Sponsor

2006/05/03

CertTutor QOW 05-03-06

Welcome to the Weekly CertTutor.net Question of the Day Digest.

___________________________________________________________

Primary Ad - Hewlett-Packard

Learn the essentials about how consolidation and selected technology updates build an infrastructure that can handle change effectively.

http://list.windowsitpro.com/t?ctl=2908E:610453

___________________________________________________________

CertTutor.net is a certification related website that has published certification authors such as Ian McLean, Will Willis, Gregory W. Smith and Orin Thomas regularly answering your questions.

In this newsletter you'll find the questions listed in exam number order. Windows 2003 towards the top of the newsletter and Windows 2000 questions towards the bottom.

If the answer URLS wrap and don't work, try cutting and pasting them into notepad.

If you disagree with any of the answers, post your feedback on the forums. If you don't understand some of the concepts - please ask us to explain. Some of the best in the field will answer your question!

Thanks for being a subscriber and good luck on your exams!

___________________________________________________________

Secondary Ad - Symantec

Learn to secure your IM traffic - don't let your critical business information be intercepted!

http://list.windowsitpro.com/t?ctl=29094:610453

___________________________________________________________

----------------------- 70-270 QUESTION 1 -----------------------

You want to run a script from your Windows XP Professional workstation every 30 minutes that queries your Windows 2003 file server and then provides a list that it appends to the text file in the d:\logs\serveraccess.txt directory on your Windows XP workstation.

You're logged on to your Windows 2003 domain, and your account has full domain administrator access. You want to query a file server called oksana.odlt.com and add a time stamp in front of each entry in serveraccess.txt. To do so, you need to complete two tasks: Write a batch file called getinfo.bat and put it in the c:\scripts directory, then correctly schedule getinfo.bat to execute every 30 minutes.

Which of the following would you need to do to complete this task? (Select two; some lines wrap.)

A. Execute the following command at the command prompt:

schtasks /create /tn getinfo.bat /tr c:\scripts\srvacs.bat /sc minute /mo 30

B. Create batch file

c:\scripts\getinfo.bat

Have the following two lines in the batch file

time /t >> d:\logs\serveraccess.txt

openfiles /query /s oksana.odlt.com >> d:\logs\serveraccess.txt

C. Create batch file

c:\scripts\getinfo.bat

Have the following two lines in the batch file

time /t > d:\logs\serveraccess.txt openfiles /query /s oksana.odlt.com > d:\logs\serveraccess.txt

D. Execute the following command at the command prompt:

addjobs /create /tn srvacs /tr c:\scripts\getinfo.bat /sc minute /mo 30

E. Create batch file

c:\scripts\info.bat

Have the following two lines in the batch file

time /t >> d:\logs\serveraccess.txt

openfiles /query /s oksana.odlt.com >> d:\logs\serveraccess.txt

F. Execute the following command at the command prompt:

schtasks /create /tn srvacs /tr c:\scripts\getinfo.bat /sc minute /mo 30

----------------------- 70-270 QUESTION 2 -----------------------

Your organization has recently purchased five high-end workstations that run Windows XP 64-bit edition, one of which has a problem in its startup cycle. Something appears to be wrong with the registry information and hardware abstraction layer (HAL) loads.

Which of the following correctly contains the names of the files that load the kernel, the HAL, and the registry information on each platform? (Select the best answer.)

A. Windows XP 64-bit: ntdetect.com Windows XP Pro: ntdetect.com B. Windows XP 64-bit: ia64ldr.efi Windows XP Pro: ia64ldr.efi C. Windows XP 64-bit: ia64ldr.efi Windows XP Pro: ntdetect.com D. Windows XP 64-bit: ntoskrnl.exe Windows XP Pro: ntdetect.com E. Windows XP 64-bit: ia64ldr.efi Windows XP Pro: ntoskrnl.exe

----------------------- 70-270 QUESTION 3 ----------------------- You have been asked to help a senior manager disable a particularly annoying application that activates every time he logs in. Unfortunately, the application is corrupt and locks up the system, so the manager can't delete the application by removing it from the startup folder. When you arrive at his office, the system has already booted to the point where the logon banner displays. You want to deal with this problem as expeditiously as possible, which means you don't have the option of rebooting back into safe mode.

Which of the following should you do? (Select the best answer.)

A. Log in using CTRL+ALT+DEL. When the system accepts the login, hold down the SHIFT key to disable all startup programs from running.

B. Log in using CTRL+ALT+DEL. When the system accepts the login, hold down the BREAK key to disable all startup programs from running.

C. Log in using CTRL+ALT+DEL. When the system accepts the login, hold down the SPACEBAR to disable all startup programs from running.

D. Log on using CTRL+ALT+DEL. When the system accepts the logon, hold down the Alt key to disable all startup programs from running.

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=29093:610453

___________________________________________________________

Hot Topic Ad - LeftHand Networks

Explore how the standardization of storage hardware will change market dynamics, focusing on the growth of iSCSI SANs and "glue software."

http://list.windowsitpro.com/t?ctl=2908F:610453

___________________________________________________________

---------------------- 70-290 QUESTION 1 -----------------------

Beradio is monitoring an old Windows Server 2003 system that was upgraded from a Windows 2000 System 18 months ago. The Server has been performing poorly and Beradio is trying to determine if a particular hardware component is causing a bottleneck. Beradio gathers the following data from the Systems Monitor Utility:

% Processor Time (Average): 67%

Processor Queue Length (Average): 1

Pages /sec (Average): 4

Average Disk sec/Transfer: 0.8

Disk Queue Length (Average): 9

Given this information, which of the following components is the most likely bottleneck?

A. Network Adapter is the bottleneck.

B. The Physical Disk is the bottleneck.

C. The Processor is the bottleneck.

D. The RAM is the bottleneck.

----------------------- 70-290 QUESTION 2 -----------------------

Parsons, Bouillon and Beradio all have user accounts within a Windows Server 2003 Domain. They all use a shared folder on the 2003 Member Server DEMOSTHENES named LOCKE. Parsons is a member of three groups that have been assigned permissions to this share. Bouillon is a member of two groups that have been assigned permissions to this share. Beradio is a member of two groups that have been assigned permissions to this share. There are four groups in total that have been assigned permissions to this share - they are ENGINEERING, MARKETING, MANAGERS and ACCOUNTANTS. Bouillon and Beradio are not members of the same groups. Parsons is a member of Beradio's groups. Bouillon and Parsons are members of the Managers group. Beradio is not a member of the Accountants group. The share permissions for LOCKE are as follows.

Parsons - Full Control (ALLOW) Bouillon - Full Control (ALLOW) Beradio - Full Control (ALLOW) Managers - Full Control (DENY) Accountants - Full Control (DENY) Engineering - Read (ALLOW) Marketing - Read (ALLOW)

NTFS permissions for the folder hosting the LOCKE share and its subfolders are:

Parsons - Full Control (ALLOW) Bouillon - Full Control (ALLOW) Beradio - Full Control (ALLOW) Managers - Full Control (ALLOW) Accountants - Full Control (DENY) Engineering - Read (ALLOW) Marketing - Read (DENY)

What will Bouillon's effective permissions be to files on the LOCKE share if he is attempting to access it from a workstation on the network?

A. Full Control

B. No Access

C. Read

D. Change (Read, Write, Execute and Delete)

----------------------- 70-290 QUESTION 3 -----------------------

There are six files that have compression status as outlined in the table below hosted on a Windows Server 2003 DC named BLOGGER.

ALPHA.TXT = COMPRESSED BETA.TXT = UNCOMPRESSED GAMMA.TXT = UNCOMPRESSED DELTA.TXT = UNCOMPRESSED EPSILON.TXT = COMPRESSED OMEGA.TXT = COMPRESSED.

All of the files are located in a folder on the ROME volume called COMPTEST. Elsewhere on the ROME volume there are the following folders with the following compression stats:

ATLAS = COMPRESSED AWESOME = UNCOMPRESSED

On the MILAN volume, formatted with NTFS, there are the following folders.

WARHAMMER = UNCOMPRESSED RIFLEMAN = COMPRESSED

The following actions are performed:

ALPHA.TXT is moved to WARHAMMER. BETA.TXT is copied to RIFLEMAN. GAMMA.TXT is moved to ATLAS. DELTA.TXT is copied to AWESOME. EPSILON.TXT is copied to WARHAMMER. OMEGA.TXT is moved to AWESOME.

Which files will now be compressed after performing the actions listed above? Choose all that apply.

A. BETA.TXT

B. DELTA.TXT

C. EPSILON.TXT

D. ALPHA.TXT

E. OMEGA.TXT

F. GAMMA.TXT

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=29091:610453

----------------------- 70-291 QUESTION 1 -----------------------

Your network contains two routed subnets: Subnet A and Subnet B. Subnet B contains a Windows Server 2003 system configured as a DHCP server. This server has scopes created for both Subnet A and Subnet B. Subnet A does not contain a DHCP server.

The clients on Subnet A are not receiving IP addresses from the DHCP server. What can you do to enable clients in Subnet A to receive dynamically assigned IP addresses? Choose all that apply.

A. Configure an RFC 1560-compliant router to pass all UDP traffic on ports 2151, 2152, 2153 and 2154.

B. Configure an RFC 1542-compliant router to forward BOOTP messaging between subnets.

C. Install and configure a DHCP server on Subnet A.

D. Configure the clients on Subnet A to use H-node NetBIOS name resolution.

E. Create a superscope on the DHCP server in Subnet B which contains both the scope for Subnet A and the scope for Subnet B.

F. Configure a DHCP relay agent on Subnet A to forward DHCP messages to Subnet B.

----------------------- 70-291 QUESTION 2 -----------------------

Rooska is setting up dial-up connections for a group of users on the network that he administers. He would like to configure the dial-up connection to require data encryption for all connections. Which of the following protocols support data encryption? Choose all that apply.

A. MS-CHAP v2

B. MS-CHAP

C. PAP

D. SPAP

E. EAP/TLS

F. CHAP

----------------------- 70-291 QUESTION 3 -----------------------

Oksana has configured a Windows XP Professional machine in a small branch office to have a dial-up 56K connection to the Internet. She would like to make that connection available to the other users in the branch office through the Internet Connection Sharing (ICS) feature in Windows XP. How can she enable ICS on a network connection?

A. Reconifigure the TCP/IP properties for the internal network interface. Set the IP address to an address in the 192.168.x.y range. Configure a DHCP scope on the machine and assign it IP addresses from the same range. Exclude the statically-assigned IP address from the previous step.

B. Open Network and Dial-up Connections, right-click the connection that you want to share, choose properties and select the "Enable Internet connection sharing for this connection" check box from the sharing tab.

C. Open Routing and Remote Access, click ICS, right- click ICS and add a New Interface.

D. In Control Panel, double-click ICS. Configure ICS through the Internet Connection Sharing Setup wizard.

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=29090:610453

----------------------- 70-294 QUESTION 1 -----------------------

You installed Active Directory on a machine running Windows 2003 Server several months ago. When you did this you put the SYSVOL and the Active Directory log files on a separate hard disk (Disk1) from the one that you installed the operating system files and the Active Directory database to (Disk0). Now you would like to remove Disk1 from the Server and use it in a different machine. You would like to move the Active Directory log files and SYSVOL to Disk0. Can this be accomplished and if so how can you do it?

A. No, this cannot be accomplished. You must remove and reinstall Active Directory if you wish to change the location of SYSVOL.

B. Yes, this can be accomplished. You must enter Directory Services Restore Mode and use the ntdsutil utility to move the Active Directory log files and SYSVOL.

C. Yes, this can be accomplished. You must boot into Safe Mode and use the ntdsutil utility to move the Active Directory log files and SYSVOL.

D. Yes, this can be accomplished. Both SYSVOL and the Active Directory log files can be moved using Windows Explorer.

----------------------- 70-294 QUESTION 2 -----------------------

To provide consistency on your network and decrease the amount of configuration necessary, you have decided to control many settings through the use of security templates. While researching the use of security templates, you discover that not all settings can be configured through security templates. You decide to make a list of the settings that can be configured through templates. Which of the following should you include on your list?

Choose all that apply.

A. Local Policies

B. Public Key Policies

C. Account Policies

D. File System

E. Restricted Groups

F. Registry

G. System Services

H. IP Security Policies

----------------------- 70-294 QUESTION 3 -----------------------

To aid with troubleshooting, you need to provide the ability for some of the other administrators in your company to perform reverse lookups on several of your servers. They need to be able to enter the IP address of the server and receive the host name of the machine in return. However, some of these machines have been configured to dynamically update their records with the DNS server and therefore you will have to enter these records manually. What type of records must you create to support reverse lookup queries?

A. Host (A)

B. Reverse Query (RQ)

C. Name Server (NS)

D. Reverse Lookup (RL)

E. Service (SRV)

F. Pointer (PTR)

To find the answers to the above three questions go to:

http://list.windowsitpro.com/t?ctl=29092:610453

__________________________________________________________

You are subscribed as news-and-stuff@arconati.us. To unsubscribe from this email newsletter use the following link:

http://list.windowsitpro.com/u?id=28351AE7DCFB1F6C8C8297A96326B1F8

Thank you, CertTutor.net Question of the Day Team

CertTutor is owned by Windows IT Pro Magazine a division of Penton Media, Inc. 221 East 29th Street, Loveland, CO 80538 Copyright 2006, Penton Media, Inc. All Rights Reserved.

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts