|
Question 1.
What should be the maximum number of active storage controller ports per inter-switch link in a high throughput computing environment?
A. 2
B. 4
C. 10
D. 20
Answer: D
Question 2.
Which factor can reduce the performance between devices in a Fibre Channel SAN?
A. hop count
B. switch latency
C. inter-switch link latency
D. inter-switch link congestion
Answer: D
Question 3.
Which ports should you use on a B-series switch to establish two Wavelength Division Multiplexing links to a remote site?
A. ports which belong to the same "Quad"
B. ports which belong to different "Quads"
C. ports on different switches
D. only 2 Gbps ports
Answer: B
Question 4.
What do you recommend if a performance bottleneck is discovered on a link between a 1 Gbps and a 2 Gbps B-series switch?
A. Implement trunking on this link.
B. Implement port channeling on this link.
C. Use multi-mode cable instead of single mode.
D. Replace the 1 Gbps switch with a 2 Gbps switch.
Answer: D
Question 5.
A complex SAN designed for applications with small IOs is used primarily by applications with large IOs.
What is the impact to the SAN?
A. The supported hop count is reduced.
B. There may be congestion on inter-switch links.
C. None. SAN design is not dependent on application IO size.
D. The buffer-to-buffer credit on the storage system must be recalculated.
Answer: B
Question 6.
What allows you to check if the configuration of a new switch is compatible with an existing fabric configuration in a B-series fabric?
A. Network View
B. Fabric Manager
C. High Availabiity Fabric Manager
D. OpenView SAN Manager
Answer: B
Question 7.
What is the most effective way to integrate 2 Gbps switches in existing 1 Gbps switch fabrics with many-to-many access?
A. Use 2 Gbps as core and 1 Gbps as edge switches.
B. Use 1 Gbps as core and 2 Gbps as edge switches.
C. Create separate zones for the 1 Gbps and 2 Gbps switches.
D. Use trunking to link every two 1 Gbps ports to a 2 Gbps connection.
Answer: A
Question 8.
Which zoning type is supported if B-series switches are connected to third-party switch products?
A. switch/port level
B. AL_PA level
C. mixed
D. WWN level
Answer: D
Question 9.
Which environment supports a direct Fibre Channel connection between a storage array and server?
A. NonStop server with XP array
B. NonStop server with EVA array
C. MPIO with EVA array
D. Microsoft Cluster with MSA1000
Answer: A
Question 10.
How can you activate optional security features on M-series switches?
A. Enable Secure Fabric mode.
B. Use VSANs instead of zones.
C. Enable Enterprise Fabric mode.
D. Use object level zoning.
Answer: C
Question 11.
What does the HP SAN Security Services Product provide?
A. security services which include the implementation of third party security products
B. security services which include security review, planning and ongoing audit
C. fiber optic components which do not emit electromagnetic radiation
D. product specific installation and maintenance, but no security audit
Answer: B
Question 12.
What must you use to establish a communication link between two existing fabrics with different PID bit settings?
A. a router
B. a bridge
C. virtual SANs
D. tunneling
Answer: A
Question 13.
A customer requests an inventory and storage resource planning tool in a SAN environment.
What is the recommended software?
A. Array Configuration Utility
B. HP OpenView Storage Builder
C. HP OpenView Storage Allocater
D. Storage System Array Controller Software
Answer: B
Question 14.
What is the meaning of multipathing in a SAN environment?
A. a general term for trunking and port channeling
B. at least two separate data paths between server and storage
C. a SAN topology where any switch has at least two links to any other switch
D. at least two inter-switch links between switches
Answer: B
Question 15.
Which security feature in an M-series environment allows only registered servers or storage systems to connect to the fabric?
A. fabric binding
B. switch binding
C. WWN zoning
D. VSAN
Answer: B
|
Question 1. You work as the IT Admin at ABC.com. All servers on the domain run Windows Server 2003. A file server named ABC-SR23 is running low on disk space. You add a new hard drive to the server. You must configure a partition on the new hard disk. But when trying to open the Disk Management console, you encounter an error message regarding an inability to connect to the Logical Manager service. In the Services console in Administrative Tools, you make sure that Logical Disk Manager is in operation. Which of the following actions should you take to enable Disk Manager? A. Create more free space on the boot partition by deleting unnecessary files and folders on it. B. Enable and start the Logical Disk Manager Administrative service on ABC-SR23. C. Install the Windows XP Service Pack 2 on ABC-SR23. D. Arrange the hard disks in a mirrored volume. E. Use the hard disks in a RAID-10 array. Answer: B Explanation: A disabled Logical Disk Manager Administrative service manifests as an inability to connect to Logical Disk Manager. Reference: Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 3 Question 2. You work as the network admin at ABC.com. ABC.com currently makes use of a computer named ABC-SR22 configured as a File server running Windows Server 2003 that hosts the ABCProjects shared folder. Full backups of ABCProjects are run on a daily basis. One morning ABC.com users complained that they are unable to access files saved to ABCProjects. You then find ABCProjects files are inaccessible due to bad sectors on the hard disk. You need to restore the folder to a different location from the most recent backup. The only uncertainty thus is the matter of when the folder became corrupted. Which of the following actions should you take to make sure that the backup ABCProjects files will be accessible? A. You should first set up a test for successful backup procedures and document the process. B. You should execute the ntbackup command with the /restore parameter. C. You should use a temporary folder to restore the file to. Check that the proper data is on the database file. Shift the restored file to the ABCProjects folder. D. You should execute the ntbackup command with the /L:f|s|n parameters. E. You should test every day’s backup for the previous seven days before restoring the files to ABCProjects. Answer: C Explanation: To verify backup and restore procedures, many administrators will perform a test restore of a backup set. So as not to damage production data that test restore is targeted not at the original location of the data, but at another folder, which can then be discarded following the test? Thus if you apply this information on the scenario in the question then you should restore the file to a temporary folder, verify whether the correct data is contained in the database file and then copy the restored file to the ABCProjects folder. Reference: Dan Holme and Orin Thomas, MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Microsoft Press, pp. 16 and pp. 17. Question 3. You work as the IT admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR01 configured as a File server. You are preparing a backup plan for ABC-SR01. To this end you set up an account named TestBackup in the Backup Operators group on ABC-SR01. The ABC.com Backup Operators members will make use of the TestBackup account to perform the scheduled backups. After performing successfully for a month, the backups failed because of an expired password but even changing the password didnot work. How can you ensure successful backups? A. By adding the TestBackup account to the Network Configuration Operators group and Changing the password. B. By adding the TestBackup account to the Remote Desktop Users group and changing the password. C. By replacing the password with a new one for the backup job and unlocking the TestBackup account. D. In the properties of the TestBackup account by resetting the Account lockout threshold setting. Answer: C Explanation: The backup job schedule properties have not been changed, leaving it configured with the old username and password combination. As a result of this the ABCBackup account is locked out. Therefore we need to change the password for the backup job on every file server and unlock the ABCBackup account to let it work again. It could be that the password for the backup jobs could have expired causing the failure to backup. References: Dan Holme and Thomas Orin, MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Microsoft Press, pp. 7:12-13 Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System, pp. 317-318. Question 4. You work as the IT Network Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR01 which runs Internet Information Services as well as Remote Desktop. ABC-SR01 is used to host web content for the ABC.com internal web site. Web content is updated on a regular basis by a web developer who has been assigned a client computer named ABC-WS290. Which of the following actions should you take to make sure that Remote Desktop Connection can be used to post Web content on ABC-SR01 from ABC-WS290? A. Check the Disk Drives option in the properties of Remote Desktop Connection on ITCERTKEYSWS290. B. You should consider making use of the changeuser / execute command on ABC-WS290. C. You should execute the tscon /edit command on ABC-WS290. D. You should execute the changeuser / query command on ABC-WS290. Answer: A Explanation: When this option is enabled, you can open My Computer on the remote server, and view the disk drives from the client computer listed alongside the disk drives from the server. Also a connection to a Web Client Network is attempted only when the first two providers fail to respond. The “Disk Drives” option will make the Web Developer’s local disk drives available to them when they connect to the web servers using a remote desktop connection. Reference: J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, p. 8:34 Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, pp. 36, 574, 583 Question 5. You work as the IT Admin on the ABC.com domain. ABC.com has its office located in Chicago. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR01 configured as a File server. ABC.com has a partner company named Weyland Industries. Weyland Industries has their office located in Miami. The Weyland Industries network makes use of a computer named WEYLANDSR01 configured as an application server which is configured to prevent Remote Desktop Protocol connections. The Weyland Industries network administrator is responsible for performing normal backups on WEYLAND-SR01. WEYLAND-SR01 suffers a catashtophic failure and is removed from the network and you need to grant assistance. Which of the following actions should you take to remove the backup job on WEYLAND-SR01 from a ABC.com computer? A. You should use a Power Users account to log on to WEYLAND-SR01 and execute the ntbackup command with the / SNAP:on|off parameters. B. You should use a Network Configuration Operator account to log on and then execute the ntbackup command with the /A parameter. C. You should use an Administrator account to log on and then execute the schtasks command with the /delete parameter. D. You should use a Remote Desktop User account to log on and execute the ntbackup Command with the /UM parameter. Answer: C Explanation: The correct syntax is: schtasks /delete /tn { TaskName | * } [/f] [/s computer [/u [domain\]user /p password]] [/?] References: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/schtasks.mspx Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 9 Question 6. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR29 configured as a File server. ABC-SR29 hosts a shared folder named TestData which contains two subfolders named Temporary and Permanent and has various files with various NTFS permissions because it was created and saved by different users. You need to shift around certain files from Temporary to Permanent. Which of the following actions should you take to make sure that the existing file permissions are kept intact with the least amount of administrative effort? A. You need to archive the files in Temporary and then restore the archived files including the permissions, on Permanent. B. You should execute the xcopy command on ABC-SR29 and shift around the share Permissions from Temporary to Permanent. C. You should shift the files and folders from Temporary to Permanent. D. You should manually configure the NTFS and share permissions after moving the files and folders accordingly. E. You should make exact replicas of the files on both Temporary and Permanent and then copy them over accordingly. Answer: C Explanation: A number of factors impact the security settings that will be placed on the file in its new location, including the following: • Whether the file is copied or moved • Whether the destination is an NTFS volume or not • Whether the destination is on the same volume as the original location Files and folders that are moved or copied to non-NTFS volumes lose all permissions. If the destination is on an NTFS volume, the security permissions the file will have after the transfer will depend on several factors. When copying files or folders to a location on an NTFS volume, the user must have permission to create files in the destination location. When the file or folder is copied, it is created as a new object in the destination, and the user object that copied the file or folder becomes the owner of the newly created item. Destination Permissions Objects moved within the same NTFS volume Objects retain their original NTFS permissions in the new location Objects moved to a different NTFS volume Objects inherit the permissions of the new location The question states pertinently to move the files and folders from ABC-SR32 to ABC-SR33 which resides in the same NTFS volume. Not copy. Moving the files will ensure that the permissions as assigned to the various creators of these files and folders will not be modified. Copying it would result in modification. Since both ABC-SR32 and ABC-SR33 reside within the same volume, it will retain its original NTFS permissions in the new location. Reference: Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Laura E. Hunter & Will Schmied, MCSA/MCSE: Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment, Study Guide and DVD training system, Syngress Publishing, Rockland, MA, 2003, pp. 423-424 Question 7. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR04 configured as a File and Print server that also holds all the user profiles. ABC.com has a partner company named Weyland Industries. The Weyland Industries network users make use of two ABC.com client computers. There is now a concern that the Weyland Industries users will be able to access the documents that was saved on these client computers by ABC.com users. Which of the following actions should you take to negate this concern? A. Configure the sharing policy between ABC.com and Weyland Industries not to remove the Prevent Roaming Profile changes from propagating to the server policy option. B. Configure the Default Domain Policy to apply the Delete cached copies of roaming profiles policy option. C. Configure the Default Domain Policy to apply the Prevent Roaming Profile changes from propagating to the server policy setting. D. You should consider adding the Weyland Industries users to roaming user profiles policy Setting to the Default Domain Policy Group Policy object (GPO). E. You should consider adding the ABC.com users to roaming user profiles policy setting to the Default Domain Policy Group Policy object (GPO). F. You should consider making use of User.dat files in future. Answer: B Explanation: When users on your network regularly move from one profile-creating workstation to another, every machine they use will store a copy of their local profile. You may use System Policy Editor or Group Policies to compel the workstations to delete cached copies of roaming profiles when the user logs out. This is a machine-specific setting that is implemented in the Registry in HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON. What this setting also does is to prevent users from being able to access the My Documents folder of other domain users on the client computers as is the case in this question. Reference: Mark Minasi, Christa Anderson, Michele Beveridge, C.A. Callahan & Lisa Justice, Mastering™Windows Server 2003, Sybex Inc., Alameda, 2003, p.815 Question 8. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003. ABC.com currently makes use of a computer named ABC-DC01 configured as a domain controller. ABC.com recently merged with Weyland Industries. The Weyland Industries network users access resources in the ABC.com domain. You are preparing to create an Orginizational structure for ABC.com and Weyland Industries which has one top-level structure and a single child organizational structure. During the merger some of the Weyland Industries network users and ABC.com users have retired from service. Which of the following actions can be used to obtain a list of disabled user accounts? A. You should open the Properties page for the specific user who requires a Shadow Copy. B. You should consider executing dsadd/users command. C. You should open the commandline and execute the dsquery command with the /user parameter. D. You should open the commandline and execute the dsmove command with the /users parameter for each user. Answer: C Explanation: To generate the list of disabled users’ accounts as quickly as possible, you need to create a saved query in Active Directory Users and Computer. After this, execute dsquery user command. The ability to reuse queries can save time and speed up the process of locating objects within your AD environment. The Active Directory Users and Computers tool is included in the AD implementation used by Windows Server 2003. Your query will appear saved beneath Saved Queries in the left pane of the console. To execute the query, right-click it and choose Refresh. If you select the query without refreshing, the results from the last time you ran the query will appear. Dsquery is a command-line tool that is built into Windows Server 2008. It is available if you have the Active Directory Domain Services (AD DS) server role installed. To use dsquery, you must run the dsquery command from an elevated command prompt Reference: http://technet.microsoft.com/en-us/library/cc732952.aspx, http://blogs.techrepublic.com.com/datacenter/?p=178 Question 9. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003. ABC.com currently makes use of a computer named ABC-DC01 configured as a domain controller. ABC.com recently entered into partnership with Weyland Industries. The Weyland Industries network users access resources in the ABC.com domain. The new ABC.com written security policy states that Weyland Industries and ABC.com network users should not be able to log on to the domain outside of business hours. Which of the following actions should you take to ensure that network users automatically disconnect from the domain when still active after business hours whilst ensuring you use the minimum amount of administrative effort? (Choose two) A. Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all domain users. B. You should create a Group Policy Object (GPO) that specifies the restricted logon times and apply compulsory logging off in the GPO then link the GPO to the Default Domain Policy. C. Select all domain user accounts and modify the account properties to restrict logon hours to business hours. D. Create a domain user account named TempUser and configure the account properties to restrict logon hours to business hours. E. Modify the DACL on the Default Domain Policy Group Policy Object (GPO) to assign the Allow – Read permission to the Users group. Answer: B, C Explanation: When you restrict logon hours, you might also want to force users to log off after a certain point. If you apply this policy, users cannot log on to a new computer, but they can stay logged on even during restricted logon hours. To force users to log off when logon hours expire for their account, apply the Network security: Force logoff when logon hours expire policy. You can assign logon hours as a means to ensure that employees are using computers only during specified hours. This setting applies both to interactive logon, in which a user unlocks a computer and has access to the local computer, and network logon, in which a user obtains credentials that allow him or her to access resources on the network. References: Dan Holme and Thomas Orin, MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, p. 582 Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System, pp. 58, 442. Question 10. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003. ABC.com currently makes use of a computer named ABC-SR34 which has hard disks configured as basic NTFS storage connected to separate controllers. ABC.com uses ABC-SR34 to hosts network applications. You are preparing to install an additional disk drive to ABC-SR34 as storage is becoming a problem. You started your maintenance by formatting the hard disk as a basic disk using NTFS and started the computer. Whilst booting the computer you receive the error message shown below: “Windows could not start because of a computer disk hardware configuration problem. Could not read the selected boot disk.” Which of the following actions should you take to start ABC-SR34 successfully whilst ensuring the applications would be available to ABC.com network users as soon as possible? (Choose Two.) A. You should reboot ABC-SR34 with the Windows Server 2003 installation CD-ROM in the CDROM drive. B. You should reboot ABC-SR34 with the Advanced Boot options Last Known Good Configuration option. C. You should reboot ABC-SR34 with the Advanced Boot options Safe Mode with Networking option. D. You should reboot ABC-SR34 with the Advanced Boot options Directory Services Restore Mode option. E. You should repair ABC-SR34 with the Recovery Console after a successful reboot. F. You should repair ABC-SR34 with the Performance and Reliability Monitor after a successful reboot. G. You should monitor and repair ABC-SR34 with the System Monitor after a successful reboot. Answer: A, E Explanation: Adding the extra hard disk has probably caused the problem. The boot.ini file needs to be corrected to reflect the new disk configuration. We can use the Bootcfg utility in the Recovery Console to correct this problem. Use the Bootcfg utility in the Recovery Console to correct the Boot.ini file: 1. Use the Windows XP CD-ROM to start your computer. 2. When you receive the message to press R to repair Windows by using the Recovery Console, press the R key. 3. Select the Windows installation that you want, and then type the administrator password when prompted. 4. Type bootcfg /rebuild, and then press ENTER. 5. When the Windows installation is located, the following instructions are displayed: Add installation to boot list? (Yes/No/All) [Type Y in response to this message.] Reference: Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System, p.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.