PracticeQuiz content is free on an ad-supported model.
Unfortunately, we can't support ad blocker usage because of the impact on our servers. If you'd like to continue, please disable your ad blocker and reload page.
81.Chad notices that there are frequent failures of Active Directory transactions in the event logs of the domain controllers. These are caused by DNS lookup failures against the Globe.com zone. Chad discovers that the data in one of the DNS zones on DC3 is out of date. What should Chad do to find out why the DNS data on DC3 is out of date?
82.You install and configure a server named Serv1 to function as a file server. You move user files from the old server to Serv1 and create a logon script that maps drive letters to shared folders on Serv1. After these changes, users report that they cannot access Serv1 through the drive mappings you created.
They also report that Serv1 does not appear in My Network Places. All appropriate NTFS and share permissions are applied on the user files. When you run the ipconfig command on Serv1 you see an output as shown in the image. What should you do to configure the TCP/IP properties on Serv1 to resolve this problem?
83.When performing performance baselining on Server 1, you notice that a large number of concurrently connected users at any given moment. This is causing performance problems on Server 1. You want to run Network Monitor on this server and capture all packets sent to Server 1.
But packet headers need to be captured in order to reduce the size of the captured data. If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets. Which of the following should you do to configure Network Monitor?
84.Two of the servers on your network contain highly confidential documents. The company's written security policy states that all network connections with these servers must be encrypted by using an IPSec policy. You place these servers in an organizational unit named SecuServ.
You configure a Group Policy object that requires encryption for all connections and assigns the GPO to the SecuServ OU. What should you do to verify that users are connecting to the two servers using encrypted connections?
85.Chad’s company has a written company security policy that states all computers in the domain must be examined for available security updates, shared folders, and record file system type on each hard disk. Chad needs to perform this security assessment of every computer and must verify that the requirements of the written security policy are met. What should Chad do?