You are on page 1of 140

Q7 MMS Network (Microsoft) Review No. A Question You are the system administrator at Blue Sky Ltd..

You manage a Growing enterprise network running on Microsoft Windows Server 2003. To keep up with the growth, the number of domains you tng controllers and update the bridgehead server list. After designing the bandwidth requirements, you begin to plan site your boundaries. You need to Decide whether where to Establish a single site or multiple sites. What properties would lead you to choose multiple sites for this situation? 1, You need all the replication on your network to as intrasite replication OCCUR. 2, You need simple replication management for your subnet. 3, You need the fastest directory updates the between all domain controllers. 4, You need granular control for your WAN network replication. Wilson is the network administrator at Red Cosmetics. The domain has domain controllers running Windows Server 2003. Wilson is planning to place the real number chng global catalogs used optimally. During the analysis bandwidth, Wilson notices a trend in global catalog traffic network. What type of global catalog Wilson predict network traffic will use more network resources of coal to other types of global network traffic? 1, Network traffic related to UPN authentication. 2, Network traffic related to user searches for directory information throughout a forest. 3, network traffic related to global catalog replication directory. 4, Network traffic related to global catalog queries.

Helen is working as a system administrator at IBG Inc. You have recently installed Windows Server 2003 Active Directory and have configured in the network of the organization. In the network, Helen has created a domain for the accounts department. Helen needs to manage the access of the domain. Which service does Helen need to implement to perform the task? 1, the Event Viewer console 2, Access Control Lists 3, Service Management 4, Transitive trust Which component of the Active Directory infrastructure provides universal group membership information to a domain controller when the user logs on to the network? 1, Domain controller 2, Global catalog 3, Tree root domain 4, Forest root domain Which is the third stage in the process of creating INVOLVED the Active Directory infrastructure design? 1, Creating a site topology plan 2, Creating a forest plan 3, Creating a domain plan 4, Creating an OU plan What will be the first step in the design process for collecting the design tools? 1, analyzing the requirements 2, the design team Gathering 3, Building a design based on the requirements 4, Testing the design

Which is the third step in creating a site topology plan? 1, Defining sites 2, Defining the replication plan 3, Deciding the placement of domain controllers 4 Placing the global catalog servers in a forest Consider the statements: Statement A: The domains, belonging to different trees in a forest, work independently. Statement B: Forest lc the domains of communication Between Different trees. Which of the sau is true, with Respect to the above statements? 1, Statement A statement is true and B is false. 2, Statement A is false and statement B is true. 3, Both, statements A and B, are true. 4, Both, statements A and B, are false.

Which tab in the Properties dialog box to change the default you lc name of the package and support ch a Uniform Resource Locator (URL)? 1, Deployment 2, Upgrades 3 Categories 4, General Which tool you need to use along with Group Policy to handle software deployment on a large scale with computers running pre-Windows 2000 operating systems? 1, Software Distribution Point (SDP) 2, RSoP 3, SMS 4, Software Installation extension

10

11

Which type of Group Policy settings to configure user settings includes workstation environment and h application settings? 1, Administrative templates 2, Scripts 3, Software Installation 4, Remote Installation Services You are the system administrator at Blue Moon computers, Dubai. You need to nhp to each user work area where the users can store files and required software h Safely. For this, you need to create separate user accounts for each user that would enable the users to log on to the network as well as on local computer to access resources h. Which type of user account would you prefer to create for each user? 1, Domain user account 2, Built-in user account 3, Computer account 4, Local user account You are the system administrator at Global Systems, Texas.The management accountant has gi a freelancer named Steve to Perform audit operations. You need to nhp temporary access to Steve That She can gain access compared to network resources. Which type of user account would you prefer to create for Steve? 1, Domain user account 2, Built-in user account 3, Computer account 4, Local user account

12

13

14

Consider the statements: Statement A: Windows Server 2003 never stores local user accounts in the local security database. Statement B: Local user accounts enable the users to log on to a computer and access the resources only from the computer account is created on m h. Which of the sau is true, with Respect to the above statements? 1, Statement A statement is true and B is false. 2, Statement A is false and statement B is true. 3, Both, statements A and B, are true. 4, Both, statements A and B, are false.

15

You are the system administrator at PQR Corp.. You want to create and manage user accounts using the command-line tool, Ldifde. You include the command for running the tool in a Notepad file Ldifde and save the file with. LDF extension.The syntax of the Ldifde command is: dn: cn = container name, ou = organizational unit, dc = root domain changeType: Add objectClass: user sAMAccountName: username UserPrincipalName: username gm the path of user's container displayName: username userAccountControl: value What does in the above dn ch Ldifde syntax of the

command? 1, ch the type of object to be created. 2, along with the username ch the location of the account. 3, ch thm of a new user account in the Users container. 4, the path to an object ch's container.

16

Which operations master role lc a domain controller to add and remove application directory partitions from the forests? 1, the Infrastructure master role 2, Primary Domain Controller (PDC) emulator role 3, Relative Identifier (RID) master role 4, Domain naming master role Identify the Microsoft Management Console (MMC) That performs the function of RID master role. 1, Active Directory Schema 2, Active Directory Domains and Trusts 3, Active Directory Users and Computers 4, Active Directory Sites and Services Which tool provided by Windows Server 2003 Allows you to transfer the operation master roles and Seize? 1, Ntdsutil 2, nltest 3, dcdiag 4, Gpupdate

17

18

19

The failure of m master prevents you from making changes in your password? 1, the Domain Naming Master 2, RID master 3, the Infrastructure master 4, the PDC emulator master Which Active Directory System Monitor counter ch the original size of inbound compressed replication data in bytes? 1, DRA Inbound Bytes Not Compressed (Within site) / sec 2, DRA Inbound Bytes Total / sec 3, DRA Inbound Bytes Compressed (Between sites, before compression) / sec 4, DRA Outbound Bytes Compressed (Between sites, after compression) / sec Which Active Directory System Monitor counter ch the number of synchronization requests made to replication partners? 1, LDAP Client Sessions 2, DRA Sync Requests Made 3, DRA Outbound Objects / sec 4, DRA Outbound Bytes Total / sec Which Active Directory System Monitor counter ch the number of objects replicated out per second? 1, DRA Outbound Objects / sec 2, LDAP Client Sessions 3, DRA Outbound Bytes Total / sec 4, DRA Inbound Bytes Total / sec

20

21

22

23

Which Active Directory System Monitor counters display the total numbers of bytes per second processed or objects? 1, Ratio counters Hen, sui: 2, Statistic counters 3, Performance counters

4, Accumulative counters

24

Which Active Directory System Monitor counter ch the inbound replication data in bytes that were not compressed at the same site in other DSA? Considered hybrid, 1, DRA Inbound Bytes Not Compressed (Within site) / sec 2, DRA Inbound Bytes Total / sec 3, DRA Outbound Bytes Total / sec 4, DRA Outbound Objects / sec Consider the statements: Statement A: The DCDIAG.EXE command you to view or modify lc the ACLs of Active Directory objects. Statement B: The dsastat.exe lc command you to compare the naming contexts on domain controllers khc. It cng lc you to Identify the Differences Between naming contexts on domain controllers. Which of the sau is true, with Respect to the above statements? 1, Statement A statement is true and B is false. 2, Statement A is false and statement B is true. 3, Both, statements A and B, are true. 4, Both, statements A and B, are false.

25

26

Ron Floyd is working as a network administrator at Global Systems, Inc. Ron has implemented Active Directory infrastructure in the network. Due to the large volume of data, Server03 is running low on hard disk space. Ron does not have additional hard disks to install on the server. David Wong, the head of the Marketing department needs to store some data on the server urgently important '. David complains that he is unable to store the important 'data on the server.Which option can use to help David Ron in saving the data on the server? 1, Delete the files of other users from the server 2, Install other hard disks on the server 3, Format the drive to create space 4, Perform offline compaction of the Active Directory database Perfect Watch Co.. is a watch manufacturing company with three business locations: Chicago, Washington, and New York. You are the network consultant and Ron Floyd is the assistant consultant at the Washington office network. The network in the company is using Windows Server 2003 Active Directory services. You ask Ron to raise the functional level of a forest in the network. When Trying to raise the functional level of the forest, Ron receives an error message. Ron asks you to help him troubleshoot the problem occurring while raising the functional level of the forest. What should be ensured to raise the functional level of the forest? 1, Global catalog for each domain controller is enabled 2, Domain controllers are running Windows 2000 Server 3, Universal group membership caching is enabled 4, of the Domain functional level is Windows Server 2003 domain controllers

27

28

Corrine Wallace is working as a network consultant at Mastery Mechanics. Mechanics Mastery is an auto parts manufacturing company with a large network spanning across three cities: New York, Atlanta, and Chicago. The company has a network That is using Windows Server 2003 Active Directory services. Three days ago, Corrine Performed Active Directory database compaction to save hard disk space. Mary Peterson, the head of the Sales department complains rng database transaction is taking more time for the last coalthree days earlier. What can Corrine database transaction due to decrease the time? 1, demote the server and then promote it using the command dcpromo.exe 2, Restore computer files and settings 3, Restore the Active Directory database 4 Format the server hard disk and configure Windows Server 2003 Active Directory on the server You are working as a network administrator and Jerry Smith is working as assistant network administrator at Homelike hospital reserved. The hospital has its head office at San Francisco and has its branch offices at Atlanta and Denver.The hospital has a large network consisting of 300 computers. The management has asked you to implement Windows Server 2003 Active Directory infrastructure in the network. After you have implemented Active Directory in the network, the users are facing connectivity problems. Tells you rng Jerry problems are occurring while registering with DNS service. Jerry asks you to Identify the cause of the connectivity problems. What is the cause of connectivity problems in the network? 1, Folders are not redirected 2, the database is corrupt 3, the DNS service is not working properl y 4, the DNS record is deleted

29

30

Technology Systems is an IT enabled services provider company with its head office at Chicago. The company has two branch offices at Atlanta and Denver. You are working as a network engineer and Christine Turner is working as an assistant network engineer at the Chicago office. Due to some hardware problem, Christine could not back up the data stored on the server and had to format Server2. An error message appears indicating that already exists Server2 when Christine tries to install a domain controller Server2 to replace.Which command would help Christine to remove the references of Server2 from other domain controllers in the network? 1, ADSIEdit.msc and dnsmgmt.msc 2, Netdom.exe and Ntdsutil.exe 3, Movetree.exe and ADSIEdit.msc 4, Netdiag.exe and Ntdsutil.exe NS Toys is a toy manufacturing company with three business locations: Las Vegas, Chicago, and Los Angeles. Chris Donaldson is working as an assistant network administrator at the Los Angeles office of NS Toys. You are working as a network administrator at the head office at Las Vegas. The DC05 domain controller at the Los Angeles office has had a power failure and lost data stored in it. Chris wants to restore System State but he does not know how to restore the System State. Therefore, Chris asks you to help him Perform System State restore. What do you suggest to fix the problem Chris? 1, Perform authoritative System State restore from other domain controllers in the network 2, Perform authoritative System State restore locally 3, Perform non-authoritative System State restore remotely 4, Perform non-authoritative System State restore locally

31

32

AB Corp. is a computer manufacturing company with its head office at Chicago. Pat Greene is working as a consultant in the company network. The company has three departments: Sales, Purchase, and Manufacturing. These three departments are under separate OUs in the forest. As the company has reorganized employees across the departments, the user accounts from Different OUs are Transferred under Different OUs. The users are complaining that chng unable to find h document folders on the network after the reorganization. What is the Possible cause of the problem? 1, the new GPOs for OUs by not contain the updated information about folder redirection 2, Their Users forgot to transfer data from the old computers to the new computers 3, Users' computers have been formatted 4, Domain controllers have been changed You are working as the system administrator at the Chicago branch of Blue Valley Consulting. You have created an Active Directory forest in your organization. You have cng master operation roles Assigned to a domain controller in the forest to Ensure Active Directory performs rng single master replication. Tuy nhin, the employees of Your Company are complaining that chng h unable to change passwords after logging on to h domains. How can you solve this problem? 1, By changing the domain naming master role assignment. 2, By changing the Primary Domain Controller (PDC) emulator role assignment. 3, By changing the Relative Identifier (RID) master role assignment. 4, By using the Active Directory Users and Computers console.

33

34

Which parameter of the command repadmin.exe lc you to ch a user as the administrator? 1, pw: {password | *} 2, / ldap 3, / rpc Hen, sui: 4, / u: domain \ user Ken Burton is the system administrator at the Atlanta branch of Global Systems Inc. The company has another office at New York. Ken has configured intersite replication Between the two offices, but now he observes rng domain directory partition is not being replicated to all domain controllers.Therefore, Ken needs to detect the replication partner that has failed. John cng needs to regenerate the replication topology. Which console nn Ken use to Perform These tasks? 1, Active Directory Replication Monitor console 2, Active Directory Sites and Services console 3, Active Directory Domains and Trusts console 4, the Event Viewer console You are the system administrator at Red Sky. You have decided to move the database of user accounts to Active Directory 2500. You have created a single domain structure for the company. The company needs to structure objects in the domain. To begin, you are planning to create the smallest structure can be Applied to m GPO or administrative authority over m can be delegated. What would Your Plan Propose specific structure in the given problem? 1, An administrative model 2, A domain 3, A subnet 4, An OU hierarchy

35

36

37

You are the system administrator at Smart Software Developers. You want to promote member servers to domain controllers. Which security template do you need to modify? 1, Default security settings (Setup security.inf) 2, updated Default security settings for domain controllers (DC security.inf) 3, Highly secure domain controller security settings (Hisecws.inf) 4, Secure domain controller security settings (Securedc.inf) You are the system administrator at Countrywide markets. The members of the IT department need to access floppy drives and CD-Rom for storing data and ly. This access can spread viruses and worms on the network c cause Severe damage to the trusted software of the company. You are gn the Responsibility to Prevent implement a security policy to all the computers over the network from virus attacks by enabling or disabling the security settings on the centrally managed computer. What security do you need to use to perform the given task? 1, Audit policy 2, Account lockout policy 3, Password policy 4, Security options Which command-line tool to create active directory you lc user objects on computers, m are running Windows Server 2003? 1, Netdiag.exe 2, Ntfrsutl.exe 3, LDIFDE.EXE 4, DCDIAG.EXE

38

39

40

You are working as a system administrator at Countryside Markets. The management has asked you to centralize the network administration in the organization. To centralize the network administration for Countryside Markets, you have implemented Windows Server 2003 Active Directory infrastructure in the network. Now, employees are complaining that chng facing connectivity problems. You notice problems are occurring rng while registering with DNS service. What can be the cause of the problem Possible? 1, Active Directory database is corrupt 2, the DNS record not exist 3, the Active Directory database size has Increased 4, Folders are not redirected

41

You are working as the system administrator at the Paris branch of Red Sky IT Systems. You have created an Active Directory forest in your organization. You have placed the cng created groups and users in specific groups. In addition, you have all the operation master roles Assigned to the first domain controller in the forest and stored the hothouse only global catalog domain controller. Tuy nhin, you are unable to Identify the various groups of users. Which operation do you need to master role transfer, to solve this problem? 1, Domain naming master role 2, Primary Domain Controller (PDC) emulator master role 3, Schema master role 4, the Infrastructure master role You are working as a system administrator at LMN Inc. You have to configure security for multiple computers in one step and ease the task of domain administration. You have configured the security template and now, you want to apply the security. What action will you thc to apply the security? 1, Will Be Applied Security template automatically. 2, Import Security template to a local Group Policy 3, Import Security template to an existing GPO

42

4, Import Security template to a domain controller

43

You are the system administrator at Blue Moon Computers.The IT department are working on the trusted members of the company software. You need to configure security and startup settings for services running on the system from any unauthorized access to Prevent and Severe damage to the software. This lc you to quyt the user or group permissions That is having ownership for the system service. Which do you need security policy to use to perform the given task? 1, System Services policy 2, User rights assignment policy 3, Account lockout policy 4, IP Security Policy Which command-line tool performs a series of tests to quyt the state of network clients? 1, Netdom.exe 2, Nltest.exe 3, Ntfrsutl.exe 4, Netdiag.exe You are a member of network security team Of Your organization. The security administrator wants you to apply the model to the existing network stride and prepare a plan threat model. What is the sequence of Activities of should you follow? 1.1. Threat modeling 2. Threat prediction 3. Threat mitigation 2,1. Threat mitigation 2. Threat modeling 3. Threat prediction 3.1. Threat modeling 2. Threat prediction 3. Threat mitigation 4.1. Threat prediction 2. Threat modeling 3. Threat mitigation

44

45

46

You are a member of the network risk management team of Your organization. Which of the sau Perform Activities of should you before you can manage the Risks? A, Quantitative analysis of Risks 2, Qualitative analysis of Risks 3, Both quantitative and qualitative analysis of Risks 4, Tracking changes in risk conditions John Barrett works as a graphics designer at Good Graphics Inc. John needs to frequently access the Internet to acquire ideas to create new designs. John cng downloads the required files from the Internet. Recently, John has observed he rng Creates files that are deleted during three days the day at the end of the day. John does not allow any other user to access His system and is sure that he is loosing the files because-of some Malicious software. Which of the sau Malicious software can be Responsible for deleting the files on John's system? 1, Trap door 2, Logic Bomb 3, Trojan horse 4, Zombie Steve Irving is working as a security network designer at Smart Software Developers. The company deals in software products, and has its head office at Washington. The company has an existing Windows Server 2003 infrastructure implemented in the network. The management has asked Steve to implement Windows Server 2003 security policy in the network to nhp security to the company network. For this, Steve Decides to implement a risk management strategy in which-he will remove the source of the risk. Which Steve has planned strategy? 1, Transfer 2, Avoid 3, Mitigate 4, Accept

47

48

49

The Blue Moon Computers deals with the computer hardware products. The company has allowed its clients to access the database. Tuy nhin, the organization does not want to expose all the information in the database to the client. Also, the organization wants to give its clients only read permissions. Therefore, the management has appointed designer Donna Bard as a security to secure the access to the database of the organization. Donna is instructed to take care that only authenticated users have access to the database. She is cng required to keep the database of Blue Moon Computers from Malicious users who keep safe th Possible with various passwords to get the correct password.Which mitigation techniques Donna Bard of should use to secure the database? 1, Secure communication and Authorization 2, Authorization and Auditing 3, Authorization, Auditing and Secure communication 4, Least privileges, Auditing and Authentication Don Allen works as a network administrator at the head office of Technology Systems. The company is selling its products through a network of distributors. To reduce the cost of selling computer parts, the company Decides to directly sell the parts to the end user computer through an e-commerce Web site.The e-commerce Web site is hosted at the company's Web server at Atlanta. In order to purchase a product from the Web site, a user has to register with the Web site Itself. The company wants to secure the network and Identify the security threats to the various resources of the network.Therefore, Don is required to plan the management of risk to an asset, m risk management strategy includes creating and contingency plans. Don has calculated that ALE of a risk to an asset is more coal the value of the asset. Now, he wants to apply a strategy to mitigate the risk. Which Don Allen of should implement strategy? 1, Mitigate 2, Accept 3, Avoid

50

4, Transfer

51

The Technology Systems wants to Identify the threats to network security in order to protect its network from hackers.The company has noticed some Malicious operations in the network. The company has implemented threat modeling, m Systematic provides a methodology to Recognize and categorize threats theo h impact on network security. Jim Lewis, a security designer has been Assigned the task to verify and collect the information regarding the stage in m the attacker is still performing. Jim has collected the information rng Trying to retrieve the attackers are information about the ports and devices of the organization That Are accessible remotely. The attackers are cng th Identify the security vulnerabilities in the network. Jim has Informed the company about the stage of the threat. Now, the company wants to counter the threat using Security Measures. In Which stage of the threat of should the company implement the Security Measures? 1, Elevation of privilege 2, Footprint 3, Penetration 4, Cover-up

52

The Blue Moon Computers wants to nhp security to the network from the Malicious users and hackers. The company has Identified security threats and created a team to analyze the threats. The company wants to implement a proper strategy to manage Risks to network security to avoid losses due to the Risks. Before creating a risk management strategy, all the assets task of network are Identified and secured properly. The company has appointed Jim Lewis to perform the task of managing your risk, involves performing qualitative and quantitative m analysis of Risks. Jim has calculated the ALE of a risk to an asset and compared it with the value of the asset. Now, after quantitative analysis he is required to plan the management of the risk. Therefore, Jim Lewis has used Antivirus software to protect the asset. Which strategy did Jim Lewis apply to manage the risk?

