1. Trang chủ
  2. » Ngoại Ngữ

Câu hỏi ôn thi môn tiếng anh pot

22 301 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 22
Dung lượng 132,5 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

You establish the internal network of a new branch of the organization by configuring the computers using NetBIOS names.. provides dynamic IP addresses to ten thousand DHCP clients using

Trang 1

Q6 Review Question

1/ You are the system administrator at BlueMoon Computers You establish the internal network

of a new branch of the organization by configuring the computers using NetBIOS names The organization is working on various projects The team members involved in the projects complain that they face difficulty in accessing the files related to their projects because of different locations

at which they are stored Also, they do not get timely access to the files because of congestion on the server The employees want that the request for accessing the files should be handled

separately so that they can access the files when they need What should you do to solve this problem?

a Assign the NetBIOS name Computer1 [00h] to the computer that you want to use as File server

b Assign the NetBIOS name Computer2 [03h] to the computer that you want to use as File server

c Assign the NetBIOS name Computer3 [06h] to the computer that you want to use as File server

d Assign the NetBIOS name Computer4 [20h] to the computer that you want to use as File server

2/ Which component of WINS service resolves NetBIOS names for computers that are not enabled clients?

of both departments receive their IP addresses from the DHCP server The DHCP server had a hardware failure problem and lost its DHCP data However, you restored the backup data After restoring the DHCP data, you find that information of some clients for both scopes is not

displayed correctly when viewed in the list of active leases What steps will you follow to make the information correct?

a Select the DHCP scope in the DHCP console tree

Select the Reconcile command from the Action menu

Click the Verify button in the Reconcile dialog box

Click the OK button in the DHCP dialog box

b Select the DHCP scope in the DHCP console tree

Select the Reconcile command from the Action menu

Click the OK button in the DHCP dialog box

Click the Verify button in the Reconcile dialog box

c Select the DHCP server in the DHCP console tree

Select the Reconcile All Scopes command from the Action menu

Click the Verify button in the Reconcile dialog box

Click the OK button in the DHCP dialog box

d Select the DHCP server in the DHCP console tree

Select the Reconcile command from the Action menu

Click the Verify button in the Reconcile dialog box

Click the OK button in the DHCP dialog box

4/ Global Systems Inc provides dynamic IP addresses to ten thousand DHCP clients using DHCP server in Windows Server 2003 environment The computer on which the DHCP server is configured is outdated, and therefore, the computer crashes frequently The system administrator

Trang 2

has to reconfigure the DHCP server each time The clients have to face problems regarding connectivity with the newly configured DHCP server What should the system administrator do to resolve this problem?

a Save the DHCP server configuration settings on a remote machine

b Save the DHCP server configuration settings on a local machine

c Prepare a hard copy of the DHCP configuration settings

d Restart the DHCP services using the administrative tools

5/ You are the system administrator at WorldAd, Inc The organization provides current stock information to the client companies All the clients access the organization's database by remote network access to retrieve stock details The database is mounted on a server running Windows Server 2003 Some clients complain about the inconsistent remote access because of failure in point-to-point connection with the server How will you identify the cause of the problem?

a Examine the Audit log and verify IPSec policy change events

b Examine the PPP log on the server and identify the cause of connection failure

c Examine the RADIUS-Based Authentication and Account log to analyze the number of users remotely accessing the server

d Examine Event log and analyze the errors occurring within RAS server

6/ You are the system administrator at BlueMoon Computers The internal network of the

organization is divided into subnetworks that are distantly located The employees using

computers of different subnetworks need to coordinate with each other by sending and receiving messages to each other The network of the organization contains routers for transferring the messages from one subnetwork to the other using the shortest path The employees of the organization using the networks complain that the rate of data transfer over the network is low Which parameter of the routing algorithm should you change to solve the problem?

a Open Shortest Path First (OSPF)

b Border Gateway Protocol (BGP)

c Internet Group Multicast Protocol (IGMP)

d Routing Information Protocol (RIP)

8/ Consider the following statements:

Statement A: Dial-in properties are elements of remote access policies, which are used for authorizing a user connection

