MSCA 70-291 Windows Server 2003 Exam Prep - Question List

Select how would you like to study

51. Your domain is configured to use only Kerberos authentication for all server connections. A user reports that he receives an "Access denied" error message when he attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user's client computer. Which command should you run from the command prompt on the user's computer?
  1. Netsh
  2. ksetup
  3. ktpass
  4. netdiag
52. David installs Software Update Services on a computer named S3. He creates a Group Policy object that configures all client computers to receive software updates from S3. Later, David runs MBSA on all client computers to check if all updates are applied. David discovers that all the Windows 2000 Professional client computers received updates, but Windows XP Professional client computers did not.

David verifies that the GPO setting was applied on all Windows XP Professional computers. What should David do to ensure that the Windows XP Professional client computers receive their updates from S3?
  1. Migrate all users of the Windows XP Professional client computers to the Administrators local group.
  2. Restart Automatic Updates on all Windows XP Professional client computers.
  3. Delete the NoAutoUpdate value under HKEY_LOCAL_MACHINE \SOFTWARE\Policies \Microsoft\ Windows \ WindowsUpdate\AU on all Windows XP Professional client computers.
  4. Install Service Pack 1 (SP1) on all Windows XP Professional client computers.
53. Chad works on a network that has a Web server which runs IIS 6.0 and hosts a secure intranet site. This network consists of a single Active Directory domain with all servers running Windows Server 2003. All users on the network are required to connect to the intranet site by authentication along with HTTPS.

The company management decides to install a web application that must connect to the Web site by using HTTP. What should Chad do to collect information about the users who are connecting to the Web site by using HTTPS?
  1. Check the application log on the Web server.
  2. Use Network Monitor to capture network traffic on the Web server.
  3. Configure a performance log to capture all Web service counters. Review the performance log data.
  4. Review the log files created by IIS on the Web server.
54. In Chad’s company, all portable computers used by the telecommuting employees must receive software updates from the Windows Update servers daily. Chad notices that updates from the Windows Update servers were not applied on a portable computer named C4. What should Chad do to ensure that software updates are applied to C4 daily at 10 a.m.?
  1. Set the computer clock to 10 a.m. and click the Automatically download the updates and install them on the schedule that I specify check box.
  2. Click the Automatically download the updates and install them on the schedule that I specify check box and type Configure it to work every day at 10 a.m.
  3. Set the computer clock to 10 a.m. and click the Download the updates automatically and notify me when they are ready to be installed check box.
  4. Set the computer clock to 10 a.m. and click the Notify me before downloading any updates and notify me again before installing them on my computer check box.
55. Chad is the administrator of a Windows Server 2003 computer named Server 2. Server 2 is a domain member server that has the DNS service installed. It is configured with two network interfaces named NIC1 and NIC2. Routing is not enabled between the two network interfaces. NIC1 and NIC2 are configured as shown in the image.

Resources on the Engineering network segment use the same fully qualified domain names (FQDNs) as resources in the Sales network. The TCP/IP properties on client computers in the Engineering environment are controlled by individual developers.
Using the DNS console on S1, what should Chad do to ensure that the users in the Engineering environment cannot resolve FQDNs from the Sales network?
  1. Configure S1 to disable recursion.
  2. Configure the forwarders on S1 to refer requests to 192.168.3.2.
  3. Configure the interfaces properties on S1 to listen on 192. 168.2.10 only.
  4. Configure S1 to disable round robin.

Select how would you like to study