1, Transfer 2, Mitigate 3, Avoid 4, Accept 53 You are auditing Configuring audit of the CA using CA properties page. Which option of should you enable managers to set restrictions on the certificate? 1, Issue and manage certificate requests 2, Change security settings CA 3, Change CA configuration 4, Start and stop Certificate Services Consider the sau statements: Statement A: Root Enterprise CA is integrated with Active Directory. Statement B: Subordinate Enterprise CA can be installed on Windows Server 2003 or Windows Server 2000 server That is a member of the Active Directory domain.

54

Which of the sau about the above statements is true? 1, A and B Both statements are correct. 2, A and B Both statements are incorrect. 3, Statement A statement is correct while B is incorrect. 4, Statement A statement is incorrect while B is correct. 55 You are the CA administrator of Your organization. Which of the sau are your responsibilities: Renewing certificates. Reactivating certificates placed on hold. Approving and denying Enrolment certificate request. 1.1 and 2 2.2 and 3 3.1 and 3 4.1, 2, and 3 56 Consider the sau statements: Statement A: A certificate can not be Revoked before the end of its validity period. Statement B: CRL includes policies for revocation of certificates.

Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct.

57

Corrine Wallace is working as the Network Administrator at Blue Moon Computers. Corrine has configured a Windows Server 2003 based LAN and has implemented security mechanisms to secure the LAN. Corrine needs to update the network security to keep it secure against network security threats. Corrine needs to deploy security patches using Security Update Services (SUS) server. Corrine needs to design the security update strategy to secure the SUS server. For this, Corrine has identified the changes that require updating the security of the LAN. What should Corrine do to design the security update strategy? 1,Use Automatic Update 2,Use Group Policy 3,Use custom scripts 4,Use Windows Update Which of the sub sau is an IPSec protocol for Providing data integrity? 1, the Kerberos Protocol 2, the Authentication Header 3, the IPSec Key Exchange 4, Encapsulating Security Protocol Which of the protocols can be used to sau nhp data integrity? 1, AH 2, ESP 3, MD5 4, IP Which of the protocols of should be used if sau Highest level of security is required for a VPN connection? 1, the UDP 2, L2TP/IPSec 3, PPTP 4, PPP

58

59

60

61

You are the network administrator of Your organization. The organization is on its Implementing 802.1x wireless network standard. Which of the sau infrastructure changes required could be, and why? 1, Upgradation of wireless network adapter to enable 802.1x authentication standard. 2, PKI implementation to nhp mutual authentication using PEAP-EAP. 3, Uninstallation of PKI is sufficient because-standard 802.1x authentication to RADIUS server to nhp clients. 4, Configure remote access policies on the RADIUS server to authenticate against Active Directory clients. Consider the sau statements: Statement A: 802.11a has a connection speed up to 54 Mbps and radio frequency of 2.4 GHz. Statement B: 802.11b has a connection speed up to 54 Mbps and radio frequency of 5 GHz.

62

Which of the sau about the above statements is true? 1, A and B Both statements are correct. 2, A and B Both statements are incorrect. 3, Statement A statement is correct while B is incorrect. 4, Statement A statement is incorrect while B is correct. 63 Consider the sau statements: Statement A: 802.11i uses Wired Equivalent Privacy protocol for data encryption. Statement B: 802.11i uses Extensible Authentication Protocol for authentication data.

Which of the sau about the above statements is true? 1, A and B Both statements are correct. 2, A and B Both statements are incorrect. 3, Statement A statement is correct while B is incorrect. 4, Statement A statement is incorrect while B is correct.

64

Jim Lewis, the Network Administrator at Global Systems Inc.has set up a wireless communication network to facilitate the organization and its clients the between the. The wireless network was set up using the 802.11a standard and it was efficiently supporting the communication needs. Recently, the company has observed that data is being modified during three days Confidential transmission. Therefore, Jim needs to implement enhanced encryption and authentication techniques in the wireless network. How can Jim Perform this task? 1, Using 802.1x protocol. 2, Deploying firewall on wireless client computers. 3, Using WiFi Protected Access. 4, Using baseline security templates. Tom works as the Network Administrator at Blue Moon Computers. Tom needs to set up a wireless network, Which has a connection speed of 54 mega bits per second (Mbps).The wireless network of should support a radio frequency of 2.4 giga hertz (GHz). Also Tom is required to nhp security to the wireless network authentication and encryption features by Providing in the above network. Which standard of should Tom use to set up the wireless network? 1, Use 802.1x standard 2, Use standard 802.11b 3, Use standard 802.11g 4, Use 802.11i standard

65

66

David is appointed as the System Administrator in Global Systems Inc., M an international call center. The call center employees of the need to frequently exchange data with the Customers. David needs to set up a wireless network to facilitate the exchange of data. It is required rng wireless network connection has a speed of 54 mega bits per second (Mbps) and supports a radio frequency of 2.4 gigahertz (GHz). David cng needs to use Temporal Key Integrity Protocol (TKIP) and Extensible Authentication Protocol (EAP). What will you meet the requirements of due to Global Computers Ltd? 1, Use WiFi Protected Access (WPA) 2, Use shared key authentication 3, Use open system authentication 4, Use Wired Equivalent Privacy (WEP) Ed Young is working as the Network Engineer at the New York branch of Red Sky IT Systems. The organization has recently established another branch at Chicago. The employees of both the branches need to exchange data frequently. Therefore, the management has asked Ed Young to establish a wireless network. Ed Young has implemented a wireless network in order to meet the business requirements of Red Sky IT Systems. Ed Young has used the 802.11a standard to set up the wireless network and the employees were able to exchange data efficiently. However, recently the employees have they are receiving corrupted data. What can be the possible reason? 1,EAP-TLS protocols were not used to implement the wireless network. 2,An unauthorized user has gained access to the access point. 3,The 802.11a standard does not ensure security of data. 4,The signals are transmitted in all directions in wireless networks.

67

68

Which of the following servers is used to resolve NetBIOS names to their corresponding IP addresses? 1,DHCP 2,WINS 3,DNS 4,IAS Which of the following is a predefined security template provided by Windows Server 2003? 1,Root.inf 2,Secure.inf 3,Hisecws.inf 4,Compat.inf server can be configured as RADIUS server, RADIUS proxy, or both. 1,IIS 2,IAS 3,DNS 4,WINS Security templates can be used to define which of the following security settings in a GPO? 1,Server 2,System root 3,Domain Controller 4,Event log

69

70

71

72

BlueVelly Inc. publishes computer and IT related books and has its head office at Chicago. The company also sells the books through a network of distributors. The CEO of the company John Major wants to reduce advertisement costs by using an e-commerce Web site. John has Chris, the Web administrator, to design an e-commerce Web site and host it on the IIS Web server at Chicago. John has also asked Chris to ensure that only registered users are allowed to buy the books from the Web site and Active Directory accounts are available for all the users in the Active Directory database. Which type of mapping should Chris use to meet the requirements mentioned by the CEO? 1,IIS Mapping 2,DS Mapping 3,One-to-One Mapping 4,Many-to-One Mapping Red Sky IT Systems has launched an e-commerce Web site to increase the sales of computer parts. The Web site is hosted on Internet Information Server (IIS) at the head office at Atlanta. It displays all the information related to the computer parts, such as product name, price, and model name. Chris, the Web Administrator at Red Sky IT Systems has also installed various Web applications on the IIS server. Chris needs to secure these Web applications. Chris has already designed the strategies to monitor the IIS server. What should Chris do next in order to secure the Web applications and control access to the IIS server? 1,Create a baseline security for the IIS server 2,Use IPSec 3,Use SSL 4,Manage IIS specific logs

73

74

Jim Lewis is working as the senior Network Administrator at PQR Chemicals Inc, USA. The organization has decided to collaborate with AB Pharma Ltd, England to do research and development. Both the organizations need to access common folders on the network. Jim Lewis needs to identify a method to make the users of both the organizations accountable for the data they are accessing and keep a record of all the users accessing the data. Which is the ideal authentication method to perform the task? 1,SSL and User Certificates 2,SSL and VPN 3,SSL and IPSec 4,IPSec and User Certificates James works as a Network Administrator at RedSky Inc. The organization has a LAN, which is configured using Windows Server 2003 operating system. James has created a Web site for his organization that runs on an IIS server. The management has planned to display confidential information on the organization's Web site. Therefore, James needs to identify the users visiting the Web site using Kerberos authentication. How can James perform this task? 1,Using the anonymous authentication method 2,Using the Windows integrated authentication method 3,Using the SSL authentication method 4,Using the basic authentication method Larry Williams is the System Administrator at Supersoft2000, which is working on a confidential project. The LAN of the company is based on Windows Server 2003 platform and is not fully secure. The company has asked Larry to ensure that only authorized users are permitted to access the files and folders. Therefore, Larry needs to design an access control model. He also needs to ensure that all the files contained in the My Documents folder of the users have the same permissions as that of the My Documents folder. Which principle should Larry use to perform this task? 1,Discretionary access control 2,Administrative privileges

75

76

3,Inheritance of permissions 4,User-based authentication

77

Ed Young is working as the System Administrator at Blue Moon Computers. The company has asked him to take regular backup of the files and folder created by the users. Ed Young has configured a file server to implement the backup and recovery operations efficiently. He also needs to store encrypted files on the file server to provide data security. Ed Young needs to design server side storage for EFS to store encrypted files on the file server. While designing the server side storage for EFS, which aspect should Ed Young consider? 1,Using local profile on the server 2,Securing data transport 3,Securing back-up data media 4,Designing backup and recovery procedures Global Systems Inc.has recently set up three new departments, including Sales, Marketing, and IT. The organization has a LAN, which is based on Windows Server 2003 platform. All the computers in the LAN are a part of an Active Directory domain. Jim Lewis, the Domain Administrator, at Global Systems Inc., has delegated administrative rights to the system administrators of the existing departments. He needs to delegate the administrative rights to the system administrators of the newly set up departments. How should Jim begin assigning the administrative duties? 1,By creating organizational units for the newly set up departments using Active Directory Domains and Trusts console. 2,By creating organizational units for the newly set up

78

departments using Active Directory Users and Computers console. 3,By delegating the administrative duties to the system administrators of the newly set up departments using Active Directory Users and Computers console. 4,By delegating the administrative duties to the system administrators of the newly set up departments using Delegation of Control Wizard.

79

Steve Irving, the Domain Administrator, at Red Sky IT Systems, needs to assign the administrative duties to the system administrators of the newly set up departments, including Sales, Marketing, and IT. Steve has created Organizational Units (OUs) for the newly set up departments. He has selected some users and he needs to enable these users to access and control Active Directory objects. What step should Steve perform next in order to enable the selected users to access and control Active Directory objects? 1,Create customized consoles for the selected users. 2,Design object permission structure for the newly formed OUs. 3,Design permissions for the Active Directory objects. 4,Identify the groups that the selected users belong to. You are working as the System Administrator at Safest Software Co. You have configured an Active Directory domain in your organization using a single domain controller. You have implemented auditing on the domain controller to determine whether it is accessed by unauthorized users. However, the performance of the domain controller has degraded. You need to monitor only specific events in order to improve the performance of the domain controller. How can you perform this task? 1,By setting audit policies. 2,By using the Performance console. 3,By using an additional domain controller.

80

4,By auditing object access.

81

You are working as the System Administrator at Global Systems Inc. You have configured a Windows Server 2003 based LAN in your organization. You have also configured an Active Directory domain in the LAN using a single domain controller. You need to manage the users, groups, and the resources attached to the domain controller. How can you perform this task? 1,By setting audit policies 2,By delegating control 3,By using an object-based security model. 4,By designing object permission structure

Q7 MMS Network (Microsoft) Review No. A Question You are the system administrator at Blue Sky Ltd. You manage a growing enterprise network running on Microsoft Windows Server 2003. To keep up with the growth, you increase the number of domain controllers and update the bridgehead server list. After designing the bandwidth requirements, you begin to plan your site boundaries. You need to decide whether to establish a single site or multiple site. What properties would lead you to choose multiple sites for this situation? 1,You need all the replication on your network to occur as intrasite replication. 2,You need simple replication management for your subnet. 3,You need fastest directory updates between all the domain controllers. 4,You need granular replication control for your WAN network. Wilson is the network administrator at Red Cosmetics. The domain has domain controllers running Windows Server 2003. Wilson is planning to place global catalogs so that they are used optimally. During the bandwidth analysis, Wilson notices a trend in global catalog network traffic. What type of global catalog network traffic will Wilson predict to use more network resources than other types of global network traffic? 1,Network traffic related to UPN authentication. 2,Network traffic related to user searches for directory information throughout a forest. 3,Network traffic related to global catalog directory replication. 4,Network traffic related to global catalog queries.

Helen is working as a system administrator at IBG Inc. You have recently installed Windows Server 2003 and have configured Active Directory in the network of the organization. In the network, Helen has created a domain for the accounts department. Helen needs to manage the access of the domain. Which service does Helen need to implement to perform the task? 1,Event Viewer console 2,Access Control Lists 3,Service Management 4,Transitive trust Which component of the Active Directory infrastructure provides universal group membership information to a domain controller when the user logs on to the network? 1,Domain controller 2,Global catalog 3,Tree root domain 4,Forest root domain Which is the third stage involved in the process of creating the Active Directory infrastructure design? 1,Creating a site topology plan 2,Creating a forest plan 3,Creating a domain plan 4,Creating an OU plan What will be the first step in the design process for collecting the design tools? 1,Analyzing the requirements 2,Gathering the design team 3,Building a design based on the requirements 4,Testing the design

Which is the third step in creating a site topology plan? 1,Defining sites 2,Defining the replication plan 3,Deciding the placement of domain controllers 4,Placing the global catalog servers in a forest Consider the statements: Statement A: The domains, belonging to different trees in a forest, work independently. Statement B: Forest enables communication between the domains of different trees. Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false.

Which tab in the Properties dialog box enables you to change the default name of the package and specify a support Uniform Resource Locator (URL)? 1,Deployment 2,Upgrades 3,Categories 4,General Which tool you need to use along with Group Policy to handle software deployment on a large scale with computers running pre-Windows 2000 operating systems? 1,Software Distribution Point (SDP) 2,RSoP 3,SMS 4,Software Installation extension

10

11

Which type of Group Policy settings includes settings to configure user workstation environment and their application settings? 1,Administrative templates 2,Scripts 3,Software Installation 4,Remote installation services You are the system administrator at Blue Moon computers, Dubai. You need to provide a work area to each user where the users can store their files and required software safely. For this, you need to create separate user accounts for each user that would enable the users to log on to the network as well as on local computer to access their resources. Which type of user account would you prefer to create for each user? 1,Domain user account 2,Built-in user account 3,Computer account 4,Local user account You are the system administrator at Global Systems, Texas. The management has called a freelancer accountant named Steve to perform audit operations. You need to provide temporary access to Steve so that she can gain access to network resources. Which type of user account would you prefer to create for Steve? 1,Domain user account 2,Built-in user account 3,Computer account 4,Local user account

12

13

14

Consider the statements: Statement A: Windows Server 2003 never stores local user accounts in the local security database. Statement B: Local user accounts enable the users to log on to a computer and access the resources only from the computer on which their account is created. Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false.

15

You are the system administrator at PQR Corp. You want to create and manage user accounts using the command-line tool, Ldifde. You include the command for running the Ldifde tool in a Notepad file and save the file with .LDF extension. The syntax of the Ldifde command is: dn: cn = container name, ou= organizational unit, dc= root domain changeType: Add objectClass: user sAMAccountName: username UserPrincipalName: username including the path of user's container displayName: username userAccountControl: value What does dn specify in the above syntax of the Ldifde

command? 1,Specifies the type of object to be created. 2,Specifies the username along with the location of the account. 3,Specifies adding of a new user account in the Users container. 4,Specifies the path to an object's container.

16

Which operations master role enables a domain controller to add and remove application directory partitions from the forests? 1,Infrastructure master role 2,Primary Domain Controller (PDC) emulator role 3,Relative Identifier (RID) master role 4,Domain naming master role Identify the Microsoft Management Console (MMC) that performs the function of RID master role. 1,Active Directory Schema 2,Active Directory Domains and Trusts 3,Active Directory Users and Computers 4,Active Directory Sites and Services Which tool provided by Windows Server 2003 allows you to transfer and seize the operation master role? 1,Ntdsutil 2,Nltest 3,Dcdiag 4,Gpupdate

17

18

19

The failure of which master prevents you from making changes in your password? 1,Domain naming master 2,RID master 3,Infrastructure master 4,PDC emulator master Which Active Directory System Monitor counter specifies the original size of inbound compressed replication data in bytes? 1,DRA Inbound Bytes Not Compressed (Within site)/sec 2,DRA Inbound Bytes total/sec 3,DRA Inbound Bytes Compressed (Between sites, before compression)/sec 4,DRA Outbound Bytes Compressed (Between sites, after compression)/sec Which Active Directory System Monitor counter specifies the number of synchronization requests made to replication partners? 1,LDAP Client Sessions 2,DRA Sync Requests Made 3,DRA Outbound Objects/sec 4,DRA Outbound Bytes Total/sec Which Active Directory System Monitor counter specifies the number of objects replicated out per second? 1 ,DRA Outbound Objects/sec 2,LDAP Client Sessions 3,DRA Outbound Bytes Total/sec 4,DRA Inbound Bytes total/sec

20

21

22

23

Which Active Directory System Monitor counters display the total numbers of bytes or objects processed per second? 1,Ratio counters Hen, sui: 2,Statistic counters 3,Performance counters

4,Accumulative counters

24

Which Active Directory System Monitor counter specifies the inbound replication data in bytes that were not compressed at the other DSA in same site? Coi lai, 1,DRA Inbound Bytes Not Compressed (Within site)/sec 2,DRA Inbound Bytes total/sec 3,DRA Outbound Bytes Total/sec 4,DRA Outbound Objects/sec Consider the statements: Statement A: The dcdiag.exe command enables you to view or modify the ACLs of Active Directory objects. Statement B: The dsastat.exe command enables you to compare the naming contexts on different domain controllers. It also enables you to identify the differences between naming contexts on domain controllers. Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false.

