OMRAN'S
CERTIFICATIONS
HQ














B4 THE EXAM
FREE EXAMS
NT TIPS, TIPS
NT DRIVERS
NT TOOLS
ARTICLES
COMPAQ ASE
CCIE-CISCO
NOVELL EXAMS
A+ CERTIFICATE
DRIVERS HEAVEN
WIN98 UTILITIES
FREE BIES
FREE JAVA
FREE GRAPHICS
FREE COUNTERS
FREE GAMES
FREE BANNERS
JOBS AND JOBS
POST UR RESUME
AWARDS
MISC
LINKS AND LINKS
MAIL
VIEW-GUEST-BOOK
SIGN-GUEST-BOOK
HOME





Implementing and Administering MS Win2000 Network Infrastructure

Number: 70-216, Questions: , Passing Score: , Time: .
Testing: Standard

name = Eric
exam = 70-216

This is my dumps. Read it 15 hours and you will be pass. best of luck.


DNS Key points

1.Your network consists of one Win2000 domain named sycom.local. You want to ensure that internal name resolution traffic never passes outside the network. External name request must be handled by an external DNS server. What should you do?

A. Copy the systemroot\system32\dns\samples\cache.dns file to the systemroot\system32\dns\cache.dns file
B. Delete the root zone for your local namespace and configure all internal DNS servers to forward name resolution requests to the external DNS server
C. Install a caching DNS server on the DMZ.
D. Delete the sycom.local.dns file from the systemroot\system32\dns folder and configure all DNS servers to perform only iterative name resolution

Answer:B

2. You are the administrator for your company's Windows 2000 domain. You have a Windows 2000 Server computer that is your Domain Name System (DNS) server. The DNS server contains the following types of resource records:
Start of Authority (SOA)
Name Server (NS)
Address (A)
Point (PTR)
Mail Exchange (MX)
Service (SRV).
You update a host resource record.

Which type of record may be associated with this record and need to be updated also?

A. The associated SOA resource record
B. The associated NS resource record
C. The associated A resource record
D. The associated PTR resource record

Answer:D

3. You are the administrator of your company's network. To allow fault tolerance for your external DNS server, your Internet service provider (ISP) hosts a DNS server on its UNIX server. The UNIX server is used as the secondary DNS server for your primary external DNS server. Users inform you that they are not able to connect to the URL of the company's Web server. You investigate and discover that this inability to connect occurs during times when your primary external DNS server is unavailable.

What should you do to resolve this problem?

To answer, click the appropriate check box in the Advanced tab of the London Properties dialog box

A. In the Server options list select the 'Disable recursion' check box
B. In the Server options list deselect the 'Disable recursion' check box
C. In the Server options list, select the 'Bind Secondaries' check box
D. In the Server options list, deselect the 'Bind Secondaries' check box
E. In the Server options list, select the 'secure cache against pollution' check box.
F. In the Server options list, deselect the 'secure cache against pollution' check box.

Answer:C

4. You are the administrator of one standard primary DNS server and two standard secondary DNS servers in a Windows2000 domain. There are no other DNS servers on the network. The domain includes Windows2000 Professional computers and Windows98 computers. The DNS zones for the domain are configured to allow for dynamic updates. All three DNS servers are located on domain controllers. What should you do to allow client computers to be able to register with any DNS server?

A. Change the zone type of the DNS zone for the Windows2000 domain on all three DNS servers to Active Directory integrated.
B. Change the settings on the standard primary DNS server to notify the two standard secondary DNS servers when the zone is updated.
C. Change the settings on the standard primary DNS server to allow zone transfer to only the two standard secondary DNS servers.
D. Change the dynamic update option on the standard primary DNS server to allow only secure updates.

Answer:A

5. You are the network administrator for Wood grove Bank Your network is configured as shown in the exhibit (Click the Exhibit button) Srv2 and Srv3 are configured as caching-only servers. Both servers forward requests to Srv1 Srv1 is configured as the primary server for the woodgrovebank.com domain. Users on networks 10.10.72.0 and 10.10.73.0 frequently use an Internet application that gathers stock quotes from various servers on the woodgrovebank.com domain You want to reduce DNS network traffic.

What should you do?

A. Increase the Time to live (TTL) for the SOA (start of authority) record on Srv1
B. Increase the Time to live (TTL) for the SOA (start of authority) record on Srv2 and Srv3
C. Set the Server Optimi2ation option on Srv2 and Srv3 to Maximi2e data throughput for network applications
D. Increase the forward time-out seconds on Srv2 and Srv3

Answer:A


6. You are the administrator for your company's Windows 2000 network. Your network contains 7 domain controllers all running Windows 2000 server. Two of the seven domain controllers are configured as DNS servers. The network is divided into 7 subnets and uses TCP/IP as it's only network protocol. The 500 client computers are running Windows 2000 Professional. File sharing is used to grant access to local files. You need to configure the network so all computers can resolve all addressing using DNS Client computers must also be able to continue to register and resolve addresses if a server fails.

How should you configure the DNS servers?

A. Configure one server with a standard zone for the domain and configure at least one server with an active directory integrated primary zone.
B. Configure one server with a standard zone for the domain and configure at least one server with an standard secondary zone.
C. Configure at least two servers with Active Directory integrated primary zones for the domain.
D. Configure one server with an active directory integrated primary zone for the domain, and configure at least one server with an standard secondary zone.
E. Configure at least two servers standard primary zones for the domain.

Answer: C

7. Your network consists of three DHCP servers and three DNS servers. The TCP/IP configuration for your Windows 2000 Professional and NT Workstation clients is provided by the DHCP servers. All three DHCP servers are configured so that they have scopes for all the computers in the network, and always register and update client computer information on the DNS servers. You configure the DNS zones on all DNS servers to only allow secure updates. After you complete the configuration, you notice the client computer information in the DNS zones is no longer updated correctly after IP changes. What should you do?

A. Add the computer accounts of the three DHCP servers to the DnsUpdateProxy global security group.

Answer: A

8. You are the administrator of your company's network. The network consists of 10 Windows 2000 Server computers, 100 Windows 2000 Professional computers, and 150 Windows NT Workstation computers. For workgroup collaboration and document sharing, all client computers have file and print sharing services enabled. You are using DHCP to automate the TCP/IP configuration of all client computers.

You want to accomplish the following goals:

 All client computers will be able to be located on the network by the network's fully qualified domain name.
 A (host) records for all client computers will be automatically added to the DNS zone files.
 PTR (pointer) records for reverse name lookup for all client computers will be automatically added to the DNS zone files
 A records and PTR records will be automatically removed from the DNS zone files when the DHCP lease expires

You take the following actions:

 Configure the DHCP server to never update client information in DNS
 Configure the DHCP server to discard forward lookups when the lease expires
 Configure the DHCP scope to configure the domain name for all DHCP client computers

Which result or results do these actions produce? (Choose all that apply)

A. All client computers are able to be located on the network by the network's fully qualified domain name
B. A records for all client computers are automatically added to the DNS zone files
C. PTR records for reverse name lookup for all client computers are automatically added to the DNS zone files
D. A records and PTR records are automatically removed from the DNS zone files when the DHCP lease expires

Answer: D

9. You run dcpromo.exe to promote SrvA, a computer running Windows 2000 Server, to the first domain controller for xco.com. You install the DNS service on SrvA. You assign a static IP address to ten Windows 2000 Professional computers and configure the IP address of SrvA as the DNS server for these computers. What should you do to insure that the A records and the PTR records for the computers running Windows 2000 Professional are recorded correctly on SrvA?

A. Enable the zone for xco.com to accept dynamic updates and create a reverse lookup zone for the network and enable the zone to accept dynamic updates.

Answer:A

10. You are the administrator of the contoso.com domain. Your network environment consists of a main office and two branch offices. The branch offices are connected to the main office by 256-Kbps leased lines You have a single DNS zone, and all DNS servers are located at the main office. All servers on your network are running Windows 2000 Server Your network is not connected to the Internet Users report that response times are extremely slow when they attempt to access intranet resources. When you monitor the network, you discover that DNS name resolution queries are generating heavy traffic across the WAN links

You want to accomplish the following goals:

 Name resolution traffic across the WAN links will be reduced
 Response times for name resolution queries will be reduced
 Administrative overhead for DNS maintenance will be minimized
 Current DNS namespace design will be maintained.

You take the following actions:

 Increase the refresh interval for zone transfers.
 For each branch office, create a new Windows 2000 domain in the same tree as the first domain
 Install a DNS server and create a new standard primary DNS zone for each new Windows 2000 domain
 Configure each DNS server to forward requests to the other DNS servers on the network
 Add resource records for each office's local intranet resources to the local zone files
 Configure client computers in the branch offices to query their local DNS servers only

Which result or results do these actions produce? (Choose all that apply)

A. Name resolution traffic across the WAN links is reduced
B. Response times for name resolution queries are reduced
C. Administrative overhead for DNS maintenance is minimized
D. Current DNS namespace design is maintained

Answer:A,B,D

11. You are the administrator for your company's weconsult.com domain. Your network consists of a main office and two branch offices. The branches are connected to the main office by 256 Kbps leased lines. You have a single Domain Name System (DNS) zone. All DNS servers are at the main office. All servers are Windows 2000 Server computers. Your network is not connected to the Internet.

Users report that response times are extremely slow when they attempt to access resources on the intranet. When you monitor the network, you discover that DNS name resolution queries are generating heavy traffic across the Wide Area Network (WAN).

You want to accomplish the following goals:

Name resolution traffic across the WAN will be reduced.
Response times for name resolution queries will be reduced.
Administrative overhead for DNS maintenance will be minimized.
Current DNS namespace design will be maintained.

You take the following actions:

Create a new secondary DNS zone at each branch office. Use the primary zone at the main office as the master zone.
Increase the refresh interval for zone transfers.
Configure the client computers to query their local DNS servers.

Which goal or goals are accomplished from these actions? (Choose all that apply.)

A. Name resolution traffic across the WAN will be reduced
B. Response times for name resolution queries will be reduced
C. Administrative overhead for DNS maintenance will be minimized
D. Current DNS namespace design will be maintained


Answer A, B, C, D

12. You want to configure your DNS server to allow users to type a host name in their browsers to connect to the Web server that is on the same subnet. The host name that all users will type in will be identical regardless of the subnet they are on. You have three subnets in your network, and each Web server on your network contains the same content as all of the Web servers. How should you configure your DNS server?

A. On the primary DNS server, create three A (host) records that map the same host name to IP address of the Web server on each subnet.
B. On the primary DNS server, create one A (host) record that is located on the same sub net as the DNS server. On the secondary DNS servers on the two remaining subnets, edit the zone file for the domain on each DNS server to include an A (host) record for the Web server on each subnet
C. On the primary DNS server, create three A (host) records that map a different host name to the IP address of the Web server on each subnet.
D. On the primary DNS server, create one A (host) record for one Web server and two CNAME (canonical name) records for the remaining two Web servers .

Answer:A

13. You are the administrator of your company's network. Your primary internal DNS server is installed on a UNIX computer named ns1 contoso.com. The ns1 contoso.com server is configured to send zone transfers to a secondary DNS server installed on a Windows 2000 Server computer named ns2 contoso.com. The ns1 contoso.com server is also configured to send zone transfers to a DNS server installed on a Windows NT Server 4.0 computer named ns3contoso.com. When you examine the records the zone file on the ns2contoso.com server, you notice that they do not match the records found on either the ns1 contoso.com server or the ns3contoso.com server.

What should you do to correct this problem? (Choose all that apply)

A. Install the DNS Server service on a separate Windows 2000 Server computer on your network
B. Create sub zones on the UNIX DNS server.
C. Delegate the sub zones that contain the SRV (service) records to a separate DNS server
D. Configure the primary DNS server so that only the root zone is transferred to the Windows 2000 DNS server.
E. Configure the WINS resource records so that they are not replicated to secondary name servers
F. Clear the Fail on load if bad 2One data check box in the properties of the primary DNS server
G. Change the zone on the primary DNS server from an Active Directory integrated zone to a standard primary zone.

Answer: A

14.You have three Win2000 domain controllers in a single domain. Your primary DNS server is installed on a domain controller named dc1.sycom.com. You have two secondary DNS servers installed on member servers named srv1.sycom.com and srv2.sycom.com. You want to increase fault tolerance for your DNS infrastructure. You also want to optimize and simplify replication and zone transfer management on your network. What should you do? (choose all that apply)

A. Remove the DNS service from the member servers
B. Install DNS on at least 2 more domain controllers.
C. Convert the zone to an Active Directory integrated zone.
D. Promote one of the secondary DNS servers to a primary server and have it host a new zone.
E. Configure secure updates for your zone transfers

Answer:A, B, C

15. You are the administrator of your company's network. The network consists of a single Windows 2000 domain that spans multiple locations. The locations are connected over the Internet by using Routing and Remote Access. Resources are located on TCP/IP hosts on your network. To facilitate name resolution for client access to these resources, you implement Windows 2000 DNS servers on your network. You want to ensure that when the zone transfer traffic between your DNS servers crosses the Internet links between the locations, it cannot be compromised by outside parties. What should you do?

A. Select the option to allow zone transfers only to servers listed on the Name Servers tab.
B. Set up an Active Directory integrated zone
C. Set the Allow Dynamic Updates setting for your zone to No
D. Set the Allow Dynamic Updates setting for your zone to Only Secure Updates

Answer: A

16. You manage Srv1, a computer running Windows 2000 Server that has two network adapter cards, one connected to the Internet and one connected to your internal network. You install NAT protocol to provide Internet access to client computers. Srv1 and the client computers are located at one of your remote offices. When configuring NAT, you choose "Resolve IP addresses for clients using DNS". What else should you do?

A. The network adapter connected to the Internet should be configured with the address of a DNS server.

Answer. A

17. You administer your company's Windows 2000 network. Your network consists of 5 Windows 2000 Server computers, 300 Windows 2000 Professional computers, and 10 UNIX servers. One of your Windows 2000 Server computers is your DNS server. The DNS zone is configured as an Active Directory integrated zone. The DNS zone is also configured to allow dynamic updates.

Users report that although they can access the Windows 2000 computers by host name, they cannot access the UNIX servers by host name.

What should you do?

A. Manually enter A (host) records for the UNIX servers in the zone database
B. Manually add the UNIX servers to the Windows 2000 domain
C. On the DNS server, manually create a HOSTS file that contains the records for the UNIX servers
D. Configure a UNIX computer to be a DNS server in a secondary zone

Answer: A

18.You are the network admin for Comtoso. The network consists of three Windows 2000 Domains (exhibit). To distribute administrative control of the DNS namespace, you use a single standard primary DNS zone to handle all name resolution for the three domains. User report that name resolution for hosts in all three domains has been extremely slow. You want to correct this problem while still maintaining centralized administrative control. What should you do?

A. Create a new primary zone for the East domain. Create a new primary zone for the West domain.
B. Create a new secondary zone for the East domain. Create a new secondary zone for the West domain.
C. Create a new Active Directory integrated zone for the East domain.
Create a new Active Directory integrated zone for the West domain.
D. Create a delegated zone for the East domain. Create a delagated zone for the West domain.

Answer: B

19. You are the administrator of a Windows 2000 network. Your network has one primary internal DNS server and one primary external DNS server. Your network has three secondary DNS servers that transfer zone information from the primary external DNS server. The secondary DNS servers are installed on two Windows 2000 Server computers and one Windows NT Server 40 computer. The primary external DNS server is used to host records for your company's Web and mail servers. It has only a limited number of resource records in its zone file. The Web server and the mail server have static IP addresses. When you monitor the secondary DNS servers by using System Monitor, you notice a high number of hits when monitoring the counter DNS Zone Transfer SOA Requests Sent. You want to minimize the bandwidth that is required for this traffic

What should you do? (Choose three)

A. Upgrade the Windows NT Server 40 computer that is hosting the secondary
DNS server to a Windows 2000 Server computer
B. Configure the notify list on the primary external DNS server to notify
the secondary DNS servers when there are changes to be replicated.
C. Reconfigure the primary external DNS server so that it does not allow dynamic updates
D. Increase the value of the Refresh interval in the SOA (start of authority) record
E. Decrease the value of the Refresh interval in the SOA (start of authority) record


Answer: A, B, D

20. You are the administrator of your domain. You have client computers evenly distributed across five sites. Atlanta.xco.com recently upgraded its two DNS servers that service the subdomain. You suspect the upgrade has resulted in an incorrect configuration of your zone delegation.

What should you do to verify proper zone delegations?

A. Use System Monitor to confirm that the counters for the DNS zone transfer failure are zero.
B. Use System Monitor to confirm that the counters for the DNS recursive query are zero.
C. Run the nslookup -querytype=ns atlanta.xco.com command with the server option set to query the atalanta.xco.com server. Ping the records displayed in the output of the nslookup command.
D. Run the nslookup -ls -d atlanta.xco.com command. Ping the records displayed in the output of the nslookup command.

Answer:C

21.Your Windows 2000 Server computer is configured with a static IP address. You want to configure the computer as a DNS resolver. What step should you take?.

A. Configure the address of the preferred DNS server in the TCP/IP properties of the Local Area Connection.

Answer:A

22. You are the administrator of your company’s network. The TCP/IP network consists of a single Windows 2000 domain that spans multiple locations. The locations are connected over the internet by use of Routing and remote Access. Windows 2000 DNS servers are used to faciltate name resoultion for client access to resources on the network. Zone transfers between your DNS servers across the internet should be secure and should not be able to be compromised by outside parties.

What should you do?

A. Select the option to allow zone transfers to servers only listed on the Name Servers tab.
B. Configure the active directory integrated zone.
C. Configure the allow Dynamic updates setting for your zone to ‘No’
D. Configure the Allow Dynamic updates setting for your zone to ‘only secure updates’

Answer B

23. You are the administrator of your company's network. The network consists of one Windows 2000 domain. All servers and client computers are running Windows 2000. To facilitate name resolution and client access to resources on the servers, you have configured your DNS standard primary zone to include the addresses of all of your servers. You later add three new member servers to your network. Users report that they can find these servers in the directory but cannot access these servers You want to resolve this problem. What should you do?

A. Convert the DNS standard primary zone to an Active Directory integrated zone
B. Create SRV (service) records for each new server in the DNS zone.
C. Set the Allow Dynamic Updates setting for the DNS standard primary zone to Yes
D. Set the Allow Dynamic Updates setting for the DNS standard primary zone to Only Secure Updates

Answer:A

24. You configure a Win2000 Server as the DNS server for your network. You create both standard primary forward lookup and reverse lookup zones. When you use the NSLOOKUP utility, you cannot resolve host names from IP addresses on your network. When you run TRACERT.EXE you receive the message: "Unable to resolve target system name." What should you do?

A. Configure the DNS to forward requests to an external DNS
B. Install a WINS server and configure DHCP to issue the IP address of the WINS server to all DHCP clients
C. Create a PTR (Pointer) records in the reverse lookup zone
D. Copy the systemroot\system32\dns\cache\samples\cache.dns to systemroot\system32\dns\cache\cache.dns

Answer C

25. You are the administrator of your company's network. The network consists of 10 Windows 2000 Server computers, 100 Windows 2000 Professional computers, and 150 Windows NT Workstation computers. For workgroup collaboration and document sharing, all client computers have file and print sharing services enabled. You are using DHCP to automate the TCP/IP configuration of all client computers.

You want to accomplish the following goals:

All client computers will be able to be located on the network by the network's fully qualified domain name.
A (host) records for all client computers will be automatically added to the DNS zone files.
PTR (pointer) records for reverse name lookup for all client computers will be automatically added to the DNS zone files.
A records and PTR records will be automatically removed from the DNS zone files when the DHCP lease expires.

You take the following actions:

Configure the DHCP server to never update client information in DNS.
Configure the DHCP server to discard forward lookups when the lease expires.
Configure the DHCP server to update DNS for client computers that do not support dynamic updates.
Configure the DHCP scope to configure the domain name for all DHCP client computers.

Which result or results do these actions produce? (Choose all that apply)

A. All client computers are able to be located on the network by the network's fully qualified domain name (FQDN).
B. A records for all client computers are automatically added to the DNS zone files.
C. PTR records for reverse name lookup for all client computers are automatically added to the DNS zone files.
D. A records and PTR records are automatically removed from the DNS zone files when the DHCP lease expires.

Answer A, B, C, D

26. You are the administrator of your company’s Windows 2000 Server Network. Your network is configured as shown in the EXHIBIT. An SMTP management application is installed on W2K_SVR_2. Servers in both Northamerica.com and Europe.com have identical SNMP settings, however the SNMP application cannot manage any server in the Northamerica.com domain. What should you do?

A. Configure all servers with the same domain name
B. Configure an SNMP agent on the Northanerica.com domain
C. Configure all servers with the same community name
D. Configure a DHCP relay agent in the northamerica.com domain

Answer C



DHCP Key points

1. You are the administrator of a large network. At the moment you are using IP 207.200.16.0/24 for multicasting purposes. Your CEO wants to add 2000 PC's to your network, and make sure the current subnet can deal with an extra 2000 workstations. Should you:

A. Change the advertisement branch IP to 207.200.16.0/20
B. Add another subnet ranging from 207.200.33.0 - 207.200.48.0.
C. Add another subnet ranging from 207.200.17.0 - 207.200.24.0,
D. Add another subnet ranging from 207.200.16.0/22 - 207.200.16.0/23

Answer: A, C

2. You are the administrator of a Windows 2000 network. The network consists of a Windows 2000 Server computer named Srv1 and 12 Windows 2000 Professional computers. Srv1 has a dial-up connection that connects to the Internet. Srv1 is configured to use Internet Connection Sharing to allow Internet access through the dial-up connection of Srv1.

The 12 Windows 2000 Professional computers are configured for static TCP/lP addressing. The IP addresses are 192.168.0 1 through 192.168.0.12, and the subnet mask is 255.255.255.0 The 12 Windows 2000 Professional computers have no default gateway configured. You discover that the Windows 2000 Professional computers are not able to access the Internet through the dial-up connection of Srv1. You confirm that the preferred DNS server on the Windows 2000 Professional computers is configured correctly.

What should you do to allow all 12 computers to access the Internet through the dial-up connection of Srv1? (Choose all that apply)

A. Change the default gateway on all 12 Windows 2000 Professional computers to 192.168.0 1
B. Change the default gateway on all 12 Windows 2000 Professional computers to 169.254.0.1
C. Change the subnet mask on all 12 Windows 2000 Professional computers to 255.255.0.0.
D. Change the IP address on all 12 Windows 2000 Professional computers to 169.254.0.2 through 169.254.0.13
E. On the Windows 2000 Professional computer with IP address 192.168.0.1, change the IP address to 192.168.0.13

Answer: A, E

3. You are the administrator of a Windows 2000 network. The network consists of two Windows 2000 Server computers named ServerA and ServerB and 180 Windows 2000 Professional computers on one segment.

ServerA has an IP address of 192.168.2.1. ServerA is a DHCP server. The TCP/IP configuration of all the Windows 2000 Professional computers is provided by the DHCP server. The range of IP addresses used at ServerA is 192.168.20/24. The lease time used is 15 days. You want to change the IP addresses on the network from 192.168.20/24 to 10.178.0/24. ServerB has an IP address of 10.178.1. You install another DHCP server on ServerB. The range of IP addresses used at ServerB is 10.178.0/24 The lease time used is 15 days. The network is shown in the exhibit (Click the Exhibit button )

To ensure compatibility, the two address ranges will be used concurrently on the same segment for three months. Routing between the two address ranges is provided by a router on the network
After you activate the DHCP scope on ServerB, users report that they are unable to obtain a valid IP address. When you investigate the problem, you discover that each of the two DHCP servers responds with DHCP negative acknowledge (DHCPNAK) messages to leases requested by the client computers.
What should you do?

A. On the Windows 2000 Professional computers, disable Automatic Private IP Addressing (APIPA)
B. On the Windows 2000 Professional computers, configure the DHCP client computers to release the DHCP lease at shutdown.
C. On both DHCP servers, set the number of times the DHCP server should attempt conflict detection to 0
D. On both DHCP servers, configure a superscope so that it has both address ranges. Define an exclusion range for the entire address range of 10.178.01/24 on ServerA and of 192.168.20/124 on ServerB
E. On both DHCP servers, set scope option 031 Perform Router Discoverv to 1 to enable the option on the Windows 2000 Professional computers

Answer: D

4. You are the administrator of your company's network The network consists of five subnets that are connected by a BOOTP relay-enabled router There are 50 Windows 2000 Server computers and 1,000 Windows 2000 Professional client computers distributed approximately evenly across the five subnets. There are also 25 UNIX servers and 100 DHCP-enabled network printers on the network

You want to accomplish the following goals:

 The correct assignment of IP addresses to each client computer on each subnet will be automated
 Address conflicts between client computers and servers will be prevented
 Correct scope options will be applied to each client computer on each subnet
 Client computers that are not in use will be prevented from keeping an IP address for more than three days.
 Each network printer will always receive the same IP address

You take the following actions:

 Install the DHCP Server service on a Windows 2000 Server computer.
 Create five scopes, each containing the address range for a specific subnet
 In the DHCP console, set optional client configurations for each scope in the Scope Options container
 Exclude the range of addresses in use by the servers
 Exclude the range of addresses in use by the network printers.

Which result or results do these actions produce? (Choose all that apply)

A. The correct assignment of IP addresses to each client computer on each subnet is automated
B. Address conflicts between client computers and servers are prevented
C. Correct scope options are applied to each client computer on each subnet
D. Client computers that are not in use are prevented from keeping an IP address for more than three days
E. Each network printer always receives the same IP address

Answer: A, B, C

5. You install the Win2000 DHCP server service on a member server in your Win2000 domain. The domain contains only Win2000 Professional computers. The DHCP server is located on the same network segment as the Win2000 Professional computers.

You create and activate a DHCP scope for the network segment. The win2000 Pro computers are configured as DHCP client computers but they do not receive IP addresses. What should you do so that each DHCP client receives an IP address?

A. Stop and restart the DHCP server service
B. Authorize the DHCP server in Active Directory
C. Install a DHCP relay agent on one of the Win2000 Professional computers
D. Run "registerDNS" on the DHCP server

Answer: B

6. Your network consists of three segments connected by a router. Each segment contains one Windows 2000 Server. London is a DHCP server that provides TCP/IP configuration to all clients in the three segments. The DHCP server has three scopes, one for each segment. The lease duration is eight days for all three scopes. You want to move the DHCP Server from London to Bristol. You take the following actions:

 On London, stop and disable the DHCP Server service.
 On Bristol, install, authorize, and stop the DHCP Server service.
 Copy the entire Systemroot\system32\dhcp folder from London to Bristol.

You want to configure Bristol to use the scope information and the lease address currently in use by the Windows 2000 Professional computers. What should you do next on Bristol? (Choose two)

A. Start the DHCP server and reconcile all scopes.
B. Use the registry editor to restore the DHCP registry configuration from the Systemroot\system32\dhcp\backup location.

Answer: A,B

7. All your client computers receive their IP adress information from the DHCP server on your network.

Users on Pro4 access most of their resources from computers on segment A.
Users on Pro5 access their resources from computers on Segment C.

SegA172.16.128.1(Rtr-A)172.16.64.2 SegB172.16.64.1(Rtr-B)172.16.96.1

SegA SegB SegC

Pro1,Pro2 Pro4,Pro5, DHCP svr Pro6,Pro7

How should you configure your DHCP server to issue gateway addresses to Pro4 and Pro5 to offer optimum access time? (choose two)

A. Create a reservation for Pro4. Configure the router option that has the value of 172.16.64.2.
B. On the DHCP server's scope for SegmentB, configure the router option of 172.16.64.1

Answer: A, B

8. You need to assign network ID numbers and host addresses to the computers in one of your branch offices. A single route to the branch office is advertised as 192.168.16.0/24. You must be able to add 2,000 additional computers to the branch. What steps must you take to be able to accommodate all computers in the branch, while taking advantage of route summarization? (Choose all that apply)

A. In the branch office, add additional network ID numbers 192.168.17.0/24 - 192.168.23.0/24.
B. Change the advertisement to the branch office to 192.168.16.0/20.

Answer: A, B

9. Your company has three offices, but plans to expand to six. You are replacing your bridge with two routers named Router1 and Router2 to accommodate increased traffic. To Configure router1, which routing entry should you add? (see exhibit)

A. Excute route add 172.16.64.160 mask 255.255.255.224 172.16.64.129-p
B. Excute route add 172.16.64.160 mask 255.255.255.240 172.16.64.129-p
C. Excute route add 172.16.64.96 mask 255.255.255.224 172.16.64.97-p
D. Excute route add 172.16.64.96 mask 255.255.255.240 172.16.64.130-p
E. Excute route add 172.16.64.96 mask 255.255.255.224 172.16.64.130-p

Answer E

10. You are the administrator of a Windows 2000 network. The network currenlt has 60 clients computers configured as proxy clients. To dynamically manage IP adresses for these client computers a DHCP server has been installed using a scope of 172.41.64.0. The scope range of 172.41.64.1 to 172.41.79.254 with a 20-bit mask has been configured. Users report that they cannot access information on any computer on the network. How can you correct this problem? (Choose 2)

A. Activate a scope
B. Authorise the DHCP server
C. Change the scope range to 172.41.64.1 - 172.41.79.255
D. Use a subnet mask of 255.255.193.0
E. Use a subnet mask of 255.255.248.0
F. Add a reservation for each of the client computers


Answer A, E

11. (see exhibit) testkiller question.

12. You install and configure DHCP Server service on a Windows 2000 Server to automate TCP/IP client configuration. You create a scope that contains the range of valid IP addresses. You create an exclusion range, and address reservations for your TCP/IP network printers so they will always receive the same address.

None of your printers are receiving addresses from the DHCP server. Client computers are not experiencing problems. What should you do?

A. Remove the address reservation for the printers
B. Remove the exclusion range for the addresses that are in use by the printers.
C. Disable address conflict detection feature of the dhcp server service
D. Enable address conflict detection feature of the dhcp server service


Answer B

13. Your company's portable computers are frequently utilized by users at locations that are not on the network. Two DHCP servers provide IP configuration to your Windows 2000 Professional clients. You want to configure different lease times for the desktop computers and portable computers. Desktop clients should use the default lease time. Portable computes should use a lease time of four hours. What should you do? (Choose three)

A. On the laptop computers, set the DHCP class ID setting to ‘Windows 2000 laptop computers’.
B. On the laptop computers set the DHCP vendor class ID setting to Windows 2000 option.
C. On the laptop computers manually configure the DHCP a lease time of 4 hours and all other TCP/IP paramatersto be configured by the DHCP servers
D.On the DHCP server, configure the scope so that it has an empty lease duration value.
E. On the DHCP servers, define a new user class that has the ID specified on the laptop computers.
F. On the DHCP servers, configure the scope options to use a lease time of four hours for the laptop computers.

Answer A, E, F

14. Your network consists of three subnets that are connected by a BOOTP enabled router. DHCP automates the TCP/IP configuration of your windows 2000 professional clients. The DHCP server is configured with a scope for each subnet.

Users on Subnet2 and Subnet3 periodically cannot access network resources.
During high network usage times, client computers on the remote subnets are being configured with the addresses in the range of 169.254.0.0 - an invalid range. What should you do?

A. Install a DHCP server on each remote subnet, and configure a subnet-specific scope.

Answer:A

15. Your network consists of three network segments connected by a router. You install the DHCP server service on a Win2000 server. You create scopes for each subnet's range of addresses and activate the scopes. Users from the second and third subnets report they cannot connect to the network. Users on the first subnet have no problems. You check and find that the computers on segments 2 and 3 are not receiving TCP/IP information from the DHCP server. What should you do?

A. Manually configure the IP address for DHCP server on each client on subnets 2 and 3
B. Enable dynamic updates on the DHCP server
C. Install a DHCP Relay Agent on a computer on segment 2 and 3
D. None of the above

Answer C

16. DHCP automates the TCP/IP configuration of your Windows 2000 Professional clients. You configure options at the scope level to provide router and DNS server information to the clients. As your network has certain computers that always require a specific address and configuration, you configure reservations in your scope. Your Internet gateway has changed due to the ISP bringing a new router online. You then reconfigure your scope options to reflect the new router address. The users who have reserved addresses report that they can no longer access the Internet. What should you do? (Choose two)

A. Use the ipconfig/renew command at each client computer.
B. Use the ipconfig/release command at each client computer.
C. Configure the scope options to include the Performed Router Discovery option.
D. Configure the server options to include the Performed Router Discovery option.
E. Configure the options on each address reservations to include the new router information

Answer:A, D

17. You are the administrator of a windows 2000 domain named bridge.locol. at one of your offices you install a DHCP server and create a scope that has 60 IP addresses. Users in the branch office report that each time they restart their computers they receive an error message: “DHCP is unavaliable”

You check the DHCP audit file and find:

ID Date, Time, description, IP Address, Host name, MAC address
00/05/01, 03:19:56 ..started…
54. 12/05/01. 03:19:57, Authentication failed..bridge.locol

You want to ensure that your users no longer receive the DHCP errors. What should you do?

A. run the jetpack command
B. Reconcile the scopes.
C. Authorise the DHCP scope
D. Authorise the DHCP server

Answer D

18. You have just taken a job with a company that would like to convert its current network operating system to Windows 2000. The company has four subnets on its TCP/IP network, each of which will have its own Backup Domain Controller (BDC), except for the subnet on which the Primary Domain Controller (PDC) will reside. The company would like to allow browsing across the entire network without needing the implement Windows Internet Name Service (WINS) on a Windows 2000 Server computer. What should you do?

A. Create an LMHOSTS file. Create entries in the LMHOSTS file for the PDC and all BDCs using the #DOM keyword. Place this file on the PDC.
B. Create an LMHOSTS file. Create entries in the LMHOSTS file for the PDC and all BDCs using the #DOM keyword. Place this file on the PDC and all BDCs.
C. Create an LMHOSTS file. Create an entry in the LMHOSTS file for the PDC and all BDCs using the #MH keyworkd. Place this file on the PDC.
D. Create an LMHOSTS file. Create an entry in the LMHOSTS file for the PDC and all BDCs using the #MH keyword. Place this file on the PDC and all BDCs

Answer B

19. You are the administrator of your company's network. Your company owns the Class B subnet 172.41.48.0/24 that consists of 12 servers and 200 client computers, all configured as DHCP clients. The hard disk on your company's DHCP server fails, and your server responds with a fatal error. Your company does not have a backup of the server, and you do not remember which IP addresses have been distributed throughout the network. You need to install a new DHCP server to prevent any connectivity problems that might occur.

What should you do? (Choose two)

A Increase Conflict Detection Attempts on the DHCP server
B Decrease Conflict Detection Attempts on the DHCP server
C Add an exclusion for the 12 servers
D Create a scope that has a range of 172.41.48.1 to 172.41.48.200
E Create a scope that has a range of 172.41.48.1 to 172.41.48.254

Answer:A, E

20. You are the administrator of your company's network. The network consists of a single IP subnet that uses DHCP to automate client computer configuration. You install a WINS server on the network. Users report that the network response time is slow. You discover that the levels of broadcast traffic have not been reduced. When you view the WINS database, you also find that the only entry is for the WINS server itself. What should you do?

A. Configure the WINS server as a DHCP client computer
B. Configure the DHCP server as a WINS client computer
C. Configure a DHCP scope option to include the address of the WINS server
D. Configure static mappings on the WINS server for each client computer

Answer:C

21. Your network consists of two segments connected by a router. It has one DHCP server that has active scopes for both segments. The IP address configured in the two scopes are 10.65.1.0/24 for the first segment, and 10.65.2.1/24 for the second segment. The DHCP server's IP address is 10.65.1.2. Users in the segment without the DHCP server report they are using IP addresses in the range of 169.254.0.0/16. The other segment is using IP address in the range of 10.65.1.0/24. What should you do to ensure the computers in the segment that does not have the DHCP server will automatically use IP addresses in the range of 10.65.2.0/24?

