|
Question 1.
To secure the communication between the NFuse Web server and the MetaFrame server which of the following must then be used?
A. None of the listed
B. RC5
C. SSL
D. SecureICA
Answer: C
Question 2.
If you are upgrading a previous version of NFuse to NFuse Classic, which of the following files is then backed up during the upgrade?
A. Template.ICA
B. NFuse.properties
C. NFuse.conf
D. Default.htm
E. Config.xml
F. NFuseerrorResource.properties
Answer: B, C, F
Question 3.
The NFuse Java object 'Citrix Wire Gateway' is a link between a __________ and a Citrix server farm?
A. Web Server script
B. Firewall
C. None of the listed
D. Novell NDS
E. Active Directory
Answer: A
Question 4.
On a UNIX web server it is not possible to start the NFuse Classic Admin tool - which of the following files is then used to configure NFuse Classic?
A. NFuse.properties
B. None of the listed
C. NFuse.conf
D. Classic.conf
E. NFuse.xml
Answer: C
Question 5.
What is the default port used by Citrix Secure Gateway if used in an NFuse Classic environment?
A. 80
B. 2512
C. 2513
D. 443
E. 1494
Answer: D
Question 6.
What default port is used by the XML service?
A. 443
B. 80
C. 2513
D. None of the listed
E. 2512
F. 1494
Answer: B
Question 7.
What is the name of the ICA Win32 Web Client installation file?
A. Ica32t.exe
B. Win32.exe
C. Web32.exe
D. Icaweb.exe
E. None of the listed
F. Ica32.exe
Answer: A
Question 8.
If you close your browser when running an embedded application, what will happen to the application?
A. It will also close/stop
B. Nothing
Answer: A
Question 9.
What tag opens the 'Draw Program Neighborhood' process?
A. NFuse_DrawStart
B. /NFuse_DrawPN
C. None of the listed
D. NFuse_EndPN
E. NFuse_StartPN
F. NFuse_DrawPN
Answer: F
Question 10.
On an NFuse Classic server (IIS platform) where is the Enterprise Services for NFuse files located?
A. %Systemroot%\NFuse\Enterprise
B. None of the listed
C. \Inetpub\wwwroot
D. \Program Files\Citrix\Java\Enterprise
E. %Systemroot%\System32\NFuse
F. \Program Files\NFuse\Classic\Enterprise
Answer: C
Question 11.
It is possible to run the NFuse Classic service on more than one web server.
A. True
B. False
Answer: A
Question 12.
TLS is short for?
A. Trusted Logon Server
B. None of the listed
C. Tunnel Layer Security
D. Transport Layer Security
Answer: D
Question 13.
In what file format is the .ICA file?
A. Hex file
B. HTML file
C. INF file
D. INI file
E. None of the listed
F. Binary file
Answer: D
Question 14.
The Ticketing is a _____-sensitive ticket?
A. Time
B. Application
C. Client
D. Server
E. None of the listed
F. Hour
Answer: A
Question 15.
Which of the following is NOT an Application tag?
A. NFuse_AppIcon
B. NFuse_AppName
C. NFuse_WindowType
D. NFuse_ICAEncryption
E. None of the listed
F. NFuse_FarmName
Answer: F
Question 16.
What ICA Win32 Client version is shipped on the Components CD?
A. 6.30.1000
B. 6.20.985
C. 6.30.1050
D. 6.01.963
E. 6.01.967
F. None of the listed
Answer: D
Question 17.
The MIME type must be manually registered for which of the following ICA clients?
A. Win32
B. Win16
C. DOS
D. Java
E. None of the listed
F. Macintosh
Answer: F
Question 18.
What is the default expiration period in seconds for the Ticketing?
A. 1000
B. 20
C. 300
D. 240
E. 2000
F. 200
Answer: F
Question 19.
What is required when using NFuse Classic?
A. Router.
B. SmartCard
C. Modem.
D. An ICA Client device with a Web browser.
E. A Citrix server within a server farm.
F. A Web server.
Answer: D, E, F
Question 20.
To secure the communication between the NFuse Web server and the MetaFrame server which of the following must then be used?
A. None of the listed
B. RC5
C. SSL
D. SecureICA
Answer: C
Question 21.
When using the Ica32.exe file the Program Neighborhood user interface then be installed?
A. False
B. True
Answer: B
Question 22.
Which of the following Session Fields have by default the highest order (take precedence over the others)?
A. Post
B. Script
C. Properties
D. Cookie
E. URL
F. Template
Answer: B
Question 23.
When you login via the NFuse Classic you can use your "normal" NDS account when connecting to a MetaFrame for Windows 2000 server.
A. False
B. True
Answer: B
Question 24.
Citrix substitution tags can be used in HTML files.
A. True
B. False
Answer: A
Question 25.
SSL is short for?
A. SecureICA Services Layer
B. None of the listed
C. Secure Services Layer
D. Secure Sockets Layer
Answer: D
Question 26.
What command must be used in a Microsoft environment to list the port currently in use by the Citrix server?
A. Tcp port /view
B. netstat -a
C. None of the listed
D. port -a
E. nbtstat -view
F. Ipconfig /port
Answer: B
Question 27.
You have Chosen to use Launched applications, what is then required at the local client device?
A. Windows 2000 professional or newer
B. None of the listed
C. ICA Client
D. ICA license
E. RDP client
Answer: C
Question 28.
Which of the following clients is deployed if NFuse Classic is unable to detect the user's client device?
A. Java
B. Win32
C. DOS
D. Macintosh
E. OS/2
F. None of the listed
Answer: A
Question 29.
An NFuse Classic server is required when using the Citrix Program Neighborhood Agent client.
A. False
B. True
Answer: B
Question 30.
NFuse is a Web-based version of what program?
A. Remote Application Manager
B. Published Application Manager
C. Citrix Server Administration
D. None of the listed
E. Program Neighborhood
F. Citrix Connection Configuration
Answer: E
|
Question 1. Which statements are true about a cascaded FICON topology? Select three. A. It requires Fabric binding to be configured in all the switches. B. Only one hope (ie:traversing 2 switchs) is supported. C. Separate ISLs must be used dedicated to FICON traffic. D. Two byte link addressing as defined in FC-SB2, is mandatory. Answer: A, B, D Question 2. MDS3 _ 9509# install all system bootflash:m9500-sf1 ek9-mz.1.3.4.bin kickstart bootflash:m9500-sfek9-kickstart-mz.1.3.4.bin Verifying image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Verifying image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "sic"version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "ips" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "system" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "kickstart"version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "loader" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Compatibility check is done: Module bootable impact install-type reason --------- --------- ---------- ------- ----- --------- 2 yes non-disruptive rolling 3 yes disruptive rolling Hitless upgrade is not supported 5 yes non-disruptive reset 6 yes non-disruptive reset Images will be upgraded according to following table: Module Image Running-Version Net-Version Upg-Required --------- ------- ---------- ----------- ------ ---------- 2 slc 1.3(4b) 1.3(4) yes 2 bios v1.1.0(10/24.03) v10.8(08/07/03) no 3 slc 1.3(4b) 1.3(4) yes 3 bios v1.1.0(10/24.03) v10.8(08/07/03) no 5 system 1.3(4b) 1.3(4) yes 5 kickstart 1.3(4b) 1.3(4) yes 5 bios v1.1.0(10/24.03) v10.8(08/07/03) no 5 loader 1.2(2) 1.2(2) no 6 system 1.3(4b) 1.3(4) yes 6 kickstart 1.3(4b) 1.3(4) yes 6 bios v1.1.0(10/24.03) v10.8(08/07/03) no 6 loader 1.2(2) 1.2(2) no Do you want to continue with the installation (y/n)? [n] What is the reason the upgrade would not be hit-less for the entire switch, above? A. The supervisor module requires a BIOS upgrade, which is disruptive. B. The "rolling-upgrade" for module 2 requires a second "slc" to be hit-less. C. Module 3 is an IPS-8 card, which does not support non-disruptive downgrades. D. Nodule 3 is an IPS-8 and the switch does not have a second IPS-8 card for route diversity which could provide a "stable" upgrade. E. No reason - the upgrade is non-disruptive and hit-less. Answer: C Question 3. Which methods can be used to control Iscsi INITIATOR ACCESS TO VIRTUAL TARGETS? Select three. A. Zoning B. Specifying on which Gigabitethernet port the virtual target is advertised. C. Setting up Iscsi PROXY MODE FOR THE INITIATORS D. Specifying which IP subnet virtual target can be accessed E. Enabling role-based access control. Answer: A, B, C Question 4. In a scenario with three lSLs between two switches, a single host in VSAN 5 on switch A, and a single storage device on switch B in the same VSAN. What would be the effect on the lSLs if Flow based load balancing option was enabled in VSAN 5? A. Each subsequent frame will use the least utilized link, based on FCC. B. Each subsequent frame will use a different link. C. All frames between source and destination would follow same link for given flow. D. Flow based load balancing is not enabled for an individual VSAN. Answer: C Flow based load balancing : all frames between source and destination would follow same link for given flow. Question 5. Which organization produce standards related to SCSI, Fiber Channel or Fiber Channel protocol? Select two. A. SNIA B. T11 Committee C. Cisco Systems D. T10 Committee E. T12 Committee Answer: B, D => T11 for fiber channel, T10 for SCSI Question 6. What is the User-specified VSAN Ids range? A. 1-4093 B. 2-4093 C. 2-4094 D. 2-4092 Answer: B => user-specific VSAN 2-4093 Question 7. What can be configured on a FCIP Profile? A. Max and Min bandwidth, peer-info, compression ratio B. Passive mode, peer-info, compression ratio C. TCP port number, sack-enable, Max and Min bandwidth D. Sack-enable, TCP port number peer-info E. TCP port number, write accelerator compression ratio Answer: C => FCIP profile for TCP port, sack-enable, Max and Min bandwidth Question 8. A Brocade 12000 in its native corePID mode (1) is connected to VSAN 1009 on an MDS. What is the correct output of the "show vsan 1009" command? A. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:default loadbalancing:src-id/dst-id/oxid operational state:up. B. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:1 loadbalancing:src-id/dst-id/oxid operational state:up. C. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:2 loadbalancing:src-id/dst-id/oxid operational state:up. D. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:3 loadbalancing:src-id/dst-id/oxid operational state:up. E. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:Brocade Native loadbalancing:src-id/dst-id/oxid operational state:up. Answer: D => interop mode 3 for Brocade 12000 Question 9. What TCP feature reduces the chances of an oversized IP packets from being fragmented? A. SACK B. Extended ping C. PMTU D. Retransmit timeout E. Send buffer size Answer: C Question 10. In Raid 0+1 the loss of a single drive: A. Does not affect the redundancy of the array B. Reduces the array redundancy to that of a Raid level 0 C. Same level of redundancy to that of a Raid level 1+0 D. Reduces the performance of the array E. Has no affect what so ever on the array Answer: B
|
Question 1. You are creating a database in your RAC implementation You are using the DBCA to create the database and you selected the Raw Devices mapping file on one of the screens of the DBCA. What is the reason for selecting this file? A. You want the DBCA to bind the partitions to raw devices B. You want to configure an ASM diskgroup containing raw devices C. You want to set the appropriate raw partition for each database file D. You want to provide the DBCA with a list of all the storage devices that are currently bound to a raw interface Answer: C Question 2. To complete a cluster database creation, the DBA must choose the cluster database storage method. Which storage choice is not correct? ( Choose the incorrect one.) A. Cluster File System B. Raw Devices C. Standard UNIX File System D. Automatic Storage Management (ASM) E. Supported SAN/NAS storage Answer: C Question 3. Which statement is true? A. You must use RMAN to migrate your tempfiles to ASM storage B. You must use RMAN to migrate your flashback log files to ASM storage C. You must use RMAN to migrate your data files to ASM storage D. You must use RMAN to migrate your change-tracking file to ASM storage E. You can migrate your entire database to ASM storage without shutting down your database F. You must use RMAN to migrate your online redo log files to ASM storage Answer: C Question 4. In which directory should you put your callout scripts on your RAC nodes? A. $ORACLE_HOME/opmn/conf/ B. $ORA_CRS_HOME/racg/usrco/ C. $ORA_CRS_HOME/opmn/conf/ D. $ORACLE_HOME/racg/usrco/ Answer: B Question 5. Your four-node RAC cluster is no longer coping with workloads for one of its databases at peak periods and you decide to add another node to the cluster. The current configuration has two RAC databases, each with four instances with only the second database using ASM as a clustered database file system. ASM is installed in a separate home. Which five steps must you take to add all the software components and processes to the new node before you run DBCA to add database and ASM instances on the new cluster nodes. Do not be concerned with the correct sequence for the steps. (Choose Five.) A. Run cluvfy stage-pre crsinstfrom one of the existing nodes to verify the cluster configuration B. Run addNode.sh in the ASM home/oui/bin directory from one of the existing nodes C. Run racgons add_config from one o the existing nodes to add the ONS metadata to the OCR D. Run addnode.sh in the Clusterware home/oui/bin directory form one of the existing nodes to define the new node to all existing nodes E. Run netca from the new node to add a listener to the new node F. Run addnode.sh in the Clusterware home/oui/bin directory from each of the existing nodes once to define the new node to each existing node G. Run addNode.sh in the RDBMS home/oui/bin directory from one of the existing nodes Answer: B, C, D, E, G Question 6. Which two statements are true in a RAC environment? (Choose two.) A. After you create a service using Database Configuration Assistance (DBCA), you need to start it with a separate command B. After you create a service, you need to enable it for CRS to manage it C. After you create a service using SRVCTL, you need to start it with a separate command D. When suing SRVCTL to create a service, you do not need to add corresponding TNS entry in your tnsnames.ora E. When using DBCA to create service, you do not need to add the corresponding TNS entry in your tnsnames.ora on the cluster nodes Answer: C, E Question 7. You need to add a new service to your RAC database, called DBA to account for all the work done by database administrator sessions performing routing maintenance , to make this visible in the v$service_stats view. The maintenance would be done at quieter times but restricted session is not an option due to round-the-clock access requirements. The database administrator team may connect locally or remotely to the RAC database. You decide to use DBCA to create the new service. What must be true to allow client-server connection to the DBA service? (Choose two.) A. The service must have at least one preferred or available instance that is running and accepting logins B. The TNSNAMES.ORA file or a name server must contain the net service entries for the DBA service C. All the listeners must be reloaded using LSNRCTL RELOAD to recongnize the dynamically created service D. The ALTER SYSTEM REGISTER command must be used to include PMON to register the service with the listeners E. The services must be started using the SRVCTL START SERVICE command F. The service must be started using the DBMS_SERVICE.START_SERVICE procedure Answer: A, B Question 8. You are asked to investigate a problem regarding client connectivity between the HR service and a database, which is on a four-node RAC cluster. The HR service has four preferred instances on the RAC cluster. This cluster also supports five other services. Occasionally, a client-connect request for the HR service takes several minutes to connect, whereas the other five services connect within a second or two. Client-side and server-side connection load balancing are used for all the services. Which combination of network settings would explain these symptoms? (Choose two.) A. The TNSNAMES.ORA file has an entry for the HR service that uses only the most host name for the public IP Address and all the listeners listen on both the Public and Virtual IP addresses B. The listener on one or more nodes is listening on both the Public IP Address and the Virtual IP Address and HR TNSNAMES entry uses the Virtual IP Address C. The TNSNAMES.ORA file has an entry for the five other services that use the hostnames for the Virtual IP Addresses and all the listeners listen on both the Public and Virtual IP Addresses D. The TNSNAMES.ORA file has an entry for all six services that uses the host name for the Public IP address and not the Virtual IP Address E. The listener on one or more nodes is listening only on the virtual IP address and the HR TNSNAME entry uses the hostnames for the virtual IP addresses Answer: A, C Question 9. Exhibit: Your work as a DBA at ITCertKeys.com. You study the exhibit carefully. You are tasked to help a colleague to logically remove node NLDEDUC2 from a RAC cluster installation. On observing the colleague's terminal, you notice the output as seen in the exhibit. Based on this, which five additional steps would you recommend? Do not be concerned with the correct sequence for the steps. (Choose Five.) A. Check that the software has been removed from the database and ASM homes on NLEDUC2 B. Stop and restart the clusterware on NLEDUC1 C. Check that the node has been removed from the database and ASM inventories D. Check that the ONS configuration has been updated on the remaining node E. Remove the listener from NLEDUC2 F. Check that the database and ASM instances are all terminated on NLEDUC2 G. Remove the node from the clusterware H. Stop and restart the nodeapps on NLEDUC1 Answer: A, C, D, F, G Question 10. Which parameter file should you use to configure the Oracle notification server on your RAC nodes? A. $ORA_CRS_HOME/opmn/conf/ons.config B. $ORACLE_HOME/opmn/conf/ons.config C. $ORACLE_HOME/racg/usrco/ons.config D. $ORA_CRS_HOME/racg/usrco/ons.config Answer: A
|
Question 1. Identify two situations in which you can use Data Recovery Advisor for recovery. (Choose two.) A. The user has dropped an important table that needs to be recovered. B. The database files are corrupted when the database is open. C. You are not able to start up the database instance because the required database files are missing. D. The archived log files are missing for which backup is not available. Answer: B, C Question 2. In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command: $ SQLPLUS scott/tiger@DB01 AS SYSDBA where DB01 is the net service name. Which authentication method would be used first? A. authentication by using the local OS of the database server B. authentication by using the Oracle Internet Directory C. authentication by password file D. authentication by using certificates over SSL Answer: C Question 3. Examine the following values of the initialization parameters in the database having the SID ORCL: BACKGROUND_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/bdump USER_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/udump CORE_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/cdump DIAGNOSTIC_DEST= The environment variables have the following value: ORACLE_BASE=/u01/app/oracle ORACLE_HOME=/u01/app/oracle/product/11.1.0/db_1 What is the location of the Automatic Diagnostic Repository (ADR) home? A. /u01/app/oracle/product/11.1.0/db_1 B. /u01/app/oracle C. $ORACLE_HOME/bdump D. $ORACLE_HOME/log Answer: B Question 4. Observe the following PL/SQL block: BEGIN dbms_spm.configure('SPACE_BUDGET_PERCENT', 30); END; Which statement is correct regarding the above PL/SQL block? A. It automatically purges the SQL management objects when SMB occupies more than 30% of the SYSAUX tablespace. B. It reserves 30% of the space in the SYSAUX tablespace for SQL Management Base (SMB). C. It reserves 30% of the space in the SYSTEM tablespace for SMB. D. It generates a weekly warning in the alert log file when SMB occupies more than 30% of the SYSAUX tablespace. Answer: D Question 5. Exhibit: View the Exhibit to examine the output produced by the following query at three different times since the database instance started and has undergone workloads of different capacities: SQL> SELECT substr(component, 0, 10) COMP, current_size CS, user_specified_size US FROM v$memory_dynamic_components WHERE current_size!=0; What do you infer from this? A. All sessions are connected to the database instance in dedicated mode, and no RMAN or parallel query operations have been performed. B. The database instance is running with manual shared memory management. C. The database instance is running with manual PGA management. D. The database instance has the MEMORY_TARGET value set to a nonzero value. Answer: D Question 6. You are managing an Oracle Database 11g ASM instance having three disks in a disk group with ASM compatibility attribute set to 11.1.0 and redundancy set to high. One of the disks in the disk group becomes unavailable because of power failure. Which statements will be true in this scenario? (Choose all that apply.) A. The disk is immediately dropped from the disk group. B. The ASM tracks the extents that are modified during the outage. C. The ASM migrates the extents from the unavailable disk to the remaining disks. D. The disk automatically goes offline. Answer: B, D Question 7. The SQL Tuning Advisor has been configured with default configurations in your database instance. Which recommendation is automatically implemented without the DBA's intervention after the SQL Tuning Advisor is run as part of the AUTOTASK framework? A. statistics recommendations B. SQL profile recommendations C. restructuring of SQL recommendations D. index-related recommendations Answer: B Question 8. Exhibit: View the Exhibit to examine the Automatic Database Diagnostic Monitor (ADDM) tasks. You executed the following commands: SQL> VAR tname VARCHAR2(60); SQL> BEGIN :tname := 'my_instance_analysis_mode_task'; DBMS_ADDM.INSERT_SEGMENT_DIRECTIVE(:tname,'Sg_directive','SCOTT'); END; Which statement describes the consequence? A. All subsequent ADDM tasks including my_instance_analysis_mode_task are filtered to suppress the Segment Advisor suggestions for the SCOTT schema. B. The ADDM task is filtered to produce the Segment Advisor suggestions for the SCOTT schema only. C. The ADDM task is filtered to suppress the Segment Advisor suggestions for the SCOTT schema. D. The PL/SQL block produces an error because the my_instance_analysis_mode_task task has not been reset to its initial state. Answer: D Question 9. Which statements are true regarding table compression? (Choose all that apply.) A. It saves disk space and reduces memory usage. B. It saves disk space but has no effect on memory usage. C. It incurs extra CPU overhead during DML as well as direct loading operations. D. It incurs extra CPU overhead during DML but not direct loading operations. E. It requires uncompress operation during I/O. Answer: A, C Question 10. You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database. Which configuration should you use to accomplish this task? A. Enable Flashback Data Archive for the tables. B. Specify undo retention guarantee for the database. C. Enable supplemental logging for the database. D. Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo tablespace for that size. E. Create Flashback Data Archive on the tablespace on which the tables are stored. Answer: A
|
Question 1. A client's health screening should be administered before A. Any contact with the client. B. Any physical activity by the client at your facility. C. Fitness assessment or programming. D. The initial "walk-through" showing of a facility. Answer: B Question 2. A well-designed consent document developed in consultation with a qualified legal professional provides your facility with A. Documentation of a good-faith effort to educate your clients. B. Legal documentation of aclient's understanding of assessment procedures. C. Legal immunity against lawsuits. D. No legal benefit. Answer: A Question 3. Relative contraindications for exercise testing are conditions for which A. A physician should be present during the testing procedures. B. Exercise testing should not be performed until the condition improves. C. Exercise testing will not provide accurate assessment of health-related fitness. D. Professional judgment about the risks and benefits of testing should determinewhether to conduct an assessment. Answer: D Question 4. A male client is 42 years old. His father died of a heart attack at age 62. He has a consistent resting blood pressure (measured over 6 weeks) of 132/86 mm Hg and a total serum cholesterol of 5.4 mmol/L. Based on his CAD risk stratification, which of the following activities is appropriate? A. Maximal assessment ofcardiorespiratory fitness without a physician supervising. B. Sub maximal assessment ofcardiorespiratory fitness without a physician supervising. C. Vigorous exercise without a previous medical assessment. D. Vigorous exercise without a previous physician-supervised exercise test. Answer: C Question 5. During calibration of a treadmill, the belt length was found to be 5.5 m. It took 1 minute and 40 seconds for the belt to travel 20 revolutions. What is the treadmill speed? A. 4 m/min. B. 66 m/min. C. 79 m/min. D. 110 m/min. Answer: B Question 6. Which of the following would most appropriately assess a previously sedentary, 40-yearold female client's muscular strength? A. Using a 30-pound (18-kg) barbell to perform biceps curls to fatigue. B. Holding a handgrip dynamometer at 15 pounds (7 kg) to fatigue. C. Performing modified curl-ups to fatigue. D. U sing a 5-pound (2.2-kg) dumbbell to perform multiple sets of biceps curls to fatigue. Answer: A Question 7. Flexibility is a measure of the A. Disease-free ROM about a joint. B. Effort-free ROM about a joint. C. Habitually used ROM about a joint. D. Pain-free ROM about a joint. Answer: D Question 8. Which of the following is a FALSE statement regarding informed consent? A. Informed consent is not a legal document. B. Informed consent does not provide legal immunity to a facility or individual in the event of injury to a client. C. Negligence, improper test administration, inadequate personnel qualifications, and insufficient safety procedures are all items expressly covered by the informed consent. D. Informed consent does not relieve the facility or individual of the responsibility to do everything possible to ensure the safety of the client. Answer: C Question 9. Which of the following statements about underwater weighing is TRUE? A. It can divide the body into bone, muscle, and fat components. B. It assumes standard densities for bone, muscle, and fat. C. It can divide the body into visceral and subcutaneous fat components. D. It is a direct method of assessing body composition. Answer: B Question 10. Which of the following criteria would NOT classify a client as having "increased risk"? A. Signs and/or symptoms of cardiopulmonary disease. B. Signs and/or symptoms of metabolic disease. C. Two or more major risk factors for CAD. D. Male older than 40 years with a history of clinical depression. Answer: D
|
Question 1. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com user named Mia Hamm uses a Windows 95 client computer named ITCertKeys-WS270. ITCertKeys-WS270 contains a single hard disk drive with two partitions that have been assigned the drive letters C and D. You need to perform a clean install of Windows XP Professional on ITCertKeys-WS270. You decide to install a second hard disk drive in ITCertKeys-WS270 and assign it the drive letter E. You want the E: drive to become the boot partition. What should you do? A. Select Advanced Options from the Install Options dialog box in Setup. B. At the command prompt, run winnt32.exe /syspart:E. C. Define the TargetPath option in an answer file and use the answer file to perform an unattended installation. D. Use Sysprep to create an image for ITCertKeys-WS270. Answer: A Explanation: The boot partition is the partition that constrains the %SystemRoot% folder into which set up copies the Windows XP Professional system files. This partition can be the primary partition of a logical partition. You can specify which drive letter or partition Setup should use in the Advanced Options dialog box. Incorrect answers: B: The syspart switch is used to copy Set up files to a temporary hard disk drive that can be moved to another computer on which the installation is to be performed. The syspart switch marks the specified drive letter as the system partition to which Setup will copy the Setup startup files. The hard drive can then be moved to a new computer where Windows XP Professional Setup will begin at the next phase. C: The TargetPath option of an answer file specifies the name of the folder in which Windows XP Professional will be installed. It does not specify the drive letter or partition. D: Sysprep is used to create an image that contains the operating system and the applications that are to be installed on a target computer. However, the Sysprep image can only contain a single partition and will replace the C: drive. Reference: Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 1 Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 12 Question 2. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. Half the client computers run Windows NT 4.0 Workstation and the rest run Windows XP Professional. The ITCertKeys.com network also contains a file server named ITCertKeys-SR24. You need to upgrade a Windows NT 4.0 client computer named ITCertKeys-WS290 to Windows XP Professional. However, the Windows XP Professional installation CD does not contain the drivers for the network adapter card currently installed on ITCertKeys-WS290. You copy the i386 folder from the Windows XP professional installation CD to a shared folder named i386 on ITCertKeys-SR24. In the i386 shared folder you create a folder named Testadpcrd and copy the drivers for the network adapter card to the Testadpcrd folder. You want the Testadpcrd folder to be copied to thefolder on ITCertKeys-WS290 during the upgrade process. After the upgrade, you want to be able to access the drivers in the Testadpcrd folder for future use. What should you do on ITCertKeys-WS290? A. At a command prompt, run the Winnt.exe command with the /r:testadpcrd switch. B. At a command prompt, run the Winnt.exe command with the /rx:testadpcrd switch. C. At a command prompt, run the Winnt32.exe command with the /copysource:testadpcrd switch. D. At a command prompt, run the Winnt32.exe command with the /copydir:testadpcrd switch. Answer: D Explanation: In the i386 folder you will find the Winnt32.exe or Winnt.exe. In the command prompt you the use the Winnt32.exe command with the copydir switch. The copydir:folder name create a customized subfolders that can be used with the Windows XP Professional installation. If you use the /copydir option, the folder is not deleted. Incorrect answers: A: The /r switch is used with the winnt command. The winnt command is used to install Windows XP Professional on a computer that is not running Windows 98, Windows Me, Windows NT 4 Workstation, Windows 2000 Professional, or Windows XP Home Edition. B: The /rx switch is used with the winnt command. The winnt command is used to install Windows XP Professional on a computer that is not running Windows 98, Windows Me, Windows NT 4 Workstation, Windows 2000 Professional, or Windows XP Home Edition. C: The /copysource:folder name is used to create a temporary subfolder for Windows XP Professional files to be used during the installation process. Once the installation process is complete, the folders created with this process are deleted. If you use the /copydir option, the folder is not deleted. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 11 Question 3. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains ten Windows 2000 Server computers and 1,200 Windows 98 client computers. ITCertKeys.com intends to hire another 25 employees over the next 3 months. The company has purchased 25 new client computers that will be issued to the new employees. You have been instructed to install Windows XP Professional as well as a standard set of applications on the new client computers. The new client computers consist of five different hardware configurations as shown in the following table: All the hardware on the new client computers appears on the Hardware Compatibility List (HCL). You intend to use RIPrep to deploy Windows XP Professional and the applications on the new client computers. How many RIPrep images would you require? A. Twenty Five B. Five C. Four D. One Answer: C Explanation: The 25 client computers are classed in four categories because you need a separate image for each supported hardware abstraction layer (Hal) that is used in the four different client computers. To use Sysprep, all computers to which you intend to install Windows XP Professional (also known as target computers) must have the same hardware abstraction layer (HAL), Advanced Configuration and Power Interface (ACPI) support, and mass storage controller devices as found in the reference computer that you prepare using Sysprep. The HAL for the imaged computer and the target computers must match. For example, you could not apply an ACPI-based HAL on a non-ACPI-based computer. For other hardware differences, the RIPrep wizard will use Plug and Play capabilities to detect any hardware differences between the source and destination computers. Incorrect answers: A: There is no need to create 25 images; the installation wizard will detect hardware components. If the devices are Plug and Play, the Plug and Play manager will configure the device. B, D: You do not need to create one or for that matter five images; different HALs are needed for the computers that support ACPI and those not. Different HALs are needed for single processors and dual-processor systems. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 41 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2 Question 4. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com contains a server named ITCertKeys-SR10 that is used for Remote Installation Services (RIS) and Remote Installation Preparation (RIPrep). Due to company growth, ITCertKeys.com has acquired 40 new client computers. You have been instructed to install Windows XP Professional as well as a standard set of applications on the new client computers. You intend using the RIS and the RIPrep wizard to install Windows XP Professional on all the new client computers. You install Windows XP Professional and the client applications on a reference computer named ITCertKeys-WS288. After creating the RIPRep image, you discover that Microsoft has just released a new service pack for Windows XP Professional. You want to apply the service pack to the RIPrep image before deploying Windows XP Professional to the new client computers. What should you do? A. At a command prompt on ITCertKeys-WS288, run riprep.exe B. Use xcopy to copy the files from the service pack to ITCertKeys-SR10. C. Slipstream the service pack files to the RIPrep image on ITCertKeys-SR10. D. At a command prompt on ITCertKeys-WS288, run sysprep.exe Answer: C Explanation: Slipstreaming is the act of integrating service pack files with operating system installation files, so that the operating system can be installed together with the service pack in a single operation. To maintain the correct version, you must integrate the slipstream the service pack into the RIPrep image of ITCertKeys-SR10. Incorrect answers: A: A (RIPrep) image is a type of image configured on a Remote Installation Services (RIS) server. A RIPrep image can contain the Windows XP Professional operating system and applications. This type of image is based on a preconfigured computer. In this case it cannot run until the RIPrep image version matches the version of Windows XP Professional on the server. It can only be done after the slipstreaming. B: With xcopy you can override the default results for permissions. The /o switch of the Xcopy command copies the file access control list (ACL), which includes all the permissions along with the file. You can use the /x switch to copy the information in addition to the ACL. This means that you cannot create an RIS image of a workstation D: Sysprep works together with a third-party imaging application such as Norton Ghost or Symantec Drive Image to create cloned copies of the system drive with unique security identifiers (SIDs) that satisfy the requirement that all computers on the network must have a unique SID. Reference: Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2 Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 51 Question 5. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains ten Windows 2000 Server computers and 1,200 Windows 98 client computers. Due to company growth, ITCertKeys.com intends to hire an additional 200 employees over the next 6 months. The company has purchased 200 new client computers that will be issued to the new employees. You have been instructed to install Windows XP Professional as well as a number of proprietary applications on the new client computers. You want to deploy Windows XP Professional and the propriety applications using the least amount of administrative effort? What should you do? A. Use an answer file when installing Windows XP Professional and install the proprietary after the installation is complete. B. Run the Winnt32.exe /unattend from a command prompt. C. On a reference computer, install the Windows XP Professional and the applications and configure the settings as needed. Then run RIPrep.exe from the command prompt. Then use Remote Installation Services (RIS) to install the RIPrep image. D. On a reference computer, install the Windows XP Professional and the applications and configure the settings as needed. Then run Sysprep.exe from the command prompt. Then use Remote Installation Services (RIS) to install the Sysprep image. Answer: C Explanation: Because these are new computers you should use Remote Installation Services. RIS can be used only for clean installations and can't be used to upgrade a previous version of Windows. Because the installation comes from a reference computer, these computer's Hardware Abstraction Layer (HAL) must be the same as the other client computers that need the installation. You should then create an image by using RIPrep.exe, on the reference computer. A (RIPrep) image is a type of image configured on a Remote Installation Services (RIS) server. A RIPrep image can contain the Windows XP Professional operating system and applications. You should connect the client computers to the network and the client computers that are Pre-boot Execution Environment (PXE) enabled will start automatically. PXE is a technology that is used to boot to the network when no operating system or network configuration has been installed and configured on a client computer. Incorrect answers: A: You do not want the new employees to intervene with the installation because thy do not have much experience. With Winnt.sif a floppy disk is needed, which means the new employees must insert the floppy disk containing the files after the first reboot, when the text-based portion of Setup is beginning. B: This here is new client computer. You can only use Winnt32.exe if the client computers are already running a 32-bit Windows operating system. D: You can use Sysprep.exe to create an installation image, but Sysprep images cannot be deployed using a RIS server. You should create a RIPrep image instead. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 51 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2 Question 6. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server and all client computers run Windows 2000 Professional. The ITCertKeys.com network contains a file server named ITCertKeys-SR14 and 1,500 client computers. You have been instructed to perform a clean installation Windows XP Professional on 100 of the client computers. The custom settings and personal data of the users of these client computers must be preserved. You want to use Remote Installation Services (RIS) to deploy Windows XP Professional to these client computers. You also want to use the least amount of administrative effort. What should you do? A. You should copy the user state data to ITCertKeys-SR14 by using the Scanstate.exe and run the Loadstate.exe to apply the settings to the 100 client computers. B. On all the 100 client computers you should back up the user state data and perform a operating system upgrade and restore user state data to the client computers from the back ups. C. You should copy each of the 100 user's profiles to a network share. When the upgrade is complete the users then can retrieve their profiles. D. Backup the Systems State data from the 100 client computer to a network share. Restore the System State data once the installation of Windows XP Professional is complete. Answer: A Explanation: The case states that you want to use (RIS).You can use the User State Migration Tool (USMT) to transfer personal data, application settings and personal operating systems data. Windows XP Professional ships with a utility called the User State Migration Tool (USMT) that is used by administrators to migrate users from one computer to another via command-line utilities. The USMT is almost the same as the FAST Wizard with the following differences: * The USMT is more configurable and can use INF files to specify which files and settings are transferred. * The USMT is scriptable and uses command-line utilities to save and restore user files and settings. The options also states that you should use Scanstate.exe and run the Loadstate.exe. The USMT consists of two executable files, ScanState.exe and LoadState.exe. * ScanState.exe collects user data and settings information based on the configuration of the Migapp.inf, Migsys.inf, Miguser.inf, and Sysfiles.inf files. * LoadState.exe then deposits the information that is collected from the source computer to a computer running a fresh copy of Windows XP Professional. Incorrect answer B: To back up the 100 client computers and to restore the user's personal on all the 100 client computers is more time consuming. C: The user profile only contains the desktop and logon settings. For the users to retrieve their profiles would not give them their custom settings that are associated with the applications from their client computers. D: The Systems State data from Windows 2000 and Windows XP Professional is different. Window 2000's Systems State data includes system boot files, the registry, all files that are protected by the Windows File Protection and the COM+ Class Registration database. The option states that you copy the Systems State data from the client computer, which means from Windows 2000. The Windows XP's User State Migration Tool (USMT) to transfer personal data, application settings and personal operating systems data. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 103 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 3 Question 7. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains ten Windows 2000 Server computers, 600 Windows 98 client computers and 1,000 Windows 2000 Professional client computers. ITCertKeys.com intends to hire another 75 employees over the next 6 months. The company has purchased 75 new PXE-enabled client computers that will be issued to the new employees. You have been instructed to install Windows XP Professional on the new client computers. You attach the new client computers to the network as shown in the network exhibit. Network exhibit: You want to perform an unattended installation of Windows XP Professional on the new computers. You create an installation image of Windows XP Professional on ITCertKeys-SR16. You start one of the PXE-enabled client computers. However, after completing the power-on self test (POST) the PXE-enabled client computer reports that no operating system is available. You need to ensure that Windows XP Professional can be deployed successfully on the new client computers. What should you do? A. On the PXE-enabled client computer you should perform the Rbfg.exe command from the command prompt. B. In the system BIOS of the PXE-enabled client computer, specify the NIC as the first boot device. C. You should add a WINS server to ITCertKeys.com's network and restart the PXE-enabled client computer. D. You should recreate the installation image and restart the PXE-enabled client computer. Answer: B Explanation: The scenario states that you started the PXE-enabled client computer with the Windows XP Professional CD. The PXE-enabled client computer is not configured to boot from the boot-Rom on its NIC. Client computers must meet the proper design specification to be installed with RIS. This includes the capability for remote booting, which is usually accomplished by adding a network interface card (NIC) that is equipped with a PXE ROM-enabled chip, along with support in the BIOS for booting the computer from this NIC. Incorrect answer A: The client computer is PXE-enabled, so to perform the Rbfg.exe is not necessary. Rbfg.exe is used to create a specialized floppy boot disk that can communicate with an RIS server to start a remote installation. C: RIS allows an administrator to remotely install operating systems on client computers. To use RIS, you need to install this component on the server. The following server components must be available on the RIS server or on another server available to the RIS server: * Dynamic Host Configuration Protocol (DHCP) that provides TCP/IP configuration parameters that enables the client computer to create its own network connection. * Domain Name System (DNS) that provides name resolution services so that the client computer can locate the RIS server by name. * Active Directory because the RIS operates only in an Active Directory-enabled domain environment. You cannot use RIS in a workgroup environment. D: You are not required to recreate the installation image. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 41 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2 Question 8. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains 20 Windows 2000 Server computers and 1,600 Windows 2000 Professional client computers. ITCertKeys.com also contains a server named ITCertKeys-SR20 that is used for Remote Installation Services (RIS). ITCertKeys.com intends to hire another 200 employees over the next 12 months. The company has purchased 200 new client computers that will be issued to the new employees. You have been instructed to install Windows XP Professional as well as some propriety applications on the new client computers. You want to deploy Windows XP Professional and the proprietary applications using the least amount of administrative effort? What should you do? A. You should copy an installation of Windows XP Professional with the customized settings and the proprietary applications on a reference computer and copy the hard drive content of the reference computer to a shared folder on ITCertKeys-SR20. B. You should copy an installation of Windows XP Professional with the customized settings and the proprietary applications on a reference computer, then remove its hard drive and install it in a removable cartridge on ITCertKeys-SR20. C. You should copy an installation of Windows XP Professional with the customized settings and the proprietary applications on a reference computer and then run the RIPrep.exe to create the installation image. D. You should copy an installation of Windows XP Professional with the customized settings and the proprietary applications on a reference computer and then run the Sysprep.exe to create the installation image. Answer: C Explanation: ITCertKeys.com has a RIS server. To deploy Windows XP Professional and the proprietary applications, you should install these items on the reference computer which has the same HAL as the target computers. RIS can be used only for clean installations and can't be used to upgrade a previous version of Windows. A (RIPrep) image is a type of image configured on a Remote Installation Services (RIS) server. A RIPrep image can contain the Windows XP Professional operating system and applications. You should connect the client computers to the network and the client computers that are Pre-boot Execution Environment (PXE) enabled will start automatically. PXE is a technology that is used to boot to the network when no operating system or network configuration has been installed and configured on a client computer. Incorrect answer A: To copy the copy the hard drive content of the reference computer to a share folder on the RIS server ( ITCertKeys-SR20) will not enable you to install the required Windows XP Professional installation. B: To remove its hard drive and install it in a removable cartridge on RIS server ( ITCertKeys-SR20) will not enable you to install the required Windows XP Professional installation. D: Sysprep works together with a third-party imaging application such as Norton Ghost or Symantec Drive Image to create cloned copies of the system drive with unique security identifiers (SIDs) that satisfy the requirement that all computers on the network must have a unique SID. Sysprep is not compatible with RIS. Reference: Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2 Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 41 Question 9. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains 20 Windows 2000 Server computers and 1,600 Windows 2000 Professional client computers. ITCertKeys.com is in the process of upgrading the client computers to Windows XP Professional. You want to use cloning to deploy Windows XP Professional to the client computers in the Finance Department. You install a client computer named ITCertKeys-WS270 in your test lab and install Windows XP Professional on ITCertKeys-WS270. You then install the required applications on ITCertKeys-WS270 and configure the computer. After ensuring that ITCertKeys-WS270 performs as expected, you log onto the computer as the local Administrator. However, when you attempt to run sysprep.exe at the command prompt, sysprep.exe does not execute. What is the most probable cause of this problem? A. The disk drive on ITCertKeys-WS270 has multiple partitions. Sysprep can only clone a single partition. B. The sysprep files are not in the systemdrive\sysprep directory. C. To run the sysprep utility, you must be a member of the Domain Admins group. D. The partitions on ITCertKeys-WS270 are formatted with FAT32. Answer: B Explanation: For Sysprep.exe to run you need the following files Sysprep.exe, Setupcl.exe and Sysprep.inf on a floppy disk or in the systemdrive\sysprep directory. Incorrect answer: A: Sysprep.exe can work on any Windows file system. C: Not only the Domain Admins group has that privilege, but the administration account has also sufficient privileges to run Sysprep.exe. D: Sysprep.exe can work on any Windows file system. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 62 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2 Question 10. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. Due to company growth, ITCertKeys.com intends to hire an additional 200 employees over the next 6 months. The company has purchased 200 new client computers that will be issued to the new employees. You have been instructed to install Windows XP Professional on the new client computers. You want to use the Sysprep tool to install Window XP Professional on the client computers. The written ITCertKeys.com usage policy states that no user may use Add or Remove Programs in the Control Panel. You need to deploy Windows XP Professional to the new client computers. You also need to ensure that the written usage policy is not violated. You install Windows XP Professional on a reference computer named ITCertKeys-WS232. What should you do next? A. On ITCertKeys-WS232, delete Control.exe before creating the Sysprep image. B. On ITCertKeys-WS232, create a local computer policy that removes Add or Remove Programs from Control Panel. C. Create a new organizational unit (OU) named NewComputers. Move the new client computers to the NewComputers OU and apply a GPO that removes Add or Remove Programs from Control Panel to the NewComputers OU. D. Configure the default Domain Controller policy for the ITCertKeys.com domain to remove Add or Remove Programs from Control Panel. Answer: B Explanation: The System Preparation Tool (Sysprep.exe) is used to prepare a computer for disk imaging, which can be done with a third-party image software or with disk-duplicator hardware. Disk imaging (also sometimes called disk cloning or disk duplication) is the process of creating a reference computer for the automated deployment. To deploy this policy, you can set the Remove Add/Remove Programs to Enable in the local computer policy on the reference computer. Incorrect answer: A: The Control.exe can be run from the command prompt. This command is used to start Control Panel. C, D: Sysprep does not support Active directory-related settings. Policies enforced through GPO's in the active directory do not affect stand alone computers or workgroup. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, P. 45 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2
|
Question 1. You work as a desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains ten Windows 2000 Server computers and 1,200 Windows 2000 Professional client computers. ITCertKeys.com has headquarters in London and branch offices in Paris, Minsk, and Athens. The CIO of ITCertKeys.com has sent a manager named Andy Reid to work in the office of Paris. Andy Reid has taken with him the Windows XP Professional Full PaITKaged Product (FPP). Accompanying the FPP is a Microsoft Select License for the installation of Windows XP Professional. At Paris Andy Reid wants install Windows XP Professional on a laptop. Andy Reid uses the installation media in the Product Fulfillment kit with the Microsoft Select License for the installation. Andy Reid then contacts you to state his problem "a screen requires the input of a product license key". Andy Reid wants to know which product key he should use. What should you tell him? A. The FPP product key B. The VLK product key C. A product key that is acquired by the security Web site. D. Use the product key printed on a stiITKer at the bottom of the laptop. Answer: B Explanation: If you want to license Windows XP Professional, you should use the Volume Product License Key (VLK). Incorrect answer: A: The FPP is used to install media which is provided in an FPP. C: If you make use of the security website, you or Andy Reid will violate the Microsoft License agreement. D: The Windows XP Professional product key which is on the laptop is intended only for the installation of Windows XP Professional on the system to which the stiITKer is attached. Question 2. You work as a desktop technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. A ITCertKeys.com user named Rory Allen is a member of the Research and Development department. One morning Rory Allen complains that he is unable to join the ITCertKeys.com domain with his Windows XP computer. You tell Rory Allen to ping a domain controller in ITCertKeys.com, which was successful. What should you tell him to do next? A. Rory Allen should verify the domain mode. B. Rory Allen should verify the operating system version. C. Rory Allen should verify the hardware compatibility. D. Rory Allen should verify the network connectivity. Answer: B Explanation: The Windows XP Professional can join a Windows Server 2003 domain, not the Windows XP Home Edition. This is the difference if the two operating systems. Incorrect answer: A: It is not needed to make sure of the domain mode because Windows XP Professional cam interoperate with Windows Server 2003. C, D: The hardware compatibility or the network connectivity his not the problem. It states in the scenario that Rory Allen did ping the domain which was successful. Question 3. You work as a desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. ITCertKeys.com consists of a Sales department. A ITCertKeys.com employee named Mia Hamm works in the Sales department. Due to volume of work, Mia Hamm needs her computer every minute. One morning Mia Hamm came to you and said that she needs the latest versions of the security patches from Microsoft. Mia Hamm wants the update to be installed without intervention from her. What should you tell Mia Hamm to do? A. Use Software Update Services (SUS). B. Use the Windows Update. C. Use Automatic Updates. D. Use Windows Unattended Installation. Answer: C Explanation: Mia Hamm should use the Automatic Updates. She can schedule the update to run after hours. Incorrect answer: A: SUS uses a local Windows Update Server. The question doesn't say ITCertKeys.com has a SUS server. B: If Mia Hamm is going to use Windows Updates, she has to manually download and install the updates. D: The Unattended Installation will allow her to install Windows XP Professional without doing anything. It is not used to download and install updates every day. Question 4. You work as the administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains ten Windows 2000 Server computers and 1,300 Windows 2000 Professional client computers. ITCertKeys.com consists of three departments, named Sales, Marketing, and Accounting. Due to the growth of the Sales department, ITCertKeys.com will hire another 100 employees over the next month. The CIO acquires 100 new Windows XP Professional computers which will be added to the ITCertKeys.com network. Amy Walsh is a new employee in the Sales department. You install Windows XP Professional on a client computer named ITCertKeys -WS271 for Amy Walsh. You need to ensure that Amy Walsh can use her ITCertKeys -WS271 for at least three years. You also want to send Microsoft information about ITCertKeys.com. What should you do? A. Register the operating system on ITCertKeys -WS271. B. Activate and register the operating system on ITCertKeys -WS271 during the installation process. C. Reboot on ITCertKeys -WS271 after installation and press F8 during the boot process. D. Reboot on ITCertKeys -WS271 after installation and press DEL or F2 during the boot process. Answer: B Explanation: If you register the computer, Microsoft will have information about the company and if you activate the operating system, it will continue after 30 days. Incorrect Answers: A: Registering will not allow the computer to stop with Windows XP Professional. You need to activate the operating system. C: If you press F8 when the operating system is rebooting, it will display the Boot Menu with options such as Safe Mode or Safe Mode with Network support etc. D: If you press the DEL of F2 key, it will display the CMOS setup program. Question 5. You work as a desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has its headquarters in Chicago and a branch office in Dallas. ITCertKeys.com consists of a Sales department and a Marketing department. The Marketing department is in Chicago and the Sales department is in Dallas. A ITCertKeys.com employee named Amy Wilson works in the Sales department. She wants to install Windows XP Professional on a system in the Dallas office without the risk of infection of a worm or virus before the completion of the installation. Amy Wilson also wants File and Printer Sharing for Microsoft Networks to be disabled. What should Amy Wilson do? A. In the Setup Wizard, use the Custom settings option of the Networking Settings dialog box. B. In the Setup Wizard, use the Typical settings option of the Networking Settings dialog box. C. In the Setup program, use the Advance Options on the Install Options page. D. Disconnect the Network Interface Card (NIC) from the Ethernet cable. Answer: A Explanation: In the Custom settings option of the Networking Settings dialog box, Amy Wilson can disable the File and Printer Sharing for Microsoft Networks. This setting is usually enabled by default. Incorrect answer: B: If she uses the Typical setting, the option will be enabled. C: You only use the Advance Options on the Install Options page to identify the location of the setup files; select disk partitions; etc. D: There is no need to disconnect the Network Interface Card (NIC) from the Ethernet cable, the File and Printer Sharing for Microsoft Networks will be installed by default. Question 6. You work as a desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. A ITCertKeys.com user named Andy Booth tries to install is Windows XP Professional on a client computer named ITCertKeys -WS277. ITCertKeys -WS277 is currently running Microsoft Windows 98. When Andy Booth inserts the Windows XP Professional CD into the CD-ROM drive and reboots ITCertKeys -WS277, Windows 98 loads instead of the Windows XP Professional setup program. Andy Booth wants to ensure that ITCertKeys -WS277 will load the Windows XP Professional setup program. What should Andy Booth do? A. Create a MS-DOS with the Add or Remove Programs, boot the computer with the disk and change to the CD-ROM drive and run winnt32.exe. B. Remove the drive with the Windows 98 files in the System utility. C. Create the installation disks with WinXP_EN_PRO_BF.exe, and boot from the disk. D. Enter the BIOS setup program and change the boot order for the CD-ROM drive to be cheITKed first. Answer: D Explanation: Andy Booth should change the starting order so that the computer cheITKs the CD-ROM first. When a computer starts, it will cheITK for the startup files on the hard drive. By changing it to cheITK the CD-ROM first, it will then find the Windows XP's startup files. Incorrect Answers: A: If he creates a MS-DOS disk, he should use the winnt.exe and not the winnt32.exe. B: You cannot configure the boot order with the System utility. C: WinXP_EN_PRO_BF.exe is used to install the correct drivers for a Windows XP installation. It is not used to create an installation disk. Question 7. You work as a desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains ten Windows 2000 Server computers and 1,200 Windows 2000 Professional client computers. ITCertKeys.com consists of three departments, named Sales, Marketing, and Finance. ITCertKeys.com intends to hire another 50 employees over the next 3 months. The new employees will be assigned to the Sales department. The company has purchased 50 new client computers that will be issued to the new employees. You are required to install Windows XP Professional as well as a standard set of applications on the new client computers. All the hardware on the new client computers appears on the Hardware Compatibility List (HCL). You install Windows XP Professional on one of the new client computers named ITCertKeys -WS102. However, once the installation is complete ITCertKeys -WS102 fails to start and you receive a "STOP INACCESSIBLE BOOT DEVICE" error message. You need to ensure that ITCertKeys -WS102 can start properly. What should you do? A. In the system BIOS, disable UDMA for the primary hard disk. B. Use the Recovery Console and run the Fixboot and Fixmbr commands. C. In the system BIOS, disable all PIO modes for the primary hard disk. D. In the system BIOS, disable the virus scanning software. Answer: B Explanation: FIXBOOT is used to write a new boot sector onto the computer's system partition and FIXMBR is used to repair the MBR of the computer's boot partition. Incorrect answer: A, C: UDMA and PIO are automatically set at boot time. This will have no effect on the booting of the system. D: To disable the virus scanning option will not interfere during the installation. It will have no effect on the booting of the system. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, p. 657 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 9 Question 8. You work as a desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows 2000 Professional. ITCertKeys.com consists of three departments, named Research, Marketing, and Accounting. Amy Walsh is the manager of the Research department. She currently uses a client computer named ITCertKeys -WS129. ITCertKeys.com purchases a new computer named ITCertKeys -WS200 for Amy Walsh. ITCertKeys -WS200 has two hard drives that are connected to an ISA SCSI adapter and an IDE CD-ROM drive. You have been instructed to install Windows XP Professional on ITCertKeys -WS200. You decide to install Windows XP Professional from the Windows XP Professional installation CD. You configure ITCertKeys -WS200 to boot from the CD-ROM and attempt to install Windows XP Professional. However, the installation fails and you receive an error message stating that Setup cannot locate any hard disks on ITCertKeys -WS200. You need to ensure that you can install Windows XP Professional successfully on ITCertKeys -WS200. What should you do? A. During the installation, provide the SCSI adapter driver when prompted. B. In the system BIOS, assign an IRQ for a PCI video adapter. C. Replace the multi syntax with scsi syntax in the Boot.ini file. D. Ensure that the SCSI bus is properly terminated. Answer: A Explanation: The Windows XP Professional installation does not recognize the SCSI adapter. You should restart Setup and press F6 when prompted. You then should press S and provide the SCSI adapter driver on a floppy disk. Incorrect answer: B: Windows Plug and Play would assign the video card an available IRQ. C: According to the scenario the set up has failed immediately. TheBoot.ini is created when it is close to the first reboot. D: This could potentially be a cause of the problem; however, it is far more likely to be a driver issue. If the bus wasn't properly terminated, you would get an error during the POST process before the installation starts. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, p. 106 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 4 Question 9. You work as a desktop technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows 2000 Professional. ITCertKeys.com includes a Finance department. ITCertKeys.com has just acquired a new computer for an employee named Andy Reid. You set the BIOS for the following boot sequence: CD-ROM, Floppy disk drive and Hard disk. You then boot the computer from the Windows XP Professional installation CD-ROM. When you reboot he computer after the Windows XP installation, you insert a CD-ROM and install TechNet with the Minimum setup option. There after you insert a floppy disk and install the latest video driver. When the computer again reboots it displays the following error message: Non-system disk or disk error. Replace and press any key to continue. You need to start the computer with the least amount of administrative effort. What should you do? A. Remove the floppy disk and press SPACEBAR. B. Start in Safe Mode and uninstall the video driver. C. Remove the CD-ROM from the drive and press SPACEBAR. D. Set the CD-ROM as the last device in the boot order. Answer: A Explanation: You should remove a floppy disk and then press the SPACEBAR. If it is not a bootable disk then the computer will show an error message. Incorrect answer: B: It is not needed to start in Safe Mode and uninstall the video driver. With a floppy disk in a floppy disk drive, you will not be able to restart in Safe Mode. C: It is not needed to remove the CD-ROM from the drive and press SPACEBAR. Th4e drive will determine that the CD-ROM is not bootable. D: There is no need to change the boot sequence because the CD-ROM is not bootable. Question 10. You work as a desktop technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains 20 Windows 2000 Server computers and 1,600 Windows 2000 Professional client computers. ITCertKeys.com is in the process of upgrading the client computers to Windows XP Professional. You want to use cloning to deploy Windows XP Professional to the client computers in the Marketing Department. You install a client computer named ITCertKeys -WS240 in your test lab and install Windows XP Professional on ITCertKeys -WS240. You then install the required applications on ITCertKeys -WS240 and configure the computer. After ensuring that ITCertKeys -WS240 performs as expected, you log onto the computer as the local Administrator. However, when you attempt to run sysprep.exe at the command prompt, sysprep.exe does not execute. What is the most probable cause of this problem? A. The disk drive on ITCertKeys -WS240 has multiple partitions. Sysprep can only clone a single partition. B. The sysprep files are not in the systemdrive\sysprep directory. C. To run the sysprep utility, you must be a member of the Domain Admins group. D. The partitions on ITCertKeys -WS240 are formatted with FAT32. Answer: B Explanation: For Sysprep.exe to run you need the following files Sysprep.exe, Setupcl.exe and Sysprep.inf on a floppy disk or in the systemdrive\sysprep directory. Incorrect answer: A: Sysprep.exe can work on any Windows file system. C: Not only the Domain Admins group has that privilege, but the administrator account has also sufficient privileges to run Sysprep.exe. D: Sysprep.exe can work on any Windows file system. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide; Third Edition, Sybex Inc., Alameda, 2005, p. 62 Melissa Craft & Don Poulton, Exam Prep 2: Windows XP Professional, Que Publications, Indianapolis, 2005, Chapter 2
|
Question 1. You work as the Exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory forest named ITCertKeys.com. ITCertKeys.com has its headquarters in Chicago and a branch office in Miami. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. ITCertKeys.com has additionally configured the headquarters as a forest root domain containing a separate site. The ITCertKeys.com branch office as a result was configured as a child domain containing one site. ITCertKeys.com has both office sites containing domain controllers configured with the default settings for the domains they are responsible for. You have recently received instruction from the ITCertKeys.com network CIO to have a designated network administrator deploy Exchange Server 2003 to both sites whilst ensuring that Active Directory is first prepared prior to the installation of any Exchange servers. Which two of the following options should you do to prepare Active Directory? A. You should consider running the DomainPrep program in the ITCertKeys.com headquarters B. You should consider running the ForestPrep program only in the ITCertKeys.com branch office C. You should consider running the ForestPrep program in the ITCertKeys.com headquarters D. You should consider running the DomainPrep program only in the ITCertKeys.com branch office E. You should consider running the DomainPrep program in each office F. You should consider running the ForestPrep program in each office Answer: C, E Explanation: Since there is a designated Exchange administrator the ForestPrep and DomainPrep must be run in the forest root domain and you should then run the DomainPrep program in the child domain. ForestPrep and DomainPrep are run in the root domain because the first domain controller in the domain will be configured as the schema master and global catalog server. Question 2. You work as the network Exchange administrator at ITCertKeys.com. The ITCertKeys.com network forest consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a member server named ITCERTKEYS-SR07. You have received instruction from the CIO to install the first Exchange Server 2003 server on ITCERTKEYS-SR07. You are required to ensure that the installation of Exchange Server 2003 completes successfully without performing unnecessary actions by selecting which prerequisites are required in order to perform the installation. (Choose TWO.) A. Membership to the Domain Admins group is required and the Exchange 2003 ForestPrep program must be run on any server B. Promote ITCERTKEYS-SR07 to domain controller and run the Exchange 2003 ForestPrep program on any server C. Membership to the Schema Admins and Local Administrators group on ITCERTKEYS-SR07 is required D. The DomainPrep program must be run on any server and the ForestPrep program must be run on the schema master E. Membership to the Enterprise Admins group is required Answer: C, E Explanation: Membership to the Enterprise Admins and Schema Admins groups on the forest root and Local Administrators group membership are required if you want to install Exchange 2003 in a forest on a member server. Providing you are a member of the mentioned groups membership to no other groups are required to install Exchange Server 2003. Incorrect Answers: A: ForestPrep and DomainPrep are used to prepare Active Directory schema and domain for Exchange Server2003, as you are a member of the Schema Admins, Enterprise Admins groups on the forest root and are a member of the Local Administrators group on ITCERTKEYS-SR07 you will not require running DomainPrep and ForestPrep. As it is a single domain the schema master and global catalog server resides their so there is no need for ForestPrep or DomainPrep. B: ForestPrep and DomainPrep are used to prepare Active Directory schema and domain for Exchange Server2003, as you are a member of the Schema Admins, Enterprise Admins groups on the forest root and are a member of the Local Administrators group on ITCERTKEYS-SR07 you will not require running DomainPrep and ForestPrep. As it is a single domain the schema master and global catalog server resides their so there is no need for ForestPrep or DomainPrep. D: ForestPrep and DomainPrep are used to prepare Active Directory schema and domain for Exchange Server2003, as you are a member of the Schema Admins, Enterprise Admins groups on the forest root and are a member of the Local Administrators group on ITCERTKEYS-SR07 you will not require running DomainPrep and ForestPrep. As it is a single domain the schema master and global catalog server resides their so there is no need for ForestPrep or DomainPrep. Question 3. You work as the network Exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has its headquarters in Chicago and a branch office in Dallas. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com Chicago network contains a domain controller which is configured to perform all operation master roles and acts as a global catalog server. The ITCertKeys.com Dallas network has only one domain controller. You have received instruction from the CIO to implement an Exchange organization. You proceed by running the Exchange Server 2003 setup using the setup /forestprep command and proceed to install Exchange 2003 server on the Chicago domain controller. During the course of the business day you decide to install a second Exchange 2003 server in the Dallas office for future growth, you run the Exchange 2003 server setup using the setup /domainprep on the Dallas domain controller. You run the setup and receive an error message that states: Multiple components cannot be assigned the requested action because the component "Microsoft Exchange Messaging and Collaboration Services" cannot be assigned the action "Install" What should you do to continue the installation? (Choose all that apply.) A. You should consider running the setup /forestprep command in the Dallas domain B. You should consider configuring the domain controller in Dallas as a global catalog server C. You should consider having the domain administrator in the Dallas domain perform the installation D. You should consider running the setup /domainprep command in the Chicago domain Answer: B, D Explanation: It is required that the Exchange installation be able to contact the global catalog server when installing, the Dallas office has no capability of contacting the global catalog server in Chicago. The solution to this problem would be to run either setup / domainprep in Chicago domain or the Dallas domain controller should be configured as a global catalog server. Incorrect Answers: A: There is no need to run the setup /forestprep program in Dallas as this program should be run in the root domain. You are the administrator of the root domain and automatically have membership in the Enterprise Admins group giving you permissions to install Exchange 2003 server. C: There is no need for the Dallas domain administrator to run the installation as you are the administrator of the root domain and automatically have membership in the Enterprise Admins group giving you permissions to install Exchange 2003 server Question 4. You work as the Exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. ITCertKeys.com has headquarters in London and branch offices in Paris, Berlin, Milan, and Madrid. Management is planning to install Exchange Server 2003 on a single member server in each ITCertKeys.com office. HTTPS, WAP devices, MAPI, IMAP, and SMTP/POP3 will be utilized ITCertKeys.com users to connect to the Exchange servers. You have received instruction from the CIO to create a script to automate the installation. The CIO also instructs the IT administrators in each office to prepare the Exchange servers to support the scripted installation. You have to specify any added Windows Server 2003 components that are required. Which of the following are four components that should be specified? (Choose FOUR.) A. World Wide Web Service B. WSUS Service C. NNTP service D. WSS Service E. SMTP service F. POP3 service G. ASP.NET Answer: A, C, E, F Explanation: Installing and Enabling Windows 2000 or Windows Server 2003 Services . Exchange 2003 Setup requires that the following components and services be installed and enabled on the server: * .NET Framework * ASP.NET * Internet Information Services (IIS) * World Wide Web Publishing Service * Simple Mail Transfe r Protocol (SMTP) service * Network News Transfer Protocol (NNTP) service If you are installing Exchange 2003 on a server running Windows 2000, Exchange Setup installs and enables the Microsoft.NET Framework and ASP.NET automatically. You must install the World Wide Web Publishing Service, the SMTP service, and the NNTP service manually before running Exchange Server 2003 Installation Wizard. If you are installing Exchange 2003 in a native Windows Server 2003 forest or domain, none of these services is enabled by default. You must enable the services manually before running Exchange Server 2003 Installation Wizard. Reference Exchange Server 2003 Deployment Guide Question 5. You work as the Exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. You are planning to install Exchange Server 2003 on a member server named ITCERTKEYSSR01. You run the setup /forestprep command using a domain user account named ExchAdmin, but receive an error message stating that the account does not have the necessary permissions to perform this task. You must make sure that you are able to run the setup /forestprep command using the ExchAdmin account. Which of the following are the two groups that you should add ExchAdmin to, to achieve your objective? A. Administrators on ITCERTKEYS-SR01 B. Power Users group on ITCERTKEYS-SR01 C. Enterprise Admins in the domain D. DnsAdmins in the domain E. Schema Admins in the domain F. Administrators in the domain Answer: C, E Explanation: ForestPrep extends the Active Directory schema for Exchange Server 2003. You must run ForestPrep in the domain where the schema master resides. To run ForestPrep , your account must be a member of the Enterprise Admins group, and the Schema Admins group. Reference Exchange Server 2003 Deploy Tools Question 6. You work as the Exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory forest that contains the forest root domain named ITCertKeys.com and one child domain named ITCertKeys-north.com. The ITCertKeys.com child domain contains user accounts and group accounts. When Management decides to deploy Exchange Server 2003 as the messaging system for the whole of ITCertKeys.com, you are asked to prepare the forest to support a new Exchange Server 2003 organization. After replication has completed normally, you install the first Exchange Server 2003 system in the forest root domain. Which of the following is a task that you should execute to make sure that all user accounts can be mailbox-enabled? A. Run the setup /domainprep command in the forest root domain. B. Run the setup /forestprep command in the forest root domain C. Run the setup /domainprep command in the child domain. D. Run the setup /forestprep command in the child domain E. Install Active Directory Connector (ADC) on a domain controller in the child domain. Answer: C Explanation: If you intend to mail enable users in any domain you must first "/ domainprep " it. therefore B, if you "install Exchange 2003 in forest root then you must have run forestprep and domainprep prior to install so therefore B is your only answer. Question 7. You work as a network Exchange administrator at ITCertKeys.com. The ITCertKeys.com network. currently consists of a Lotus Domino server named ITCERTKEYS-SR01. During the course of the day you receive instruction from ITCertKeys.com to migrate from Lotus Domino to Exchange server 2003 and deploy a new Exchange Server 2003 computer named ITCERTKEYS-EX02. ITCertKeys.com wants you to perform the tasks listed below: * ITCertKeys.com wants to have mailbox-enabled user objects created for the Lotus Domino user accounts. * ITCertKeys.com wants to have e-mail messages from the Lotus Domino mailboxes copied to the mailboxes on the Exchange Server 2003 servers. What should you do? A. You should consider making use of the Active Directory Migration Tool version 3.0. B. You should consider making use of the Active Directory Users and Computers Tool. C. You should consider making use of the Exchange Connector for Lotus Notes. D. You should consider making use of Exmerge.exe. E. You should consider making use of a Active Directory Connector. Answer: E Question 8. You work as the network Exchange Administrator at ITCertKeys.com. The ITCertKeys.com network currently consists of a single Active Directory domain named ITCertKeys.local. During the course of the day you receive instruction from ITCertKeys.com to deploy Exchange Server 2003 to the network. ITCertKeys.com wants you to ensure that all mailbox-enabled users are assigned a SMTP e-mail address which uses the firstName.lastName@ITCertKeys.com format. What should you do? A. You should consider having the default recipient policy modified. B. You should consider having a new mailbox store system policy created. C. You should consider having the local security policy modified. D. You should consider having an Active Directory Connector installed. E. You should consider having a UPN suffix added. Answer: E Explanation: Part 2: Install, configure, and troubleshoot Exchange Server 2003. (8 Questions) Question 9. You work as the network Exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. An Exchange 2003 organization exists in the network. ITCertKeys.com has acquired a new office named International which is to function as the branch office of ITCertKeys.com. During the course of the day you migrate the branch office into the ITCertKeys.com forest as international.ITCertKeys.com. You are in the process of creating mailboxes for the new branch office users and instruct the users to properly configure Microsoft Outlook email clients to connect to the Exchange server. As the day progresses the branch office users complain to you about being unable to use e-mail as their mailboxes cannot be located. You must ensure all the mailboxes are accessible to ensure the users can start using e-mail. What should you do? A. You should consider making an SMTP connector with the international.ITCertKeys.com Address space on the Exchange server hosting the branch office users B. You should consider creating an MX record for the international.ITCertKeys.com domain and configure the MX record to point to the Exchange server hosting branch office mailboxes in DNS C. You should consider running the ForestPrep program on a computer in the international.ITCertKeys.com domain D. You should consider running the DomainPrep program on a computer in the international.ITCertKeys.com domain E. You should consider configuring a recipient policy for the branch office users and international.ITCertKeys.com SMTP address suffix must be specified Answer: D Explanation: The DomainPrep and ForestPrep programs can be used to enable the separation of network administration responsibilities and exchange administration responsibilities. To achieve this a forest administrator should have the appropriate authority over a network and running the DomainPrep program in the domain where the schema master is located. Incorrect Answers: A: In the Scenario there is no need for SMTP configuration of connectors and recipient policies as they are irrelevant to the scenario. B: There is no need for an MX record as it is unnecessary for providing internal messaging connectivity with your Exchange organization. E: In the Scenario there is no need for SMTP configuration of connectors and recipient policies as they are irrelevant to the scenario. Question 10. You work as the network Exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of two Active Directory domain named ITCertKeys.com and testlabs.ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You are in the process of installing Exchange Server 2003 on a computer in the ITCertKeys.com domain and create mailboxes for all the forest users. During the course of the day the testlabs.ITCertKeys.com users complain about being about being unable to access their mailboxes. You have recently received instruction from the ITCertKeys.com network CIO to ensure that the testlabs.ITCertKeys.com users in the forest are able to send and receive e-mail messages. What should you do? A. You should consider running the DomainPrep program in the testlabs.ITCertKeys.com domain program. B. You should consider adding Name Server (NS) records to the testlabs.ITCertKeys.com DNS zone. C. You should consider creating a new administrative group with mailboxes for the testlabs.ITCertKeys.com domain in the administrative group. D. You should consider configuring an Active Directory Connector between testlabs.ITCertKeys.com and ITCertKeys.com E. You should consider running the ForestPrep program in the testlabs.ITCertKeys.com domain. Answer: A Explanation: In order to install Exchange Server 2003 for the first time in the forest, the forest must first be prepared. Running the DomainPrep program would effectively be preparing the domains for Exchange Server 2003. Incorrect Answers: B: There is no need to create NS records in DNS. C: There is no need to create administrative groups or routing groups in order to provide the testlabs.ITCertKeys.com domain users access to their mailboxes. D: There is no need for an Active Directory Connector in this scenario. E: The ForestPrep program is used to prepare the forest and in this scenario the domain requires preparation.
|
Question 1. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. ITCertKeys.com contains an application server named ITCertKeys -SR23. ITCertKeys -SR23 runs an in-house application which is critical to the company's business process. ITCertKeys -SR23 contains a single physical drive that is divided into two partitions with the drive letter C and D. Both partitions are formatted as FAT32. The in-house application is installed on drive D. During monitoring you notice that the drive D is low on free disk space. You need to create extra space for the in-house application. To maintain the functionality of the in-house application, it cannot be moved. You to add another physical disk drive to ITCertKeys -SR23. You need the disk space on the new disk drive to be available as storage space for the in-house application. What should you do? (Select all that apply) A. This can be accomplished by initializing the new disk as a basic disk on ITCertKeys -SR23. B. Your best option would be to convert drive D to NTFS on ITCertKeys -SR23. C. Your best option would be to format the new disk with NTFS on ITCertKeys -SR23. D. You should consider converting the disk that hosts drive D to a dynamic disk. E. On ITCertKeys -SR23 you need to extend drive D to encompass unallocated space on the new disk. Answer: B, D, E Explanation: In this case you must host drive D to a dynamic disk and convert drive D to NTFS. If drive D contains unallocated space, you can extend drive D to include the unallocated space. Drive D can also be extended to use the unallocated space in the new disk. Incorrect answers: A: There is no need to initialize the new disk as a basic disk. You can initialize the new disk directly to dynamic disk. C: To add the space on the new disk to drive D, you can create a spanned or a simple volume. To do this both of the disks must be dynamic disks and drive D should be formatted as NTFS. Only unformatted volumes or volumes that are formatted with NTFS can be extended. Question 2. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR12 that contains confidential data. ITCertKeys -SR12 contains of a hard disk system that consists of a software-based RAID-5 volume. A ITCertKeys.com user named Mia Hamm works in the administrative office. Mia Hamm needs to access data on ITCertKeys -SR12 regularly. One day Mia Hamm complains that ITCertKeys -SR12 response is much slower that before. During your investigation you discover that one of the hard disks in the RAID-5 volume on ITCertKeys -SR12 has failed. You need to improve the performance of ITCertKeys -SR12. What should you do? A. Your first option is to replace the failed disk on ITCertKeys -SR12. Then you can initialize the new disk in Disk Management. Your next step is to convert it into a dynamic disk. The last step would be to repair the volume. B. You should break the RAID-5 volume and remove the failed disk in the Disk Management on ITCertKeys -SR12. The next stepwould be to replace the failed disk and rebuild the RAID-5 volume. C. Your first step should be to replace the failed disk on ITCertKeys -SR12. Thereafter you need to convert the new disk to a dynamic disk in Disk Management. The last step would be toformat the disk making use of NTFS. D. You best option is to replace the failed disk on ITCertKeys -SR12. Thereafter you can reboot the computer. Answer: A Explanation: In this case you must replace the failed disk. Initializing the disk means to write a master boot record and a disk signature. The disk should be converted into dynamic volumes. Only dynamic volumes can work in RAID-5. You should then right click the region of the failed RAID-5 volume and select Repair Volume. Incorrect answers: B: This option is incorrect. You are unable to break RAID-5 volume. Only a RAID-1 or mirrored volume can be broken. C: This option is incorrect. You are unable to format a disk. Only volumes can be formatted. D: This will not work. Only unallocated space on a dynamic disk can be used to repair a RAID-5 volume with failed redundancy. Question 3. You work as the network administrator at ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2000 named ITCertKeys -DB20. All of the hard disks of ITCertKeys -DB20 are dynamic disks. ITCertKeys -DB20 hosts a database named ITKCustomersDB that is located on a RAID-5 volume. The transaction logs for ITKCustomersDB are hosted on a separate mirrored volume. ITCertKeys.com users access ITKCustomersDB through an in-house client application. One day ITCertKeys -DB20 suffers a hardware failure that does not affect the hard disk subsystems. You receive instruction to move the hard disk subsystem from ITCertKeys -DB20 to a new SQL Server 2000 computer named ITCertKeys -DB21. You move the disks that host the RAID-5 volume with ITKCustomersDB and the disks that host the mirrored transaction logs to ITCertKeys -SR21. You want the users to access ITKCustomersDB without making changes to the in-house client application. What should you do? A. To ensure that the users are able to access ITKCustomersDB you need to reactivate the hard disks in Disk Management. B. The hard disks in Disk Management on ITCertKeys -DB21 should be repaired to ensure that the users are able to access ITKCustomersDB without making changes to the in-house client application. C. You should consider importing the foreign disks in Disk Management on ITCertKeys -DB21 in order to ensure that the users are able to access ITKCustomersDB without making changes to the in-house client application. D. This can be accomplished by initializing the hard disks in Disk Management to ensure that the users are able to access ITKCustomersDB without making changes to the in-house client application. Answer: C Explanation: Moving the hard disks to a new computer will mark them as foreign disks. The volumes on the disks will not be accessible. To make it accessible you should import the foreign disks. Incorrect answers: A: You would have reactivated the disks if the disks become unavailable due to a hardware problem or if the data was corrupted. In this case it is not necessary. B: Disks cannot be repaired. You are able to repair RAID-5 volumes. D: Only new disks need to be initialized before they can be used. These disks were moved to the server and must be imported. Question 4. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a server named ITCertKeys -SR18. ITCertKeys -SR18 has a single 120 GB hard disk drive named Disk0. Disk0 has been initialized as a basic disk and has been formatted with NTFS. The hard disk is partitioned into four logical partitions as shown in the following table: Drive Contents Size Free Space C System Volume 8 GB 4 GB D Application Data 40 GB 1 GB E User Data 40 GB 12 GB F None 32 GB 32 GB Drive D is becoming full. You need to increase the disk space for the applications data. However, the application on Drive D cannot be reconfigured to use free space from another volume. What should you do? A. You should consider extending Drive D: to encompass the disk space of Drive F. B. This can be accomplished by mounting Drive F: in an empty folder on Drive D. C. To ensure sufficient disk space you have to extend Drive F: to encompass Drive D. D. Your fist option would be to delete Drive F. Thereafter you will be able to extend Drive D. Answer: B Explanation: Any NTFS volume can be mapped to an empty folder on another NTFS volume. Incorrect Answers: A, C, D: Basic volumes cannot be extended. Question 5. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a Windows Server 2003 file server named ITCertKeys -SR11. During monitoring you notice that the free space on ITCertKeys -SR11 is very low. You decide to install a new 25 GB disk named disk1 on ITCertKeys -SR11. You want to convert disk1 to five logical drives of equal size. You want to be able to increase the size of the logical drives in the future without affecting the data that may already be stored on it. What should you do? A. Create five NTFS primary partitions on disk1. B. Create five NTFS extended partitions on disk1. C. Convert disk1 from basic to dynamic and create one NTFS primary partition on it. D. Convert disk1 from basic to dynamic and create five simple volumes on it. Answer: D Explanation: If you convert from basic to dynamic, they can be extended. Creating five simple volumes on disk1 will allows you to extend each volume using the unallocated space on disk1. Incorrect answers: A, B: Basic disks can support up to four partitions, which consists of three primary partitions and one extended partition. You cannot create more than one extended partition on a basic disk. C: You need to create five partitions of equal size, not one. Question 6. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR12. ITCertKeys -SR12 contains a single physical drive named Drive C on which the operating system is installed, and another drive named Drive D that contains a shared folder named UserData. The UserData folder is used to store ITCertKeys.com user data that is accessed by numerous in-house applications. Both drives are FAT32 drives. Both Drive C and Drive D are low on free disk space. You need to create extra disk space for the UserData folder. You cannot delete or backup the user data on ITCertKeys -SR12 because all data is currently required by the in-house applications. What should you do? A. Install an additional disk drive on ITCertKeys -SR12. Initialize the new disk drive as a basic disk. Extend Drive D to include unallocated space on the new disk drive. B. Install an additional disk drive on ITCertKeys -SR12. Convert Drive D to NTFS. Convert Drive D to a dynamic disk. Extend drive D to include unallocated space on the new disk drive. C. Install an additional disk drive on ITCertKeys -SR12. Format the new disk drive with FAT32. Extend Drive D to include unallocated space on the new disk drive. D. Install an additional disk drive on ITCertKeys -SR12. Convert Drive D to NTFS. Mount the new disk dive in the UserData folder on Drive D. Answer: B Explanation: In this case you must host drive D to a dynamic disk and convert drive D to NTFS. If drive D contains unallocated space, you can extend drive D to include the unallocated space. Drive D can also be extended to use the unallocated space in the new disk. Incorrect answers: A: There is no need to initialize the new disk as a basic disk. You can initialize the new disk directly to dynamic disk. C: To add the space on the new disk to drive D, you can create a spanned or a simple volume. To do this both of the disks should be must be dynamic disks and drive D should be formatted as NTFS. Only unformatted volumes or volumes that are formatted with NTFS can be extended. D: You can only mount a drive in an empty folder. UserData is not empty so you cannot mount the new drive in that folder. Question 7. DRAG DROP You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains 20 servers and 1,200 client computers. All servers on the ITCertKeys.com network run Windows Server 2003, some client computers run a mixture of different Windows operating systems, and the rest run MS-DOS. You install four new servers named ITCertKeys -SR21, ITCertKeys -SR22, ITCertKeys -SR23, and ITCertKeys -SR24 on the ITCertKeys.com network. ITCertKeys -SR21 contains a single volume that will store data that needs to be accessed by all the Windows based client computers. ITCertKeys -SR22 contains a single volume that will store data that needs to be accessed by MS-DOS client computers. No data on ITCertKeys -SR23 and ITCertKeys -SR24 will be accessed by any client computers. You intend to configure ITCertKeys -SR23 with a single partition that will span multiple disks and ITCertKeys -SR24 with two physical disks that will contains two partitions. You need to initialize the disk subsystems on the four servers to meet these requirements. What should you do? To answer, drag the disk configuration to the appropriate location in the Work Area. Answer: Explanation: A basic disk is a physical disk with primary and extended partitions. Prior to Windows 2000, Microsoft did not call disks basic because that was the only type of disk available. There were no dynamic disks. As long as you use the File Allocation Table (FAT or FAT32) file system, Windows XP Professional and Home editions, Windows 2000, Windows NT, Windows 9x, and the MS-DOS operating systems can access basic disks. The disks on ITCertKeys -SR21 and ITCertKeys -SR22 can be configured as basic. Because basic disk can support up to four partitions, the two disks of ITCertKeys -SR24 can also be configured as basic disks. Dynamic disks support five types of volumes: simple, spanned, mirrored, striped, and RAID-5. You can extend a volume on a dynamic disk. Dynamic disks can contain a virtually unlimited number of volumes, so you are not restricted to four volumes per disk as you are with basic disks. Regardless of the type of file system, only computers running Windows XP Professional, Windows 2000 Professional or Server, or Windows Server 2003 can directly access dynamic volumes on hard disks that are physically connected to the computer. For this reason only the disk on ITCertKeys -SR23 and ITCertKeys -SR24 can be configured as dynamic disks. Question 8. You work as a network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR34 that has two physical hard disk dives named disk0 and disk1. Disk1 contains a shared folder named ITK_Data that is used to store user data. A severe thunder storm causes a blackout disrupting all power to the ITCertKeys.com network. Fortunately, all ITCertKeys.com servers are protected by an Uninterruptible Power Supply (UPS) and you are able to perform a graceful shutdown of all ITCertKeys.com servers. When power is restored, you bring the network back online. However, several ITCertKeys.com users report that they are unable to connect to the ITK_Data folder on ITCertKeys -SR34. You log on to ITCertKeys -34 and discover that you cannot locate the ITK_Data folder in Windows Explorer. You open Disk Management on ITCertKeys -SR34 and see the display shown in the Disk Management exhibit. Disk Management Exhibit: You need to ensure that ITCertKeys.com users can access the files in the ITK_Data folder. What should you do? A. Select disk1 on ITCertKeys -SR34 and convert the disk to a dynamic disk. B. Select disk1 on ITCertKeys -SR34 and regenerate the disk. C. Select disk1 on ITCertKeys -SR34 and reactivate the disk D. Rescan the disks on ITCertKeys -SR34. Answer: C Explanation: On any offline disk all that is required is to have the disk reactivated to gain access to the data on the disk. Incorrect answers: A: Converting the disk to a dynamic disk would not solve the problem of data that is unavailable. B: On a failed disk there is no option to regenerate. D: Rescanning disks scans all attached disks for disk configuration changes and since there was no reconfiguration of any of the disks. Question 9. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains six database servers named ITCertKeys -DB01 through ITCertKeys -DB06 that each run a database application named DataApp1. The ITCertKeys.com written policy requires that when a new user is added to DataApp1, they must be added to the server that has the most available disk space. ITCertKeys.com hires ten new employees. The new employees will require access to DataApp1. You need to add these users to DataApp1. What should you do to ensure that you meet the written policy requirements when you add the new users to DataApp1? A. Review the application logs on each of the six database servers by using Event Viewer. B. Record the PhysicalDisk object on all six database servers by using Performance Logs and Alerts. C. Review the performance data on each of the six database servers by using Task Manager. D. Generate a histogram view of the LogicalDisk object on all six database servers by using System Monitor. Answer: D Explanation: System Monitor shows real-time performance data based on Object counters, and can display the log data recorded by Performance Logs And Alerts either in the form of Counter (interval polling) logs, or Trace (event-driven) logs. Logs written by Performance Logs And Alerts can be loaded into System Monitor for analysis. The System Monitor is designed for real-time reporting of data to a console interface, and can be reported in graph, histogram, or numeric form. This should aid you in ensuring that you meet the stated requirements. Incorrect answers: A: The Application log contains data written to it by software programs, it records events that are generated by application programs and network application services. Using Event Viewer to review application logs would thus not ensure that you add a new user to the server with the most available space. B: The Performance Logs And Alerts snap-in can do no configuration, only reporting data through Counter Logs as reported by providers (object counters) on a configured interval, or through Trace Logs as reported by event-driven providers. Thus this option will not work. C: Viewing performance data through the Task Manager is not what you need. Reference: Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 6 Question 10. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR21. ITCertKeys -SR21 has a 40-GB hard disk for system files and two 80-GB hard disks for data. The 80-GB hard disks configured as mirrored volumes and contain 65-GB of read-only data. ITCertKeys.com users connect to ITCertKeys -SR21 by using shortcuts on their desktops. Due to the growth of the ITCertKeys.com network, the performance of ITCertKeys -SR21 has become inadequate. You receive instruction from the CIO to replace ITCertKeys -SR21. The new server must contain the current data from ITCertKeys -SR21. You disconnect ITCertKeys -SR21 from the network. You build a replacement server and name it ITCertKeys -SR21. You now need to bring the new server online and re-establish redundancy as quickly as possible. You must also ensure that users can connect to ITCertKeys -SR21 by using their existing desktop shortcuts. What should you do? A. Create a new mirrored volume by using two 80-GB disks. Connect ITCertKeys -SR21 to the network and copy the data from the old ITCertKeys -SR21. When copying is complete, shut down the old ITCertKeys -SR21. B. Move the two 80-GB disks from the old ITCertKeys -SR21 to the new ITCertKeys -SR21. Scan the disks for changes and import the disks. Connect the new ITCertKeys -SR21 to the network. C. Break the mirror on the old ITCertKeys -SR21. Move one of the 80-GB disks from the old ITCertKeys -SR21 to the new ITCertKeys -SR21. Scan the disk for changes and initialize the disk. Select the spare disk and create the mirror. Connect the new ITCertKeys -SR21 to the network. D. Remove one of the 80-GB disks from the old ITCertKeys -SR21 and move it to the new ITCertKeys -SR21. Scan the disk for changes and import the disk. Connect the new ITCertKeys -SR21 to the network. Answer: B Explanation: You have to make use of the existing old ITCertKeys -SR21 disks to make sure that the current data will be brought online. When moving disks from one computer to another keep in mind that before disconnecting the disks from the old ITCertKeys -SR21 you must make sure the status of all volumes on each of the disks is healthy. For any volumes that are not healthy, repair the volumes before you move the disks. After you physically connect the disks to the new ITCertKeys -SR21, in Disk Management, open the Action menu and choose Rescan Disks. The scanning will detect changes. The new disk will show up as Dynamic/Foreign. By default, Dynamic/Foreign disks and should be brought online automatically, but if not, bring it online by right-clicking the disk and selecting Online. Furthermore, to make Dynamic/Foreign disks useable, you must import it. The disk group remains as is and the database does not change. When connecting new ITCertKeys -SR21 to the network you will enable users to use their existing shortcuts. Incorrect answers: A: Since ITCertKeys -SR21 is scheduled for replacement you need no mirroring to be done for the question states pertinently that you have to re-establish redundancy which means that redundancy used to be in place before. A mirrored volume (also known as RAID Level 1 or RAID-1) consists of two identical copies of a simple volume, each on a separate hard disk. Mirrored volumes provide fault tolerance in the event that one physical disk fails. C: By moving only one disk from the old ITCertKeys -SR21 to the new ITCertKeys -SR21 will affect not only the current amount of data available, but will also result in a lack of possible redundancy. D: Removing one old ITCertKeys -SR21 disk from the mirror will not enable you to accomplish your task successfully. Reference: Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 3
|
Question 1. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a print server named ITCertKeys-PR01 that has a built-in network interface. A ITCertKeys.com user named Andy Reid is a member of the Research and Development department. Andy Reid complains that he cannot print to a print device attached to ITCertKeys-PR01. You have received instruction to ensure that Andy Reid can print to the print device. First you verify that the IP address for ITCertKeys-PR01 is correct and that the latest drivers for the print device are installed. You now want to verify that the print jobs are being sent to the correct MAC address for ITCertKeys-PR01. What should do? A. On ITCertKeys-PR01, run the net session command. B. On ITCertKeys-PR01, run the netstat command. C. On ITCertKeys-PR01, run the netsh command. D. On ITCertKeys-PR01, run the netcap command. Answer: D Explanation: Netstcap.exe is a command line tool that could be used to capture the network traffic. A filter can be created to be used during the capture to determine the MAC address the print jobs are being sent to. The Network Monitor Capture Utility ( Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides capture abilities only from a command prompt; to open the resulting capture (.cap) files, you must use the full Network Monitor interface. Netcap is installed when you install the Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities that are similar to the version of Network Monitor that is included with the Windows Server products; however, you must use Netcap at a command prompt. Netcap installs the Network Monitor driver and binds it to all adapters when you first run the Netcap command. Incorrect Options: A: The net session command can be used to view the computer names and user names of users on a server, to see if users have files open, and to see how long each user's session has been idle. Net session manages server computer connections - used without parameters, net session displays information about all sessions with the local computer. B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but is used to display TCP/IP and port information. C: The Network Shell utility (Netsh.exe) can perform a wide range of system configuration tasks. You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and WINS servers) and to display configuration and statistical information. Reference: Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows XP CD-ROM Network Monitor is provided with Windows Server products and Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004 Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter, MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856, 926 Question 2. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of two subnets. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. All servers are located in a central data center that uses a single IP subnet and all client computers are located in one subnet. The data center contains two routers named ITCertKeys-SR01 and ITCertKeys-SR02, two domain controllers named ITCertKeys-DC01 and ITCertKeys-DC02, and two file servers named ITCertKeys-SR03 and ITCertKeys-SR04. The IP addresses of these servers are indicated in the table below. Host name IP address ITCERTKEYS-DC01 10.10.10.1 ITCERTKEYS-DC02 10.10.10.2 ITCERTKEYS-SR01 10.10.1.1 ITCERTKEYS-SR02 10.10.1.2 ITCERTKEYS-SR03 10.10.11.1 ITCERTKEYS-SR04 10.10.11.2 You have received instruction from the CIO to install a new database server in the data center. You install Windows Server 2003 on a new server computer named ITCertKeys-DB01 and hand it over to a database administrator named Dean Austin. Dean Austin installs Microsoft SQL Server 2005 and makes some changes to the TCP/IP settings on ITCertKeys-DB01 as shown in the following table. Parameter Value IP address 10.10.1.3 Subnet mask 255.255.255.0 Default gateway 10.10.1.2 Later, Dean Austin complains that ITCertKeys-DB01 cannot communicate with the other servers in the data center. All other servers in the data center can communicate with the other servers as well as the client computers. You log on to ITCertKeys-DB01 and attempt to ping ITCertKeys-DC01 but you receive the following error message: "Destination host unreachable". What should you do to ensure that ITCertKeys-DB01 can communicate with the other computers in the ITCertKeys.com network? A. Configure ITCertKeys-DB01 with a default gateway of 10.10.1.1. B. Configure ITCertKeys-DB01 with a subnet mask of 255.255.0.0. C. Configure ITCertKeys-DB01 with an IP address of 10.10.10.3. D. Configure ITCertKeys-DB01 with an IP address of 10.10.11.3. Answer: B Explanation: Large networks are subdivided to create smaller subnetworks to reduce overall network traffic by keeping local traffic on the local subnet and sending all nonlocal traffic to the router. In order to create a subnetwork, we need to have a system for addressing that allows us to use the network ID and host ID within the class-based system. This is accomplished through the use of a subnet mask. To determine the appropriate custom subnet mask (typically referred to simply as subnet mask) for a network, you must first: 1. Determine the number of host bits to be used for subnetting. 2. Determine the new subnetted network IDs. 3. Determine the IP addresses for each new subnet. 4. Determine the appropriate subnet mask. Incorrect Answers: A: You need to assign the correct subnet mask to ensure connectivity. C, D: The problem in this scenario is not a faulty IP address. It is the appropriate subnet mask that has to be determined to enable connectivity. Reference: Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, p. 57 Question 3. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of two subnets named Subnet A and Subnet B. Subnet A and Subnet B are connected by a router. All computers on the ITCertKeys.com network are configured with static IP addresses. All network servers run Windows Server 2003 and all client computers run Windows XP Professional. ITCertKeys.com hires a new Sales manager named Amy Wilson. You install a new client computer named ITCertKeys-WS291 for Amy Wilson. You then add ITCertKeys-WS291 to Subnet A. The relevant portion of the network is configured as shown in the exhibit. However, Amy Wilson complains that ITCertKeys-WS291 cannot communicate with other hosts on the network. What should you do to ensure that ITCertKeys-WS291 can communicate with all local and remote computers on the ITCertKeys.com network? A. Configure ITCertKeys-WS291 with a default gateway of 192.168.28.84. B. Configure ITCertKeys-WS291 with a default gateway of 192.168.2.1. C. Configure ITCertKeys-WS291 with a subnet mask of 255.255.255.128. D. Configure ITCertKeys-WS291 with a subnet mask of 255.255.255.192. Answer: C Explanation: It is evident from the exhibit that the file server and ITCertKeys-WS291 have a different subnet mask. This is the reason why they cannot communicate with each other. You must therefore change the subnet mask of ITCertKeys-WS291 to 255.255.255.128. Incorrect Answers: A, B: The problem is not the gateway IP address that is faulty, but rather the subnet mask. D: This option suggests the correct object that has to be changed, but it gives the wrong subnet mask. Reference: Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, p. 57 Question 4. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has its headquarters in Chicago and branch offices in Dallas and Miami. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You work in the Miami branch office. The network at the Miami branch office consists of 25 different subnets, each with a maximum of six computers. The network administrator at headquarters has allocated the 192.168.3.0/24 network address to the Miami branch office. You install a new server named ITCertKeys-SR21 in the Miami branch office. You need to configure the Internet Protocol (TCP/IP) properties for ITCertKeys-SR21. You configure ITCertKeys-SR21 with an IP address of 192.168.3.44. What subnet mask should you use? A. A subnet mask of 255.255.255.0. B. A subnet mask of 255.255.255.128. C. A subnet mask of 255.255.255.192. D. A subnet mask of 255.255.255.240. E. A subnet mask of 255.255.255.248. Answer: E Explanation: The network address is: 192.168.2.0/24, which means 11111111.11111111.11111111.0 in binary. Therefore, you can use the last octet to configure the 30 subnets and 6 hosts in each Subnet You need only six host PCs. When you convert to binary, it is: 00000111. As a result, you use 3 bits. This leaves 5 bits for the subnets 11111000 converted to decimal: 128+64+32+16+8=248, therefore the subnet mask will be: 255.255.255.248. Reference: Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, p.57 Question 5. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has its headquarters in Chicago and a branch office in Dallas. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You work in the Dallas branch office. The network at the Dallas branch office consists of a single subnet that contains 150 client computers and 12 servers. The network administrator at headquarters has allocated the 10.10.0.0/16 network address to the Dallas branch office. You have received instruction from your manager to place all servers at the Dallas branch office into a separate subnet that uses the 192.168.10 public addressing scheme. Your manager asks you to make allowance for a maximum of 30 servers in the new subnet. Which subnet mask should you use for the new subnet? A. 255.255.255.224 B. 255.255.255.240 C. 255.255.255.248 D. 255.255.255.252 E. 255.255.255.254 Answer: A Explanation: A 255.255.255.224 subnet mask gives five host address bits, so the maximum number of host addresses is 2 ^ 5 - 2 = 30 host addresses. Thus 255.255.255.224 is the only subnet mask that will allow for sufficient IP addresses in case of further growth, whilst still conserving as many current addresses as possible. Reference: Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, p. 62 Question 6. DRAG DROP You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You have installed a new server named ITCertKeys-SR06 on the network. The relevant portion of the network is shown on the exhibit. You want to configure ITCertKeys-SR06 with a valid static IP configuration. ITCertKeys-SR06 must be able to communicate with all hosts on the network and on the internet. You also need to configure ITCertKeys-SR06 to use the DNS server on the local subnet for name resolution. In addition, you must configure redundancy for name resolution. How should you configure ITCertKeys-SR06? To answer drag the appropriate IP addresses and Subnet masks to the appropriate places. Answer: Explanation: The Class C address 192.168.0.100 has to be the IP address to enable ITCertKeys-SR06 to communicate with all hosts on the network and on the internet as 192.168.0.1, 192.168.0.2 and 192.168.0.110 are already in use. 192.168.5.2 and 192.168.5.100 are on the wrong subnet, and besides, 192.168.5.12 is already in use. The subnet mask for this Class C address is 255.255.255.0. The default gateway should be 192.168.0.1. To configure redundancy for name resolution, configure the preferred DNS server/primary address as 192.168.0.2, and the alternate DNS server/secondary address as 192.168.5.2. Reference: J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, Part 1, Chapter 2, pp. 80-116 Question 7. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. ITCertKeys.com has its headquarters in Chicago and branch offices in Dallas and Miami. You work in the Miami branch office. The Miami branch office has a file server named ITCertKeys-SR25 that hosts critical documents. ITCertKeys-SR25 is configured with a DHCP client reservation. ITCertKeys.com users from all three offices download documents from ITCertKeys-SR25. One day ITCertKeys.com users complain that they cannot access the documents on ITCertKeys-SR25. You discover that the DHCP server has failed. The DHCP server is located at headquarters. You have received instruction from the CIO to ensure that ITCertKeys-SR25 is available even if it is unable to obtain or renew a lease from the DHCP server. How could you accomplish this task? A. On the DHCP server, increase the DHCP lease period. B. Configure alternate IP settings for ITCertKeys-SR25 on the Alternate Configuration tab of the Internet Protocol (TCP/IP) properties. C. Configure the DHCP scope in the 169.254.0.1. - 169.254.255.254 range. D. On the DHCP server, configure the DHCP 001 Resource Location Servers reservation option for ITCertKeys-SR25. Answer: B Explanation: Windows Server 2003 includes the Alternate Configuration feature. The Windows Server 2003 servers can be configured to use an alternate static IP configuration if a DHCP server is unavailable. When a DHCP client determines that the DHCP server is unavailable, it will automatically change over and also configure the TCP/IP stack with the static address information specified on the Alternate Configuration tab of the Internet Protocol (TCP/IP) properties. Incorrect Answers: A: Increasing the lease period would result in DHCP clients requesting leases less frequently, but won't guarantee that ITCertKeys-SR25 will be available when the DHCP server is down. C: Modifying the DHCP scope to the 169.254.0.1. - 169.254.255.254 range will still be reliant on the DHCP server. D: Configuring the DHCP 001 Resource Location Servers reservation option for ITCertKeys-SR25 on the DHCP server will not ensure that ITCertKeys-SR25 will receive an IP address or have the IP address renewed. Reference: J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, Part 1, Chapter 2, pp. 114, 117 Question 8. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a server named ITCertKeys-SR34. ITCertKeys-SR34 is configured as a DHCP server and has been authorized in Active Directory. The Telnet service has been installed and started on ITCertKeys-SR34. One day ITCertKeys.com users complain that they cannot access network resources. Your investigations reveal that the DHCP Server service on ITCertKeys-SR34 has stopped. You install the administrative tools on a client computer named ITCertKeys-WS291 and log on to the computer. When you open the DHCP console on ITCertKeys-WS291 and attempt to connect to ITCertKeys-SR34, you receive an error message that states: "Cannot find the DHCP Server." You then attempt to ping ITCertKeys-SR34 but fail. How can you connect to the DHCP Server service on ITCertKeys-SR34 by using the DHCP console on ITCertKeys-WS291? A. Establish a Telnet session to ITCertKeys-SR34 and then run the net start dhcp command. B. Establish a Telnet session to ITCertKeys-SR34 and then run the net start dhcpserver command. C. Establish a Telnet session to ITCertKeys-SR34 and then run the ipconfig /renew command. D. On ITCertKeys-WS291, run the netsh dhcp server\\ ITCertKeys-SR34 show server command. Answer: B Explanation: You can start the DHCP Server service by executing the Net Start Dhcpserver command at the command prompt. Telnet is a protocol that enables an Internet user to log on to and enter commands on a remote computer linked to the Internet, as if the user were using a text-based terminal directly attached to that computer. Telnet is part of the TCP/IP suite of protocols. The term telnet also refers to the software (client or server component) that implements this protocol. Given the fact that you can ping ITCertKeys-SR34 you should then establish a Telnet session to ITCertKeys-SR34 and then run the appropriate command. Reference: J. C. Mackin & Ian McLean, MCSA/MCSE self-paced training kit (exam 70-291): implementing, managing, and maintaining a Microsoft Windows Server 2003 network infrastructure, Microsoft Press, Redmond, 2004, p. 7-23 Question 9. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a server named ITCertKeys-SR51 that is configured as a print server for a print device that has a built-in network interface. The print device is used by the Sales department to print Sales reports. A ITCertKeys.com user named Clive Allen is a member of the Sales department. Clive Allen complains that he cannot print to the print device attached to ITCertKeys-SR51. You verify that the IP address for ITCertKeys-SR51 is correct and that the correct drivers for the print device are installed. You now want to verify that the print jobs are being sent to the correct MAC address for ITCertKeys-SR51. You log on to ITCertKeys-SR51. What should you do next? A. Run the net session command. B. Run the netstat command. C. Run the netsh command. D. Run the netcap command. Answer: D Explanation: Netstcap.exe is a command line tool that could be used to capture the network traffic. A filter can be created to be used during the capture to determine the MAC address the print jobs are being sent to. The Network Monitor Capture Utility ( Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides capture abilities only from a command prompt; to open the resulting capture (.cap) files, you must use the full Network Monitor interface. Netcap is installed when you install the Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities that are similar to the version of Network Monitor that is included with the Windows Server products; however, you must use Netcap at a command prompt. Netcap installs the Network Monitor driver and binds it to all adapters when you first run the Netcap command. Incorrect Options: A: The net session command can be used to view the computer names and user names of users on a server, to see if users have files open, and to see how long each user's session has been idle. Net session manages server computer connections - used without parameters, net session displays information about all sessions with the local computer. B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but is used to show what ports your computer is listening on.: -R is used to reload your LMHOSTS file located in %systemroot%\system32\drivers\etc., -r will show you which name resolutions have been answered via broadcasts, and which have been answered via a NetBIOS name server, -RR switch of the command utility refreshes your NetBIOS name with a configured WINS server. C: The Network Shell utility (Netsh.exe) can perform a wide range of system configuration tasks. You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and WINS servers) and to display configuration and statistical information. Reference: Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows XP CD-ROM Network Monitor is provided with Windows Server products and Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004 Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter, MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856, 926 Question 10. Network Topology Exhibit: LAN Settings Exhibit: You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a Microsoft Internet Security and Acceleration (ISA) Server computer named ITCertKeys-SR01, a DNS server named ITCertKeys-SR02, a DHCP server named ITCertKeys-SR03, a file server named ITCertKeys-SR21, and a Web server named ITCERTKEYS-SR25. ITCertKeys-SR25 also serves as a central antivirus server. ITCertKeys-SR21 is located on the 10.10.11.0 subnet and ITCertKeys-SR25 is located in the perimeter network. ITCertKeys-SR21 contains antivirus software that checks for new virus definitions on ITCertKeys-SR25 every hour. You can also access ITCertKeys-SR25 through a virus update Web page to perform manual virus definition updates. ITCertKeys-SR03 suffers a catastrophic failure and is removed from the network. Due to budgetary constraints, a replacement for ITCertKeys-SR03 will only be acquired in the next financial year. You need to redesign network addressing scheme, and change the IP addresses for ITCertKeys-SR01 to the addresses shown in the Network Topology exhibit. ITCertKeys-SR02 contains the new host (A) resource records for ITCertKeys-SR01. You receive reports about a new virus threat and want to protect the network immediately by manually downloading the new virus definitions to ITCertKeys-SR21. you log on to ITCertKeys-SR21 but discover that you cannot access the virus update Web page on ITCertKeys-SR25. The static TCP/IP configuration on ITCertKeys-SR21 uses ITCertKeys-SR02 as the preferred DNS server. You confirm that ITCertKeys-SR01 is configured properly. On ITCertKeys-SR21, you view the Internet Explorer LAN settings that are shown in the LAN Settings exhibit. What should you do to allow ITCertKeys-SR21 to connect to ITCertKeys-SR25? A. At a command prompt on ITCertKeys-SR21, run the ipconfig /flushdns command. B. In the LAN settings of Internet Explorer on ITCertKeys-SR21, select the Automatically detect settings check box. C. At a command prompt on ITCertKeys-SR01, run the ipconfig / flushdns command. D. At a command prompt on ITCertKeys-SR01, run the ipconfig /registerdns command. Answer: A Explanation: Running the ipconfig /flushdns command will flush and reset the DNS resolver cache which is necessary to allow connection. Run this command on ITCertKeys-SR21 to connect to ITCertKeys-SR25. Incorrect Answers: B: Selecting the "Automatically detect settings" checkbox is not going to allow ITCertKeys-SR21 to connect to WWW. C: The ipconfig /flushdns command flushes and resets the DNS resolver cache. This is not what is necessary. D: The ipconfig /registerdns command refreshes all DHCP leases and registers any related DNS names. This option is available only on Windows 2000 and newer computers that run the DHCP Client service. This is not going to allow ITCertKeys-SR21 to connect to WWW when it is run on ITCertKeys-SR01. Reference: James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide, p. 311
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.