82 cau hoi on q7

Upload: thaiduy1601

Post on 04-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 82 cau hoi on Q7

    1/28

    1 You are the system administrator at Blue Sky Ltd. You manage a growing

    enterprise network running on Microsoft Windows Server 2003. To keep

    up with the growth, you increase the number of domain controllers and

    update the bridgehead server list. After designing the bandwidth

    requirements, you begin to plan your site boundaries. You need to decidewhether to establish a single site or multiple site. What properties would

    lead you to choose multiple sites for this situation?

    1,You need all the replication on your network to occur as intrasite

    replication.

    2,You need simple replication management for your subnet.

    3,You need fastest directory updates between all the domain controllers.

    4,You need granular replication control for your WAN network.

    2 Wilson is the network administrator at Red Cosmetics. The domain has

    domain controllers running Windows Server 2003. Wilson is planning to

    place global catalogs so that they are used optimally. During the bandwidth

    analysis, Wilson notices a trend in global catalog network traffic. What

    type of global catalog network traffic will Wilson predict to use more

    network resources than other types of global network traffic?

    1,Network traffic related to UPN authentication.

    2,Network traffic related to user searches for directory information

    throughout a forest.

    3,Network traffic related to global catalog directory replication.

    4,Network traffic related to global catalog queries.

    3 Helen is working as a system administrator at IBG Inc. You have recently

    installed Windows Server 2003 and have configured Active Directory in

    the network of the organization. In the network, Helen has created a

    domain for the accounts department. Helen needs to manage the access of

    the domain. Which service does Helen need to implement to perform the

    task?

    1,Event Viewer console

    2,Access Control Lists3,Service Management

    4,Transitive trust

  • 7/30/2019 82 cau hoi on Q7

    2/28

    4 Which component of the Active Directory infrastructure provides universal

    group membership information to a domain controller when the user logs

    on to the network?

    1,Domain controller

    2,Global catalog3,Tree root domain

    4,Forest root domain

    5 Which is the third stage involved in the process of creating the Active

    Directory infrastructure design?

    1,Creating a site topology plan

    2,Creating a forest plan

    3,Creating a domain plan

    4,Creating an OU plan

    6 What will be the first step in the design process for collecting the design

    tools?

    1,Analyzing the requirements

    2,Gathering the design team

    3,Building a design based on the requirements

    4,Testing the design

    7 Which is the third step in creating a site topology

    plan?1,Defining sites

    2,Defining the replication plan

    3,Deciding the placement of domain controllers

    4,Placing the global catalog servers in a forest

  • 7/30/2019 82 cau hoi on Q7

    3/28

    8 Consider the statements:

    Statement A: The domains, belonging to different trees in a forest, work

    independently.

    Statement B: Forest enables communication between the domains of

    different trees.

    Which of the following is true, with respect to the above statements?

    1,Statement A is true and statement B is false.

    2,Statement A is false and statement B is true.

    3,Both, statements A and B, are true.

    4,Both, statements A and B, are false.

    9 Which tab in the Properties dialog box enables you to change the default

    name of the package and specify a support Uniform Resource Locator

    (URL)?

    1,Deployment

    2,Upgrades

    3,Categories

    4,General

    10 Which tool you need to use along with Group Policy to handle software

    deployment on a large scale with computers running pre-Windows 2000operating systems?

    1,Software Distribution Point (SDP)

    2,RSoP

    3,SMS

    4,Software Installation extension

    11 Which type of Group Policy settings includes settings to configure user

    workstation environment and their application settings?

    1,Administrative templates2,Scripts

    3,Software Installation

    4,Remote installation services

  • 7/30/2019 82 cau hoi on Q7

    4/28

    12 You are the system administrator at Blue Moon computers, Dubai. You

    need to provide a work area to each user where the users can store their

    files and required software safely. For this, you need to create separate

    user accounts for each user that would enable the users to log on to the

    network as well as on local computer to access their resources. Whichtype of user account would you prefer to create for each user?

    1,Domain user account

    2,Built-in user account

    3,Computer account

    4,Local user account

    13 You are the system administrator at Global Systems, Texas. The

    management has called a freelancer accountant named Steve to perform

    audit operations. You need to provide temporary access to Steve so that

    she can gain access to network resources. Which type of user account

    would you prefer to create for Steve?

    1,Domain user account

    2,Built-in user account

    3,Computer account

    4,Local user account

    14 Consider the statements:

    Statement A: Windows Server 2003 never stores local user accounts inthe local security database.

    Statement B: Local user accounts enable the users to log on to a computer

    and access the resources only from the computer on which their account is

    created.

    Which of the following is true, with respect to the above statements?

    1,Statement A is true and statement B is false.

