Sponsor

2006/04/05

CertTutor QOW 04-05-06

Welcome to the Weekly CertTutor.net Question of the Day Digest.

___________________________________________________________

Primary Ad - Symantec

Learn to identify the top 5 IM security risks, and protect your networks and users. http://list.windowsitpro.com/t?ctl=26243:610453 ___________________________________________________________

CertTutor.net is a certification related website that has published certification authors such as Ian McLean, Will Willis, Gregory W. Smith and Orin Thomas regularly answering your questions.

In this newsletter you'll find the questions listed in exam number order. Windows 2003 towards the top of the newsletter and Windows 2000 questions towards the bottom.

If the answer URLS wrap and don't work, try cutting and pasting them into notepad.

If you disagree with any of the answers, post your feedback on the forums. If you don't understand some of the concepts - please ask us to explain. Some of the best in the field will answer your question!

Thanks for being a subscriber and good luck on your exams!

___________________________________________________________

Secondary Ad - Availl

Ensure instant access to files at remote servers/offices.

Confused by WAFS, Wide Area Mirroring, DFS, WAN acceleration, or Replication technologies? Do you have remote sites with common data or file needs? Get a free software trial, and register for the free seminar:

http://list.windowsitpro.com/t?ctl=2624B:610453

___________________________________________________________

Editor's note: Meet Your Favorite IT Experts at Connections Europe in Nice, France April 24-27 Did you know your favorite Connections conference is coming to Europe in April? Learn from your favorite authors live and in person, and hear directly from Microsoft experts about the next generation of Microsoft technologies. This is an action-packed event with four conferences located together for one rate: ASP.NET, Visual Studio, SQL Server and Exchange plus bonus sessions on Sharepoint and Windows! I am going to let you know about a special rate -- when you buy your first conference registration at 1,100 euros, you can get additional passes at half off -- so partner up with your friends and take advantage of this great rate. The regular price is 1450 euros, so this a big bargain, especially when you check out the lineup of speakers! To get my special rate, go to http://list.windowsitpro.com/t?ctl=2624A:610453 to register today and enter promocode: CERENL. ___________________________________________________________

----------------------- 70-270 QUESTION 1 ----------------------- You want to use the User State Migration Tool (USMT) to migrate 50 users from Windows NT 4.0 workstations to new Windows XP Professional systems. You have decided to run a script to do so. You can run two executable files from a command prompt. Which of the following would you run on each system? (Select two.)

A. Run Dumpstate.exe on the XP Pro systems.

B. Run Loadstate.exe on the XP Pro systems.

C. Run Dumpstate.exe on the NT 4.0 workstations.

D. Run Scanstate.exe on the XP Pro systems.

E. Run Loadstate.exe on the NT 4.0 workstations.

F. Run Scanstate.exe on the NT 4.0 workstations.

----------------------- 70-270 QUESTION 2 -----------------------

You want to find a list of signed drivers on your Windows XP Professional System. Which of the following methods will give you this information?

A. Run a command prompt. Type winmsd. A system information window will appear. Select and expand "Software Environment." Select and expand "Signed Drivers."

B. Run a command prompt. Type msinfo --signed.

C. Run a command prompt. Type msinfo. A system information window will appear. Select and expand "Software Environment." Select and expand "Signed Drivers."

D. Run a command prompt. Type drivers --signed.

----------------------- 70-270 QUESTION 3 -----------------------

Your Windows XP Professional System has three hard disks--one 10GB disk, one 20GB disk, and one 50GB disk. You want to boot off one disk, combine the others into one 70GB volume, and mount the volume on the first disk under a folder named mountpoint.

The 20GB and 50GB disks are running off the second hard disk IDE controller. The 10GB disk is running off the first hard disk IDE controller with your DVD-ROM. Which of the following statements is true? (Select all that apply.)

A. You don't need to convert any disks to type dynamic.

B. You need to create a mirrored volume.

C. You need to convert the 10GB disk and the 50GB disk to dynamic disks.

D. You can't mount another volume off the boot partition.

E. You can mount the new volume in the mountpoint folder simply by right-clicking it in the Disk Management tree of the Computer Management console and selecting "Change Drive Letters and Paths."

F. You need to create a spanned volume.

G. You need to convert the 10GB disk and the 20GB disk to dynamic disks.

H. You need to convert all disks to the type dynamic.

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=26245:610453

___________________________________________________________

Hot Topic Ad - Hewlett-Packard

Use scripted deployments to ensure that all your Exchange servers are configured and deployed with exactly the same options, and maintain a record of your installation configurations. Learn how today!

http://list.windowsitpro.com/t?ctl=26244:610453 ___________________________________________________________

----------------------- 70-290 QUESTION 1 -----------------------

It is fundamentally important for Systems Administrators of 2003 Server Networks to understand what does, and what does not get backed up as part of the System State Data. Understanding this allows an administrator to better prepare in case things go wrong.

On a Windows 2003 server that acts as a Domain Controller, an Intranet Server running IIS as well as Certificate Services, which of the following things will be backed up if the System State Data in Windows Backup?

A. Paging file

B. Active Directory directory service

C. SYSVOL directory

D. IIS Metadirectory

E. User home directories

F. Registry

G. COM+ Class Registration database

H. Boot files, including the system files

I. Certificate Services database

----------------------- 70-290 QUESTION 2 -----------------------

Marty's company is running Windows Server 2003 on all 5 of its servers. One of the servers, Moharebia has been configured with the following backup schedule:

Monday - Full Backup @ 1am Tuesday - Incremental Backup @ 1am Wednesday - Incremental Backup @ 1am Thursday - Incremental Backup @ 1am Friday - Incremental Backup @ 1am Saturday - Incremental Backup @ 1am Sunday - Incremental Backup @ 1am

Moharebia hosts several Web Applications which utilize the .NET Framework. The backups are written to tape. Tapes are couriered off site to a special location at 11:00am each morning during the week.

On Thursday evening at 8pm Moharebia's hard drive fries itself completely and the server goes off line. Marty is paged and must drive by the special location to pick up the relevant tapes and a replacement hard disk drive.

Which of the following tapes does Marty need to restore from to rebuild the server's data to the most current possible?

A. Wednesday

B. Thursday

C. Saturday

D. Monday

E. Friday

F. Sunday

G. Tuesday

----------------------- 70-290 QUESTION 3 -----------------------

Mohareb has decided to enable secure communications for the Default Web Site on his new Windows 2003 Server. This server is the first at Mohareb's company and also serves as a Domain Controller. At present there is no CA Infrastructure at Mohareb's organization.

Mohareb logs onto the console of this server with an account that has Administrative privileges. He goes to the Properties dialogue of this Web Site in the IIS MMC. He then selects the Directory Security tab and in the Secure Communications area selects Server Certificate. He then clicks "Next" and is asked which method he wants to use to assign a certificate to this web site. He selects "Create A New Certificate" (see exhibit)

EXHIBIT http://list.windowsitpro.com/t?ctl=26249:610453

He leaves all of the Defaults in place, only entering his Country, State and City in the required dialog boxes.

Which of the following will have happened once this Wizard has executed?

A. A new 512 bit SSL certificate will have been created. Mohareb needs to run this wizard again so that he can attach this newly created certificate to the Default Web Site.

B. A file, c:\certreq.txt will be created. This file can be emailed to Mohareb's company's Certification Authority and they can respond by sending him a certificate that can be attached to the Default Web Site at a later date.

C. None of the above.

D. A new 1024 bit SSL certificate will have been created and secured to the Default Web site on Mohareb's Server. Mohareb needs to go back and edit the web site properties and ensure that Anonymous access is disabled so that all future communication will be encrypted around this certificate.

E. A new 4096 bit SSL certificate will have been created and applied to the Default Web site on Mohareb's Server. All future communication to the website will be encrypted around this certificate.

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=26246:610453

----------------------- 70-291 QUESTION 1 -----------------------

The New Zealand Space Agency (NZSA) has approximately 50 remote users that work in scientific installations across the planet. At the moment all of these users direct dial back to New Zealand to connect to the NZSA network. The current plan is to change the way that the remote NZSA users access the network. Instead they will dial into a local point of presence and use a VPN across the internet to connect to the NZSA VPN server located in Wellington.

In designing this solution Enrious is debating whether to implement the Layer Two Tunnelling Protocol (L2TP) or rather to use Point-to-Point Tunnelling Protocol (PPTP).

His VPN solution must address the following goals:

Goal 1: For maximum security, tunnel authentication without the use of IPSec is favorable.

Goal 2: For performance reasons, maximum header compression is favorable.

Goal 3: The VPN solution should be able to support transmission over an IP-based network.

Goal 4: The VPN solution should be compatible with both Windows XP Professional (the RAS clients in your company) and Windows Server 2003 (the RAS server platform in your company.

Enrious finally decides to implement a PPTP VPN solution. Which of the following goals are achieved with this type of solution? Choose all that apply.

A. Maximum header compression is achieved.

B. The solution is compatible with both Windows XP Professional and Windows Server 2003.

C. Transmission can occur over an IP-based network.

D. Tunnel authentication can be achieved without the use of IPSec.

----------------------- 70-291 QUESTION 2 -----------------------

Vireya is building a brand new Windows Server 2003 Network for the company Lancre Luggage. After the server is built, Vireya runs the DCPromo.exe utility. As there is no existing DNS infrastructure at Lancre Luggage she chooses to create a DNS zone during the Active Directory installation process. What will be the default type of zone suggested by the installer to Vireya during this process?

A. Active Directory-Integrated Zone

B. Standard Primary Zone

C. Standard Secondary Zone

D. Recursive Zone

E. Caching-Only Zone

----------------------- 70-291 QUESTION 3 -----------------------

You are creating IPSec filters for a stand alone Windows Server 2003 system that is located on your network's DMZ. This server needs to encrypt transmissions between itself and a SQL Server on your internal network. Which of the following authentication methods could you use for these IPSec filters?

A. Pre-Shared Key

B. Active Directory Default

C. Lan Manager Hash

D. Kerberos V5

E. Certificate Based Authentication

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=26247:610453

----------------------- 70-294 QUESTION 1 -----------------------

Which of the following rules apply to converting Universal groups to Domain Local groups when a forest is running at the Windows Server 2003 functional level?

A. Universal groups can not be converted to Domain Local groups if they contain other Universal groups.

B. Universal groups can be converted to Domain Local groups in all circumstances.

C. Universal groups can not be converted to Domain Local groups if they contain Global groups.

D. Universal groups can not be converted to Domain Local groups if they contain Domain Local groups.

----------------------- 70-294 QUESTION 2 -----------------------

Rooslan has four different universal distribution groups that he wishes to change to domain global security groups in the VOLGOGRAD domain. The first Universal group is made up solely of user accounts from different domains within the forest. The second is made up of three other universal groups. The third is made up of two universal groups and two global groups that are members of the VOLGOGRAD domain. The fourth is made up of fifteen global groups that are all members of the VOLGOGRAD domain.

Which of these groups will Rooslan be able to successfully convert.

A. None of these groups can be converted.

B. The fourth group can be converted.

C. The second group can be converted.

D. The first group can be converted.

E. The third group can be converted.

----------------------- 70-294 QUESTION 3 -----------------------

There are two Windows Server 2003 systems in your domain named Shanawaz and BLUERINSE. They are both members of the MOHAREB OU. Both Shanawaz and BLUERINSE are located at the CERTTUTOR Site. The following policies are applied:

CERTTUTOR Site: IPSec: Client (Respond Only) Domain GPO: IPSec: Secure Server (Require Security) MOHAREB OU: IPSec: Server (Request Security)

Both the Shanawaz and BLUERINSE servers have a Local IPSec policy applied that requires a Pre-Shared Key and requires security.

Which of the following statements are true about communication between the Shanawaz and BLUERINSE servers?

A. That transmissions between the servers will be encrypted

B. That authentication on IPSec transmissions will be negotiated using digital Certificates

C. That authentication on IPSec transmissions will be negotiated using Pre-Shared Keys

D. That transmissions between the servers will be unencrypted

E. That authentication on IPSec transmissions will be negotiated using Kerberos V5

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=26248:610453 __________________________________________________________

You are subscribed as news-and-stuff@arconati.us. To unsubscribe from this email newsletter use the following link:

http://list.windowsitpro.com/u?id=28351AE7DCFB1F6CE49FB4FB9F95D325

Thank you, CertTutor.net Question of the Day Team

CertTutor is owned by Windows IT Pro Magazine a division of Penton Media, Inc. 221 East 29th Street, Loveland, CO 80538 Copyright 2005, Penton Media, Inc. All Rights Reserved.

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts (Last 7 Days)