25

26

Ron Floyd is working as a network administrator at Global Systems, Inc. Ron has implemented Active Directory infrastructure in the network. Due to the large volume of data, Server03 is running low on hard disk space. Ron does not have additional hard disks to install on the server. David Wong, the head of the Marketing department needs to store some important data on the server urgently. David complains that he is unable to store the important data on the server. Which option can Ron use to help David in saving the data on the server? 1,Delete the files of other users from the server 2,Install other hard disks on the server 3,Format the drive to create space 4,Perform offline compaction of the Active Directory database Perfect Watch Co. is a watch manufacturing company with three business locations: Chicago, Washington, and New York. You are the network consultant and Ron Floyd is the assistant network consultant at the Washington office. The network in the company is using Windows Server 2003 Active Directory services. You ask Ron to raise the functional level of a forest in the network. When trying to raise the functional level of the forest, Ron receives an error message. Ron asks you to help him troubleshoot the problem occurring while raising the functional level of the forest. What should be ensured to raise the functional level of the forest? 1,Global catalog for each domain controller is enabled 2,Domain controllers are running Windows 2000 Server 3,Universal group membership caching is enabled 4,Domain functional level of the domain controllers is Windows Server 2003

27

28

Corrine Wallace is working as a network consultant at Mastery Mechanics. Mastery Mechanics is an auto parts manufacturing company with a large network spanning across three cities: New York, Atlanta, and Chicago. The company has a network that is using Windows Server 2003 Active Directory services. Three days ago, Corrine performed Active Directory database compaction to save hard disk space. Mary Peterson, the head of the Sales department complains that the database transaction is taking more time than earlier for the last three days. What can Corrine do to decrease the database transaction time? 1,Demote the server and then promote it using the Dcpromo.exe command 2,Restore computer files and settings 3,Restore the Active Directory database 4,Format the server hard disk and configure Windows Server 2003 Active Directory on the server You are working as a network administrator and Jerry Smith is working as assistant network administrator at Homelike hospital Ltd. The hospital has its head office at San Francisco and has its branch offices at Atlanta and Denver. The hospital has a large network consisting of 300 computers. The management has asked you to implement Windows Server 2003 Active Directory infrastructure in the network. After you have implemented Active Directory in the network, the users are facing connectivity problems. Jerry tells you that the problems are occurring while registering with DNS service. Jerry asks you to identify the cause of the connectivity problems. What is the cause of connectivity problems in the network? 1,Folders are not redirected 2,Database is corrupt 3 ,DNS service is not working properl y 4 ,DNS record is deleted

29

30

Technology Systems is an IT enabled services provider company with its head office at Chicago. The company has two branch offices at Atlanta and Denver. You are working as a network engineer and Christine Turner is working as an assistant network engineer at the Chicago office. Due to some hardware problem, Christine could not back up the data stored on the server and had to format Server2. An error message appears indicating that Server2 already exists when Christine tries to install a domain controller to replace Server2. Which command would help Christine to remove the references of Server2 from other domain controllers in the network? 1 ,ADSIEdit.msc and Dnsmgmt.msc 2,Netdom.exe and Ntdsutil.exe 3,Movetree.exe and ADSIEdit.msc 4,Netdiag.exe and Ntdsutil.exe NS Toys is a toy manufacturing company with three business locations: Las Vegas, Chicago, and Los Angeles. Chris Donaldson is working as an assistant network administrator at the Los Angeles office of NS Toys. You are working as a network administrator at the head office at Las Vegas. The DC05 domain controller at the Los Angeles office had a power failure and has lost data stored in it. Chris wants to restore System State but he does not know how to restore System State. Therefore, Chris asks you to help him perform System State restore. What do you suggest Chris to fix the problem? 1,Perform authoritative System State restore from other domain controller in the network 2,Perform authoritative System State restore locally 3,Perform non-authoritative System State restore remotely 4,Perform non-authoritative System State restore locally

31

32

AB Corp. is a computer manufacturing company with its head office at Chicago. Pat Greene is working as a network consultant in the company. The company has three departments: Sales, Purchase, and Manufacturing. These three departments are under separate OUs in the forest. As the company has reorganized employees across the departments, the user accounts from different OUs are transferred under different OUs. The users are complaining that they are unable to find their document folders on the network after the reorganization. What is the possible cause of the problem? 1,GPOs for the new OUs do not contain the updated information about folder redirection 2,Users forgot to transfer their data from the old computers to the new computers 3,Users' computers have been formatted 4,Domain controllers have been changed You are working as the system administrator at the Chicago branch of Blue Valley Consulting. You have created an Active Directory forest in your organization. You have also assigned operation master roles to a domain controller in the forest to ensure that the Active Directory performs single master replication. However, the employees of your company are complaining that they are unable to change their passwords after logging on to their domains. How can you solve this problem? 1,By changing the domain naming master role assignment. 2,By changing the Primary Domain Controller (PDC) emulator role assignment. 3,By changing the Relative Identifier (RID) master role assignment. 4,By using the Active Directory Users and Computers console.

33

34

Which parameter of the repadmin.exe command enables you to specify a user as the administrator? 1,pw:{password|*} 2,/ldap 3,/rpc Hen, sui: 4,/u: domain\user Ken Burton is the system administrator at the Atlanta branch of Global Systems Inc. The company has another office at New York. Ken has configured intersite replication between the two offices, but now he observes that the domain directory partition is not being replicated to all domain controllers. Therefore, Ken needs to detect the replication partner that has failed. John also needs to regenerate the replication topology. Which console should Ken use to perform these tasks? 1,Active Directory Replication Monitor console 2,Active Directory Sites and Services console 3,Active Directory Domains and Trusts console 4,Event Viewer console You are the system administrator at Red Sky. You have decided to move database of 2500 user accounts to Active Directory. You have created a single domain structure for the company. The company needs to structure objects in the domain. To begin, you are planning to create the smallest structure to which GPO can be applied or over which administrative authority can be delegated. What specific structure would your plan propose in the given problem? 1,An administrative model 2,A domain 3,A subnet 4,An OU hierarchy

35

36

37

You are the system administrator at Smart Software Developers. You want to promote member server to domain controller. Which security template do you need to modify? 1,Default security settings (Setup security.inf) 2,Default security settings updated for domain controllers (DC security.inf) 3,Highly secure domain controller security settings (Hisecws.inf) 4,Secure domain controller security settings (Securedc.inf) You are the system administrator at Countrywide markets. The members of the IT department need to access floppy drives and CD-Rom for storing and retrieving data. This access can spread virus and worm on the network that can cause severe damage to the trusted software of the company. You are assigned the responsibility to implement a security policy to prevent all the computers over the network from virus attack by enabling or disabling the security settings on the centrally managed computer. What security do you need to use to perform the given task? 1,Audit policy 2,Account lockout policy 3,Password policy 4,Security options Which command-line tool enables you to create active directory user objects on computers, which are running Windows Server 2003? 1,Netdiag.exe 2,Ntfrsutl.exe 3,Ldifde.exe 4,Dcdiag.exe

38

39

40

You are working as a system administrator at Countryside Markets. The management has asked you to centralize the network administration in the organization. To centralize the network administration for Countryside Markets, you have implemented Windows Server 2003 Active Directory infrastructure in the network. Now, employees are complaining that they are facing connectivity problems. You notice that the problems are occurring while registering with DNS service. What can be the possible cause of the problem? 1,Active Directory database is corrupt 2,DNS record not exist 3,Active Directory database size has increased 4,Folders are not redirected

41

You are working as the system administrator at the Paris branch of Red Sky IT Systems. You have created an Active Directory forest in your organization. You have also created groups and placed the users in specific groups. In addition, you have assigned all the operation master roles to the first domain controller in the forest and stored the global catalog only on that domain controller. However, you are unable to identify the groups of various users. Which operation master role do you need to transfer, to solve this problem? 1,Domain naming master role 2,Primary Domain Controller (PDC) emulator master role 3,Schema master role 4,Infrastructure master role You are working as a system administrator at LMN Inc. You have to configure security for multiple computers in one step and ease the task of domain administration. You have configured the security template and now, you want to apply the security. What action will you perform to apply the security? 1,Security template will be applied automatically. 2,Import Security template to a local Group Policy 3,Import Security template to an existing GPO

42

4,Import Security template to a domain controller

43

You are the system administrator at Blue Moon Computers. The IT department members are working on the trusted software of the company. You need to configure security and startup settings for services running on the system to prevent from any unauthorized access and severe damage to the software. This enables you to determine the user or group that is having ownership permission for the system service. Which security policy do you need to use to perform the given task? 1,System Services policy 2,User rights assignment policy 3,Account lockout policy 4,IP Security Policy Which command-line tool performs a series of tests to determine the state of network clients? 1,Netdom.exe 2,Nltest.exe 3,Ntfrsutl.exe 4,Netdiag.exe You are a member of network security team of your organization. The security administrator wants you to apply STRIDE model to the existing network and prepare a threat model plan. What is the sequence of activities you should follow? 1,1. Threat modeling 2. Threat prediction 3. Threat mitigation 2,1. Threat mitigation 2. Threat modeling 3. Threat prediction 3,1. Threat modeling 2. Threat prediction 3. Threat mitigation 4,1. Threat prediction 2. Threat modeling 3. Threat mitigation

44

45

46

You are a member of the network risk management team of your organization. Which of the following activities should you perform before you can manage the risks? 1,Quantitative analysis of risks 2,Qualitative analysis of risks 3,Both quantitative and qualitative analysis of risks 4,Tracking changes in risk conditions John Barrett works as a graphics designer at Good Graphics Inc. John needs to frequently access the Internet to acquire ideas to create new designs. John also downloads the required files from the Internet. Recently, John has observed that the files that he creates during the day are deleted at the end of the day. John does not allow any other user to access his system and is sure that he is loosing the files because of some malicious software. Which of the following malicious software can be responsible for deleting the files on John's system? 1,Trap door 2,Logic bomb 3,Trojan horse 4,Zombie Steve Irving is working as a network security designer at Smart Software Developers. The company deals in software products, and has its head office at Washington. The company has an existing Windows Server 2003 infrastructure implemented in the network. The management has asked Steve to implement Windows Server 2003 security policy in the network to provide security to the company network. For this, Steve decides to implement a risk management strategy in which he will remove the source of the risk. Which strategy has Steve planned? 1,Transfer 2,Avoid 3,Mitigate 4,Accept

47

48

49

The Blue Moon Computers deals with the computer hardware products. The company has allowed its clients to access the database. However, the organization does not want to expose all the information in the database to the client. Also, the organization wants to give its clients only read permissions. Therefore, the management has appointed Donna Bard as a security designer to secure the access to the database of the organization. Donna is instructed to take care that only authenticated users have access to the database. She is also required to keep the database of Blue Moon Computers safe from malicious users who keep trying with various possible passwords to get the correct password. Which mitigation techniques should Donna Bard use to secure the database? 1,Secure communication and Authorization 2,Authorization and Auditing 3,Authorization, Auditing and Secure communication 4,Least privileges, Auditing and Authentication Don Allen works as a network administrator at the head office of Technology Systems. The company is selling its products through a network of distributors. To reduce the cost of selling computer parts, the company decides to directly sell the computer parts to the end user through an e-commerce Web site. The e-commerce Web site is hosted at the company's Web server at Atlanta. In order to purchase a product from the Web site, a user has to register itself with the Web site. The company wants to secure the network and identify the security threats to the various resources of the network. Therefore, Don is required to plan the management of risk to an asset, which includes creating risk management strategy and contingency plans. Don has calculated that ALE of a risk to an asset is more than the value of the asset. Now, he wants to apply a strategy to mitigate the risk. Which strategy should Don Allen implement? 1,Mitigate 2,Accept 3,Avoid 4,Transfer

50

51

The Technology Systems wants to identify the threats to network security in order to protect its network from hackers. The company has noticed some malicious operations in the network. The company has implemented threat modeling, which provides a systematic methodology to recognize and categorize threats according to their impact on network security. Jim Lewis, a security designer has been assigned the task to verify and collect the information regarding the stage in which the attacker is still performing. Jim has collected the information that the attackers are trying to retrieve the information about the ports and devices of the organization that are accessible remotely. The attackers are also trying to identify the vulnerabilities in the network security. Jim has informed the company about the stage of the threat. Now, the company wants to counter the threat using security measures. In which stage of the threat should the company implement the security measures? 1,Elevation of privilege 2,Footprint 3,Penetration 4,Cover-up The Blue Moon Computers wants to provide security to the network from the malicious users and hackers. The company has identified security threats and created a team to analyze the threats. The company wants to implement a proper strategy to manage risks to network security to avoid losses due to the risks. Before creating a risk management strategy, all the assets of network are identified and secured properly. The company has appointed Jim Lewis to perform the task of managing risk, which involves performing qualitative and quantitative analysis of risks. Jim has calculated the ALE of a risk to an asset and compared it with the value of the asset. Now, after quantitative analysis he is required to plan the management of the risk. Therefore, Jim Lewis has used Antivirus software to protect the asset. Which strategy did Jim Lewis apply to manage the risk?

52

1,Transfer 2,Mitigate 3,Avoid 4,Accept

53

You are configuring auditing of the CA using CA audit properties page. Which option should you enable to set restrictions on certificate managers? 1,Issue and manage certificate requests 2,Change CA security settings 3,Change CA configuration 4,Start and stop certificate services Consider the following statements: Statement A: Root enterprise CA is integrated with Active Directory. Statement B: Subordinate enterprise CA can be installed on Windows Server 2003 or Windows Server 2000 server that is a member of the Active Directory domain.

54

Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct.

55

You are the CA administrator of your organization. Which of the following are your responsibilities: Renewing certificates. Reactivating certificates placed on hold. Approving and denying certificate enrolment request. 1,1 and 2 2,2 and 3 3,1 and 3 4,1, 2, and 3

56

Consider the following statements: Statement A: A certificate cannot be revoked before the end of its validity period. Statement B: CRL includes policies for revocation of certificates.

Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct.

57

Corrine Wallace is working as the Network Administrator at Blue Moon Computers. Corrine has configured a Windows Server 2003 based LAN and has implemented security mechanisms to secure the LAN. Corrine needs to update the network security to keep it secure against network security threats. Corrine needs to deploy security patches using Security Update Services (SUS) server. Corrine needs to design the security update strategy to secure the SUS server. For this, Corrine has identified the changes that require updating the security of the LAN. What should Corrine do to design the security update strategy? 1,Use Automatic Update 2,Use Group Policy 3,Use custom scripts 4,Use Windows Update Which of the following is an IPSec sub protocol for providing data integrity? 1,Kerberos Protocol 2,Authentication Header 3,IPSec Key Exchange 4,Encapsulating Security Protocol Which of the following protocols can be used to provide data integrity? 1,AH 2,ESP 3,MD5 4,IP Which of the following protocols should be used if highest level of security is required for a VPN connection? 1,UDP 2,L2TP/IPSec 3,PPTP 4,PPP

58

59

60

61

You are the network administrator of your organization. The organization is implementing 802.1x standard on its wireless network. Which of the following infrastructure changes could be required, and why? 1,Upgradation of wireless network adaptor to enable 802.1x authentication standard. 2,PKI implementation to provide mutual authentication using PEAP-EAP. 3,Uninstallation of PKI because 802.1x standard is sufficient to provide authentication to RADIUS server clients. 4,Configure remote access policies on RADIUS server to authenticate clients against Active Directory. Consider the following statements: Statement A: 802.11a has a connection speed up to 54 Mbps and radio frequency of 2.4 GHz. Statement B: 802.11b has a connection speed up to 54 Mbps and radio frequency of 5 GHz.

62

Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct. 63 Consider the following statements: Statement A: 802.11i uses Wired Equivalent Privacy protocol for data encryption. Statement B: 802.11i uses Extensible Authentication Protocol for data authentication.

Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct.

64

Jim Lewis, the Network Administrator at Global Systems Inc. has set up a wireless network to facilitate the communication between the organization and its clients. The wireless network was set up using the 802.11a standard and it was efficiently supporting the communication needs. Recently, the company has observed that confidential data is being modified during transmission. Therefore, Jim needs to implement enhanced encryption and authentication techniques in the wireless network. How can Jim perform this task? 1,Using 802.1x protocol. 2,Deploying firewall on wireless client computers. 3,Using WiFi Protected Access. 4,Using baseline security templates. Tom works as the Network Administrator at Blue Moon Computers. Tom needs to set up a wireless network, which has a connection speed of 54 mega bits per second (Mbps). The wireless network should support a radio frequency of 2.4 giga hertz (GHz). Tom is also required to provide security to the wireless network by providing authentication and encryption features in the above network. Which standard should Tom use to set up the wireless network? 1,Use 802.1x standard 2,Use 802.11b standard 3,Use 802.11g standard 4,Use 802.11i standard

65

66

David is appointed as the System Administrator in Global Systems Inc., which is an international call center. The employees of the call center need to frequently exchange data with the customers. David needs to set up a wireless network to facilitate the exchange of data. It is required that the wireless network has a connection speed of 54 mega bits per second (Mbps) and supports a radio frequency of 2.4 gigahertz (GHz). David also needs to use Temporal Key Integrity Protocol (TKIP) and Extensible Authentication Protocol (EAP). What will you do to meet the requirements of Global Computers Ltd? 1,Use WiFi Protected Access (WPA) 2,Use shared key authentication 3,Use open system authentication 4,Use Wired Equivalent Privacy (WEP) Ed Young is working as the Network Engineer at the New York branch of Red Sky IT Systems. The organization has recently established another branch at Chicago. The employees of both the branches need to exchange data frequently. Therefore, the management has asked Ed Young to establish a wireless network. Ed Young has implemented a wireless network in order to meet the business requirements of Red Sky IT Systems. Ed Young has used the 802.11a standard to set up the wireless network and the employees were able to exchange data efficiently. However, recently the employees have they are receiving corrupted data. What can be the possible reason? 1,EAP-TLS protocols were not used to implement the wireless network. 2,An unauthorized user has gained access to the access point. 3,The 802.11a standard does not ensure security of data. 4,The signals are transmitted in all directions in wireless networks.

67

68

Which of the following servers is used to resolve NetBIOS names to their corresponding IP addresses? 1,DHCP 2,WINS 3,DNS 4,IAS Which of the following is a predefined security template provided by Windows Server 2003? 1,Root.inf 2,Secure.inf 3,Hisecws.inf 4,Compat.inf server can be configured as RADIUS server, RADIUS proxy, or both. 1,IIS 2,IAS 3,DNS 4,WINS Security templates can be used to define which of the following security settings in a GPO? 1,Server 2,System root 3,Domain Controller 4,Event log

69

70

71

72

BlueVelly Inc. publishes computer and IT related books and has its head office at Chicago. The company also sells the books through a network of distributors. The CEO of the company John Major wants to reduce advertisement costs by using an e-commerce Web site. John has Chris, the Web administrator, to design an e-commerce Web site and host it on the IIS Web server at Chicago. John has also asked Chris to ensure that only registered users are allowed to buy the books from the Web site and Active Directory accounts are available for all the users in the Active Directory database. Which type of mapping should Chris use to meet the requirements mentioned by the CEO? 1,IIS Mapping 2,DS Mapping 3,One-to-One Mapping 4,Many-to-One Mapping Red Sky IT Systems has launched an e-commerce Web site to increase the sales of computer parts. The Web site is hosted on Internet Information Server (IIS) at the head office at Atlanta. It displays all the information related to the computer parts, such as product name, price, and model name. Chris, the Web Administrator at Red Sky IT Systems has also installed various Web applications on the IIS server. Chris needs to secure these Web applications. Chris has already designed the strategies to monitor the IIS server. What should Chris do next in order to secure the Web applications and control access to the IIS server? 1,Create a baseline security for the IIS server 2,Use IPSec 3,Use SSL 4,Manage IIS specific logs

73

74

Jim Lewis is working as the senior Network Administrator at PQR Chemicals Inc, USA. The organization has decided to collaborate with AB Pharma Ltd, England to do research and development. Both the organizations need to access common folders on the network. Jim Lewis needs to identify a method to make the users of both the organizations accountable for the data they are accessing and keep a record of all the users accessing the data. Which is the ideal authentication method to perform the task? 1,SSL and User Certificates 2,SSL and VPN 3,SSL and IPSec 4,IPSec and User Certificates James works as a Network Administrator at RedSky Inc. The organization has a LAN, which is configured using Windows Server 2003 operating system. James has created a Web site for his organization that runs on an IIS server. The management has planned to display confidential information on the organization's Web site. Therefore, James needs to identify the users visiting the Web site using Kerberos authentication. How can James perform this task? 1,Using the anonymous authentication method 2,Using the Windows integrated authentication method 3,Using the SSL authentication method 4,Using the basic authentication method Larry Williams is the System Administrator at Supersoft2000, which is working on a confidential project. The LAN of the company is based on Windows Server 2003 platform and is not fully secure. The company has asked Larry to ensure that only authorized users are permitted to access the files and folders. Therefore, Larry needs to design an access control model. He also needs to ensure that all the files contained in the My Documents folder of the users have the same permissions as that of the My Documents folder. Which principle should Larry use to perform this task? 1,Discretionary access control 2,Administrative privileges

75

76

3,Inheritance of permissions 4,User-based authentication

77

Ed Young is working as the System Administrator at Blue Moon Computers. The company has asked him to take regular backup of the files and folder created by the users. Ed Young has configured a file server to implement the backup and recovery operations efficiently. He also needs to store encrypted files on the file server to provide data security. Ed Young needs to design server side storage for EFS to store encrypted files on the file server. While designing the server side storage for EFS, which aspect should Ed Young consider? 1,Using local profile on the server 2,Securing data transport 3,Securing back-up data media 4,Designing backup and recovery procedures Global Systems Inc.has recently set up three new departments, including Sales, Marketing, and IT. The organization has a LAN, which is based on Windows Server 2003 platform. All the computers in the LAN are a part of an Active Directory domain. Jim Lewis, the Domain Administrator, at Global Systems Inc., has delegated administrative rights to the system administrators of the existing departments. He needs to delegate the administrative rights to the system administrators of the newly set up departments. How should Jim begin assigning the administrative duties? 1,By creating organizational units for the newly set up departments using Active Directory Domains and Trusts console. 2,By creating organizational units for the newly set up

78

departments using Active Directory Users and Computers console. 3,By delegating the administrative duties to the system administrators of the newly set up departments using Active Directory Users and Computers console. 4,By delegating the administrative duties to the system administrators of the newly set up departments using Delegation of Control Wizard.

79

Steve Irving, the Domain Administrator, at Red Sky IT Systems, needs to assign the administrative duties to the system administrators of the newly set up departments, including Sales, Marketing, and IT. Steve has created Organizational Units (OUs) for the newly set up departments. He has selected some users and he needs to enable these users to access and control Active Directory objects. What step should Steve perform next in order to enable the selected users to access and control Active Directory objects? 1,Create customized consoles for the selected users. 2,Design object permission structure for the newly formed OUs. 3,Design permissions for the Active Directory objects. 4,Identify the groups that the selected users belong to. You are working as the System Administrator at Safest Software Co. You have configured an Active Directory domain in your organization using a single domain controller. You have implemented auditing on the domain controller to determine whether it is accessed by unauthorized users. However, the performance of the domain controller has degraded. You need to monitor only specific events in order to improve the performance of the domain controller. How can you perform this task? 1,By setting audit policies. 2,By using the Performance console. 3,By using an additional domain controller.

80

4,By auditing object access.

81

You are working as the System Administrator at Global Systems Inc. You have configured a Windows Server 2003 based LAN in your organization. You have also configured an Active Directory domain in the LAN using a single domain controller. You need to manage the users, groups, and the resources attached to the domain controller. How can you perform this task? 1,By setting audit policies 2,By delegating control 3,By using an object-based security model. 4,By designing object permission structure

QUESTION 1 You are working as the system administrator at the New York branch of Blue Valley Consulting. The company has another office at London where a site has been configured. You have created a site for the New York office to optimize the network traffic. The domain controllers at the two offices contain replicas of directory partitions. You have also configured Active Directory replication between the two sites. Due to this, the replication updates are efficiently exchanged among the domain controllers of the two sites. The company has now asked you to ensure that the domain controllers within your office also receive the replication updates automatically. What should you do to meet the requirement of the company? A. Designate a preferred bridgehead server B. Generate connection objects C. Create a site link bridge D. Configure application directory partition Answer: A

QUESTION 2 You are the system administrator at Countrywide markets. The members of the IT department need to access floppy drives and CD-Rom for storing and retrieving data. This access can spread virus and worm on the network that can cause severe damage to the trusted software of the company. You are assigned the responsibility to implement a security policy to prevent all the computers over the network from virus attack by enabling or disabling the security settings on the centrally managed computer. What security do you need to use to perform the given task? A. Password policy B. Audit policy C. Security options D. Account lockout policy Answer: C QUESTION 3 Which command-line tool enables you to identify the differences between naming contexts on domain controllers? A. Dfsutil.exe B. Sdchek.exe C. Dsastat.exe D. Nltest.exe Answer: C QUESTION 4 Consider the statements: Statement A: The Securedc.inf and Securewc.inf templates are applied during installation of Windows Server 2003. Statement B: The Setup Security.inf template defines the permissions for the root directory of the computer. Which of the following is true, with respect to the above statements? A. Statement A is false and statement B is true. B. Statement A is true and statement B is false. C. Both, statements A and B, are true.

D. Both, statements A and B, are false. Answer: D QUESTION 5 Which Active Directory System Monitor counter specifies the inbound replication data in bytes that were not compressed at the other DSA in same site? A. DRA Inbound Bytes total/sec B. DRA Outbound Objects/sec C. DRA Outbound Bytes Total/sec D. DRA Inbound Bytes Not Compressed (Within site)/sec Answer: D QUESTION 6 The network of your organization has only one domain. Which of the following IIS authentication technique is best suited for it? A. Digest authentication B. Windows integrated authentication C. Basic authentication D. Anonymous authentication Answer: A QUESTION 7 Lee Mitchell is working as the system administrator at the Chicago branch of Red Sky IT Systems. The company has another office at Paris. The LANs at both the offices have a domain controller each, which runs on Windows Server 2003 server platform. Red Sky IT Systems has undertaken a new project, which requires the employees of the two offices to frequently exchange data over the network. Therefore, the company has connected the offices at Chicago and Paris with a fast and reliable link. The company wants Lee to configure the network between the two offices such that the network traffic does not pass through the WAN connections. Which of the following consoles should Lee use to ensure that the WAN connections are not used to exchange business related data?

A. Event Viewer console B. Active Directory Sites and Services C. Active Directory Domains and Trusts D. Active Directory Users and Computers Answer: B QUESTION 8 You are the system administrator at Smart Software Developers. You need to provide a work area to each user where the users can store their files. The employees of Smart Software Developers are not allocated a single computer to work on. They should be able to log in from any computer in the network. Also, they should be able to access the resources of the network to which they belong. The employees also want that the same desktop setting should be retained when they log on from any computer in the network. Which type of account and profile will you create for the employees? A. Domain user account and roaming user profile B. Local user account and local user profile C. Built-in user account and mandatory user profile D. Computer account and roaming user profile Answer: A QUESTION 9 Which tool provided by Windows Server 2003 allows you to transfer and seize the operation master role? A. Ntdsutil B. Dcdiag C. Nltest D. Gpupdate Answer: A QUESTION 10

You are the system administrator at Smart Labs Inc. You need to restrict the access of the file that contains the packaging designs, from the employees of all the units except the Manufacturing unit of Smart Labs. For this, you need to create a group, to assign permissions to gain access to the network resources only by the employees of the Manufacturing unit. Which type of group would you prefer for the? A. Security groups B. Global group C. Distribution groups D. Local group Answer: A QUESTION 11 You are working as a network administrator and Jerry Smith is working as assistant network administrator at Homelike hospital Ltd. The hospital has its head office at San Francisco and has its branch offices at Atlanta and Denver. The hospital has a large network consisting of 300 computers. The management has asked you to implement Windows Server 2003 Active Directory infrastructure in the network. After you have implemented Active Directory in the network, the users are facing connectivity problems. Jerry tells you that the problems are occurring while registering with DNS service. Jerry asks you to identify the cause of the connectivity problems. What is the cause of connectivity problems in the network? A. DNS service is not working properly B. DNS record is deleted C. Folders are not redirected D. Database is corrupt Answer: B QUESTION 12 You are working as the system administrator at the Chicago branch of Red Sky IT Systems. The company has another office at Paris, which contains a domain controller running on Windows Server 2003 platform. Each office contains a domain controller and is connected by private connection with a bandwidth of 128 Kbps. The employees of the two offices frequently exchange data over the network. The company has asked you to optimize the network traffic by configuring sites.However, you are unable to locate the default site object on the Active

Directory Sites and Services console. Which of the following containers in the Active Directory Sites and Services console should you view to locate the default site object? A. Servers B. Subnets C. Inter-Site Transports D. Default-First-Site-Name Answer: D QUESTION 13 You are a member of network security team of your organization. The security administrator wants you to apply STRIDE model to the existing network and prepare a threat model plan. What is the sequence of activities you should follow? A. A. Threat modeling 2. Threat prediction 3. Threat mitigation B. A. Threat mitigation 2. Threat modeling 3. Threat prediction C. A. Threat modeling 2. Threat prediction 3. Threat mitigation D. A. Threat prediction 2. Threat modeling 3. Threat mitigation Answer: D QUESTION 14 Steve Irving is working as the Network Administrator at Red Sky IT Systems. Steve has configured a Windows Server 2003 based LAN and has implemented the network services provided by Windows Server 2003. The IT department is working on a project, which requires frequent creation and deletion of user accounts from the network server. Therefore, Steve has granted administrative rights to some employees of the IT department. Recently, Steve has observed that it has become difficult to manage the network and maintain its security. How can Steve solve this problem? A. By using special administration console. B. By decreasing the number of network resources that can be affected by an administrative attack. C. By using emergency management system components.

D. By securing installation practices on the server. Answer: B QUESTION 15 You are the system administrator at Smart Software Developers. You want to promote member server to domain controller. Which security template do you need to modify? A. Default security settings (Setup security.inf) B. Default security settings updated for domain controllers (DC security.inf) C. Highly secure domain controller security settings (Hisecws.inf) D. Secure domain controller security settings (Securedc.inf) Answer: B QUESTION 16 Corrine Wallace is working as the Network Engineer at the New York branch of Blue Valley Consulting. The organization has recently established another branch at Chicago. The employees of both the branches need to exchange data frequently. Therefore, the management has asked Corrine to establish a wireless network. Corrine has implemented a wireless network in order to meet the business requirements of Blue Valley Consulting. Corrine has used the 802.11b standard to set up the wireless network and the employees were able to exchange data efficiently. The organization has recently hired 100 new employees and has asked Corrine to ensure that the performance of the wireless network does not degrade. Therefore, Corrine has decided to increase the speed of the wireless connection to 54 Mbps. How can Corrine perform this task? A. Configuring the wireless network using the 802.11a standard B. Configuring the wireless network using the 802.11i standard C. Configuring the wireless network using the 802.11x standard D. Using EAP-TLS protocols Answer: A QUESTION 17 Consider the statements: Statement A: Windows Server 2003 never stores local user accounts in the local security database. Statement B: Local user accounts enable the users to log on to a computer and access the resources only from the computer on which their account is created. Which of the following is true, with respect to the above statements?

A. Both, statements A and B, are true. B. Statement A is false and statement B is true. C. Both, statements A and B, are false. D. Statement A is true and statement B is false. Answer: B QUESTION 18 You are the system administrator at Global Systems Inc. The company has offices at Chicago, Atlanta, Europe, and Japan. There are around 1000 employees at each office. You have implemented Active Directory to organize and centrally administer the network resources of all the offices. You have created domains at each office and corresponding Ous within each domain to ease the task of organizing information. However, the information of all the offices needs to be centrally stored at the server located in Chicago. Due to the increased load on the server, the server can crash anytime. For this,You decide to provide fault-tolerance. How will you solve the given problem? A. By delegating the task of network administration to OU administrators within each domain B. By using global catalog server C. By configuring sites D. By configuring additional domain controllers Answer: D QUESTION 19 Global Systems Inc. has two offices, one each at New York and Chicago. You are the assistant system administrator at the Chicago branch and you have configured intersite replication between the two offices. You observe that directory partitions are not being replicated to all domain controllers. Therefore, you need to detect the replication partner that has failed. You also need to view the status of the replicas to troubleshoot the replication problem. In addition, you need to generate status reports of replication between the direct replication partners and transitive replication partners to ensure that the replication process works efficiently in future. How can you perform these tasks? A. Using the Replmon tool B. Using the Repadmin tool

C. Using the Performance console D. Using the Ndsutil tool Answer: A QUESTION 20 You are the system administrator of PQR Inc. In the company, the employees are working in different shifts. Therefore, they are not allocated a permanent computer to do their work. However, the employees want to retain the same desktop settings as they configured previous time. To solve the problem of employees, you want to configure a user profile, which is stored in a shared folder on the domain controller. Which user profile would you prefer to solve the problem of the employees? A. Mandatory user profile B. Roaming user profile C. Local user profile D. Temporary user profile Answer: A QUESTION 21 Consider the statements: Statement A: The Preconfigured MMCs can be shared with network administrators to help them to perform administrative tasks. Statement B: The Preconfigured MMCs can be used to reduce switching among different custom MMCs. Which of the following is true, with respect to the above statements? A. Statement A is true and statement B is false. B. Statement A is false and statement B is true. C. Both, statements A and B, are false. D. Both, statements A and B, are true. Answer: C QUESTION 22

Consider the following statements: Statement A: A malicious user can perform IP spoofing by modifying IP packet header into an Internet transmission. Statement B: A malicious attacker can make the services of an application running on the server unavailable to the clients A. Both statements A and B are correct. B. Both statements A and B are incorrect. C . Statement A is incorrect while statement B is correct. D. Statement A is correct while statement B is incorrect. Answer: C QUESTION 23 Which command-line tool enables you to create active directory user objects on computers, which are running Windows Server 2003? A. Ntfrsutl.exe B. Netdiag.exe C. Ldifde.exe D. Dcdiag.exe Answer: C QUESTION 24 Which of the following servers is used to resolve NetBIOS names to their corresponding IP addresses? A. DNS B. IAS C. DHCP D. WINS Answer: D QUESTION 25 Which is the first step in creating a domain plan? A. Defining the forest root domain

B. Identifying the domain hierarchy and naming domains C. Naming Forest and Trees D . Determining the number of domains Answer: D QUESTION 26 Which Active Directory System Monitor counter specifies the number of objects replicated out per second? A. LDAP Client Sessions B. DRA Inbound Bytes total/sec C. DRA Outbound Objects/sec D. DRA Outbound Bytes Total/sec Answer: C QUESTION 27 You are working as a system administrator at Certified Carriers. You have recently installed Windows Server 2003 and have configured Active Directory in the network of the organization. You have created a forest in the network that includes two domains for the Sales and Accounts domains. You want to allow the users of the Accounts domain to access objects from the Sales domain in the forest. Which service do you need to implement to perform the given task? A. Transitive trust B. Domain Name Service C. Service Management D. Global catalog Answer: D QUESTION 28 Jim Lewis is working as the senior Network Administrator at PQR Chemicals Inc, USA. The organization has decided to collaborate with AB Pharma Ltd, England to do research and development. Both the organizations need to access common folders on the network. Jim Lewis

needs to identify a method to make the users of both the organizations accountable for the data they are accessing and keep a record of all the users accessing the data. Which is the ideal authentication method to perform the task? A. SSL and VPN B. SSL and User Certificates C. SSL and IPSec D. IPSec and User Certificates Answer: B QUESTION 29 In the 802.1x authentication process, what happens after the WAP sends wireless client's identity to the RADIUS server? A. The wireless client's identity information is forwarded to the domain controller for authentication, in case the wireless client is authorized. B. The RADIUS server checks its remote access policies to verify whether the client is authorized. C. The RADIUS server analyzes its remote access polices for specifying constraint in case the wireless client is authenticated by the domain controller. D. The RADIUS server verifies its connection request policies to check whether the wireless access point is approved and has any constraints. Answer: D QUESTION 30 AB Corp. is a computer manufacturing company with its head office at Chicago. Pat Greene is working as a network consultant in the company. The company has three departments: Sales, Purchase, and Manufacturing. These three departments are under separate OUs in the forest. As the company has reorganized employees across the departments, the user accounts from different OUs are transferred under different OUs. The users are complaining that they are unable to find their document folders on the network after the reorganization. What is the possible cause of the problem? A. GPOs for the new OUs do not contain the updated information about folder redirection B. Domain controllers have been changed

C. Users forgot to transfer their data from the old computers to the new computers D. Users' computers have been formatted Answer: A QUESTION 31 John Barrett is working as the system administrator at the Chicago branch of Global Systems Inc. The company has another office at Paris. Each office contains a domain controller and is connected by leased line with a bandwidth of 128 Kbps. The employees of the two offices frequently exchange data over the leased line. The employees of the Chicago office are complaining that files take a long time to download from network. John observes that the traffic flowing across the leased line becomes heavy only during the working hours. What should John do to ensure that the employees of his company are able to exchange data efficiently over the network? A. Configure subnets B. placing additional domain controller at other location which lead to easily authenicate users of that location ,access resources. Configuring intersite replication C. Configure sites D. Configure the domain controller such that WAN links are used during the working hours Answer: C QUESTION 32 You are the security administrator of your organization and need to implement separate certificate service in each department. Which certification hierarchy should you opt for? A. Geographical B. Functional C. Trusted D. Organizational Answer: D QUESTION 33 Ken Burton is working as the Network Administrator at Safest Software Inc. Ken has recently configured a Windows Server 2003 based LAN in the organization. Ken has also deployed the

security mechanisms to make the LAN secure. Ken uses the Security Update Services (SUS) server to update the security. However, Ken needs to design the SUS administrative practices to use the SUS server. What should Ken do to design the SUS administrative practices? A. Use name resolution services such as DNS or NetBIOS B. Reduce the resources managed by the administrators. C. By using special administration console. D. Analyze the proposed security design. Answer: A QUESTION 34 Global Systems Inc.has recently set up three new departments, including Sales, Marketing, and IT. The organization has a LAN, which is based on Windows Server 2003 platform. All the computers in the LAN are a part of an Active Directory domain. Jim Lewis, the Domain Administrator, at Global Systems Inc., has delegated administrative rights to the system administrators of the existing departments. He needs to delegate the administrative rights to the system administrators of the newly set up departments. How should Jim begin assigning the administrative duties? A. By delegating the administrative duties to the system administrators of the newly set up departments using Active Directory Users and Computers console. B. By creating organizational units for the newly set up departments using Active Directory Domains and Trusts console. C. By creating organizational units for the newly set up departments using Active Directory Users and Computers console. D. By delegating the administrative duties to the system administrators of the newly set up departments using Delegation of Control Wizard. Answer: C QUESTION 35 Red Sky IT Systems is a software development company. The company has three development centers at Atlanta, Seattle, and New York. The three domains in the network are RedSky.com, NewYork.RedSky.com, and Seattle.RedSky.com. The domains have 15 domain controllers running Windows Server 2003. The domain controllers are named according to the sequence of their configuration. For example, the domain controller configured first is named DC01.RedSky.com and the domain controller configured second is named DC02.RedSky.com. The last domain controller configured in the Seattle.RedSky.com domain is named DC15.Seattle.RedSky.com. After installing the domain controllers, you have not

transferred operations master roles to the domain controllers. Now, you are facing a problem while renaming a user group in the root domain. Which domain controller is causing the problem? A. DC01.RedSky.com B. DC02.RedSky.com C. DC03.NewYork.RedSky.com D. DC15.Seattle.RedSky.com Answer: A QUESTION 36 You are the system administrator at Global Systems, Texas. The management has called a freelancer accountant named Steve to perform audit operations. You need to provide temporary access to Steve so that she can gain access to network resources. Which type of user account would you prefer to create for Steve? A. Domain user account B. Built-in user account C. Local user account D. Computer account Answer: B QUESTION 37 You are working as the system administrator at the Chicago branch of Red Sky IT Systems. The company has another office at Paris. Each office contains a domain controller and is connected by a leased line with a bandwidth of 128 Kbps. The employees of the two offices frequently exchange data over the leased line. The employees of the Chicago office are complaining that files takes a long time to download from network. You observe that during the working hours, the traffic flowing across the leased line becomes heavy. You have decided to control the network traffic. How can you control the traffic? A. By configuring intersite replication size B. By configuring subnets C. By configuring intrasite replication size

D. By configuring sites Answer: D QUESTION 38 You are working as the system administrator at the Paris branch of Red Sky IT Systems. You have created an Active Directory forest in your organization. You have also created groups and placed the users in specific groups. In addition, you have assigned all the operation master roles to the first domain controller in the forest and stored the global catalog only on that domain controller. However, you are unable to identify the groups of various users. Which operation master role do you need to transfer, to solve this problem? A. Schema master role B. Domain naming master role C. Infrastructure master role D. Primary Domain Controller (PDC) emulator master role Answer: C QUESTION 39 Steve is a system administrator at Red-Eye Experts, which is a small company with limited resources. For effective utilization of resources, Steve wants to restrict the access to laser printer to the employees of Sales department only. How could Steve implement the given task? A. By creating a mandatory user profile and assigning the required permission to user to access the resources. B. By creating a local user profile and assigning the required permission to user to access the resources. C. By creating a group and assigning the required permission to this group to access the resources. D. By creating a roaming user profile and assigning the required permission to user to access the resources. Answer: C QUESTION 40 Global Systems Inc has two offices, one each at New York and Chicago. Active Directory sites exist at both the branches and the computers at both the branches work on Windows Server 2003 platform. John Barrett, the system administrator at the Chicago branch has configured intersite

replication between the two offices. However, John has observed that the application directory partition is not being replicated to all domain controllers. What should John do to solve this problem? A. Configure application directory partition. B. Monitor the performance of Active Directory replication using the Ntdsutil tool. C. Configure intersite replication again. D. Monitor the performance of Active Directory replication using the Replmon tool. Answer: D QUESTION 41 Which Active Directory System Monitor counter specifies the number of synchronization requests made to replication partners? A. DRA Sync Requests Made B. LDAP Client Sessions C. DRA Outbound Objects/sec D. DRA Outbound Bytes Total/sec Answer: A QUESTION 42 Which of the following statements is true about Web permissions? A. Web permissions are used by IIS Web server to restrict permissions to files and folders. B. Web permissions are used by IIS Web server to restrict permissions to virtual directories. C. Web permissions replace NTFS permissions. D. Web permissions are used by IIS servers to specify the kind of actions that can be performed on a Web site. Answer: D QUESTION 43

You are working as the system administrator at the New York branch of Blue Valley Consulting. The company has another office at London and you have configured intersite replication between the two branches. One of the domain controllers in your office failed and therefore, you deleted the failed domain controller. However, an update conflict occurred after you deleted the failed domain controller. What could be the reason of this update conflict? A. Intersite replication has failed. B. The replication topology has changed. C. The domain naming master role assignment has changed. D. The Active Directory implements multi-master replication technology. Answer: D QUESTION 44 Lee is the system administrator at SSPT Corporation in Chicago. Some of the employees of the company are using the customer database of the company that is centrally located on the server. The database contains important and confidential data about all the network resources of the company. Any unauthorized access or leakage of the confidential information can result in the loss of revenue and customer confidence. Therefore, Lee needs to determine the rights. Which security policy does Lee need to use to perform the given task? A. User rights assignment policy B. System Services policy C. IP Security policy D. Account lockout policy Answer: A QUESTION 45 Which Active Directory System Monitor counter specifies the original size of inbound compressed replication data in bytes? A. DRA Outbound Bytes Compressed (Between sites, after compression)/sec B. DRA Inbound Bytes Compressed (Between sites, before compression)/sec C. DRA Inbound Bytes Not Compressed (Within site)/sec

D. DRA Inbound Bytes total/sec Answer: B QUESTION 46 The Technology Systems wants to identify the threats to network security in order to protect its network from hackers. The company has noticed some malicious operations in the network. The company has implemented threat modeling, which provides a systematic methodology to recognize and categorize threats according to their impact on network security. Jim Lewis, a security designer has been assigned the task to verify and collect the information regarding the stage in which the attacker is still performing. Jim has collected the information that the attackers are trying to retrieve the information about the ports and devices of the organization that are accessible remotely. The attackers are also trying to identify the vulnerabilities in the network security. Jim has informed the company about the stage of the threat. Now, the company wants to counter the threat using security measures. In which stage of the threat should the company implement the security measures? A. Elevation of privilege B. Penetration C. Cover-up D. Footprint Answer: D QUESTION 47 Global Systems Inc. has two offices, one each at New York and Chicago. You are the system administrator at the Chicago branch and you have configured intersite replication between the two offices. You have been asked to ensure that the application direction partition is always replicated to all the domain controllers. Therefore, you need to monitor Active Directory replication to identify when a connection becomes unavailable. You also need to view the replication topology generated by each domain controller. How can you perform the tasks? A. Using the Performance console B. Using the Ndsutil tool C. Using the Replmon tool D. Using the Repadmin tool Answer: D

QUESTION 48 Consider the statements: Statement A: The domains, belonging to different trees in a forest, work independently. Statement B: Forest enables communication between the domains of different trees. Which of the following is true, with respect to the above statements? A. Statement A is true and statement B is false. B. Both, statements A and B, are true. C. Both, statements A and B, are false. D. Statement A is false and statement B is true. Answer: B QUESTION 49 You are the system administrator at Blue Moon Computers. The IT department members are working on the trusted software of the company. You need to configure security and startup settings for services running on the system to prevent from any unauthorized access and severe damage to the software. This enables you to determine the user or group that is having ownership permission for the system service. Which security policy do you need to use to perform the given task? A. System Services policy B. Account lockout policy C. IP Security Policy D. User rights assignment policy Answer: A QUESTION 50 Steve is the system administrator at Red-Eye Experts. The employees of Red-Eye Experts want to retain the same desktop settings as they configured previous time. For this, Steve creates user profiles and stores the profiles in the user profile folder. However, employees also want to store files, History information, and Temporary files to manage the personalized settings of a computer in the user profiles. Which folder should Steve create to store the required user's information in a user profile? A. Cookies folder

B. System folder C. Application data folder D. Local Settings folder Answer: D QUESTION 51 BlueVelly Inc. publishes computer and IT related books and has its head office at Chicago. The company also sells the books through a network of distributors. The CEO of the company John Major wants to reduce advertisement costs by using an e-commerce Web site. John has Chris, the Web administrator, to design an e-commerce Web site and host it on the IIS Web server at Chicago. John has also asked Chris to ensure that only registered users are allowed to buy the books from the Web site and Active Directory accounts are available for all the users in the Active Directory database. Which type of mapping should Chris use to meet the requirements mentioned by the CEO? A. Many-to-One Mapping B. One-to-One Mapping C. DS Mapping D. IIS Mapping Answer: C QUESTION 52 Jim is a system administrator at Sharp IT Systems. All the employees of the company are involved in the electronic transaction, which takes place with the customer database. However, the customer database contains important and confidential data about all the network resources of the company. To prevent any unauthorized access or leakage of the confidential information, Jim need to deploy security settings to authenticate the validity of each user involved in an electronic transaction. How does Jim perform the given task? A. By implementing the Public Key policy B. By implementing the IP Security policy C. By implementing the Account lockout policy D. By implementing the System services policy Answer: A

QUESTION 53 Corrine Wallace is working as the System Administrator at Red Sky IT Systems. Corrine had configured a Windows Server 2003 based LAN in the company and had implemented all the network services provided by Windows Server 2003. However, Corrine had not implemented any security mechanism to make the network safe. Corrine has recently observed that the network server has been attacked using an administrator account. Due to this it has become difficult to manage the network and make it secure. How can Corrine solve this problem? A. By establishing administrative security boundaries. B. By using emergency management system components. C. By using special administration console. D. By limiting the administrative privileges. Answer: D QUESTION 54 You are a member of the network risk management team of your organization. Which of the following activities should you perform before you can manage the risks? A. Tracking changes in risk conditions B. Qualitative analysis of risks C. Both quantitative and qualitative analysis of risks D. Quantitative analysis of risks Answer: C QUESTION 55 You are the CA administrator of your organization. Which of the following are your responsibilities: Renewing certificates. Reactivating certificates placed on hold. Approving and denying certificate enrolment request. A. 2 and 3 B. 1 and 2 C. 1, 2, and 3

D. 1 and 3 Answer: D QUESTION 56 Ken Burton is the system administrator at the Atlanta branch of Global Systems Inc. The company has another office at New York. Ken has configured intersite replication between the two offices, but now he observes that the domain directory partition is not being replicated to all domain controllers. Therefore, Ken needs to detect the replication partner that has failed. John also needs to regenerate the replication topology. Which console should Ken use to perform these tasks? A. Event Viewer console B. Active Directory Sites and Services console C. Active Directory Domains and Trusts console D. Active Directory Replication Monitor console Answer: D QUESTION 57 Tom is the system administrator at Halle Cosmetics. He wants to restrict users from running noncertified application. Which security template does Tom need to modify? A. Compatible workstation or server security settings (Compatws.inf ) B. Highly secure workstation or server security settings (Hisecws.inf) C. System root security (Rootsec.inf) D. Secure domain controller security settings (Securedc.inf) Answer: A QUESTION 58 You are the system administrator at Blue Valley Computers. The company has offices at Chicago, Atlanta, Japan, and New York. All the information is collectively stored at the head office, Atlanta. You want to grant privileges to users so that they can access resources from head office as well as any other branch office. Moreover, you want to restrict the access to Confidential database that contains the confidential information of company . Which is the optimum solution to perform the given task?

A. Create a domain user account so that they can access the resource from other domains. Deny the read permissions for confidential folder. B. Create a local user account and then create a security group named Confidential for the above purpose. C. Create a built-in user account and then create a distribution group named Confidential for the above purpose. D. Create a computer account and then create a distribution group named Confidential for the above purpose. Answer: A QUESTION 59 Red Sky IT Systems has launched an e-commerce Web site to increase the sales of computer parts. The Web site is hosted on Internet Information Server (IIS) at the head office at Atlanta. It displays all the information related to the computer parts, such as product name, price, and model name. Chris, the Web Administrator at Red Sky IT Systems has also installed various Web applications on the IIS server. Chris needs to secure these Web applications. Chris has already designed the strategies to monitor the IIS server. What should Chris do next in order to secure the Web applications and control access to the IIS server? A. Use IPSec B. Use SSL C. Create a baseline security for the IIS server D. Manage IIS specific logs Answer: C QUESTION 60 You are working as a network consultant at Perfect Watch Co. The company has offices at Chicago and Seattle with the head office at Seattle. The domain named Domain02.PerfectWatch.com had a hardware problem that you have rectified. The domain is working properly in the network. Now, you notice that another domain named Domain03 is unable to replicate. You have verified that Domain02 is online, the disk space is enough to allow replication, and the Event Viewer is not showing errors or warning alerts. However, you are facing problem while pinging the server's DNS name. What task should you do to solve the problem? A. Replace Network Interface Card (NIC)

B. Demote Domain02 and then promote it C. Check whether the DNS name, Domain02.PerfectWatch.com can be resolved D. Check the network connectivity of the domain Answer: C QUESTION 61 Consider the statements: Statement A: All domains in a tree share a contiguous namespace. Statement B: The name of a child domain is a combination of its name and its root's name. Which of the following is true, with respect to the above statements? A. Statement A is false and statement B is true. B. Statement A is true and statement B is false. C. Both, statements A and B, are true. D. Both, statements A and B, are false. Answer: B QUESTION 62 You are the system administrator at Blue Valley Consulting. The company has offices at Atlanta, Denver, and Houston. You decided to create domains for the Atlanta head office as Atlanta.BlueValley.com and child domains for the Denver and Houston branch offices as Denver.Atlanta.BlueValley.com and Houston.Atlanta.BlueValley.com. To expand its business, Blue Valley Consulting has recently collaborated with Global Systems, Inc., which has offices at Atlanta, North America, and Europe. The system administrator at Global Systems, Inc. has also implemented Active Directory and created root domain as Atlanta.GlobalSystems.com and child domains as NorthAm.GlobalSystems.com and Europe.GlobalSystems.com. The CEO of the Blue Valley Consulting regularly wants to access the candidate details from Global Systems, Inc. that are selected to immigrate to other countries. Which of the following is the optimum trust relationship to implement the given task? A. shortcut trust B. Realm trust C. Forest trust D. Parent-child trust

Answer: C QUESTION 63 Which tool is used to allocate a value corresponding to each performance counter that you select? A. Repadmin.exe B. Replmon.exe C. Event Viewer D. System Monitor Answer: D QUESTION 64 John Barrett works as a graphics designer at Good Graphics Inc. John needs to frequently access the Internet to acquire ideas to create new designs. John also downloads the required files from the Internet. Recently, John has observed that the files that he creates during the day are deleted at the end of the day. John does not allow any other user to access his system and is sure that he is loosing the files because of some malicious software. Which of the following malicious software can be responsible for deleting the files on John's system? A. Trojan horse B. Logic bomb C. Zombie D. Trap door Answer: B QUESTION 65 Which of the following is an IPSec sub protocol for providing data integrity? A. Authentication Header B. IPSec Key Exchange C. Encapsulating Security Protocol

D. Kerberos Protocol Answer: C QUESTION 66 You are the system administrator at Blue Valley Consulting with offices at Atlanta, Denver, and Houston. You have implemented Active Directory infrastructure to centralize the administration. You decide to create domains for the Atlanta head office as Atlanta.BlueValley.com and child domains for the Denver and Houston branch offices as Denver.Atlanta.BlueValley.com and Houston.Atlanta.BlueValley.com. You notice a heavy flow of traffic on the network during the working hours. How will you solve the given problem in order to optimize the increased network traffic? A. conifigure Ous B. Configure sites C. Configure additional domain controllers D. Use global catalog server Answer: B QUESTION 67 You are the system administrator at Red Eye Experts with offices at North America and Europe. In North America, the organization has offices at Chicago and New York and in Europe, the organization has offices at Paris and Italy. You have added the employees at managerial level to a group named Regional Managers at each office.There is one group named Worldwide Managers which has all permission to perfom access. You want to provide access to each user to each resource in the network.Which of the following options performs this functionality? A. Use distribution groups B. Use universal groups C. Use security groups D. Implement group nesting Answer: D QUESTION 68

Jim Lewis is working as the Network Administrator at Smart Software Developers. Jim has configured a Windows Server 2003 based LAN and has implemented the network services provided by Windows Server 2003. Some of the employees of the company are working on a project, which requires them to use the server on which Windows Server 2003 is installed. Therefore, Jim has granted administrative rights to these employees. Recently, Jim has observed that it has become difficult to manage the network and maintain its security. Therefore, Jim needs to secure automated deployments on the server. Why is Jim doing this? A. To manage the risks involved in network administration. B. To disable the unnecessary services on the server. C. To reduce the number of resources managed by an administrator. D. To secure the installation practices on the server. Answer: B QUESTION 69 You are the system administrator at Global Systems Inc. You have configured the security template. As a precautionary measure, you decide to compare the security of your computer with the effects of pre-defined security templates? Which tool will help you to perform the comparison? A. The repadmin tool B. The security configuration analysis tool C. The group policy management console D. The netdom tool Answer: B QUESTION 70 Jim Lewis is the system administrator at the Chicago branch of Red Sky IT Systems Inc. Jim has installed Windows Server 2003 on a computer and configured it as a domain controller.However, the employees of Red Sky IT Systems are complaining that they are unable to log on to their domains. Therefore, Jim needs to determine what is the reason for not able to logon to domain. What should Jim do to accomplish this task? A. Use the Active Directory Users and Computers console B. use the event viewer for error

C. Use the Repadmin tool D. view the active directory schema console Answer: B QUESTION 71 You are working as the System Administrator at Global Systems Inc. You have configured a Windows Server 2003 based LAN in your organization. You have also configured an Active Directory domain in the LAN using a single domain controller. You need to manage the users, groups, and the resources attached to the domain controller. How can you perform this task? A. By using an object-based security model . B. By designing object permission structure C. By setting audit policies D. By delegating control Answer: A QUESTION 72 John is working in the accounts department of Red-Eye Experts. He has observed that some of his files have been modified. Therefore, he has asked Steve, the system administrator, to help him solve this problem. Steve has decided to design an Access Control Model (ACM) to protect the user data in the company. Which ACM principle will help John to solve this problem? A. User-based authentication B. Administrative privileges C. Discretionary access control D. Auditing of system events Answer: C QUESTION 73 Which of the following servers is used to maintain master database and security policy for a domain? A. DC

B. DHCP C. SQL D. ISA Answer: A QUESTION 74 Blue Moon Cosmetics is a leading manufacturer of cosmetics with offices in North America and Europe. The company has opened new offices at Chicago and Atlanta in North America and at Paris and Italy in Europe. You are the network administrator and you have been assigned the responsibility to create OUs to delegate the task of network administration. Which is the optimum choice for creating OUs? A. You will create an OU structure based on business function. You will create Admin and Sales as top-level OUs. Then, you will create HR and Accounts as second-level OUs under North America top-level OU and Marketing and Advertising as second-level OUs of Europe top-level OU. B. You will create an OU structure based on combination of location, business function, and objects. You will create North America and Europe as top-level OUs. Then, you will create Admin and Sales as second-level OUs. These OUs will contain Users, Computers, and Resources in them. C. You will create an OU structure based on objects. You will create Users, Computers, and Resources as top-level OUs. Then, you will create Users and Groups as second-level OUs under Users OU and Workstations and Servers under Computers OU. In addition, you will create Software and Printers as second-level OUs under Resources OU. D. You will create an OU structure based on location. You will create North America and Europe as top-level OUs. Then, you will create Chicago and Atlanta as second-level OUs under North America OU and Paris and Italy as second-level OUs under Europe OU. Answer: B QUESTION 75 You are the system administrator at Smart Software Developers. You are assigned the responsibility to organize and store the information about 10000 employees working in the organization. The management has implemented a policy to shift employees from one office to another to avoid the monotonous job profile. The employees that are transferred want the same working environment as they were having at the previous office. For this, you need to provide a mechanism that would enable an employee to access complete, up-to-date information about each employee in the organization. However, you can access the information stored in a directory using a set of protocols. Which option will you use to perform the above task?

A. Active Directory B. Novell Directory Service C. IBM-Tivoli directory service D. Microsoft Metadirectory Services (MMS) Answer: B QUESTION 76 Tim is working as the System Administrator at Global Systems Inc. He has configured a Windows Server 2003 based LAN in the company. However, he has not implemented any security mechanism to secure the LAN. He has recently observed that the network server has been attacked using an administrator account. Due to this it has become difficult to secure and manage the network. How do you think can he solve this problem? A. By using emergency management system components. B. By implementing administrative security boundaries. C. By using special administration console. D. By establishing administrative security boundaries. Answer: B QUESTION 77 You are the system adminstrator for the Redsky a computer manufactuing company.You have been given the task to verify the DNS connectitvity .while verifying you get a error message stating that the DNS record not found.You need to rectify this error. Which command you use to recitfy this error. A. netdiag B. repadmin C. netdiag /fix D. dcdiag Answer: C QUESTION 78

You are working as the System Administrator at Safest Software Co. You have configured an Active Directory domain in your organization using a single domain controller. You have implemented auditing on the domain controller to determine whether it is accessed by unauthorized users. However, the performance of the domain controller has degraded. You need to monitor only specific events in order to improve the performance of the domain controller. How can you perform this task? A. By auditing object access. B. By using the Performance console. C. By using an additional domain controller. D. By setting audit policies. Answer: D QUESTION 79 John Barrett is the system administrator at the Chicago branch of Red Sky IT Systems. The company has another office at Denver. John has configured intersite replication between the two offices, but now he observes that the application directory partition is not being replicated to all domain controllers. John needs to detect the replication partner that has failed. John also needs to view the status of the replicas in order to troubleshoot the problems related to replication. How can John perform these tasks? A. By using the Replmon tool B. By using the System Monitor tool C. By using the Repadmin tool D. By using the Ntdsutil tool Answer: A QUESTION 80 NS Toys is a toy manufacturing company with three business locations: Las Vegas, Chicago, and Los Angeles. Chris Donaldson is working as an assistant network administrator at the Los Angeles office of NS Toys. You are working as a network administrator at the head office at Las Vegas. The DC05 domain controller at the Los Angeles office had a power failure and has lost data stored in it. Chris wants to restore System State but he does not know how to restore System State. Therefore, Chris asks you to help him perform System State restore. What do you suggest Chris to fix the problem? A. Perform non-authoritative System State restore locally

B. Perform authoritative System State restore from other domain controller in the network C. Perform authoritative System State restore locally D. Perform non-authoritative System State restore remotely Answer: A QUESTION 81 Wilson is the network administrator at Red Cosmetics. The domain has domain controllers running Windows Server 2003. Wilson is planning to place global catalogs so that they are used optimally. During the bandwidth analysis, Wilson notices a trend in global catalog network traffic. What type of global catalog network traffic will Wilson predict to use more network resources than other types of global network traffic? A. Network traffic related to user searches for directory information throughout a forest. B. Network traffic related to global catalog directory replication. C. Network traffic related to global catalog queries. D. Network traffic related to UPN authentication. Answer: C QUESTION 82 Consider the following statements: Statement A: Root enterprise CA is integrated with Active Directory. Statement B: Subordinate enterprise CA can be installed on Windows Server 2003 or Windows Server 2000 server that is a member of the Active Directory domain. Which of the following is true about the above statements? A. Statement A is incorrect while statement B is correct. B. Both statements A and B are correct. C. Statement A is correct while statement B is incorrect. D. Both statements A and B are incorrect. Answer: B QUESTION 83 How many performance counters does Windows Server 2003 provide for the NTDS performance object?

A. 100 B. 210 C. 120 D. 150 Answer: C QUESTION 84 Anne Forsythe is working as a network consultant at Global Systems, Inc. The company is product-based with its head office at Los Angeles. The company has a Windows Server 2003 Active Directory infrastructure implemented in the network. The network recently faced a security attack. Now, the management has planned to implement security in the network. The management has asked Anne to inform when unauthorized users try to access the network resources. How can Anne perform this task? A. Least privilege B. Secure communication C. Authorization D. Auditing Answer: D QUESTION 85 Steve Irving is working as a network security designer at Smart Software Developers. The company deals in software products, and has its head office at Washington. The company has an existing Windows Server 2003 infrastructure implemented in the network. The management has asked Steve to implement Windows Server 2003 security policy in the network to provide security to the company network. For this, Steve decides to implement a risk management strategy in which he will remove the source of the risk. Which strategy has Steve planned? A. Avoid B. Accept C. Mitigate D. Transfer

Answer: A QUESTION 86 Security templates can be used to define which of the following security settings in a GPO? A. Domain Controller B. System root C. Event log D. Server Answer: C QUESTION 87 You are working as a system administrator at LMN Inc. You have to configure security for multiple computers in one step and ease the task of domain administration. You have configured the security template and now, you want to apply the security. What action will you perform to apply the security? A. Security template will be applied automatically. B. Import Security template to a domain controller C. Import Security template to an existing GPO D. Import Security template to a local Group Policy Answer: C QUESTION 88 You are the system administrator at Red Sky Cosmetics, Dubai. You need to provide a work area to each user where the users can store their files and required software safely. For this, you need to create separate user accounts for each user that would enable the users to log on to a computer and access the resources only from the computer on which their account is created. Which type of user account would you prefer to create for each user? A. Computer account B. Domain user account C. Local user account

D. Built-in user account Answer: C QUESTION 89 Ken Burton is working as the system administrator at Red Sky IT Systems. Ken has created an Active Directory forest in his organization and has created users and groups in that forest.Users try to logon to network but they unable to perform.so you analyze the problem and find that PDC is not working .how can you solve this problem. A. seize the RID role B. seize the Infrastructure role C. Transfer the PDC to another DC D. Seize the domain naming master role Answer: C QUESTION 90 Consider the following statements: Statement A: ACL can be used to isolate Web applications in application pools. Statement B: Script files of IIS 6.0 have the extension .asp. Which of the following is true about the above statements? A. Both statements A and B are incorrect. B. Both statements A and B are correct. C. Statement A is correct and statement B is incorrect. D. Statement A is incorrect and statement B is correct. Answer: C QUESTION 91 Corrine Wallace is working as the Network Administrator at Global Systems Inc. The employees of the company use a Windows Server 2003 based LAN. Corrine has configured a file server on the network to facilitate backup and recovery operations. However, the file server has been moved to a location, which is at some distance from Corrine's workstation. Therefore, Corrine needs to administer the file server remotely using Emergency Management System (EMS) components. Corrine has implemented all the security mechanisms to secure the LAN and he also wants to secure the EMS components. How can Corrine perform this task? A. By protecting the administrative systems.

B. By restricting the users who are not authorized to administer the server. C. By using Remote Desktop services. D. By securing the administrative channels. Answer: B QUESTION 92 Lee Mitchell is the system administrator at the Chicago branch of Global Systems Inc, which has another office at New York. Lee has configured an Active Directory forest for his company and has created intersite replication between the two offices. The company has asked Lee to ensure that the services provided by the Active Directory are always available to the users. One of the employees, Chris, has complained that he is unable to access the Active Directory services. Therefore, Lee needs to collect data regarding the performance of the Active Directory from a local computer. How can Lee perform the tasks? A. Using the Repadmin tool B. Using the Replmon tool C. Using the Performance console D. Using the Ndsutil tool Answer: C QUESTION 93 Consider the following statements: Statement A: 802.11a has a connection speed up to 54 Mbps and radio frequency of 2.4 GHz. Statement B: 802.11b has a connection speed up to 54 Mbps and radio frequency of 5 GHz. Which of the following is true about the above statements? A. Statement A is correct while statement B is incorrect. B. Statement A is incorrect while statement B is correct. C. Both statements A and B are correct. D. Both statements A and B are incorrect. Answer: D QUESTION 94 Alice is working as the System Administrator at Intel Computers Ltd. Alice is required to setup a wireless network to facilitate the communication between Intel Computers Ltd. and its client.

This network should have a connection speed of 11 mega bits per second (Mbps) and should support a radio frequency of 2.4 gigahertz (GHz). Which is the ideal 802.11 Wireless standard that should be adopted by the organization to fulfill its requirements? A. Use 802.11g standard B. Use 802.11i standard C. Use 802.11b standard D. Use 802.11a standard Answer: C QUESTION 95 You are working as a network consultant at SSPT Corporation. The company has Windows Server 2003 Active Directory services implemented in the company network. The domain controller named DC02 had a hardware failure, and was out of the network for some days. Now, the domain controller is on the network. You view the Access Denied error in the Directory Service log of the Event Viewer console when synchronizing DC02. To troubleshoot such problems, you use the Kerbtray.exe application and a command-line tool. Which command will you use with the Kerbtray.exe application to resolve this problem? A. Dcdiag.exe B. Gpresult.exe C. Netdom.exe D. Ntltest.exe Answer: C QUESTION 96 Ed Young is working as the Network Engineer at the New York branch of Red Sky IT Systems. The organization has recently established another branch at Chicago. The employees of both the branches need to exchange data frequently. Therefore, the management has asked Ed Young to establish a wireless network. Ed Young has implemented a wireless network in order to meet the business requirements of Red Sky IT Systems. Ed Young has used the 802.11a standard to set up the wireless network and the employees were able to exchange data efficiently. However, recently the employees have they are receiving corrupted data. What can be the possible reason? A. The 802.11a standard does not ensure security of data.

B. The signals are transmitted in all directions in wireless networks. C. An unauthorized user has gained access to the access point. D. EAP-TLS protocols were not used to implement the wireless network. Answer: B QUESTION 97 Tom works as the Network Administrator at Blue Moon Computers. Tom needs to set up a wireless network, which has a connection speed of 54 mega bits per second (Mbps). The wireless network should support a radio frequency of 2.4 giga hertz (GHz). Tom is also required to provide security to the wireless network by providing authentication and encryption features in the above network. Which standard should Tom use to set up the wireless network? A. Use 802.1x standard B. Use 802.11i standard C. Use 802.11g standard D. Use 802.11b standard Answer: A QUESTION 98 You are working as a system administrator at Blue valley Consulting. The employees of Blue Valley Consulting want that their computers should retain the same desktop settings as they configured previous time. To solve the problem of employees, you have created local user profiles for the employees of the company. However, you are not able to load the user profiles that you have created on their computers. In this case, computer automatically creates a user profile. Which user profile is being mentioned here? A. Roaming user profile B. Temporary user profile C. Global user profile D. Mandatory user profile Answer: B

QUESTION 99 Perfect Watch Co. is a watch manufacturing company with three business locations: Chicago, Washington, and New York. You are the network consultant and Ron Floyd is the assistant network consultant at the Washington office. The network in the company is using Windows Server 2003 Active Directory services. You ask Ron to raise the functional level of a forest in the network. When trying to raise the functional level of the forest, Ron receives an error message. Ron asks you to help him troubleshoot the problem occurring while raising the functional level of the forest. What should be ensured to raise the functional level of the forest? A. Universal group membership caching is enabled B. Domain controllers are running Windows 2000 Server C. Domain functional level of the domain controllers is Windows Server 2003 D. Global catalog for each domain controller is enabled Answer: C QUESTION 100 You are the system administrator at Blue Sky Ltd. You manage a growing enterprise network running on Microsoft Windows Server 2003. To keep up with the growth, you increase the number of domain controllers and update the bridgehead server list. After designing the bandwidth requirements, you begin to plan your site boundaries. You need to decide whether to establish a single site or multiple site. What properties would lead you to choose multiple sites for this situation? A. You need fastest directory updates between all the domain controllers. B. You need granular replication control for your WAN network. C. You need all the replication on your network to occur as intrasite replication. D. You need simple replication management for your subnet. Answer: B QUESTION 101 Quality Software Developers is a leading software development company with its head office at Denver. The company has an existing Windows Server 2003 Active Directory infrastructure. You are working as network administrator at Quality Software Developers, and David Wong is working as assistant network consultant in the company. You had applied a software restriction policy to the entire domain last week. Now, management has recruited five employees in the purchase department. You have created their accounts, and asked David to deploy software on the computers of newly joined employees. David is experiencing a problem in deploying

software on their computers. David tells you that he is unable to deploy software on the workstations using the administrator account. Which option can David use to bypass the software restrictions policies for deploying software on the workstations of the new employees? A. Move the administrators to a different domain B. Rename the Policy C. Delete the policy and apply it to the OU D. Change the policy to apply it to All Users Except Administrators Answer: D QUESTION 102 Which operations master role enables a domain controller to add and remove application directory partitions from the forests? A. Domain naming master role B. Primary Domain Controller (PDC) emulator role C. Relative Identifier (RID) master role D. Infrastructure master role Answer: A QUESTION 103 Consider the statements: Statement A: The physical structure enables you to organize the data stored in Active directory. Statement B: The logical structure of Active Directory enables you to optimize the network traffic. Which of the following is true, with respect to the above statements? A. Statement A is false and statement B is true. B. Both, statements A and B, are false. C. Statement A is true and statement B is false. D. Both, statements A and B, are true. Answer: B QUESTION 104

Chris is working as a network administrator at Red-Eye Experts. The company has a large network of computers spanning over three business locations at Atlanta, Denver, and Houston. You have recently implemented Active Directory infrastructure in the network of the company. Now, the management wants you to provide security to the network of the company. For this, he plans to identify the categories of the threats to the company network based on STRIDE model. Based on the STRIDE model, in what kind of security threat, does a malicious entity disguises itself to be a trusted entity to gain access to a restricted resource or perform a malicious action? A. Spoofing identity B. Repudiation C. Tampering D. Information disclosure Answer: A QUESTION 105 Which type of Group Policy settings includes settings to configure user workstation environment and their application settings? A. Remote installation services B. Scripts C. Software Installation D. Administrative templates Answer: D QUESTION 106 Robinson is working as a system administrator at Perfect Watch Co. Robinson has recently installed Active Directory on a Windows Server 2003 computer. Robinson has also created an Active Directory domain in the network, for the HR and Accounts departments. All the users in the domain need to log on to the domain. However, the users have reported Robinson that the logon process is very slow. Therefore, the management of the organization has asked Robinson to create a network structure, which will control the logon traffic and increase the speed of the logon process. Which structure in the Active Directory would Robinson implement to perform the task? A. Sites B. Tree C. Organizational Unit D. Forest

Answer: A QUESTION 107 Consider the statements: Statement A: The dcdiag.exe command enables you to view or modify the ACLs of Active Directory objects. Statement B: The dsastat.exe command enables you to compare the naming contexts on different domain controllers. It also enables you to identify the differences between naming contexts on domain controllers. Which of the following is true, with respect to the above statements? A. Statement A is false and statement B is true. B. Statement A is true and statement B is false. C. Both, statements A and B, are false. D. Both, statements A and B, are true. Answer: A QUESTION 108 You are the system administrator at Safest Software Co. The employee of the Safest Software Co, are working in shifts. Therefore, permanent computer is not allocated to them to perform their work. However, employees want to retain their desktop settings as they log on to any computer in the network. How can you perform this task? A. By creating Local user profile B. By creating Roaming user profile C. By creating Mandatory user profile D. By creating Temporary user profile Answer: B QUESTION 109 You are the system administrator at PQR Corp. You want to create and manage user accounts using the command-line tool, Ldifde. You include the command for running the Ldifde tool in a Notepad file and save the file with .LDF extension. The syntax of the Ldifde command is: dn: cn = container name, ou= organizational unit, dc= root domain changeType: Add objectClass: user sAMAccountName: username UserPrincipalName: username including the path of user's container displayName: username userAccountControl: value What does dn specify in the above syntax of the Ldifde command? A. Specifies the path to an object's container.

B. Specifies adding of a new user account in the Users container. C. Specifies the username along with the location of the account. D. Specifies the type of object to be created. Answer: A QUESTION 110 The command enables you to create IPSec policies at command line. A. tracert B. ipconfig C. netsh D. netstat Answer: C QUESTION 111 Jack is working as the System Administrator at Blue Moon Computers Inc. James is required to setup a wireless network to facilitate the communication between Blue Moon Computers and its client. The wireless network should have a connection speed of 54 mega bits per second (Mbps). This network should support a radio frequency of 5 gigahertz (GHz). Which is the ideal 802.11 Wireless standard that should be adopted by the organization to fulfill its requirements? A. Use 802.11b standard B. Use 802.11g standard C. Use 802.11a standard D. Use 802.11i standard Answer: C QUESTION 112 You are the system administrator at Red Sky IT Systems. The IT department members are working on the database, which contains important and confidential data about all the network resources of the company. Any unauthorized access or leakage of the confidential information can result in the loss of revenue and customer confidence. Therefore, you want to keep track of the user and system activities that should be recorded in the security log. Which security policy do you need to use to perform the given task?

