ICMP and IGMP
b. ICMP and ARP
c. IGMP and RARP
d. Network Access Layer
Correct Answer: -> d
What is the minimum length of IP header?
a. 40 Bytesb. 60 Bytes
c. 46 Bytes
d. 20 Bytes
Correct Answer: -> d
Which of the following field in the IP header indicates reliability, precedence delay and throughput
parameters?
a. Service
-
8/2/2019 Test Quarter 5 -1
2/47
b. Fragment Offset
c. Options
d. Flags
Correct Answer: -> a
For which of the following field the length varies in the IP header?a. Flag
b. Options
c. Fragment Offset
d. Protocol
An IPv6 address consists of ___________ bytes.
a. 12 Bytes
b. 16 Bytes
c. 24 Bytes
d. 32 Bytes
Correct Answer: -> b
10/ To enable reverse lookups over the Internet, a special domain called the __________ domain has been
built into the DNS structure over the Internet.
a. in.addr.arpa
b. in-addr.arpa
c. arpa-in.addr
d. arpa.in.addr
11/ Which of the following domain specify the country/region or the type of organization?
a. Root-level domain
b. Second-level domain
c. Sub domaind. Top-level domain
Correct Answer: -> d
12/ Which of the following DNS server is registered in the top-level domains?
a. Primary server
b. Root server
c. Secondary server
d. Forwarding server
Correct Answer: -> b
13/ Which of the following RFC defines BOOTP?a. RFC 980
b. RFC 826
c. RFC 951
d. RFC 802
Correct Answer: -> c
14/ An administrator is moving a node from subnet A to another subnet B. After moving the node in the new
subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address.
-
8/2/2019 Test Quarter 5 -1
3/47
The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a
DHCP address to the node?
a. He has to create a new scope for the node
b. A RFC 1542 compliant router to be added in the network
c. Provide a new DHCP server in the network
d. A bridge to be added in the networkCorrect Answer: -> a
15/ Amazon.com is a company using a DNS system. The company has configured a server for resolving the
IP address. The company wants to have a server that can work as a primary server in case of failure of the
existing server. The server should also handle the fault tolerance and load balancing. Which of the following
server is capable of doing that?
a. Primary Server
b. Secondary Server
c. Caching Server
d. Forwarding Server
Correct Answer: -> b
16/ You are analyzing data packets from node A having IP address 172.17.4.28 to node B having IP
address 172.17.4.98 using a network Analyzer. From the given figure, identify the hardware address of
node A?
a. Hardware address of the node A is 00:00:21:DC:3E:7B
b. Hardware address of the node A is 00:00:18:8E:C3:2A
c. Hardware address of the node A is ff:ff:ff:ff:ff:ff
d. Hardware address of the node A is 0x5332
17/ Jim is configuring a router table. He wants to implement the default routing method. In the default
routing method the routing table:
A. Contains one entry, 255.255.255.255
B. Contains one entry, 127.0.0.1
C. Contains one entry, 0.0.0.0
D. Contains one entry, 255.255.255.0
a. A
b. B
c. C
d. D
Correct Answer: -> c
18/ You are analysing TCP data packets through a network analyzer. Which of the following information canyou read from a IP header?
A. The total lifetime of a datagram.
B. The hardware address of the source node.
C. The IP address of the destination node.
D. The final destination protocol to which the data packet or datagram should be delivered
a. A, B and D
b. A, C and D
-
8/2/2019 Test Quarter 5 -1
4/47
c. B, C, and D
d. A, B, C and D
19/ In an organization, there are 400 nodes spread across eight subnets with two DHCP servers. You are
the network administrator of the organization. You want each node to receive an IP address automatically
but?
one of the DHCP servers is down. What should you do?a. Create four DHCP scopes on each DHCP server
b. Create eight DHCP scopes on each DHCP server
c. Create two global DHCP scopes on each DHCP server
d. Create one global DHCP scope on each DHCP server
20/ Your company wants to setup a LAN environment.?You are assigned to design the new network. You
want to implement a device, which:
A. Joins multiple computers or other network devices together to form a single network segment
B. Amplify and regenerate the signal from one node to another in a network
C. Provides a common connection point for computers, printers, and other network devices in a star
topology network
Which of the following network component will meet the preceding requirements?
a. Repeaters
b. Hubs
c. Switch
d. Bridge
Correct Answer: -> b
21/ You are a network administrator in an insurance company. The company is having 2 Windows 2000
Server, 20 Windows 2000 Professional nodes and 15 Novell Netware nodes. You want to increase the
speed of the network traffic within the same physical network and also want to have minimum overheadwhen a data packet is travelling on the same physical network. Which of the following protocols you need to
implement in the network?
A. TCP/IP
B. IPX/SPX
C. SNA
D. NetBEUI
E. DLC
F. Apple talk
a. A, B and D
b. A, D and Fc. A, B and F
d. A, C and F
Correct Answer: -> a
22/ Which of the following field in the ARP packet format helps to define the type of network on which ARP
is running?
a. PTYPE field
b. HLEN field
-
8/2/2019 Test Quarter 5 -1
5/47
c. HTYPE field
d. PLEN field
Correct Answer: -> c
23/ Statement A: Internet Standard is achieved when a draft standard for which successful demonstration of
its execution and significant operational and functional experience has been obtained.Statement B: A standard or specification is called an historic standard or specification when it has been
outdated by a more recent specification.
Which of the following options is correct about the above statement?
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, Statement A and Statement B are true.
d. Both, Statement A and Statement B are false.
Correct Answer: -> b
24/ Statement A: IP generates control messages related to any error in connection or flow control over the
network.
Statement B: IP is responsible for addressing and forming the data packets to be transferred over the
network.
Which of the following options is correct about the above statement?
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, Statement A and Statement B are true.
d. Both, Statement A and Statement B are false.
25/ Node X request?s Node Y to set up a connection. Node X sends a SYN segment to node Y. Node Y
sends an acknowledgement to Node X to start the data communication. Node Y sends the secondsegment; a combination of SYN and ACK segment to Node X. Node X sends a confirmation to Node Y.
Which of the following flag will be set active by node X?
a. SYN
b. PSH
c. RST
d. ACK
26/ Statement A: CSMA/CA is the access method used in Ethernet and wireless Ethernet networks.
Statement B: CSMA/CD is a slower access method than CSMA/CA.
Which of the following options is correct about the above statements?a. Statement A is true, and statement B is false
b. Statement A is false, and statement B is true
c. Both, Statement A and Statement B are false.
d. Both, Statement A and Statement B are true.
Correct Answer: -> c
27/ Statement A: FCS contains an 8-byte CRC value used for error checking.
Statement B: The sending node creates the CRC value in Network Access layer.
-
8/2/2019 Test Quarter 5 -1
6/47
Which of the following options is correct about the above statements?
a. Statement A is true, and statement B is false
b. Statement A is false, and statement B is true
c. Both, Statement A and Statement B are false.
d. Both, Statement A and Statement B are true.
28/ Statement A: A domain is a logical group of computers over a large network.
Statement B: Resolver is a computer that maintains the database of host names and their corresponding IP
addresses for name resolution.
Which of the following options is correct about the above statements?
a. Statement A is true, and statement B is false
b. Statement A is false, and statement B is true
c. Both, Statement A and Statement B are false.
d. Both, Statement A and Statement B are true.
Correct Answer: -> a
29/ Assertion: BOOTP was evolved because of limitations of RARP.
Reason: RARP does not provide IP address.
a. Both, the assertion and reason are true, and the reason IS a correct explanation of the assertion.
b. Both, the assertion and reason are true, and the reason IS NOT a correct explanation of the assertion.
c. The assertion is true and the reason is false.
d. The assertion is false and hence the reason does not apply.
Correct Answer: -> c
30/ You observe that each time you run the program, escape.exe, the computer slows down significantly.
