MSCA 70-291 Windows Server 2003 Exam Prep - Question List

Select how would you like to study

21. Your colleague has set the default TTL value for your company’s primary DNS zone to 15 minutes. Which of the following is most likely to occur as a result of this change?
  1. Resource records cached on the primary DNS server will expire after 15 minutes.
  2. Secondary servers will initiate a zone transfer every 15 minutes.
  3. DNS hosts will re-register their records once every 15 minutes.
  4. DNS clients will have to query the server more frequently to resolve names for which the server is authoritative.
22. Which of the following commands is used at the Nslookup prompt to view all the contents of the zone abc.com?
  1. ls -t abc.com
  2. ls -d abc.com
  3. ls -a abc.com
  4. ls -any abc.com
23. An application named Inventory.exe is installed on all Windows XP client computers in the domain with the startup type of the service set to Automatic. In the Default Domain Policy Group Policy object the security administrator has configured a software restriction policy that is applied to all computers in the domain.

The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. What should you do to ensure that Inventory.exe cannot be started by a worm, while still allowing the application to run as a service?
  1. In the computer settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
  2. In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
  3. In the computer settings section of the Default Domain Policy GPO, modify the existing software restriction policy hash rule for the Inventory.exe application so that the hash rule has a security level of Disallowed.
  4. Configure a software restriction policy that contains a hash rule for the Inventory.exe application in the user settings section of the Default Domain Policy GPO. Configure the hash rule with a security level of Disallowed.
24. You configure a server named S4 as the DNS server for the domain. After using the new ISP, users report that they cannot access Internet Web sites using their fully qualified domain names. You manually configure a test computer to use the DNS server address of the new ISP.

The test computer can successfully access Internet Web sites using their FQDNs. What should you do to ensure that network users can access Internet Web sites by using their FQDNs while ensuring that user access to internal resources is not disrupted?
  1. Configure S4 to use the default root hints.
  2. Create a root zone on S4.
  3. Configure a forwarder on S4 to the new ISP's DNS server.
  4. Configure all computers on your network to use the new ISP's DNS server.
25. A server named Server 1 functions as a DHCP and DNS server. All client computers are configured to use Server 1 for name resolution, and all DNS zones on Server 1 are enabled for DNS dynamic updates. A server named Server 25 contains antivirus server software.

It must be able to contact client computers using fully qualified domain names to propagate virus definition updates. You need to ensure that Server 25 can resolve FQDNs for all client computers on the network. Which of the following options should you modify on Server 1?
  1. Dynamically update DNS A and PTR records only if requested by the DHCP clients check box.
  2. Always dynamically update DNS A and PTR records check box.
  3. Dynamically update DNS A and PTR records for DHCP clients that do not request dynamic updates (for example, clients running Windows NT 4.0) check box.
  4. Discard A and PTR records when lease is deleted check box.

Select how would you like to study