70-290 Q&A. DEMO Version



Similar documents
Avamar Backup and Data De-duplication Exam

Q&A. DEMO Version

ST0-141 Q&A. DEMO Version

132-S Avaya Specialist - IP Office Implement & Support Elective Exam

Q&A. DEMO Version

Q&A. DEMO Version

1z0-102 Q&A. DEMO Version

Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version

Q&A. DEMO Version

Connecting to Remote Desktop Windows Users

Yale Software Library

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

How to Connect to Berkeley College Virtual Lab Using Windows

4cast Client Specification and Installation

Q&A. DEMO Version

eduroam Network guide configuration for Microsoft Windows 7

For Mac User Directions, see page 5

User guide. Business

TrueEdit Remote Connection Brief

Creating client-server setup with multiple clients

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Hosting Users Guide 2011

Yale Software Library

Shellfire L2TP-IPSec Setup Windows XP

Virto Password Reset Web Part for SharePoint. Release Installation and User Guide

Outlook Hosted Exchange Account Configuration

Activity 1: Scanning with Windows Defender

DIRECTORY PASSWORD V1.2 Quick Start Guide

Microsoft XP Professional Remote Desktop Connection

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

6 Oracle Business Activity Monitoring

DIGIPASS CertiID. Getting Started 3.1.0

WIRELESS SETUP FOR WINDOWS 7

Desktop Web Access Single Sign-On Configuration Guide

For paid computer support call

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Installation Guide - Client. Rev 1.5.0

EE Easy CramBible Lab DEMO ONLY VERSION EE F5 Big-Ip v9 Local Traffic Management

Connecting to Delta College Exchange services off-campus

SplendidCRM Deployment Guide

Residence Wired Connection Installation Manual

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Pro-Watch Software Suite Installation Guide Honeywell Release 3.81

Check Point FDE integration with Digipass Key devices

Installing the Microsoft Network Driver Interface

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Hosted Microsoft Exchange Client Setup & Guide Book

Using a VPN Connection

PRIME Installation Guide

Outlook 2010 Setup Guide (POP3)

PeopleSoft Application Designer Installation Documentation

Professional Mailbox Software Setup Guide

Using etoken for Securing s Using Outlook and Outlook Express

Phone: Fax: Box: 230

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician.

This manual provides information and instructions for Mac SharePoint Users at Fermilab. Using Sharepoint from a Mac: Terminal Server Instructions

Remote Access: Internet Explorer

How to connect to the diamonds wireless network with Vista.

Symantec Backup Exec 2010 R2. Quick Installation Guide

File and Printer Sharing with Microsoft Windows

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

Configuring WPA2 for Windows XP

Installation Troubleshooting Guide

Using Remote Web Workplace Version 1.01

How To Manage Hard Disk Partitioning In Windows (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl

Sentinel Installation Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

IMAPing 3.0 Administrator s Guide

Endpoint Security VPN for Windows 32-bit/64-bit

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

Wireless Network Configuration Guide

SQL EXPRESS INSTALLATION...

Using Internet or Windows Explorer to Upload Your Site

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Patching the Windows 2000 Server Operating System on S8100 Media Servers, IP600 Communications Servers, & DEFNITY ONE Communications Systems

STIDistrict Server Replacement

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

CruzNet Secure Set-Up Instructions for Windows Vista

Yale Software Library. PGP 9.6 for Windows

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting

How to Use Remote Access Using Internet Explorer

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

How to Connect to the SPSS Server (HUSPSS) Using Remote Desktop on a PC

Creating Service Definition file while disconnected from the server

Chapter Thirteen (b): Using Active Directory Integration

Transcription:

Managing and Maintaining a Microsoft Windows Server 2003 Environment Q&A DEMO Version Copyright (c) 2010 Chinatag LLC. All rights reserved.

Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag study guide contains 10 full length questions selected from our full version products which have more than 200 questions each. This Study guide has been carefully written and compiled by Chinatag certification experts. It is designed to help you learn the concepts behind the questions rather than be a strict memorization tool. Repeated readings will increase your comprehension. For promotion purposes, all PDF files are not encrypted. Feel free to distribute copies among your friends and let them know Chinatag website. Study Tips This product will provide you questions and answers along with detailed explanations carefully compiled and written by our experts. Try to understand the concepts behind the questions instead of cramming the questions. Go through the entire document at least twice so that you make sure that you are not missing anything. Latest Version We are constantly reviewing our products. New material is added and old material is revised. Free updates are available for 90 days after the purchase. You should check the products page on the http://www.chinatag.com website for an update 3-4 days before the scheduled exam date. Please tell us what you think of our products. We appreciate both positive and critical comments as your feedback helps us improve future versions. Feedback on specific questions should be send to feedback@chinatag.com. Thanks for purchasing our products and look forward to supplying you with all your Certification training needs. Good studying! Technical and Support Team Chinatag LLC. Leading the way in IT testing and certification tools, www.chinatag.com - 2 -

