Sponsor

2006/03/22

CertTutor QOW 03-22-05

Welcome to the Weekly CertTutor.net Question of the Day Digest.

___________________________________________________________

Primary Ad - Surgient

Learn the 12 critical capabilities needed in your virtual lab automation solution to meet the increasing demands from virtualization technology.

http://list.windowsitpro.com/t?ctl=24A42:610453

___________________________________________________________

CertTutor.net is a certification related website that has published certification authors such as Ian McLean, Will Willis, Gregory W. Smith and Orin Thomas regularly answering your questions.

In this newsletter you'll find the questions listed in exam number order. Windows 2003 towards the top of the newsletter and Windows 2000 questions towards the bottom.

If the answer URLS wrap and don't work, try cutting and pasting them into notepad.

If you disagree with any of the answers, post your feedback on the forums. If you don't understand some of the concepts - please ask us to explain. Some of the best in the field will answer your question!

Thanks for being a subscriber and good luck on your exams!

___________________________________________________________

Secondary Ad - Hewlett-Packard

Learn the essentials about how consolidation and selected technology updates build an infrastructure that can handle change effectively.

http://list.windowsitpro.com/t?ctl=24A43:610453

___________________________________________________________

----------------------- 70-270 QUESTION 1 -----------------------

Which of the following methods could you use to enable ClearType font rendering on your Windows XP Professional workstation? (Select all that apply.)

A. In the Control Panel, select "Classic View." Open the Display applet and select the Appearance tab. Click the Effects button. In the "Use the following method to smooth edges of screen fonts:" drop-down menu, select ClearType.

B. Right-click the Desktop. Select Properties. Select the Appearance tab and press the Effects button. In the "Use the following method to smooth edges of screen fonts:" drop-down menu, select ClearType.

C. In the Control Panel, select "Classic View." Open the Fonts applet. On the General tab, select the "Enable ClearType Font Rendering" check box.

D. In the Control Panel, select "Classic View." Open the System applet and select the Advanced tab. In the Performance menu, select Settings and the "Enable ClearType Font Rendering" check box.

E. In the Control Panel, select "Classic View." Open the "Accessibility Options" applet. Select the Display tab and select the "Enable ClearType Font Rendering" check

----------------------- 70-270 QUESTION 2 -----------------------

Your company, IE21, deals primarily with small businesses and fulfilling their network requirements. One of the small businesses, MickCorp, has 10 old Windows 98 computers and has just purchased 10 new workstations on which the company wants you to install Windows XP Professional. The company also wants you to migrate each staff member's Win98 computer's documents and settings to the new XP Pro systems. You need to migrate these settings:

Internet Explorer (IE) settings Outlook settings and store Dial-up connections Screen-saver selection Fonts Folder options Taskbar settings

MickCorp has a small 10Base-T network, and you connected an extra hub so that all systems can access the network and the central server. Which of the following answers represents the best way to migrate these settings from each individual Win98 machine to each individual XP system? (Choose the best answer.)

A. The settings listed above can be transferred only through a direct upgrade of the hard disk that contains the files. Use a program similar to Norton Ghost to image each individual Win98 hard disk drive to a place on the server, then expand this image onto the hard disk drive of the new XP systems. After Win98 starts to boot on the new machines, insert the XP Pro CD-ROM and upgrade the system.

B. Copy the registry of the Win98 machine to a diskette. Go to the XP machine and run regedt32.exe. Go to the Registry menu and select "open local." Insert the diskette that you made on the Win98 system and load the registry. Then select "merge registries." This action will copy across all the settings. Manually copy all the files through the network drive.

C. Copy the registry of each Win98 system to a special folder on the server. Run the Migration wizard and point it to the folder that contains the corresponding Win98 registry. The system will transfer the settings.

D. Run the "File Settings and Transfer" wizard found in Start, All Programs, Accessories, System Tools. Create a Wizard Disk and take it to the corresponding Win98 machine. Run A:\fastwiz. A dialog box will appear. Select the option to export the settings registry to the server. Go back to the XP machine and rerun the "File Settings and Transfer" wizard. Select the "Import Remote Registry" option, and the system will transfer the settings.

