Microsoft MCSA 70-290 Exam Prep - Question List

Select how would you like to study

71. Your company issues a new security policy that does not allow any user to be logged on to the domain beyond the business hours. Users who remain logged on after business hours must be automatically disconnected from the domain. Which of the following should you do to implement the security policy immediately?
  1. Configure the Default Domain Policy GPO to increase scheduling priority for all domain users.
  2. Configure the Default Domain Policy GPO to force domain users to log off when their logon hours expire.
  3. Create a new domain user account and configure the account properties to restrict logon hours to business hours.
  4. Modify the DACL on the Default Domain Policy GPO to assign the Allow - Read permission to the Users group.
72. Your company configures a new security policy that requires that the user account of any user who enters an invalid password more than twice in one day must be locked out. You need to configure the domain account policy settings to enforce this new security policy. Which of the following should you do?
  1. Set the minimum password age to one day and change the Enforce password history setting to three passwords remembered.
  2. Set the maximum password age to one day and change the Account lockout duration setting to 1440 minutes.
  3. Change the Enforce password history setting to three passwords remembered and change the Account lockout duration setting to 1440 minutes.
  4. Change the Account lockout threshold setting to three invalid logon attempts and change the Reset account lockout counter after setting to 1440 minutes.
73. Your network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is open to the Internet. You are currently in the process of deploying some Web servers that will be located in the perimeter network. The servers will host only publicly-available Web pages. Which of the following should you do to reduce the possibility of users gaining unauthorized access to the servers?
  1. Disable the IIS Admin Service on the Web servers.
  2. Grant the Secure Server (Require Security) IPSec Policy to the Web servers.
  3. Enable the Server Message Block (SMB) signing on the Web servers.
  4. Disable File and Printer Sharing on the Web servers.
74. A server named SR24 hosts shared folders for the Sales department. Shared files on SR24 are frequently accessed and updated throughout the business day. An employee from the Sales department complains that the server responds extremely slowly when he attempts to open a shared document. The Performance console indicates that the processor is operating at 100 percent of capacity. Which of the following should you do to gather additional data to diagnose the cause of the problem?
  1. Create a counter log to track processor usage in the Performance console.
  2. Open and review the application log for the System Monitor events in Event Viewer.
  3. Create an alert that will be triggered when processor usage exceeds 90 % for a period of more than five minutes in System Monitor.
  4. Review the Processes tab to check the percentage of processor capacity used by each application in Task Manager.
75. A server named SR06 runs an application named App1, which uses a large amount of network bandwidth per client connection. SR06 has only one network adapter installed and you suspect that the network connection on SR06 is running out of available network capacity. Which of the following would allow you to view the total network bandwidth that is being used on SR06?
  1. Use System Monitor to configure the Network Interface object and then run the netstat command.
  2. Use Network Monitor to configure a capture filter for the local area connection and then run the netstat command.
  3. Use System Monitor to configure the Network Interface object and then monitor the Networking tab in Task Manager.
  4. Use Network Monitor to configure a capture filter for the local area connection and then monitor the Networking tab in Task Manager.

Select how would you like to study