MSCA 70-291 Windows Server 2003 Exam Prep - Question List

Select how would you like to study

81. Chad notices that there are frequent failures of Active Directory transactions in the event logs of the domain controllers. These are caused by DNS lookup failures against the Globe.com zone. Chad discovers that the data in one of the DNS zones on DC3 is out of date. What should Chad do to find out why the DNS data on DC3 is out of date?
  1. Use Event Viewer to examine the DNS Server log for zone transfer errors.
  2. Enable debug logging and examine the log file for transfer packets.
  3. Use System Monitor to monitor the DNS\Zone Transfer Failure counter.
  4. Use the Replmon utility to look for Active Directory replication errors.
82. You install and configure a server named Serv1 to function as a file server. You move user files from the old server to Serv1 and create a logon script that maps drive letters to shared folders on Serv1. After these changes, users report that they cannot access Serv1 through the drive mappings you created.

They also report that Serv1 does not appear in My Network Places. All appropriate NTFS and share permissions are applied on the user files. When you run the ipconfig command on Serv1 you see an output as shown in the image. What should you do to configure the TCP/IP properties on Serv1 to resolve this problem?
  1. Add abc.com to the DNS suffix for this connection field.
  2. Configure the default gateway.
  3. Configure the DNS server address.
  4. Configure a static IP address.
83. When performing performance baselining on Server 1, you notice that a large number of concurrently connected users at any given moment. This is causing performance problems on Server 1. You want to run Network Monitor on this server and capture all packets sent to Server 1.

But packet headers need to be captured in order to reduce the size of the captured data. If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets. Which of the following should you do to configure Network Monitor?
  1. Configure the Network Monitor display filters.
  2. Configure the Network Monitor capture filters.
  3. Decrease the Network Monitor buffer size setting.
  4. Increase the Network Monitor buffer size setting.
84. Two of the servers on your network contain highly confidential documents. The company's written security policy states that all network connections with these servers must be encrypted by using an IPSec policy. You place these servers in an organizational unit named SecuServ.

You configure a Group Policy object that requires encryption for all connections and assigns the GPO to the SecuServ OU. What should you do to verify that users are connecting to the two servers using encrypted connections?
  1. Use the IP Security Monitor console.
  2. Run the net view command.
  3. Run the gpresult command.
  4. Use the IPSec Policy Management console.
85. Chad’s company has a written company security policy that states all computers in the domain must be examined for available security updates, shared folders, and record file system type on each hard disk. Chad needs to perform this security assessment of every computer and must verify that the requirements of the written security policy are met. What should Chad do?
  1. Open the Default Domain Policy and enable the Configure Automatic Updates policy.
  2. Open the Default Domain Policy and enable the Audit object access policy, the Audit account management policy, and the Audit system events policy.
  3. Install and run mbsacli .exe with the appropriate configuration switches on the server.
  4. Install and run HFNetChk.exe with the appropriate configuration switches, on the server.

Select how would you like to study