Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/28

Click to flip

28 Cards in this Set

  • Front
  • Back
Your network consists of one Ethernet segment and one Token Ring segment. Both segments must use a single WAP for Internet access. What steps must you take to allow both the Ethernet and Token Ring segments to share a single WAP?


a. Install the Ethernet relay agent on the Token Ring segment.
b. Create a bridged network connection on a server that connects to the wireless network, the Ethernet network, and the Token Ring network.
c. Install two WAPs, one for the Ethernet segment and one for the Token Ring segment. Then create a bridged connection between the two wireless points.
d. No additional action is required. The WAP will recognize both segments by default.
b. Create a bridged network connection on a server that connects to the wireless network, the Ethernet network, and the Token Ring network.

EXPLANATION: When you enable bridging on a network connection, all points that enter the server appear to be on the same network. In this scenario, a bridged connection should be configured on a server that connects to all three types of networks.
You install a new application, which reports that it is installing a service on the computer. However, when you run the application for the first time, it is unable to start. You inspect the event log to determine the nature of the problem. You receive an error stating, “The service did not start due to a logon failure.” What should you do?


a. Grant the account the Log On As A Service right.
b. Change the password to the same name as the account.
c. Verify that the username of the account that is attempting to run the service is the correct user account.
d. Grant the account administrative rights.
c. Verify that the username of the account that is attempting to run the service is the correct user account.

EXPLANATION: When a new application does not start and a logon failure error is written to the event log, you should verify the name of the account that is being used to run the application. The account must have the Log On As A Service right.
As a network administrator, you are concerned about which ports on your servers are listening for connections. How can you determine which ports on a computer are listening for a connection?


a. Enter netstat -o at the command prompt.
b. Use Network Monitor to capture all of the packets sent and received by the server.
c. Use the Performance console to capture statistics about listening ports.
d. Enter netstat -a at the command prompt.
d. Enter netstat -a at the command prompt.

EXPLANATION: Netstat -a lists all ports that are listening for a connection as well as which applications are using each port.
Which command issued by the Repair feature clears the DNS cache on the computer?

a. Netstat -c
b. Ipconfig /clearcache
c. Ipconfig /flushdns
d. Ipconfig /registerdns
c. Ipconfig /flushdns

EXPLANATION: The Repair feature issues the Ipconfig /flushdns command, which clears the Domain Name System (DNS) cache on the computer on which the command is issued. The Repair feature also issues the Ipconfig /registerdns command, which registers the computer name with the DNS server.
Which tool could be used to determine which application or applications are utilizing the processor the most?

a. Network Monitor
b. Task Manager
c. Performance console
d. System Monitor
b. Task Manager

EXPLANATION: This information can be viewed using the Processes tab in Task Manager. The CPU column displays the percentage of the processor each process is using.
Which command can be issued at the command line to determine the IP configuration of a particular computer?


a. Netstat -a
b. NetDiag
c. Ipconfig /all
d. Ipconfig /view
c. Ipconfig /all

EXPLANATION: (Discussion starts on page 293.)
You are the network administrator for the Contoso domain. Your branch office employees connect to the corporate network through a VPN connection to a Microsoft Windows Server 2003 Routing and Remote Access server. How could you monitor the overall performance of the Routing and Remote Access services on your network?

a. Configure Network Monitor to capture packets coming from the Routing and Remote Access server.
b. Use Task Manager to monitor the Routing and Remote Access server.
c. Configure System Monitor to monitor the RAS Total performance object.
d. Configure System Monitor to monitor the RAS Port performance object.
c. Configure System Monitor to monitor the RAS Total performance object.

EXPLANATION: System Monitor can be used to monitor a wide range of networking and non-networking objects. To monitor the overall performance of the Routing and Remote Access service, the RAS Total performance object must be added. The RAS Port performance object monitors only a specific Routing and Remote Access port.
Most services that are installed by Microsoft Windows Server 2003 run under which account?


a. The local administrator account
b. The Local System account
c. The Domain System account
d. The Local Service Operator account
b. The Local System account

EXPLANATION: Most services installed by Windows Server 2003 use the Local System account to start and stop. Services installed by other Microsoft operating systems or third-party applications can use other accounts.
Which of the following would not prevent DHCP information from being delivered to client computers?


a. The DHCP relay agent does not exist on segments without a DHCP server.
b. Addresses are not available in the DHCP scope.
c. The DHCP server is not running.
d. The router is 1542-compliant and is configured to allow DHCP broadcasts to pass through.
d. The router is 1542-compliant and is configured to allow DHCP broadcasts to pass through.

EXPLANATION: Answers a, b, and c are all issues that would prevent Dynamic Host Configuration Protocol (DHCP) traffic from being delivered to the client. Answer d, however, is the option that allows DHCP traffic to cross the router and allows a response to be returned to the client.
Which performance object should you monitor if you would like to capture information related to TCPv4 connections?

a. Network Interface object
b. TCPv4 object
c. TCP/IP object
d. NBT Connections object
b. TCPv4 object

EXPLANATION: The TCPv4 counter can be used to capture statistics related to Transmission Control Protocol version 4 (TCPv4) connections.
You have a server on your network that has experienced a reduction in performance. Using the Performance console, you determine that the server has an unusually high Pages/Sec counter. What should be done to resolve this issue?

a. Increase the amount of hard disk space on the server.
b. Increase the amount of RAM in the server.
c. Decrease the size of the paging file on the server.
d. Install a 100-MB network interface card in the server.
b. Increase the amount of RAM in the server.

EXPLANATION: A consistently high Pages/Sec counter usually indicates that there is not enough random access memory (RAM) in the computer.
Your clients can access internal resources by FQDN. However, they are experiencing difficulty accessing Internet Web sites by FQDN; they can access Web sites by IP address. Which of the following is a possible cause of this problem?

a. Your DNS server does not have a forward lookup zone configured.
b. Your DNS server does not have a reverse lookup zone configured.
c. Your DNS server is not configured to forward queries that it cannot resolve.
d. Your DNS Server service is not started.
c. Your DNS server is not configured to forward queries that it cannot resolve.


EXPLANATION: When name resolution problems occur outside of your network, the problem is most likely related to the ability of Domain Name System (DNS) servers to forward queries that they cannot resolve.
Which service must be started on a computer for the computer to send a message triggered by a performance alert?

a. The Messenger service
b. The Alerter service
c. The Net Send service
d. The Mail service
b. The Alerter service

EXPLANATION: (Discussion starts on page 284.)
You have created an alert using the Performance Logs And Alerts snap-in that tracks the percent usage for the Paging File performance object. It is your intention that when the percent usage exceeds the specified limit, you will receive a network message. Several days after configuring the alert, you notice that the Application log in Event Viewer contains several entries indicating that the percent usage for the paging file exceeded the defined threshold, but you did not receive any network messages. Which of the following could be the reason you did not receive a network message when the threshold for the percent usage counter was exceeded?

a. The alert was configured with the default setting in the Action tab.
b. Your e-mail system is not working.
c. The Alerter service is not running on the target computer.
d. You configured the alert but have not started it.
a. The alert was configured with the default setting in the Action tab.

EXPLANATION: The default setting for a performance alert in the Action tab is to log an entry in the Application log when a threshold is exceeded. For the Alerter service to send a message, the Send Message To option must be configured with the name of the computer to which you would like the message sent.
You have configured a performance alert to monitor network usage. You want to be notified if network usage exceeds the specified threshold only during peak work hours, which are 8:00 A.M. until 6:00 P.M. How should you configure the performance alert so that it will alert you only if the counter is exceeded during specific hours?


a. Use the Schedule tab to configure the alert to start at 8:00 A.M. and stop at 6:00 P.M.
b. Use Interval settings to configure the alert to run every 8 hours.
c. Manually start the Alerter service each day at 8:00 A.M., and manually stop the service each evening at 6:00 P.M.
d. Manually start the Messenger service each day at 8:00 A.M., and manually stop the service each evening at 6:00 P.M.
a. Use the Schedule tab to configure the alert to start at 8:00 A.M. and stop at 6:00 P.M.

