Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 10. Practice Exam 1

Chapter 10. Practice Exam 1

1.You have one server at the corporate office and a server at each of the two remote sites. You want to configure the Event Logs subscription at the corporate office to collect events from the other two servers. What do you need to do?

A.Create an event collector subscription configuration file named subscription.xml. Then run the wecutil cs subscription.xml command on the server1.
B.Create a custom view on server1. Then export the custom view to a file named subscription.xml. Then run the wecutil cs subscription.xml command on server1.
C.Create an event collector subscription configuration file named subscription.xml. Then run the wecutil im subscription.xml command on server1.
D.Save the configuration from the ForwardedEvents.log and save it as subscription.xml. Then run the wecutil cs subscription.xml command on server1.


2.You have a computer with Windows Server 2008 Server Core installed. You need to configure the server to point to 172.24.1.10 as the preferred DNS server. What should you do?

A.Open the Network and Sharing Center. Click Manage Network Connections. Double-click the network card and open the TCP/IP properties. Change the DNS to point 172.24.1.10.
B.Execute the netsh interface ipv4 add dnsserver “LAN” static 172.24.1.10 index=1 command.
C.Execute the ipconfig /dnsserver:172.24.1.10 index=1 command.
D.Execute the netsh interface ipv4 set address name “LAN” source=static address=172.24.1.10 command.


3.You have a server that runs the Server Core installation of Windows Server 2008. The server runs the DHCP server role and the DNS server role. How would you configure the server to use Server2 (IP address 192.168.0.254) as the preferred DNS server?

A.Execute the netsh interface ipv4 set dnsserver “LAN” static 192.168.0.254 primary command and the netsh interface ipv4 set dnsserver “LAN” static 192.168.0.1 commands.
B.Execute the netsh interface ipv4 set address name="Local Area Connection" source=static address=192.168.0.254 mask=255.255.255.0 gateway=172.24.1.1 command.
C.Execute the netsh interface ipv4 Name="Local Area Connection" add 192.168.0.254 255.255.255.0 gateway=172.24.1.1 command.
D.Execute the netsh interface ipv4 add dnsserver “LAN” static 192.168.0.254 index=1 command.


4.For your company, you have decided to segment your class B address. The location has three buildings and each building contains no more than 175 unique hosts. You want to make each building its own subnet, and you want to utilize your address space the best way possible. Which subnet mask meets your needs in this situation?

A.255.0.0.0
B.255.255.255.0
C.255.255.0.0
D.255.255.255.240


5.You want to send packets to a group of PCs but you want only one PC to respond. Which kind of address would you use?

A.Unicast
B.Broadcast
C.Multicast
D.Anycast


6.What can be said about the address 224.20.0.20?

A.Because it starts with 224, it is a class B address with a subnet mask for 255.255.0.0.
B.Because it starts with 224, it is a class C address with a subnet mask for 255.255.255.0
C.Because it starts with 244, it is a class D address used for multicasting.
D.It is a reserved address that is used for broadcast all class C addresses.


7.You have several Windows Server 2008 computers that act as DNS servers. You make changes on the primary DNS server. You want the secondary DNS servers to be updated immediately. What should you do?

A.Run the dnscmd /ZoneUpdateFromDs command on the other servers where the change was made.
B.Run the dnscmd /ZoneUpdateFromDs command on the server where the change was made.
C.Decrease the Minimum (default) TTL option to 15 minutes on the Start of Authority (SOA) record for the zone.
D.Run the dnscmd /zonerefresh command on the other servers where the changes were made.


8.You have two Windows Server 2008 computers with DNS. Server1 handles your external DNS for your corporation and Server2 handles your internal DNS for your corporation. The users of your corporation use Server2 as their primary DNS server. Server2 then forwards requests to Server1. You find a problem with your external DNS and you therefore make the appropriate changes on Server1 to correct the problem. However, the internal users cannot see the new IP address assigned to the problem hostname. What should you do?

A.Run the dnscmd /clearcache on Server1.
B.Run the dnscmd /clearcache on Server2.
C.Run the ipconfig /flushdns on Server1.
D.Run the ipconfig /flushdns on Server2.
E.Run the ipconfig /flushdns on the workstation.


