MSCA 70-291 Windows Server 2003 Exam Prep - Question List

Select how would you like to study

96. You receive reports from users that DNS name resolution has slowed significantly over the last few weeks. What should you do to verify that the performance problem is due to the DNS server?
  1. Monitor the DNS: Dynamic Update Received/sec, the DNS: Total Query Received/sec, and the DNS: Total Response Sent/sec counters using the System Monitor.
  2. Monitor for DNS Event ID 2 and 3 using the DNS Event log.
  3. Monitor the Network Interface: Bytes Total/sec counter using the System Monitor.
  4. Enable debug logging on DNS server, and configure the log to capture Outgoing and Incoming packets.
97. The abc.com network contains six Windows Server 2003 Standard Edition computers and 600 client computers running Windows XP Professional. You need to configure security settings related to passwords, account lockout, and Kerberos. This custom security template will be imported into a Group Policy Object (GPO) that is linked to the domain. Which security template node will you use to accomplish this task?
  1. The Event Log node
  2. The Local Policies node
  3. The Account Policies node
  4. The Restricted Groups node
98. The abc.com network contains six Windows Server 2003 Standard Edition computers and 600 client computers running Windows XP Professional. You need to configure settings that are related to auditing, user rights, and other security-related options. This custom security template will be imported into a GPO that is linked to the domain.

Which security template node will you use to accomplish this task?
  1. The Event Log node
  2. The Account Policies node
  3. The Restricted Groups node
  4. The Local Policies node
99. The written security policy states that all remote users should configure their home computers to reject cookies from all Web sites, except the abc.com Web site. A user starts Internet Explorer and selects Internet Options from the Tools menu. Which of the following tabs should the user select to configure his computer in compliance with the company policy?
  1. Security
  2. Advanced
  3. Content
  4. Privacy
100. You are working as a network administrator for xyz.com. 25 employees from your company connect to a terminal server named Server 3 to run applications and to gain access to the Internet. These employees report that they receive security messages while browsing Internet Web sites. The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Server 3. What should you do to allow these employees to modify the Internet Explorer security settings on their client computers while connected to Server 3?

  1. Log on to Server 3 as Administrator and add http:// to the list of trusted sites in Internet Explorer.
  2. Uninstall Internet Explorer Enhanced Security Configuration on Server 3.
  3. Instruct these employees to change the Internet Explorer privacy settings on their client computers to Low.
  4. Instruct these employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.

Select how would you like to study