EXPLANATION: You can use the Schedule tab in the Alerts dialog box to configure an alert to start and stop at a specified time.
You install a new application on a member server. The application reports that it is installing a service on the computer. The installation of the service requests a username and password for which to run the service. You provide a username and password, but, when you attempt to run the application the first time, the application is unable to start. You suspect that the account has not been given sufficient privileges to run the service. What should you do to resolve this problem?

a. On the member server, grant the user account the Log On As A Service right.
b. In the domain, grant the user account the Log On As A Service right.
c. On the member server, grant the user account the Log On As A Batch Job right.
d. In the domain, grant the user account the Log On As A Batch Job right.
a. On the member server, grant the user account the Log On As A Service right.

EXPLANATION: A user account must have the Log On As A Service right on the member server to start a service on the member server.
One of the clients running Microsoft Windows XP on your network is experiencing a network connection problem. To repair the connection, you would like to issue several commands at the command line. With the least amount of administrative effort, how can you automate the process so that several commands are issued automatically on the network connection?

a. Write a batch file that would perform each of the tests.
b. Click the Repair button in the Support tab on the network interface.
c. Issue each of the commands at the command line.
d. Issue each of the commands at the run line.
b. Click the Repair button in the Support tab on the network interface.


EXPLANATION: The Repair feature on the network connection allows you to perform a series of command-line tests as if each were entered individually at the command line. The tests include Arp -d, Nbtstat -R, Nbstat -RR, Ipconfig /flushdns, Ipconfig /renew, and Ipconfig /registerdns.
What step could you take to determine whether your Internet connectivity problem is related to your DNS server not having the correct IP address for a specific host computer?

a. Issue the Nslookup command for the FQDN of the host computer.
b. Ping the IP address of the host computer.
c. Issue the Traceroute command, and specify the IP address of the host computer.
d. Issue the Traceroute command, and specify the FQDN of the host computer.
a. Issue the Nslookup command for the FQDN of the host computer.

EXPLANATION: The Nslookup command can be used to determine whether the Domain Name System (DNS) server has the correct Internet Protocol (IP) address of a specific host. Running this command displays the IP address provided to the client by the default DNS server.
You install a new application, which reports that it is installing a service on the computer. However, when you run the application for the first time, it is unable to start. You inspect the service dependencies of the new service and notice that a required service that the application is dependent on is not started. However, your security policy states that services must remain stopped unless another application requires them to be started. In which state should you configure the dependent service to be?

a. Automatic
b. Automatic, but pause the service
c. Manual
d. Disabled
c. Manual

EXPLANATION: The service start settings should be configured to Manual. When the service is configured to start manually, the service will not start automatically when the system is restarted, but it will start when it is manually started or when another process calls upon it.
Your network users are working on a project that utilizes audio and video files that require an enormous amount of disk space for storage. You must ensure adequate disk space is always available and that free disk space never drops below 30 percent. What action could you take so that you are notified if free disk space drops below 30 percent?

a. Use the Performance Logs And Alerts snap-in in the Performance console to configure an alert that notifies you when free disk space is less than 30 percent.
b. Use Disk Manager in Administrative Tools to create an alert that notifies you when free disk space is less than 30 percent.
c. Use Task Manager to send an alert when free disk space drops below 30 percent.
d. You cannot configure Microsoft Windows Server 2003 to send notification when free disk space reaches a specified amount.
a. Use the Performance Logs And Alerts snap-in in the Performance console to configure an alert that notifies you when free disk space is less than 30 percent.

EXPLANATION: The Alerts feature in the Performance Logs And Alerts snap-in can be used to create an alert that will notify an administrator when a counter reaches a specified threshold. The performance object used in this case would be LogicalDisk and the counter would be % Free Space.
Which command-line tool displays each route between a client computer and a destination IP address?

a. Ping
b. PathPing
c. Netstat -R
d. Route Ping
b. PathPing

EXPLANATION: The PathPing command shows each route between the client and the target and helps an administrator determine which link is not passing the packet on to the next destination.
Your network is experiencing intermittent addressing problems. You notice that sometimes client computers receive incorrect configuration parameters from a DHCP server. Your network is supposed to have only one authorized DHCP server, but you suspect that another DHCP server might be causing this problem. What could you do to discover whether other DHCP servers are authorized on your network?

a. Use the Dhcploc tool that is located in the Microsoft Windows Server 2003 Support Tools.
b. Use the DHCP console on one of the computers that runs Windows Server 2003 to search for all DHCP servers on the network.
c. Run the Ipconfig /dhcp command to list all DHCP servers on the network.
d. Open Active Directory Sites And Services in Administrative Tools, and view the list of DHCP servers on the network.
a. Use the Dhcploc tool that is located in the Microsoft Windows Server 2003 Support Tools.