Statement B: An authenticated user is authorized to establish a remote connection by Remote Access Policy Profile

Which of the following is true with respect to the above statements?

a Both statement A and statement B are false

b Both statement A and statement B are true

c Statement A is true and Statement B is false

d Statement B is false and Statement B is true

9/ The database of Blue Moon Computers contains confidential information The information

Trang 3

needs to be secured from any unauthorized access The organization works in coordination with Red Sky Inc The employees working on a project need to send confidential information using an external network You are the system administrator at Blue Moon Computers The project

manager tells you that if any unauthorized person accesses the information while it is transferred from their computer to the client's computer, it can cause a heavy financial loss to the

organization How can you make sure that such a loss does not occur?

a Use Dial-in constraint parameter of Remote Access Policy component, Profile, to restrict remote access to the database

b Use IP properties parameter of Remote Access Policy component, Profile, to restrict remote access to the database

c Use Multilink parameter of Remote Access Policy component, Profile, to restrict remote access

connectivity components is changed An employee of the production department complains that

he is unable to transmit messages to and from the development department What do you think is the reason of the problem?

a Duplicate IP addressing

b Changed configuration of the network connectivity component, such as a hub, a router, or a switch

c Excessive network collision

d Improper configuration of the software used in the network

11/ You are the system administrator at BlueMoon Computers The internal network of the

organization connects all the computers together The employees of the organization use the internal network to communicate with each other The employees complain about the slow speed

of the network because of which the time taken in communicating a message and transferring files from one computer to another is more than expected As a result, the employees are facing problems in coordinating with each other and doing their project work properly What should you

do to ensure better coordination among the employees working in a project?

a Use Network Connection Repair Link utility to remove expired entries from NetBIOS cache and resolve communication problems

b Use address resolution utility to remove expired entries from NetBIOS cache and resolve communication problems

c Use ping utility to remove expired entries from NetBIOS cache and resolve communication problems

d Use Network Diagnostics utility to remove expired entries from NetBIOS cache and resolve communication problems

12/ Consider the following statements:

Statement A: An SRV resource record resolves service names to host names and port names.Statement B: An SOA resource record resolves a domain name to a host name

Which of the following is true with respect to the above statements?

a Both statement A and statement B are true

b Statement A is true and Statement B is false

c Statement A is false and Statement B is true

d Both statement A and statement B are false

13/ You are the system administrator at Red Sky IT Systems The organization currently has a network setup with two servers and 100 clients The servers have MS Windows Server 2003

Trang 4

installed on them, 50 clients have Windows XP Professional, and the rest of the clients have Windows 98 installed The network contains two routed subnets, subnet A and subnet B Each subnet contains a server installed with Windows Server 2003 You assign static addresses to the servers However, to reduce the configuration errors caused by manual configuration of IP addresses, you install DHCP service on the servers In addition, you install DNS service in the subnets to resolve the IP addresses to client names and vice-versa After some time, 50 clients and one more DHCP server are added to subnet A After the new DHCP server is added to subnet A, clients start facing conflict problems in network settings What according to you is the reason of the conflict in network settings?

a Presence of DNS servers in subnets

b Addition of another DHCP server in subnet A that already has an active DHCP server

c Servers on which DHCP service is installed have a static IP address

d Presence of only one DNS server in subnet A

14/ What is the function of Kerberos protocol?

a Specifies the type of action performed on data packets on the network

b Ensures secure information transmission over network

c Authenticates systems in the same domain

d Implements password security between two IPSec hosts

15/ What does the Issue name attribute of a CA certificate specify?

a Name of the entity requesting a CA certificate

b Name of the certificate issuing CA

c X.509 standard version for certificate formatting

d Value used to assign a unique identity to a certificate

16/ Consider the following statements:

Statement A: A RADIUS client using RADIUS protocol sends accounting and authentication requests to the RADIUS server

Statement B: A RADIUS client provides authorization and authentication services

Which of the following is true with respect to the above statements?

a Both Statement A and Statement B are False

b Both Statement A and Statement B are True

c Statement A is True and Statement B is False

d Statement B is False and Statement B is True

17/ Which authentication protocol for dial-up networking provides additional authentication within Point-to-Point Protocol (PPP)?

a Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)

b Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)

c Shiva Password Authentication Protocol (SPAP)

d Protected Extensible Authentication Protocol (PEAP)

18/ Which switch is used with the Ipconfig command to display all the TCP/IP configuration values of the host?

a /renew

b /release

c /displaydns

d /all

19/ You are the system administrator at BlueMoon Computers The organization has undertaken

a new project for which it has to open many new branches at different locations Each branch is expected to incorporate 500 to 1000 computers At least 10 branches need to be opened to handle the project work The managing director of the organization wants you to plan a network infrastructure such that in future there does not arise any difficulty in locating any computer over

Trang 5

the network Each computer should have a unique IP address in the network What should you do

to meet the requirements?

a Assign each computer a Class A IP address

b Assign each computer a Class B IP address

c Assign each computer a Class C IP address

d Assign each computer a Class D IP address

20/ You are the system administrator at WorldAd, Inc Peter is a marketing executive in the organization and has to make frequent outstation business tours Peter has to access the sales and product database available on the central server in the head office Peter accesses the database on office network as well as from remote location using his laptop To avoid network setting overhead you configure an alternate IP address for Peter's system How will you verify the correctness of the assigned alternate IP address?

a Run ipconfig command from command prompt Check whether the value of IP address field and the assigned alternate IP address for the system are the same

b Run ipconfig /renew command from command prompt Check whether the value of IP address field and the assigned alternate IP address for the system are the same

c Run ipconfig /all command from command prompt Check whether the value of IP address field and the assigned alternate IP address for the system are the same

d Run ipconfig /release command from command prompt Check whether the value of IP

address field and the assigned alternate IP address for the system are the same

21/ Which database file in DHCP records the existing transactions if the system runs out of disk space?

considerably You also notice an increase in IP lease release and renew events As a system administrator, what should you do to resolve this problem?

a Identify the computer that is causing network traffic by checking the DHCP audit log file

b Identify the computer that is causing network traffic by viewing the performance using System monitor

c Identify the computer that is causing network traffic by creating the DHCP release and renew alert settings

d Identify the computer that is causing network traffic by starting audit logging

23/ You are the system administrator at Technology Systems You are examining the NetBT Nodes Which NetBT node type should you examine to use the Lmhosts file for resolving and registering names?

a B-node

b P-node

c M-node

d Microsoft enhanced B-node

24/ Which of the following NetBIOS computers provides file server services?

a Computer1 [00h]

b Computer2 [03h]

c Computer2 [06h]

Trang 6

d Computer4 [20h]

25/ You are the system administrator at BlueMoon Computers The internal network of the organization connects all the computers of the organization Most of the computers in the network are Windows 95 and Windows 98 computers A remote client wants to connect to a computer over the internal network The client sends the NetBIOS name of the computer to be resolved by the NetBIOS cache What happens when the name is not found in the NetBIOS cache and WINS server?

a The request is dropped

b No acknowledgement is given to the client, and the client is left waiting

c The NetBIOS name is broadcast to all the computers over the network

d An error is raised about non-existence of such a computer

26/ You are the system administrator at BlueMoon Computers The organization uses a WINS server to implement NetBIOS name resolution service You find that the requests made by the WINS clients are not fulfilled in the expected time You also notice that the time interval between the time at which a WINS client is marked as released and the time at which it is indicated as extinct is unnecessarily large Which scavenging parameter do you set to decrease this time so that the WINS database is not over crowded by unused WINS clients names and the

performance of the database is increased?

confidential data related to the projects going on in the organization, and therefore, data must be secure What should you do to reduce your burden of updating the database and keep the security of the DNS database?

a Create a new zone with Allow both secure and nonsecure dynamic updates option selected

b Create a new zone with Do not allow dynamic updates option selected

c Create a new zone with Allow only secure dynamic updates option selected

d Configure zone to allow transfer from specified IP addresses

28/ You are the system administrator at Red Sky Inc Organization's employees can access files from another computer on the network by using its domain name A DNS server resolves the domain name of a host with the respective IP address Employees are complaining about the conflict in domain name resolution since last week What can be the cause of the domain name conflict?

a DNS server is using outdated information to answer client's queries

b DNS server has heavy DNS traffic

c DNS server is low on disk space

d DNS server is having small response time

29/ You are system administrator at the WorldAd, Inc The organization has a network of systems which has two domains: greatdomain and smalldomain The greatdomain domain has a DNS server to resolve host name requests You are working in the smalldomain domain You have access rights to modify the DNS server settings of DNS server in greatdomain domain You want

to modify the settings of greatdomain's DNS server to perform the following tasks:

Check the registration of DNS resource records

Secure the DNS updates to the greatdomain's DNS server

How will you meet the requirements?

a Use dnscmd command and omit the DNS server name from the command

Trang 7

b Use dnscmd command and specify the DNS server name of the greatdomain domain.

c Specify more than one nslookup subcommands in the command line of NSlookup command used for DNS server in the smalldomain domain

d Create a batch file, which includes the dnscmd command and send it to a DNS server to execute it remotely

30/ You are the system administrator at WorldAd, Inc The organization's network consists of 500 computers and the network has two domains You are asked to implement some predefined IPSec policy on the computers so that only secured IP packets can be transmitted over the network This policy should ensure that only the computers secured with IPSec policy should be able to take part in communication In addition, it should ensure that all outgoing packets from a computer are secured before transmission How will you meet the requirements?

a By implementing Client policy

b By implementing Sever policy

c By implementing Secure Server policy

d By implementing Client and Sever policies

31/ Which Remote Access Policy parameter applies the maximum number of ports that can be used to combine the bandwidth of various modem connections into a single connection?

a Multilink

b Dial-in constraints

c Authentication

d IP properties

32/ Consider the following statements:

Statement A: System Monitor tool enables you to collect real-time performance data

Statement B: Performance Logs and Alerts tool enables you to collect data for specific services for a particular period of time

Which of the following is true with respect to above statements?

a Both statement A and statement B are false

b Both statement A and statement B are true

c Statement A is false and Statement B is true

d Statement A is true and Statement B is false

33/ You are the system administrator at WorldAd Inc The organization has five branch offices in different cities All information about organization's business details, products, and services is stored in a database at the head office in New York Users from branch offices access this information through the organization network You want to monitor the network access for authorized access In addition you want to meet the following requirements:

Make a record of errors and warning messages occurring within remote access server

Keep track of start and stop time of remote access services

Maintain a record of failed access events with the respective user information

How will you meet the requirements?

a Configure RADIUS-Based authentication and Account logging

b Configure Local Authentication and Accounting logging

c Configure Event logging and maintain an Event log

d Configure Point-to-Point logging

34/ You are the system administrator at the Houston branch of BlueMoon Computers The organization is hiring people at all levels and needs to be in constant touch with the HR Manager

at the head office at Atlanta In this case, as the administrator at Houston, you choose to

configure RRAS on the server of HR department and connect it to the head office through a dedicated phone line The server is currently installed with Windows Server 2000 The

organization is facing financial loss because of the connections between the two offices The managing director of the organization wants you to find out some way of reducing this financial loss What action should you take to fulfill the requirements of the managing director and to allow

Trang 8

all tasks to be performed as required?

a Connect the head office and the branch offices using temporary connections instead of

dedicated phone lines by upgrading the server with Windows Server 2003 and using its Unicast routing feature

b Connect the head office and the branch offices using temporary connections instead of

dedicated phone lines by upgrading the server with Windows Server 2003 and using its dial routing feature

Demand-c Connect the head office and the branch offices using temporary connections instead of

dedicated phone lines by upgrading the server with Windows Server 2003 and by using its Network Address Translation feature

d Connect the head office and the branch offices using temporary connections instead of

dedicated phone lines by upgrading the server with Windows Server 2003 and by using its Multicast routing feature