Answer: Enable and configure the DHCP Relay Agent service on a server in the segment that does not have the DHCP server.

22. Your network consists of 90 client computers and 50 portable computers. Computers in your network only run Windows 2000 Professional. Only 20 of the users of the portable computers will ever be in the office at the same time. You have purchased a subnetted Class B subnet with a 25-bit mask to accommodate the number of users for your network. All users need access to the Internet while in the office. How should you configure DHCP?


A. Create 2 scopes, one for the desktop computers and one for the portables.
B. Create a superscope with 2 scopes. One scope for the desktops and one for the portables.
C. Create a superscope with 2 user classes. Set each class with a different lease duration. Use a shorter lease for the portable computers.
D. Create one scope with 2 user classes. Set the class for the desktops with a default lease duration. Set the lease duration for the class for the portables to 1 day.

Answer D

23. You have mirrored the contents of an Intranet Web application on three Web servers that contain IIS. Using the fewest possible resources, how should you configure DNS to allow access to all Web servers in the event of a failure?

A. Configure one DNS server so that it has one DNS zone.
Enable Round Robin.
Create an A (host) record for the application on each Web server's IP address.

Answer : A

24. You configure DHCP to dynamically update the PTR records for clients who lease IP addresses from the server. From where is the domain name used in the PTR record obtained?

A. From the DHCPDISCOVER message
B. From the DHCPOFFER message
C. From the DHCPACK message
D. From the DHCPREQUEST message
E. From the DHCPDISCOVER message

Answer:D

25. You are admin of Windows 2000. The network consits of two Windows 2000 Server computer named Atlanta and Orlando and 350 Windows 2000 Pro computer. Orlando is a DHCP server. The TCP/IP configuration of all Windows 2000 Pro computer is provided by the DHCP server. Atlanta and Orlando have IP addresses that are manually configured. Atlanta frequently hosts multicast-based video and audio conferens. You want to dynamically allocate multicast addresses. How should you configure the network?

A. On the DHCP server, create and activate a scope so that it has a range of class D address.
B. On Atlanta, configure Routing and Remote Access to enable the IGMP routing protocol in proxy mode on the LAN interface.
C. On the Windows 2000 Prof computers, enable route discovery.
D. On the Windows 2000 Prof computer, add a route for network destination224.0.0.0 and mask 224.0.0.0.

Answer:A

26. All client computers in your domain use DHCP for TCP/IP configuration. Your network admin installs a new T1 line and router for Internet access. This router is to be used by administrative staff only. You want to configure the administrative staffs' client computers to use this new router, and ensure that non-administrative staff cannot gain Internet access through this new router. You must ensure that each targeted client computer will only need to be configured once. What should you do?

A. Remove the default Remote Access Policy
B. Set permissions on the Remote Access Policy to "No access" for the Authenticated Users group
C. Use the route add -d command and map the new router information on each of the administrative client computers
D. Use the route add -p command on each of the administrative computers and enter the new router information

Answer D

27. Your company has a main office in Orlando and branch office locations in Miami, Tampa and Jacksonville. The branch offices are connected to Orlando by Windows 2000 based routers. All four locations have a Windows 2000 based DHCP server. Each Friday, the Orlando location hosts a multicast video presentation that is broadcast to all four locations.

The Orlando location also frequently hosts multicasting video presentations intended for the sales staff in the Orlando and Miami locations only. You want to ensure that these sales staff multicasting video presentations are not sent to the Tampa and Jacksonville locations. You assign specific IP multicast addresses for use with the sales staff multicasting video presentations. How should you configure the network to prevent the forwarding of the sales staff multicasting video presentations to the Tampa and Jacksonville locations?

A. Configure a multicast setting boundary for the sales IP multicast addresses on the Tampa and Jacksonville interfaces of the Orlando router.

Answer: A

28. Your company has four branch offices Atlanta, Boston, New York and Dallas. There is a multicast address used for videoconferences and the like to deliver content to all four sites. Atlanta and Boston are right beside each other connected by a router. There is a Sales videoconference held every Monday between Atlanta and Boston. How should you configure the router so that the Sales multicast video conferencing does not get broadcasted to all four branches?

A. Configure TCP-filters on the router to block all multicast traffic.
B. Create a static route for the Sales multicast broadcast on the router.

Answer: B

29. You are the admin of a large network consisting of four subnets: A, B, C and D. There are three workstations on every subnet. One workstation on Subnet B frequently uses resources from a machine on Subnet A; the other two workstations on subnet B use resources located in subnet C. what should you do?

A. Configure a DHCP-scope for the two machines on subnet B to use the router to connect to Subnet C.
B. Create a reservation for the one machine and specify a DHCP scope option to use the router to connect to Subnet A
C. Configure a static route on the router for the machine in Subnet B that gets its resources from Subnet A and add that under DHCP-scope options for that DHCP-address reservation
D. Configure a static route on the router for the machines in Subnet B that get their resources from Subnet C, and add that under DHCP-scope options for that DHCP-scope

Answer: A, B

30. You use a computer running Win2000 server and the DHCP Server service to create a DHCP scope with a lease length of 15 days and a subnet mask of 21 bits. You now want to change the configuration for the scope to have an unlimited lease and a subnet mask of 28 bits. How would you do this?

A. Delete the scope. Use the new scope wizard to create a new scope with a subnet mask of 28bits and an unlimited lease. Activate the scope
B. Right click on the scope in DHCP and select properties. Edit the properties of the scope and change the subnet mask to 28bits and the lease to unlimited
C. Delete the scope. Use the new scope wizard to create a new scope with a subnet mask of 28 bits. Edit the properties of the new scope to set an unlimited lease. Activate the new scope.
D. Disable the scope. Edit the properties of the scope and change the subnet mask to 28 bits and an unlimited lease. Enable the scope.

Answer:C

31. Your network has 1,900 hosts, and requires Internet connectivity. Your network is not routed, except for the connection to the Internet. You have been assigned the following eight network addresses from your ISP:

192.24.32.0/24
192.24.33.0/24
192.24.34.0/24
192.30.35.0/24
192.30.36.0/24
192.30.37.0/24
192.30.38.0/24
192.30.39.0/24

Your goal is to minimize the complexity of the routing tables, while maintaining Internet connectivity for all hosts. What subnet mask should you use?

A.255.255.252.0
B.255.255.248.0
C.255.255.255.248
D.255.255.240.0

Answer:B

32. You are the administrator for a Windows 2000 network. Your internal DNS server is located behind a firewall. When you test your DNS server by using the Monitoring tab on the server's properties page, the DNS server passes the simple test but fails the recursive test.

What should you do?

A. Run ipconfig /registerdns
B. Delete the %systemroot%\system32\dns\cache.dns file
C. Copy the %systemroot%\system32\dns\samples\cache.dns file to %systemroot%\dns, and overwrite the existing cache.dns file
D. Create a forward lookup zone for the root zone. Name the forward lookup zone "."
Answer C

33. Your network consists of two locations containing a Win2000 Server and 45 Win2000 Professional computers. The two servers are Win2000-based routers. Although the two routers are not connected directly to each other, they are connected by a third router. This third router is administered by a different company. Users in both locations want to provide multicast based datacasting of information to the other site.

You add the Internet Group Management Protocol (IGMP) to both servers. However, the third router does not support multicast forwarding or routing. How should you configure the network to allow IP multicast traffic to pass between the two locations? (choose three)

A. Create an IP-in-IP interface between the servers
B. Assign the interface to the IGMP routing protocol
C. Run the interface in IGMP proxy mode
D. Run the interface in IGMP point to point mode
E. Run the interface in IGMP Router mode.
F. Create a point to point interface between the 2 servers

Answer: A, B, C

34. You are the network administrator of your company's network. Your network consists of three subnets connected by a single router. The router is configured as follows:

Interface Subnet IP Address Subnet Mask
Interface 0 subnet 0 178.60.4.1 255.255.0.0
Interface 1 subnet 1 178.60.5.1 255.255.0.0
Interface 2 subnet 2 178.60.6.1 255.255.0.0

Subnet1 and subnet 2 both contain client computers. Subnet 0 does not
Subnet 1 and subnet 2 eqch contain a windows 2000 dhcp server that is responsible for assigning IP addresses to client computerson the loal
subnet only. The scope properties are as follows:

Scope Name Start IP End IP Subnet Mask
Subnet 1 scope 178.60.5.100 178.60.5.254 255.255.255.0
Subnet 2 scope 178.60.6.100 178.60.56254 255.255.0.0




Subnet 0 contains a web server and provides conectivity to the internet.
However the network is experiencing connectivity problems. Clients on subnet 1 can communicate with any host on their own subnet, but cannot communicate with hosts on subnet 2. Clients on subnet 2 cannot communicate with hosts on subnet 1 but they can successfully connect to subnet 0 what should you do to correct this problem?

A. Delete and recreate the scope on subnet 1's DHCP server to reflect the correct subnet mask.
B. Delete and recreate the scope on subnet's 2's DHCP server to reflect the correct subnet mask
C. Modify the routing table on the router to enable routing from subnet 1 to subnet 0 and subnet 2
D. Modify the routing table on each subnet 1 host computer to enable direct connectivity to hosts on subnet 0 and subnet 2.
E. Delete and recreate the scopes on both subnet 1's and subnet 2's DHCP server to reflect the same configuration information for both subnets.

Answer:A

35. Your network uses an address of 172.30.0.0/16. Your projected growth for the network indicates a need for at least 25 subnets with a minimum of 1,000 hosts per subnet. What subnet mask should you configure to meet these needs?

A. 255.255.252.0

Answer: A

36. Your network is configured as follows

172.30.1.39 172.30.1.40 172.30.1.1Router172.30.2.1 - 172.30.2.10
WS1 WS2 interface1 interface2 svr1

subnet for all 255.255.255.0

The route print command from WS1 is displayed as follows :-

Network Destination Net mask Gateway Interface
0.0.0.0 0.0.0.0 172.30.1.39 172.30.1.39
127.0.0.1 255.0.0.0 127.0.0.1 127.0.0.1
172.30.1.0 255.255.255.0 172.30.1.39 172.30.1.39
172.30.1.39 255.255.255.255 127.0.0.1 127.0.0.1
172.30.255.255 255.255.255.255 172.30.1.39 172.30.1.39
224.0.0.0 224.0.0.0 172.30.1.39 172.30.1.39
255.255.255.255 255.255.255.255 172.30.1.39 172.30.1.39

A. Change the default gateway on WS1

Answer: A

37. You are creating a DHCP scope for your 192.168.1.32/28 subnet. The subnet consists of Windows 2000, Windows 98, and Windows 95 computers.

You have two UNIX computers on this subnet that will be assigned the two highest available static IP addresses. The subnet's default gateway will be assigned the lowest available IP address on the subnet.

Which scope should you create on your DHCP server?

A. 192.168.1.34 - 192.168.1.46
B. 192.168.1.34 - 192.168.1.44
C. 192.168.1.33 - 192.168.1.45
D. 192.168.1.34 - 192.168.1.61
E. 192.168.1.33 - 192.168.1.60

Answer: B
38. What two utilities should you use to determine the number of DNS requests submitted to a DNS server over both TCP and UDP?

A. DNS console and System Monitor

Answer: A

39. Your network consists of 50 Windows 2000 Server computers, 2,5000 Windows 2000 Professional computers, 3,000 Windows 98 computers and 50 UNIX servers. You have a single Windows 2000 domain. Users store data on their client computers and on the server. You have five subnets, and a sixth subnet connecting two BOOTP routers. You use DHCP to configure TCP/IP configurations. You want to accomplish the following goals:
 All users will be able to access resources on all servers.
 All users will be able to access resources on all clients.
 Network traffic between subnets will be minimized.
 You must allow for 100 percent growth over the next year with minimal reconfiguration.

You take the following actions:
 Place all Windows 2000 Servers on Subnet 1.
 Place all UNIX servers on Subnet 2.
 Distribute clients evenly across Subnets 3, 4, and 5.
 Install the DHCP Server service on one of the Windows 2000 Servers, and configure a scope for each subnet.
 Install and configure DNS Server service on one of the Windows 2000 Servers.
 Configure all Windows-based computers to use DHCP.
 Subnet the network address space by using 255.255.248.0.

Which results do these actions produce? (Choose all that apply)

A. All users are able to access resources on all servers.
B. All users are able to access resources on all clients.

Answer: A, B

Remote Access Key points

1. Your network consists of a Windows 2000 Server and several Windows 2000 Professional computers. Your server has a dial-up connection to the Internet. Your Windows 2000 Professional computers are configured to use APIPA. There is no DHCP server on the network.

You want to implement Internet Connection Sharing to allow the Windows 2000 Professional computers to access the Internet. How should you configure the server? (Choose all that apply)

A. Enable Internet Connection Sharing on the dial-up connection of the server.
Configure the server to use APIPA for the LAN interface.

Answer: A

2. You are the administrator of a single Windows 2000 Domain. You have just configure a RRAS server to allow several company managers the ability to dial-in to your company's network from home. Later you receive a call from a company manager reporting that although she can successfully connect to the company's network she can not access all the resource on the network. After further investigation you realize that she is only able to access resources on the subnet the dial-in server is location. What dial-in setting you ask her to change?

A. IP Address
B. Disable "User IP compression"
C. Check the "user default gateway on remote network" checkbox
D. On the DNS tab of TCP/IP settings, check the "register this connections address in the DNS" checkbox.
E. ON the WINS tab of the TCP/IP settings, check the "Use NetBIOS settings from the DHCP server".

Answer:C

3. You are the administrator for your company's Windows 2000 network. The network contains an FTP server, which uses the default FTP port. You want to configure a filter to allow traffic to send packets to and from the FTP server. What filters should you configure? (Choose all that apply).

A. Input filter source IP address of the FTP server and TCP source port 21
B. Input filter source IP address of the FTP server and TCP source port 20
C. Output filter source IP address of the FTP server and TCP source port 21
D. Output filter source IP address of the FTP server and TCP source port 20
E. Input filter destination IP address of the FTP server and TCP source port 21
F. Input filter destination IP address of the FTP server and TCP source port 20
G. Output filter destination IP address of the FTP server and TCP source port 21
H. Output filter destination IP address of the FTP server and TCP source port 20

Answer:C D E F

4. You are the network administrator for Woodgrove Bank.The network is configured as shown in the exhibit. Windows 2000 professional computers on the network have their prefered DNS set to 172.16.34.130. DNS is configured as in the exhibit. You try to accesss a resource on Pro7 from Pro1 and are unsuccessful. You then try to ping Pro7 using its host name from Pro1 you recieve the following error "Bad IP address" even after restarting both PC’s.

What should you do.(Choose best answer)

A. Run ipconfig/registerdns on Pro1
B. Delete the Pro7 entry in DNS server
C. Delete the Pro1 entry in DNS server
D. Delete the Pro7 in the hosts file on Pro1
E. Delete the Pro7 in the lmhosts file on Pro7

Answer D

5. Your home office network contains 2 Windows 2000 Server computers, 1 Windows 2000 Professional client computer, and 1 Windows 98 second edition client computer.

You want to accomplish the following goals:

 Provide one Internet connection for the entire network.
 Provide network address translation.
 Provide name resolution.
 Provide IP address configurations for the entire network.

You perform the following tasks:

 You enable Internet Connection Sharing.
 You create a connection between the network and the Internet.
 You install and configure LAN adapters connecting the client computers to the network.

Which goal is accomplished from these tasks?

A. Provide one Internet connection for the entire network
B. Provide network address translation
C. Provide name resolution
D. Provide IP address configurations for the entire network

Answer: A B C D

6. You are the administrator for your company's Windows 2000 Server network. You company has a main office in Dallas, TX. There are three branch offices: one in Atlanta, GA, one in Chicago, IL, and one in Sacramento, CA. All branches are connected to Dallas by a T1 line. A diagram of the network in shown below

The routers between the offices supports the forwarding of BOOTP messages. At each branch office, you have a local user who is responsible for all administrative duties. Currently the local administrator is responsible for configuring the TCP/IP settings for all the Windows 2000 Professional computers at his/her local branch.

You have been experiencing network communication problems which were the direct result of configuration errors. You want to prevent this from happening again.

What should you do? (Choose two.)

A. Install and configure a Dynamic Host Configuration Protocol. (DHCP) Server in Dallas.
B. Install and configure a Windows Internet Name Service (WINS) Server in Dallas.
C. Install and configure a Domain Name System (DNS) Server in Dallas.
D. On each Windows 2000 Professional computer, change the TCP/IP properties to Obtain an IP address automatically.
E. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain WINS server address automatically.
F. On each Windows 2000 Professional computer, change the TCP/IP properties to
Obtain DNS server address automatically.

Answer:A, D

7. You are the administrator for your company's Windows 2000 domain. On this domain, you have a Windows 2000 Server computer acting as your company's Internet interface. This morning when you came to work, you noticed that you had an unusually long wait time to access resources on your network. You run several tests but cannot seem to find any problems although the access times are incredibly long. When the users come in for work, they immediately start complaining about network performance. You then decide to start checking packets on the network. After investigating the problem, you notice that a denial of service attack has flooded your Internet server with "Destination Unreachable" packets. You want to prevent this from happening again with the least amount of administrative overhead possible. You do not want to prevent legitimate packets from being forwarded.

What should you do?

A. Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0 and IP Address 192.168.0.0 with Subnet Mask 255.255.0.0.

B. Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0 and IP Address 172.16.0.0 with Subnet Mask 255.240.0.0.

C. Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0, IP Address 172.16.0.0 with
Subnet Mask 255.240.0.0, and IP Address 192.168.0.0 with Subnet Mask 255.255.0.0.

D. Configure input filters on the Internet server to accept all packets except IP
Address 10.0.0.0 with Subnet Mask 255.0.0.0, IP Address 127.0.0.1 with
Subnet Mask 255.0.0.0, IP Address 172.16.0.0 with Subnet Mask 255.240.0.0,
and IP Address 192.168.0.0 with Subnet Mask 255.255.0.0.