You decide to set the priority of the program to low. Which of the following options will enable you to
perform this task?a. Task Manager
b. System Monitor
c. Performance Console
d. Service Manager
Correct Answer: -> a
31/ When James runs the application, uinstall.exe, he observes that the computer slows down and the
application hangs. James is unable to close the application by using the Close button. Which of the
following options should James use to exit the application?
a. System Monitor
b. Performance Logs and Alertsc. Task Manager
d. Performance Console
Correct Answer: -> c
32/ You want to track the performance of your Windows Server 2003 computer after you install and run
Visual Basic .NET and ASP.NET. You open System Monitor and add the required counters to monitor the
performance of each sub-system. Which of the following options will enable you to view the counters over a
period of time so that you can view the effect of the applications on the system performance?
-
8/2/2019 Test Quarter 5 -1
7/47
a. Histogram
b. Pie-chart
c. Report
d. Graph
33/ Consider the following statements:Statement A: By default, IIS is not installed with Windows Server 2003.
Statement B: By default, support for Active Server Pages is enabled in IIS.
Which of the following is correct about the above statements?
a. Both, Statement A and Statement B are False.
b. Both, Statement A and Statement B are True.
c. Statement A is True and Statement B is False.
d. Statement A is False and Statement B is True.
34/ Consider the following statements:
Statement A: Integrated Windows Authentication method provides high-level security because the
credentials of a user are confirmed through a cryptographic exchange between the Web server and the
Web browser of the user.
Statement B: Integrated Windows Authentication method is recommended on the intranet of an
organization.
Which of the following is correct about the above statements?
a. Both, Statement A and Statement B are False.
b. Both, Statement A and Statement B are True.
c. Statement A is True and Statement B is False.
d. Statement A is False and Statement B is True.
35/ You are installing Windows Server 2003 using a Windows 98 bootable floppy and an error messageindicating ?Not enough space to create swap files?is displayed. Which of the following options is a possible
solution for this problem?
a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which
you want to install Windows Server 2003.
b. Press F3 key to exit setup and from the command line and disable the Cache Shadow option in the
BIOS.
c. Disable the Shadow Copies option in the BIOS.
d. Disable the Caching Shadow option in the BIOS.
Correct Answer: -> a
36/ You are installing Windows Server 2003 on a computer with the following configuration:
Pentium 2.4 GHz
256 MB RAM
4.5 GB Hard Disk
During installation, setup displays the error message, ?Dumping Physical Memory?.
Which of the following options can be a possible solution to this problem?
-
8/2/2019 Test Quarter 5 -1
8/47
a. Press the F3 key to exit setup. From the command line, format the hard disk partition on which you want
to install Windows Server 2003.
b. Disable the Cache Shadow option in the BIOS.
c. Replace the RAM.
d. Replace the hard disk.
Correct Answer: -> b
37/ You are installing Windows Server 2003 on a computer with the following configuration:
Pentium 350 MHz
128 MB RAM
4.5 GB Hard Disk
During installation, setup displays the error message, ERROR_INVALID_PARAMETER.
What does this error message indicate?
a. The Windows Installer service has failed to start.
b. The hard disk does not have the disk space required to install Windows Server 2003.
c. One of the parameters entered is incorrect.
d. The data entered is of incorrect type.
Correct Answer: -> c
39/ The domain controller needs to have a(n) __________ address.
a. IP
b. Dynamic IP
c. Static IP
d. Route IP
Correct Answer: -> b
40/ Windows Server 2003 ______ bit version runs on Pentium-based systems.
a. 8 bit
b. 16 bit
c. 32 bit
d. 64 bit
41/ Which of the following servers assigns the Static IP address to the domain controller in an
organization?s forest?
a. DHCP Serverb. DNS Server
c. FTP Server
d. ADC Server
42/ Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder
of Windows Server 2003 computer from the client computer?
a. Admin$
b. Print$
-
8/2/2019 Test Quarter 5 -1
9/47
c. C$
d. D$
Correct Answer: -> b
43/ Which option will enable you to change the password of a user account?
a. Right click the user name and select the Reset Password option.b. Open the user account properties dialog box to change the password.
c. Double-click the user name to change the password.
d. Create a new user account with the same user name and password.
Correct Answer: -> a
44/ A user account that has similar properties already configured is called ___________.
a. Domain user account
b. Local user account template
c. Local account template
d. User account template
Correct Answer: -> d
45/ Identify the correct method to create local user accounts?
a. Select the Start ( Programs ( Administrative Tools ( Microsoft Management Console menu command.
b. Select the Start ( Programs ( Administrative Tools ( Computer Management menu command .
c. Select the Start ( Programs ( Administrative Tools menu command.
d. Select the Start ( Programs ( Administrative Tools ( Active Directory Users and Computers menu
command.
Correct Answer: -> b
46/ Which container lists the default users and group accounts created by Windows Server 2003?
a. Users and Computers
b. Builtin and Computersc. Builtin and Users
d. Users and Domain Controllers
47/ Which file system supports partitions only up to 2 TB in size?
a. FAT
b. FAT 32
c. NTFS
d. FAT 16
48/ Which command-line tool enables you to create domain computer accounts in Active Directory?
a. DSGETb. DSADD
c. NETSH
d. DSRM
49/ Which group has the right to create computer accounts in an organizational unit?
a. Enterprise Admins on a server
b. Server Operators on a domain controller
c. Server Operators on a server
-
8/2/2019 Test Quarter 5 -1
10/47
d. Account Operators on a domain controller
50/ Which of the following groups are primarily used for backward compatibility with the Windows NT 4.0
operating system?
a. Global groups
b. Distribution groupsc. Local groups
d. Security groups
51/ Which of the following group is used to assign rights and permissions to members who perform similar
operations and access similar resources in any domain in the forest?
a. Universal group
b. Domain local group
c. Security group
d. Distribution group
Correct Answer: -> a
52/ Which of the following options are used with the DSMOD and DSADD commands to create user-
specific profile folders?
a. $Username$
b. CN=Username
c. %Username%
d. #Username#
Correct Answer: -> c
53/ Which command-line tool enables you to identify user and group accounts that have not been used for
the past 3 months?
a. DSMOD
b. DSQUERYc. DSADD
d. DSGET
54/ You are the system administrator in an organization. A user accidentally deletes the shortcuts on his
desktop and asks you to create the shortcuts again. What should you do to ensure that the shortcuts do not
get deleted from his desktop again?
a. Make his user profile mandatory.
b. Ask the user to login again.
c. Make the default user profile mandatory.
d. Make all user profiles mandatory.
Correct Answer: -> d
55/ You are the system administrator of CellGo. You want to hide one of the file server drives from the
domain end users. How will you achieve it with minimum administrative cost?
a. Disable the view option from the registry of each machine.
b. Open Active Directory and remove the Share from the snap-in.
c. Share the drive with a name ending with $.
d. Share the drive with the name Admin$.
-
8/2/2019 Test Quarter 5 -1
11/47
56/ You are the system administrator of Aztec.com. Susan has resigned from Aztec and in her place Robert
has joined. You plan to disable Susan?s user account and then rename the user account as Robert.
However, you delete Susan?s user account by mistake. What should you do to give Robert the same rights
and privileges as Susan?
a. Create a new user account by the name of Susan. It will get the SID of Susan?s account that was
deleted. Rename the account to Robert.b. Create a new user account for Robert and assign him the rights and privileges of Susan.
c. Create a new user account for Robert and map the SID of Susan to it.
d. In the command prompt, type undo delusr and press Enter to revert the deleted account.
57/ In Blue Sky Computers, several employees login remotely. Chris, the system administrator wants to
know the applications that are started when a Terminal Services user logs on. Which of the following tabs in
the user account properties dialog box will enable him to accomplish this task?
a. Environment
b. Sessions
c. Remote Control
d. Terminal Services Profile
58/ You are the system administrator of your organization. You want to create a customized console
containing the following administrative tools:
Active Directory Users and Computers
Computer Management
Event Viewer
Which of the following options will enable you to perform this task with the least administrative effort?
a. Create consoles for each tool on the desktop.
b. Create a console containing the required tools using the DSMOD command-line utility.
c. Create a console containing the required tools using MMC.d. Create a console containing the required tools using the Active Directory Users and Computers tool.
59/ Consider the following two statements:
Statement A: DFS is a service that centralizes the file system resources that are physically spread over the
network.
Statement B: DFS Microsoft Management Console enables configuration of replication services and
topologies.
Which of the following is correct about the above statements?
a. Both, Statement A and Statement B are False.
b. Both, Statement A and Statement B are True.c. Statement A is True and Statement B is False.
d. Statement A is False and Statement B is True.
60/ As a system administrator, you need to restrict access of the members of the Finance organizational
unit to the Internet. Which is the best possible method for performing this task?
a. Disable Internet Explorer for each user of the Finance organizational unit.
b. Apply a security policy for each user of the Finance organizational unit.
-
8/2/2019 Test Quarter 5 -1
12/47
c. Apply a group policy setting that restricts access of each user of the Finance organizational unit to the
Internet.
d. Configure a GPO that restricts access to the Internet and apply this GPO on the Finance
organizational unit.
61/ Which GPO is linked to the domain and affects all the users and computers included in the domain aswell as the domain controller?
a. Default Domain Controllers policy
b. Default Domain policy
c. Default GPO based policy
d. Default Domain GPO based policy
Correct Answer: -> b
62/ Which of the following parameters of the Gpupdate command enables you to specify any one of the
user or computer Group Policy that needs to be refreshed?
a. /Target
b. /Boot
c. /Logoff
d. /Force
63/ You are a system administrator in Blue Sky IT Systems. As a security measure, you want to ensure that
users do not add new programs and applications from the network. Which Group Policy should you
configure so that you can prevent users from installing new programs over the network?
a. Configure the ?Hide programs from your network?option.
b. Configure the ?Hide applications from your network?option.
c. Configure the ?Hide programs/applications from your network?option.d. Configure the ?Hide programs from your network?page.
64/ As a system administrator, you have delegated the task of configuring Group Policies to the juniorsystem administrator, James. While trying to configure Group Policies for the organizational unit, Finance,
and two users of the organizational unit, Marketing, James finds that he is not able to open Group Policy
Object Editor. What could be the possible cause for this problem?
a. Group Policy Object Editor is not installed on the domain controller.
b. James does not have the Modify permission for the GPO.
c. James does not have the Full Control permission for the GPO.
d. James does not have the Read and Write permissions for the GPO.
65/ Which of the following administrative control design implies that the administration of Group Policy is
delegated only to top-level organizational unit administrators of an organization?s domain?
a. Centralized administrative control designb. Decentralized administrative control design
c. Task-based administrative control design
d. Multi-level administrative control design
66/ Which component of the Administrative Template node includes User Profiles, Scripts, Logon,
Ctrl+Alt+Del Options, Group Policy, and Power Management?
a. Network
b. System
-
8/2/2019 Test Quarter 5 -1
13/47
c. Windows Components
d. Computer
68/ You are the system administrator of a Windows Server 2003 network. You have placed the domain
controllers in the Domain Controllers organizational unit. You suspect that some unauthorized users aretrying to access the network. You need to determine which computer is being used for this purpose. What
would you do to identify the computer?
a. Configure a local security policy for each domain controller to audit the success and failure of
account logon events.
b. Configure a domain policy to audit the success and failure of logon events.
c. Configure a local security policy for each domain controller to audit the success and failure of directory
service access.
d. Configure a domain policy to audit the success and failure of account logon events.
69/ You are the system administrator of Blue Sky IT Systems. The organization?s domain structure has
separate organizational units for each department. For example, Finance organizational unit for the Finance
department and Sales organizational unit for the Sales department. The organizational units contain group
and computer accounts for the employees of the domain. You have received complaints that some of the
computer accounts have been deleted and some of the group accounts have been modified by
unauthorized users. As a system administrator, you want to track and locate the users who are deleting the
computer accounts and modifying the group accounts. Which of the following audit policies do you need to
configure for this?
a. Audit policies related to system events
b. Audit policies related to object access
c. Audit policies related to Active Directory object access
d. Audit policies related to user, group, and computer accounts
70/ As a system administrator, you have asked the technical consultant of your organization to createcustomized security templates according to the domain structure of the organization. As a precautionary
measure, you have also created customized security templates for the organization. The technical
consultant creates the security templates and sends it to you. You now need to compare the security
templates provided by your technical consultant with the security templates that you have created. Which of
the following options will enable you to perform this task?
a. The Security Templates snap-in
b. The Security Configuration and Analysis snap-in
c. The Security Manager snap-in
d. The Group Policy Management snap-in
71/ You have recently joined Blue Moon Computers Inc. as a system administrator. You review the currentsecurity settings of the organization and find them suitable and according to the requirements of the
organization. However, you notice that the default permissions for the root directory of most of the
computers in the organization have been changed. You want to restore the default security settings and
permissions of the root directory of the computers. Which security template will enable you to perform this
task?
a. Rootsec.inf template
b. Rootdir.inf template
c. Rootdir Security.inf template
-
8/2/2019 Test Quarter 5 -1
14/47
d. Root Security.inf template
72/ As a system administrator, you want to apply enhanced security settings on the computers of the Sales
department of your organization in addition to the security settings already applied. You want that the new
security settings should define security settings for auditing of events. However, you do not want that the
new security settings should interfere with the applications running on the computers of the Salesdepartment. Which of the following security templates will enable you to perform these tasks?
a. Rootsec.inf
b. DC Secure.inf
c. Secure*.inf
d. hisec.inf
73/ You need to configure a software controlled fault tolerant system by using two hard disks. What level of
RAID should you use for this purpose?
a. RAID 0
b. RAID 1
c. RAID 5
d. RAID 6
74/ Consider the following statements:
Statement A: ASR creates a recovery disk that recovers the system and its data.
Statement B: ASR creates a backup of system state data, which includes, disk signatures, volumes, and
partitions that are required to start a system
Statement C: ASR restores a simplified version of the Windows Server 2003 operating system.
Which of the following options is correct about the above statements?
a. Only Statement A is True.
b. Only Statement B is True.
c. Statements A, B, and C are True.d. Statements A, B, and C are False.
75/ You are the system administrator in CellGo Corp. All the servers in the organization are running on
Windows Server 2003 having one Active Directory Service, CellGo.com. You want to have a
comprehensive backup plan to ensure that the system can be restored in case of system failure. You want
to backup the system state, system services, and all disks associated with the operating system
components. Which recovery type should you use for this purpose?
a. Shadow copies
b. RAID 1
c. Automated system recovery
d. Synchronization tool
76/ Consider the following statements:
Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of
multiple I/O performance on different disks.
Statement B: Striped volumes do not provide fault tolerance.
Which of the following is correct about the above statements?
a. Both, Statement A and Statement B are False.
b. Both, Statement A and Statement B are True.
-
8/2/2019 Test Quarter 5 -1
15/47
c. Statement A is True and Statement B is False.
d. Statement A is False and Statement B is True.
Correct Answer: -> b
77/ You are the system administrator of Blue Sky IT Systems. The employees of the Sales department back
up their important data on a Windows Server 2003 computer having the following configuration:
Pentium 1V 2.26 GHz
128 MB RAM
40 GB hard disk
While installing an application on the Windows Server 2003 computer, the message ?you are running out of
disk space on this computer?is displayed. You notice that some employees have stored unnecessary files
on the computer. Which of the following actions do you need to perform to solve this problem?
a. Perform disk cleanup.
b. Enable disk quota for the employees of the Sales department.
c. Defragment the hard disk.
d. Implement shadow copies.
Correct Answer: -> b
78/ As a system administrator, you need to perform regular backups. To save time and back up data in an
economical manner, you decide to take full backup on Mondays and back up only those files that have not
been marked as archived on other week days. In addition, you do not want to set the archive bit of the files
that have been backed up. Which type of backup are you performing?
a. Normal
b. Differential
c. Daily
d. Incremental
79/ You are the system administrator of an organization that has 200 employees. You have asked all users
to back up their files everyday at 5.30 PM before leaving, but you find that most users do not back up their
files. What should you do to enable the users to back up their daily files automatically?
a. Schedule a backup job to be performed when the user logs off the computer.
b. Schedule a daily backup at 5.30 PM.
c. Use Task Manager to backup at 5.30 PM.
d. Configure the Computer Management console to take the backup at 5:30 PM.
80/ Consider the following statements:
Statement A: A basic disk can have a maximum of four primary partitions.
Statement B: An extended partition can be subdivided into a maximum of 24 sub-sections.
Which of the following is correct about the above statements?
a. Both, Statement A and Statement B are False.
b. Both, Statement A and Statement B are True.
c. Statement A is True and Statement B is False.
d. Statement A is False and Statement B is True.
-
8/2/2019 Test Quarter 5 -1
16/47
81/ You need to install Windows Server 2003 on a computer that contains two 36 GB hard disks. You
format the first disk as FAT 32 and the second disk as NTFS. To conserve disk space, you compress the
folders on an NTFS disk. However, when other users move files and folders from the NTFS disk to the FAT
32 disk, the files loses the compression attribute. What can be done to ensure that the files remain
compressed?
a. Format the first disk as NTFS.b. Upgrade both disks to dynamic disks.
c. Convert the first disk to a dynamic disk.
d. Upgrade the first disk to NTFS.
82/ Your organization has a Windows Server 2003 environment, which includes various client computers,
such as Windows 2000 Professional, Windows XP, and UNIX. You have configured a Windows Server
2003 member server as a print server. A UNIX client computer needs to submit print jobs to the printer
attached to the print server. The computer has a printer driver installed to access the print device. Which of
the following options must be configured on the print server to support printing from the UNIX client
computer?
a. Install File and Print Sharing for UNIX clients.
b. Check the TCP/IP configuration.
c. Install the DLC protocol.
d. Install Print Services for UNIX.
Quarter 5 ReviewTCP/IP Fundamentals and Concepts
1/ Which of the following MAN components provide connectivity between MANs and LANs, between
networks with different topologies, or between networks using different network standards?
a. Bridges.
b. Routers.
c. Switches.
d. Repeaters.
2/ Statement A: With TCP, applications exchange messages over the network with a minimum of protocol
overhead.
Statement B: TCP enables hosts to maintain multiple simultaneous connections.
Which of the following options is correct about the above statements?
a. Statement A is true, and statement B is false.
b. Statement A is false, and statement B is true.
c. Both, statement A and statement B are false.
d. Both, statement A and statement B are true.
3/ You are analyzing UDP data packets from node A to node B using a Network Analyzer. From the given
figure, find out the length of the data packet?
a. 53
b. 92
c. 58
-
8/2/2019 Test Quarter 5 -1
17/47
d. 1090
4/ Sky Lark Inc. is an IT-based company. It has provided laptops with Windows 2000 Professional to their
employees. The employee transfers are very frequent in this company so the laptops move from one subnet
to another subnet. You want to automatically assign the TCP/IP configuration to the laptop connected.
Which service should you use?a. BOOTP
b. DNS
c. DHCP
d. DHCP relay agent
You want to enable Windows ME, Linux and Macintosh computers to use Internet Explorer to access your
Web servers by using a host name. Which of the following service should you use?
a. DHCP
b. Hosts
c. BOOTP
d. DNS
Statement A: IP generates control messages related to any error in connection or flow control over the
network.
Statement B: IP is responsible for addressing and forming the data packets to be transferred over the
network.
Which of the following options is correct about the above statement?
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, statement A and statement B are true.
d. Both, statement A and statement B are false.
Which of the following field in the IP header indicates reliability, precedence delay and throughput
parameters?
a. Service.
b. Fragment Offset.
c. Options.
d. Flags.
Statement A: Infrared transmissions can provide line of sight communications over short distances.
Statement B: Microwave technology can be employed in two forms, namely satellite links and terrestrial
links.
Which of the following options is correct about the above statements?
a. Statement A is true, and statement B is false.
b. Statement A is false, and statement B is true.
c. Both, statement A and statement B are false.
d. Both, statement A and statement B are true.
9/ You are analyzing IP data packets from node A to node B using a Network Analyzer. From the given
figure, identify the error control value?
-
8/2/2019 Test Quarter 5 -1
18/47
a. 0x86ee
b. 0x01
c. 0x00
d. 0x5332
Gregg is a network administrator in a large finance organization, which is having a Windows 2003 Server.
For the last 2-3 weeks he found that the network traffic is getting very heavy to the Window 2003 Server. He
wants to track all the traffic to the Windows 2003 Server. What action should he perform?
A. He should use network analyzer on any node of the network.
B. He should use network analyzer on the Windows 2003 Server of the network.
C. He should enable the Promiscuous Mode in the network analyzer.
D. He should disable the Promiscuous Mode in the network analyzer.
a. A and C.
b. B and D.
c. B and C.d. A and D.
A local area network is handling large number of client computers. The network administrator was
previously using the BOOPTP protocol for handling the client computers. The administrator is having a
problem in manually allocating and configuring the IP addresses over the network. The protocol is also not
able to detect the unused IP addresses over the network for their future allocation to another client. Which
of the following protocol does the administrator implement to overcome that problem?
a. DHCP protocol.
b. BOOTP protocol.
c. Internet protocol.
d. Stop-and-wait protocol.
From the given figure, specify the type of delivery of data packets between Node X to Router 1 and
between Router 1 and Router 2.
a. Both will use direct delivery.
b. It will be direct delivery between Node X to Router 1 and indirect delivery between Router 1?andRouter 2.
c. It will be indirect delivery between Node X to Router 1 and direct delivery between Router 1 and Router 2,
d. Both will use indirect delivery.
Your company wants to setup a LAN environment. You are assigned to design the new network. You wantto implement a device, which:
1. Joins multiple computers or other network devices together to form a single network segment.
2. Amplify and regenerate the signal from one node to another in a network.
3. Provides a common connection point for computers, printers, and other network devices in a star
topology network.
-
8/2/2019 Test Quarter 5 -1
19/47
Which of the following network component will meet the preceding requirements?
a. Repeaters.
b. Hubs.
c. Switch.
d. Bridge.
In which of the following state, the DHCP client enters, after sending the DHCPDISCOVER message?
a. Initializing state.
b. Requesting state.
c. Selecting state.
d. Bound state.
Collin is a network administrator in a financial firm, which is having five Windows 2000 Server. All the
servers are configured as static routers. The network is divided into various subnets depending on
departments. He wants to identify the path that a data packet takes as it passes through the routers. Which
of the following utility will he use?
a. Ipconfig.exe
b. Tracert.exe
d. Ping.exe
c. Route.exe
Which of the following is a reliable protocol of the Transport layer?
a. IP
b. TCP
d. ICMP
c. UDP
17/ You are analyzing UDP data packets from node A to node B using a network analyzer. From the given
figure, find out the destination port number?
c. 17
a. 1090
b. 58
d. 53
Statement A: In the IPng Authentication Header method an extension header, IPng Authentication Header,
provides integrity and confidentiality to IPv6 datagrams.
Statement B: In the IPng Encapsulating Security Header method an extension header, IPng Encapsulating
Security Header, provides authentication and integrity to IPv6 datagrams.
Which of the following options is correct about the above statement?
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, statement A and statement B are true.
d. Both, statement A and statement B are false.
Alder tries to connect a ftp server from a node having Windows 2000 Professional by issuing the command
-
8/2/2019 Test Quarter 5 -1
20/47
ftp sales.books.com but it fails. But he is able to connect the server by using the Windows Explorer
program. What is the likely problem?
a. No DNS server configured on Alder?s workstation.
b. No DNS client configured on Alder?s workstation.c. No default gateway defined on the server.
d. No DNS server defined on the server.
In which of the following modes, two nodes can send as well as receive data but not at the same time?
a. Simplex mode.
b. Half-duplex mode.
c. Full-duplex mode.
d. Promiscuous mode.
Which of the following layer comes below Network Layer in the bottom-up approach of OSI Reference
Model?
a. Transport Layer.
b. Session Layer.
c. Presentation Layer.
d. Data Link Layer.
Which of the following is the correct definition for Ethernet Access Method?
a. Ethernet Access Method is a set of rules that ensures that errors are not introduced into the data stream,
by checking for matches between the data transmitted and the data received.
b. Ethernet Access Method is a set of rules that acts as packet filter by defining which packets to pass and
which to block.
c. Ethernet Access Method is a set of rules that defines how a computer transmits data on
the network cable and retrieves data from the cable.
d. Ethernet Access Method is a set of rules that addresses the problems associated with routing in large,
heterogeneous networks.
Your company decided to open small branch offices in various cities of US. Each branch office will have 10-
12 nodes, 1 fax machine and 1 printer. You were asked to design the network of each branch office.?You
decided to have peer-to-peer network in the branch offices. You were asked to analyze the advantages of
the peer-to-peer network. Which of the following are the advantages of peer-to-peer network?
A. Strong central security
B. Easy setup
C. Ability of users to control resources sharing
D. No network administrator required
E. Optimized dedicated serversa. A, B and D.
b. B, D and E.
c. A, B and E.
d. B, C and D.
A datagram received from one network may be too large to be transmitted in a single packet on a different
network. Which of the following TCP/IP protocol helps the router to divide the datagram into smaller pieces?
a. ICMP
-
8/2/2019 Test Quarter 5 -1
21/47
b. IP
c. IGMP
d. TCP
Which of the following is an 8-bit value field that defines the type of BOOTP packet?
a. Operation Code.b. Hop count.
c. Hardware Type.
d. Options.
Tom tries to connect a ftp server from a node having Windows 2000 Professional by issuing the command
ftp sales.books.com. He received the following error message ?Bad IP Address?. He then successfully pings
the server. What is the likely problem?
a. No DNS client configured on Tom?s workstation.b. No DNS server configured on Tom?s workstation.
c. No default gateway defined on the server.
d. No DNS server defined on the server.
Statement A: Name server is a computer that maintains the database of host names and their
corresponding IP addresses for name resolution.
Statement B: The function of the resolvers is to pass name request between applications and name
servers.
Which of the following options is correct about the above statement?
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, statement A and statement B are true.
d. Both, statement A and statement B are false.
You can connect through Windows Explorer to all nodes on the local network, but cannot connect to any
nodes on the remote subnet. Which IP address should you ping first to diagnose the problem?
a. Ping
b. Ping
c. Ping
d. Ping
You cannot connect to a Windows 2000 Server from a node running on Windows 2000 Professional using
Windows Explorer. Both the server and the node are in the same physical network. By using a network
analyzer, you found that each time the node attempts to connect to the server, it broadcasts an ARP
request for the default gateway. What is the most likely cause of the problem?
A. Invalid default gateway address on the Windows 2000 Professional node
B. Invalid subnet mask on the Windows 2000 Professional node
C. Invalid default gateway address on the Windows 2000 Server
D. Invalid subnet mask on the Windows 2000 Server
a. A
b. B
c. C
-
8/2/2019 Test Quarter 5 -1
22/47
d. D
It is developed to implement file transfer, printer sharing, and mail service among Apple systems. Macintosh
machines have them installed by default.
Identify the protocol.a. DLC.
b. SNA.
c. AppleTalk.
d. IPX/SPX.
Statement A: Transport Layer is responsible for process-to-process communication.
Statement B: The Transport layer can delivery a data packet either reliably or unreliably.
Which of the following options is correct about the above statement?
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, statement A and statement B are true.
d. Both, statement A and statement B are false.
An administrator is moving a node from subnet A to another subnet B. After moving the node in the new
subnet, he checked the IP address of the node. He found that the node failed to get the proper IP address.
The DHCP server is not available in the subnet B it is in subnet A. What actions will he take to provide a
DHCP address to the node?
a. He has to create a new scope for the node.
b. A RFC 1542 compliant router to be added in the network.
c. Provide a new DHCP server in the network.
d. A bridge to be added in the network.
Which of the following WAN components converts the digital signals from the computer to analog signals?
a. Routers.
b. Brouters.
c. CSU/DSU.
d. Modem.
Which of the following record helps the DNS in providing information about the host such as, operating
system used?
a. HINFO.
b. Start of authority (SOA).
c. Address (A).d. Canonical Name (CNAME).
Statement A: IPv6 data packets are exchanged and processed on each host by using IPv6 at the Network
Access layer.
Statement B: In IPv6, the Internet layer creates IPv6 packets including the source and destination address
information that is used to route the data through the network.
Which of the following options is correct about the above statement?
-
8/2/2019 Test Quarter 5 -1
23/47
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, statement A and statement B are true.
d. Both, statement A and statement B are false.
You are analyzing TCP data packets from node A to node B using a Network Analyzer. From the givenfigure, find out the size of the header?
a. 28 Bytes
b. 8 Bytes
c. 60 Bytes
d. 40 Bytes
Which of the following layer of the OSI Reference model is responsible for routing, switching, and controlling
the flow of data between nodes?
a. Transport Layer.
b. Network Layer.
c. Presentation Layer.
d. Physical Layer.
Tom is designing a network for his office. He is not able to decide on the type of transmission medium. His
office is in an area that is prone to high levels of EMI or for long distance data transmissions, where
electrical signals are significantly distorted and degraded. He wants minimum distortion of signals in the
transmission medium.
a. He can select fibre-optic cables.
b. He can select twisted-pair cables.
c. He can select both fibre-optic cables or twisted-pair cables.
d. He can select both coaxial cables or twisted-pair cables.
Which of the following DHCP message consists of the IP address and additional configuration information,such as lease duration and subnet mask?
a. Discover message.
b. Offer message.
c. Request message.
d. Bootreply message.
You are a network administrator in a finance organization. You want to configure your Windows 2003
Server on the Internet and download files. Which of the following service you should use in the Windows
2003 Server?
a. Telnet.
b. SMTP.c. SNMP.
d. FTP.
Which of the following protocols function at the Transport Layer?
a. ICMP and IGMP.
b. TCP and UDP.
c. TCP and FTP.
d. Network Access Layer.
-
8/2/2019 Test Quarter 5 -1
24/47
48/ Tim George is a network administrator in an organization. The organization has three subnets. One
subnet has only laptop Windows 2000 Professional nodes. The other two subnets have Windows 2000
nodes. Tim has installed a DHCP server to support all the clients. Tim wants to set the IP lease period for
the laptops to 7 days and for the other two subnets to 20 days. How should Tim implement this?
a. Create one DHCP scope for all subnets. For each node, create an exclusion range with a unique leaseperiod.
b. Create one DHCP scope for all subnets. For each node other than laptops, create a reservation with a
30-day lease period.
c. Create one DHCP scope for each subnet. Specify the lease period as part of the
scope?s configuration.d. Create one DHCP scope for each subnet. Create a global option that specifies a lease period that is
based on the operating system the client computer is running.
49/ Which of the following RFCs define the protocols of the Network Access Layer?
a. RFC 926 and RFC 951
b. RFC 826 and RFC 894
c. RFC 826 and RFC 951
d. RFC 894 and RFC 926
Quarter 5 ReviewManaging and Maintaining Windows Server 2003
Consider the following statements:
Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of
multiple I/O performance on different disks.