QUESTION 1 You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers. You need to ensure that all users are authenticated by a domain controller when they log on. How should you modify the local security policy? A. Require authentication by a domain controller to unlock the client computer. B. Cache zero interactive logons. C. Cache 50 interactive logons. D. Grant the Log on locally user right to the Users group. Answer: B QUESTION 2 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You need to ensure that a defragmentation of the server's hard disk drive runs each night. A. Create a scheduled task that runs Dfrg.msc. B. Create a scheduled task that runs Defrag.exe. C. From Computer Management, run Disk Management. D. From Computer Management, run Disk Defragmenter. Answer: B QUESTION 3 Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You install a new network adapter on Server1. You need to view the media access control (MAC) address for the new network adapter. A. At the command prompt, run Ipconfig /all. B. At the command prompt, run Net view \\server1. C. From the Device Manager snap-in, view the properties of the network adapter. D. From the Services snap-in, view the properties on the Network Connections service. QUESTION 4 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). 3

You need to identify all the unsigned drivers that are installed on the server. A. Run Chkdsk.exe. B. Run Sigverif.exe. C. Review %systemroot%\repair\setup.log. D. Open Device Manager and review all the devices that contain a warning. Answer: B QUESTION 5 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). A domain user named User1 attempts to log on to a computer named Computer1. After several failed logon attempts, User1 receives the following error message. You reset the password for User1 and provide the new password to User1. You need to ensure that User1 can log on immediately. A. Modify the Account settings for User1. B. Modify the Session settings for User1. C. Disable User1 and then enable User1. D. Disable Computer1 and then enable Computer1. QUESTION 6 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You create an account for a new user named User1. User1 reports that when she first attempts to log on to the domain, she receives the following message. 4

Other users report that they can log on to the domain from User1's computer. You need to ensure that User1 can log on to the domain. A. Modify the properties of User1's account. B. Modify the properties of the computer account. C. On User1's computer, create a local user account. D. On User1's computer, modify the local security policy. QUESTION 7 Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Your company's security policy states that domain users must be prevented from logging on to Server1 if a domain controller is unavailable. You disconnect Server1 from the network and discover that you can log on to Server1. You need to configure Server1 to comply with the company's security policy. What should you do on Server1? A. From the local security policy, modify the Security Options. B. From the local security policy, modify the User Rights Assignment. C. From Active Directory Users and Computers, modify the properties of the Server1 account. D. From Active Directory Users and Computers, modify the properties of the Domain Computers group. QUESTION 8 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a server that contains two volumes named C and D. Volume C contains a folder named Data that contains over 10,000 files and folders. You need to copy the Data folder to volume D. The solution must maintain the current ownership settings. Which tool should you use? A. Copy B. Move C. Xcacls D. Xcopy Answer: D 5

QUESTION 9 2 (SP2). You have two global groups named Research and ResearchManagers. The Research group contains all users in a department named Research. The ResearchManagers group contains all managers in the Research department. All members of the ResearchManagers group are members of the Research group. You create a shared folder named Research. The permissions for the Research share are shown in the exhibit. (Click the Exhibit button.) You need to modify the share permissions to ensure that only members of the ResearchManagers group can add and modify files over the network. Exhibit: A. Remove the Domain Users group. B. Change the permission assigned to the Research group to Allow - Read. C. Remove the Research group. Change the Domain Users permission to Allow - Change. D. Remove the Research group. Add the ResearchManagers group and assign the group Allow - Change permission. Answer: D QUESTION 10 2 (SP2). The primary group for all users is Domain Users. You share a folder named Data. The shared folder is located on a server named Server1. A user in the Research group named User1 reports that she cannot access files in the Data shared folder. You verify that User1 is not listed in the access control list of the shared folder. 6

You examine the properties of the User1 account. The properties are shown in the exhibit. (Click the Exhibit button.) Other members of the Research group can add and modify files in the Data shared folder. You need to ensure that User1 can access files in the Data shared folder. Exhibit: A. Remove User1 from the IT group. B. Assign the Change permission to User1. C. Remove User1 from the Domain Users group. D. Add User1 to the Server Operators group on Server1. 7