A. Public Key Policies B. Audit policy C. Password policy D. Account lockout policy Answer: B QUESTION 113 Jane is working as a security designer at Homelike Hospital Ltd. The hospital has a computer network in three cities: San Francisco, New York, and Washington. She has to provide security to the company network so that transactions can be made safely. For this, you are planning the management of risks. Which strategy do you use when ALE of a risk to an asset is more than the value of the asset? A. Avoid B. Transfer C. Mitigate D. Accept Answer: B QUESTION 114 You are working as a system administrator at Blue Valley Consulting. You have recently installed Windows Server 2003 and have configured Active Directory service in the network of the organization. You want to optimize the network traffic and transmit, store, and replicate information about network objects of your organization. Which structure of the Active Directory would enable you to perform the given task? A. Organizational Unit B. Logical Structure C. Tree D. Physical Structure Answer: A

QUESTION 115 You are configuring auditing of the CA using CA audit properties page. Which option should you enable to set restrictions on certificate managers? A. Issue and manage certificate requests B. Start and stop certificate services C. Change CA configuration D. Change CA security settings Answer: D QUESTION 116 Tom Wilkins is working as the system administrator at Top Transportation Co. Tom is creating OUs to manage users, administrators, and objects. He decides to create sub tiers of OUs to add granularity to the structure. Fortunately, adding deeper hierarchy of OUs will not increase the overall hardware cost in this case. For this design structure, what should be the limit of nesting the OU structure? A. The OU structure should be 8 levels deep B. The OU structure should be 6 levels deep C. The OU structure should be 10 levels deep D. The OU structure should be 12 levels deep Answer: C QUESTION 117 Consider the following statements: Statement A: IPSec cannot be used to secure data transmission between client computers and IIS server Statement B: SSL is used to secure data transmission between IIS and SQL database server Which of the following is true about the above statements? A. Statement A is correct and statement B is incorrect. B. Both statements A and B are incorrect. C. Both statements A and B are correct.

D. Statement A is incorrect and statement B is correct. Answer: C QUESTION 118 You are working as the system administrator at the Chicago branch of Blue Valley Consulting. You have created an Active Directory forest in your organization. You have also assigned operation master roles to a domain controller in the forest to ensure that the Active Directory performs single master replication. However, the employees of your company are complaining that they are unable to change their passwords after logging on to their domains. How can you solve this problem? A. By changing the domain naming master role assignment. B. By changing the Relative Identifier (RID) master role assignment. C. By changing the Primary Domain Controller (PDC) emulator role assignment. D. By using the Active Directory Users and Computers console. Answer: C QUESTION 119 Susan Ward decides to redesign the Active Directory infrastructure at Quality Software Developers. The company has two offices, one at Los Angeles and other at New York. The Active Directory currently consists of a single domain. The domain controllers in both the offices run Windows Server 2003. The company currently has ten applications to develop. The employees in the company are divided into ten groups. Each group will be responsible for analysis, designing, developing, and implementation phases. A group includes members from Sales, Marketing, Support, and Development departments. Susan needs two members from each team to manage administrative tasks for the team. The tasks include resetting passwords, managing printers, and managing user accounts in the domain. Susan decides to create an OU structure for delegating the task of administration to administrators of different departments. On which basis should you design the OU structure? A. Object type based B. Location based C. Business function D. Technology Answer: B QUESTION 120

You are the system administrator at the Chicago branch of Global Systems Inc. You have installed Windows Server 2003 on a computer and configured it as a domain controller. You have also created an Active Directory forest in your organization. However, the employees of your organization are complaining that they are unable to log on to their domains. What should you do to detect the problem? A. Use the Ndsutil tool B. View the security log file C. View the directory service log file D. Use the Repadmin tool Answer: C QUESTION 121 You are a network consultant at Safest Software Co. The company has offices at Denver, Houston, and Chicago. You have implemented Active Directory to organize and centralize the information of users and company. The management has recruited a few assistant system administrators and system administrators to distribute your work. You want to create a group for these administrators and grant full control over all the domains, which exist in an Active Directory forest. This group should exist in the root domain controller of a forest. Which type of security group is the optimum solution for the given task? A. Enterprise Admins B. Domain Controllers C. Domain Admins D. Performance Log Users Answer: A QUESTION 122 You are the system administrator of Global Systems Inc. The employees of the company work in various shifts therefore they may use the same computers at different times. This may result in change of settings by users accessing the computer in the other shift. In order to retain the same personalized settings for each user, you want to create user profile for each user. Which type of user profiles you should create for the given task? A. Local user profile

B. Mandatory user profile C. Temporary user profile D. Roaming user profile Answer: A QUESTION 123 Global Systems Inc is an advertising company, which has its sales office located at a distance of three kilometers from the head office. The centralized database about the customers is stored in the file server at the head office. The organization allows the members of the sales team to access the required information from the centralized database using a wireless network. The organization has recently observed that the information sent over the wireless network has been read by its competitors. Therefore, the organization has asked John Barrett, the network administrator to ensure that unauthorized users are not able to access the information flowing across the wireless network. What should John do first in order to meet the requirements of his organization? A. Identify the threats for the wireless network. B. Design security for wireless access points. C. Implement data confidentiality using WEP. D. Design a secure network topology. Answer: A QUESTION 124 Good Graphics, Inc. is a graphics and animation company with its head office at Seattle. Anne Forsythe is the network administrator and you are the assistant network administrator at the head office. In Anne's absence, you are handling the network. When reviewing Anne's files stored on the server, you find a text file that lists computer settings, security settings, group policies applied in the network, and the group policies that have been filtered. To perform administrative tasks in the network, you need to identify the tool that Anne used to create the text file. Which tool did Anne use to create the text file? A. Gpupdate.exe B. Gpresult.exe C. Group Policy Object Editor D. RsoP

Answer: B QUESTION 125 Which of the following protocols should be used to overcome interoperability problems in VPN? A. IPSec tunneling mode B. L2TP C. L2TP/IPSec D. PPTP Answer: A QUESTION 126 You are the system administrator at Blue Valley Consulting. The company has offices at Atlanta, Denver, and Houston. You decided to create domains for the Atlanta head office as Atlanta.BlueValley.com and child domains for the Denver and Houston branch offices as Denver.Atlanta.BlueValley.com and Houston.Atlanta.BlueValley.com. You need to create a trust relationship between Denver.Atlanta.BlueValley.com and Houston.Atlanta.BlueValley.com. The access time between the two domains is high as both domains, Denver.BlueValley.com and Houston.Atlanta.BlueValley.com, have parent-child relationship with Atlanta.BlueValley.com. If a user at Denver.Atlanta.BlueValley.com needs to access resources from Houston.Atlanta.BlueValley.com, then the trust path that has to be traversed is through Atlanta.BlueValley.com. You want to create a trust relationship that improves the logon process and query performance between the two domains. Which is the optimum trust relationship to perform the given task? A. Realm trust B. Shortcut trust C. Parent-child trust D. External trust Answer: B QUESTION 127 You are working as the Domain Administrator at Blue Valley Consulting. You have recently configured a Windows Server 2003 Active Directory domain in your organization. You have also created Organizational Units (OUs) for the various departments in the organization. You

need to delegate the administrative duties to the system administrators of the various departments. For this, you need to design the permission structure for securing the OUs. How can you perform this task? A. By implementing security mechanisms to secure the network. B. By creating customized consoles for the users of the various departments. C. By delegating authority over logical groups of permissions. D. By delegating authority to the users of the various departments. Answer: C QUESTION 128 You are the network administrator of your organization. The network is based on Windows Server 2003 OS. You plan to host the company Web site on the IIS server. Which of the following statements is correct about the IIS server you will be installing and configuring for Web site hosting? A. All COM components should be enabled as Web applications use all of them. B. Only the necessary logging features should be enabled to enhance the security of the server. C. IISADMPWD virtual directory should be enabled because it is used to set and reset Windows Server 2003 passwords.. D. Information sent by users through forms should not be treated as valid input. Answer: D QUESTION 129 Consider the following statements: Statement A: 802.11i uses Wired Equivalent Privacy protocol for data encryption. Statement B: 802.11i uses Extensible Authentication Protocol for data authentication. Which of the following is true about the above statements? A. Both statements A and B are incorrect. B. Both statements A and B are correct. C. Statement A is incorrect while statement B is correct. D. Statement A is correct while statement B is incorrect.

Answer: C QUESTION 130 You are the network administrator of Your organization. The organization is on its Implementing 802.1x wireless network standard. Which of the sau infrastructure changes required could be, and why? A. Uninstallation of PKI because 802.1x standard is sufficient to provide authentication to RADIUS server clients. B. Configure remote access policies on RADIUS server to authenticate clients against Active Directory. C. Upgradation of wireless network adaptor to enable 802.1x authentication standard. D. PKI implementation to provide mutual authentication using PEAP-EAP. Answer: C QUESTION 131 You are the system administrator at ABC Corp. You want to create and manage user accounts using the command-line tool, Ldifde. You include the command for running the Ldifde tool in a Notepad file and save the file with LDF extension. The syntax of the Ldifde command is: dn: cn = container name, ou= organizational unit, dc= root domain Change type: Add objectClass: user sAMAccountName: username userPrincipalName: username including the path of user's container displayName: username userAccountControl: value What does userAccountControl specify in the above syntax of the Ldifde command? A. Specifies the username along with the location of the account. B. Specifies adding of a new user account in the Users container. C. Specifies the type of object to be created. D. Specifies the value as 514 to disable the user account or 512 to enable the user account. Answer: D QUESTION 132 Which program hosts the programs used by network administrators to manage network services? A. Windows Support Tools

B. Snap-in C. Console D. Command-line tool Answer: C QUESTION 133 Ron Floyd is working as a network administrator at Global Systems, Inc. Ron has implemented Active Directory infrastructure in the network. Due to the large volume of data, Server03 is running low on hard disk space. Ron does not have additional hard disks to install on the server. David Wong, the head of the Marketing department needs to store some important data on the server urgently. David complains that he is unable to store the important data on the server. Which option can Ron use to help David in saving the data on the server? A. Delete the files of other users from the server B. Format the drive to create space C. Install other hard disks on the server D. Perform offline compaction of the Active Directory database Answer: D QUESTION 134 You are the system administrator at Blue Moon Computers. The company has offices at Atlanta, Denver, and Houston. You created a forest with root domain at Atlanta and child domains at Denver and Houston for controlled administration in the organization. However, the centralization of administration increases the workload on the system administrators at each office. This occurs due to a number of problems, such as sharing of resources, resetting passwords, and allowing permissions to printers. For this, you decide to de-centralize the control of organization. Identify the optimum option to perform the given task. A. You create Atlanta.BlueMoon.com as root-domain and Denver.Atlanta.BlueMoon.com and Houston.Atlanta.BlueMoon.com as child domains and inheirt permissions B. You create Accounts, HR, and Marketing OUs in each office and assign Group Policies and administrative rights to users at an OU level. C. You create Accounts, HR, and Marketing OUs in each office and delegate the administration to individuals that require the autonomy to manage their own resources and data.

D. You create Accounts, HR, and Marketing OUs in each office. You hide certain objects within an OU from certain users for security purpose. Answer: C QUESTION 135 Which component of the Active Directory infrastructure provides universal group membership information to a domain controller when the user logs on to the network? A. Forest root domain B. Tree root domain C. Domain controller D. Global catalog Answer: D QUESTION 136 Which of the following protocols should be used if highest level of security is required for a VPN connection? A. L2TP/IPSec B. PPTP C. PPP D. UDP Answer: A QUESTION 137 You are the system administrator at Blue Moon computers, Dubai. You need to provide a work area to each user where the users can store their files and required software safely. For this, you need to create separate user accounts for each user that would enable the users to log on to the network as well as on local computer to access their resources. Which type of user account would you prefer to create for each user? A. Built-in user account B. Computer account

C. Local user account D. Domain user account Answer: D QUESTION 138 Consider the following statements: Statement A: A certificate cannot be revoked before the end of its validity period. Statement B: CRL includes policies for revocation of certificates. Which of the following is true about the above statements? A. Statement A is incorrect while statement B is correct. B. Both statements A and B are correct. C. Statement A is correct while statement B is incorrect. D. Both statements A and B are incorrect. Answer: D QUESTION 139 What is the next step you should take after defining the scope of threat prediction? A. Predict the threats B. Create a skilled team to analyze vulnerabilities. C. Document the threats identified D. Model the threats Answer: B QUESTION 140 You are the system administrator at Countryside Markets that deals in cosmetics products. The company has launched its new cosmetics products. Therefore, the business manager of the company wants to advertise about its newly launched product and needs to send the updated rates of cosmetics products through an e-mail message to the registered customers of the company. Therefore, the Business Development Manager wants to create a group that enables him to send a common e-mail message to all the users of that group, rather than sending the same e-mail message to individual users. How will you perform the given task?

A. By creating a universal group B. By creating a distribution group C. By creating a security group D. By creating a global group Answer: B QUESTION 141 You are the system administrator at Global Systems, Inc. You are assigned the responsibility to verify the performance parameters of the Active Directory infrastructure design. This is required in order to reduce the risk of damaging the structure of the organization network. You also want to improve the Active Directory infrastructure design by verifying the infrastructure on the model of the organization network. Which option will you use to perform the given task? A. Analyzing the technical environment of the organization B. Analyzing the business environment of the organization C. Gathering the design team D. Examining the Active Directory infrastructure design in the test environment Answer: D QUESTION 142 Which tab in the Properties dialog box enables you to change the default name of the package and specify a support Uniform Resource Locator (URL)? A. Deployment B. Categories C. General D. Upgrades Answer: C QUESTION 143

You are the system administrator for the Redsky IT company.You have been told to delegate administration to different users in the organizations.what is the best way to delegate administration. A. assign permission B. Assign read permission as inheritance permissions C. assign full control to users D. define Ous Answer: D QUESTION 144 The Red Sky IT Systems deals in developing software for other companies. The company has several branches all over the world. All branch offices are connected with each other. The company is facing problems such as, loss of data and confidential information from the last few months. Therefore, the Red Sky IT Systems decides to protect its network from malicious hackers. Ed Young, a security designer has been assigned the task to identify the stages of the threat, which are the guidelines for an attacker who tries to attack the network security of an organization. After identifying the stages, Ed is required to counter each stage of attack implementing security measures. Ed has noticed that the attackers are trying to access the network by gaining administrative rights. This problem is due to default network security settings. In which stage of the threat should Ed Young implement the security measures? A. Exploit B. Elevation of privilege C. Cover-up D. Footprint Answer: B QUESTION 145 Jim Lewis is working as the system administrator at Global Systems Inc. Jim has created a multidomain Active Directory forest in his organization. Jim has assigned the domain namingl operation master roles to the first domain controller in the forest. The company has asked Jim to add another domain to the Active Directory forest but he is unable to add the domain to the forest. How can Jim solve this problem? A. By transferring the domain naming master role to another domain controller.

B. By seizing the domain naming master role from the current domain naming master and assigning the domain naming master role to another domain controller. C. By transferring the Relative Identifier (RID) master role to another domain controller. D. By transferring the Infrastructure master role to another domain controller. Answer: A QUESTION 146 Which Active Directory System Monitor counters display the total numbers of bytes or objects processed per second? A. Performance counters B. Ratio counters C. Accumulative counters D. Statistic counters Answer: D QUESTION 147 The Blue Moon Computers deals with the computer hardware products. The company has allowed its clients to access the database. However, the organization does not want to expose all the information in the database to the client. Also, the organization wants to give its clients only read permissions. Therefore, the management has appointed Donna Bard as a security designer to secure the access to the database of the organization. Donna is instructed to take care that only authenticated users have access to the database. She is also required to keep the database of Blue Moon Computers safe from malicious users who keep trying with various possible passwords to get the correct password. Which mitigation techniques should Donna Bard use to secure the database? A. Least privileges, Auditing and Authentication B. Secure communication and Authorization C. Authorization and Auditing D. Authorization, Auditing and Secure communication Answer: A QUESTION 148

Tom Wilkins is working as the Network Administrator at Global Systems Inc. The employees of the company use a Windows Server 2003 based LAN. Tom has configured a file server on the network to facilitate backup and recovery operations. However, the file server has been moved to a location, which is at some distance from Tom's workstation. Therefore, Tom needs to administer the file server remotely. Tom needs to perform the following operations on the file server: Restart the system Troubleshoot the system Modify Basic Input Output System (BIOS) configuration. How can Tom perform this task? A. By using emergency management system components. B. By using remote installation services. C. By securing the administrative channels. D. By using Remote Desktop services. Answer: A QUESTION 149 Jim Lewis is working as the Network Engineer at Safest Software Co. The organization has outsourced some of its business processes to Global Systems Inc. A wireless network based on 802.11a standard exists between the two companies. The employees of the two companies frequently exchange data using the wireless network. Safest Software Co. is currently working on a project, which requires it to secure the information exchanged with Global Systems Inc. The management of Safest Software Co. has asked Jim Lewis to ensure that the information exchanged with Global Systems Inc. is secure. How can Jim perform this task? A. Configuring the wireless network using the 802.11i standard B. Using EAP-TLS protocols C. Using Wired Equivalent Privacy (WEP) protocol D. Configuring the wireless network using the 802.11x standard Answer: C QUESTION 150 Consider the statements: Statement A: A user account is an object that authenticates the identity of a user when a user logs on to Windows Server 2003. Statement B: A user account contains the logon information of the user, such as username and password. Which of the following is true, with respect to the above statements? A. Both, statements A and B, are false.