Statement B: Striped volumes do not provide fault tolerance.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
Which audit policy is intended for the domain controllers that authenticate users as they log on to other
computers?
a. Audit object access
b. Audit logon events
c. Audit Account logon eventsd. Audit Account management
Consider the following two statements:
Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT
or FAT 32, the file loses its permissions.
-
8/2/2019 Test Quarter 5 -1
25/47
Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or
FAT32, the file loses its permissions.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
When James tries to open a newly installed application, his computer hangs. He tries to restart his
computer but fails to do so. Which of the following options will enable James to restart the computer?
a. Boot the computer using the Safe Mode with Networking option.
b. Boot the computer using the Last Known Good Configuration.
c. Boot the computer using the Safe Mode option.
d. Boot the computer using the Windows Startup Disk.
As a system administrator, you have created a GPO that is applied to the organization?s domain. You want
that this GPO should not be applied to three users in the Finance organizational unit. Which of the following
options will enable you to perform this task with the least administrative effort?
a. Move the three users to another organizational unit in the domain.
b. Disable the accounts of these users.
c. Create a group of the three users and deny the Apply Group Policy option.
d. Delete the accounts of these users and create local user accounts for these users.
Consider the following statements:
Statement A: Audit policies enable you to track the success of certain events and failure of all the events.
Statement B: Audit policies only track the activities performed by a user.
Statement C: You can use the audit policies to track the location where the activity occurred.
Which of the following is correct about the above statements?
a. Only Statement A is true.
b. Only Statement B is true.
c. Statements A, B, and C are true.
d. Only Statement C is true.
You are the system administrator of Aztec Corporation. The organization policy of Aztec is to keep all client
computers updated with patches and critical system updates from Microsoft. You plan to install software
update service on a server, which will download all the required software updates and distribute the updates
to the clients. Identify the server on which you should install the software update service.
a. Server with DNS installed.b. Server with RRAS installed.
c. Server with IIS installed.
d. Server with DHCP installed.
Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that
he has given a confidential document for printing, which is not printed by the printer. The accountant is also
unable to delete the print job from the print queue. What should Robert do to ensure that the document is
not printed later?
-
8/2/2019 Test Quarter 5 -1
26/47
a. On the print server, stop and restart the print spooler service.
b. On the client computer, select the pause option from the document menu of the Printer window.
c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer
window.
d. Restart the client?s computer.
You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog
box. What can be the possible cause of this problem?
a. The folder is located on a disk partition that is not NTFS.
b. You are not a member of the group that has deny permission for the folder.
c. You don?t have appropriate rights for the folder.
d. Shadow copies are configured on the folder.
Which of the following is a logical boundary of an organization?s network?
a. Domain
b. Tree
c. Forest
d. Organizational unit
You are a system administrator of an organization that consists of 1000 users who use Windows Server
2003 and Windows 2000 computers. To secure the organization?s network, you and the junior
administrators have planned and implemented several GPOs on the domain and organizational units. In
addition, you have implemented Group Policies on individual users also.
As a part of the security policy, you and your team conduct a weekly review of the configured GPOs and
Group Policies. While conducting this review you need to view the configured GPOs in a report format,
which will indicate the GPO name, the policy that is configured, and the organizational unit or user on which
the GPO is applied. Identify the tool that will enable you to view GPOs in the report format.
a. Group Policy Modeling
b. Group Policy HTML Reportc. Group Policy Reporting
d. Group Policy HTML Reporting
You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E
drive of your computer. After a couple of days, you notice that it has been modified. What can be the most
likely cause of this problem?
a. The file has been moved from a FAT 32 partition to an NTFS partition.
b. The file has been moved from an NTFS partition to a FAT partition.
c. The file has been moved from a FAT partition to an NTFS partition.
d. The file has been moved from an NTFS partition to a different NTFS partition.
Consider the following statements:
Statement A: A Group Policy is applied to a site, domain, and the forest.
Statement B: The Default Domain Policy is a default GPO that is created when Active Directory is installed.
Which of the following options is correct about the above statements?
a. Statement A is true and Statement B is false.
b. Both, statement A and statement B are true.
c. Both, statement A and statement B are false.
-
8/2/2019 Test Quarter 5 -1
27/47
d. Statement A is false and Statement B is true.
As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced
security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid
a similar situation, you plan to apply security settings for the fresh installation. Which security template will
you use to perform this task?a. Setup security.inf
b. DC security.inf
c. Secure*.inf
d. Security Set up.inf
Consider the following statements:
Statement A: The backup utility of Windows Server 2003 enables you to backup files and folders, schedule
a backup, and restore data on the Windows Server 2003 computer.
Statement B: ASR is a feature of the backup utility that enables you to recover a Windows Server 2003
computer that does not boot.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
17/ Which container lists the default users and group accounts created by Windows Server 2003?
a. Users and Computers
b. Builtin and Computers
c. Builtin and Users
d. Users and Domain Controllers
Which of the following actions should you take if folder redirection is successful but the files and sub-folders
are not available?
a. Check if the redirected folder exists.
b. Check if Remote Desktop for Administration is enabled.
c. Check your permissions on the redirected folder.
d. Check for the extensions of the files contained in the redirected folder.
You are the system administrator for CellGo. The network of CellGo consists of a single Active Directory
domain named CellGo.com. All network servers run Windows Server 2003. Some of the client computersrun Windows XP Professional and some work on Windows NT Workstation. You install terminal server on
three member servers named Cell1, Cell2, and Cell3. You place all three terminal servers in an
organizational unit named Terminal Server. You link a GPO to the Terminal Server OU. Five days later, end
users notify that the performance of Cell2 is very slow. You discover that Cell2 has 70 disconnected
Terminal Server sessions. You need to configure all the three terminal servers to end the disconnected
session after 15 minutes of inactivity. You must achieve this goal by using the minimum amount of
administrative effort. What should you do?
-
8/2/2019 Test Quarter 5 -1
28/47
a. Log on to the console of each terminal server. In the RDP-Tcp connection properties dialog box, set the
?End a disconnected session?option to 15 minutes.
b. Edit the GPO to set the time limit for disconnected sessions to 15 minutes.
c. On Cell2, run the tsdiscon command to disconnect all 70 users from Cell2.
d. In Active Directory Users and Computers, set the ?End a disconnected session?option for all domain user
accounts to 15 minutes.
Jenny is the system administrator of a domain named Aztec.com. In this domain, the accounting group and
the marketing group share the same printer. Jenny receives a complaint from the marketing group that their
small print jobs take a lot of time to print. Jenny finds that the accounting group gives large print jobs to the
printer, which causes the delay. She learns that the accounting jobs are not needed on the same day on
which the request has been sent to the printer. What should Jenny do to improve the situation?
a. Create a separate printer; configure the printer to print directly to the printer port and then direct the
accounting group to print through this printer.
b. Create a separate printer; configure the printer to start printing immediately, and then direct the marketing
group to print through this printer.
c. Create a separate printer; configure the printer to be available only after certain hours, and then
direct the accounting group to print large documents through this printer.
d. Create a separate printer; configure the printer to be available only after certain hours, and then direct the
marketing group to print documents through this printer.
Which of the following options enables you to install the device drivers that are not digitally signed?
a. Warn.
b. Install.
c. Ignore.
d. Update.
Consider the following statements:
Statement A: The Dial-in tab of the User Properties dialog box includes fields, such as remote access
permissions, callback options, and static IP address.Statement B: The Environment tab of the User Properties dialog box displays the name of the applications
that are started when a Terminal Services user logs on.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true .
c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
As a system administrator, you want to provide high degree of security to domain controllers. For
implementing this level of security, you want that the domain controllers should use digitally signedcommunication channels. Which of the following security templates will enable you to do this?
a. Compatws.inf
b. Securedc.inf
c. Hisecdc.inf
d. Setup Security.inf
Consider the following statements:
Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003.
-
8/2/2019 Test Quarter 5 -1
29/47
Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003.
Which of the following is correct about the above statements?
d. Statement A is false and Statement B is true.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.a. Both, statement A and statement B are false.
Harry is assigned the computer account PC02. The management of the organization decides to transfer
Harry from the sales department to the administration department. You plan to move Harry?s computer to
the administration department instead of allocating a new computer to Harry. Which of the following options
will enable you to accomplish this task?
c. Disable the computer account, PC02, in the sales organizational unit.
a. Move the computer account, PC02, from the sales organizational unit to the administration
organizational unit.
b. Enable the computer account, PC02, in the administration organizational unit.
d. Create a new computer account, PC02, in the administration organizational unit.
Catherine is a user in your domain. Her username is Cath13 and she has a roaming profile stored in the
domain controller. At what location will her desktop be stored?
a. \\domain controller\ documents and settings\Cath13\desktop
b. C:\documents and settings\Cath13\desktop
c. C:\winnt\Profiles\Catherine\desktop
d. C:\Profiles\desktop\Catherine
You are the system administrator of your organization. You need to take backup of the data stored in the
Sales_Data folder on the first Monday of every month. Which of the following options enables you to
accomplish this task with least administrative effort?
a. Take incremental backup of Sales_Data folder on the first Monday of every month.b. Schedule backup job of Sales_Data folder for the first Monday of every month.
c. Take normal backup of Sales_Data folder on the first Monday of every month.
d. Take differential backup of Sales_Data folder on the first Monday of every month.
Which of the following protocols uses Transmission Control Protocol to ensure that data transfer is
complete and accurate?
a. FTP.
b. HTTP.
c. NNTP.
d. SMTP.
Consider the following statements:
Statement A: Security policies cannot be implemented using GPOs.
Statement B: Audit policies can be implemented using GPOs.
Which of the following is correct about the above statements?
a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, Statement A and B are true.
-
8/2/2019 Test Quarter 5 -1
30/47
d. Both, Statement A and B are false.
Identify the NTFS folder permission that enables users to only view the names of files and subfolders
contained within a folder?
a. List folder contents.
b. Full Control.c. Modify.
d. Read and Execute.
Identify the group that has the rights and permissions to create and delete shared resources, stop and start
services, and backup and restore files.
a. Backup Operators.
b. Administrators.
c. Print Operators.
d. Server Operators.
You are the system administrator of Red Star Corp. John requests you to install a printer on his computer.
To install the printer for John, you required the printer driver files. Identify the folder that you need to access
to get the files.
a. Print$ folder.
b. Admin$ folder.
c. Printer$ folder.
d. Prn$ folder.
You are working as a system administrator in an organization, which has its head office in Chicago. The
organization has two branch offices, one in New York and the other in Texas. All the three offices have an
interconnected WAN network. As a system administrator, you have been assigned the task of viewing the
Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not
know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for eachcomputer using the computer name, you decide to use the IP address of each computer with the Gpresult
command. Which parameter of the Gpresult command will help you define the name or IP address of the
remote computers?
a. /u Domain/User
b. /p Password
c. /user TargerUserName
d. /s Computer
You are installing Windows Server 2003 on a computer with the following configuration:
Pentium 2.4 GHz256 MB RAM
4.5 GB Hard Disk
During installation, setup displays an error message, ERROR_CREATE_FAILED.
What does this error message indicate?
a. The Windows Installer service has failed to start.
b. The hard disk does not have the disk space required to install Windows Server 2003.
c. One of the parameters entered is invalid.
-
8/2/2019 Test Quarter 5 -1
31/47
d. The data entered is of incorrect type.
Consider the following statements:
Statement A: A tree is a logical hierarchy of multiple domains that share the same Domain Name Services
(DNS) namespace.
Statement B: Trees are implemented in the domain structure of an organization when the organizationrequires multiple domains.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
-
8/2/2019 Test Quarter 5 -1
32/47
Christina is the system administrator of StarMoon Technologies. She wants to restore the default
permissions for a system drive that has been modified. Which of the following security templates will enable
her to do this?
a. Hisecws.inf
b. Rootsec.infc. Rootws.inf
d. Rootdc.inf
You want to generate RsoP queries for the users in your organization to view the Group Policy settings
applied to them. Which of the following tools will enable you to perform this task?
a. Gpupdate.exe
b. Gpresult.exe
c. Group Policy Management Console.
d. Group Policy Object Editor.
As a system administrator, you have created a GPO that is applied to the organization?s domain. You want
that this GPO should not be applied to three users in the Finance organizational unit. Which of the following
options will enable you to perform this task with the least administrative effort?
a. Move the three users to another organizational unit in the domain.
b. Disable the accounts of these users.
c. Create a group of the three users and deny the Apply Group Policy option.
d. Delete the accounts of these users and create local user accounts for these users.
Consider the following statements:
Statement A: You need at least 100 MB free space on a volume for creating shadow copies.
Statement B: You cannot edit shadow copies because they are read-only.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
You want to back up the Accounts folder automatically on the first Monday of every month. In addition, you
want to save disk space and back up only those files that have been created or modified. Which of the
following options will enable you to accomplish this task?
a. Schedule incremental backup of the Accounts folder on the first Monday of every month.
b. Schedule normal backup of the Accounts folder on the first Monday of every month.c. Schedule copy backup of the Accounts folder on the first Monday of every month.
d. Schedule daily backup of the Accounts folder on the first Monday of every month.
Which of the following options provides a secure path between the client and the Web server so that the
data is not diverted to another computer?
a. HTTP.
b. SSL.
c. NNTP.
-
8/2/2019 Test Quarter 5 -1
33/47
d. FTP.
Which policy enables you to specify password restrictions, account lockout policies, and Kerberos policies?
a. Local Policies.
b. Event Log Policies.
c. Password Policies.d. Account Policies.
Identify the correct method to create local user accounts?
a. Select the Start > Programs > Administrative Tools > Microsoft Management Console menu command.
b. Select the Start > Programs > Administrative Tools > Computer Management menu command.
c. Select the Start > Programs > Administrative Tools menu command.
d. Select the Start > Programs > Administrative Tools > Active Directory Users and Computers menu
command.
Which of the following options enables you to prevent the installation of any unsigned device driver?
a. Warn.
b. Stop.
c. Prevent.
d. Block.
You are working as a system administrator in an organization, which has its head office in Chicago. The
organization has two branch offices, one in New York and the other in Texas. All the three offices have an
interconnected WAN network. As a system administrator, you have been assigned the task of viewing the
Resultant Group Policies that are applied to computers of the Texas child domain. However, you do not
know the computer accounts of the Texas office. Instead of viewing the applied Group Policies for each
computer using the computer name, you decide to use the IP address of each computer with the Gpresult
command. Which parameter of the Gpresult command will help you define the name or IP address of the
remote computers?a. /u Domain/User
b. /p Password
c. /user TargerUserName
d. /s Computer
Consider the following statements:
Statement A: Encrypting a folder involves encrypting the files stored in the folder and not the sub-folders
stored in the folder.
Statement B: You cannot access the encrypted files and folders like ordinary files and folders.
Which of the following is correct about the above statements?a. Statement A is true and Statement B is false.
b. Statement A is false and Statement B is true.
c. Both, Statement A and B are true.
d. Both, Statement A and B are false.
Consider the following statements:
Statement A: A spanned volume offers fault tolerance.
-
8/2/2019 Test Quarter 5 -1
34/47
Statement B: A striped volume increases the speed at which data is read and written, but it does not offer
fault tolerance.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
As a system administrator, you need to secure the organization?s domain from any incidental attacks. From
your past experience, you have noticed that most of the security breaches occur due to known passwords
and user names. To prevent this, you want that the users of the network change their password periodically
and the new password should be different from the old password. In case the new password is similar to
any of the old passwords, the new password should not be accepted. To implement this, which security
policy do you need to configure?
a. Configure the ?Enforce old password history?policy.
b. Configure the ?Enforce password history?policy.
c. Configure the ?Enforce password history list?policy.
d. Configure the Enforce old password history list?policy.
