Microsoft MCSA 70-290 Exam Prep - Question List

Select how would you like to study

111. Your network contains a file server named Serv1. Serv1 has a 30 GB data volume that is mirrored. Each physical disk is connected to a separate SCSI controller. A faulty SCSI controller causes one of the hard disks in the mirrored volume to fail. You replace the faulty SCSI controller. Which of the following should you do to restore the data volume to its previous state?
  1. Run the diskpart active command on the failed volume.
  2. Select a disk in the mirror and reactivate the volume on Serv1.
  3. Convert the two physical disks on Serv1 to basic disks and restore the data.
  4. Break the mirror on Serv1 and re-create the mirror.
112. You install a new modem on a server named Serv4 and install the driver for the modem. However, when you test the modem, it does not dial out. You install an identical modem on another server named Serv5 and install the driver. This one dials out successfully when tested. Which of the following should you do to verify if the modem card on Serv4 is defective?
  1. Right-click the modem and select the Scan for hardware changes option in the Device Manager on Serv4.
  2. In Modem Properties on Serv4, click the Modem tab and set the maximum port speed to the same value as the value for the maximum port speed on Serv5.
  3. Click the Diagnostics tab and then click the Query Modem button in Modem Properties on Serv4.
  4. Right-click Ports and then select the Scan for hardware changes option in the Device Manager on Serv4.
113. A Windows Server 2003 computer named SR02 functions as a file server. Drive D on SR02 is running low on free disk space. Which of the following should you do to ensure that an event is written to the application log on Drive D when 20 percent of the available free space on the server remains?
  1. Right-click Counter Logs and select New Log Settings under Performance Logs and Alerts.
  2. Right-click Disk Management and select Rescan Disks under Storage in Computer Management.
  3. Select New Log View option under the application log of Event Viewer.
  4. Right-click Alerts and select New Alert Settings under Performance Logs and Alerts.
114. Your network contains a terminal server named S25 that is utilized by 15 employees to run applications and to gain access to the Internet. One day, these employees report that they receive security messages while browsing Internet Web sites. They are unable to modify the Internet Explorer security settings on their client computers. Which of the following should you do to allow these employees to modify the Internet Explorer security settings on their client computers while connected to S25?
  1. Log on to S25 as Administrator and add http:// to the list of trusted sites in Internet Explorer.
  2. Uninstall Internet Explorer Enhanced Security Configuration on S25.
  3. Instruct all the employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.
  4. Instruct all the employees to change the Internet Explorer privacy settings on their client computers to Low.
115. Chad is the network administrator for Globe.com. The network contains a Windows Server 2003 Web server named WS1 connected to the Internet using a dedicated link. Chad runs a System Monitor log on WS1, which monitors the Bytes Total/sec counter on the Network Interface object.The size of the System Monitor log is becoming too large for the available disk space, with sample rate set at 15 seconds and logs archived once a day. What should Chad do to reconfigure the System Monitor log settings to reduce the amount of data that is captured?
  1. Retain the current counter, but set the sample rate to 60 seconds.
  2. Retain the current counter, but set the sample rate to 5 seconds.
  3. Change the counter to Total Bytes, and set the sample rate to 15 seconds.
  4. Change the counter to Current Bandwidth, and set the sample rate to 60 seconds.

Select how would you like to study