9.You have a primary DNS server hosted at your corporate office. You also have several secondary DNS servers hosted at your various remote sites. You need to minimize DNS zone transfer traffic over the WAN links. What should you do?

A.Decrease the Retry Interval setting in the Start of Authority (SOA) record for the zone.
B.Decrease the Refresh Interval setting in the Start of Authority (SOA) record for the zone.
C.Increase the Retry Interval setting in the Start of Authority (SOA) record for the zone.
D.Increase the Refresh Interval setting in the Start of Authority (SOA) record for the zone.


10.You have a server application that will be placed on a Windows Server 2008 member server. This server is not a member of the corporate domain. Users will access the server application by running a client application that will access the server. However, when the users run the client connection, it fails frequently. You discover that it has no problem converting from the hostname to the IP address but has problems converting from the IP address to the hostname. What do you need to do?

A.On each client computer, add a HOSTS file entry for the application server.
B.Create a host (A) record for the application server.
C.Create a pointer (ptr) record for the application server.
D.Modify each client computer to use the application server as the primary DNS server.


11.You are the administrator for your domain. You have two DNS servers. Server1 handles your external DNS and Server2 handles your internal DNS. You discover your email server is not receiving email from the Internet. What do you need to do?

A.Make sure that you have an MX record for your mail server on Server1.
B.Make sure that you have an MX record for your mail server on Server2.
C.Make sure that you have an SRV record for your mail server on Server1.
D.Make sure that you have an SRV record for your mail server on Server2.


12.You have a Windows Server 2008 computer called Server1 configured as a DNS server. You have a VPN connection to a partner company. The partner company has a DNS server called Oscar. You decide to create a stub zone on Server1 for the partner domain. However, when Oscar fails, users cannot perform name resolution for the partner website. What can you do?

A.Change the stub zone to a primary zone on Server1.
B.Change the stub zone to a secondary zone on Server1.
C.Open the SOA record for the stub zone. Change the Minimum (default) TTL setting to 12 hours.
D.Increase the TTL for the SOA on Oscar.


13.You have a Windows Server 2008 computer with a DNS secondary zone. You need to reconfigure the server as a caching-only DNS server. What should you do?

A.Uninstall and reinstall the DNS role.
B.Change the DNS zone to a stub zone.
C.Delete the zone and re-create the zone.
D.Change the zone type to a caching-only DNS zone.


14.You are the network administrator for your company. All servers are running Microsoft Windows Server 2008. The network currently consists of a single subnet. You need to subnet the existing network to optimize network traffic. You plan to use a class C network ID of 192.168.0.0. The network will be subdivided into 12 different subnets. There may be future plans to add an additional 2 subnets. Which subnet mask should you choose?

A.255.255.255.224
B.255.255.255.240
C.255.255.255.248
D.255.255.255.252


15.You have several Windows Server 2008 computers that host your Active Directory domain acme.com. Your clients receive their IP addresses from a DHCP server. You decide to create a second DHCP server. You therefore configure the servers using the 80-20 rule. You have a workstation called XPPR that needs to have a DHCP reservation. What should you do?

A.Run the ipconfig /renew command on XPPR.
B.Run the netsh add helper command on XPPR.
C.Add the DHCP reservation for XPPR to both DHCP servers.
D.Add a host record to the DNS server for the XPPR host.


16.You are the network administrator for your company. All servers are running Microsoft Windows Server 2008. You have been using Network Monitor to capture and analyze DHCP-related traffic. You notice a large amount of traffic from IP address lease requests, and the frequency of the requests is high. You verify that there are more IP addresses in the scope than DHCP clients on the network. You want to reduce network traffic. What should you do?

A.Configure half of the clients with static IP addresses.
B.Increase the lease duration for the scope.
C.Configure another DHCP server on the network.
D.Add a DHCP relay agent to the network.


17.You have a configured DHCP scope to hand out IP configuration to the DHCP addresses. By default, how long does it wait before it attempts to renew its lease?

A.Four hours
B.Eight hours
C.Three days
D.Four days
E.Eight days


18.You have a computer running Windows Server 2008. You need to configure the printer to support both Windows and UNIX users. What you need to do?

A.Install the Line Printer Daemon (LPD) Services role service on SRV1.
B.Configure the printers on SRV1 to use Line Printer Remote printing.
C.Install the File Server role on SRV1 and activate the services for the NFS Role Service option.
D.Install the Subsystem for UNIX-based Applications role on the SRV1.


19.You have multiple print servers. You decide to use the Print Management console to manage your print servers. You need to send automatic notification when a printer is not available. What should you do?

A.Configure an email notification for the Printers with Jobs printer filter.
B.Configure an email notification for the Printers Not Ready printer filter.
C.Enable the Show Informational Notifications for Local Printers option on the print servers.
D.Enable the Show Informational Notifications for Network Printers option on the print servers.


20.Which of the following authentication protocols send information in clear text?

A.PAP
B.EAP
C.MS-CHAP
D.SPAP


21.Which authentication method would you use to create an encrypted channel between an 801.11 wireless client computer and a RADIUS server?

A.PAP
B.CHAP
C.MS-CHAP
D.PEAP


22.You are the network administrator for your company. All servers are running Microsoft Windows Server 2008. You discover that the IPSec policy configured for domain controllers is not behaving normally. You suspect that a configuration change was made by another administrator. You need to determine whether a change was made. What should you do?

A.Open the IP Security Monitor tool and select the Active Policy container.
B.Launch the Security Configuration and Analysis tool. Analyze the IPSec settings on the server.
C.Open the Windows Event Viewer and view the contents of the Security log.
D.Execute the ipsecpol command from the command prompt.


23.You are the network administrator for your company. All servers are running Microsoft Windows Server 2008. You are configuring IPSec between two servers in a workgroup. You assign Client (Respond Only) to each of the servers, but you notice that IP packets being sent between the two servers are not being secured. What is causing the problem?

A.Both are configured with the Client (Respond Only) policy.
B.IPSec can be used only with Active Directory.
C.One of the servers must be configured as an IPSec client.
D.The servers cannot be members of the same workgroup.


24.You have a Windows Server 2008 computer configured as a VPN server. When users trying to connect to your network using PPTP, they get the following error message:

Error 721: The remote computer is not responding

What do you need to do to overcome this problem?

A.Open port 443 on the firewall.
B.Open port 500 on the firewall.
C.Open port 1723 on the firewall.
D.Open port 1701 on the firewall.


25.You have a network with all servers running Microsoft Windows Server 2008. You need to implement Routing and Remote Access to enable users to access resources from other locations while still maintaining a high level of security. The company president needs to be able to access resources from his home office and other locations. You need to configure callback for the user accounts. What should you do?

A.Choose No Callback for the president’s account and Set by Caller for the other accounts.
B.Choose Set by Caller for the president’s account and No Callback for the other accounts.
C.Choose Always Callback To for the president’s account and Set by Caller for the other accounts.
D.Choose Set by Caller for the president’s account and Always Callback To for the other accounts.


26.You have Windows Server 2008 with the Network Access Protection (NAP) role installed. You want the NAP policies to enforce all wireless connections. What should you do?

A.Configure all portable computers to use PAP authentication.
B.Configure all portable computers to have the Security Center enabled.
C.Configure all access points to use 802.1X authentication.
D.Configure all portal computers to have the Windows Firewall enabled.


27.You have the domain-based DFS namespace called \\acme.com\data. The namespace hierarchy is updated frequently. How can you reduce the workload put on the PDC emulator?

A.Enable the Optimize for Consistency option.
B.Enable the Optimize for Scalability option.
C.Set the Ordering Method option to Lowest Cost.
D.Change the Ordering method option to Random Order.
E.Increase the cache duration.


28.You have a Windows Server 2008 computer with WSUS 3.0 installed. You want to make sure that the traffic is encrypted when administrators access the WSUS administrative website. What should you do?

A.Install a digital certificate and configure SSL encryption.
B.Configure WSUS to use MS-CHAP version 2.
C.Configure the WSUS folder to use EFS.
D.Require the server to use IPSec.


29.Which of the backups are available in Windows Server Backups? (Choose all that apply.)

A.Full backups
B.Incremental backups
C.Differential backups
D.Copy backups


30.Which group enables you to back up and restore all files even if they do not have NTFS permissions to the files and folders?

A.Power Users group
B.Replicator group
C.Backup Operators group
D.Authenticated Users group


31.What occurs if you move a file from one folder to another within the same NTFS volume?

A.The file retains its permissions.
B.The file inherits the permissions of the source folder.
C.The file inherits the permissions of the target folder.
D.The file permissions are lost.


32.You have a computer with Windows Server 2008. You have a folder called Data. Pat is a member of the Sales group and the Management group. The Sales group is given the Read NTFS permission to the Data folder and the Management group is given the Manage NTFS permission. The Pat user is not assigned any permissions. What is Pat’s effective permission for the files in the Data folder?

A.Read
B.Modify
C.Full Control
D.No permissions


33.You have a computer with Windows Server 2008. You have a folder called C:\Data. Pat is a member of the Sales group. The Sales group is given the Reader shared permission and the Full Control NTFS permission. What is Pat’s effective permission when he tries to access the C:\Data\report.doc document while sitting in front of the computer?

A.Read
B.Modify
C.Full Control
D.No permission


34.You have a laptop that will be used by the vice president of your company. You want to encrypt the C drive and all the data files in case the laptop is stolen. What should you do?

A.Use EFS.
B.Use BitLocker.
C.Use NTFS volume encryption.
D.Use NTFS permissions.


35.Which of the following is not part of the system state?

A.Registry
B.Boot files
C.The INI files for the various applications
D.The SYSVOL folder
E.IIS Metadirectory


36.What command can be used to run the Windows Server backups?

A.backup
B.ntbackup
C.sysbackup
D.wbadmin


37.You have a computer running Windows Server 2008. You have folder called C:\SalesData that contains confidential information. You want to make sure that when users are not connected to the network, the file is not available as an offline file. What do you need to do?

A.You can use group policies to stop this folder from being available offline.
B.Open the folder properties and select Offline Settings. Then specify that the folder is not available offline.
C.Open the folder properties and select Offline Settings. Set the cache to 0MB.
D.Remove the shared folder.


38.A printer has documents you cannot delete from the printer queue. What can you do?

A.Shut off and turn on the printer.
B.Restart the print spooler.
C.Delete the C:\Windows\Spooler folder.
D.Open the printer queue and select Clear Print Queue. Be sure to also select the Force option.


39.When you want to connect directly to a printer that is connected directly to the network, what do you have to do?

A.Install the printer as a local printer.
B.Install the printer as a network printer.
C.Install the printer as a remote printer.
D.Install the printer as a hybrid printer.


40.What command would you use to migrate printers from one Windows Server 2008 to another?

A.The printmig.exe command
B.The printbrm.exe command
C.The wbadmin.exe command
D.The print.exe command


41.How do you install WSUS?

A.Install it as a server role.
B.Install it as a feature.
C.Download it from Microsoft and install it.
D.Use Add/Remove Programs to install it from the Windows Server 2008 DVD.


42.Which of the following describes an unsolicited message sent by an SNMP agent to an SNMP management system when the agent detects that a certain type of event has occurred locally on the managed host?

A.SNMP trap
B.SNMP agent
C.SNMP community
D.SNMP MIB


43.You have a class B network that has been subnetted. Its subnet mask is 255.255.224.0. How many subnets can you have?

A.6
B.8
C.14
D.16
E.30


44.You have a subnet mask of 255.255.240.0. What is the CIDR for this subnet mask?

A.\20
B.\22
C.\24
D.\26


45.What allows multiple computers to share a single external IP address?

A.CIDR
B.NFS
C.NAT
D.IPv6


46.Ping and tracert use which protocol?

A.ARP
B.ICMP
C.TCP
D.UDP


47.To access a shared folder, you would use what?

A.UNC
B.FQDN
C.SOA
D.Root hint


48.How do you compress the WINS database?

A.Use the jetpack command.
B.Use the nbtstat command.
C.Use nslookup command.
D.Use the compress command.


49.Which resource record is used to translate a hostname to an IPv6 address?

A.A
B.AAAA
C.ptr
D.CNAME


50.What tool can you use to help you find a rogue DHCP server?

A.DHCP console
B.nslookup command
C.dhcploc command
D.jetpack command


 


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint