82 cau hoi on q7
TRANSCRIPT
-
7/30/2019 82 cau hoi on Q7
1/28
1 You are the system administrator at Blue Sky Ltd. You manage a growing
enterprise network running on Microsoft Windows Server 2003. To keep
up with the growth, you increase the number of domain controllers and
update the bridgehead server list. After designing the bandwidth
requirements, you begin to plan your site boundaries. You need to decidewhether to establish a single site or multiple site. What properties would
lead you to choose multiple sites for this situation?
1,You need all the replication on your network to occur as intrasite
replication.
2,You need simple replication management for your subnet.
3,You need fastest directory updates between all the domain controllers.
4,You need granular replication control for your WAN network.
2 Wilson is the network administrator at Red Cosmetics. The domain has
domain controllers running Windows Server 2003. Wilson is planning to
place global catalogs so that they are used optimally. During the bandwidth
analysis, Wilson notices a trend in global catalog network traffic. What
type of global catalog network traffic will Wilson predict to use more
network resources than other types of global network traffic?
1,Network traffic related to UPN authentication.
2,Network traffic related to user searches for directory information
throughout a forest.
3,Network traffic related to global catalog directory replication.
4,Network traffic related to global catalog queries.
3 Helen is working as a system administrator at IBG Inc. You have recently
installed Windows Server 2003 and have configured Active Directory in
the network of the organization. In the network, Helen has created a
domain for the accounts department. Helen needs to manage the access of
the domain. Which service does Helen need to implement to perform the
task?
1,Event Viewer console
2,Access Control Lists3,Service Management
4,Transitive trust
-
7/30/2019 82 cau hoi on Q7
2/28
4 Which component of the Active Directory infrastructure provides universal
group membership information to a domain controller when the user logs
on to the network?
1,Domain controller
2,Global catalog3,Tree root domain
4,Forest root domain
5 Which is the third stage involved in the process of creating the Active
Directory infrastructure design?
1,Creating a site topology plan
2,Creating a forest plan
3,Creating a domain plan
4,Creating an OU plan
6 What will be the first step in the design process for collecting the design
tools?
1,Analyzing the requirements
2,Gathering the design team
3,Building a design based on the requirements
4,Testing the design
7 Which is the third step in creating a site topology
plan?1,Defining sites
2,Defining the replication plan
3,Deciding the placement of domain controllers
4,Placing the global catalog servers in a forest
-
7/30/2019 82 cau hoi on Q7
3/28
8 Consider the statements:
Statement A: The domains, belonging to different trees in a forest, work
independently.
Statement B: Forest enables communication between the domains of
different trees.
Which of the following is true, with respect to the above statements?
1,Statement A is true and statement B is false.
2,Statement A is false and statement B is true.
3,Both, statements A and B, are true.
4,Both, statements A and B, are false.
9 Which tab in the Properties dialog box enables you to change the default
name of the package and specify a support Uniform Resource Locator
(URL)?
1,Deployment
2,Upgrades
3,Categories
4,General
10 Which tool you need to use along with Group Policy to handle software
deployment on a large scale with computers running pre-Windows 2000operating systems?
1,Software Distribution Point (SDP)
2,RSoP
3,SMS
4,Software Installation extension
11 Which type of Group Policy settings includes settings to configure user
workstation environment and their application settings?
1,Administrative templates2,Scripts
3,Software Installation
4,Remote installation services
-
7/30/2019 82 cau hoi on Q7
4/28
12 You are the system administrator at Blue Moon computers, Dubai. You
need to provide a work area to each user where the users can store their
files and required software safely. For this, you need to create separate
user accounts for each user that would enable the users to log on to the
network as well as on local computer to access their resources. Whichtype of user account would you prefer to create for each user?
1,Domain user account
2,Built-in user account
3,Computer account
4,Local user account
13 You are the system administrator at Global Systems, Texas. The
management has called a freelancer accountant named Steve to perform
audit operations. You need to provide temporary access to Steve so that
she can gain access to network resources. Which type of user account
would you prefer to create for Steve?
1,Domain user account
2,Built-in user account
3,Computer account
4,Local user account
14 Consider the statements:
Statement A: Windows Server 2003 never stores local user accounts inthe local security database.
Statement B: Local user accounts enable the users to log on to a computer
and access the resources only from the computer on which their account is
created.
Which of the following is true, with respect to the above statements?
1,Statement A is true and statement B is false.
2,Statement A is false and statement B is true.3,Both, statements A and B, are true.