The network of your organization consists of 300 end users who use the Windows application server. This
application server is used for storing and processing data. The users complain it takes a long time to access
the application server. In addition, it takes a long time to process data at certain times of the day. To solve
this problem, you need to perform the following tasks:
Task 1: Determine if processor is the bottleneck.
Task 2: Determine if memory is the bottleneck.
Task 3: Determine if network is the bottleneck.
To perform these tasks, you propose to run the system monitor at different times throughout the day for a
number of days, and view the data generated by the counters of Processor Time, Processor Queue Length,
Pages per Second, and Average Disk Queue Length objects. Identify the tasks that will be completed by
you if you use the proposed solution.
a. Tasks 1 and 3.
b. Task 1.
c. Tasks 2 and 3.
d. Task 3.
You are the system administrator for CellGo. The organizational hierarchy consists of a head office and
three branch offices. Domain controllers are installed in each office to reduce the traffic of WAN. All theservers run Windows Server 2003. You work from the head office. Each branch office has a system
administrator assigned to it. You want to review the auditing information of each branch office server. What
should you do to view the auditing information with minimum administrative cost?
a. View the security template from the Security Configuration and Analysis snap-in.
b. Tell the administrator of each branch office to open the snap-in from Computer Management, and view
Event Viewer.
c. Run the Seregcedit.exe utility and specify the appropriate parameters.
d. Establish a Remote Desktop client session with each branch office server.
-
8/2/2019 Test Quarter 5 -1
35/47
Which of the following enables you to monitor the performance of printers?
a. Device Manager.
b. Event Viewer.
c. Performance Console.
d. Task Manager.
You are the system administrator of PQR Corp. There are two HP InkJet printers installed on the network of
your organization. One of the HP InkJet printers is malfunctioning. To troubleshoot the printer, you open the
Device Manager window and notice that Windows Server 2003 has generated error code 29. What should
you do to troubleshoot this problem?
a. Verify that the device is using the current Windows Server 2003 driver.
b. Verify that the device driver is not corrupt.
c. Verify that the device driver has been properly configured.
d. Check if the BIOS for the hardware device is enabled.
Steve is the system administrator of BlueSeas Systems. His organization has hired 30 executives for its
sales department. Steve has been assigned the task of creating user accounts for the new employees.
Which of the following options will enable him to accomplish this task with the least administrative effort?
a. Create user accounts using user account template.
b. Create 30 user accounts one by one.
c. Create user accounts using user profiles.
d. Create user accounts using command line tools.
Which of the following options is a collection of multiple domains that share a common schema and global
catalog server?
a. Active Directory.
b. Tree.
c. Forest.d. Organizational unit.
Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of
Windows Server 2003 computer from the client computer?
a. Admin$
b. Print$
c. C$
d. D$
Identify the physically separated part of a domain network, which is connected with a slow wide area
network (WAN) link to the domain network.a. Domain controller.
b. Site.
c. Forest.
d. Organizational unit.
You are installing Windows Server 2003 on a computer with the following configuration:
Pentium 350 MHz
128 MB RAM
-
8/2/2019 Test Quarter 5 -1
36/47
4.5 GB Hard Disk
During installation, setup displays the error message, ERROR_DATATYPE_MISMATCH.
What does this error message indicate?
a. The Windows Installer service has failed to start.
b. The data entered is invalid.c. One of the parameters entered is invalid.
d. The data entered is of incorrect type.
Consider the following two statements:
Statement A: When you copy a file from an NTFS partition and paste it to a different partition, such as FAT
or FAT 32, the file loses its permissions.
Statement B: When you move a file from an NTFS partition and paste it to different partition, such as FAT or
FAT32, the file loses its permissions.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
Consider the following statements:
Statement A: Group Policy is a feature of the Computer Management utility.
Statement B: Group Policies can only be applied to multiple users.
Which of the following options is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.d. Statement A is false and Statement B is true.
You are the system administrator of your organization. You plan to enhance the availability of data stored in
your Windows Server 2003 computer by implementing RAID-5 volumes on two hard disks.?However, on
the Select the Volume Type page, the RAID-5 volume option is not highlighted. What can be the possible
cause of this problem?
a. There are bad sectors in any of the hard disks.
b. The hard disks are not of the same manufacturer.
c. A minimum of three hard disks is required for creating RAID-5 volumes.
d. The hard disks have not been activated.
Consider the following statements:
Statement A: Minimum 128 MB RAM is required for installing Windows Server 2003.
Statement B: 256 MB RAM or higher is recommended for installing Windows Server 2003.
Which of the following is correct about the above statements?
a. Both, statement A and statement B are false.
b. Both, statement A and statement B are true.
c. Statement A is true and Statement B is false.
-
8/2/2019 Test Quarter 5 -1
37/47
d. Statement A is false and Statement B is true.
Identify the group that has full control over all domains that exist in an Active Directory forest.
a. Security.
b. Domain Admins.
c. Backup Operator.d. Enterprise Admins.
Robert is the system administrator of a financial institution. The accountant of the institution tells Robert that
he has given a confidential document for printing, which is not printed by the printer. The accountant is also
unable to delete the print job from the print queue. What should Robert do to ensure that the document is
not printed later?
a. On the print server, stop and restart the print spooler service.
b. On the client computer, select the pause option from the document menu of the Printer window.
c. On the client computer, select the Cancel All Documents option from the Printer menu of the Printer
window.
d. Restart the client?s computer.
Kate, the system administrator in ServeYourMoney Inc. wants to ensure that the call center executives of
the company are able to view the daily calls data file in the calls folder. Kate also wants to ensure that the
executives do not delete data from the folder. Which option will enable Kate to accomplish this task?
a. Apply Full Control folder permission on the calls folder.
b. Apply Write folder permission on the calls folder.
c. Apply Read folder permission on the calls folder.
d. Apply Modify folder permission on the calls folder.
You moved a file named AVSEQ01.xls on which the Everyone user group has read permission only to the E
drive of your computer. After a couple of days, you notice that it has been modified. What can be the most
likely cause of this problem?a. The file has been moved from a FAT 32 partition to an NTFS partition.
b. The file has been moved from an NTFS partition to a FAT partition.
c. The file has been moved from a FAT partition to an NTFS partition.
d. The file has been moved from an NTFS partition to a different NTFS partition.
As a system administrator, you are performing a fresh installation of Windows Server 2003. You had faced
security-related problems during a fresh installation of Windows Server 2003 on another computer. To avoid
a similar situation, you plan to apply security settings for the fresh installation. Which security template will
you use to perform this task?
a. Setup security.inf
b. DC security.infc. Secure*.inf
d. Security Set up.inf
As a system administrator, you need to deploy different types of GPOs on the domain, organizational units,
and individual users working on server computers. To avoid problems related to Group Policy inheritance,
you want to simulate the deployment of newly created GPOs before you actually deploy the GPOs on
server computers. Which of the following tools will enable you to do this task?
a. Group Policy Modeling
-
8/2/2019 Test Quarter 5 -1
38/47
b. Group Policy Object Reporting
c. Group Policy Object Modeling
d. Group Policy Object Simulating
You want to apply Execute permission to a folder but there is no security tab in the folder properties dialog
box. What can be the possible cause of this problem?a. The folder is located on a disk partition that is not NTFS.
b. You are not a member of the group that has deny permission for the folder.
c. You don?t have appropriate rights for the folder.
d. Shadow copies are configured on the folder.
Harry is assigned the computer account PC02. The management of the organization decides to transfer
Harry from the sales department to the administration department. You plan to move Harry?s computer to
the administration department instead of allocating a new computer to Harry. Which of the following options
will enable you to accomplish this task?
a. Move the computer account, PC02, from the sales organizational unit to the administration organizational
unit.
b. Enable the computer account, PC02, in the administration organizational unit.
c. Disable the computer account, PC02, in the sales organizational unit.
d. Create a new computer account, PC02, in the administration organizational unit.
Consider the followi