B. Statement A is true and statement B is false. C. Statement A is false and statement B is true. D. Both, statements A and B, are true. Answer: D QUESTION 151 Ed Young is working as the System Administrator at Blue Moon Computers. The company has asked him to take regular backup of the files and folder created by the users. Ed Young has configured a file server to implement the backup and recovery operations efficiently. He also needs to store encrypted files on the file server to provide data security. Ed Young needs to design server side storage for EFS to store encrypted files on the file server. While designing the server side storage for EFS, which aspect should Ed Young consider? A. Securing back-up data media B. Using local profile on the server C. Designing backup and recovery procedures D. Securing data transport Answer: B QUESTION 152 Consider the statements: Statement A: The directory service log command-line tools such as Ntdsutil.exe, Dcdiag.exe, and Netdiag.exe enable you to troubleshoot Active Directory installation and removal. Statement B: The directory service log command-line tools such as Dsastat.exe and Ldifde.exe enable you to troubleshoot Active Directory installation and removal. Which of the following is true, with respect to the above statements? A. Both, statements A and B, are false. B. Statement A is true and statement B is false. C. Statement A is false and statement B is true. D. Both, statements A and B, are true. Answer: B QUESTION 153

You are working as a network administrator at Good Graphics, Inc. Good Graphics, Inc. is a graphic animation organization that has an existing network infrastructure, which is using Windows Server 2003 Active Directory services. Ken Burton, the assistant network administrator tells you that he is facing a problem while logging on to the network. Ken also tells that he has seen an error message in the System log of the Event Viewer console. Which command will you use to solve this problem? A. Ntltest.exe B. Repadmin.exe C. Netdom.exe D. Gpresult.exe Answer: C QUESTION 154 Corrine Wallace is working as a network consultant at Mastery Mechanics. Mastery Mechanics is an auto parts manufacturing company with a large network spanning across three cities: New York, Atlanta, and Chicago. The company has a network that is using Windows Server 2003 Active Directory services. Three days ago, Corrine performed Active Directory database compaction to save hard disk space. Mary Peterson, the head of the Sales department complains that the database transaction is taking more time than earlier for the last three days. What can Corrine do to decrease the database transaction time? A. Restore the Active Directory database B. Format the server hard disk and configure Windows Server 2003 Active Directory on the server C. Restore computer files and settings D. Demote the server and then promote it using the Dcpromo.exe Command Answer: A QUESTION 155 Blue Valley Consulting has two branches at Chicago and Paris. John, the system administrator at the Chicago branch has configured Active Directory replication between the sites of the two offices. You have been newly appointed as the assistant system administrator at the Chicago branch. The company has asked you to ensure that services provided by the Active Directory are always available to the users. Therefore, you need to monitor Active Directory and view the

current as well as previous information about how users and computers have used the Active Directory services. How can you accomplish this task? A. Viewing the directory service log file B. Using the Repadmin tool C. Using the Active Directory Sites and Services console D. Using the Performance console Answer: D QUESTION 156 Steve Irving, the Domain Administrator, at Red Sky IT Systems, needs to assign the administrative duties to the system administrators of the newly set up departments, including Sales, Marketing, and IT. Steve has created Organizational Units (OUs) for the newly set up departments. He has selected some users and he needs to enable these users to access and control Active Directory objects. What step should Steve perform next in order to enable the selected users to access and control Active Directory objects? A. Create customized consoles for the selected users. B. Design object permission structure for the newly formed OUs. C. Design permissions for the Active Directory objects. D. Identify the groups that the selected users belong to. Answer: D QUESTION 157 You are the system administrator at Red Sky. You have decided to move database of 2500 user accounts to Active Directory. You have created a single domain structure for the company. The company needs to structure objects in the domain. To begin, you are planning to create the smallest structure to which GPO can be applied or over which administrative authority can be delegated. What specific structure would your plan propose in the given problem? A. A domain B. An administrative model C. A subnet

D. An OU hierarchy Answer: D QUESTION 158 Corrine Wallace is working as the System Administrator at Red Sky IT Systems and has configured a Windows Server 2003 based network in his company. However, he has not implemented any security mechanism to protect the network. The company has asked Corrine to ensure that only authorized users are permitted to access the files and folders. For this, Corrine needs to design an access control model and also needs to ensure that the applications run by a user have the same set of permissions as granted. Which principle should Corrine use to perform this task? A. Administrative privileges B. User-based authentication C. Discretionary access control D. Inheritance of permissions Answer: B QUESTION 159 Larry Williams is the System Administrator at Supersoft2000, which is working on a confidential project. The LAN of the company is based on Windows Server 2003 platform and is not fully secure. The company has asked Larry to ensure that only authorized users are permitted to access the files and folders. Therefore, Larry needs to design an access control model. He also needs to ensure that all the files contained in the My Documents folder of the users have the same permissions as that of the My Documents folder. Which principle should Larry use to perform this task? A. Inheritance of permissions B. User-based authentication C. Discretionary access control D. Administrative privileges Answer: A QUESTION 160

David is appointed as the System Administrator in Global Systems Inc., M an international call center. The call center employees of the need to frequently exchange data with the Customers. David needs to set up a wireless network to facilitate the exchange of data. It is required rng wireless network connection has a speed of 54 mega bits per second (Mbps) and supports a radio frequency of 2.4 gigahertz (GHz). David cng needs to use Temporal Key Integrity Protocol (TKIP) and Extensible Authentication Protocol (EAP). What will you meet the requirements of due to Global Computers Ltd? A. Use open system authentication B. Use WiFi Protected Access (WPA) C. Use Wired Equivalent Privacy (WEP) D. Use shared key authentication Answer: B QUESTION 161 Which Active Directory System Monitor object used for monitoring active directory? A. DNS B. NTDS object C. processor D. Server object Answer: B QUESTION 162 The Blue Moon Computers wants to provide security to the network from the malicious users and hackers. The company has identified security threats and created a team to analyze the threats. The company wants to implement a proper strategy to manage risks to network security to avoid losses due to the risks. Before creating a risk management strategy, all the assets of network are identified and secured properly. The company has appointed Jim Lewis to perform the task of managing risk, which involves performing qualitative and quantitative analysis of risks. Jim has calculated the ALE of a risk to an asset and compared it with the value of the asset. Now, after quantitative analysis he is required to plan the management of the risk. Therefore, Jim Lewis has used Antivirus software to protect the asset. Which strategy did Jim Lewis apply to manage the risk? A. Avoid

B. Mitigate C. Accept D. Transfer Answer: A QUESTION 163 The failure of which master prevents you from making changes in your password? A. Infrastructure master B. RID master C. Domain naming master D. PDC emulator master Answer: D QUESTION 164 Which command-line tool performs a series of tests to determine the state of network clients? A. Nltest.exe B. Ntfrsutl.exe C. Netdiag.exe D. Netdom.exe Answer: C QUESTION 165 Which of the following is a predefined security template provided by Windows Server 2003? A. Compat.inf B. Hisecws.inf C. Root.inf

D. Secure.inf Answer: B QUESTION 166 You are the system administrator at Safest Software Co. You are assigned the task of implementing Active Directory in a network. Before implementing, you need to create a plan for the Active Directory infrastructure. For creating the Active Directory infrastructure design, you need to gather design tools. What will be the sequence of steps in the design process for collecting the design tools? Analyzing the business environment of the organization. Examining the Active Directory infrastructure design in the test environment. Gathering the design team. Analyzing the technical environment of the organization. A. 2, 1, 4, 3 B. 2, 3, 4 C. 4, 3, 2, 1 D. 3, 1, 4, 2 Answer: D QUESTION 167 Which is the third step in creating a site topology plan? A. Defining the replication plan B. Placing the global catalog servers in a forest C. Defining sites D. Deciding the placement of domain controllers Answer: A QUESTION 168 Don is the System Administrator at Global Systems Inc. and has configured a Windows Server 2003 based network in his company. However, he has not implemented any security mechanism to protect the network. The company has observed that some confidential files have been modified. The company has asked Don to ensure that only authorized users are permitted to access the files and folders. How can Don perform this task?

A. By designing access control model B. By designing a permissions structure for files and folders C. By designing an EFS policy D. By implementing permission inheritance Answer: A QUESTION 169 Which parameter of the repadmin.exe command enables you to specify a user as the administrator? A. /u: domain\user B. /ldap C. /rpc D. pw:{password|*} Answer: C QUESTION 170 Jim Lewis, the Network Administrator at Global Systems Inc. has set up a wireless communication network to facilitate the organization and its clients the between the. The wireless network was set up using the 802.11a standard and it was efficiently supporting the communication needs. Recently, the company has observed that data is being modified during three days Confidential transmission. Therefore, Jim needs to implement enhanced encryption and authentication techniques in the wireless network. How can Jim Perform this task? A. Using 802.1x protocol. B. Deploying firewall on wireless client computers. C. Using WiFi Protected Access. D. Using baseline security templates. Answer: C QUESTION 171

What will be the first step in the design process for collecting the design tools? A. Gathering the design team B. Building a design based on the requirements C. Analyzing the requirements D. Testing the design Answer: A QUESTION 172 Larry Williams is working as the System Administrator at Red Sky IT Systems. Larry has configured a Windows Server 2003 based LAN in the company and has implemented all the network services provided by Windows Server 2003. Larry has also configured a file server to facilitate backup and recovery operations. Recently, the file server has been placed at a location away from Larry's workstation. Therefore, Larry needs to manage the file server remotely. How can Larry perform this task? A. By using special administration console. B. By using emergency management system components. C. By using remote management console. D. By using remote installation services. Answer: B QUESTION 173 Helen is working as a system administrator at IBG Inc. You have recently installed Windows Server 2003 and have configured Active Directory in the network of the organization. In the network, Helen has created a domain for the accounts department. Helen needs to manage the access of the domain. Which service does Helen need to implement to perform the task? A. Service Management B. Transitive trust C. Event Viewer console D. Access Control Lists

Answer: D QUESTION 174 Zina is working as the System Administrator at Blue Valley Consulting. She has configured a Windows Server 2003 based LAN in the company. However, she has not implemented any security mechanism to make the LAN secure. She has recently observed that the network server has been attacked using an administrator account. Therefore, she needs to limit the effect of administrative attack by implementing administrative security boundaries. How can she perform this task? A. By reducing the resources managed by the administrators. B. By using emergency management system components. C. By analyzing the proposed security design. D. By using special administration console. Answer: C QUESTION 175 Don Allen works as a network administrator at the head office of Technology Systems. The company is selling its products through a network of distributors. To reduce the cost of selling computer parts, the company decides to directly sell the computer parts to the end user through an e-commerce Web site. The e-commerce Web site is hosted at the company's Web server at Atlanta. In order to purchase a product from the Web site, a user has to register itself with the Web site. The company wants to secure the network and identify the security threats to the various resources of the network. Therefore, Don is required to plan the management of risk to an asset, which includes creating risk management strategy and contingency plans. Don has calculated that ALE of a risk to an asset is more than the value of the asset. Now, he wants to apply a strategy to mitigate the risk. Which strategy should Don Allen implement? A. Accept B. Avoid C. Mitigate D. Transfer Answer: B QUESTION 176

Steve is working as the Web Administrator at Global Systems Inc. Steve has created an ecommerce Web site for his organization and hosted it on an IIS server. The company has launched a new product and wants to advertise it on the Web site. However, the company has asked Steve to ensure that only selected customers are allowed to view the latest product. The company has also asked Steve o configure the Web server so that selected customers can access the organization's Web site using any Web browser. How can Steve perform this task? A. Using the SSL authentication method B. Using the Windows integrated authentication method C. Using the basic authentication method D. Using the anonymous authentication method Answer: C QUESTION 177 Which option provided by RSoP Wizard in the planning mode enables you to simulate the effect of the RSoP when a subnet is changed? A. Slow network connection B. Alternate user and computer location C. Loopback processing D. Site name Answer: D QUESTION 178 ABC Books is a publication company with its head office at Atlanta. You are working as a system administrator at the company. The company has an existing network infrastructure with Windows Server 2003 Active Directory services implemented. Steve Irving, the head of the research department also has network administration rights and is using the Server01 domain controller. The company has recruited five new employees in the Research department. You have created user accounts for the new employees under the Research OU on the Server02 domain controller. In your absence, Steve deleted the OU named Research and created an OU named RD from the domain controller on which he works. When you returned, Steve told you that he deleted the Research OU and created the OU named RD. Steve also told you that there was no user in the Research OU when he deleted the OU. What is the most possible cause of this problem?

A. Server02 is offline B. Replication delay C. Corrupt Active Directory database D. Improperly linked Group Policy Answer: B QUESTION 179 Consider the following statements: Statement A: PEAP-EAP-MSCHAPv2 protocol should be used in those organizations that do not require certificate infrastructure for 802.11 networks. Statement B: PEAP-EAP protocol should be used when the wireless client computers of a 802.11 network belong to a domain. Which of the sau about the above statements is true? A. Statement A is correct while statement B is incorrect. B. Statement A is incorrect while statement B is correct. C. Both statements A and B are incorrect. D. Both statements A and B are correct. Answer: C QUESTION 180 server can be configured as RADIUS server, RADIUS proxy, or both. A. DNS B. IAS C. IIS D. WINS Answer: B QUESTION 181 Identify the Microsoft Management Console (MMC) that performs the function of RID master role.

A. Active Directory Sites and Services B. Active Directory Schema C. Active Directory Domains and Trusts D. Active Directory Users and Computers Answer: D QUESTION 182 Which command is included in the directory service log command-line tools to troubleshoot Active Directory installation and removal? A. Dsacls.exe B. Repadmin.exe C. Ntdsutil.exe D. Dfsutil.exe Answer: C QUESTION 183 Which of the protocols can be used to sau nhp data integrity? A. IP B. MD5 C. AH D. ESP Answer: B QUESTION 184 You are appointed as the System Administrator at BlueMoon Computers Inc. To fulfill the business requirements of BlueMoon computers Inc. you are required to setup a wireless network. You are required to implement authentication mechanisms in the wireless network, which uses the existing infrastructure such as the systems that operate on Windows XP, Windows 2000, and Pocket PC. In addition to the above requirements you are also presented with the following

information: PKI will not be deployed Budget funds are scare IT personnel are scare The confidentiality of the information to be transferred is average What will you do to set a wireless network for BlueMoon Computers Inc., which satisfies the above requirements? A. Use certificate revocation B. Use EAP-TLS protocol for providing authentication C. Use PEAP-EAP-MSCHAPv2 protocol for providing authentication D. Use EAP-MD5 protocol for providing authentication Answer: C QUESTION 185 You are the system administrator at Safest Software Co. You are assigned the task to organize objects and information over a network. The users find it difficult to locate the information over a network, as it is scattered in different directories. You are also assigned the responsibility to integrate information from various directories into a centralized location over a network You need to access and control objects from a single location. You also want to resolve network issues that are created due to redundant storage of information. Which option will you use to implement the given task? A. IBM-Tivoli directory service B. Active Directory C. Novell Directory Service D. Microsoft Metadirectory Services Answer: D QUESTION 186 Which type of permission provides the Full Control access to modify permissions and acquire ownership of an object? A. Inheritance permission B. Special permission C. Effective permission D. Standard permission

Answer: D QUESTION 187 Consider the following statements: Statement A: A clandestine user gains control of a system and modifies data on it. Statement B: A misfeasor gains illegal access to an account. Which of the sau about the above statements is true? A. Statement A is incorrect while statement B is correct. B. Statement A is correct while statement B is incorrect. C. Both statements A and B are correct. D. Both statements A and B are incorrect. Answer: D QUESTION 188 You are the system administrator at Blue Valley Consulting. The company has offices at Atlanta, Denver, and Houston. You have implemented logical structure to organize the objects in Active Directory. You decided to create domains for the Atlanta head office as Atlanta.BlueValley.com and child domains for the Denver and Houston branch offices as Denver.Atlanta.BlueValley.com and Houston.Atlanta.BlueValley.com. You want to delegate the entire task of network administration to network administrators of corresponding domains. You also want to create departments within each domain and delegate the task of that department to its corresponding network administrator. Which component of Active Directory will you use to perform the given task? A. You will create OUs within each domain that corresponds to respective departments. B. You will create domain controllers for each domain that corresponds to respective departments. C. You will create schema within each domain that corresponds to respective departments. D. You will create sites within each domain that corresponds to respective departments. Answer: A QUESTION 189 James works as a Network Administrator at RedSky Inc. The organization has a LAN, which is configured using Windows Server 2003 operating system. James has created a Web site for his organization that runs on an IIS server. The management has planned to display confidential information on the organization's Web site. Therefore, James needs to identify the users visiting the Web site using Kerberos authentication. How can James perform this task?

A. Using the anonymous authentication method B. Using the SSL authentication method C. Using the Windows integrated authentication method D. Using the basic authentication method Answer: C QUESTION 190 Technology Systems is an IT enabled services provider company with its head office at Chicago. The company has two branch offices at Atlanta and Denver. You are working as a network engineer and Christine Turner is working as an assistant network engineer at the Chicago office. Due to some hardware problem, Christine could not back up the data stored on the server and had to format Server2. An error message appears indicating that Server2 already exists when Christine tries to install a domain controller to replace Server2. Which command would help Christine to remove the references of Server2 from other domain controllers in the network? A. Movetree.exe and ADSIEdit.msc B. Netdom.exe and Ntdsutil.exe C. Netdiag.exe and Ntdsutil.exe D. ADSIEdit.msc and Dnsmgmt.msc Answer: D QUESTION 191 Corrine Wallace is working as the Network Administrator at Blue Moon Computers. Corrine has configured a Windows Server 2003 based LAN and has implemented security mechanisms to secure the LAN. Corrine needs to update the network security to keep it secure against network security threats. Corrine needs to deploy security patches using Security Update Services (SUS) server. Corrine needs to design the security update strategy to secure the SUS server. For this, Corrine has identified the changes that require updating the security of the LAN. What should Corrine do to design the security update strategy? A. Use Automatic Update B. Use custom scripts C. Use Windows Update

D. Use Group Policy Answer: B QUESTION 192 You are working as a system administrator at Countryside Markets. The management has asked you to centralize the network administration in the organization. To centralize the network administration for Countryside Markets, you have implemented Windows Server 2003 Active Directory infrastructure in the network. Now, employees are complaining that they are facing connectivity problems. You notice that the problems are occurring while registering with DNS service. What can be the possible cause of the problem? A. Active Directory database is corrupt B. Folders are not redirected C. Active Directory database size has increased D. DNS record not exist Answer: D QUESTION 193 Which tool you need to use along with Group Policy to handle software deployment on a large scale with computers running pre-Windows 2000 operating systems? A. RSoP B. SMS C. Software Distribution Point (SDP) D. Software Installation extension Answer: B QUESTION 194 Blue Moon Computers is a computer manufacturing company. The company has implemented a network, which is using Windows Server 2003 Active Directory services. Company OU is the OU at the top level in the hierarchy and the IT OU is at the next level in the OU hierarchy. David tells you that he applied the startup and logon scripts, which include writing news, executing external programs and mapping network drives. These scripts contain commands to delete the drive mappings. The logon and startup scripts are running at every OU in the domain

synchronously. David created an IT Service OU under the IT OU. David tells you that he need to block the script at the Ous. What can be the possible solution to this problem? A. Copy the Group Policy to the OUs in the lower level in the OU hierarchy and block the inheritance B. Force inheritance of the upper layer Group policy C. Move the logon script to a different location D. Disable the policy running the logon scripts synchronously Answer: D QUESTION 195 Jim Lewis is the system administrator at the Paris branch of Red Sky IT Systems Inc. The company has another office at New York. Jim has configured replication between the domain controllers placed at the two offices, but now he observes that the application directory partition is not being replicated to the domain controller placed at the Paris branch. Therefore, Jim needs to view the replication topology generated by each domain controller. Which tool should Jim use to perform the tasks? A. System Monitor B. Repadmin C. Ndsutil D. Replmon Answer: B QUESTION 196 Which operations master role enables a domain controller to update the group-to-user references whenever the members of the groups change? A. BDC emulator role B. Primary Domain Controller (PDC) emulator role C. Relative Identifier (RID) master role D. Infrastructure master role

Answer: D QUESTION 197 Debbie Howe is redesigning the Active Directory domain structure for Red Sky. Red Sky recently had a merger with Blue Moon Ltd. Red Sky has a domain named RedSky.com, which resides on a domain controller running on Windows Server 2003. Blue Moon has a domain named bluemoon.com residing on a domain controller running on UNIX. The employees in Red Sky need to access resources from Blue Moon, therefore you decide to create a one-way trust relationship between redsky.com and BlueMoon.com. Which type of trust relationship should you create? A. Shortcut B. Forest C. External D. Realm Answer: D QUESTION 198 Tina Mathew is working as the system administrator at Blue Sky IT Systems. The organization has recently opened a new office for its sales and marketing department in Chicago. The management of Blue Sky IT Systems has assigned Tina Mathew the task of establishing the network of the office in Chicago and configure a directory service in the network. However, the management has asked Tina Mathew to implement a directory service, which stores information about network resources, such as network devices and users and provides information of specific network users. Which directory service should Tina Mathew implement to fulfil the requirement of the management? A. Active Directory B. IBM-Tivoli directory service C. Microsoft Metadirectory Services (MMS) D. Novell Directory Service (NDS) Answer: D QUESTION 199 the arguments that can be passed with the repadmin.exe command?

A. /u: domain\user B. /rpc C. /ldap D. Command arguments Answer: D QUESTION 200 Which is the third stage in the process of creating INVOLVED the Active Directory infrastructure design? A. Creating a domain plan B. Creating an OU plan C. Creating a site topology plan D. Creating a forest plan Answer: B

You might also like