Answer:C

8. You are the administrator of your company's network. Your Windows 2000 Server computer named Srv2 cannot communicate with your UNIX server named Srv1 Srv2 can communicate with other computers on your network. You try to ping Srv1, but you receive the following error message. "Unknown host Srv1." You create an A (host) record that has the correct name and IP address. However, when you try to ping Srv1 again, you receive the same error message

What should you do to resolve this problem?

A. Restart the DNS server
B. Clear the DNS Server Cache
C. Run the ipconfig Iregisterdns command on Srv2
D. Run the ipconfig /fIushdns command on Srv2

Answer:D

9. Your domain has six Windows 2000-based Routing and Remote Access servers and two Windows 2000-based Internet Authentication Service servers. The Routing and Remote Access servers use the IAS server to authenticate remote access credentials. You change the remote access policies on the first IAS server.

How do you ensure that this change is enforced on the second IAS server?

A. Use the Netsh command-line utility to copy the IAS configuration from the first IAS server to the second IAS server.

Answer:A

10. Your domain is running in mixed mode. RRAS is enabled for remote access on Srv1. The domain also has a WinNT4.0 member server named Srv2. Srv2 is running Remote Access Service. Users in the domain use Win2000 Professional computers to dial in to the network through Srv1 or Srv2. However Srv2 is not able to validate remote access credentials of domain accounts. How would you configure the network to enable Srv2 to validate remote access domain users?
A. Add the Everyone group to the RRAS access group
B. Configure srv2 as a DHCP relay agent
C. Configure Srv1 to use MSChap for authentication and Srv2 to use Chap
D. Add the Everyone group to the Pre-Windows 2000 Compatible Access group

Answer:D

11. To centralize administration you implement a Remote Authentication Dial-In Service (RADIUS) server. Each of your branch offices will support their own Routing and Remote Access Server. You remove the default remote access policy.

What should you do to implement one company policy that requires all dial-up communications to use 40-bit encryption, and require secure communications? (Choose two)

A. Create one remote access policy on each Routing and Remote Accessserver
B. Create one remote access policy on the RADIUS server.
C. Set encryption to Basic in the remote access policy.
D. Set encryption to Strong in the remote access policy or policies
E. Enable the Secure Server IPSec policy on the RADIUS server
F. Enable the Server IPSec policy on the RADIUS server

Answer: B, C

12. You are not running in native mode. Your company is a sales organization and has 150 salespeople. When these salespeople are out of the office, they require file and print services, e-mail, and access to the company's product and inventory database. These salespeople belong to a group named SalesMobile. Your company has dedicated T1 access to the Internet Your company also uses a virtual private network (VPN) to reduce the costs and hardware required to support the salespeople.

You want to accomplish the following goals:

 Required network resources will be accessible to all salespeople
 Connections to the network will be made only by salespeople
 Sensitive company data will be kept confidential over the VPN connections
 Access to the network will only take place during business hours
 All salespeople will be able to connect to the network simultaneously

You take the following actions:

 On a Windows 2000 Server computer, install Routing and Remote Access and configure virtual private networking.
 Increase the WAN Miniport (PPTP) maximum port limit to 150.
 Create a new remote access policy that has the condition to allow access to the users in the SalesMobile group
 Set the new remote access policy's order of precedence higher than the default policy.
 Edit the default remote access profile to require strong encryption of data.

Which result or results do these actions produce? (Choose all that apply)

A. Required network resources are accessible to all salespeople
B. Connections to the network are made only by salespeople
C. Sensitive company data is kept confidential over the VPN connections
D. Access to the network only takes place during business hours
E. All salespeople are able to connect to the network simultaneously

Answer:A, B, C, E

13. You are implementing a remote access policy that is highly available and highly secure. Your company utilizes a T3 connection to the Internet. All the servers are running Windows 2000 Advanced Server, and all clients are running Windows 2000 Professional. You want to accomplish the following goals:

 No single point of failure will result in total loss of remote access connectivity.
 No authentication traffic will be carried as clear text.
 No data traffic will be carried as clear text.
 Support for 200 simultaneous remote users must be available at all times.

You take the following actions:

 Install a VPN server at the main office.
 Configure the VPN server to support 250 PPTP connections.
 Configure the client computers to use CHAP as the authentication protocol.

Which results do these actions produce? (Choose all that apply)

A. No single point of failure will result in total loss of remote access connectivity.
B. No authentication traffic will be carried as clear text.
C. No data traffic will be carried as clear text.
D. Support for 200 simultaneous remote users must be available at all times.

Answer:B,C,D

14. You are the administrator of your company's network. You need to Implement a remote access solution that is highly available and highly secure. Your company consists of a single location and has a T3 connection to the Internet. Your company has 1,000 salespeople who need reliable connectivity to the company network from any remote location. All servers are running Windows 2000 Advanced Server, and all client computers are running Windows 2000 Professional.

You want to accomplish the following goals:

 No single point of failure, aside from total loss of the T3, will result in total loss of remote access connectivity.
 No authentication traffic will be carried as clear text.
 No data traffic will be carried as clear text.
 Support for at least 200 simultaneous remote users accessing the network will be available at all times.

You take the following actions:

 Install three virtual private network (VPN) servers at the main office.
 Configure each VPN server to support 150 PPTP connections.
 Configure the client computers to use Password Authentication Protocol (PAP) as the authentication protocol.
 Create DNS Round Robin entries with a Time to Live (TTL) of zero for each VPN server

Which result or results do these actions produce? (Choose all that apply)

A. No single point of failure, aside from total loss of the T3, results in total loss of remote access connectivity
B. No authentication traffic is carried as clear text
C. No data traffic is carried as clear text
D. Support for at least 200 simultaneous remote users accessing the network is available at all times

Answer:A,D

15. Your network consists of computers running Win2000 server, Win2000 Professional, Win95 and OS\2 with Lan Manager 2.2c. All are on the same subnet. You want applications on the OS/2 client that use NetBIOS names to be able to resolve the NetBIOS names to IP Addresses from a WINS database. You install WINS on one of the Win2000 servers.

What else should you do to enable the applications on the OS/2 computer to resolve NetBIOS names to IP addressesfrom the WINS database?

A. Configure one of the Win2000 Professional computers as a WINS Proxy Agent
B. Add static mappings for the OS/2 computer in the WINS database
C. Configure the OS/2 computer as a WINS Client
D. Configure the OS/2 computer with a static IP address and add a PTR record in the DNS database

Answer:A

16. You are the administrator of your companies network. You want to configure remote administration for your network. You install Routing and Remote Accessona Windows 2000 domain controller.

You want to accomplish the following goals:

 Only administrators have dial-up access
 Dial-up connections are accepted only between 4.00 PM and 7.00 A.M
 Connections are forcibly disconnected after 20 minutes of inactivity
 All connections encrypt all communications
 Connections are limited to 60 minutes

You take the following actions

 Set the level or levels of encryption to No Encryption and Basic.
 Add Domain Admins to the Windows Group Policy condition.
 Configure the rest of the remote access policy as shown in the exhibit

Configure the remote access policy Disconnect if idle for" 60 minutes
Configure the remote access policy Restrict maximum session time" 20 minutes
Configure the remote access policy Restrict access to the following days and times to
Sun 07:00-16:00
Mon 07:00-16:00
Tue 07:00-16:00
Wed 07:00-16:00
Thu 07:00-16:00
Fri 07:00-16:00
Sat 07:00-16:00

What result or results do these actions produce? (Choose all that apply)

A. Only administrators have dial-up access
B. Dial-up connections are accepted only between 4.00 PM and 7.00 A.M
C. Connections are forcibly disconnected after 20 minutes of inactivity
D. All connections encrypt all communications
E. Connections are limited to 60 minutes
Answer:A

17. Your domain has a Windows 2000 member server named Ras1 and a Windows 2000-based DHCP Server named Dhc1. Routing and Remote Access is enabled on Ras1. Two DNS servers use IP addresses of 10.1.5.2 and 10.1.5.3. Ras1 is configured to use DHCP to assign IP addresses to remote access clients. DHCP server scope options include: Vendor: Standard, Value: 10.1.5.3, Class: None. It does not have any client reservations.

When remote access clients dial into Ras1, they receive an IP address from the DHCP scope range, but they do not receive the DNS address configured in the DHCP scope. They receive a DNS server address of 10.1.5.2. How should you configure your network to allow remote access clients to receive the DNS option from the DHCP server?

A. Configure the remote access client computers to enable DHCP on the dial-up connection
B. Configure Ras1 to use Windows Authentication.
C. Install and configure the DHCP Relay Agent routing protocol on the internal interface on Ras1.
D. On the DHCP server, configure the DNS scope option of 10.1.5.3 for the Default Routing and Remote Access user class

Answer:C

18. To allow Internet access through a dial-up connection to Server A, you install NAT routing protocol. All computers in your network use Automatic Private IP addressing. There is no DHCP server in the network. Your server is configured to use the IP address 192.168.0.1. Routing and Remote Access and all the ports on this server are enabled for demand-dial routing. What should you do to enable your Windows 2000 Professional clients to access the Internet through a translated demand-dial connection on the server? (Choose four)

A. Create a new demand-dial interface for the local area connection
B. Create a new demand-dial interface for the dial-up connection
C. Add a public and a private interface to the NAT routing protocol
D. Configure the IP address of the Internet service provider (ISP) as the default gateway on the private interface
E. Add a default static route that uses the public interface
F. Configure the NAT routing protocol to enable network address translation assignment and name resolution
G. Configure the public NAT interface with an address pool of 192.16.80.1

Answer:B, C, E, F

19. Your WAN network consists of ten internal subnets in two physical buildings connected by routers. An additional subnet is configured for Internet access. All routers on the network will be multihomed Windows 2000 Servers running Routing and Remote Access.

You want to accomplish the following goals:

- Administrative overhead for routing tale configuration is minimized.
- Broadcast traffic for routing table configuration is minimized.
- Link redundancy within ten minutes is ensured in case of router failure.
- Ensure convergence times of less than one minute for all known routes.
- Internal routing information will never be exposed to external routers.

You take the following actions:

· Install RIP version 1.
· Configure RIP to use all interfaces on all multihomed computers.
· Enable RIP authentication by specifying a password on each interface.

What results do these actions produce? (Choose all that apply)

A. Administrative overhead for routing tale configuration is minimized.
B. Broadcast traffic for routing table configuration is minimized.
C. Link redundancy within ten minutes is ensured in case of router failure.
D. Ensure convergence times of less than one minute for all known routes.
E. Internal routing information will never be exposed to external routers.

Answer A, E

20. You enable route and remote access on a computer running win2000 server. The Windows 2000 server is configured for use as a VPN Access to the VPN should be limited to employees who belong to the windows 2000 domain local security group VPN-Access.

You configure an account for each member of the VPN-Access group by setting the option "control access through Remote Access Policy". You then delete the default remote access policy.

What step should u take to limit access to the VPN to only members of the VPN_Access Group?

A. Configure the remote access server to use the EAp-TIS authentication.
B. Create a remote access policy and set the condition Windows-Groups to VPN-access in the policy
C. Create a remote access policy and set the profile associated with the policy to allow access only to VPN-Access
D. Create a remote access policy and set the permissons of the remote access policy object to allow read only to VPN-Access

Answer:B

21. Routing and Remote Access is enabled on Router A in your network. Router A has a LAN interface that uses an IP address of 192.168.1.2. The only traffic that you want allowed into this interface is HTTP traffic. You configure two input packets with the "Receive all packets except those that meet the criteria below" option, and specify the Destination Address of 192.168.1.2 for both filters, and Destination port of 80 for the first filter, and 443 for the second filter. You notice that other network traffic is still allowed into the router though the interface. What should you do?

A. Configure the input packet filters to "Drop all packets except packets allowed by the filters".

Answer: A

22. Your network is connected to the company network via a Windows 2000 Routing and Remote Access two-way demand-dial connection over ISDN. The ISDN link must only be used once each day to transfer sales information to or from the main office during non-business hours. Several times a day, an ISDN link is initiated between the networks. You analyze the traffic and discover that it is composed of router announcement broadcasts. What should you do to prevent the link from being used during business hours? (Choose two)

A. Schedule the demand-dial interface to dial only during specified hours.
B. Set the Remote Access Policy to only allow connections after business hours
C. Create a demand-dial filter on the interface
D. Set a TCP/IP filter on the interface to prevent broadcast messages from passing

Answer:A, C

23. You are a branch office network administrator. You are connected to the company network via a Windows 2000 Routing and Remote Access two-way demand-dial connection over ISDN. Sensitive company data, e-mail, and application traffic is sent across the connection.

You want to accomplish the following goals:

 All data should be secure.
 Rogue routers will be prevented from exchanging router information with either router.
 Both routers will be able to validate each other.
 Both routers will maintain up-to-date routing tables.
 Traffic over the link during peak business hours will be minimized.

You take the following actions:
 Install a Certificate Services server at the main office.
 Enable EAP-TLS as the authentication protocol on both Routing and Remote Access servers.
 Enable RIP version 2 on the demand-dial interfaces.

Which results do these actions produce? (Choose all that apply)

A. All data should be secure.
B. Rogue routers will be prevented from exchanging router information with either router.
C. Both routers will be able to validate each other.
D. Both routers will maintain up-to-date routing tables.
E. Traffic over the link during peak business hours will be minimized.

Answer:A, D

24. You are a branch office network administrator. You are connected to the company network via a Windows 2000 Routing and Remote Access two-way demand-dial connection over ISDN. Sensitive company data, e-mail, and application traffic is sent across the connection.

You want to accomplish the following goals:

 All data should be secure.
 Rogue routers will be prevented from exchanging router information with either router.
 Both routers will be able to validate each other.
 Both routers will maintain up-to-date routing tables.
 Traffic over the link during peak business hours will be minimized.

You take the following actions:

 Enable MS-CHAP as the authentication protocol on both Routing and Remote Access servers.
 Enable OSPF on the demand-dial interfaces.
 Set the "Require Encryption" option on both Routing and Remote Access servers.

Which results do these actions produce? (Choose all that apply)

A. All data transmitted over the connection is secure.
B. Prevent Rogue routers from exchanging router information with either router.
C. Both routers will be able to validate each other.
D. Both routers maintain up-to-date routing tables.
E. Traffic over the link during peak business hours will be minimized.

Answer: A, D

25. You configure Remote Access Service running ona windows 2000 Server computer, in a nitive mode Windows 2000 domain. Users will access this server to connect to the network from external locations. Your company operates 24 hours a day, 7 days a week so no time restrictions should be implemented. Public access should not be allowed. To accomplish these goals, you delete the default remote access policy. However, dial-in users are reporting that they are unable to connect. What should you do to resolve the dial-in connection problems?

A. Create a new remote access policy that has the condition to grant all members of the domain users group dial-in access.
B. Create a new group policy that grants dial-in permissions for the domain user group
C. Edit the remote access policy to allow CHAP as the only authentication method
D. Edit the remote access policy to allow PAP and SPAP as the only authentication methods

Answer: A

26. Your main office and two branch offices are connected by dedicated T1 lines. Two additional branch offices use 128-Kbps ISDN lines and Routing and Remote Access over the Internet to connect to the company's network. You are designing your DNS name resolution environment, and want to accomplish the following goals:

DNS Name resolution traffic across the WAN should be minimized.
DNS Replication traffic across the WAN should be minimized.
DNS Replication traffic across the public WAN should be secure.
Name resolution performance for client computers should be optimized.

You take the following actions:

Install the DNS Server service on one server at each office.
Create a standard primary zone at the main office.
Create a standard secondary zone at the four other offices.
Configure client computers to query their local DNS server.

What results do these actions produce?

A. DNS Name resolution traffic across the WAN should be minimized.
B. DNS Replication traffic across the WAN should be minimized.
C. DNS Replication traffic across the public WAN should be secure.
D. Name resolution performance for client computers should be optimized.

Answer A, D

27. You are the administrator of a windows 2000 network. The network consists of a Windows 2000 based DHCP server, two windows 2000 based DNS server, one Windows 2000 based routing and remote access server and 50 windows 2000 Professional laptop computers. The network is configured as shown in the exhibit.

The DHCP server has a scope configured to use an IP address range of 10.80.1.20 through 10.80.1.70 and a subnet mask of 255.255.255.0. the laptop computers should use the 10.80.1.12 DNS server when dialling into the routing and remote access server. You configure a DHCP scope option so that it uses an IP address of 10.80.1.12 for the DNS server. When users dial into the network from the laptop computers they receive an IP address of 10.80.1.13 for the DNS server. How should you configure the network so that all laptop computers will receive the IP address of 10.80.1.12 for the DNS server?

A. Configure the LAN interface of the routing and remote access server to not use an IP address for the DNS server.
B. Configure the DHCP server to always register and update client computer information to contain the configured DNS server.
C. Configure the routing and remote access server to use the LAN interface to obtain DHCP, DNS and WINS addresses for dial-up client computers
D. Enable the DHCP relay agent on the internal interface of the routing and remote access server. Configured

Answer: B

28. You are configuring the Routing and Remote Access for remote access. You are requested to provide a record of everyone who will access the company network by Routing and Remote Access. What should you do to log all logon activity on the Routing and Remote Access Server?

A. Enable log authentication requests in Remote Access Logging, on the Routing & Remote Access Server.
B. Enable log accounting requests in Remote Access Logging, on the Routing & Remote Access Server.

Answer:A

29. Your network contains a Windows 2000 Server that has two network interfaces, East and West. Routing and Remote Access is enabled as a router on the server. Only the network segment connected to the West interface has a DHCP server hosted on a Windows 2000 Server. You want to allow computers on the East interface to receive IP addresses from the DHCP server. What should you do? (Choose all that apply)

A: Configure the DHCP Relay Agent routing protocol to run on the East interface.
Configure the DHCP Relay Agent routing protocol to use the IP address of the DHCP server as the server address.

