A beta version of an application you’re testing to send and receive data on your network does not seem to be sending compressed data before sending packets across the network. You’re looking at the architecture of the application to see if you can determine where the problem likely originates. Using the OSI model, from where is the problem probably originating?
A. Transport layer
B. Application layer
C. Presentation layer
D. Physical layer
You work in the shipping and receiving warehouse for a small OEM computer supply company called The T-Group. It is your job as a desktop engineer to make sure that all clients are able to log on and authenticate to the corporate office from their NT 4.0 workstations. Currently, your client base of five workstations point to a WINS server at the corporate office to resolve logon and to authenticate to the correct domain controller. You get word that the systems engineering team is converting the functional level of the current Windows Server interim mode Active Directory domain over the weekend. They are raising the domain level to Windows Server native mode. You call the manager of this group and inquire about any changes you may need to make, so that your warehouse clients can still authenticate on Monday. Robert said that nothing would affect logon authentication, and in fact logon should be a lot quicker because he was removing some legacy protocols and services. Nervous about what he meant by this, as he is notorious for abrupt change without the correct research, you sit back and wait. Contrary to what was told to you, on Monday morning none of your NT 4.0 clients could log on. Knowing a little about network resolution, and more about Robert, you have a hunch and try to log on to using your Windows 2000 laptop machine that you built for emergencies. As you suspected, you are able to log on without a problem. You call Robert and ask him if he uninstalled the WINS server because he had heard that Windows Server no longer required NetBIOS. Robert replied, Yes. What can you do to quickly get your workstations logging onto the network again?
A. Distribute an LMHOSTS file using the #PRE and #DOM tags with the name and IP address of the new PDC Emulator and have everybody reboot.
B. Edit the default LMHOSTS file on everybody's workstation and use the #PRE and #DOM tags with the name and IP address of the new PDC Emulator.
C. Install WINS on one of the NT 4.0 workstations and have all your clients point to it.
D. Install a WINS proxy agent on one of your NT 4.0 workstations and have everybody point to it.
You are using WINS Forward Lookup integration in your mixed UNIX/Windows environment to allow your DNS-only UNIX clients to use only their configured Windows Server DNS server to query and resolve resolution requests for downlevel Windows NT 4.0 machines
The president of your company has asked you if VPN technology could benefit the company. What is the greatest benefit provided by VPN?
A. VPN solutions provide secure connectivity at a significant price savings compared to long distance analog or dedicated circuit connections.
B. VPN solutions utilize fewer resources than dedicated circuits or analog connections.
C. VPN solutions provide better remote control capabilities than other third-party alternatives.
D. VPN solutions provide higher speed connections than dedicated circuits or analog connections.
John is the network administrator for a Windows Server network. Software Update Services will be used to deploy updates throughout the network. John wants to deploy the Automatic Updates settings for all clients through a group policy object. He opens the appropriate GPO but cannot find any automatic update settings. What is causing the problem?
A. The settings cannot be configured through a group policy object.
B. John does not have administrative privileges.
C. The Automatic Updates ADM template has not been loaded.
D. Software Update Services has not been installed.
You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. The servers at the ABC.com network run Windows Server and the workstations, Windows XP Professional.
The ABC.com network has a Web server named ABC-SR10 that has the Internet Information Services (IIS) 6.0 installed. ABC-SR10 hosts a Web site that can be reached from the internal network and the Internet. The internal traffic at
ABC.com needs authentication without a secure protocol to access the Web site; however Internet traffic needs to authenticate with a secure protocol.
What actions must you take to ensure that the all accesses to ABC-SR10 use a secure protocol?
A. You need to configure the log to capture Notification events.
B. You need to apply the hisecdc.inf predefined security template.
C. You need to monitor network traffic and IIS logs.
D. You need to apply a custom security template.
You are working as an administrator for ABC.com. The network consists of a single Active Directory domain named ABC.com. All server run Windows Server and all client computer run Windows XP Professional.
The ABC.com departments are organized into organizational units (OUs). The Administration OU is named ABC_ADMIN, and the Sales OU is named PABC_SALES. All file servers for all departments are located in their respective OUs. The ABC_SALES OU is a child OU of the ABC_ADMIN OU. A new ABC.com written security policy states that servers in the ABC_ADMIN OU should be highly secure. All communications with ABC-ADMIN servers should be encrypted. The security policy also states that auditing should be enabled for
file and folder deletion on Sales servers. Communications with the Sales servers should not be encrypted. How should you configure Group Policy for the ABC_Admin and ABC_Sales OU? (Choose three.)
A. Configure a GPO to apply the Hisecws.inf security template. Link this GPO to the ABC_ADMIN OU.
B. Configure a GPO to enable the Audit object access audit policy on computer objects. Link this GPO to the ABC_SALES OU.
C. Configure a GPO to apply the Hisecws.inf security template. Link this GPO to the ABC_Sales OU.
D. Configure a GPO to enable the Audit object access audit policy on computer objects. Link this GPO to the ABC_ADMIN OU.
E. Block group policy inheritance on the ABC_ADMIN OU.
F. Block group policy inheritance on the ABC_SALES OU.
You are working as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com which contains Windows Server servers Windows XP Professional client computers.
You want to improve network security and need to pinpoint all computers that have the known vulnerabilities.
What should you do to automate the process of collecting information on existing vulnerabilities for each computer, on a nightly basis?
A. By scheduling secedit to compare the security settings with a baseline and run on a nightly basis.
B. By installing Anti-Virus software on the computers and configuring the software to update on a nightly basis.
C. By configuring a scheduled task to run the mbsacli utility on a nightly basis.
D. By having Microsoft Baseline Security Analyzer (MBSA) installed on a server on the network.
E. By configuring Automatic Updates to use a local SUS server and run on a nightly basis.
F. You configuring Automatic Updates to run on a nightly basis and use the Microsoft Updates servers.
The ABC.com network consists of a single Active Directory domain named ABC.com. All computers on the ABC.com network are members of the ABC.com domain.
You install a new server named ABC-CA1 and configure it as a Certification Authority for the ABC.com domain.
How would you enable an Active Directory global group named CA-Admins to issue, revoke and approve certificates without assigning more permissions than necessary?
A. Make the CA-Admins group also members of the Domain Admins group in the domain.
B. Make the CA-Admins group also members of the local Administrators group on ABC-CA1.
C. Grant the CA-Admins group Full Control permission to the Certificated Template container in the Active Directory.
D. Make the CA-Admins group members of the Cert Publishers group in Active Directory.
E. Grant the Certificate Managers role to the CA-Admins group.
The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server and all client computers run Windows XP Professional. The ABC.com network contains an application server named ABC-SR20.
You had to reboot ABC-SR20 after you installed a new service on it but the logon screen was not displayed once ABC-SR20 has rebooted. Your attempts to restore the server by using the Last Known Good Configuration and Safe Mode startup options also fail. You restore ABC-SR20 from backup. After later researching the problem, you discover that the service you installed was not compatible with a driver.
How could you configure the servers to enable you to recover from this type of failure as quickly as possible if this type of problem happens again?
A. By checking the hardware compatibility list before installing the service.
B. By installing the Recovery Console on the servers.
C. By configuring Automated System Recovery (ASR) backups.
D. By configuring the server hard disks in a RAID system.