EXPLANATION: Windows Server 2003 Support Tools contains the Dhcploc command-line tool. The Dhcploc tool can be used to discover which Dynamic Host Configuration Protocol (DHCP) servers are authorized. Some DHCP servers, such as older DHCP servers or non-Microsoft DHCP servers, need not be authorized.
You are concerned about the performance of your network and would like to gather information about the amount and types of traffic that are present on the network. To view the traffic, you install Network Monitor through Add And Remove Programs on your server that runs Microsoft Windows Server 2003. However, you are able to view only traffic that is sent and received by the server. What could you do so that you could view 100 percent of the network traffic available to the network interface?

a. Install the standard version of Network Monitor available in Microsoft System Management Server.
b. Set the server to run Network Monitor in promiscuous mode.
c. Use Task Manager to view the traffic.
d. Set the server to run Network Monitor in verbose mode.
a. Install the standard version of Network Monitor available in Microsoft System Management Server.

EXPLANATION: The version of Network Monitor that comes with Windows Server 2003 is called Network Monitor Lite. This version captures only packets sent to and from a network interface card. The standard version of Network Monitor included in Microsoft System Management Server can be used to capture all of the network traffic that is available to the network interface.
You are the network administrator for Contoso, Ltd. Your network has a single subnet. One user is unable to reach the Internet. However, you can successfully access the Internet, and no other users have indicated that they are experiencing problems with Internet connectivity. Which type of approach should you use when troubleshooting this user’s problem?

a. Outside in
b. Inside out
c. Trial and error
d. Divide and conquer
b. Inside out

EXPLANATION: When a single client on a single subnet experiences a problem accessing the Internet, the most likely cause is a configuration problem on the client. In this situation, an inside-out approach is most appropriate.
Which tool included in Microsoft Windows Server 2003 can be used to quickly assess the amount of bandwidth used by each network connection?

a. Task Manager
b. Performance console
c. Network Monitor
d. Packet Monitor
a. Task Manager

EXPLANATION: The amount of bandwidth used by each network connection can be viewed using the Networking tab in Task Manager.
Which command could be entered at the command line to determine which application is using a particular port?

a. Nbtstat -a
b. Ipconfig
c. Netstat -o
d. Netstat -a
c. Netstat -o

EXPLANATION: The Netstat command-line tool can be used to monitor existing network connections. Netstat -a displays which ports a system is listening on. Netstat -o displays which application or applications are using a particular port.
Microsoft Windows Server 2003 includes which version of Network Monitor?

a. Network Monitor Standard
b. Network Monitor Premium
c. Network Monitor Deluxe
d. Network Monitor Lite
d. Network Monitor Lite


EXPLANATION: (Discussion starts on page 290.)
You are the network administrator for Contoso, Ltd. One of the applications that runs on a member server on your network requires that the Messenger service be started. Periodically, the application generates an error that stops the Messenger service. Your server is configured with the default settings. Which step could you take to allow the server to attempt to correct this problem when it occurs?

a. Configure the server to automatically reboot any time the application generates an error stating that the service had stopped.
b. In the properties of the Messenger service, configure the Recovery option to restart the service when it fails.
c. Manually restart the service whenever an error occurs that stops the service.
d. Write a batch file that will restart all services every 5 minutes.
b. In the properties of the Messenger service, configure the Recovery option to restart the service when it fails.

EXPLANATION: There are four options for how a server handles a service when it fails. The default option is to take no action. The second option, which is the correct choice for this scenario, is to have the operating system attempt to restart the service. The other options are to run a program and restart the computer.