30. You are configuring a Windows 2000 network for dial-up access. Your company issues smart cards to all users who have dial-up access. What should you do to configure your Routing and Remote Access server? (Choose two)

A. Configure the use of Mutual Authentication.
B. Configure the RRAS server to use SLIP for dial-in
C. Select the Extensible Authentication Protocol (EAP) check box
D. Install a smart card logon certificate on the RRAS.
E. Configure the RRAS server to use the PAP protocol
F. Configure the RRAS server to use the IPSec protocol

Answer:C, D

31. Routing and Remote Access is enabled for remote access to your member server. Users dial into the network by using their Windows 2000 Professional computers. Members of the Accounting group use smart cards for remote authentication. Their dial-in permission is set to Control access through Remote Access Policy. You create a new remote access policy named Accounting Access. It grants the Accounting group access any time of the day. It's the first policy on the list. When Accounting dials into they network, they report that they are unable to use the smart card for remote authentication. What should you do?

A. Enable EAP on the member server and the Windows 2000 remote access clients.
B. Enable EAP in the profile for the Accounting group remote access policy.

Answer:A,B

32. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named Vegas Routing and Remote Access is enabled for remote access on Vegas Some of the remote access client computers require the use of CHAP. You enable CHAP on Vegas You also configure the appropriate remote access policy to use CHAP. However, users who require CHAP report that they are not able to dial in to Vegas

What should you do?
A. Configure Vegas to prohibit the use of U\.N Manager authentication
B. Configure Vegas to disable the use of link Control Protocol (lCP) extensions
C. Configure the user accounts by selecting “Store passwords using reversible encryption,” and also set the user passwords to change the next time each user logs on.
D. Configure the user accounts to use a static IP address when they dial in to the network

Answer: C

33. Your domain has a WIn2000 member server named London and a DHCP server. RRAS is enabled for remote access on London. The domain is in native mode. Users in the domain dial in to the network on Win2000 Professional laptops. Dial-up connection configuration for the Win2000 Pro computers is set to obtain an IP address automatically. You do not want to change this configuration. You want to designate a fixed IP address for each dial-in user. Each individual user should receive the same IP address when he dials in but but each user must get a unique IP address. How would you configure this?

A. Configure each laptop with a specific static IP address
B. Create a user class for the laptops and exclude these IP addresses from the DHCP scope
C. In Active Directory Users and Computers, assign a static IP address for each user
D. Create a separate subnet for the laptops and configure DHCP to issue IP addresses for this subnet only to the laptops

Answer: C

34. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named Delta Routing and Remote Access is enabled for remote access on Delta. The domain is in native mode For all user accounts, the dial-in permission is set to control access through remote access policies.

You want to allow all users in the domain to dial in during the workday. You also want to allow only members of the global security group named Support Staff to be able to dial in between 6 00 PM and 8 00 AM. However, you do not want to allow the Support Staff members to be able to dial in when the log files are made each day between 7:00 AM and 8:00 AM.

You create four remote access policies on Delta as shown in the following table Name :

Name Condition Permission
Domain users all policy Windows-group=Domain users Access
Support staff all policy Windows-group=Support staff Access
Domain users 6-8 policy Day-and-Time=6PM-8AM
Windows-group=Domain users Deny

Support staff 7-8 policy Day-and- Time= 7 AM-8AM
Windows-group=Support staff Deny

To specify the appropriate access control for Delta, click the Select and Place button, and then drag the remote access policies and place them in the correct order.

A. Support staff 7-8 Deny
Support staff all
Domain users 6-8 Deny
Domain users all

Answer: A

35. Your main office and two branch offices are connected by dedicated T1 lines. Two additional branch offices use 128-Kbps ISDN lines and Routing and Remote Access over the Internet to connect to the company's network. You are designing your DNS name resolution environment, and want to accomplish the following goals:

 DNS Name resolution traffic across the WAN should be minimized.
 DNS Replication traffic across the WAN should be minimized.
 DNS Replication traffic across the public WAN should be secure.
 Name resolution performance for client computers should be dynamic updates

You take the following actions:

 Install the DNS Server service on one Domain Controller at each office.
 Create an Active Directory integrated zone on each DNS server at each office.
 Configure client computers to query their local DNS server.
 Configure the zones to allow dynamic updates.

What results do these actions produce? (Choose all that apply)

A. Name resolution traffic is minimized.
B. Replication traffic is minimized.
C. Name resolution performance for client computers is optimized.
D. Replication traffic across the public WAN is secure.

Answer:A,C,D

36. You are the administrator of a Windows 2000 network. The network contains a Windows 2000 server computer named 'Ireland' that conrtains two network interfaces: interface_A and interface_B. Routing and Remote access is enabled as a router on Treland. The network seqment connected to interface_A contains a Windows 2000 DHCP server named ServerD as show in the EXHIBIT. You want to allow computers on the segment connected to interface_A to be able to use the DHCP server. How should you configure Ireland to accomplish this goal (choose all that apply)
A. Configure a DHCP relay agent to run on interface_A
B. Configure a DHCP relay agent to run on interface_B
C. create a static route to the IP address of interface_B
D. create an IP tunnel to connect interface_A to interface_B
E. Configure a DHCP relay agent to use the port number of the DHCP server
F. Configure a DHCP relay agent to use the IP address of the DHCP server as the server address.

Answer: B, F

37. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named DeskA Routing and Remote Access is enabled for remote access on DeskA. Your company is organizing an industry trade show in a conference center You have set up 15 desks and telephones in the conference area. During the conference, attendees will be allowed to dial in to your network by using any of the 15 telephones Each telephone line has its own telephone number.

The conference attendees can use their own portable computers to dial in. When attendees dial in to DeskA, they do not need to specify a user name or password However, you do not want to allow dial-in access from any telephone other than the 15 telephones in the conference area. You enable unauthenticated access on the DeskA remote access server

You also create a remote access policy named Conference that allows unauthenticated access as the authentication method. Attendees report that they are not able to dial in unless they specify a user name and password You want to ensure that attendees can dial in without specifying a user name and password.

What should you do?

A. Create a user account named Conference Guest. Configure Routing and Remote Access to use the Conference Guest account as the default user identity.
B. Configure the Conference Guest account to use the 15 phone numbers as Caller ID. Create 15 user accounts named Conf-1, Conf-2, Conf-3, and so on through Conf-15 Specify a separate Caller ID phone number for each of the 15 users.
C. Create 15 user accounts that use each phone number as the user name. Configure Routing and Remote Access to use the calling number as the authentication identity.
D. Configure the Conference remote access policy so that it has a Calling-Station ID condition. Use the 15 phone numbers as the condition

Answer: C

38. You are the administrator of a Windows 2000 domain. The domain has a Windows 2000 member server computer named Vegas Routing and Remote Access is enabled for remote access on Vegas Some of the remote access client computers require the use of CHAP. You enable CHAP on Vegas You also configure the appropriate remote access policy to use CHAP. However, users who require CHAP report that they are not able to dial in to Vegas

What should you do?
A. Configure Vegas to prohibit the use of U\.N Manager authentication
B. Configure Vegas to disable the use of link Control Protocol (lCP) extensions
C. Configure the user accounts by selecting Store passwords using reversible encrvption Set the user passwords to change the next time each user logs on
D. Configure the user accounts to use a static IP address when they dial in to the network
Answer:C

39. Your network consists of three network segments connected by a router. You install the DHCP server service on a Win2000 server. You create scopes for each subnet's range of addresses and activate the scopes. Users from the second and third subnets report they cannot connect to the network. Users on the first subnet have no problems. You check and find that the computers on segments 2 and 3 are not receiving TCP/IP information from the DHCP server. What should you do?

A. Manually configure the IP address for DHCP server on each client on subnets 2 and 3
B. Enable dynamic updates on the DHCP server
C. Install a DHCP Relay Agent on a computer on segment 2 and 3
D. None of the above

Answer C

40. You are the administrator of a Windows2000 network that has a main office and one branch office.The company leases a 128Kbps ISDN line to connect the main office to the branch office. You configure RRAS on a standalone Windows2000 server computer in each office to provide a demand dial connection. You want to encrypt traffic over the ISDN connection and you want to prevent unnecessary connection over the ISDN line. What should you do?

A. Configure a PPTP demand dial connection to connect the two offices over the ISDN connection and ensure that data encryption is enabled.Set the demand dial filters to exclude Netbios broadcast traffic.

B. Configure a PPTP demand dial connection to connect the two offices over the ISDN connection and ensure that data encryption is enabled.Set the demand dial filters to exclude Remote Procedure Call traffic.

C. Configure an L2TP demand dial connection to connect the two offices over the ISDN connection.Configure inbound and outbound filters to exclude all Netbios broadcast traffic.

D. Configure an L2TP demand dial connection to connect the two offices over the ISDN connection.In the demand dial filter list configure filters to exclude RPC traffic .

Answer A

41. Your network consists of one Windows 2000 domain running in native mode. You are not running Certificate Services. Salespeople in the field require file and print services, e-mail, and access to the company's database. You have dedicated T1 access to the Internet. You use VPN. You want to accomplish the following goals:

 Required network resources will be available to all Accounting people. Only the Accounting people will be able to make connections to the network.
 Confidential data should not be compromised.
 Network access will only occur during business hours.
 All Accounting staff are able to simultaneously connect to the network.

You take the following actions:

 Install Routing and Remove Access and configure virtual private networking.
 Grant the Accounting staff Allow Access dial-in permission.
 Edit the default remote access policy to grant remote access permission.
 Edit the default remote access profile to require strong encryption of data.

What results do these actions produce? (Choose all that apply)

A. Required network resources are accessible to all accounting people.
B. Connections to the network are made by accounting people only.
C. Sensitive company data is kept confidential over the VPN.

Answer:A,B,C

42. You are the administrator of your company's Routing and Remote Access servers Your company's administrators are able to dial in to the company's network to perform remote monitoring and administration. This remote monitoring and administration requires an excessive amount of network bandwidth You want to allow only administrators to use multiple phone lines, and you want to limit all other users to a single phone line. You want to configure multiple phone-line network connections to adapt to changing bandwidth conditions. When the phone lines fall below 50 percent capacity, you want to reduce the number of phone lines utilized. You also want to allow all users the ability to connect to the network by Routing and Remote Access No default remote access policies currently exist

What should you do? (Choose three)

A. Create one remote access policy on the Routing and Remote Access server
B. Create two remote access policies on the Routing and Remote Access server
C. Allow Multilink
D. Decrease the maximum number of ports used by the Routing and Remote Access server
E. Select the Dynamic Bandwidth Allocation Protocol (BAP) or BACP for Multilink check box.
F. Increase the maximum number of dial-up sessions

Answer: B,C,E

43. Your network consists of Windows 2000 Server computers, Windows 2000 Professional computers, and one NetWare server. Administrators must have complete access to the Sys volume on the NetWare server. All other users
should have read only access. Configuring Gateway Service for NetWare on a Windows 2000 Server computer.

What should you do to configure the appropriate access to the NetWare server? (Choose two)

A.Create an NT Gateway group on the 2000 server
B. Add the NT Gateway User Account to the NTGateway Group on the NetWare server.
C. on the Windows 2000 Server grant Administrators Full Control permission.
D. on the Windows 2000 Server grant Users Read permissions.
E. On the Netware Server grant Administrators Full Control Permission.
F. On the Netware Server grant users Read permission.

Answer: B, C, D

44. You configure your remote access server to allow DHCP to assign addresses and configurations. to the client computers. Users report that they cannot access network resources by using the server name or by searching Active Directory. You discover that when you connect to the remote access server your client computer is receiving an IP address but none of the DHCP options. What should you do to resolve this?

A. Configure the RRAS server to act as a DHCP Relay Agent
B. Create a static mapping for the RRAS internal interface to the DHCP server
C. Enable TCP/IP filtering on the external interface of the RRAS Server
D. Install a DHCP Relay Agent on the DHCP server

Answer:A

45. You are the administrator of a Windows 2000 domain. The domain has two Windows 2000 member server computers named Istanbul and Rome. Routing and Remote Access is enabled for remote access on Rome. Internet Authentication Service (IAS) is installed on Istanbul. Rome uses Istanbul to authenticate remote access credentials.
The remote access policies on Istanbul specify that domain members are allowed remote access to the network. However, users report that they are not allowed to dial in to Rome When you investigate the problem, you discover that the configuration of Istanbul supports only local user accounts.

What should you do?

A. Add Istanbul to the RAS and IAS Servers group in Active Directory
B. Configure Routing and Remote Access on Istanbul to use RADIUS Authentication
C. On Istanbul, add a realm replacement rule for the Windows 2000 domain.
D. On Istanbul, add a remote access policy that uses MS-CHAP

Answer A

46. You are the administrator of your company's network You are configuring your users' portable computers to allow users to connect to the company network by using Routing and Remote Access. You test the portable computers on the LAN and verify that they can successfully connect to resources on the company network by name. When you test the connection through Remote Access, all of the portable computers can successfully connect, but they cannot access files on computers on different segments by using the computer name.

What should you do to resolve this problem?

A. Set the authentication method to Allow remote systems to connect without authentication
B. Enable the computer account for each portable computer
C. Change the computer name on each portable computer
D. Install the DHCP Relay Agent on the Remote Access server

Answer D

47. Your WIn2000 network has 3 subnets, A, B, and C. A is at the corporate headquarters. B is used to connect a router at the HQ office to a router at the remote office (SubnetC). Two Win2000 servers are used as routers: RouterAB connects SubnetA and SubnetB. RouterBC connects subnetB and subnetC. You configure RouterAB and RouterBC to use demand-dial connections.

What two steps must you take to allow a client commuter on SubnetC to access a share on a client on SubnetA? (choose two)

A. Configure TCP/IP filter on the RouterAB demand-dial interface
B. Configure TCP/IP filter on the RouterBC demand-dial interface
C. Configure a static route for SubnetC on the demand-dial interface of RouterAB
D. Configure a static route for SubnetA on the demand-dial interface of RouterBC
E. Configure a static route for SubnetB on the demand-dial interface of RouterBC
F. Configure a static route for SubnetB on the demand-dial interface of RouterAB

Answer:C, D

48. You are the administrator of a Windows 2000 network. You have offices in two locations. In both offices you have recently installed a Windows 2000 Server configured as both Routing and Remote access server and Fax service server. A batch file and the windows scheduler are used to maintain accounting information at both offices.

Users are reporting that the accounting data does not seem to be synchronizing. No problems with Fax services or RRAS services have been reported. After further investigation, you find the sychronization is indeed failing.

What should you do to resolve this problem.

A. Stop the FAX service.
B. enable Multilinking for the Fax Service and RRAS service.
C. Enable Internet Connecting Sharing.
D. Configure the server as a Router.

Answer:A

49. You are the administrator of your company's network You have a portable computer that uses Microsoft Internet Explorer to access your company's Internet Information Services (IIS) computer. This application works successfully when your portable computer is docked at the office, but it fails when your portable computer is connected by Routing and Remote Access You want to configure your portable computer to connect to your company's network by Routing and Remote Access You want to install only what is necessary while maximizing performance and minimizing administrative overhead.

What should you click in the appropriate box or boxes in the Networking tab of the dialog box? (Choose all that apply)

A. Internet Protocol [TCP/IP)
B. File and Printer Sharing for Microsoft Networks
C. Network Load Balancing
D. Client for Microsoft Networks

Answer:A, D

50. 149. You administer your company's Windows 2000 network. Your company employs a sales force that needs access to the latest company data when traveling. You want to ensure that the company will establish a network connection for your salespeople regardless of where the call originates. Your company also allows customers access to the network using Routing and Remote Access to view and track orders. To ensure network and data security, your company wants to specify the location from which customers can connect to your network. You want to configure your company's Routing and Remote Access server (RRAS) to facilitate access for salespeople and for customers. You want both the salespeople and the customers to use mutual authentication to provide protection against remote server impersonation.

Which settings should you configure? (Choose three.)

A. Set Callback option to Always Callback To for salespeople
B. Set Callback option to Set by Caller for salespeople
c. Set Callback option to No Callback for customers
D. Set Callback option to Always Callback to for customers
E. Enable Microsoft Challenge Handshake Authent. Pr. version 2 (MS-CHAP v2)

Answer B, D, E


Network protocols key points

1. You are the administrator of the company's windows 2000 network. The network contains 5 windows 2000 servers and 400 windows 2000 professional client computers. One of the windows 2000 servers is configured with IIS v5 and hosts your company's web site. Default locations and configuration settings are used. To project your network from ecternal attacks you want to configure filters to allow traffic to send packets to and from the web server, what filters should you configure? (Choose all that apply)

A. Output filter for the source IP address of the web server and the TCP source port 80
B. Output filter for the destination IP address of the web server and the TCP source port 80
C. Output filter for the source IP address of the web server and the TCP destination port 80
D. Input filter for the source IP address of the web server and the TCP source port 80
E. Input filter for the destination IP address of the web server and the TCP destination port 80
F. Input filter for the destination IP address of the web server and the TCP source port 80

Answer: A, E

2. You are the administrator for your company's network. You have several NetWare servers running on your network and want to synchronize the user accounts between your Windows 2000 Server domain and your NetWare Servers. You select all the NetWare servers and use the Directory Service Manager for NetWare (DSMN) to synchronize the user accounts. You receive the following error message: "NWC is a NetWare 4.x server. It cannot be added to the domain."

What should you do?

A Remove the bindery emulation mode option from NWC. Reboot NWC. Rerun DSMN, selecting only NWC for synchronization

B. Do nothing. NetWare 4.x servers running in bindery emulation mode cannot be added to Windows 2000 Server domains under any circumstances.

C. Using REGEDT32.exe on the Windows 2000 Server domain controller, go to the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters key. Choose Add Value option for Edit menu. In Value Name, type Allow4X. In Type, enter REG_DWORD. In Data, enter 1. Close the Registry. Restart the Windows 2000 Server.

D. Using REGEDT32.exe on the Windows 2000 Server domain controller, go to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSSYNC\Parameters key. Choose Add Value option for Edit menu. In Value Name, type Allow4X. In Type, enter REG_DWORD. In Data, enter 0. Close the Registry. Restart the Windows 2000 Server

Answer C

3. Your Windows 2000 Server runs IIS and uses an IP address of 131.107.2.2 to support Internet users, and 10.1.1.2 to support an Intranet application. You want to configure this server to permit only Web communications from the Internet, and to allow access to shared folders and other resources for users on the Intranet.

What should you do? (Choose two)

A.Enable Tcp/ip filter. permit only port 80 on the network adapter use ip 131.107.2.2
B.Enable Tcp/ip filter. permit only port 21 and 20 on the network adapter use ip 131.107.2.2
C.Permit all ports on the network adapter use ip 131.107.2.2
D.Enable Tcp/ip filter. permit only port 80 on the network adapter use ip 10.1.1.2
E.Enable Tcp/ip filter. permit only port 21 and 20 on the network adapter use ip 10.1.1.2
F.Permit all ports on the network adapter that use the IP address of 10.1.1.2.

Answer:A, F

4. You are the administrator of your network.Your server has IP 131.107.2.2 to support internet users.10.1.1.2 to support an intranet application.you want to permit FTP communications from the Internet, and to allow access to shared folder and other thing in the internet. What should you do?(choose two)

A.Enable Tcp/ip filter.
permit only port 80 on the network adapter use ip 131.107.2.2
B.Enable Tcp/ip filter.
permit only port 21 and 20 on the network adapter use ip 131.107.2.2
C.Permit all ports on the network adapter use ip 131.107.2.2
D.Enable Tcp/ip filter.
permit only port 80 on the network adapter use ip 10.1.1.2
E.Enable Tcp/ip filter.
permit only port 21 and 20 on the network adapter use ip 10.1.1.2
F.Permit all ports on the network adapter use ip 10.1.1.2

Answer B, F

5. Your network consists of a computer running Windows 2000 Server, NWLink, and SQL Server named SQL1. It has one network adapter card. You need to enable access to SQL for clients running Windows 98 and NetWare clients from Novell. The NetWare servers on your network are running NetWare version 4.11. What should you do?

A. Configure a unique internal network number for SQL.

6. You have four Windows 2000 Professional computers and two Windows 2000 server. Pro1 can ping 172.16.96.1. Pro4 can ping 172.16.64.1. All windows professional computers can communicate with each other, but WS1 cannot ping WS2.

Segment A 172.16.64.1
WS1 172.16.71.32 255.255.224.0 172.16.64.1

Segment B 172.16.96.1
WS2 172.16.86.76 255.255.224.0 172.16.96.1

What should you do to ensure WS1 communicates with WS2?
A. Change the subnet mask of the network to 255.255.240.0
B. Change the subnet mask of the network to 255.255.192.0
C. Change the IP address of work1 to 172.16.63.32
D. Change the IP address of work1 to 172.16.103.76

Answer:D

7. You install and configure both TCP/IP and NWLink IPX/SPX on a Windows 2000 Professional computer. Your network consists of Windows 2000 Servers, Windows NT Server 4.0, and NetWare 3.11 and 4.1 servers. You install the client software for both Microsoft and NetWare networks. But, when you attach the Windows 2000 Professional computer to the network, you are unable to see the NetWare 3.11 servers in My Network Places. You also cannot map drives by using either Microsoft-specific or NetWare-specific commands. What should you do?

A. Edit the PktType value in the registry to include the hexadecimal values for both 802.3 and 802.2 frame types.

Answer:A

8. You are the administrator of you company’s windows 2000 / novell netware 5.0 routed network. All client on the network are configured with windows 2000 professional. Both the windows 2000 professional client computers and windows 2000 server computers to communicate with the novell netware 5.0 servers NWLink has been installed on all windows 2000 client and server computers. What protocol or protocols muct be installed on the novell netware 5.0 server for network communication to succeed? (choose all that apply)

A. IPX/SPX
B. TCP/IP
C. NWLink
D. Microsoft CHAP (MS-CHAP)
E. SNMP

Answer A

9. Your Web server is configured to run a third party Web application for users on your network. Users complain that each time they try to connect to a secure Web page stored on the Web server, they receive the error message "Web page requested is not available". They have no problem connecting to FTP.

You have verified that the Web service has started. What should you do to diagnose this problem?

A. Verify that port 443 is permitted in your TCP/IP filter.
B. Verify that port 80 is permitted in your TCP/IP filter.
C. Verify that port 21 and port 20 is permitted in your TCP/IP filter.
D. Verify that the correct NTFS file permissions are configured for the web page.

Answer: A

10. You are the administrator of your companies network. Both windows 2000 and Netware 4.0 servers are present on the network. You have successfully installed client service for Netware on all Windows 2000 Professional client computers in the network and gateway service for Netware on the Windows 2000 Server Computers. You have just added another Windows 2000 Server computer to the network and have installed Gateway Services for Netware. However, the server is not able to connect to any of the netware servers.

What should you do?

A. On the new Windows 2000 Server computer enable NWLInk NetBIOS
B. On the new Windows 2000 Server computer install the SAP Agent.
C. On the new Windows 2000 Server computer install RIP routing for IPX
D. On the new Windows 2000 server computer configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use the correct Ethernet frame type.
E. On the Netware 4.0 Server computers configure the NWLink IPX/SPX/NETBios compatible Transport Protocol to use the correct Ethernet Frame type.


Answer D

11.Your network consists of two segments. The first segment contains Windows 2000 server computers and the second segment contains NetWare 4.1 servers.

On subnetwork 1, you want the Windows 2000 Server computer to provide file and print services to Windows-based clients that use TCP/IP.

On subnetwork 2, you want the Windows 2000 Server to provide application services to NetWare clients that use only IPX/SPX.

The Windows 2000 Server has two network adapter cards, and it will not function as a router for either subnetworks you also want to increase network performance.

What should you do? (Choose two)

A. Unbind TCP/IP from the adapter connected to subnetwork 2.
B. Unbind NWLink from the adapter connected to subnetwork 1.
C. Unbind TCP/IP from the adapter connected to subnetwork 1.
D. Unbind NWLink from the adapter connected to subnetwork 2.

Answer A, B

12. You are the network administrator for a windows 2000 domain. Client computers in your domain are Windows 98 computers or Windows 2000 computers. Clients in your domain use a client/server application that accesses files from one of the NT4.0 server computers.

Users are reporting that they cannot connect to this Windows NT server computer. The Windows NT 4.0 server computer can successfully connect to the Windows 2000 computers.

What should you do?

A.On the Windows NT 4.0 computer run "IPConfig /registerDNS" command
B.On the DHCP server select Enable Updates for DNS Clients That Do Not Support Dynamic Update checkbox
C.On the DNS server select Enable Updates for DNS Clients That Do Not Support Dynamic Update checkbox
D.Run the "Ipconfig /flushdns" command on all of the Win2000 computers


Answer B

13. Your network consists of two Win2000 servers and 50 Win2000 Pro desktops. You configure DHCP server to automatically update your DNS server's forward and reverse lookup zone files with the clients' DHCP information. In the reverse lookup zone some of the client computers do not have PTR records. What should you do?

A. Configure the DHCP server to always update DNS, even if a client computer does not request it
B. Enable Dynamic Updates on the DNS server
C. Add the DHCP server to the DHCPProxyUpdate list
D. Configure the DHCP clients by putting a check mark in the "Update DNS" box on the TCP/IP properties Advanced tab.

Answer:A

14. You have mirrored the contents of an Intranet Web application on three Web servers that contain IIS. Using the fewest possible resources, how should you configure DNS to allow access to all Web servers in the event of a failure?

Answer

Configure one DNS server so that it has one DNS zone.
Enable Round Robin.
Create an A (host) record for the application on each Web server's IP address.

15. On your Windows 2000 server, you install Client Services for Netware and NWLink with the default settings. How should you configure your Windows 2000 server to connect to all Netware servers, regardless of their versions?

A. Set the adapter to frame type 803.2
B. Set the adapter to Manual Frame Type Detection and add the frame type of each Netware server
C. Edit the registry to allow all frame types
D. You can only connect to one type of Netware server at a time so this cannot be accomplished

Answer:B

16. Your network consists of two Win2000 Servers and 75 Win2000 Professional desktops. One server is a DHCP server which provides TCP/IP configuration to all of the Win2000 Pro computers. You have a global group configured for your helpdesk personnel. You want to allow your help desk support personnel to have only Read access to the DHCP console and the DHCP lease information. What should you do?

A.Give the helpdesk global group NTFS read only permission to the %root%/sysvol/DHCP folder
B.Add the helpdesk global group to the DHCP Admins group
C.Add the helpdesk global group to the DHCP users group
D.Add the helpdesk global group to the local admins group on the DHCP server

Answer C

17. You configure your windows 2000 Server to route all network traffic on your Intranet. Users on both segments need access to files on the other segment.

Network Destination Subnet Mask Gateway Interface Metric
10.0.0.0 255.0.0.0 10.0.0.169 10.0.0.169 1
10.0.0.169 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.0.0 192.168.0.200 192.168.0.200 1
192.168.0.200 255.255.255.255 127.0.0.1 127.0.0.1 1

You install and start IIS Web Service on the server. Users on both segments report they cannot access the Web service. What must you do?

A. Disable all TCP/IP port filters
B. Stop and restart the web service
C. Use the Add Route command
D. Use IPCONFIG command

Answer:A
18. You are planning to migrate your 100 network computers from IPX/SPX to TCP/IP and establish connectivity with the Internet. Your ISP assigns the address 192.168.16.0/24 to your network. You require 10 subnets with at least 10 hosts per subnet. What subnet mask should you use?

A. 255.255.255.224
B. 255.255.255.192
C. 255.255.255.240
D. 255.255.255.248

Answer:C

19. You are the administrator of a single Windows 2000 domain that uses TCP/IP as it's only network protocol. DHCP is used to automatically assign TCP/IP information to your Windows 2000 Professional client computers.

As of late, you have added several new Windows 2000 Professional clients to the network. Users are reporting that they cannot always access network resources.

After further investigation you find that the IP address from one of the troubled computers 169.254.0.16.

What should you do to resolve the problem:

A. Add another scope to the DHCP-server for the new machines
B. Shorten the lease duration for the existing scope
C. Assign static IP-addresses to the new Windows 2000 desktops
D. Add enough new addresses to the existing DHCP scope to include the new client computers

Answer:D
Network protocol security key points

1. You administer your company's network. You have 20 Windows 2000 Professional computers operating in a switched network environment running TCP/IP. Ten of the Windows 2000 Professional computers are on subnet A. The other ten windows 2000 Professional computers are on subnet B.

The company uses a Windows 2000 Server computer running Internet Authentication Service (IAS) to connect to the Internet. The IAS server is on subnet B.

You decide to set up Network Monitor to monitor all traffic on your network.

You install Network Monitor on the IAS server. You configure Network Monitor properly to monitor all TCP/IP traffic.

Which packets will you be able to monitor?

A. All packets.
B. Packets sent from the IAS server only.
C. Packets addressed to the IAS server only.
D. All packets addressed to and sent from the IAS computer.

Answer:D

2. You are in charge of setting up, maintaining and deploying your company's web site. You install windows 2000 server and internet information server. Your company is expecting a large number of its current customers to access the new web site. Your manager is concerned about client Access license's (Cal's). what type of license is needed to comply with Microsoft License Agreement?

A. Per seat licensing
B. Per server licensing
C. A single HTTP license
D. A Microsoft internet connector license
E. No license is required.

Answer:E

3. Your network has a main office and one branch office. You use PPTP to connect the main office to the branch office. What is the strongest possible level of data encryption for the connection?
A. MS-CHAP v2
B. MSCHAP
C. PAP
D. EAP

Answer A

4. A user who uses a Windows 2000 Professional computer must access data on a server that requires communication using IPSec. The Event Viewer indicates the IPSec Policy Agent cannot be started. What should you do to insure that the IPSec Policy Agent is installed correctly on this computer?

A. Remove and reinstall the TCP/IP protocol.
Answer: A

5. You are the administrator of your company's network.To monitor the traffic on your network,you install Network Monitor.You need to monitor the source IP address,destination IP address,and destination port number of every TCP/IP frames on the network,you want to log the information for a period of 3 hours.
What should you do(two)

A.On the Captuer Buffer Settings menu,increase buffer size.
B.On the Captuer Buffer Settings menu,decrease buffer size.
C.On the Captuer Buffer Settings menu,increase frame size.
D.On the Captuer Buffer Settings menu,decrease frame size.
E.Change the Tempory Capture Directory

Answer A, D

6. You install Network Monitor on a Windows 2000 Server to analyze ISO and TP4 communications to the Microsoft Exchange Server on your network. How should you configure Network Monitor? (Choose two)

A. change the Temporary Capture Directory.
B. Copy ISO.dll and TP4.dll to Netmon Subdirectory.
C. Copy ISO.DLL and TP4.DLL to the NetMon\Parsers subdirectory.
D. Modify the Parser.ini.
E. Modify the Netmon.ini.

Answer: C, D

7.Your company has a SNMP-enabled network router installed on its network. Your company wants to monitor all SNMP traffic generated by the router. You install Network Monitor on a Windows 2000 server computer on your network. Your router is configured to trap to an SNMP manager installed on another server. You want to receive a notification whenever the network router raises an SNMP trap.

What should you do? (Choose two)

A. Create an Network Monitor filter that has a pattern match for SNMP-traffic.
B. Install SNMP on the server.
C. Create a network monitor trigger to run the Net Send command
D. Create a TCP/IP filter on the server.
E. Start the Windows 2000 Alerter Service on the server.
F. Configure the network router to trap to the IP address of the server.

Answer A, C

8. You are the administrator for your company's network. Your network has three Windows 2000 Server computers, named Srvr1, Srvr2, and Srvr3. Each employee has his own Windows 2000 Professional computer. Also there is one Windows 2000 Professional computer, named Prof1, that is used by the general public.

Recently several files have been written to Srvr1 and Srvr2 that could have possibly caused great harm to your company's network. You suspect that the files came from Prof1. You want to monitor the traffic between these three computers.

Srvr3 is located in your office so you decide to capture the data there.
You want to accomplish these goals with the least amount of administrative overhead.

What should you do?

A. On Srvr3, install the Network Monitor Tools. Then start Network Monitor and configure the capture data for Prof1, Srvr1, and Srvr2.
B. On Prof1, install the Network Monitor driver. On Srvr1 and Srvr2, install the Network Monitor driver. On Srvr3, install the Network Monitor Tools. Then start Network Monitor and configure the capture data for Prof1, Srvr1, and Srvr2.
C. On Prof1, install the Network Monitor Tools. Then start Network Monitor and configure capture data for Prof1. On Srvr1 and Srvr2, install the Network Monitor driver. On Srvr3, install the Network Monitor Tools. Then start Network Monitor and configure the capture data for Srvr1 and Srvr2.
D. On Prof1, install the Network Monitor driver On Srvr1 and Srvr2, install the Network Monitor Tools. Then start Network Monitor and configure the capture data for Srvr1 and Srvr2, respectively. On Srvr3, install Network Monitor Tools. Then start Network Monitor and configure the capture data for Prof1.

Answer:B

9. To determine if answers to NDS queries are exceeding the limit for a single UDP packet, What should you do?

A. Use Network Monotior to analyze network traffice. Use nslookup on a separate computer to query for NS records on the primary DNS server. Compare the number of UDP packets returned from the DNS server in response to your queries with the number of queries you issued.

10. Your network consists of Windows NT 4.0 and Windows 2000 computers. All Windows 2000 Server computers are member servers of a single Windows NT 4.0 domain. You would like to use two of these servers to test IPSec configurations that are using Kerberos authentication protocol. What should you do?

A. Promote one of the servers to a domain controller.
Assign the domain controller the default Secure Server IPSec policy.
Assign the other server the default Client IPSec policy.

Answer:A

11. Your network is configured as follows:

ACCT1 ACCT2 MGM1 Prod1
Router --- Internet
Sale1 Sale2 Prod2

The Accounting xomputers do not need access to the internet. You want to accomplisg the following goals:

- All communication invloving ACCT1 and ACCT2 should be encrypted.
- Internet communications should not be encrypted.
- Communications between the Sales and Management clients should be encrypted.
- Performance overhead for encryption should be minimized.

You take the following actions :

Create the following OU structure

Sales - Comp - Acct

Add Acct1 Acct2 to the Acct OU
Add Sale1 and Sale2 to the Sale OU
Add all other computers to the Comp OU
Assign the default Secure Server IPSec Policy to the domain.

Which results do these actions produce? (choose all that apply)

A. All communication invloving ACCT1 and ACCT2 should be encrypted.
B. Internet communications should not be encrypted.
C. Communications between the Sales and Management clients should be encrypted.
D. Performance overhead for encryption should be minimized.

Answer:A, B, C

12. Your company policy is to allow only Administrators in your Houston office to install and use Network Monitor. You have been informed that Administrators in New York are installing and using Network Monitor. After you install Network Monitor, what should you do to monitor how many copies of Network Monitor are currently running? (Choose two)

A. On the Tools Menu in Net Monitor select Identify Network Monitor Users
B. Install Network Monitor on a computer on the second segment
C. Remove the default Remote Access Policy
D. Remove the "access Network Monitor" permission for Domain Admins

Answer:A, B

13 You are the administrator for your company's network. The company’s Internet web server (IIS) runs on Windows 2000 Server computer. The web server is not a member of any domain in your company’s network. For security reasons you want to keep the web server separate from the rest of the network. Your company has decided to allow customers to make online transactions avaliable through the web site. To ensure customer transaction security, the company has decided to accept transaction only through encryption. It has also been decided that customers should be assured of your web servers identity when they make online transactions

What type of CA would you install?

A. Install an enterprise CA on your server.
B. Install a subordinate enterprise CA on your server from a known commercial CA.
C. Install a stand-alone CA on your server.
D. Install a stand-alone subordinate CA on your server from a known commercial CA.

Answer D

14. You are the Network Administrator of your company's network. Your network uses IPSec to ensure private and secure communications over your TCP/IP network. Using the least amount of adminsistrative overhead you want to prevent the re-use of the previous session keys. What should you do?

A. Install the Ipsec Policy Agent Service.
B. Impliment an IPSec policy, View the IPSec policy using the MMC IP security Policy management snap-in. Select the "Master key Prefect forward Secrecy" check box.
C. Impliment an IPSec policy, View the IPSec policy using the MMC IP security Policy management snap-in. Select the "Session key Prefect forward Secrecy" check box.
D. Impliment an IPSec policy, View the IPSec policy using the MMC IP security Policy management snap-in. ON the "Generate a new key every" property sheet modify the time allocations.

Answer:C

15. You use the Group Policy Editor to create an IPSec policy for the Group Policy Object linked to an OU in your Windows 2000 domain. What should you do to insure the policy is applied to the computers in the OU?

A. Use the IP Security Policies node in Group Policy Editor to assign the policy.

Answer:A

16. You are the administrator for a Windows 2000 Server network. You have a Dynamic Host Configuration Protocol (DHCP) Server which is configured to give DHCP clients all appropriate TCP/IP settings. You also have a Domain Name System (DNS) / Windows Internet Name Service (WINS) server. You set up a Windows 2000 Server computer to be the dial-up connection server and want to configure the security for the dial-up connections.

You want to accomplish the following goals:

Require the entry of a password upon connection.
Use the Windows logon and password for authentication.
Require the use of data encryption.
Automatically run a script named logon.scp upon connection.

You perform the following actions:

- From the dial-up connection properties on the Security tab in the Security options section, select - - Typical (recommended settings) radio button.
- For the Validate my identity as follows box, select Allow unsecured password.
- Check the Automatically use my Windows logon name and password (and domain if any) box.
- Check the Require data encryption (disconnect if none) box.
In the Interactive logon scripting section, check the Run script box and type in filename logon.scp.

Which goal or goals are accomplished from these actions? (Choose all that apply.)

A. Require the entry of a password upon connection
B. Use the Windows logon and password for authentication
C. Require the use of data encryption
D. Automatically run a script named logon.scp upon connection

Answer: B, C, D

17. You are the network administrator of a Windows 2000 network. The network consists of 400 Windows 2000 Professional computers. It has recently come to your attention that the users on your network have been using the same passwords since their accounts were created. To maintain security on the network you need to correct the problem. You create a Group Policy object (GPO) and filter it to the users. You want to configure the GPO to require users to create a different password periodically. Which two should you enable?

A. Minimum password length
B. Users must log on to change the password
C. Enforce password history
D. Minimum password age
E. Maximum password age.

Answer C, D
Wins key points

1. You are the administrator of a Windows 2000 domain The domain has four Windows 2000-based WINS servers . You want to delegate the ability to create the four WINS servers' performance logs to a domain user named Kim. You do not want Kim to be able to change the configuration of the four WINS servers The performance logs for the WINS servers are created by using the Performance console.

How should you configure the network to accomplish this goal?

A. Add the user Kim to the Domain Local group named Wins Users.
B. Create a new Domain Local group named Performance Administrators Add the user Kim to the Performance Administrators group
C. On the four WINS servers, change the NTFS permissions on the System32\Wins folder to include Read permission for user Kim
D. On the four WINS servers, change the Registry permissions on the HKEY -LOCAL-MACHINE\system\CUrrentContro\Set\ServiCeS\W key to include Read permission for user Kim.

Answer: B

2. You are the administrator of your company's network The network consists of a single Windows 2000 domain The network has Windows 2000 Server computers, Windows 2000 Professional computers, and Windows NT Workstation 40 computers distributed across two IP subnets as shown in the exhibit (Click the Exhibit button) Two Windows 2000 domain controllers are located on Subnet1 Each domain controller is also a DNS server hosting an Active Directory integrated zone You implement WINS for NetBIOS name resolution on your network WINS is installed on a server on Subnet2 Users of the Windows NT Workstation 40 computers on Subnet2 report that they are receiving the following error message 'Domain Controller cannot be located' Subsequently, these users cannot be validated on the network Windows NT Workstation 40 users on Subnet1 are not experiencing this problem. However, they do report that response times for logon requests are extremely slow None of the Windows 2000 Professional users on either subnet report these problems You want to ensure that Windows NT Workstation 4.0 users on Subnet2 can be validated You also want to improve logon request response time for users on Subnet1

What should you do?

A. Configure the router to forward NetBIOS broadcast packets
B. Configure the Windows NT Workstation 4.0 computers as WINS clients in the existing zone
C. Configure the Windows NT Workstation 4.0 computers as WINS clients
D. Configure the Windows 2000 Server domain controller computers as WINS clients

Answer: D

3. You are the administrator of a Windows 2000 network. The network has six Windows 2000-based WINS servers and two Windows 2000-based DHCP servers. To anticipate the migration of the network from WINS to DNS, you decide to remove one WINS server named Wins6 from the network by performing the following actions.

On Wins6, stop the WINS Service and uninstall WINS.

On the DHCP servers in the network, reconfigure the options to no longer specify Wins6 as a WINS server Configure the DHCP options to instead use the other five WINS servers equally.

On WINS client computers that are manually configured to use TCP/IP , reconfigure the network properties to no longer use Wins6 as a WINS server Configure these client computers to instead use any of the other five WINS servers.

On one of the remaining WINS servers, delete the static mappings originally made on Wins6.

After several weeks, you notice that static mappings originally made on Wins6 are still present on all the remaining WINS servers.

What should you do to permanently remove these unwanted static mappings from the remaining WINS servers?

A. On the remaining WINS servers, use the Scavenge Database command in the WINS console
B. On the remaining WINS servers, perform an offline compaction of the WINS database
C. Configure the remaining WINS servers to use Migrate On handling of static entries
D. On one of the remaining WINS servers. manually tombstone the Wins6 owner from the database .

Answer: D

4. You are the administrator of your company's network. The network consists of Windows 2000 Server computers, Windows NT Workstation client computers, and Windows for Workgroups 3.11 client computers distributed across three subnets All client computers are configured as DHCP client computers to automate TCP/IP configuration. You install a WINS server on one subnet on your network You also define a DHCP scope option to include the WINS server's address. Users report that they can access resources on servers on their own subnet, but they cannot access resources on other subnets.

What should you do to resolve this problem?

A. Use the ipconfig /renew command to refresh the client computers' configuration
B. Use the ipconfig /release command to refresh the client computers' configuration
C. Install a WINS proxy agent on the subnet that hosts the WINS server
D. Install a WINS proxy agent on the subnets that do not host the WINS server
E. Enable dynamic updates on the wins server

Answer: D

5. You are the administrator of your company's network The network consists of 10 Windows 2000 Server computers, 200 Windows 2000 Professional computers, 250 Windows 98 computers, and 25 UNIX workstation computers running 5MB server software. The network runs only TCP/IP as its transport protocol You implement WINS in the network for NetBIOS name resolution. Users of the Windows-based client computers report that they cannot access resources based on the UNIX computers by NetBIOS name. There is no problem accessing Windows-based resources by NetBIOS name.

What should you do to resolve this problem?

A. Install a WINS proxy agent on one of the UNIX computers
B. Install a WINS proxy agent on one of the Windows-based computers
C. On the WINS server, create static mappings for the UNIX computers
D. On the WINS server, create static mappings for the Windows-based computers

Answer: C

6. You administer a Windows 2000 network. Your network has three Windows 2000-based Windows Internet Name Service (WINS) servers. You want periodic backups of the WINS database on all WINS servers to occur automatically.

What should you do?

A. In the WINS console on all three WINS servers, right-click to select the server name, then select the Backup Database option
B. In the WINS console on all three WINS servers, configure the General properties of each WINS server to specify the default backup path
C. On all three WINS servers, use Windows Backup to schedule a regular backup of the contents of the System32\WINS subdirectory
D. On all three WINS servers, configure the File Replication Service to copy the contents of the System32\WINS subdirectory to another location on the disk.

Answer: A

7. You are the administrator for your company's Windows 2000 network. Your company has three offices: on in Dallas, TX, one in Houston, TX, and one in Galveston, TX. Houston and Galveston are connected to Dallas by a T1 line. Each site has its own Windows Internet Name Service (WINS) server. You have implemented WINS replication between the WINS servers. You view the WINS database on the WINS server in Houston. It contains records in the active state, records in the released state, and records in the tombstoned state.

Which records will be replicated to the WINS server in Dallas?

A. All the records, regardless of their state
B. Only records in the active state
C. Both the records in the active state and the records in the released state
D. Both the records in the active state and the records in the tombstoned state
E. Both the records in the released state and the records in the tombstoned state

Answer: D

8. You are the administrator of a Windows 2000 network. The network has seven Windows 2000-based WINS servers, and each is in a separate location. Because network users frequently log on at different locations, you want to configure the seven WINS servers to have a convergence time of less than one hour.

How should you configure the seven WINS servers to accomplish this goal?

A. Create a display of the seven WINS servers in a circular arrangement Configure each WINS server as a push/pull partner with the two WINS servers beside it in the circle .Use a replication interval of 25 minutes
B. Designate one of the WINS servers as the central WINS server Configure the other six WINS servers as push/pull partners with the central WINS server. Configure the central WINS server as a push/pull partner with the other six WINS servers. Use a replication interval of 25 minutes
C. Configure each WINS server to automatically configure the other WINS servers as its replication partners Use the default interval time for automatic partners configuration.
D. Configure each WINS server to use a renew interval of 50 minutes . Use the default value for the verification interval

Answer: B

9. Your network has 3 Win2000 WINS servers. How would you manually compact the WINS database on one of the WINS servers ?

A. Use the Compact command from the command line and specify the sysvol/wins folder.
B. Stop the Server's WINS Server. Use the Jetpack command line tool to compact the WINS database. Restart the server's WINS Server
C. Stop the Server's WINS Server. Use the Compact command from the command line. Restart the Server's WINS Server
D. Backup the WINS Database. Use the jetpack command line tool to compact the WINS database. Do an authoritative restore of the backup

Answer: B

10. You work for a local state agency that does not use Windows Internet Name Service (WINS) for NetBIOS name resolution. Instead, each client on the network copies a master LMHOSTS file from a central server during the logon process.
After experiencing a number of problems with the current Primary Domain Controller (PDC) named MIS4 of the HR domain, you decide to promote one of the Backup Domain Controllers (BDCs) named Payroll2 to PDC status and take the former PDC offline. In the master LMHOSTS file, you take off the listing for the former PDC.

What is the other change you must make?

A. 128.131.24.122 Payroll2 #DOM:HR
B. 128.131.24.122 Payroll2 #DOMAIN:HR
C. 128.131.24.122 #PRE Payroll2 #DOM:HR
D. 128.131.24.122 Payroll2 #PRE #DOM:HR

Answer D

11. Your network has ten segments connected by routers. Only four segments have Windows 2000-based WINS servers. Throughout the network are several NetBIOS b-node client computers. NetBIOS b-node clients cannot browse any other network segments, but are having no problems browsing their own. What should you do?

A: On each segment, configure a computer as a WINS proxy.

12. Your WINS server's hard disk fails, and you replace it, and restore the WINS database from a backup that is one week old. Now, users report they cannot browse any of the resources in the other locations. What should you do?
A. On the WINS server use jetpack.exe utility on the WINS database
B. On the WINS server use the verify database consistency command
C. On the Windows 2000 Server computers, use the NBTStat -RR command to release and refresh the WINS registrations.
D. On the WINS client computer use the ipconfig/registerdns command to register names and IP addresses

Answer:C

13. You are the administrator of a Windows 2000 network The network has four Windows 2000-based WINS servers named NY1 , NY2, Bos1 , and Bos2 The network has computers in two locations Boston and New York . The Bos 1 and Bos2 WINS servers are at the Boston location The NY1 and NY2 WINS servers are at the New York location. You want to configure the replication between the WINS servers to accomplish the following goals The NY1 and NY2 WINS servers must replicate changes in the local database to each other immediately following each new registration or IP address change registration The Bos1 and Bos2 WINS servers must replicate changes in the local database to each other every 30 minutes. The changes in the WINS database in either location should be replicated to the other location every three hours.

How should you configure the WINS servers to accomplish these goals? (Choose three)

A. Configure the WINS servers to enable burst handling. Set the number of requests for burst handling to 1
B. Configure the NY1 and NY2 WINS servers as push/pull partners of each other. Configure both WINS servers to use persistent connections for push replication partners Set the number of changes before replication to 1
C. Configure the Bos1 and Bos2 WINS servers as push/pull partners of each other Specify a replication interval of 30 minutes
D. Configure the Bos1 and Bos2 WINS servers as push/pull partners of each other Configure both WINS servers to enable periodic database consistency checking every 30 minutes
E. Configure the NY1 and the Bos1 WINS servers as push partners of each other. Configure both WINS servers to update statistics every three hours
F. Configure the NY1 and the Bos1 WINS servers as push/pull partners of each other Specify a replication interval of three hours

Answer: B, C, F

14. Your network has two Windows 2000-based WINS servers. How should you configure the network to automatically backup the WINS database of both WINS servers?

A.Use the backup command and backup the Wins.db database
B. In the WINS console on both WINS servers configure the General properties of the WINS server to specify a default backup path.
C.Backup the sysvol folder on both servers
D.Use the file replication service and replicate the WINS database to a secure location

Answer B

15. You are the administrator of your company's network The network consists of a single Windows 2000 domain. The network has Windows 2000 Server computers, Windows 2000 Professional computers, and Windows NT Workstation 40 computers distributed across two IP subnets as shown in the exhibit (Click the Exhibit button). Two Windows 2000 domain controllers are located on Subnet1. Each domain controller is also a DNS server hosting an Active Directory integrated zone. You implement WINS for NetBIOS name resolution on your network. WINS is installed on a server on Subnet2. Users of the Windows NT Workstation 40 computers on Subnet2 report that they are receiving the following error message 'Domain Controller cannot be located'. Subsequently, these users cannot be validated on the network Windows NT Workstation 40 users on Subnet1 are not experiencing this problem. However, they do report that response times for logon requests are extremely slow. None of the Windows 2000 Professional users on either subnet report these problems. You want to ensure that Windows NT Workstation 4.0 users on Subnet2 can be validated. You also want to improve logon request response time for users on Subnet1.

What should you do?

A. Configure the router to forward NetBIOS broadcast packets
B. Configure the Windows NT Workstation 4.0 computers as WINS clients in the existing zone
C. Configure the Windows NT Workstation 4.0 computers as WINS clients
D. Configure the Windows 2000 Server domain controller computers as WINS clients

Answer C

16. Your network contains 12 WIN2000 servers and 100 Wins2000 Professional computers across 4 subnets connected by a router. The servers are used to serve file and print resources to the clients. You install the WINS Server service on a server on one subnet. You configure the WINS option in a DHCP scope to configure all of the computers on the network to register with and query the WINS server for NetBIOS name resolution. Users on the remote subnets report that they cannot access resources located on the WINS server by using its Netbios name. Other TCP/IP connectivity is not affected. Users located on the same subnet as the WINS server are not having any problems.

What should you do?

A. Install a WINS proxy agent on the remote subnets
B. Enable Dynamic Updates on the WINS server
C. Configure the remote clients to use DNS for Netbios name resolution
D. Configure the WINS server to include its own IP address as a WINS client computer

Answer:D
17. You are the administrator of a Windows 2000 network The network has three segments connected by a router. Each segment contains a Windows 2000-based WINS server and two other Windows 2000 Server computers. The network also has 300 Windows NT Workstation 4.0 WINS client computers distributed evenly over the three segments. Users in each network segment inform you that they cannot browse any network resources on the other network segments. They do not have problems browsing their own segment.

How should you configure the network to enable users to browse for network resources on all three network segments?

A. Configure all WINS client computers to be NetBIOS node type Mixed (m-node)
B. Configure all WINS client computers to use all three WINS servers.
C. On each WINS server, configure the Lmhosts file to contain entries that include #PRE and #DOM for the other two WINS servers
D. Configure the three WINS servers as replication partners of one another

Answer:D

18. You are the administrator of a Windows 2000 network. The network has 18,000 Windows 2000 Professional WINS client computers and six Windows 2000-based WINS servers The WINS client computers are portable client computers, and they frequently connect to the network at different locations. The WINS client computers access NetBIOS-based resources. The TCP/IP configuration of the WINS client computers is provided by DHCP servers on the network. Some of the WAN links in your network are unreliable You want to ensure that all Windows 2000 Professional computers are able to resolve NetBIOS names, even if some of the WINS servers are not available.

How should you configure the network to accomplish this goal?

A. On each segment, configure a computer as a WINS proxy
B. Configure the DHCP servers to provide each client computer with a list of WINS servers.
C. Configure the WINS servers to enable burst handling Set the number of requests for burst handling to High
D. Configure the DHCP server to set the NetBIOS over TCP/IP node type for each client computer to Mixed node)

Answer:B
IP Routing Key points

1. You are the network administrator for a small company. You plan to use two machines running Windows 2000 Server with multiple network cards as routers for your network. You would like to have the ability to do Classless Inter-Domain Routing as well as institute Variable Length Subnet Masks. Which of the following
routing protocols can you use to support these features? (Choose all that apply.)

A. EIGRP
B. OSPF
C. RIPv1
D. RIPv2

Answer B, D

2. You are the administrator of Windows 2000 network. Netowork has two Windows 2000 server named router1 and router2. Routing and remote access is enabled as a router on router1 and router2. There are no other routers on the network. A part of the IP routing table is shown in the following.

To change routing information, you want to enable RIP for IP on router1 and router2. You configure RIP for IP on router1 and router2. You Configure router1 and router2 as follow:

- Set operation mode to periodic update mode
- set outgoing packet protocol to RIP V1 broadcast
- Set incoming packet protocol to RIP V1 and RIP v2
- specify router1 and router2 as unicast neighbours of each other

When monitoring the IP routing table of router2, you note that server is not receiving the correct router from router1

Change router configuration, what should you do?

A. configure RIP IP to include host router in announcements that are sent
B. configure the RIP for IP interface to add an input packet filter that will allow network traffic for RIP port 320
C. Set RIP for IP outgoing packet protocol to RIP V2 broadcast
D. Specify router1 and router2 as RIP for IP peer router

Answer C

3.You are the administrator for your company's Windows 2000 network. The network has 5 Windows 2000 servers and 50 Windows 2000 Professional clients. Two servers are configured to be silent RIP hosts. You find out that the RIP hosts are not receiving routes. What should you do?

A. Verify RIP hosts support broadcast listening.
B. Verify TCP/IP is configured for inbound traffic.
C. Verify IP routing table contains the problem.
D. Verify the version of RIP that the silent RIP hosts support.

Answer:D
Network address Translation key points

1. You are the administrator of a Windows 2000 network. The network consists of 30 Windows 2000 Professional computers and two Windows 2000 Server computers named Athens and Boston Athens has a permanent cable modem connection to the Internet.

All Windows 2000 Professional computers on the network are configured to use Automatic Private IP Addressing (APIPA). The network does not contain a DHCP server. To allow all Windows 2000 Professional computers on the network to access the Internet through the cable modem connection of Athens, you install and configure the Network Address Translation (NAT) routing protocol on Athens. You decide to use IP addresses in the range of 192.168.40.1 through 192.168.40.50 for the network. Athens is config.to use an IP address of 192.168.40.1 Boston is a Web server configured with an IP address of 192.168.40.2 and a default gateway of 192168.40.1 Your Internet service provider (ISP) has allocated two IP addresses, 207.46.179.16 and 207.46.179.17, to your network.

The network is shown in the exhibit (Click the Exhibit button) You want to allow Internet users from outside your internal network to use an IP address of 207.46.179.17 to access the resources on Boston through the NAT service on Athens.

How should you configure the network to accomplish this goal?

A. Configure Athens with a static route on the private interface of the NAT routing protocol.
Use a destination address of 207.46.179.17, a network mask of 255.255.255.255, and a gateway of 192.168.40.2
B. Configure Boston with a static route on the U\.N interface. Use a destination address of 192.168.40.1, a network mask of 255.255.255.255, and a gateway of 207.46.179.17
C. Configure the U\.N interface of Boston to use multiple IP addresses Assign the additional lP address of 207.46.179.17 to the interface.
D. Configure the public interface of the NAT routing protocol to use an address pool with a starting address of 207.46.179.16 and a mask of 255.255.255.254. Reserve a public IP address of 207.46.179.17 for the private IP address of 192.168.40.2

Answer:D

2. To allow Internet access through a dial-up connection to Server A, you install NAT routing protocol. All computers in your network use Automatic Private IP addressing. There is no DHCP server in the network. Server A is configured as below:

LAN interface has an IP address of 10.65.3.1 and a subnet mask of 255.255.255.0.
NAT automatically assigns IP addresses of 10.65.3.2 through 10.65.3.60 to computers on the private interface.
NAT uses a demand-dial interface named Dial ISP to connect to the ISP.
The demand-dial interface uses an address pool of 207.46.179.33 through 207.46.179.36.
The routing table has a default static route for the public interface.

What configuration should you use for the static route for the public interface?

A. Interface: Local Network Connection
Destination: 207.46.179.44
Network Mask: 255.255.255.255
Gateway: 0.0.0.0

B. Interface: Local Network Connection
Destination: 10.65.3.0
Network Mask: 255.255.255.0
Gateway: 10.65.3.1

C. Interface: Dial ISP
Destination: 0.0.0.0
Network Mask: 0.0.0.0
Gateway: None

D. Interface: Local Network Connection
Destination: 207.46.174.32
Network Mask: 255.255.255.240
Gateway: 207.46.179.32

Answer:C

3. You are the administrator of a Windows 2000 network. The network consists of 85 Windows 2000 Professional computers and two Windows 2000 Server computers named Vancouver and Kelowna. Vancouver has a permanent cable modem connection to the Internet. All Windows 2000 Professional computers on the network are configured to use Automatic Private IP Addressing (APIPA).

The network does not contain a DHCP server. To allow all Windows 2000 Professional computers on the network to access the Internet through the cable modem connection of Vancouver, you install and configure the Network Address Translation (NAT) routing protocol on the Vancouver server.

You decide to use IP addresses in the range of 172.20.20.1 through 172.20.20.150 for the network. Vancouver is config.to use an IP address of 172.20.20.1

Kelowna is a Web server configured with an IP address of 172.20.20.2 and a default gateway of 172.20.20.1. You want to allow Internet users from outside your internal network to access the resources on Kelowna through the NAT service on Vancouver.

How should you configure the network to accomplish this goal?

A. Configure the NAT routing protocol to enable the use of the network applications, specify the web server as the name of the application use web port numbers as the remote port number.
B. Configure the public interface of the NAT routing protocol to use an address pool with an address of 172.20.20.2
C. Configure the public interface NAT routing protocol to use a special port that maps the web server port to IP address 172.20.20.1
D. Configure Vahcouver so that it has a static route on the private network of the private interface use a destination address of the 172.20.20.2 a network mask of 255.255.255.255 and a gateway 172.20.20.1

Answer:C

4. To allow Internet access through a dial-up connection to Server A, you install NAT routing protocol. All computers in your network use Automatic Private IP addressing. There is no DHCP server on the network. How should you configure Server A to use the IP address range of 172.16.65.1 through 172.16.65.250? (Choose all that apply)

A. Assign an IP address of 172.16.65.1 to the LAN interface of Server A
B. Configure the NAT routing protocol to automatically assign addresses in
the range of 172.16.65.2 through 172.16.65.250 to computers on the private interface.

Answer:A,B

5. To allow Internet access through a dial-up connection to Server A, you install NAT routing protocol. All computers in your network use Automatic Private IP addressing. There is no DHCP server in the network. Your server is configured to use the IP address 192.168.0.1. Routing and Remote Access and all the ports on this server are enabled for demand-dial routing. What should you do to enable your Windows 2000 Professional clients to access the Internet through a translated demand-dial connection on the server? (Choose four)

A. Create a new demand-dial interface for the local area connection
B. Create a new demand-dial interface for the dial-up connection
C. Add a public and a private interface to the NAT routing protocol
D. Configure the IP address of the Internet service provider (ISP) as the default gateway on the private interface
E. Add a default static route that uses the public interface
F. Configure the NAT routing protocol to enable network address translation assignment and name resolution
G. Configure the public NAT interface with an address pool of 192.16.80.1

Answer:B, C, E, F

6. You are the administrator for your company's Windows 2000 network. You have a branch office that you want to connect to your main office by using demand-dial routing. You set up a demand-dial router at both offices. However, you are not able to reach any locations at the main office beyond the demand-dial router. What should you do?

A. You don't have any packet filters configured at the main office.
B. You don't have any static routes configured at the main office.
C. You don't have any packet filters configured at the branch office.
D. You don't have any static routes configured at the branch office.
E. The Demand-dial interface has not been added to the protocol being routed.

Answer:B
7. You are the administrator for a Windows 2000 Server network. The network contains three Windows 2000 Server computers and 35 Windows 2000 Professional client computers.

You want to accomplish the following goals:

Install and enable Network Address Translation (NAT) on the network.
Allow Internet users to access resources from the network.
Install and enable Internet Connection Sharing.
Configure dynamic IP addresses on the network.

You perform the following actions:

You configure a static IP address configuration on the resource server.
You exclude the IP address used by the resource computer from the range of
IP addresses allocated by the NAT computer.
Configure a special port with a dynamic mapping of a public address and
port number to a private address and port number.

Which goal or goals are accomplished from these actions? (Choose all that apply.)

A. Configure dynamic IP addresses on the network
B. Install and enable Internet Connection Sharing
C. Allow Internet users to access resources from the network
D. Install and enable Network Address Translation (NAT) on the network

Answer:A

8. To allow Internet access through a dial-up connection to London, you install a NAT routing protocol. All computers in your network use You have one DCHP and your ISP has allocated 207.46.179.4.7 to your network. How should you configure these addresses?

A. RRAS policy
B. RRAS policy
C. Configure the LAN interface to use an address pool with a starting
address of 207.46.179.4 and a mask of 255.255.255.252
D. Configure the public interface to use an address pool with a starting
address of 207.46.17.4 and a mask of 255.255.255.252

Answer:D

9. Your network contains 10 segments connected by 4 routers RRAS is enabled as a router and they use RIPv2. You have additional routers that use v2. These other server may heave incorrect routing information. How can you ensure the first four routers do not process routes received from any other routers but Routers 1-4?

Check all that apply:

A. Configure the RIP routing protocol on the four routers to use RIP peer filters. List the other three routers as RIP peers.
B. on Each RIP interface on the four routers, configure route filters for outgoing routes. Announce only routes that are connected to the four routers.
C. Configure each RIP interface on the four router to unicast to RIP neighbors
D. Configure each RIP interface to use password authentication.
E. Configure a TCP/IP filter to prevent broadcast messages from passing.
F. Configure a remote Access Policy to allow only the four routers to communicate with each other. Configure a second Remote access policy to allow only the two new routers to communicate with each other

Answer:A,B,C,D

Certificate service key points

1. Your company wants to be able to connect to its Web server to make credit card transactions. These transactions should be encrypted. You must assure the identity of the Web server when customers make online transactions . You must be able to support certificate-based logons for employees of your company who need access to private areas on your Web server. What should you do?

A. Install a Subordinate Enterprise CA that uses a commercial CA as the parent.

Answer: A

2. You are the administrator of a Windows 2000 network. The network consists of one Windows 2000 domain that has Windows 2000 Professional client computers and Windows NT Workstation 40 client computers. To create a digital certificate, you use a stand-alone certificate server configured as a root Certificate Authority (CA). You use the digital certificate to secure a virtual directory on your Internet Web server. Users report that when they connect to the virtual directory by means of a new URL, a Security Alert dialog box appears with the following warning message 'The security certificate was issued by a company you have not chosen to trust. You want to prevent this warning message from appearing. You also want to avoid any unnecessary reconfiguration of either the certificate server or the Web server. What should you do?

A. Inform your users of the new URL that points to the host name used in the digital certificate
B. Configure a Group Policy that automatically installs as a trusted authority in the client computers the digital certificate for the certificate server
C. Inform your users that they need to install a client certificate from the certificate server
D. Inform your users that they need to install as a trusted authority in the client computers the digital certificate for the certificate server

Answer:B

3. You have Macintosh users who inform you that they cannot request valid user certificates from your Enterprise Certificate Authority. What should you do to allow these users to request certificates by using Web based enrollment?

A. In the Internet Information Services (IIS) console, access the properties for the CertSrv virtual directory. On the Directory Security tab, set the authentication type to Basic Authentication.
B. In the Internet Information Services console, access the properties for the CertSrv virtual directory. On the Directory Security tab, set the authentication type to "Encrypted Authentication."
C. Install an Enterprise Subordinate Certificate Authority that uses a commercial CA as a parent.
D. Delete the CA, install File and Print sharing for Macintosh, Reinstall the CA.

Answer:A

4. Your organization is using CA to provide identification to users. You would like to ensure customers of your identity while providing employees access to secure areas on your web server. What type of CA would you install?

A. Install an enterprise CA on your server.
B. Install a stand-alone CA on your server.
C. Install a subordinate enterprise CA on your server from a known commercial CA.
D. Install a stand-alone subordinate CA on your server from a known commercial CA.

Answer: B

5. You are the administrator of a Windows 2000 network Your company wants you to provide a high level of security for its Public Key Infrastructure. You decide to create an offline root Certificate Authority (CA) You want the offline root CA to be capable of processing certificate requests from files, and you want the offline root CA to be recognized as a trusted root authority for Windows 2000 client computers.

How should you create the offline root CA?

A. On a member Windows 2000 Server computer that is connected to the network, create an Enterprise CA. After you install the CA, remove the server to a secure and separate location
B. On a member Windows 2000 Server computer, create a subordinate Enterprise CA that uses a Commercial CA as the certifying authority. After you install the CA, remove the server to a secure and separate location
C. On a stand-alone Windows 2000 Server computer that is isolated from the network, create a Stand-Alone CA. Export the certificate for the CA to a floppy disk
D. In the Default Domain Group Policy object (GPO) , import the certificate to the Enterprise Trust Certificate Store
E. On a stand-alone Windows 2000 Server computer that is isolated from the network, create a Stand-Alone CA. Export the certificate for the CA to a floppy disk. In the Default Domain Group Policy object (GPO), import the certificate to the Trusted Root Certification Authority Store

Answer:A

6. You are the administrator of a Windows 2000 network that consists of a single domain. Because no employee in your company should have the ability to encrypt files by using Encrypting File System (EFS), you need to remove this ability from all users in the domain

What should you do to accomplish this goal? (Choose all that apply)

A. From the Run command, start Secpolmsc
B. Go to the Encrypted Data Recovery Agents container and delete the certificate you find. From the Active Directory Users and Computers console, access the Group Policy Editor and edit the domain policy.
C. Go to the Public Key Policies container and delete the Encrypted Data Recovery Agents policy. From the Active Directory Users and Computers console, access the Group Policy Editor and edit the domain policy.
D. From the Active Directory Users and computers MMC console select the Encrypted Data Recovery Agents container and delete the certificate you find.
E. From the Active Directory Users and computers MMC console access the Group Policy Editor and edit the domain policy, select the Encrypted Data Recovery Agents container and initialize the empty policy.
F. From the Active Directory Users and Computers console, select the Public Key Policies container and initialize the empty policy.

Answer:D, E

7. You are the administrator for your company's Windows 2000 network. You have installed Certificate Services on a Windows 2000 server and set it as the Enterprise CA. Where can you go to see the licenses the CA has issued and the CRL's?

A. Active Directory services MMC.
B. Browse to the %systemroot%\system32\certsrv\certenroll.
C. From the CA MMC snap-in.
D. HKLM\system\currentcontrolset\services\certsrv registry key.

Answer:C

8. Your network consists of a single domain with three Windows 2000 domain controllers, and 1,000 Windows 2000 Professional workstations. You want to use digital certificates by installing your own CA. You must protect the root CA and the private key. You must also ensure that you can manage the Public Key Infrastructure. You want to accomplish the following goals:
The server hosting the root CA will have maximum protection.
The server hosting the root CA will certify other CAs and revoke certificates.
All servers in the domain will be able to access the revocation status of
all certificates in the Public Key Infrastructure .
Certificate requests will be immediately processed.

You take the following actions:
Install a stand-alone root CA on a member server.
Disconnect the member server, and place it in a secure and separate location.

Which results do these actions produce? (Choose all that apply)
A. The server that is hosting the root CA is protected from security breaches.
All servers in the domain can access the revocation status of all certificates.
Certificate requests are made immediately.

Answer: A

9. You are the administrator of a Windows2000 network.Your Public Key Infrastructure consist of an offline root CA and a number of subordinate CAs.Your company is selling one of its divisions.This division has a subordinate CA that it uses to issue certificates. You want to insure that once the division is sold , applications and other CAs on your network will not accept the former division`s certificates. You also want to insure that you can implement your solution by using a minimum amount of administrative effort .

A. On the division`s subordinate CA revoke all the certificates it has issued. Publish the CRL to a server on your network. Uninstall the CA software andremove the CA files.
B. On the company`s root CA revoke the certificate of the division`s subordinate CA. Publish the CRL. Copy the EDB.LOG file from the root CA to its CertificationDistribution Point on your network.
C. On the division`s subordinate CA , revoke the certificates it has issued.Publish the CRL. Copy the EDB.LOG file from the subordinate CA to the Certfication Distribution Point on your network.Disconnect the CA from the network.
D. On the company`s root CA revoke the certificate of the division`s subordinate CA. Publish the CRL . Copy the CRL file to the Certification Distribution Point on your network.
E. On the division`s subordinate CA revoke all the certificates it has issued. Publish the CRL, Copy the CRL file to the Certification Distribution Point on your network Disconnect the CA from the network .
Answer:B

10. You are the administrator of a Web server hosted on the Internet that is running on a Windows 2000 Server computer. Your company's Web developers have developed applications that download ActiveX controls automatically to your customers' browsers. You discover that the default security settings on your customers' browsers are preventing the ActiveX controls from being downloaded automatically. You want to facilitate the downloading of ActiveX controls from your Web server to the Internet clients

What should you do?

A. Install an Enterprise Subordinate Certificate Authority (CA) that uses a commercial CA as the parent. Create a policy on the CA that allows the Web developers to request a certificate for code signing
B. Install an Enterprise Certificate Authority (CA). Create a policy on the CA that allows the Web developers to request a certificate for trust list signing.
C. Install an Enterprise Subordinate Certificate Authority (CA) that uses a commercial CA as the parent. Create a policy on the CA that allows the Web developers to request a certificate for trust list signing
D. Install an Enterprise Certificate Authority (CA). Create a policy on the CA that allows the Web developers to request a certificate for code signing

Answer:B

11. You install Certificate Services on two computers running Windows 2000 Server. CertRoot is an Enterprise Root Certificate Authority. CertSub is an Enterprise Subordinate CA. You have two domains: sycom.com and support.sycom.com. You add a new domain, tech.sycom.com. You attempt to issue a certificate from CertSub for a user account in tech.sycom.com. The Event Viewer shows the CA was unable to publish a certificate for tech.sycom.com\DC DC is a domain controller for tech.sycom.com. What is the most likely reason you receive this error message?

A. DC (tech.sycom.com domain controller) is offline
B. You are not a member of the Certificate Administrators for tech.sycom.com
C. CertSub is not a member of the group "tech.sycom.com\Cert Publishers"
D. The Enterprise CA is offline

Answer:C

12. Admins of your Sales OU want to be able to manage EFS for their users. These admins are all in a group named SalesAdmin which has full administrative privileges to the OU. You install an Enterprise Certificate Authority for use by the entire company. However, the admins of the Sales OU notify you that they are unable to create a Group Policy that allows them to manage EFS for their OU. What should you do? (choose two)

A. Grant the enroll permission to the SalesAdmin group for the Recovery Certificate Template
B. Add the SalesAdmin group's certificate to the CA's RCL
C. Add a new policy setting for an EFS Recovery Agent certificate in the Certification Authority console for the CA
D. Install a Enterprise Subordinate CA on one of the computers in the Sales OU

Answer:A, C

Site Meter