E. Run the "File Settings and Transfer" wizard found in Start, All Programs, Accessories, System Tools. Create a Wizard Disk and take it to the corresponding Win98 machine. Run A:\fastwiz. A dialog box will appear. Select "Home or Small Office Network" for the transfer method, then select "Files and Settings" for the items you want to transfer. The computer will scan the network and prompt you for a password that it will display on the screen of the XP machine you used to create the disk. The system will then transfer the settings and implement the files and settings.

----------------------- 70-270 QUESTION 3 -----------------------

You installed Windows XP on a clean system out of the box, and you're perplexed to find that none of the standard desktop icons are apparent. Which of the following methods can you use to put the "My Computer", "My Network Places," and "My Documents" icons back on the desktop?

A. Right-click the Start menu and select properties. Go to the Desktop tab and select the check boxes next to "My Computer", "My Network Places," and "My Documents."

B. Go to the Start menu, Settings, and select "Taskbar and Start Menu." Go to the Taskbar tab and clear the "Hide inactive icons" check box.

C. Double-click "My Network Places." In the left panel, make sure that "other places" is expanded. Select the "My Computer" icon and another window appears. In the left panel, click the Control Panel and select "Classic View." Open the Display applet. Go to the Desktop tab and press the "Customize Desktop" button. Make sure that the check boxes next to "My Computer", "My Documents," and "Internet Explorer" are selected.

D. In the Control Panel, select "Classic View." Open the Display applet, select the Desktop tab, and press the "Customize Desktop" button. Make sure that the check boxes next to "My Computer", "My Documents," and "Internet Explorer" are selected.

E. Right-click an empty area on the desktop. Select Properties and the Desktop tab. Press the "Customize Desktop" button. Make sure that the check boxes next to "My Computer", "My Documents," and "My Network Places" are selected.

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=24A45:610453

___________________________________________________________

Hot Topic Ad - MeasureUp

Save 25% and Be Sure You'll Pass with MeasureUp

25% off certification practice tests for Microsoft, CompTIA, CIW, PMI and more. MCTS and MCITP exclusive practice tests now available. Use MeasureUp practice tests to make sure you?re ready on exam day. You'll pass. We guarantee it!

http://list.windowsitpro.com/t?ctl=24A48:610453

___________________________________________________________

----------------------- 70-290 QUESTION 1 -----------------------

Bouillon has telnetted across to one of the Windows 2003 POP3/SMTP servers in his domain to do some maintenance work and wants to get a list off all of the mailboxes that currently reside in the bouillon.net domain. Which of the following command line commands would enable him to do this?

A. listbox -all bouillon.net

B. winpop list bouillon.net

C. This cannot be done from the command line.

D. mailbox list bouillon.net

E. showbox -all bouillon.net

----------------------- 70-290 QUESTION 2 -----------------------

You have installed the POP3 service on a Windows Server 2003 Domain Controller at the offices of BischkeCorp. You are currently configuring the authentication methods that people in the office will use to connect to the server to retrieve their mail. In this situation - what are the possible authentication methods available for use for mail-retrieval?

A. Plaintext Password File.

B. Active Directory Integrated.

C. Local Windows Accounts.

D. Mailbox Specific Password.

E. Encrypted Password File.

----------------------- 70-290 QUESTION 3 -----------------------

You are running a POP3/SMTP service on a Windows Server 2003 in a 2003 AD-Integrated Domain nzsa.gov.nz. You are concerned that this new server might act as an "open-relay" and hence would be a target for spammers to dump loads of unwanted email across the internet. Which of the following represents the best way to limit mail relaying only to your specific domain nzsa.gov.nz?

A. Run the POP3 Applet. Select Properties of the nzsa.gov.nz domain and enter nzsa.gov.nz into the "relay to" box.

B. Run the IIS Applet. Select the properties of the Default Virtual SMTP Server Click on Access and then on the Relay Button. Select "Don't Relay Mail".

C. Run the POP3 Applet. Select Properties of the nzsa.gov.nz domain and check "allow relay".

D. 2003's POP3/SMTP service automatically locks down if authentication is set to AD integrated. Make sure that the .NET server is set to AD-Integrated authentication.

E. By default, 2003's POP3/SMTP service does not relay mail other than to the specific domains it is configured to recieve. As nzsa.gov.nz is such a domain - no changes are necessary.

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=24A47:610453

----------------------- 70-291 QUESTION 1 -----------------------

There are three Windows Server 2003 systems in the Intelligence section of the Tonga Intelligence Secretariat. Because of the sensitive nature of the information transmitted between them, Ridcully, the T.I.S. Network Administrator has been instructed to make sure that they communicate securely with each other. These servers are called melchior.tis.gov.to, balthezar.tis.gov.to and caspar.tis.gov.to.

Ridcully runs Start|Run|gpedit.msc on each computer.

* On melchior he navigates to

* Computer Configuration|Windows Settings|Security Settings| IP Security Policies

* And right clicks on "Secure Server" and selects "Assign".

* On balthezar he navigates to

* Computer Configuration|Windows Settings|Security Settings| IP Security Policies

* And right clicks on "Client" and selects "Assign".

* On caspar he navigates to

* Computer Configuration|Windows Settings|Security Settings| IP Security Policies

* And right clicks on "Client" and selects "Assign".

From the balthezar, he runs a command prompt and pings the IP address of melchior. He receives the following response:

Pinging 192.168.0.25 with 32 bytes of data:

Negotiating IP Security Negotiating IP Security Negotiating IP Security Negotiating IP Security

Ping statistics for 192.168.0.25: Packets: Sent = 4, Received = 0, Lost = 4 (100% loss)

What does he need to do to get a normal ping response and reduce the packet loss to an acceptable level?

A. Because ping uses ICMP, an insecure protocol sometimes used to attack networks, he will always get the Negotiating IP Security response when you attempt to do a ping between two secured servers. He needs to use the command secping to verify connectivity between the two hosts.

B. Instead of selecting "secure server" on melchior, he should have selected "client".

C. Ping melchior again. The two servers will have now established IPSec security association and the ping will work fine.

D. Instead of selecting "client" on balthezar, he needs to select "secure server".

----------------------- 70-291 QUESTION 2 -----------------------

Mission Control for the NZSA is located in Wellington, New Zealand. At the moment, spread throughout the NZSA network there are five Windows Server 2003 DNS Servers. At the moment they are configured so that the DNS server located in Wellington is the Primary DNS Server. Secondary servers are located in Auckland, Christchurch, Dunedin, Tonga and Stockton.

At the moment DNS changes are processed by the primary and then pulled to the secondary servers. The hardware on the primary server and the secondary servers is the same and the NZSA environment only runs Windows 2003 and XP systems.

It has been decided that changes to the DNS database should be more balanced so that all servers in the NZSA environment, rather than just the DNS at Mission Control in Wellington, can accept DNS updates. Which of the following actions should be taken to achieve this?

A. Start the DNS MMC on the Wellington Primary DNS server. Select the DNS zone to be changed. Right-click and select change. Select "Migrate to Load Balanced Zone" and select OK. Repeat this step on all of the secondary DNS servers in Auckland, Christchurch, Dunedin, Tonga and Stockton.

B. Start the DNS MMC on the Wellington Primary DNS server. Select the DNS zone to be changed. Right-click and select change. Select "Migrate to Active Directory Zone". Select OK and wait for the changes to propagate to the secondary servers in Auckland, Christchurch, Dunedin, Tonga and Stockton.

C. Start the DNS MMC on the Wellington Primary DNS server. Select the DNS zone to be changed. Right-click and select change. Select "Active Directory integrated" and select OK. Repeat this step on all of the secondary DNS servers in Auckland, Christchurch, Dunedin, Tonga and Stockton.