35/ You are the system administrator at BlueMoon Computers A user of the network tries to access resources over the network but is unable to do so The user complains to you about it You plan to troubleshoot the problem Which step should you perform before implementing the solution?

a Restore the data and system settings

b Take backup of the data and system settings

c Conduct tests on the solution

d Make a record of the effect of the changes made to the system

36/ You are the system administrator at BlueValley Steel Manufacturers, Inc The head office of this organization is located at Los Angeles The head office has 14000 employees The head office has implemented TCP/IP network infrastructure with class B addressing structure The organization now plans to open a new branch office at Chicago The new branch office will have around 12000 employees and will be connected to the head office using wireless LAN Identify the addressing structure that would be best suited for the new branch office

a Classless-based class B addressing structure

b Class-based class B addressing structure

c Classless-based class C addressing structure

d Class-based class C addressing structure

37/ What is the maximum number of WINS servers that can be attached to a Windows Server

2003 computer to provide NetBIOS resources to multiple mobile WINS clients?

1 Select a folder other than %Systemroot%\System32\Dhcp\Backup\New to place the backup files in the Browse For Folder dialog box

2 Right-click the server option in the left pane of DHCP console window and select the Backup command from the shortcut menu

3 Click the OK button to place the backup files in the selected folder and to close the Browse For Folder dialog box

What is the correct sequence of steps to configure the manual backup of the database?

a 1, 2, 3

b 1, 3, 2

Trang 9

c 2, 3, 1

d 2, 1, 3

39/ Global Systems Inc provides IP addresses dynamically to a large number of clients using DHCP server in Windows Server 2003 environment Recently, the clients have been complaining that they are not getting proper service from the DHCP server The system administrator, David Wong, has identified that some DHCP administrator is employing denial-of-service attack on the DHCP server So, the authorized clients are facing problems David needs to solve the problem, but first he must restrict administration of the DHCP service Which of the following guidelines should he follow?

a Change the default permissions of the DHCP folder

b Enable audit logging for each DHCP server on his network

c Add users to the DHCP Users group instead of DHCP Administrators group if users need only access to the DHCP console

read-d Provide read permissions to users who analyze the DHCP server log files

40/ You are the system administrator at Red Sky Inc The organization has a network of 300 systems The RAS on the network is running on Windows Server 2003 Some files on the RAS are corrupted because of a virus attack and you need to repair this fault To repair the fault you decide to shut down the system at 6 PM You want to notify all the clients about the unavailability

of server after 6 PM To notify all the clients you need to perform the following steps:

1 Open Routing Remote Access console

2 Select the Send to All command to display the Send Message dialog box

3 Select Remote Access Clients and right-click to display the shortcut menu

4 Type the message in the Message text area that the RAS server will not be available after 6 PM

What is the correct sequence of steps you should follow to meet the requirements?

a 1, 2, 3, 4

b 1, 2, 4, 3

c 1, 3, 2, 4

d 1, 3, 4, 2

41/ Blue Moon Computers has various departments located at different locations All the

departments are connected to the head office and to each other through the corporate network The research and development department of the organization receives and generates a lot of network traffic This network traffic slows down the entire network processing What should you,

as the system administrator at Blue Moon Computers do to troubleshoot this problem?

a Configure packet filters

b Increase the number of routers in the network

c Change the routing protocol used

d Increase the RAM of the server

42/ Consider the following statements:

Statement A: Profile is the setting that defines various parameters for accessing an organization’s private network

Statement B: Conditions are a collection of settings that are applied to a specific connection.Which of the following is true with respect to the above statements?

a Both statement A and statement B are false

b Both statement A and statement B are true

c Statement A is true and Statement B is false

d Statement B is false and Statement B is true

43/ You are the system administrator at BlueMoon Computers Two marketing executives, James and Suzan, work at Houston and Denver respectively You configure VPN support for the two marketing executives The organization’s head office is situated in Atlanta James accesses the

Trang 10

internal network of the organization from Houston and Suzan from Denver The managing

director suspects that James is trying to leak out some financial information related to the

organization projects The managing director wants you to make sure that each user accesses the database of the organization according to access permissions specified by him What should you do to fulfill the requirements of the managing director?

a Configure Remote Access Policy, user accounts for remote access, and Remote Access Policy Profile

b Configure Remote Access Policy and Remote Access Policy Profile

c Configure user accounts for remote access and Remote Access Policy Profile

d Configure Remote Access Policy and user accounts for remote access

44/ You are the system administrator at BlueMoon Computers The internal network of the

organization connects all the computers together A DNS server is installed in the network of the organization to resolve host names to their corresponding IP addresses Various projects are going on in the organization The information related to the projects is confidential A project manager complains that somebody modified the data related to his project He also suspects that somebody else is also receiving the data he sends to his team members He is afraid that if the information related to the project is leaked out to the competitors of the organization, the

organization might face heavy financial loss What should you do to make sure that the

organization does not face any such financial loss?

a Use network monitoring utility, Domain Controller Diagnostic Tool (Dcdiag), to check the IP address corresponding to the DNS name

b Use network monitoring utility, Nslookup, to check the IP address corresponding to the DNS name

c Use network monitoring utility, Hostname, to check the IP address corresponding to the DNS name

d Use network monitoring utility, Ipconfig, to check the IP address corresponding to the DNS name

45/ Consider the following statements:

Statement A: A DNS server resolving a recursive query responds with the IP address of the authoritative server

Statement B: A DNS server resolving an iterative query responds with the exact IP address of the client whose name is to be resolved

Which of the following is true with respect to the above statements?

a Both statement A and statement B are true

b Statement A is true and Statement B is false

c Statement A is false and Statement B is true

d Both statement A and statement B are false

46/ You are the system administrator at Red Sky IT Systems The organization has various departments, such as Accounts, Sales, and IT and a setup with one server and 50 client

computers The server has Windows Server 2003 installed on it and the clients have Windows 98 installed on them DHCP service is installed on the server to assign IP addresses automatically to the clients Each department is in a different subnet Now, you want to add a new computer to the network and the computer does not have any IP address In addition, no DHCP server is

available to assign IP address to the new computer The new computer is trying to locate the DHCP server by sending a message known as DHCPDISCOVER but the DHCP server is not responding In such a situation what should be configured on the Windows Server 2003 computer

so that the new computer can be a part of the network?

a User configured Alternate Configuration

b Automatic Private IP Addressing

c Boot Threshold

d DHCP Relay Agent

Trang 11

47/ Which certificate attribute defines the data regarding the entity that requests certificates from the CA?

a Version

b Serial number

c Validity period

d Subject name

48/ Which component of network access infrastructure enables an Internet Service Provider (ISP)

to connect remote users to an enterprise network or the Internet?

a Network Access Server

b Network Access Clients

to you that managing data of all computers using a single network is difficult The network

performance also degrades because of the traffic over the network He also complains that having all the computers in a single network makes it difficult to locate a computer over the network Changing the configuration of the computers according to needs of the new projects is also a tedious task What should you do to help the database administrator solve the problem?

a Divide the network of the organization into six subnets, one for each department

b Install six different servers one for each department

c Increase the total storage space on the main server

d Increase the processing speed of the existing server

51/ You are the system administrator at Blue Moon Inc The organization's network has 200 computers You have installed a DHCP server on the network to dynamically assign IP addresses

to the clients The computer used by James is not available on the network even after it is

properly connected You want to check the computer's Host name, Physical Address, IP address, Subnet Mask, and Default Gateway How will you obtain this information?

a Run Ipconfig command with /renew option on the computer's command prompt

b Run Ipconfig command with /all option on the computer's command prompt

c Run Ipconfig command on the computer's command prompt

d Run Ipconfig command with /release option on the computer's command prompt

52/ Which database file is used by the DHCP database as a swap file during database

2003 system configured as a DHCP server The clients on Subnet A and Subnet B receive IP addresses from their DHCP servers The machine on which server of subnet A is configured is

Ngày đăng: 12/08/2014, 06:22

TỪ KHÓA LIÊN QUAN

w