The Institution of Engineers, Bangladesh (IEB)
Exam Title: LAN/WAN Administration with Windows 2003 Enterprise Server
Type: MCQ
Full Marks: 25
Time: 30 Minutes
Time: 30 Minutes
Answer all the questions
1. Which of the following versions of Windows Server 2003 require product activation? (Select all that apply.)
a. Setup can be launched by booting to the CD-ROM.
b. Setup can be launched by booting to setup floppies.
c. Setup requires a non-blank password to meet complexity requirements.
d. Setup will allow you to enter all 1’s for the Product ID
2. What tool is used to enable Remote Desktop on a server?
a. Terminal Services Manager
b. Terminal Services Configuration
c. System properties in Control Panel
d. Terminal Services Licensing
3. You are creating a number of user objects for a team of your organization’s temporary workers. They will work daily from 9:00 A.M. to 5:00 P.M. on a contract that is scheduled to begin in one month and end two months later. They will not work outside of that schedule. Which of the following properties should you configure initially to ensure maximum security for the objects?
a. Password
b. Logon Hours
c. Account expires
d. Store password using reversible encryption
e. Account is trusted for delegation
f. User must change password at next logon
g. Account is disabled
h. Password never expires
4. A user has forgotten his or her password and attempts to log on several times with an incorrect password. Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The message suggests that the user contact an administrator. What must you do?
a. Delete the user object and recreate it.
b. Rename the user object.
c. Enable the user object.
d. Unlock the user object.
e. Reset the password for the user object.
5. What command-line tools will create an Active Directory Domain Controller?
a. NETDOM
b. DSADD
c. DSGET
d. NETSH
e. NSLOOKUP
f. NONE
6. What are the minimum NTFS permissions required to allow users to open documents and run programs stored in a shared folder?
a. Full Control
b. Modify
c. Write
d. Read & Execute
e. List Folder Contents
7. You’re setting up a Web site in IIS on Server01. The site’s Internet domain name is adatum.com, and the site’s home directory is C:\Web\Adatum. Which URL should Internet users use to access files in the home directory of the site?
a. http://server01.web.adatum
b. http://web.adatum.com/server01
c. http://server01.adatum/home
d. http://server01.adatum.com
8. Data for your corporate intranet is currently stored on the D: drive of your IIS server. It is decided that the HR department will serve information about the company benefits and policies from its server, and that the URL to access the HR information should be http://intranet.contoso.com/hr. What do you need to configure?
a. A new Web site
b. A new FTP site
c. A virtual directory from file
d. A virtual directory
9. You are to back up a Windows Server 2003 file server every evening. You perform a manual, normal backup. You will then schedule a backup job to run every evening for the next two weeks. Which backup type will complete the fastest?
a. Normal
b. Differential
c. Incremental
d. Copy
10. You are to back up a Windows Server 2003 file server every evening. You perform a manual, normal backup. You will then schedule a backup job to run every evening for the next two weeks. Which backup type will provide the simplest recovery of lost data?
a. Normal
b. Differential
c. Incremental
d. Daily
11. You’re setting up a printer on your Windows Server 2003 computer. The computer will be used as a print server on your network. You plan to use a print device that’s currently connected to the network as a stand-alone print device. Which type of printer should you add to the print server? (Choose all that apply.)
a. Network
b. Shared
c. Local
d. Remote
12. What are the valid licensing modes in Windows Server 2003? Select all that apply.
a. Per User
b. Per Server
c. Per Seat
d. Per Device or Per User
13. Which of the following provide the ability to recover from the failure of a single hard drive?
a. Primary partition
b. Extended partition
c. Logical drive
d. Simple volume
e. Spanned volume
f. Mirrored volume
g. Striped volume
h. RAID-5 volume
14. Which protocol provides names and name resolution for workgroups in Windows?
a. NetBIOS
b. CIFS
c. DNS
d. Kerberos
15. Which of the following is a requirement for networking on a Windows Server 2003 network?
a. DHCP
b. Network protocol
c. WINS
16. Which of the following is a transport-layer protocol?
a. IGMP
b. UDP
c. DNS
d. Ethernet
17. Which of the following is the dotted-decimal notation equivalent of the binary address 11001100 00001010 11001000 00000100?
a. 204.18.200.3
b. 204.34.202.4
c. 204.10.200.4
d. 202.10.200.4
18. Which of the following is the binary equivalent of the dotted-decimal address 207.209.68.100?
a. 11001111 11010001 01000100 01100100
b. 11000111 11010001 01000100 01100100
c. 11001111 11010001 01000100 01101100
d. 11001111 11010001 11001101 01100100
19. You cannot ping to a computer on a local subnet, even after you reboot the computer. What should you do next?
a. Check for hardware errors.
b. Run Ipconfig with the /all switch.
c. Run Network Diagnostics in verbose mode.
20. Which resource record is used to resolve domain names specified in e-mail addresses to the IP address of the mail server associated with the domain?
a. PTR
b. MX
c. A
d. CNAME
21. Which command-line tool is used to test DNS?
a. ping
b. ipconfig
c. nslookup
d. tracert
22. Which command-line tools are used to troubleshoot DNS?
a. ping
b. ipconfig /registerdns
c. nslookup
d. tracert
e. ipconfig /flushdns
f. ipconfig /all
23. Which of the following settings can be applied using Security Configuration And Analysis and a security template? (Choose all that apply.)
a. The password must be 15 characters long.
b. The Accountants group is not allowed to access this computer over the net-work.
c. IPSec must be used for all communications between Computer1 and Computer2.
d. The root file permissions should be Everyone Full Control.
24. Which steps might be necessary to recover from the application of a security template to a file server that prevented all users from accessing the server over the network? Choose the most efficient way.
a. Log on locally to the file server as Administrator and apply the root security template.
b. Log on locally to the file server as Administrator and apply the rollback template produced from the bad security template.
c. Log on remotely to the file server as Enterprise Admin and use the Local Security Policy console to change the user rights policies that might be incorrect.
d. Log on remotely to the file server as Administrator and apply the rollback template produced from the security template.
25. A user in the branch office reports that he cannot use Internet Explorer to view a commonly used Web site on the Internet. At your client computer in the main office, you run Nslookup to verify the target address and receive the correct address. At the user’s client computer, you also run Nslookup, but the address returned is incorrect. What should you do to troubleshoot? (Choose all that apply.)
a. Verify that the client is using the correct DNS servers.
b. Run Ipconfig /flushdns.
c. Select the Network Connections icon in Accessories.
d. Run Ipconfig /renew.
No comments:
Post a Comment