You are on page 1of 32

MMS Q7 Network (Microsoft) Review No. Question You are the system administrator at Blue Sky Ltd.

You manage a growing enterprise network running on Microsoft Windows Server 2003. To keep up with the growth, you increase the number of domain controllers and update the bridgehead server list. After designing the bandwidth requirements, you begin to plan your site boundaries. You need to decide whether to establish a single site or multiple site. What properties would lead you to choose multiple sites for this situation? 1,You need all the replication on your network to occur as intrasite replication. 2,You need simple replication management for your subnet. 3,You need fastest directory updates between all the domain controllers. 4,You need granular replication control for your WAN network. Wilson is the network administrator at Red Cosmetics. The domain has domain controllers running Windows Server 2003. Wilson is planning to place global catalogs so that they are used optimally. During the bandwidth analysis, Wilson notices a trend in global catalog network traffic. What type of global catalog network traffic will Wilson predict to use more network resources than other types of global network traffic? 1,Network traffic related to UPN authentication. 2,Network traffic related to user searches for directory information throughout a forest. 3,Network traffic related to global catalog directory replication. 4,Network traffic related to global catalog queries.

1

2

niitstudent.com

1/32

3

4

Helen is working as a system administrator at IBG Inc. You have recently installed Windows Server 2003 and have configured Active Directory in the network of the organization. In the network, Helen has created a domain for the accounts department. Helen needs to manage the access of the domain. Which service does Helen need to implement to perform the task? 1,Event Viewer console 2,Access Control Lists 3,Service Management 4,Transitive trust Which component of the Active Directory infrastructure provides universal group membership information to a domain controller when the user logs on to the network? 1,Domain controller 2,Global catalog 3,Tree root domain 4,Forest root domain Which is the third stage involved in the process of creating the Active Directory infrastructure design? 1,Creating a site topology plan 2,Creating a forest plan 3,Creating a domain plan 4,Creating an OU plan What will be the first step in the design process for collecting the design tools? 1,Analyzing the requirements 2,Gathering the design team 3,Building a design based on the requirements 4,Testing the design Which is the third step in creating a site topology plan? 1,Defining sites 2,Defining the replication plan

5

6

7

niitstudent.com

2/32

3,Deciding the placement of domain controllers 4,Placing the global catalog servers in a forest Consider the statements: Statement A: The domains, belonging to different trees in a forest, work independently. Statement B: Forest enables communication between the domains of different trees. Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false. Which tab in the Properties dialog box enables you to change the default name of the package and specify a support Uniform Resource Locator (URL)? 1,Deployment 2,Upgrades 3,Categories 4,General Which tool you need to use along with Group Policy to handle software deployment on a large scale with computers running pre-Windows 2000 operating systems? 1,Software Distribution Point (SDP) 2,RSoP 3,SMS 4,Software Installation extension

8

9

10

niitstudent.com

3/32

11

Which type of Group Policy settings includes settings to configure user workstation environment and their application settings? 1,Administrative templates 2,Scripts 3,Software Installation 4,Remote installation services You are the system administrator at Blue Moon computers, Dubai. You need to provide a work area to each user where the users can store their files and required software safely. For this, you need to create separate user accounts for each user that would enable the users to log on to the network as well as on local computer to access their resources. Which type of user account would you prefer to create for each user? 1,Domain user account 2,Built-in user account 3,Computer account 4,Local user account You are the system administrator at Global Systems, Texas. The management has called a freelancer accountant named Steve to perform audit operations. You need to provide temporary access to Steve so that she can gain access to network resources. Which type of user account would you prefer to create for Steve? 1,Domain user account 2,Built-in user account 3,Computer account 4,Local user account

12

13

niitstudent.com

4/32

Consider the statements: Statement A: Windows Server 2003 never stores local user accounts in the local security database. Statement B: Local user accounts enable the users to log on to a computer and access the resources only from the computer on which their account is created. Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false. 15 You are the system administrator at PQR Corp. You want to create and manage user accounts using the command-line tool, Ldifde. You include the command for running the Ldifde tool in a Notepad file and save the file with .LDF extension. The syntax of the Ldifde command is: dn: cn = container name, ou= organizational unit, dc= root domain changeType: Add objectClass: user sAMAccountName: username UserPrincipalName: username including the path of user’s container displayName: username userAccountControl: value

14

niitstudent.com

5/32

16

What does dn specify in the above syntax of the Ldifde command? 1,Specifies the type of object to be created. 2,Specifies the username along with the location of the account. 3,Specifies adding of a new user account in the Users container. 4,Specifies the path to an object’s container. Which operations master role enables a domain controller to add and remove application directory partitions from the forests? 1,Infrastructure master role 2,Primary Domain Controller (PDC) emulator role 3,Relative Identifier (RID) master role 4,Domain naming master role Identify the Microsoft Management Console (MMC) that performs the function of RID master role. 1,Active Directory Schema 2,Active Directory Domains and Trusts 3,Active Directory Users and Computers 4,Active Directory Sites and Services Which tool provided by Windows Server 2003 allows you to transfer and seize the operation master role? 1,Ntdsutil 2,Nltest 3,Dcdiag 4,Gpupdate The failure of which master prevents you from making changes in your password? 1,Domain naming master 2,RID master

17

18

19

niitstudent.com

6/32

3,Infrastructure master 4,PDC emulator master Which Active Directory System Monitor counter specifies the original size of inbound compressed replication data in bytes? 1,DRA Inbound Bytes Not Compressed (Within site)/sec 2,DRA Inbound Bytes total/sec 3,DRA Inbound Bytes Compressed (Between sites, before compression)/sec 4,DRA Outbound Bytes Compressed (Between sites, after compression)/sec Which Active Directory System Monitor counter specifies the number of synchronization requests made to replication partners? 1,LDAP Client Sessions 2,DRA Sync Requests Made 3,DRA Outbound Objects/sec 4,DRA Outbound Bytes Total/sec Which Active Directory System Monitor counter specifies the number of objects replicated out per second? 1,DRA Outbound Objects/sec 2,LDAP Client Sessions 3,DRA Outbound Bytes Total/sec 4,DRA Inbound Bytes total/sec Which Active Directory System Monitor counters display the total numbers of bytes or objects processed per second? 1,Ratio counters Hen, sui: 2,Statistic counters 3,Performance counters 4,Accumulative counters

20

21

22

23

niitstudent.com

7/32

24

Which Active Directory System Monitor counter specifies the inbound replication data in bytes that were not compressed at the other DSA in same site? Coi lai, 1,DRA Inbound Bytes Not Compressed (Within site)/sec 2,DRA Inbound Bytes total/sec 3,DRA Outbound Bytes Total/sec 4,DRA Outbound Objects/sec Consider the statements: Statement A: The dcdiag.exe command enables you to view or modify the ACLs of Active Directory objects. Statement B: The dsastat.exe command enables you to compare the naming contexts on different domain controllers. It also enables you to identify the differences between naming contexts on domain controllers. Which of the following is true, with respect to the above statements? 1,Statement A is true and statement B is false. 2,Statement A is false and statement B is true. 3,Both, statements A and B, are true. 4,Both, statements A and B, are false. Ron Floyd is working as a network administrator at Global Systems, Inc. Ron has implemented Active Directory infrastructure in the network. Due to the large volume of data, Server03 is running low on hard disk space. Ron does not have additional hard disks to install on the server. David Wong, the head of the Marketing department needs to store some important data on the server urgently. David complains that he is unable to store the important data on the server. Which option can Ron use to help David in saving the data on the server? 1,Delete the files of other users from the server 2,Install other hard disks on the server

25

26

niitstudent.com

8/32

3,Format the drive to create space 4,Perform offline compaction of the Active Directory database Perfect Watch Co. is a watch manufacturing company with three business locations: Chicago, Washington, and New York. You are the network consultant and Ron Floyd is the assistant network consultant at the Washington office. The network in the company is using Windows Server 2003 Active Directory services. You ask Ron to raise the functional level of a forest in the network. When trying to raise the functional level of the forest, Ron receives an error message. Ron asks you to help him troubleshoot the problem occurring while raising the functional level of the forest. What should be ensured to raise the functional level of the forest? 1,Global catalog for each domain controller is enabled 2,Domain controllers are running Windows 2000 Server 3,Universal group membership caching is enabled 4,Domain functional level of the domain controllers is Windows Server 2003

27

niitstudent.com

9/32

28

29

Corrine Wallace is working as a network consultant at Mastery Mechanics. Mastery Mechanics is an auto parts manufacturing company with a large network spanning across three cities: New York, Atlanta, and Chicago. The company has a network that is using Windows Server 2003 Active Directory services. Three days ago, Corrine performed Active Directory database compaction to save hard disk space. Mary Peterson, the head of the Sales department complains that the database transaction is taking more time than earlier for the last three days. What can Corrine do to decrease the database transaction time? 1,Demote the server and then promote it using the Dcpromo.exe command 2,Restore computer files and settings 3,Restore the Active Directory database 4,Format the server hard disk and configure Windows Server 2003 Active Directory on the server You are working as a network administrator and Jerry Smith is working as assistant network administrator at Homelike hospital Ltd. The hospital has its head office at San Francisco and has its branch offices at Atlanta and Denver. The hospital has a large network consisting of 300 computers. The management has asked you to implement Windows Server 2003 Active Directory infrastructure in the network. After you have implemented Active Directory in the network, the users are facing connectivity problems. Jerry tells you that the problems are occurring while registering with DNS service. Jerry asks you to identify the cause of the connectivity problems. What is the cause of connectivity problems in the network? 1,Folders are not redirected 2,Database is corrupt 3,DNS service is not working properly 4,DNS record is deleted

niitstudent.com

10/32

30

31

Technology Systems is an IT enabled services provider company with its head office at Chicago. The company has two branch offices at Atlanta and Denver. You are working as a network engineer and Christine Turner is working as an assistant network engineer at the Chicago office. Due to some hardware problem, Christine could not back up the data stored on the server and had to format Server2. An error message appears indicating that Server2 already exists when Christine tries to install a domain controller to replace Server2. Which command would help Christine to remove the references of Server2 from other domain controllers in the network? 1,ADSIEdit.msc and Dnsmgmt.msc 2,Netdom.exe and Ntdsutil.exe 3,Movetree.exe and ADSIEdit.msc 4,Netdiag.exe and Ntdsutil.exe NS Toys is a toy manufacturing company with three business locations: Las Vegas, Chicago, and Los Angeles. Chris Donaldson is working as an assistant network administrator at the Los Angeles office of NS Toys. You are working as a network administrator at the head office at Las Vegas. The DC05 domain controller at the Los Angeles office had a power failure and has lost data stored in it. Chris wants to restore System State but he does not know how to restore System State. Therefore, Chris asks you to help him perform System State restore. What do you suggest Chris to fix the problem? 1,Perform authoritative System State restore from other domain controller in the network 2,Perform authoritative System State restore locally 3,Perform non-authoritative System State restore remotely 4,Perform non-authoritative System State restore locally

niitstudent.com

11/32

32

33

AB Corp. is a computer manufacturing company with its head office at Chicago. Pat Greene is working as a network consultant in the company. The company has three departments: Sales, Purchase, and Manufacturing. These three departments are under separate OUs in the forest. As the company has reorganized employees across the departments, the user accounts from different OUs are transferred under different OUs. The users are complaining that they are unable to find their document folders on the network after the reorganization. What is the possible cause of the problem? 1,GPOs for the new OUs do not contain the updated information about folder redirection 2,Users forgot to transfer their data from the old computers to the new computers 3,Users’ computers have been formatted 4,Domain controllers have been changed You are working as the system administrator at the Chicago branch of Blue Valley Consulting. You have created an Active Directory forest in your organization. You have also assigned operation master roles to a domain controller in the forest to ensure that the Active Directory performs single master replication. However, the employees of your company are complaining that they are unable to change their passwords after logging on to their domains. How can you solve this problem? 1,By changing the domain naming master role assignment. 2,By changing the Primary Domain Controller (PDC) emulator role assignment. 3,By changing the Relative Identifier (RID) master role assignment. 4,By using the Active Directory Users and Computers console.

niitstudent.com

12/32

34

Which parameter of the repadmin.exe command enables you to specify a user as the administrator? 1,pw:{password|*} 2,/ldap 3,/rpc Hen, sui:4,/u: domain\user Ken Burton is the system administrator at the Atlanta branch of Global Systems Inc. The company has another office at New York. Ken has configured intersite replication between the two offices, but now he observes that the domain directory partition is not being replicated to all domain controllers. Therefore, Ken needs to detect the replication partner that has failed. John also needs to regenerate the replication topology. Which console should Ken use to perform these tasks? 1,Active Directory Replication Monitor console 2,Active Directory Sites and Services console 3,Active Directory Domains and Trusts console 4,Event Viewer console You are the system administrator at Red Sky. You have decided to move database of 2500 user accounts to Active Directory. You have created a single domain structure for the company. The company needs to structure objects in the domain. To begin, you are planning to create the smallest structure to which GPO can be applied or over which administrative authority can be delegated. What specific structure would your plan propose in the given problem? 1,An administrative model 2,A domain 3,A subnet 4,An OU hierarchy

35

36

niitstudent.com

13/32

37

You are the system administrator at Smart Software Developers. You want to promote member server to domain controller. Which security template do you need to modify? 1,Default security settings (Setup security.inf) 2,Default security settings updated for domain controllers (DC security.inf) 3,Highly secure domain controller security settings (Hisecws.inf) 4,Secure domain controller security settings (Securedc.inf) You are the system administrator at Countrywide markets. The members of the IT department need to access floppy drives and CD-Rom for storing and retrieving data. This access can spread virus and worm on the network that can cause severe damage to the trusted software of the company. You are assigned the responsibility to implement a security policy to prevent all the computers over the network from virus attack by enabling or disabling the security settings on the centrally managed computer. What security do you need to use to perform the given task? 1,Audit policy 2,Account lockout policy 3,Password policy 4,Security options Which command-line tool enables you to create active directory user objects on computers, which are running Windows Server 2003? 1,Netdiag.exe 2,Ntfrsutl.exe 3,Ldifde.exe 4,Dcdiag.exe

38

39

niitstudent.com

14/32

40

You are working as a system administrator at Countryside Markets. The management has asked you to centralize the network administration in the organization. To centralize the network administration for Countryside Markets, you have implemented Windows Server 2003 Active Directory infrastructure in the network. Now, employees are complaining that they are facing connectivity problems. You notice that the problems are occurring while registering with DNS service. What can be the possible cause of the problem? 1,Active Directory database is corrupt 2,DNS record not exist 3,Active Directory database size has increased 4,Folders are not redirected You are working as the system administrator at the Paris branch of Red Sky IT Systems. You have created an Active Directory forest in your organization. You have also created groups and placed the users in specific groups. In addition, you have assigned all the operation master roles to the first domain controller in the forest and stored the global catalog only on that domain controller. However, you are unable to identify the groups of various users. Which operation master role do you need to transfer, to solve this problem? 1,Domain naming master role 2,Primary Domain Controller (PDC) emulator master role 3,Schema master role 4,Infrastructure master role

41

niitstudent.com

15/32

42

43

You are working as a system administrator at LMN Inc. You have to configure security for multiple computers in one step and ease the task of domain administration. You have configured the security template and now, you want to apply the security. What action will you perform to apply the security? 1,Security template will be applied automatically. 2,Import Security template to a local Group Policy 3,Import Security template to an existing GPO 4,Import Security template to a domain controller You are the system administrator at Blue Moon Computers. The IT department members are working on the trusted software of the company. You need to configure security and startup settings for services running on the system to prevent from any unauthorized access and severe damage to the software. This enables you to determine the user or group that is having ownership permission for the system service. Which security policy do you need to use to perform the given task? 1,System Services policy 2,User rights assignment policy 3,Account lockout policy 4,IP Security Policy Which command-line tool performs a series of tests to determine the state of network clients? 1,Netdom.exe 2,Nltest.exe 3,Ntfrsutl.exe 4,Netdiag.exe You are a member of network security team of your organization. The security administrator wants you to apply STRIDE model to the existing network and prepare a threat model plan. What is the sequence of activities you should follow? 1,1. Threat modeling 2. Threat prediction 3. Threat