4,Both, statements A and B, are false.
-
7/30/2019 82 cau hoi on Q7
5/28
15 You are the system administrator at PQR Corp. You want to create and
manage user accounts using the command-line tool, Ldifde. You include
the command for running the Ldifde tool in a Notepad file and save the
file with .LDF extension. The syntax of the Ldifde command is:
dn: cn = container name, ou= organizational unit, dc= root domain
changeType: Add
objectClass: user
sAMAccountName: username
UserPrincipalName: username including the path of users container
displayName: username
userAccountControl: value
What does dn specify in the above syntax of the Ldifde command?
1,Specifies the type of object to be created.
2,Specifies the username along with the location of the account.
3,Specifies adding of a new user account in the Users container.
4,Specifies the path to an objects container.
16 Which operations master role enables a domain controller to add and
remove application directory partitions from the forests?
1,Infrastructure master role
2,Primary Domain Controller (PDC) emulator role
3,Relative Identifier (RID) master role
4,Domain naming master role
17 Identify the Microsoft Management Console (MMC) that performs thefunction of RID master role.
1,Active Directory Schema
2,Active Directory Domains and Trusts
3,Active Directory Users and Computers
4,Active Directory Sites and Services
-
7/30/2019 82 cau hoi on Q7
6/28
18 Which tool provided by Windows Server 2003 allows you to transfer and
seize the operation master role?
1,Ntdsutil
2,Nltest3,Dcdiag
4,Gpupdate
19 The failure of which master prevents you from making changes in your
password?
1,Domain naming master
2,RID master
3,Infrastructure master
4,PDC emulator master
20 Which Active Directory System Monitor counter specifies the original
size of inbound compressed replication data in bytes?
1,DRA Inbound Bytes Not Compressed (Within site)/sec
2,DRA Inbound Bytes total/sec
3,DRA Inbound Bytes Compressed (Between sites, before
compression)/sec
4,DRA Outbound Bytes Compressed (Between sites, after
compression)/sec
21 Which Active Directory System Monitor counter specifies the number of
synchronization requests made to replication partners?
1,LDAP Client Sessions
2,DRA Sync Requests Made
3,DRA Outbound Objects/sec
4,DRA Outbound Bytes Total/sec
22 Which Active Directory System Monitor counter specifies the number of
objects replicated out per second?1,DRA Outbound Objects/sec
2,LDAP Client Sessions
3,DRA Outbound Bytes Total/sec
4,DRA Inbound Bytes total/sec
-
7/30/2019 82 cau hoi on Q7
7/28
23 Which Active Directory System Monitor counters display the total
numbers of bytes or objects processed per second?
1,Ratio counters
Hen, sui: 2,Statistic counters
3,Performance counters4,Accumulative counters
24 Which Active Directory System Monitor counter specifies the inbound
replication data in bytes that were not compressed at the other DSA in
same site?
Coi lai, 1,DRA Inbound Bytes Not Compressed (Within site)/sec
2,DRA Inbound Bytes total/sec
3,DRA Outbound Bytes Total/sec
4,DRA Outbound Objects/sec
25 Consider the statements:
Statement A: The dcdiag.exe command enables you to view or modify the
ACLs of Active Directory objects.
Statement B: The dsastat.exe command enables you to compare the
naming contexts on different domain controllers. It also enables you to
identify the differences between naming contexts on domain controllers.
Which of the following is true, with respect to the above statements?
1,Statement A is true and statement B is false.
2,Statement A is false and statement B is true.
3,Both, statements A and B, are true.
4,Both, statements A and B, are false.
-
7/30/2019 82 cau hoi on Q7
8/28
26 Ron Floyd is working as a network administrator at Global Systems, Inc.
Ron has implemented Active Directory infrastructure in the network. Due
to the large volume of data, Server03 is running low on hard disk space.
Ron does not have additional hard disks to install on the server. David
Wong, the head of the Marketing department needs to store someimportant data on the server urgently. David complains that he is unable
to store the important data on the server. Which option can Ron use to
help David in saving the data on the server?
1,Delete the files of other users from the server
2,Install other hard disks on the server
3,Format the drive to create space
4,Perform offline compaction of the Active Directory database
27 Perfect Watch Co. is a watch manufacturing company with three business
locations: Chicago, Washington, and New York. You are the network
consultant and Ron Floyd is the assistant network consultant at the
Washington office. The network in the company is using Windows Server
2003 Active Directory services. You ask Ron to raise the functional level
of a forest in the network. When trying to raise the functional level of the
forest, Ron receives an error message. Ron asks you to help him
troubleshoot the problem occurring while raising the functional level of
the forest. What should be ensured to raise the functional level of the
forest?
1,Global catalog for each domain controller is enabled2,Domain controllers are running Windows 2000 Server
3,Universal group membership caching is enabled
4,Domain functional level of the domain controllers is Windows Server
2003
-
7/30/2019 82 cau hoi on Q7
9/28
28 Corrine Wallace is working as a network consultant at Mastery
Mechanics. Mastery Mechanics is an auto parts manufacturing company
with a large network spanning across three cities: New York, Atlanta, and
Chicago. The company has a network that is using Windows Server 2003
Active Directory services. Three days ago, Corrine performed ActiveDirectory database compaction to save hard disk space. Mary Peterson,
the head of the Sales department complains that the database transaction
is taking more time than earlier for the last three days. What can Corrine
do to decrease the database transaction time?
1,Demote the server and then promote it using the Dcpromo.exe
command
2,Restore computer files and settings
3,Restore the Active Directory database
4,Format the server hard disk and configure Windows Server 2003 Active
Directory on the server
29 You are working as a network administrator and Jerry Smith is working
as assistant network administrator at Homelike hospital Ltd. The hospital
has its head office at San Francisco and has its branch offices at Atlanta
and Denver. The hospital has a large network consisting of 300
computers. The management has asked you to implement Windows
Server 2003 Active Directory infrastructure in the network. After you
have implemented Active Directory in the network, the users are facing
connectivity problems. Jerry tells you that the problems are occurringwhile registering with DNS service. Jerry asks you to identify the cause of
the connectivity problems. What is the cause of connectivity problems in
the network?
1,Folders are not redirected
2,Database is corrupt
3,DNS service is not working properly
4,DNS record is deleted
-
7/30/2019 82 cau hoi on Q7
10/28
30 Technology Systems is an IT enabled services provider company with its
head office at Chicago. The company has two branch offices at Atlanta
and Denver. You are working as a network engineer and Christine Turner
is working as an assistant network engineer at the Chicago office. Due to
some hardware problem, Christine could not back up the data stored onthe server and had to format Server2. An error message appears indicating
that Server2 already exists when Christine tries to install a domain
controller to replace Server2. Which command would help Christine to
remove the references of Server2 from other domain controllers in the
network?
1,ADSIEdit.msc and Dnsmgmt.msc
2,Netdom.exe and Ntdsutil.exe
3,Movetree.exe and ADSIEdit.msc
4,Netdiag.exe and Ntdsutil.exe
31 NS Toys is a toy manufacturing company with three business locations:
Las Vegas, Chicago, and Los Angeles. Chris Donaldson is working as an
assistant network administrator at the Los Angeles office of NS Toys.
You are working as a network administrator at the head office at Las
Vegas. The DC05 domain controller at the Los Angeles office had a
power failure and has lost data stored in it. Chris wants to restore System
State but he does not know how to restore System State. Therefore, Chris
asks you to help him perform System State restore. What do you suggest
Chris to fix the problem?1,Perform authoritative System State restore from other domain controller
in the network
2,Perform authoritative System State restore locally
3,Perform non-authoritative System State restore remotely
4,Perform non-authoritative System State restore locally
-
7/30/2019 82 cau hoi on Q7
11/28
32 AB Corp. is a computer manufacturing company with its head office at
Chicago. Pat Greene is working as a network consultant in the company.
The company has three departments: Sales, Purchase, and Manufacturing.
These three departments are under separate OUs in the forest. As the
company has reorganized employees across the departments, the useraccounts from different OUs are transferred under different OUs. The
users are complaining that they are unable to find their document folders
on the network after the reorganization. What is the possible cause of the
problem?
1,GPOs for the new OUs do not contain the updated information about
folder redirection
2,Users forgot to transfer their data from the old computers to the new
computers
3,Users computers have been formatted
4,Domain controllers have been changed
33 You are working as the system administrator at the Chicago branch of
Blue Valley Consulting. You have created an Active Directory forest in
your organization. You have also assigned operation master roles to a
domain controller in the forest to ensure that the Active Directory
performs single master replication. However, the employees of your
company are complaining that they are unable to change their passwords
after logging on to their domains. How can you solve this problem?
1,By changing the domain naming master role assignment.2,By changing the Primary Domain Controller (PDC) emulator role
assignment.
3,By changing the Relative Identifier (RID) master role assignment.
4,By using the Active Directory Users and Computers console.
34 Which parameter of the repadmin.exe command enables you to specify a
user as the administrator?
1,pw:{password|*}
2,/ldap3,/rpc
Hen, sui:4,/u: domain\user
-
7/30/2019 82 cau hoi on Q7
12/28
35 Ken Burton is the system administrator at the Atlanta branch of Global
Systems Inc. The company has another office at New York. Ken has
configured intersite replication between the two offices, but now he
observes that the domain directory partition is not being replicated to all
domain controllers. Therefore, Ken needs to detect the replication partnerthat has failed. John also needs to regenerate the replication topology.
Which console should Ken use to perform these tasks?
1,Active Directory Replication Monitor console
2,Active Directory Sites and Services console
3,Active Directory Domains and Trusts console
4,Event Viewer console
36 You are the system administrator at Red Sky. You have decided to move
database of 2500 user accounts to Active Directory. You have created a
single domain structure for the company. The company needs to structure
objects in the domain. To begin, you are planning to create the smallest
structure to which GPO can be applied or over which administrative
authority can be delegated. What specific structure would your plan
propose in the given problem?
1,An administrative model
2,A domain
3,A subnet
4,An OU hierarchy
37 You are the system administrator at Smart Software Developers. You
want to promote member server to domain controller. Which security
template do you need to modify?
1,Default security settings (Setup security.inf)
2,Default security settings updated for domain controllers (DC
security.inf)
3,Highly secure domain controller security settings (Hisecws.inf)
4,Secure domain controller security settings (Securedc.inf)
-
7/30/2019 82 cau hoi on Q7
13/28
38 You are the system administrator at Countrywide markets. The members
of the IT department need to access floppy drives and CD-Rom for
storing and retrieving data. This access can spread virus and worm on the
network that can cause severe damage to the trusted software of the
company. You are assigned the responsibility to implement a securitypolicy to prevent all the computers over the network from virus attack by
enabling or disabling the security settings on the centrally managed
computer. What security do you need to use to perform the given task?
1,Audit policy
2,Account lockout policy
3,Password policy
4,Security options
39 Which command-line tool enables you to create active directory user
objects on computers, which are running Windows Server 2003?
1,Netdiag.exe
2,Ntfrsutl.exe
3,Ldifde.exe
4,Dcdiag.exe
40 You are working as a system administrator at Countryside Markets. The
management has asked you to centralize the network administration in the
organization. To centralize the network administration for Countryside
Markets, you have implemented Windows Server 2003 Active Directoryinfrastructure in the network. Now, employees are complaining that they
are facing connectivity problems. You notice that the problems are
occurring while registering with DNS service.
What can be the possible cause of the problem?
1,Active Directory database is corrupt
2,DNS record not exist
3,Active Directory database size has increased
4,Folders are not redirected
-
7/30/2019 82 cau hoi on Q7
14/28
41 You are working as the system administrator at the Paris branch of Red
Sky IT Systems. You have created an Active Directory forest in your
organization. You have also created groups and placed the users in
specific groups. In addition, you have assigned all the operation master
roles to the first domain controller in the forest and stored the globalcatalog only on that domain controller. However, you are unable to
identify the groups of various users. Which operation master role do you
need to transfer, to solve this problem?
1,Domain naming master role
2,Primary Domain Controller (PDC) emulator master role
3,Schema master role
4,Infrastructure master role
42 You are working as a system administrator at LMN Inc. You have to
configure security for multiple computers in one step and ease the task of
domain administration. You have configured the security template and
now, you want to apply the security. What action will you perform to
apply the security?
1,Security template will be applied automatically.
2,Import Security template to a local Group Policy
3,Import Security template to an existing GPO
4,Import Security template to a domain controller
43 You are the system administrator at Blue Moon Computers. The ITdepartment members are working on the trusted software of the company.
You need to configure security and startup settings for services running
on the system to prevent from any unauthorized access and severe damage
to the software. This enables you to determine the user or group that is
having ownership permission for the system service. Which security
policy do you need to use to perform the given task?
1,System Services policy
2,User rights assignment policy
3,Account lockout policy4,IP Security Policy
-
7/30/2019 82 cau hoi on Q7
15/28
44 Which command-line tool performs a series of tests to determine the state
of network clients?
1,Netdom.exe
2,Nltest.exe
3,Ntfrsutl.exe4,Netdiag.exe
45 You are a member of network security team of your organization. The
security administrator wants you to apply STRIDE model to the existing
network and prepare a threat model plan. What is the sequence of
activities you should follow?
1,1. Threat modeling 2. Threat prediction 3. Threat mitigation
2,1. Threat mitigation 2. Threat modeling 3. Threat prediction
3,1. Threat modeling 2. Threat prediction 3. Threat mitigation
4,1. Threat prediction 2. Threat modeling 3. Threat mitigation
46 You are a member of the network risk management team of your
organization. Which of the following activities should you perform before
you can manage the risks?
1,Quantitative analysis of risks
2,Qualitative analysis of risks
3,Both quantitative and qualitative analysis of risks
4,Tracking changes in risk conditions
47 John Barrett works as a graphics designer at Good Graphics Inc. John
needs to frequently access the Internet to acquire ideas to create new
designs. John also downloads the required files from the Internet.
Recently, John has observed that the files that he creates during the day
are deleted at the end of the day. John does not allow any other user to
access his system and is sure that he is loosing the files because of some
malicious software. Which of the following malicious software can be
responsible for deleting the files on Johns system?
1,Trap door2,Logic bomb
3,Trojan horse
4,Zombie
-
7/30/2019 82 cau hoi on Q7
16/28
48 Steve Irving is working as a network security designer at Smart Software
Developers. The company deals in software products, and has its head
office at Washington. The company has an existing Windows Server 2003
infrastructure implemented in the network. The management has asked
Steve to implement Windows Server 2003 security policy in the networkto provide security to the company network. For this, Steve decides to
implement a risk management strategy in which he will remove the source
of the risk. Which strategy has Steve planned?
1,Transfer
2,Avoid
3,Mitigate
4,Accept
49 The Blue Moon Computers deals with the computer hardware products.
The company has allowed its clients to access the database. However, the
organization does not want to expose all the information in the database to
the client. Also, the organization wants to give its clients only read
permissions. Therefore, the management has appointed Donna Bard as a
security designer to secure the access to the database of the organization.
Donna is instructed to take care that only authenticated users have access
to the database. She is also required to keep the database of Blue Moon
Computers safe from malicious users who keep trying with various
possible passwords to get the correct password. Which mitigation
techniques should Donna Bard use to secure the database?1,Secure communication and Authorization
2,Authorization and Auditing
3,Authorization, Auditing and Secure communication
4,Least privileges, Auditing and Authentication
-
7/30/2019 82 cau hoi on Q7
17/28
50 Don Allen works as a network administrator at the head office of
Technology Systems. The company is selling its products through a
network of distributors. To reduce the cost of selling computer parts, the
company decides to directly sell the computer parts to the end user
through an e-commerce Web site. The e-commerce Web site is hosted atthe companys Web server at Atlanta. In order to purchase a productfrom the Web site, a user has to register itself with the Web site. The
company wants to secure the network and identify the security threats to
the various resources of the network. Therefore, Don is required to plan
the management of risk to an asset, which includes creating risk
management strategy and contingency plans. Don has calculated that
ALE of a risk to an asset is more than the value of the asset. Now, he
wants to apply a strategy to mitigate the risk. Which strategy should Don
Allen implement?
1,Mitigate
2,Accept
3,Avoid
4,Transfer
51 The Technology Systems wants to identify the threats to network security
in order to protect its network from hackers. The company has noticed
some malicious operations in the network. The company has implemented
threat modeling, which provides a systematic methodology to recognize
and categorize threats according to their impact on network security. JimLewis, a security designer has been assigned the task to verify and collect
the information regarding the stage in which the attacker is still
performing. Jim has collected the information that the attackers are trying
to retrieve the information about the ports and devices of the organization
that are accessible remotely. The attackers are also trying to identify the
vulnerabilities in the network security. Jim has informed the company
about the stage of the threat. Now, the company wants to counter the
threat using security measures. In which stage of the threat should the
company implement the security measures?1,Elevation of privilege
2,Footprint
3,Penetration
4,Cover-up
-
7/30/2019 82 cau hoi on Q7
18/28
52 The Blue Moon Computers wants to provide security to the network from
the malicious users and hackers. The company has identified security
threats and created a team to analyze the threats. The company wants to
implement a proper strategy to manage risks to network security to avoid
losses due to the risks. Before creating a risk management strategy, all theassets of network are identified and secured properly. The company has
appointed Jim Lewis to perform the task of managing risk, which involves
performing qualitative and quantitative analysis of risks. Jim has
calculated the ALE of a risk to an asset and compared it with the value of
the asset. Now, after quantitative analysis he is required to plan the
management of the risk. Therefore, Jim Lewis has used Antivirus
software to protect the asset. Which strategy did Jim Lewis apply to
manage the risk?
1,Transfer
2,Mitigate
3,Avoid
4,Accept
53 You are configuring auditing of the CA using CA audit properties page.
Which option should you enable to set restrictions on certificate
managers?
1,Issue and manage certificate requests2,Change CA security settings
3,Change CA configuration
4,Start and stop certificate services
-
7/30/2019 82 cau hoi on Q7
19/28
54 Consider the following statements:
Statement A: Root enterprise CA is integrated with Active Directory.
Statement B: Subordinate enterprise CA can be installed on WindowsServer 2003 or Windows Server 2000 server that is a member of the
Active Directory domain.
Which of the following is true about the above statements?
1,Both statements A and B are correct.
2,Both statements A and B are incorrect.
3,Statement A is correct while statement B is incorrect.
4,Statement A is incorrect while statement B is correct.
55 You are the CA administrator of your organization. Which of the
following are your responsibilities:
Renewing certificates.
Reactivating certificates placed on hold.
Approving and denying certificate enrolment request.1,1 and 2
2,2 and 3
3,1 and 3
4,1, 2, and 3
-
7/30/2019 82 cau hoi on Q7
20/28
56 Consider the following statements:
Statement A: A certificate cannot be revoked before the end of its validity
period.
Statement B: CRL includes policies for revocation of certificates.
Which of the following is true about the above statements?
1,Both statements A and B are correct.
2,Both statements A and B are incorrect.
3,Statement A is correct while statement B is incorrect.
4,Statement A is incorrect while statement B is correct.
57 Corrine Wallace is working as the Network Administrator at Blue Moon
Computers. Corrine has configured a Windows Server 2003 based LAN
and has implemented security mechanisms to secure the LAN. Corrine
needs to update the network security to keep it secure against network
security threats. Corrine needs to deploy security patches using Security
Update Services (SUS) server. Corrine needs to design the security update
strategy to secure the SUS server. For this, Corrine has identified the
changes that require updating the security of the LAN. What should
Corrine do to design the security update strategy?1,Use Automatic Update
2,Use Group Policy
3,Use custom scripts
4,Use Windows Update
58 Which of the following is an IPSec sub protocol for providing data
integrity?
1,Kerberos Protocol
2,Authentication Header3,IPSec Key Exchange
4,Encapsulating Security Protocol
-
7/30/2019 82 cau hoi on Q7
21/28
59 Which of the following protocols can be used to provide data
integrity?
1,AH
2,ESP
3,MD54,IP
60 Which of the following protocols should be used if highest level of
security is required for a VPN connection?
1,UDP
2,L2TP/IPSec
3,PPTP
4,PPP
61 You are the network administrator of your organization. The organization
is implementing 802.1x standard on its wireless network. Which of the
following infrastructure changes could be required, and why?
1,Upgradation of wireless network adaptor to enable 802.1x
authentication standard.
2,PKI implementation to provide mutual authentication using PEAP-EAP.
3,Uninstallation of PKI because 802.1x standard is sufficient to provide
authentication to RADIUS server clients.
4,Configure remote access policies on RADIUS server to authenticate
clients against Active Directory.
62 Consider the following statements:
Statement A: 802.11a has a connection speed up to 54 Mbps and radio
frequency of 2.4 GHz.
Statement B: 802.11b has a connection speed up to 54 Mbps and radio
frequency of 5 GHz.
Which of the following is true about the above statements?
1,Both statements A and B are correct.
2,Both statements A and B are incorrect.
-
7/30/2019 82 cau hoi on Q7
22/28
3,Statement A is correct while statement B is incorrect.
4,Statement A is incorrect while statement B is correct.
63 Consider the following statements:
Statement A: 802.11i uses Wired Equivalent Privacy protocol for data
encryption.
Statement B: 802.11i uses Extensible Authentication Protocol for data
authentication.
Which of the following is true about the above statements?
1,Both statements A and B are correct.
2,Both statements A and B are incorrect.
3,Statement A is correct while statement B is incorrect.
4,Statement A is incorrect while statement B is correct.
-
7/30/2019 82 cau hoi on Q7
23/28
64 Jim Lewis, the Network Administrator at Global Systems Inc. has set up a
wireless network to facilitate the communication between the
organization and its clients. The wireless network was set up using the
802.11a standard and it was efficiently supporting the communication
needs. Recently, the company has observed that confidential data is beingmodified during transmission. Therefore, Jim needs to implement
enhanced encryption and authentication techniques in the wireless
network. How can Jim perform this task?
1,Using 802.1x protocol.
2,Deploying firewall on wireless client computers.
3,Using WiFi Protected Access.
4,Using baseline security templates.
65 Tom works as the Network Administrator at Blue Moon Computers. Tom
needs to set up a wireless network, which has a connection speed of 54
mega bits per second (Mbps). The wireless network should support a
radio frequency of 2.4 giga hertz (GHz). Tom is also required to provide
security to the wireless network by providing authentication and
encryption features in the above network. Which standard should Tom use
to set up the wireless network?
1,Use 802.1x standard
2,Use 802.11b standard
3,Use 802.11g standard
4,Use 802.11i standard
66 David is appointed as the System Administrator in Global Systems Inc.,
which is an international call center. The employees of the call center
need to frequently exchange data with the customers. David needs to set
up a wireless network to facilitate the exchange of data. It is required that
the wireless network has a connection speed of 54 mega bits per second
(Mbps) and supports a radio frequency of 2.4 gigahertz (GHz). David also
needs to use Temporal Key Integrity Protocol (TKIP) and Extensible
Authentication Protocol (EAP). What will you do to meet therequirements of Global Computers Ltd?
1,Use WiFi Protected Access (WPA)
2,Use shared key authentication
3,Use open system authentication
4,Use Wired Equivalent Privacy (WEP)
-
7/30/2019 82 cau hoi on Q7
24/28
67 Ed Young is working as the Network Engineer at the New York branch of
Red Sky IT Systems. The organization has recently established another
branch at Chicago. The employees of both the branches need to exchange
data frequently. Therefore, the management has asked Ed Young toestablish a wireless network. Ed Young has implemented a wireless
network in order to meet the business requirements of Red Sky IT
Systems. Ed Young has used the 802.11a standard to set up the wireless
network and the employees were able to exchange data efficiently.
However, recently the employees have they are receiving corrupted data.
What can be the possible reason?
1,EAP-TLS protocols were not used to implement the wireless network.
2,An unauthorized user has gained access to the access point.
3,The 802.11a standard does not ensure security of data.
4,The signals are transmitted in all directions in wireless networks.
68 Which of the following servers is used to resolve NetBIOS names to their
corresponding IP addresses?
1,DHCP
2,WINS
3,DNS
4,IAS
69 Which of the following is a predefined security template provided byWindows Server 2003?
1,Root.inf
2,Secure.inf
3,Hisecws.inf
4,Compat.inf
70 server can be configured as RADIUS server, RADIUS
proxy, or both.
1,IIS2,IAS
3,DNS
4,WINS
-
7/30/2019 82 cau hoi on Q7
25/28
71 Security templates can be used to define which of the following security
settings in a GPO?
1,Server
2,System root
3,Domain Controller4,Event log
72 BlueVelly Inc. publishes computer and IT related books and has its head
office at Chicago. The company also sells the books through a network of
distributors. The CEO of the company John Major wants to reduce
advertisement costs by using an e-commerce Web site. John has Chris, the
Web administrator, to design an e-commerce Web site and host it on the
IIS Web server at Chicago. John has also asked Chris to ensure that only
registered users are allowed to buy the books from the Web site and
Active Directory accounts are available for all the users in the Active
Directory database. Which type of mapping should Chris use to meet the
requirements mentioned by the CEO?
1,IIS Mapping
2,DS Mapping
3,One-to-One Mapping
4,Many-to-One Mapping
73 Red Sky IT Systems has launched an e-commerce Web site to increase
the sales of computer parts. The Web site is hosted on InternetInformation Server (IIS) at the head office at Atlanta. It displays all the
information related to the computer parts, such as product name, price,
and model name. Chris, the Web Administrator at Red Sky IT Systems
has also installed various Web applications on the IIS server. Chris needs
to secure these Web applications. Chris has already designed the
strategies to monitor the IIS server. What should Chris do next in order to
secure the Web applications and control access to the IIS server?
1,Create a baseline security for the IIS server
2,Use IPSec3,Use SSL
4,Manage IIS specific logs
-
7/30/2019 82 cau hoi on Q7
26/28
74 Jim Lewis is working as the senior Network Administrator at PQR
Chemicals Inc, USA. The organization has decided to collaborate with
AB Pharma Ltd, England to do research and development. Both the
organizations need to access common folders on the network. Jim Lewis
needs to identify a method to make the users of both the organizationsaccountable for the data they are accessing and keep a record of all the
users accessing the data. Which is the ideal authentication method to
perform the task?
1,SSL and User Certificates
2,SSL and VPN
3,SSL and IPSec
4,IPSec and User Certificates
75 James works as a Network Administrator at RedSky Inc. The organization
has a LAN, which is configured using Windows Server 2003 operating
system. James has created a Web site for his organization that runs on an
IIS server. The management has planned to display confidential
information on the organizations Web site. Therefore, James needs toidentify the users visiting the Web site using Kerberos authentication.
How can James perform this task?
1,Using the anonymous authentication method
2,Using the Windows integrated authentication method
3,Using the SSL authentication method
4,Using the basic authentication method
76 Larry Williams is the System Administrator at Supersoft2000, which is
working on a confidential project. The LAN of the company is based on
Windows Server 2003 platform and is not fully secure. The company has
asked Larry to ensure that only authorized users are permitted to access
the files and folders. Therefore, Larry needs to design an access control
model. He also needs to ensure that all the files contained in the My
Documents folder of the users have the same permissions as that of the
My Documents folder. Which principle should Larry use to perform thistask?
1,Discretionary access control
2,Administrative privileges
3,Inheritance of permissions
4,User-based authentication
-
7/30/2019 82 cau hoi on Q7
27/28
77 Ed Young is working as the System Administrator at Blue Moon
Computers. The company has asked him to take regular backup of the
files and folder created by the users. Ed Young has configured a file
server to implement the backup and recovery operations efficiently. Healso needs to store encrypted files on the file server to provide data
security. Ed Young needs to design server side storage for EFS to store
encrypted files on the file server. While designing the server side storage
for EFS, which aspect should Ed Young consider?
1,Using local profile on the server
2,Securing data transport
3,Securing back-up data media
4,Designing backup and recovery procedures
78 Global Systems Inc.has recently set up three new departments, including
Sales, Marketing, and IT. The organization has a LAN, which is based on
Windows Server 2003 platform. All the computers in the LAN are a part
of an Active Directory domain. Jim Lewis, the Domain Administrator, at
Global Systems Inc., has delegated administrative rights to the system
administrators of the existing departments. He needs to delegate the
administrative rights to the system administrators of the newly set up
departments. How should Jim begin assigning the administrative duties?
1,By creating organizational units for the newly set up departments using
Active Directory Domains and Trusts console.2,By creating organizational units for the newly set up departments using
Active Directory Users and Computers console.
3,By delegating the administrative duties to the system administrators of
the newly set up departments using Active Directory Users and
Computers console.
4,By delegating the administrative duties to the system administrators of
the newly set up departments using Delegation of Control Wizard.
-
7/30/2019 82 cau hoi on Q7
28/28
79 Steve Irving, the Domain Administrator, at Red Sky IT Systems, needs to
assign the administrative duties to the system administrators of the newly
set up departments, including Sales, Marketing, and IT. Steve has created
Organizational Units (OUs) for the newly set up departments. He has
selected some users and he needs to enable these users to access andcontrol Active Directory objects. What step should Steve perform next in
order to enable the selected users to access and control Active Directory
objects?
1,Create customized consoles for the selected users.
2,Design object permission structure for the newly formed OUs.
3,Design permissions for the Active Directory objects.
4,Identify the groups that the selected users belong to.
80 You are working as the System Administrator at Safest Software Co. You
have configured an Active Directory domain in your organization using a
single domain controller. You have implemented auditing on the domain
controller to determine whether it is accessed by unauthorized users.
However, the performance of the domain controller has degraded. You
need to monitor only specific events in order to improve the performance
of the domain controller. How can you perform this task?
1,By setting audit policies.
2,By using the Performance console.
3,By using an additional domain controller.
4,By auditing object access.
81 You are working as the System Administrator at Global Systems Inc. You
have configured a Windows Server 2003 based LAN in your organization.
You have also configured an Active Directory domain in the LAN using a
single domain controller. You need to manage the users, groups, and the
resources attached to the domain controller. How can you perform this task?
1,By setting audit policies
2,By delegating control
3,By using an object-based security model.4,By designing object permission structure