    2,Statement A is false and statement B is true.3,Both, statements A and B, are true.

    4,Both, statements A and B, are false.

  • 7/30/2019 82 cau hoi on Q7

    5/28

    15 You are the system administrator at PQR Corp. You want to create and

    manage user accounts using the command-line tool, Ldifde. You include

    the command for running the Ldifde tool in a Notepad file and save the

    file with .LDF extension. The syntax of the Ldifde command is:

    dn: cn = container name, ou= organizational unit, dc= root domain

    changeType: Add

    objectClass: user

    sAMAccountName: username

    UserPrincipalName: username including the path of users container

    displayName: username

    userAccountControl: value

    What does dn specify in the above syntax of the Ldifde command?

    1,Specifies the type of object to be created.

    2,Specifies the username along with the location of the account.

    3,Specifies adding of a new user account in the Users container.

    4,Specifies the path to an objects container.

    16 Which operations master role enables a domain controller to add and

    remove application directory partitions from the forests?

    1,Infrastructure master role

    2,Primary Domain Controller (PDC) emulator role

    3,Relative Identifier (RID) master role

    4,Domain naming master role

    17 Identify the Microsoft Management Console (MMC) that performs thefunction of RID master role.

    1,Active Directory Schema

    2,Active Directory Domains and Trusts

    3,Active Directory Users and Computers

    4,Active Directory Sites and Services

  • 7/30/2019 82 cau hoi on Q7

    6/28

    18 Which tool provided by Windows Server 2003 allows you to transfer and

    seize the operation master role?

    1,Ntdsutil

    2,Nltest3,Dcdiag

    4,Gpupdate

    19 The failure of which master prevents you from making changes in your

    password?

    1,Domain naming master

    2,RID master

    3,Infrastructure master

    4,PDC emulator master

    20 Which Active Directory System Monitor counter specifies the original

    size of inbound compressed replication data in bytes?

    1,DRA Inbound Bytes Not Compressed (Within site)/sec

    2,DRA Inbound Bytes total/sec

    3,DRA Inbound Bytes Compressed (Between sites, before

    compression)/sec

    4,DRA Outbound Bytes Compressed (Between sites, after

    compression)/sec

    21 Which Active Directory System Monitor counter specifies the number of

    synchronization requests made to replication partners?

    1,LDAP Client Sessions

    2,DRA Sync Requests Made

    3,DRA Outbound Objects/sec

    4,DRA Outbound Bytes Total/sec

    22 Which Active Directory System Monitor counter specifies the number of

    objects replicated out per second?1,DRA Outbound Objects/sec

    2,LDAP Client Sessions

    3,DRA Outbound Bytes Total/sec

    4,DRA Inbound Bytes total/sec

  • 7/30/2019 82 cau hoi on Q7

    7/28

    23 Which Active Directory System Monitor counters display the total

    numbers of bytes or objects processed per second?

    1,Ratio counters

    Hen, sui: 2,Statistic counters

    3,Performance counters4,Accumulative counters

    24 Which Active Directory System Monitor counter specifies the inbound

    replication data in bytes that were not compressed at the other DSA in

    same site?

    Coi lai, 1,DRA Inbound Bytes Not Compressed (Within site)/sec

    2,DRA Inbound Bytes total/sec

    3,DRA Outbound Bytes Total/sec

    4,DRA Outbound Objects/sec

    25 Consider the statements:

    Statement A: The dcdiag.exe command enables you to view or modify the

    ACLs of Active Directory objects.

    Statement B: The dsastat.exe command enables you to compare the

    naming contexts on different domain controllers. It also enables you to

    identify the differences between naming contexts on domain controllers.

    Which of the following is true, with respect to the above statements?

    1,Statement A is true and statement B is false.

    2,Statement A is false and statement B is true.

    3,Both, statements A and B, are true.

    4,Both, statements A and B, are false.

  • 7/30/2019 82 cau hoi on Q7

    8/28

    26 Ron Floyd is working as a network administrator at Global Systems, Inc.

    Ron has implemented Active Directory infrastructure in the network. Due

    to the large volume of data, Server03 is running low on hard disk space.

    Ron does not have additional hard disks to install on the server. David

    Wong, the head of the Marketing department needs to store someimportant data on the server urgently. David complains that he is unable

    to store the important data on the server. Which option can Ron use to

    help David in saving the data on the server?

    1,Delete the files of other users from the server

    2,Install other hard disks on the server

    3,Format the drive to create space

    4,Perform offline compaction of the Active Directory database

    27 Perfect Watch Co. is a watch manufacturing company with three business

    locations: Chicago, Washington, and New York. You are the network

    consultant and Ron Floyd is the assistant network consultant at the

    Washington office. The network in the company is using Windows Server

    2003 Active Directory services. You ask Ron to raise the functional level

    of a forest in the network. When trying to raise the functional level of the

    forest, Ron receives an error message. Ron asks you to help him

    troubleshoot the problem occurring while raising the functional level of

    the forest. What should be ensured to raise the functional level of the

    forest?

    1,Global catalog for each domain controller is enabled2,Domain controllers are running Windows 2000 Server

    3,Universal group membership caching is enabled

    4,Domain functional level of the domain controllers is Windows Server

    2003

  • 7/30/2019 82 cau hoi on Q7

    9/28

    28 Corrine Wallace is working as a network consultant at Mastery

    Mechanics. Mastery Mechanics is an auto parts manufacturing company

    with a large network spanning across three cities: New York, Atlanta, and

    Chicago. The company has a network that is using Windows Server 2003

    Active Directory services. Three days ago, Corrine performed ActiveDirectory database compaction to save hard disk space. Mary Peterson,

    the head of the Sales department complains that the database transaction

    is taking more time than earlier for the last three days. What can Corrine

    do to decrease the database transaction time?

    1,Demote the server and then promote it using the Dcpromo.exe

    command

    2,Restore computer files and settings

    3,Restore the Active Directory database

    4,Format the server hard disk and configure Windows Server 2003 Active

    Directory on the server

    29 You are working as a network administrator and Jerry Smith is working

    as assistant network administrator at Homelike hospital Ltd. The hospital

    has its head office at San Francisco and has its branch offices at Atlanta

    and Denver. The hospital has a large network consisting of 300

    computers. The management has asked you to implement Windows

    Server 2003 Active Directory infrastructure in the network. After you

    have implemented Active Directory in the network, the users are facing

    connectivity problems. Jerry tells you that the problems are occurringwhile registering with DNS service. Jerry asks you to identify the cause of

    the connectivity problems. What is the cause of connectivity problems in

    the network?

    1,Folders are not redirected

    2,Database is corrupt

    3,DNS service is not working properly

    4,DNS record is deleted

  • 7/30/2019 82 cau hoi on Q7

    10/28

    30 Technology Systems is an IT enabled services provider company with its

    head office at Chicago. The company has two branch offices at Atlanta

    and Denver. You are working as a network engineer and Christine Turner

    is working as an assistant network engineer at the Chicago office. Due to

    some hardware problem, Christine could not back up the data stored onthe server and had to format Server2. An error message appears indicating

    that Server2 already exists when Christine tries to install a domain

    controller to replace Server2. Which command would help Christine to

    remove the references of Server2 from other domain controllers in the

    network?

    1,ADSIEdit.msc and Dnsmgmt.msc

    2,Netdom.exe and Ntdsutil.exe

    3,Movetree.exe and ADSIEdit.msc

    4,Netdiag.exe and Ntdsutil.exe

    31 NS Toys is a toy manufacturing company with three business locations:

    Las Vegas, Chicago, and Los Angeles. Chris Donaldson is working as an

    assistant network administrator at the Los Angeles office of NS Toys.

    You are working as a network administrator at the head office at Las

    Vegas. The DC05 domain controller at the Los Angeles office had a

    power failure and has lost data stored in it. Chris wants to restore System

    State but he does not know how to restore System State. Therefore, Chris

    asks you to help him perform System State restore. What do you suggest

    Chris to fix the problem?1,Perform authoritative System State restore from other domain controller

    in the network

    2,Perform authoritative System State restore locally

    3,Perform non-authoritative System State restore remotely

    4,Perform non-authoritative System State restore locally

  • 7/30/2019 82 cau hoi on Q7

    11/28

    32 AB Corp. is a computer manufacturing company with its head office at

    Chicago. Pat Greene is working as a network consultant in the company.

    The company has three departments: Sales, Purchase, and Manufacturing.

    These three departments are under separate OUs in the forest. As the

    company has reorganized employees across the departments, the useraccounts from different OUs are transferred under different OUs. The

    users are complaining that they are unable to find their document folders

    on the network after the reorganization. What is the possible cause of the

    problem?

    1,GPOs for the new OUs do not contain the updated information about

    folder redirection

    2,Users forgot to transfer their data from the old computers to the new

    computers

    3,Users computers have been formatted

    4,Domain controllers have been changed

    33 You are working as the system administrator at the Chicago branch of

    Blue Valley Consulting. You have created an Active Directory forest in

    your organization. You have also assigned operation master roles to a

    domain controller in the forest to ensure that the Active Directory

    performs single master replication. However, the employees of your

    company are complaining that they are unable to change their passwords

    after logging on to their domains. How can you solve this problem?

    1,By changing the domain naming master role assignment.2,By changing the Primary Domain Controller (PDC) emulator role

    assignment.

    3,By changing the Relative Identifier (RID) master role assignment.

    4,By using the Active Directory Users and Computers console.

    34 Which parameter of the repadmin.exe command enables you to specify a

    user as the administrator?

    1,pw:{password|*}

    2,/ldap3,/rpc

    Hen, sui:4,/u: domain\user

  • 7/30/2019 82 cau hoi on Q7

    12/28

    35 Ken Burton is the system administrator at the Atlanta branch of Global

    Systems Inc. The company has another office at New York. Ken has

    configured intersite replication between the two offices, but now he

    observes that the domain directory partition is not being replicated to all

    domain controllers. Therefore, Ken needs to detect the replication partnerthat has failed. John also needs to regenerate the replication topology.

    Which console should Ken use to perform these tasks?

    1,Active Directory Replication Monitor console

    2,Active Directory Sites and Services console

    3,Active Directory Domains and Trusts console

    4,Event Viewer console

    36 You are the system administrator at Red Sky. You have decided to move

    database of 2500 user accounts to Active Directory. You have created a

    single domain structure for the company. The company needs to structure

    objects in the domain. To begin, you are planning to create the smallest

    structure to which GPO can be applied or over which administrative

    authority can be delegated. What specific structure would your plan

    propose in the given problem?

    1,An administrative model

    2,A domain

    3,A subnet

    4,An OU hierarchy

    37 You are the system administrator at Smart Software Developers. You

    want to promote member server to domain controller. Which security

    template do you need to modify?

    1,Default security settings (Setup security.inf)

    2,Default security settings updated for domain controllers (DC

    security.inf)

    3,Highly secure domain controller security settings (Hisecws.inf)

    4,Secure domain controller security settings (Securedc.inf)

  • 7/30/2019 82 cau hoi on Q7

    13/28

    38 You are the system administrator at Countrywide markets. The members

    of the IT department need to access floppy drives and CD-Rom for

    storing and retrieving data. This access can spread virus and worm on the

    network that can cause severe damage to the trusted software of the

    company. You are assigned the responsibility to implement a securitypolicy to prevent all the computers over the network from virus attack by

    enabling or disabling the security settings on the centrally managed

    computer. What security do you need to use to perform the given task?

    1,Audit policy

    2,Account lockout policy

    3,Password policy

    4,Security options

    39 Which command-line tool enables you to create active directory user

    objects on computers, which are running Windows Server 2003?

    1,Netdiag.exe

    2,Ntfrsutl.exe

    3,Ldifde.exe

    4,Dcdiag.exe

    40 You are working as a system administrator at Countryside Markets. The

    management has asked you to centralize the network administration in the

    organization. To centralize the network administration for Countryside

    Markets, you have implemented Windows Server 2003 Active Directoryinfrastructure in the network. Now, employees are complaining that they

    are facing connectivity problems. You notice that the problems are

    occurring while registering with DNS service.

    What can be the possible cause of the problem?

    1,Active Directory database is corrupt

    2,DNS record not exist

    3,Active Directory database size has increased

    4,Folders are not redirected

  • 7/30/2019 82 cau hoi on Q7

    14/28

    41 You are working as the system administrator at the Paris branch of Red

    Sky IT Systems. You have created an Active Directory forest in your

    organization. You have also created groups and placed the users in

    specific groups. In addition, you have assigned all the operation master

    roles to the first domain controller in the forest and stored the globalcatalog only on that domain controller. However, you are unable to

    identify the groups of various users. Which operation master role do you

    need to transfer, to solve this problem?

    1,Domain naming master role

    2,Primary Domain Controller (PDC) emulator master role

    3,Schema master role

    4,Infrastructure master role

    42 You are working as a system administrator at LMN Inc. You have to

    configure security for multiple computers in one step and ease the task of

    domain administration. You have configured the security template and

    now, you want to apply the security. What action will you perform to

    apply the security?

    1,Security template will be applied automatically.

    2,Import Security template to a local Group Policy

    3,Import Security template to an existing GPO

    4,Import Security template to a domain controller

    43 You are the system administrator at Blue Moon Computers. The ITdepartment members are working on the trusted software of the company.

    You need to configure security and startup settings for services running

    on the system to prevent from any unauthorized access and severe damage

    to the software. This enables you to determine the user or group that is

    having ownership permission for the system service. Which security

    policy do you need to use to perform the given task?

    1,System Services policy

    2,User rights assignment policy

    3,Account lockout policy4,IP Security Policy

  • 7/30/2019 82 cau hoi on Q7

    15/28

    44 Which command-line tool performs a series of tests to determine the state

    of network clients?