D. Start the DNS MMC on the Wellington Primary DNS server and select the "All Zones" in the Zone node. Right-click and select "Migrate to Load Balanced Zone". Click OK and wait for the change to propagate to the secondary servers in Auckland, Christchurch, Dunedin, Tonga and Stockton.

----------------------- 70-291 QUESTION 3 -----------------------

Oksana is the remote access security Administrator for the NZSA. One of the company's policies is that for L2TP over IPSec-based VPN connections to the NZSA, 56-bit DES encryption must used. The use of Triple DES is discouraged as some of the NZSA's remote staff work sometimes in countries that are on the US encryption embargo list.

The Encryption tab of Dial-In Profiles has four check boxes.

No Encryption. Basic Encryption. Strong Encryption. Strongest Encryption.

Which box/boxes can Oksana select when she is constucting Dial-In profiles so that L2TP/IPSec VPN connections use 56-bit DES encryption. (select one, assume all boxes are currently cleared)

A. Basic, Strong and Strongest Encryption.

B. Strong and Strongest Encryption.

C. Basic and Strong Encryption.

D. No and Basic Encryption.

E. Strongest Encryption.

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=24A46:610453

----------------------- 70-294 QUESTION 1 -----------------------

The Distributed file system (Dfs) allows system administrators to make it easier for users to access and manage files that are physically distributed across a network. Dfs allows you to make files distributed across multiple servers appear to users as if they reside in one place on the network. Windows Server 2003 networks support two types of Dfs roots: stand-alone Dfs roots and domain-based Dfs roots. Which of the following statements about stand-alone and domain- based roots are true? Choose all that apply.

A. A domain-based Dfs root must be hosted on a server that is a member of a domain.

B. A domain-based Dfs root has its Dfs topology automatically published to Active Directory.

C. A stand-alone Dfs root can have root-level Dfs shared folders.

D. A stand-alone Dfs root has a limited hierarchy of Dfs links.

----------------------- 70-294 QUESTION 2 -----------------------

Your company's network consists of a single Windows Server 2003 functional level domain. Within the domain you have Organizational Units (OUs) for Sales, Marketing and Finance. Each of the OUs has a person that has responsibility for the OU and has been given full administrative control over it.

At the domain level you have configured a policy called Mandatory that contains certain desktop restrictions and security settings that you would like to have applied to all users in the domain regardless of which organizational unit they are located in. However you find that user objects located in the Sales OU are receiving different settings than those specified in the Mandatory policy. You suspect that a policy (named "SalesSettings") created by the administrator of the Sales OU is causing this problem. What can you do to ensure that the settings in the Mandatory policy are received by all users in the domain?

A. Enable loopback processing mode for the Mandatory policy.

B. Set the domain to Block Policy Inheritance.

C. Set the link for the SalesSettings policy at the OU level to No Override.

D. Set the Sales OU to Block Policy Inheritance.

E. Enable loopback processing mode for the SalesSettings policy.

F. Set the link for the Mandatory policy at the domain level to No Override.

----------------------- 70-294 QUESTION 3 -----------------------

Which of the following commands, issued from the command prompt of a Windows Server 2003 domain controller in the rooslan.com.au domain will list all of the user objects in the domain?

A. dsquery user "DC=rooslan,DC=com,DC=au"

B. dsrm user "DC=rooslan,DC=com,DC=au"

C. dsget user "DC=au,DC=com,DC=rooslan"

D. dsquery user "DC=au,DC=com,DC=rooslan"

E. dsget user "DC=rooslan,DC=com,DC=au"

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=24A44:610453 __________________________________________________________

You are subscribed as news-and-stuff@arconati.us. To unsubscribe from this email newsletter use the following link:

http://list.windowsitpro.com/u?id=28351AE7DCFB1F6C952E61704C1A78DC

Thank you, CertTutor.net Question of the Day Team

CertTutor is owned by Windows IT Pro Magazine a division of Penton Media, Inc. 221 East 29th Street, Loveland, CO 80538 Copyright 2005, Penton Media, Inc. All Rights Reserved.

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts