Microsoft MCITP Test Prep - Windows Server 2008 - Question List

Select how would you like to study

46. You want to use a unicast IPv6 address on the subnets of a private network to implement IPv6 connectivity over the subnet. Which of the following unicast IPv6 address types should you use?
  1. Link-local address
  2. Special address
  3. Site-local address
  4. Anycast address
47. Chad decides to move the DHCP service from Server 1 to Server2. After installing DHCP on Server2, Chad creates a new scope in DHCP and activates it. Users report that they cannot log on to the network. Chad notices that the client computers are not receiving an IP address configuration from the DHCP server.

He opens Event Viewer on Server2 and views an event that states “The DHCP service failed to see a directory server for authorization.” What should Chad do to fix this issue?
  1. Authorize the DHCP service on Server2 in Active Directory.
  2. Restart the DHCP service on Server2.
  3. Uninstall the DHCP service on Server 1.
  4. Install DNS on Server2. Configure a secondary zone on Server2 for the Active Directory domain DNS zone.
48. David installs Software Update Services on a network server named S1. When David attempts to synchronize S1 with the Windows Update servers, he receives an error message. David suspects that the proxy server requires authentication.

He opens Internet Explorer and verifies that he can communicate with an external Web site by using the proxy server. What should David do to ensure that S1 can communicate with the Windows Update servers?
  1. Configure authentication to the proxy server in the SUS options.
  2. Restart the IIS administration tool.
  3. Configure the Internet Explorer settings to bypass the proxy server.
  4. Install the Microsoft Firewall Client.
49. Which of the following tools should you use to seize the role of any operations master?
  1. netdom utility
  2. ntdsutil utility
  3. Active Directory Users and Computers tool
  4. Active Directory Domains and Trusts tool
50. Some computers on a network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. You discover that this traffic always uses a certain source TCP port number. You need to identify which computers are infected.

Your solution should include detecting and identifying traffic that is sent by the worm and sending a notification to a network administrator that the infected computer needs to be repaired. Which of the following should you do?

  1. Configure a WMI event trigger.
  2. Configure a Network Monitor capture filter.
  3. Configure a System Monitor Alert.
  4. Configure a Network Monitor trigger.

Select how would you like to study