70-293

Question Paper

Exam 70-293  Questions Bank

Curriculum : ACNA 2008

Core : 70-293

Duration : 1 hour

1. Which of the following operating systems can act as an Active Directory client and join the

domain using a computer  account?

A. Windows 95

B. Windows 98

C. Windows Me

D. Windows 2000 Professional

E. Windows XP Home Edition

Answer D

2. Which editions of Windows could you use for 4-node clustering with 8 processors and 32 GB

RAM?

A. Windows Server 2003, Web Edition

B. Windows Server 2003, Standard Edition

C. Windows Server 2003, Enterprise Edition

D. Windows Server 2003, Datacenter Edition

Answers C and D

3. Although you can use the Configure Your Server  Wizard to configure a server as domain

controller, which program or utility do you use to promote or demote a domain controller?

A. NETSH DIAG

B. DCPROMO.EXE

C. Active Directory Users And Computers

D. NTDSUTIL.EXE

E. LSASS.EXE

Answer B

4. Mary is a network administrator  who has been given the task of configuration on a new file

server. Windows Server 2003 Standard Edition has already been installed. The file server has

three hard drives formatted with NTFS. The C drive is the system drive. Drives D and G are

data drives. Assuming the default filesystem permissions are in place, which of the following

tasks must be performed to ensure that only domain users have full permissions on the data

drives?

A. The Ever yone group should be granted Full Control on Drives D and G.

B. The Domain Users group should be granted Full Control on Drives D and G.

C. Permissions for the Ever yone group should be removed from Drives D and G.

D. Permissions for the Authenticated Users group should be removed from Drives D and G.

Answers B and C

5. Mary is a network administrator  who has been given the task of configuration on a new file

server. Windows Server 2003 Standard Edition has already been installed. The file server has

three hard drives formatted with NTFS. The C drive is the system drive. Drives D and G are

data drives. After configuring filesystem per missions, Mar y created a shared folder on each data

drive for users. What configuration option should Mary choose to ensure administrators have

Full Control on the shared folders and other users have Change access?

A. All Users Have Read-Only Access.

B. Administrators Have Full Access; Other Users Have Read-Only Access.

C. Administrators Have Full Access; Other Users Have Read And Write Access.

D. None of the above; the administrator  must configure custom permissions.

Answer C

6. John is a new system administrator. He is configuring security for several new workstations

running Windows XP Professional. The computers are members of the Temp OU, and he

noticed that users are able to reuse old passwords whenever they are prompted to change them.

Which of the following account policies can be used to prevent this behavior?

A. Enforce Password History

B. Maximum Password Age

C. Minimum Password Age

D. Store Passwords Using Reversible Encryption

Answer A

7. While continuing to look at the domain security for the Temp OU, John noticed that a user was

able to repeatedly enter a wrong password. He watched the user enter eight bad passwords in a

row before finally getting the right password on the ninth attempt. Which of the following

account policies can be set to ensure accounts are locked out indefinitely after 3 bad logon

attempts in a 15-minute period?

A. Account Lockout Duration

B. Account Lockout Threshold

C. Reset Account Lockout Counter  After

D. All of the above

Answer D .

8. You've just promoted a server running Windows Server 2003 to be a domain controller. After

you log on to the server, you run the Security Configuration And Analysis tool and notice

security settings aren't what you expect them to be. What is the most likely reason for the

security changes on the server?

A. Domain controllers don't have local security settings, and during promotion, any

previously applied secur ity template is removed.

B. During promotion, domain controllers are made members of the Domain Controllers OU

and have the DC Security template applied during promotion.

C. Domain controllers don't have a SAM database and use only Active Directory for

security.

D. During promotion, domain controllers are configured with default security using the

Setup Security template.

Answer B

9. What is the proper way to create and then apply a custom security template to a computer?

A. Use the Security Templates snap-in to create a custom template, configure the security

settings as necessar y, and then apply the settings using Security Configuration And

Analysis.

B. Create a database in Security Configuration And Analysis, modify the security settings

as necessary, and then apply the database to the computer.

C. Create a database in Security Configuration And Analysis, modify the security settings

as necessary, and then apply the settings using the SECEDIT utility.

D. Create a database in the SECEDIT utility, modify the security settings as necessary in

Security Configuration And Analysis, and then apply the template to the computer using

the Security Templates snap-in.

Answer A

10. You have created a custom template for computers in the Workstations OU. After creating a

rollback template and applying the custom template, you found that the template has caused

some undesir able side effects. Which of the following procedures would correct the problem by

restoring the previous security settings exactly as they were?

A. Reapply the default template using Security Configuration And Analysis, and then

import this into the Workstation GPO.

B. Use Security Configuration And Analysis to apply a rollback template and then import

this into the Workstation GPO.

C. Use Security Configuration And Analysis to apply a rollback template, import this into

the Workstation GPO, and then manually modify for access control lists on files and in

the Registr y as necessary.

D. Import the default template into Workstation GPO.

Answer C

11. Which OSI layer is responsible for packet addressing and data encapsulation?

A. Application

B. Session

C. Transport

D. Network

E. Data-link

Answer E

12. Which of the following protocols are part of the TCP/IP protocol suite?

A. Transmission Control Protocol

B. Internet Protocol (TCP/IP)

C. User Datagr am Protocol (UDP)

D. Internet Package Exchange (IPX)

E. NetBIOS Extended User Interf ace (NetBEUI)

Answers A, B, and C

13. You are planning the infrastructure for a new network. The data center is centrally located, and

the furthest location from the data center is 400 meters. The longest cable runs are 480 meters

from the central switch and your plan allows you to use up to 4 repeaters. Which of the

following UTP cabling options could be used?

A. 10Base-T, Category 3 UTP

B. 100Base-T, Category 5 UTP

C. 1000Base-T, Category 5E UTP

D. None of the above

Answer A.

14. You are designing a new network and plan to use Class C IP addresses. You want to be able to

create 4 subnets with 60 hosts on each subnet, so you allocate 26 bits to the network ID. Which

of the following subnet masks should you use for the network?

A. 255.255.255.128

B. 255.255.255.192

C. 255.255.255.224

D. 255.255.255.240

Answer B

15. You are designing a network for a large branch office and have been assigned the network

address 10.10.0.0/18. What are the maximum number of subnets and the maximum number of

hosts on each subnet?

A. 64 subnets; 262,142 hosts

B. 128 subnets; 131,070 hosts

C. 256 subnets; 65,534 hosts

D. 512 subnets; 32,766 hosts

E. 1024 subnets; 16,382 hosts

Answer E

16. You are designing a network and plan to use subnetting. You plan to use services running

Routing And Remote Access Service to provide IP routing for unicast network traffic. Which

routing protocols can you use?

A. RIP version 1

B. RIP version 2

C. OSPF

D. IGMP

Answers B and C

17. You are installing a network in an office located above a factory floor and there is a lot of

electromagnetic interference. Which of the following network media should you use?

A. UTP cabling

B. B Fiber optic cabling

C. IEEE 802.11a wireless

D. IEEE 802.11b wireless

Answer B .

18. You are designing an Internet connectivity strategy for a large office with 500 users. You've

determined that between 50 and 100 users will be using email or browsing the Web at any given

time. The amount of data downloaded is about equal to the amount of data uploaded. Which of

the following Internet access solutions would provide the most reliable solution for both

downstream and upstream transmissions?

A. ISDN (Basic Rate Interf ace)

B. ISDN (Primary Rate Interf ace)

C. Cable/DSL Modem

D. T-1

Answer D

19. You are a network administer at a large organization. The company has a T-1 connection to a

local ISP, which is shared by all clients. Clients access the Internet using NAT. Several users

have reported that they can't access the Internet. You start diagnosing the problem and find that

all users reporting the problem are on the same subnet. Users on other subnets are not

exper iencing any problems accessing the Internet. Which of the following could be the cause of

the problem?

A. The NAT router is malfunctioning.

B. The T-1 connection is down.

C. The users' DNS Server is down.

D. The users' default gateway for the subnet is malfunctioning.

E. The users' DHCP server is down.

Answer D

20. When clients obtain TCP/IP settings from a DHCP server, which of the following options

should be configured via DHCP?

A. IP Address

B. Subnet Mask

C. Network ID

D. Router

Answer D

21. DNS servers can be configured to perfor m name resolution using several types of queries. With

which type of query does the server return results only form its records or from its cache?

A. Forward query

B. Reverse query

C. Iterative query

D. Recursive query

Answer C

22. Tom is a network administrator. He's been asked to improve responsiveness for name resolution

by configur ing a local DNS server that will maintain a cache of resolved queries. What should

Tom do to prepare the server?

A. Install the DNS Server service.

B. Install the DNS Server service, and then configure the server as a forwarder.

C. Install the DNS Server service, and then configure server to maintain copies of the

necessary zones.

D. Install the DNS Server service, and then configure server to host the necessary zones.

Answer A .

23. Sarah is a network administrator. The network's domain structure has recently been

reconf igured, and ever since, there are several clients that are unable to update their DNS

records. She checked and all the clients having problems are in Technical resources department,

which is part of the tech.domain.local domain. She suspects the problem has to do with the

preferred DNS server the clients are using. The preferred DNS server for these clients hosts the

eng.domain.local domain. What is the best and easiest way to resolve the problem?

A. The computer accounts for the problem clients should be moved to the eng.domain.local

domain.

B. The DNS server should be moved to the tech.domain.local domain.

C. The primary DNS suffix for the computers should be changed to eng.domain.local

domain.

D. The preferr ed DNS server being used for the clients should be changed.

Answer D .

24. You are a network administrator. Multiple users have reported that they can access some local

resources but not all, and they have no access to resources on the Internet. You try to diagnose

the problem and find that the preferred DNS server used by the clients having the problem can

only resolve names for zones stored on the server. The TCP/IP settings on the DNS server are

configur ed correctly. What is the likely cause of the problem?

A. The DNS server has incorrect or corrupt root hints.

B. The DNS server's resolver cache is corrupted.

C. The DNS server is not getting zone transfers.

D. The DNS server doesn't have any forwarders configured.

Answer A

25. Which routing protocol should use to enable members of a host group to register themselves

with routers?

A. Routing Information Protocol (RIP) version 2 for Internet Protocol

B. Open Shortest Path First (OSPF)

C. Internet Group Management Protocol (IGMP)

D. DHCP Relay Agent routing protocol

Answer C

26. You are planning routing for a large, congested network. Many network segments are separated

by at least 12 hops. You are considering using either link state routing or distance vector routing

on a computer  running Windows Server 2003. Which of the following are valid reasons link

state routing would be preferred in this instance?

A. Link state routing uses only the number of hops for its metrics.

B. Links state routing factors in conditions such as network speed and congestion.

C. Link state routing requires little planning and is easy to configure.

D. Link state routing supports multicast for efficient communications with multiple routers.

Answer B

27. Which of the following authentication protocols is required when you want to use digital

cer tificates?

A. Extensible Authentication Protocol (EAP)

B. Microsoft Encrypted Authentication version 2 (MS-CHAP v2)

C. Microsoft Encrypted Authentication (MS-CHAP)

D. Encrypted Authentication (CHAP)

E. Shiva Password Authentication Protocol (SPAP)

Answer A

28. You are configuring remote access and want to limit client access to the Routing And Remote

Access Service server based on group membership. Which of the following procedur es can you

use?

A. Set the Dial-in properties for users in Active Director y Users And Computers.

B. Configure clients to use VPN with IPSec and L2TP.

C. Configure clients to use RADIUS servers for authentication.

D. Configure the server to use remote access policies.

Answer D

29. You are configuring IPSec policy for a group of computers that you want to use IPSec

encr yption whenever possible. However, some of the clients in the group don't support IPSec.

Which of the following IPSec policies should you use?

A. Client (Respond Only)  policy.

B. Server (Request Security) policy.

C. Secure Server (Require Security) policy.

D. A custom IPSec policy must be created.

Answer B

30. You want to create a group of highly available web servers. All servers are running Windows

Server 2003 and are used to provide HTTP and HTTPS services on the internal network. Which

high-availability software solution should you use?

A. Network Load Balancing

B. Component Load Balancing

C. Server clusters

D. Multicasting Server Grouping

Answer A

31. Which type of clustering uses shared storage and stores the cluster configuration and recovery

data on the same device?

A. Passive-node clusters

B. Single-node server clusters

C. Single quorum device server clusters

D. Majority node server clusters

Answer C

32. You are configuring a four-node cluster on servers running Windows Server 2003 Enterprise

Edition. If all four nodes are active, you've determined that at least four processors and 4 GB of

RAM are required on each server to handle the expected workload. You also think you might

want to use two active nodes and two passive nodes. What are the minimum configurations to

handle the workload and allow for two-node failure?

A. Configure four active nodes each with at least eight processors and 8 GB RAM.

B. Configure two active nodes and two passive each with at least four processors and 4 GB

RAM.

C. Configure 4 active nodes each with at least 32 processors and 16 GB RAM.

D. Configure 2 active nodes and 2 passive each with at least 16 processors and 32 GB

RAM.

Answer A

33. Which of the following performance counters could you use to determine a possible problem

with memory or a memor y leak?

A. Process(process_name)\Pool Paged Bytes

B. Memory\Available Kbytes

C. Memory\Nonpaged Kbytes

D. Processor\%Processor Time

Answers A, B, and C .

34. Which of the following features can you use to supplement backups and allow users to recover

their own files?

A. Volume Shadow Copy

B. Automated System Recovery

C. Automatic Supplemental Restore

D. Normal backup

Answer A

35. Which type of backup should you use if you want to track the full set of changes since the last

normal backup?

A. Incremental backups

B. Copy backups

C. Daily backups

D. Differential backups

Answer D

36. Which tool can you use to deter mine which ports a server has open?

A. NETSH

B. NETSTAT

C. Security Configuration And Analysis

D. Security Monitor

Answer B

37. Which of the following are assigned by the Internet Assigned Numbers Authority (IANA)?

A. Well-known port numbers

B. Ephermer al numbers

C. Protocol codes

D. Listen Pids

Answers A and C

38. You've configured IP filter lists so IPSec encrypts email traffic. The organization uses Post

Office Protocol 3 (POP3) and Simple Mail Transfer Protocol (SMTP). For which of the

following well-known ports should you configur e the filter list?

A. 25

B. 80

C. 90

D. 110

Answers A and D

39. Bob, who is not an administr ator, is commonly asked to help Joe with computer problems. Your

manager has asked you to configure Bob's account so Bob can remotely assist Joe. Which of the

following tasks must you perform to allow Bob to do this?

A. Enable Remote Desktop for Administration on Joe's computer.

B. Enable Remote Assistance on Joe's computer.

C. Make Bob a member of the Remote Desktop Users group on Joe's computer.

D. Make Bob a member of the Remote Administrators group on Joe's computer.

Answers B and C .

40. You don't want wireless clients to be able to connect directly to other wireless clients. Which

wireless operating modes should you use to ensure that clients can only connect to wireless

access points?

A. Any Available Network (Access Point Preferred)

B. Access Point (Infrastructur e) Networks Only

C. Computer-to-Computer (Ad Hoc) Networks Only

D. Ad Hoc Networks Only

Answer B

41. Which of the following audit policies should you enable to log all IPSec events in the Security

event log?

A. Audit Logon Events

B. Audit Policy Change

C. Audit Security

D. Audit IP Policy

Answers A and B

42. Which type of Certificate Authority (CA) must you use if you want to use smart card

cer tificates?

A. Stand-alone CA

B. Domain CA

C. Enterprise CA

D. Subordinate CA

Answer C

43. You are planning the deployment of Public Key Infrastructure (PKI). You want the CAs to

publish their certif icates and revocation lists to Active Directory, and you want to use

autoenrollment. Which of the following is the first CA you should deploy to support your

infrastructure?

A. Enterprise root CA

B. Enterprise subordinate CA

C. Stand-alone root CA

D. Stand-alone subordinate CA

Answer A

44. You've implemented IPSec and now you want to check to make sure it is working. Which of the

following tools can you use to monitor the network to make sure all network transmissions are

using IPSec?

A. Performance Monitor

B. System Monitor

C. Network Monitor

D. IP Security Monitor

Answer D

Bạn đang đọc truyện trên: AzTruyen.Top

Tags: