Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
QUESTION 704:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com consists of a file server named Certkingdom -SR40 that runs Windows
Server 2003. Certkingdom.com also contains crucial third-party applications, which
must be accessed by all the finance users of the main office and the branch offices.
You have received instruction to create a procedures document for Certkingdom.com
administrators. You need to define the recommended settings for each system
service that can be enables on a Windows Server2003 system. In a case of
emergency the service should be automatically restarted, if it fails more than three
times. You also setup the service to send a message to your computer if the service
failed. In the Property dialog box of a service has a number of Services consoles.
What could the services be?
A. The number of hours after which the fail account should be reset to zero.
B. Whether or not the Recovery attempt should be recorded in the System event log.
C. The number of minutes to wait before the service is restarted.
D. Whether or not the complete memory dump should be saved when the computer is
restarted.
Answer: C
Explaination: The Recovery tab of the Properties dialog box has the option to the
number of minutes to wait before the service is restarted.
Incorrect Answers:
A, B, D: You cannot configure the number of hours after which the fail account should
be reset to zero; or the whether or not the complete memory dump should be saved when
the computer is restarted, or whether or not the Recovery attempt should be recorded in
the System event log.
QUESTION 705:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com consists of a Marketing department. This department handles all the
financing and sales deeds. A Certkingdom.com user named Mia Hammis a member of
the Marketing department. Mia Hamm works on a client computer named
Certkingdom -SR30. One morning Mia Hamm complains that her hard disk has
failed. During the maintenance you then replace the hard disk and perform an
Automatic System Recovery (ASR) from a backup of her client computer.
Mia Hamm informs you that she still cannot connect to the domain. However, she is
able to connect to the domain from a coworker’s client computer. You receive an
instruction from the CIO to make sure that Mia Hammis able to connect to the
domain with Certkingdom -SR30 in order for her to do her duties.
What should you do?
A. Your first step should be to remove Certkingdom -SR30 from the domain.
Thereafter Certkingdom -SR30 can be rejoined to the domain.
B. To ensure that the user can log on to the domain the user account needs to be added to
the Administrators group on Certkingdom -SR30.
C. You should reset the computer account of Mia Hamm in Active Directory and
Computers to ensure that she will be able to log on to the domain.
D. Your best option would be to add the user account of Mia Hamm to the Power Users
group on Certkingdom -SR30.
Answer: A
Explaination: It is most probably the case that her password has expired. You need
to join the domain with Certkingdom -SR30. Doing this will allow the domain to
authenticate the computer. The password on the domain is regenerated
automatically when the computer rejoins the domain.
Incorrect Answers:
B, D: Mia Hamm does not belong either to the Administrators group or the Power Users
group. You cannot even access the computer with your user account as the administrator.
C: This method will not work properly. You should not reset computer accounts in the
Active Directory and Computers.
QUESTION 706:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com consists of two departments, named Research and Development. Half
of the client computers are in the Research department and the other half are in the
Development department. The Research department is a priority for Certkingdom.com
The client computers in the Research department run critical third-party
applications.
Certkingdom.com contains a server named Certkingdom -SR12 which hosts shared
folders named TestResDev for the Research department and Development
department. The users in the Research department and Development department
save their projects in Certkingdom -SR12 in TestResDev. The users are also allowed
to change the files or to undo the changes. To safeguard the files you implement
Shadow Copies support. Some of the users in both department complains that they
cannot access pervious version of there files. You need to ensure that the previous
versions are available to the users.
What should you do?
A. On all the client computers, enable Shadow Copies.
B. On all the client computers, install the Previous Versions client software.
C. On Certkingdom -SR12 configure disk quotas for all users.
D. On all the client computers, enable disk quotas.
Answer: B
Explaination: Shadow Copies provides periodic snapshots of shared folders on
specific volumes on hard disks.
Incorrect Answers:
A: You cannot do this, because the server side of this feature is not supported by the
client computers.
C, D: Disk quotas are used to limit the amount of disk space. This this not needed in this
scenario.
QUESTION 707:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com contains a Finance department. This department handles all the
marketing and sales deeds. It was requested of you to periodically perform
Automatic System Recovery (ASR) backups of all the servers in Certkingdom.com A
Certkingdom.com user named Andy Reid is a member of the Finance department.
Andy Reid works on a client computer named Certkingdom -SR10 which is
configured as a Certification Authority (CA). Certkingdom -SR10 contains two hard
drives, one hard drive named drive C consists of the operating system, and the other
hard drive named D consist of the CA database. The drive D of Certkingdom -SR10
failed and the CA database was lost.
During the maintenance you replaced the hard drive. You now need to replace the
lost data with the minimum of administrative effort. You receive an instruction
from the CIO to make sure that Certkingdom -SR10 continues to operate as a CA.
What should you do on Certkingdom -SR10?
A. To ensure that Certkingdom -SR10 continues to operate you need to boot from the
Windows Server 2003 installation CD.
Thereafter you can restore the ASR restore.
B. Your best option is to restart Certkingdom -SR10 in Directory Services Restore Mode.
Thereafter you can execute a non-authoritative restore of the CA database.
C. Your first step should be to restart Certkingdom -SR10 in Directory Services Restore
Mode.
Then you can execute an authoritative restore of the CA database.
D. Your best option would be to restore System State from the most recent ASR backup.
Answer: D
Explaination: This is a collection of files (System State) that contains the information
that is needed to rebuild an identical copy of the computer.
Incorrect Answers:
A: It is no need to ASR because the drive C which contains the operating system is not
damage.
B, C: You cannot start Certkingdom -SR10 in Directory Services Restore Mode, because it is
not a domain controller.
QUESTION 708:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all user
workstations run Windows XP Professional.
Certkingdom.com contains a Research department. The Research department is a
priority for Certkingdom.com The user workstations in the Research department run
critical third-party applications. The Research department is planning to open a
new technical line. The manager will use this line to alter any changes of the
complete product of the Research department. This will lead to frequent changes of
the related documents. The manager also needs the previous versions of the
products if it was changed.
Certkingdom.com contains a server named Certkingdom -SR21. Certkingdom -SR21
consists of three disks which host lots of shared folders. You are planning to host the
documentation of the technical lines share folder on this server. You receive an
instruction from the CIO to ensure that your answer does not entail the
maintenance the earlier versions of any other data only the documentation of the
new technical line.
What should you do?
A. To comply with the requirements of the CIO you need to allow shadow copies on the
user workstations.
B. Periodical backups need to be executed in order to comply with the requirements.
C. Your best option would be to create a share folder on a new volume on
Certkingdom -SR21 as well as enabling shadow copies.
D. The Previous Versions software needs to be deployed on Certkingdom -SR21 in order
to comply with the instruction of the CIO.
Answer: C
Explaination: Shadow Copies provides periodic snapshots of shared folders on
specific volumes on hard disks.
Incorrect Answers:
A: The user workstations run Windows XP Professional, shadow copies is new and
resides in Windows Server 2003.
B: You should perform periodic backups of all documentation. However these backup
would not be available immediately.
D: The Previous Versions software should be deployed on the user workstations not the
server.
QUESTION 709:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com contains a server named Certkingdom -SR44 which runs Exchange
2003. Certkingdom -SR44 also consists of proprietary financing applications. All the
Certkingdom.com users access their mail from this server. Certkingdom -SR44 is
configured with a 2.6 MHz CPU, 512 MB of RAM and two 74.5 GB hard disks.
Certkingdom -SR44 is connected to a LAN at 100 Mbps with a network adapter.
Certkingdom -SR44 supports 4,000 user mailboxes. Certkingdom -SR44 is continuously
used as users access their mail. A Certkingdom.com manager named Andy Booth
complains that his users struggle to open large e-mail messages, due to the slow
response of the server. You make use of System Monitor to view the results.
You receive an instruction from the CIO to identify the reason for the new response.
Which component should you identify?
A. A possible reason for the slow response time is the Network Adapter
B. The Processor is the possible cause for the slow response time.
C. The component causing the slow response is the Hard disk
D. The slow response time of the server is caused by the Memory.
Answer: D
Explaination: The memory reports an average of only 20 MB available. The value
should remain 5 % of the total system memory.
Incorrect Answers:
A, B: These counters do not indicate a cause of a bottleneck.
C: The hard disks are very busy. It should remain below 50 %. You should first check the
memory before you identify the hard disk as the source of the bottleneck.
QUESTION 710:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com has its headquarters in Chicago and a branch office in Miami.
Certkingdom.com contains a server named Certkingdom -SR33 which is configured as a
router. A new Certkingdom.com security policy restricts the use of streaming audio to
some of the users. Certkingdom.com consists of a Sales department in the branch office.
The managers in the branch office complain about the slow network response.
During an investigation you find that some users are controlling the available
bandwidth. You need to find out if the users are violating the Certkingdom.com security
policy. You also need to find out which users did receive those packets.
Which utility should you use?
A. You should make use of the Network Monitor utility to identify the users who violates
the security policy.
B. The IP Security Monitor should be used to identify the users who violaste the security
policy.
C. In order for you to determine which users violates the policy you need to make use of
the Replication Monitor utility.
D. You should consider making use of the System Monitor utility to determine which
users are at default.
Answer: A
Explaination: To capture network traffic, the System Monitor is used. You can filter
it so that it can meet the criteria that you are looking for.
Incorrect Answers:
B: The IP Security Monitor is used to monitor IPSec information. You cannot use it to
monitor network traffic.
C: This is used to monitor Active Directory replication.
D: The System Monitor is used to gather information about the CPU, Memory etc.
QUESTION 711:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com The
Certkingdom.com network contains ten Windows Server 2003 computers and 1,100
Windows 2000 Professional computers. Three of the Windows Server 2003
computers in configured as domain controllers.
Certkingdom.com has a Finance department in Chicago and a Marketing department in
Dallas. These departments are connected to the Internet. The users in these
departments use the network often to send and download important files and
Internet e-mail. The Certkingdom.com users also access the Internet to get the latest
information on the product. A new Certkingdom.com security policy requires that
network administrators should use their domain user account to log on. Whenever
the administrators need an administrative privilege, they should use the runas
command. The runas command will launch an application that will allow
permission to execute the required task.
One morning an administrator named Rory Allen complains that the name
resolution has failed on the network. During an investigation you try to run Rory
Allen administrative user account, RMAdmin1 and issue the following command:
runas/user:rmadmin1 replmon. When you use this command the following error
message was displayed:
RUNAS ERROR: Unable to run – replmon
1058: The service cannot be started, either because it is disabled or there are no
enabled devices associated with it. You receive an instruction from the CIO to
identify the service that stops the Replication Monitor from starting.
Which of the following services could it be?
A. Due to DNS Client failure you are unable to start Replication Monitor.
B. The Secondary Logon is the likely cause of you being unable to start Replication
Monitor.
C. The DNS Server is the cause of Replication Monitor not starting.
D. Net Logon is a possible cause of the Replication Monitor not starting.
Answer: B
Explaination: The Secondary Logon permits a user to make use of the runas
command.
Incorrect Answers:
A: The DNS Client allows you to locate Active Directory domain controllers. It also
resolves DNS names locally.
C: The DNS Server service is responsible name resolution queries from DNS clients.
D: This service is responsible for authentication remote users and services.
QUESTION 712:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com consists of a few servers that run Windows Server 2003 and Windows
2000 Server. Some the client computers run Windows 2000 Professional, and the
others run Windows XP Professional.
Certkingdom.com contains 15 Domain controllers, 25 Windows Server 2003 servers, 15
Windows 2000 Server computers, 150 Windows XP Professional client computers
and 300 Windows 2000 Professional client computers. The Certkingdom.com domain
also contains 600 user accounts and 15 administrative accounts. The user and
computer accounts reside in an OU which is linked to a GPO as shown in the
following table:
Certkingdom.com’s user accounts resides in an OU named Certkingdom OU. This OU needs
an application named TKD_Tools which is in a Windows package named
TKD_Tools.msi. The hard disk space for TKD_Tools is 50MB. A Certkingdom.com policy
states that the TKD_Tools.msi should not be installed on a client computer that runs
Windows XP Professional or a server that runs Windows Server 2003 which has less
than 500 MB of hard disk space. Only users that are non administrative are allow to
install this TKD_Tools application. You have received an instruction from the CIO to
configure the domain to effectively install the application. You need to accomplish
this without the unnecessary installation of this application.
What should you do?
A. Your first step should be to add TKD_Tools.msi to the Computer
Configuration\Software Settings node of the MemberServers GPO.
Thereafter you will be able to create a WMI filter that will restrict the application of the
MemberServers GPO to computers with 500 MB and more hard disk space.
B. You can accomplish this by adding TKD_Tools.msi to the Computer
Configuration\Software Settings node of the WinClients GPO.
The subsequent step would be to create a WMI filter that will restrict the application of
the WinClients GPO to computers with 500 MB and more hard disk space.
C. This can bew accomplished by adding TKD_Tools.msi to the Computer
Configuration\Software Settings node of the AdminPolicy GPO.
Thereafter you can create a WMI filter that restricts the application of the
DomainControllers GPO to computers with 500 MB and more hard disk space.
D. Your best option would be to add TKD_Tools.msi to the Computer
Configuration\Software Settings node of the UserPolicy GPO.
Thereafter you can create a WMI filter that restricts the application of the UserPolicy
GPO to computers with 500 MB and more hard disk space.
Answer: D
Explaination: This is the more likely answer, because only the non-administrative
users can have this application installed. That’s way you should add the
TKD_Tools.msi to the UserPolicy GPO.
Incorrect Answers:
A: The MemberServers GPO will only apply to the Windows Server 2003 and Windows
2000 Server computers.
B: The WinClients GPO will only apply to the Windows 2000 Professional and the
Windows XP Professional client computers.
C: The AdminPolicy is users who are administrators. The scenario does not want the
administrator to have this application.
QUESTION 713:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
A Certkingdom.com client named Rory Allen installs a high-speed color printer named
Certkingdom -PR01 on a print server named Certkingdom -SR24 by using a built-in
Windows XP Professional driver. Rory Allen works in the Graphics department. He
shares the printer so that the other users can print to the new printer.
During the day the users of the Graphics department complain that they cannot
print from Certkingdom -PR01. You then make sure that Certkingdom -SR24 is
working properly and the printer is switched on. During the investigation you access
the shared folders on Certkingdom -SR24. However, it seems that Certkingdom -PR01
is unable to connect. You have to make sure that the users in the graphics
department can access Certkingdom -PR01 for there printing jobs.
What should you do?
A. Your best choice would be to configure Certkingdom -PR01 to be available.
B. You should consider restarting the Print Spooler on Certkingdom -SR24 to ensure that
the users can print.
C. To ensure that the users can print to Certkingdom -PR01 you have to update the driver.
D. This can be accomplished by uincreasing the priority of Certkingdom -PR01.
Answer: B
Explaination: The function of the Print Spooler is to manage the print queues on a
server. In this case it seems that the Print Spooler has stalled. That’s way you have
to restart the Print Spooler service.
Incorrect Answers:
A: Even if this were available, you cannot access it because you cannot connect to the
Print Spooler.
C: There is no need to update the driver, because the printer was working before.
D: To increase the priority of Certkingdom -PR01, you need to access the Property sheet.
At the moment it seems impossible, because the Print Spooler is not working.
QUESTION 714:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows 2000 Server and all client
computers run Windows XP Professional.
Certkingdom.com contains two departments, named Research and Marketing. Half of
the client computers are in the Research department and the other half are in the
Marketing department. The client computers in the Research department run
critical third-party applications.
Andy Reid is the manager of the Research department. He complains about the
poor performance of certain critical third-party applications on his client computer
named Certkingdom -WS211. You have been instructed to collect the performance
information that can be used to determine and analyze the technical problems on
the network.
Which tool can you use?
A. You should make use of Network Monitor in order to determine and analyze the
technical errors.
B. The technical errors can be determined and analysed by making use of System
Monitor.
C. You will be able to make use of Task Manager to collect the performance information.
D. You should consider making use of a counter log to determine and analyse the
technical errors.
Answer: D
Explaination: You should create a performance baseline and monitor the values of
the counters. The performance data should be recorded in a counter log.
Incorrect Answers:
A: This tool is used to parse network traffic.
B: The System Monitor can work, however it only presents current performance ion real time.
C: This is used to view information about the processors that are running on the system.
QUESTION 715:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows 2000 Server and all client
computers run Windows XP Professional.
Certkingdom.com contains two departments, named Research and Marketing. Half of
the client computers are in the Research department and the other half are in the
Marketing department. Due to the success of the two departments, Certkingdom.com
has decided to implement an e-commerce Web site, which will be used as a public
Web site for customers and a private Web site for the users.
Certkingdom.com then opens a new office for this new Web site. This office contains a
Windows Server 2003 server named Certkingdom -SR42. You intend to run a
third-party Web management application. You receive an instruction to make sure
that the suitable services are allowed on this server.
What should you do? (Select two)
A. You should consider enabling the World Wide Web Publishing Service.
B. Your best option would be to allow the DNS Server service.
C. To support the Web site you need enable the IIS Admin Service.
D. To make sure that the suitable services are allowed you need to permit the HTTP SSL
service.
Answer: A, D
Explaination: The HTTP SSL will provide the private part of the Web site and the
World Wide Web Publishing Service will provide for the public portion.
Incorrect Answers:
B: This option will offer name resolution. This will not ensure that the Web site is
available.
C: This is only needed if you use an IIS to manage the Web site. However you have a
third-party Web management application.
QUESTION 716:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com contains 15 Windows Server 2003, 5 domain controllers and 2000
client computers which runs Windows XP Professional.
Certkingdom.com contains a Marketing department and a Finance department. A
Certkingdom.com server runs mission critical in-house applications which is used by the
users. The client computers and the domain controllers’ clock are incorrect. You
need the time to be correct other wise the Kerberos fails and you will find Kerberos
errors in the event log. You reset the clock of the client computer, but after a while
you find that the clock is again wrong. You receive an instruction from management
to make sure that the clock of the client computers displays the correct time.
What should you do?
A. To ensure that the clock displays the correct time you need to adjust the clock on the
infrastructure master.
B. To ensure that the correct time is displayed you need to select Automatically
synchronize with Internet time server on the Internet Time tab.
C. You can ensure the correct time by installing an exact time resource tool on the
network.
D. Your best option should be to adjust the clock on the PDC emulator.
Answer: D
Explaination: You should adjust the PDC emulator, because all the computers will
synchronize there clock.
Incorrect Answers:
A, B, C: In this scenario you should adjust the clock with the PDC emulator, for
authentication in an Active Directory environment.
QUESTION 717:
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com contains two departments named Research and Development. Half of
the client computers are in the Research department and the other half are in the
Development department. The client computers in the Research department run
critical third-party applications.
Certkingdom.com contains a file server named Certkingdom -SR14. Shadow copies area
enabled on the volume named BillVol. During routine monitoring you discover
that BillVol has almost reached its capacity. You take action and add another disk
to the server and create a volume named TestVol. You now need to configure
shadow copies for BillVol to use the space in TestVol.
What should you do?
A. Your best choice would be to specify TestVol as the additional location on the
BillVol properties.
B. This can be accomplished by moving the shadow copies from BillVol to TestVol on
the Certkingdom -SR14.
C. You should consider sharing TestVol.
Thereafter you will be allowed to enable shadow copies on TestVol.
D. You should consider deleting the shadow copies of BillVol and specifying TestVol
as the location of shadow copies.
Answer: D
Explaination: This is the correct answer. You are unable to change the location of
the shadow copies unless you delete Vol1 of the exiting shadow copies.
Incorrect Answers:
A: You cannot share the shadow copies between BillVol and TestVol. You also cannot
move or copy files on BillVol.
B: You have to delete the shadow copies on BillVol. You cannot move the shadow
copies from BillVol to TestVol.
C: This will result in previous copies on BillVol to be periodically created. The exiting
copies on BillVol would not be affected.
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
No comments:
Post a Comment