44

45

niitstudent.com

16/32

mitigation 2,1. Threat mitigation 2. Threat modeling 3. Threat prediction 3,1. Threat modeling 2. Threat prediction 3. Threat mitigation 4,1. Threat prediction 2. Threat modeling 3. Threat mitigation You are a member of the network risk management team of your organization. Which of the following activities should you perform before you can manage the risks? 1,Quantitative analysis of risks 2,Qualitative analysis of risks 3,Both quantitative and qualitative analysis of risks 4,Tracking changes in risk conditions John Barrett works as a graphics designer at Good Graphics Inc. John needs to frequently access the Internet to acquire ideas to create new designs. John also downloads the required files from the Internet. Recently, John has observed that the files that he creates during the day are deleted at the end of the day. John does not allow any other user to access his system and is sure that he is loosing the files because of some malicious software. Which of the following malicious software can be responsible for deleting the files on John’s system? 1,Trap door 2,Logic bomb 3,Trojan horse 4,Zombie

46

47

niitstudent.com

17/32

48

Steve Irving is working as a network security designer at Smart Software Developers. The company deals in software products, and has its head office at Washington. The company has an existing Windows Server 2003 infrastructure implemented in the network. The management has asked Steve to implement Windows Server 2003 security policy in the network to provide security to the company network. For this, Steve decides to implement a risk management strategy in which he will remove the source of the risk. Which strategy has Steve planned? 1,Transfer 2,Avoid 3,Mitigate 4,Accept The Blue Moon Computers deals with the computer hardware products. The company has allowed its clients to access the database. However, the organization does not want to expose all the information in the database to the client. Also, the organization wants to give its clients only read permissions. Therefore, the management has appointed Donna Bard as a security designer to secure the access to the database of the organization. Donna is instructed to take care that only authenticated users have access to the database. She is also required to keep the database of Blue Moon Computers safe from malicious users who keep trying with various possible passwords to get the correct password. Which mitigation techniques should Donna Bard use to secure the database? 1,Secure communication and Authorization 2,Authorization and Auditing 3,Authorization, Auditing and Secure communication 4,Least privileges, Auditing and Authentication

49

niitstudent.com

18/32

50

51

Don Allen works as a network administrator at the head office of Technology Systems. The company is selling its products through a network of distributors. To reduce the cost of selling computer parts, the company decides to directly sell the computer parts to the end user through an e-commerce Web site. The e-commerce Web site is hosted at the company’s Web server at Atlanta. In order to purchase a product from the Web site, a user has to register itself with the Web site. The company wants to secure the network and identify the security threats to the various resources of the network. Therefore, Don is required to plan the management of risk to an asset, which includes creating risk management strategy and contingency plans. Don has calculated that ALE of a risk to an asset is more than the value of the asset. Now, he wants to apply a strategy to mitigate the risk. Which strategy should Don Allen implement? 1,Mitigate 2,Accept 3,Avoid 4,Transfer The Technology Systems wants to identify the threats to network security in order to protect its network from hackers. The company has noticed some malicious operations in the network. The company has implemented threat modeling, which provides a systematic methodology to recognize and categorize threats according to their impact on network security. Jim Lewis, a security designer has been assigned the task to verify and collect the information regarding the stage in which the attacker is still performing. Jim has collected the information that the attackers are trying to retrieve the information about the ports and devices of the organization that are accessible remotely. The attackers are also trying to identify the vulnerabilities in the network security. Jim has informed the company about the stage of the threat. Now, the company wants to counter the threat using

niitstudent.com

19/32

security measures. In which stage of the threat should the company implement the security measures? 1,Elevation of privilege 2,Footprint 3,Penetration 4,Cover-up The Blue Moon Computers wants to provide security to the network from the malicious users and hackers. The company has identified security threats and created a team to analyze the threats. The company wants to implement a proper strategy to manage risks to network security to avoid losses due to the risks. Before creating a risk management strategy, all the assets of network are identified and secured properly. The company has appointed Jim Lewis to perform the task of managing risk, which involves performing qualitative and quantitative analysis of risks. Jim has calculated the ALE of a risk to an asset and compared it with the value of the asset. Now, after quantitative analysis he is required to plan the management of the risk. Therefore, Jim Lewis has used Antivirus software to protect the asset. Which strategy did Jim Lewis apply to manage the risk? 1,Transfer 2,Mitigate 3,Avoid 4,Accept

52

niitstudent.com

20/32

53

You are configuring auditing of the CA using CA audit properties page. Which option should you enable to set restrictions on certificate managers? 1,Issue and manage certificate requests 2,Change CA security settings 3,Change CA configuration 4,Start and stop certificate services Consider the following statements: Statement A: Root enterprise CA is integrated with Active Directory. Statement B: Subordinate enterprise CA can be installed on Windows Server 2003 or Windows Server 2000 server that is a member of the Active Directory domain.

54 Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct. You are the CA administrator of your organization. Which of the following are your responsibilities: Renewing certificates. 55 Reactivating certificates placed on hold. Approving and denying certificate enrolment request. 1,1 and 2 2,2 and 3 3,1 and 3 4,1, 2, and 3

niitstudent.com

21/32

Consider the following statements: Statement A: A certificate cannot be revoked before the end of its validity period. Statement B: CRL includes policies for revocation of certificates. 56 Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct. Corrine Wallace is working as the Network Administrator at Blue Moon Computers. Corrine has configured a Windows Server 2003 based LAN and has implemented security mechanisms to secure the LAN. Corrine needs to update the network security to keep it secure against network security threats. Corrine needs to deploy security patches using Security Update Services (SUS) server. Corrine needs to design the security update strategy to secure the SUS server. For this, Corrine has identified the changes that require updating the security of the LAN. What should Corrine do to design the security update strategy? 1,Use Automatic Update 2,Use Group Policy 3,Use custom scripts 4,Use Windows Update

57

niitstudent.com

22/32

58

Which of the following is an IPSec sub protocol for providing data integrity? 1,Kerberos Protocol 2,Authentication Header 3,IPSec Key Exchange 4,Encapsulating Security Protocol Which of the following protocols can be used to provide data integrity? 1,AH 2,ESP 3,MD5 4,IP Which of the following protocols should be used if highest level of security is required for a VPN connection? 1,UDP 2,L2TP/IPSec 3,PPTP 4,PPP You are the network administrator of your organization. The organization is implementing 802.1x standard on its wireless network. Which of the following infrastructure changes could be required, and why? 1,Upgradation of wireless network adaptor to enable 802.1x authentication standard. 2,PKI implementation to provide mutual authentication using PEAP-EAP. 3,Uninstallation of PKI because 802.1x standard is sufficient to provide authentication to RADIUS server clients. 4,Configure remote access policies on RADIUS server to authenticate clients against Active Directory.

59

60

61

niitstudent.com

23/32

Consider the following statements: Statement A: 802.11a has a connection speed up to 54 Mbps and radio frequency of 2.4 GHz. Statement B: 802.11b has a connection speed up to 54 Mbps and radio frequency of 5 GHz. 62 Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct. Consider the following statements: Statement A: 802.11i uses Wired Equivalent Privacy protocol for data encryption. Statement B: 802.11i uses Extensible Authentication Protocol for data authentication. 63 Which of the following is true about the above statements? 1,Both statements A and B are correct. 2,Both statements A and B are incorrect. 3,Statement A is correct while statement B is incorrect. 4,Statement A is incorrect while statement B is correct.

niitstudent.com

24/32

64

Jim Lewis, the Network Administrator at Global Systems Inc. has set up a wireless network to facilitate the communication between the organization and its clients. The wireless network was set up using the 802.11a standard and it was efficiently supporting the communication needs. Recently, the company has observed that confidential data is being modified during transmission. Therefore, Jim needs to implement enhanced encryption and authentication techniques in the wireless network. How can Jim perform this task? 1,Using 802.1x protocol. 2,Deploying firewall on wireless client computers. 3,Using WiFi Protected Access. 4,Using baseline security templates. Tom works as the Network Administrator at Blue Moon Computers. Tom needs to set up a wireless network, which has a connection speed of 54 mega bits per second (Mbps). The wireless network should support a radio frequency of 2.4 giga hertz (GHz). Tom is also required to provide security to the wireless network by providing authentication and encryption features in the above network. Which standard should Tom use to set up the wireless network? 1,Use 802.1x standard 2,Use 802.11b standard 3,Use 802.11g standard 4,Use 802.11i standard

65

niitstudent.com

25/32

66

David is appointed as the System Administrator in Global Systems Inc., which is an international call center. The employees of the call center need to frequently exchange data with the customers. David needs to set up a wireless network to facilitate the exchange of data. It is required that the wireless network has a connection speed of 54 mega bits per second (Mbps) and supports a radio frequency of 2.4 gigahertz (GHz). David also needs to use Temporal Key Integrity Protocol (TKIP) and Extensible Authentication Protocol (EAP). What will you do to meet the requirements of Global Computers Ltd? 1,Use WiFi Protected Access (WPA) 2,Use shared key authentication 3,Use open system authentication 4,Use Wired Equivalent Privacy (WEP) Ed Young is working as the Network Engineer at the New York branch of Red Sky IT Systems. The organization has recently established another branch at Chicago. The employees of both the branches need to exchange data frequently. Therefore, the management has asked Ed Young to establish a wireless network. Ed Young has implemented a wireless network in order to meet the business requirements of Red Sky IT Systems. Ed Young has used the 802.11a standard to set up the wireless network and the employees were able to exchange data efficiently. However, recently the employees have they are receiving corrupted data. What can be the possible reason? 1,EAP-TLS protocols were not used to implement the wireless network. 2,An unauthorized user has gained access to the access point. 3,The 802.11a standard does not ensure security of data. 4,The signals are transmitted in all directions in wireless networks.

67

niitstudent.com

26/32

68

69

Which of the following servers is used to resolve NetBIOS names to their corresponding IP addresses? 1,DHCP 2,WINS 3,DNS 4,IAS Which of the following is a predefined security template provided by Windows Server 2003? 1,Root.inf 2,Secure.inf 3,Hisecws.inf 4,Compat.inf server can be configured as RADIUS server, RADIUS proxy, or both. 1,IIS 2,IAS 3,DNS 4,WINS Security templates can be used to define which of the following security settings in a GPO? 1,Server 2,System root 3,Domain Controller 4,Event log BlueVelly Inc. publishes computer and IT related books and has its head office at Chicago. The company also sells the books through a network of distributors. The CEO of the company John Major wants to reduce advertisement costs by using an ecommerce Web site. John has Chris, the Web administrator, to design an e-commerce Web site and host it on the IIS Web server at Chicago. John has also asked Chris to ensure that only registered users are allowed to buy the books from the Web site and Active Directory accounts are available for all the

70

71

72

niitstudent.com

27/32

73

users in the Active Directory database. Which type of mapping should Chris use to meet the requirements mentioned by the CEO? 1,IIS Mapping 2,DS Mapping 3,One-to-One Mapping 4,Many-to-One Mapping Red Sky IT Systems has launched an e-commerce Web site to increase the sales of computer parts. The Web site is hosted on Internet Information Server (IIS) at the head office at Atlanta. It displays all the information related to the computer parts, such as product name, price, and model name. Chris, the Web Administrator at Red Sky IT Systems has also installed various Web applications on the IIS server. Chris needs to secure these Web applications. Chris has already designed the strategies to monitor the IIS server. What should Chris do next in order to secure the Web applications and control access to the IIS server? 1,Create a baseline security for the IIS server 2,Use IPSec 3,Use SSL 4,Manage IIS specific logs Jim Lewis is working as the senior Network Administrator at PQR Chemicals Inc, USA. The organization has decided to collaborate with AB Pharma Ltd, England to do research and development. Both the organizations need to access common folders on the network. Jim Lewis needs to identify a method to make the users of both the organizations accountable for the data they are accessing and keep a record of all the users accessing the data. Which is the ideal authentication method to

74

niitstudent.com

28/32

perform the task? 1,SSL and User Certificates 2,SSL and VPN 3,SSL and IPSec 4,IPSec and User Certificates James works as a Network Administrator at RedSky Inc. The organization has a LAN, which is configured using Windows Server 2003 operating system. James has created a Web site for his organization that runs on an IIS server. The management has planned to display confidential information on the organization’s Web site. Therefore, James needs to identify the users visiting the Web site using Kerberos authentication. How can James perform this task? 1,Using the anonymous authentication method 2,Using the Windows integrated authentication method 3,Using the SSL authentication method 4,Using the basic authentication method Larry Williams is the System Administrator at Supersoft2000, which is working on a confidential project. The LAN of the company is based on Windows Server 2003 platform and is not fully secure. The company has asked Larry to ensure that only authorized users are permitted to access the files and folders. Therefore, Larry needs to design an access control model. He also needs to ensure that all the files contained in the My Documents folder of the users have the same permissions as that of the My Documents folder. Which principle should Larry use to perform this task? 1,Discretionary access control 2,Administrative privileges 3,Inheritance of permissions
29/32

75

76

niitstudent.com

4,User-based authentication Ed Young is working as the System Administrator at Blue Moon Computers. The company has asked him to take regular backup of the files and folder created by the users. Ed Young has configured a file server to implement the backup and recovery operations efficiently. He also needs to store encrypted files on the file server to provide data security. Ed Young needs to design server side storage for EFS to store encrypted files on the file server. While designing the server side storage for EFS, which aspect should Ed Young consider? 1,Using local profile on the server 2,Securing data transport 3,Securing back-up data media 4,Designing backup and recovery procedures Global Systems Inc.has recently set up three new departments, including Sales, Marketing, and IT. The organization has a LAN, which is based on Windows Server 2003 platform. All the computers in the LAN are a part of an Active Directory domain. Jim Lewis, the Domain Administrator, at Global Systems Inc., has delegated administrative rights to the system administrators of the existing departments. He needs to delegate the administrative rights to the system administrators of the newly set up departments. How should Jim begin assigning the administrative duties? 1,By creating organizational units for the newly set up departments using Active Directory Domains and Trusts console.
30/32

77

78

niitstudent.com

79

2,By creating organizational units for the newly set up departments using Active Directory Users and Computers console. 3,By delegating the administrative duties to the system administrators of the newly set up departments using Active Directory Users and Computers console. 4,By delegating the administrative duties to the system administrators of the newly set up departments using Delegation of Control Wizard. Steve Irving, the Domain Administrator, at Red Sky IT Systems, needs to assign the administrative duties to the system administrators of the newly set up departments, including Sales, Marketing, and IT. Steve has created Organizational Units (OUs) for the newly set up departments. He has selected some users and he needs to enable these users to access and control Active Directory objects. What step should Steve perform next in order to enable the selected users to access and control Active Directory objects? 1,Create customized consoles for the selected users. 2,Design object permission structure for the newly formed OUs. 3,Design permissions for the Active Directory objects. 4,Identify the groups that the selected users belong to. You are working as the System Administrator at Safest Software Co. You have configured an Active Directory domain in your organization using a single domain controller. You have implemented auditing on the domain controller to determine whether it is accessed by unauthorized users. However, the performance of the domain controller has degraded. You need to monitor only specific events in order to improve the performance of the domain controller. How can you perform this task? 1,By setting audit policies.

80

niitstudent.com

31/32

81

2,By using the Performance console. 3,By using an additional domain controller. 4,By auditing object access. You are working as the System Administrator at Global Systems Inc. You have configured a Windows Server 2003 based LAN in your organization. You have also configured an Active Directory domain in the LAN using a single domain controller. You need to manage the users, groups, and the resources attached to the domain controller. How can you perform this task? 1,By setting audit policies 2,By delegating control 3,By using an object-based security model. 4,By designing object permission structure

niitstudent.com

32/32