    1,Netdom.exe

    2,Nltest.exe

    3,Ntfrsutl.exe4,Netdiag.exe

    45 You are a member of network security team of your organization. The

    security administrator wants you to apply STRIDE model to the existing

    network and prepare a threat model plan. What is the sequence of

    activities you should follow?

    1,1. Threat modeling 2. Threat prediction 3. Threat mitigation

    2,1. Threat mitigation 2. Threat modeling 3. Threat prediction

    3,1. Threat modeling 2. Threat prediction 3. Threat mitigation

    4,1. Threat prediction 2. Threat modeling 3. Threat mitigation

    46 You are a member of the network risk management team of your

    organization. Which of the following activities should you perform before

    you can manage the risks?

    1,Quantitative analysis of risks

    2,Qualitative analysis of risks

    3,Both quantitative and qualitative analysis of risks

    4,Tracking changes in risk conditions

    47 John Barrett works as a graphics designer at Good Graphics Inc. John

    needs to frequently access the Internet to acquire ideas to create new

    designs. John also downloads the required files from the Internet.

    Recently, John has observed that the files that he creates during the day

    are deleted at the end of the day. John does not allow any other user to

    access his system and is sure that he is loosing the files because of some

    malicious software. Which of the following malicious software can be

    responsible for deleting the files on Johns system?

    1,Trap door2,Logic bomb

    3,Trojan horse

    4,Zombie

  • 7/30/2019 82 cau hoi on Q7

    16/28

    48 Steve Irving is working as a network security designer at Smart Software

    Developers. The company deals in software products, and has its head

    office at Washington. The company has an existing Windows Server 2003

    infrastructure implemented in the network. The management has asked

    Steve to implement Windows Server 2003 security policy in the networkto provide security to the company network. For this, Steve decides to

    implement a risk management strategy in which he will remove the source

    of the risk. Which strategy has Steve planned?

    1,Transfer

    2,Avoid

    3,Mitigate

    4,Accept

    49 The Blue Moon Computers deals with the computer hardware products.

    The company has allowed its clients to access the database. However, the

    organization does not want to expose all the information in the database to

    the client. Also, the organization wants to give its clients only read

    permissions. Therefore, the management has appointed Donna Bard as a

    security designer to secure the access to the database of the organization.

    Donna is instructed to take care that only authenticated users have access

    to the database. She is also required to keep the database of Blue Moon

    Computers safe from malicious users who keep trying with various

    possible passwords to get the correct password. Which mitigation

    techniques should Donna Bard use to secure the database?1,Secure communication and Authorization

    2,Authorization and Auditing

    3,Authorization, Auditing and Secure communication

    4,Least privileges, Auditing and Authentication

  • 7/30/2019 82 cau hoi on Q7

    17/28

    50 Don Allen works as a network administrator at the head office of

    Technology Systems. The company is selling its products through a

    network of distributors. To reduce the cost of selling computer parts, the

    company decides to directly sell the computer parts to the end user

    through an e-commerce Web site. The e-commerce Web site is hosted atthe companys Web server at Atlanta. In order to purchase a productfrom the Web site, a user has to register itself with the Web site. The

    company wants to secure the network and identify the security threats to

    the various resources of the network. Therefore, Don is required to plan

    the management of risk to an asset, which includes creating risk

    management strategy and contingency plans. Don has calculated that

    ALE of a risk to an asset is more than the value of the asset. Now, he

    wants to apply a strategy to mitigate the risk. Which strategy should Don

    Allen implement?

    1,Mitigate

    2,Accept

    3,Avoid

    4,Transfer

    51 The Technology Systems wants to identify the threats to network security

    in order to protect its network from hackers. The company has noticed

    some malicious operations in the network. The company has implemented

    threat modeling, which provides a systematic methodology to recognize

    and categorize threats according to their impact on network security. JimLewis, a security designer has been assigned the task to verify and collect

    the information regarding the stage in which the attacker is still

    performing. Jim has collected the information that the attackers are trying

    to retrieve the information about the ports and devices of the organization

    that are accessible remotely. The attackers are also trying to identify the

    vulnerabilities in the network security. Jim has informed the company

    about the stage of the threat. Now, the company wants to counter the

    threat using security measures. In which stage of the threat should the

    company implement the security measures?1,Elevation of privilege

    2,Footprint

    3,Penetration

    4,Cover-up

  • 7/30/2019 82 cau hoi on Q7

    18/28

    52 The Blue Moon Computers wants to provide security to the network from

    the malicious users and hackers. The company has identified security

    threats and created a team to analyze the threats. The company wants to

    implement a proper strategy to manage risks to network security to avoid

    losses due to the risks. Before creating a risk management strategy, all theassets of network are identified and secured properly. The company has

    appointed Jim Lewis to perform the task of managing risk, which involves

    performing qualitative and quantitative analysis of risks. Jim has

    calculated the ALE of a risk to an asset and compared it with the value of

    the asset. Now, after quantitative analysis he is required to plan the

    management of the risk. Therefore, Jim Lewis has used Antivirus

    software to protect the asset. Which strategy did Jim Lewis apply to

    manage the risk?

    1,Transfer

    2,Mitigate

    3,Avoid

    4,Accept

    53 You are configuring auditing of the CA using CA audit properties page.

    Which option should you enable to set restrictions on certificate

    managers?

    1,Issue and manage certificate requests2,Change CA security settings

    3,Change CA configuration

    4,Start and stop certificate services

  • 7/30/2019 82 cau hoi on Q7

    19/28

    54 Consider the following statements:

    Statement A: Root enterprise CA is integrated with Active Directory.

    Statement B: Subordinate enterprise CA can be installed on WindowsServer 2003 or Windows Server 2000 server that is a member of the

    Active Directory domain.

    Which of the following is true about the above statements?

    1,Both statements A and B are correct.

    2,Both statements A and B are incorrect.

    3,Statement A is correct while statement B is incorrect.

    4,Statement A is incorrect while statement B is correct.

    55 You are the CA administrator of your organization. Which of the

    following are your responsibilities:

    Renewing certificates.

    Reactivating certificates placed on hold.

    Approving and denying certificate enrolment request.1,1 and 2

    2,2 and 3

    3,1 and 3

    4,1, 2, and 3

  • 7/30/2019 82 cau hoi on Q7

    20/28

    56 Consider the following statements:

    Statement A: A certificate cannot be revoked before the end of its validity

    period.

    Statement B: CRL includes policies for revocation of certificates.

    Which of the following is true about the above statements?

    1,Both statements A and B are correct.

    2,Both statements A and B are incorrect.

    3,Statement A is correct while statement B is incorrect.

    4,Statement A is incorrect while statement B is correct.

    57 Corrine Wallace is working as the Network Administrator at Blue Moon

    Computers. Corrine has configured a Windows Server 2003 based LAN

    and has implemented security mechanisms to secure the LAN. Corrine

    needs to update the network security to keep it secure against network

    security threats. Corrine needs to deploy security patches using Security

    Update Services (SUS) server. Corrine needs to design the security update

    strategy to secure the SUS server. For this, Corrine has identified the

    changes that require updating the security of the LAN. What should

    Corrine do to design the security update strategy?1,Use Automatic Update

    2,Use Group Policy

    3,Use custom scripts

    4,Use Windows Update

    58 Which of the following is an IPSec sub protocol for providing data

    integrity?

    1,Kerberos Protocol

    2,Authentication Header3,IPSec Key Exchange

    4,Encapsulating Security Protocol

  • 7/30/2019 82 cau hoi on Q7

    21/28

    59 Which of the following protocols can be used to provide data

    integrity?

    1,AH

    2,ESP

    3,MD54,IP

    60 Which of the following protocols should be used if highest level of

    security is required for a VPN connection?

    1,UDP

    2,L2TP/IPSec

    3,PPTP

    4,PPP

    61 You are the network administrator of your organization. The organization

    is implementing 802.1x standard on its wireless network. Which of the

    following infrastructure changes could be required, and why?

    1,Upgradation of wireless network adaptor to enable 802.1x

    authentication standard.

    2,PKI implementation to provide mutual authentication using PEAP-EAP.

    3,Uninstallation of PKI because 802.1x standard is sufficient to provide

    authentication to RADIUS server clients.

    4,Configure remote access policies on RADIUS server to authenticate

    clients against Active Directory.

    62 Consider the following statements:

    Statement A: 802.11a has a connection speed up to 54 Mbps and radio

    frequency of 2.4 GHz.

    Statement B: 802.11b has a connection speed up to 54 Mbps and radio

    frequency of 5 GHz.

    Which of the following is true about the above statements?

    1,Both statements A and B are correct.

    2,Both statements A and B are incorrect.

  • 7/30/2019 82 cau hoi on Q7

    22/28

    3,Statement A is correct while statement B is incorrect.

    4,Statement A is incorrect while statement B is correct.

    63 Consider the following statements:

    Statement A: 802.11i uses Wired Equivalent Privacy protocol for data

    encryption.

    Statement B: 802.11i uses Extensible Authentication Protocol for data

    authentication.

    Which of the following is true about the above statements?

    1,Both statements A and B are correct.

    2,Both statements A and B are incorrect.

    3,Statement A is correct while statement B is incorrect.

    4,Statement A is incorrect while statement B is correct.

  • 7/30/2019 82 cau hoi on Q7

    23/28

    64 Jim Lewis, the Network Administrator at Global Systems Inc. has set up a

    wireless network to facilitate the communication between the

    organization and its clients. The wireless network was set up using the

    802.11a standard and it was efficiently supporting the communication

    needs. Recently, the company has observed that confidential data is beingmodified during transmission. Therefore, Jim needs to implement

    enhanced encryption and authentication techniques in the wireless

    network. How can Jim perform this task?

    1,Using 802.1x protocol.

    2,Deploying firewall on wireless client computers.

    3,Using WiFi Protected Access.

    4,Using baseline security templates.

    65 Tom works as the Network Administrator at Blue Moon Computers. Tom

    needs to set up a wireless network, which has a connection speed of 54

    mega bits per second (Mbps). The wireless network should support a

    radio frequency of 2.4 giga hertz (GHz). Tom is also required to provide

    security to the wireless network by providing authentication and

    encryption features in the above network. Which standard should Tom use

    to set up the wireless network?

    1,Use 802.1x standard

    2,Use 802.11b standard

    3,Use 802.11g standard

    4,Use 802.11i standard

    66 David is appointed as the System Administrator in Global Systems Inc.,

    which is an international call center. The employees of the call center

    need to frequently exchange data with the customers. David needs to set

    up a wireless network to facilitate the exchange of data. It is required that

    the wireless network has a connection speed of 54 mega bits per second

    (Mbps) and supports a radio frequency of 2.4 gigahertz (GHz). David also

    needs to use Temporal Key Integrity Protocol (TKIP) and Extensible

    Authentication Protocol (EAP). What will you do to meet therequirements of Global Computers Ltd?

    1,Use WiFi Protected Access (WPA)

    2,Use shared key authentication

    3,Use open system authentication

    4,Use Wired Equivalent Privacy (WEP)

  • 7/30/2019 82 cau hoi on Q7

    24/28

    67 Ed Young is working as the Network Engineer at the New York branch of

    Red Sky IT Systems. The organization has recently established another

    branch at Chicago. The employees of both the branches need to exchange

    data frequently. Therefore, the management has asked Ed Young toestablish a wireless network. Ed Young has implemented a wireless

    network in order to meet the business requirements of Red Sky IT

    Systems. Ed Young has used the 802.11a standard to set up the wireless

    network and the employees were able to exchange data efficiently.

    However, recently the employees have they are receiving corrupted data.

    What can be the possible reason?

    1,EAP-TLS protocols were not used to implement the wireless network.

    2,An unauthorized user has gained access to the access point.

    3,The 802.11a standard does not ensure security of data.

    4,The signals are transmitted in all directions in wireless networks.

    68 Which of the following servers is used to resolve NetBIOS names to their

    corresponding IP addresses?

    1,DHCP

    2,WINS

    3,DNS

    4,IAS

    69 Which of the following is a predefined security template provided byWindows Server 2003?

    1,Root.inf

    2,Secure.inf

    3,Hisecws.inf

    4,Compat.inf

    70 server can be configured as RADIUS server, RADIUS

    proxy, or both.

    1,IIS2,IAS

    3,DNS

    4,WINS

  • 7/30/2019 82 cau hoi on Q7

    25/28

    71 Security templates can be used to define which of the following security

    settings in a GPO?

    1,Server

    2,System root

    3,Domain Controller4,Event log

    72 BlueVelly Inc. publishes computer and IT related books and has its head

    office at Chicago. The company also sells the books through a network of

    distributors. The CEO of the company John Major wants to reduce

    advertisement costs by using an e-commerce Web site. John has Chris, the

    Web administrator, to design an e-commerce Web site and host it on the

    IIS Web server at Chicago. John has also asked Chris to ensure that only

    registered users are allowed to buy the books from the Web site and

    Active Directory accounts are available for all the users in the Active

    Directory database. Which type of mapping should Chris use to meet the

    requirements mentioned by the CEO?

    1,IIS Mapping

    2,DS Mapping

    3,One-to-One Mapping

    4,Many-to-One Mapping

    73 Red Sky IT Systems has launched an e-commerce Web site to increase

    the sales of computer parts. The Web site is hosted on InternetInformation Server (IIS) at the head office at Atlanta. It displays all the

    information related to the computer parts, such as product name, price,

    and model name. Chris, the Web Administrator at Red Sky IT Systems

    has also installed various Web applications on the IIS server. Chris needs

    to secure these Web applications. Chris has already designed the

    strategies to monitor the IIS server. What should Chris do next in order to

    secure the Web applications and control access to the IIS server?

    1,Create a baseline security for the IIS server

    2,Use IPSec3,Use SSL

    4,Manage IIS specific logs

  • 7/30/2019 82 cau hoi on Q7

    26/28

    74 Jim Lewis is working as the senior Network Administrator at PQR

    Chemicals Inc, USA. The organization has decided to collaborate with

    AB Pharma Ltd, England to do research and development. Both the

    organizations need to access common folders on the network. Jim Lewis

    needs to identify a method to make the users of both the organizationsaccountable for the data they are accessing and keep a record of all the

    users accessing the data. Which is the ideal authentication method to

    perform the task?

    1,SSL and User Certificates

    2,SSL and VPN

    3,SSL and IPSec

    4,IPSec and User Certificates

    75 James works as a Network Administrator at RedSky Inc. The organization

    has a LAN, which is configured using Windows Server 2003 operating

    system. James has created a Web site for his organization that runs on an

    IIS server. The management has planned to display confidential

    information on the organizations Web site. Therefore, James needs toidentify the users visiting the Web site using Kerberos authentication.

    How can James perform this task?

    1,Using the anonymous authentication method

    2,Using the Windows integrated authentication method

    3,Using the SSL authentication method

    4,Using the basic authentication method

    76 Larry Williams is the System Administrator at Supersoft2000, which is

    working on a confidential project. The LAN of the company is based on

    Windows Server 2003 platform and is not fully secure. The company has

    asked Larry to ensure that only authorized users are permitted to access

    the files and folders. Therefore, Larry needs to design an access control

    model. He also needs to ensure that all the files contained in the My

    Documents folder of the users have the same permissions as that of the

    My Documents folder. Which principle should Larry use to perform thistask?

    1,Discretionary access control

    2,Administrative privileges

    3,Inheritance of permissions

    4,User-based authentication

  • 7/30/2019 82 cau hoi on Q7

    27/28

    77 Ed Young is working as the System Administrator at Blue Moon

    Computers. The company has asked him to take regular backup of the

    files and folder created by the users. Ed Young has configured a file

    server to implement the backup and recovery operations efficiently. Healso needs to store encrypted files on the file server to provide data

    security. Ed Young needs to design server side storage for EFS to store

    encrypted files on the file server. While designing the server side storage

    for EFS, which aspect should Ed Young consider?

    1,Using local profile on the server

    2,Securing data transport

    3,Securing back-up data media

    4,Designing backup and recovery procedures

    78 Global Systems Inc.has recently set up three new departments, including

    Sales, Marketing, and IT. The organization has a LAN, which is based on

    Windows Server 2003 platform. All the computers in the LAN are a part

    of an Active Directory domain. Jim Lewis, the Domain Administrator, at

    Global Systems Inc., has delegated administrative rights to the system

    administrators of the existing departments. He needs to delegate the

    administrative rights to the system administrators of the newly set up

    departments. How should Jim begin assigning the administrative duties?

    1,By creating organizational units for the newly set up departments using

    Active Directory Domains and Trusts console.2,By creating organizational units for the newly set up departments using

    Active Directory Users and Computers console.

    3,By delegating the administrative duties to the system administrators of

    the newly set up departments using Active Directory Users and

    Computers console.

    4,By delegating the administrative duties to the system administrators of

    the newly set up departments using Delegation of Control Wizard.

  • 7/30/2019 82 cau hoi on Q7

    28/28

    79 Steve Irving, the Domain Administrator, at Red Sky IT Systems, needs to

    assign the administrative duties to the system administrators of the newly

    set up departments, including Sales, Marketing, and IT. Steve has created

    Organizational Units (OUs) for the newly set up departments. He has

    selected some users and he needs to enable these users to access andcontrol Active Directory objects. What step should Steve perform next in

    order to enable the selected users to access and control Active Directory

    objects?

    1,Create customized consoles for the selected users.

    2,Design object permission structure for the newly formed OUs.

    3,Design permissions for the Active Directory objects.

    4,Identify the groups that the selected users belong to.

    80 You are working as the System Administrator at Safest Software Co. You

    have configured an Active Directory domain in your organization using a

    single domain controller. You have implemented auditing on the domain

    controller to determine whether it is accessed by unauthorized users.

    However, the performance of the domain controller has degraded. You

    need to monitor only specific events in order to improve the performance

    of the domain controller. How can you perform this task?

    1,By setting audit policies.

    2,By using the Performance console.

    3,By using an additional domain controller.

    4,By auditing object access.

    81 You are working as the System Administrator at Global Systems Inc. You

    have configured a Windows Server 2003 based LAN in your organization.

    You have also configured an Active Directory domain in the LAN using a

    single domain controller. You need to manage the users, groups, and the

    resources attached to the domain controller. How can you perform this task?

    1,By setting audit policies

    2,By delegating control

    3,By using an object-based security model.4,By designing object permission structure