1.
You have purchased application software that is meant to run on Windows Server 2003. You have 2 servers of Windows Server 2003 running in your network. After installing the said software on the first server as per instructions, it crashes. Which of the following steps have you skipped in the process of installation?
Correct Answer
D. You may have forgotten to re-apply the service pack.
Explanation
After every installation and configuration on a network operating system, it is very essential to re-apply the service pack or upgrade it according to requirements. Since the question statements is already saying that the installation has been carried out �as per instructions�, choices A and B are incorrect. If the hardware requirement is not met, you will be notified by the software during the process of installation itself. Hence choice C is also incorrect.
2.
Which of the following is a basic requirement for configuring a Windows-based RAS service?
Correct Answer
A. Windows NT 4.0
Explanation
The basic requirement can be met using Windows NT 4.0 Server itself. Although, the RAS service, does not get shipped along with the Operating System CD, as it does with the higher versions.
3.
Which of the following is a fault tolerant measure for a server?
Correct Answer
C. Cluster
Explanation
FDDI is a fault tolerant measure for a network segment. RAID is an online fault tolerance for data storage device. Cluster service helps to host a group of servers on the network. If one of the servers in the cluster fails, another will be taking over to ensure that the network users remain transparent and unaffected by the failure of the server to which they were connected.
4.
If you were hosting an application on your web server that allows internet users to communicate with it and also ensures that the data transfer between the client end and the server end is very reliable, which of the following protocols would you choose for transport layer communication?
Correct Answer
A. TCP
Explanation
IP and ICMP are not transport layer protocols. UDP is not a protocol that can be used for reliable communication unless reliability is inbuilt to the application itself. TCP is the protocol for the said application.
5.
You are setting up a Windows 2000 network. Your network is split between the different training departments on a campus. Each training department prefers to be on a separate subnet. There are three such departments. You have a single domain controller catering to these departments, although, there will be resource servers placed independently in each. Your finance department has rejected your request for purchase of a router. Which of the following will allow you to go ahead with implementing this LAN?
Correct Answer
D. Set up each resource server running on Windows 2000, that will be set up in each department to act as a router.
Explanation
Windows 2000 Server has a RRAS service that is a combination of a router and a RAS. This service can be made use of to make each resource server to behave as a router.
6.
DNS, FTP, SNMP, SMTP, and TELNET are all IP based services that cannot be supported on Windows 2000. T/F?
Correct Answer
B. False
Explanation
All IP based services mentioned above can be hosted on the Windows 2000 server.
7.
You notice that the domain�s file servers are all fast using up the available disk space. You are sure that the network usage for disk space is not very high. You wish to use the defragment option manually to be sure that the Defragmentation is satisfactory. Which of the following must you choose?
Correct Answer
B. Right click My Computer, click Properties, and then, on the Tools tab, click Defragment Now.
Explanation
The correct answer is "Right click My Computer, click Properties, and then, on the Tools tab, click Defragment Now." This option allows the user to manually initiate the defragmentation process on the file servers to ensure that the defragmentation is satisfactory.
8.
Which of the following RAID levels provides both redundancy and improved performance, but requires at least four drives and uses a combination of striping and mirroring?
Correct Answer
D. RAID 10
Explanation
RAID 10 (also known as RAID 1+0) combines the features of RAID 1 (mirroring) and RAID 0 (striping). It provides both redundancy (data is mirrored) and improved performance (data is striped across multiple drives). RAID 10 requires at least four drives to implement: two pairs of mirrored drives, with data striped across those pairs. This makes it more resilient than RAID 0, which offers no redundancy, and typically faster than RAID 5, which provides redundancy through parity but with a performance trade-off.
9.
If you are setting up RAS (Remote Access Service) for a multi-platform network and do not know the data communication protocols in use, which of the following protocols would be a suitable choice?
Correct Answer
A. PPP
Explanation
PPP is capable of building end-to-end connections for each specific protocol that can be encapsulated for that session.
10.
Of the following protocols would be more appropriate to secure communication on an IP based network?
Correct Answer(s)
A. SSL (Secure Socket Layer)
B. IPSec
Explanation
Both IPSec as well as SSL can be used for this purpose, depending on the specific scenario. L2TP is a tunneling protocol and is not relevant here. Kerberos cannot be used for IP based network.
11.
Which of the following would you use to secure communication between a Windows 2000 client and a Windows 2000 server on your network?
Correct Answer(s)
B. IPSec
D. Kerberos
Explanation
You may use either IPSec or Kerberos here. Although, IPSec would be more flexible when expanding your network rather than Kerberos.
12.
Windows 2000 cannot function without DNS. T/F?
Correct Answer
B. False
Explanation
DNS Server is mandatory only when using ADS infrastructure, which is not specified in the question statement. For any other scenario. Windows 2000 can still make use of broadcast or WINS for name resolution.
13.
If you were planning to host a web server on a Windows based resource server for intranet purpose, which of the following would be a more appropriate choice?
Correct Answer
B. IIS
Explanation
IIS (Internet Information Service) is the most appropriate choice to host a Web server on a Windows based resource server. IAS (Internet Authentication Service) is not meant for Web Services. Apache is a good choice if the Operating System platform was Unix based.
14.
Which of the following is an appropriate requirement for a Server that is intended to be a DNS server?
Correct Answer(s)
A. DNS service must be running.
B. IP address assigned must be static.
Explanation
All critical Network Service must be running on Servers that are assigned Static IP address to avoid confusion. The DNS service must be running for a resource server to be recognized as a DNS server. Only one IP address is required.
15.
You have configured a resource server �RouteServ� as a router and it will be connecting two networks Network A and Network B. Which of the following will be applicable to it?
Correct Answer(s)
A. It will have two interfaces
C. It will be assigned Static IP addresses
D. It must be configured with one default gateway each for each interface.
Explanation
A resource server that is configured as a router, and connects two networks, will require two interfaces and one default gateway for each interface. Otherwise it will be unable to route packets between the two networks. It is mandatory to assign static IP addresses in this case.
16.
The DNS server uses broadcast method first to determine IP to Host resolution. T/F?
Correct Answer
B. False
Explanation
The DNS service will first refer its cache, then the database and so on to perform resolution. Broadcast is employed only when the DNS service fails to fulfill the resolution.
17.
Your manager has just asked you to set filtering only on interesting packets for your FTP server. You choose the FTP server and select port 20 and complete the configuration successfully. Is your FTP connection fully safe now?
Correct Answer
B. No
Explanation
To fully secure your FTP service, you need to set filtering on port numbers 20 as well as 21. Leaving any one port out would mean a server that is not secure at all.
18.
Ultra Wide SCSI supports 32-bit bus. T/F?
Correct Answer
B. False
Explanation
SCSI Type Transfer speed Bus
SCSI-1 5MBPS 8 bit bus
Fast Wide SCSI 2 20MBPS 16 bit bus
Ultra Wide SCSI 3 40MBPS 16 bit bus
19.
Disk mirroring is an ideal fault tolerance for a system partition. T/F?
Correct Answer
B. False
Explanation
A system partition on the server should not be mirrored as it will slow down the performance on the server.
20.
With a Fabric switched fiber channel network, where the F-Port is located?
Correct Answer
B. F-Port is usually located at the Fabric Switch side
Explanation
In a Fabric switched fiber channel network, the F-Port is usually located at the Fabric Switch side. This means that the F-Port is typically found on the switch itself, rather than at the termination end or at the hub of an arbitrated loop. The F-Port is responsible for connecting the switch to other devices in the network, allowing for communication and data transfer between them.
21.
An IDE based RAID system is more fault tolerant than a SCSI based RAID. T/F ?
Correct Answer
B. False
Explanation
IDE supports maximum of 4 devices where as SCSI supports 7 devices. As for fault tolerance SCSI is more reliable than IDE.
22.
SCSI controller supports bus mastering. T/F ?
Correct Answer
A. True
Explanation
Bus Mastering is a feature supported by some bus architectures that enables a controller connected to the bus to communicate directly with other devices on the bus without going through the CPU. Most modern bus architectures, including PCI, support bus mastering because it improves performance.
23.
What is the bus width of EISA bus?
Correct Answer
C. 32-bit
Explanation
ISA supports 8-bits, EISA supports 16-bits and PCI supports 32-bits.
24.
Which of the following commands can shut down a Novell NetWare Server?
Correct Answer
A. Down
Explanation
Typing the �down� command at the console will shut down the Netware server.
25.
Which of the following describes differential backup?
Correct Answer
C. A differential backup backs up only the information that is added since last full backup.
Explanation
As the name suggests the differential backup will backup the difference since last backup. Its reference will be the last full backup.
26.
It is sufficient to install antivirus on a network, on servers and systems exposed to internet. T/F?
Correct Answer
B. False
Explanation
All systems in a network, inclusive of servers and clients irrespective of whether they are exposed to Internet or not need to be safe guarded with the antivirus. One needs to use Anti virus package to prevent viruses. Other options such as Firewall may be able to prevent hacking but, viruses can still go through!
27.
It is mandatory to have a Primary DNS server as well as Secondary DNS server on a network, if you wish to have fault tolerance for DNS resolution. T/F ?
Correct Answer
A. True
Explanation
A Secondary DNS server is meant to take over DNS resolution for requesting clients, whenever the Primary DNS server is unable to do so. Hence this is a basic necessity for ensuring fault tolerance for DNS resolution on a network.
28.
If you have configured a mail server on one of your resource servers, which of the following protocol is mandatory for your mail server to push mails through the mail gateway?
Correct Answer
D. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is responsible for enabling a mail server to push the mails through the mail gateway, to enable them reach the destinations they were intended for.
29.
Which of the following would be verified during the installation planning phase?
Correct Answer(s)
A. Power source
B. UPS capacity
Explanation
User access permissions are a part of resource availability planning and not installation planning.
30.
You plan to install a new Hardware level RAID. You have updated the system BIOS accordingly. The said RAID is the current state of art configuration. After installation on your server, it still fails to get recognized. What do you need to verify now?
Correct Answer
C. Check the IRQs assigned and available.
Explanation
Since the question states that the firmware is on the system is updated and the RAID itself is of the current state of art technology, the driver installation is not a problem. It must be recognized automatically. Available memory and service pack are irrelevant options here. The problem evidently is with the IRQ assignment itself.
31.
Hardware RAID is expensive where as Software RAID is poor in performance. T/F ?
Correct Answer
A. True
Explanation
Hardware level RAID gives far better performance than a software level RAID. Hardware level RAID is far more expensive than software level RAID.
32.
The Ultra2 Wide SCSI can provide 80 MB/sec transfer rate. T/F ?
Correct Answer
A. True
Explanation
The combination of Ultra2 Wide controller and drive is meant for situations that demand improved performance and excellent transfer rate. 80 MB/sec is definitely within the support capability of Ultra2 Wide SCSI.
33.
You have just cleaned and serviced your DAT drive as a part of preventive maintenance plan. You assign it to the backup operator for the daily backup process. The backup operator complains that the backup is not happening as usual. What would you suggest to him?
Correct Answer
C. That he replace the backup tapes.
Explanation
Since the backup device has just been serviced, the only logical reason for backup to fail could be the backup tape itself.
34.
You suspect that the network server could not be receiving updates as per schedule. Which of the following would you check to confirm your doubts?
Correct Answer
C. Error logs that have been configured on the server.
Explanation
The system registry is incorrect as the operating system has not been mentioned. The configuration files will only hold the configuration information and the boot log file will only contain the status messages logged during boot up. The correct answer is error log files.
35.
If you were a administering a Windows 2000 system, where would you look for errors relating to access permissions?
Correct Answer
C. Event viewer � Security log.
Explanation
The event viewer is an interface application that allows reading of log files relating to the Operating system. The resource access and user permission related error messages and status messages is always logged into the security log.
36.
Which of the following cannot be used as a fault tolerant measure?
Correct Answer
A. RAID 0
Explanation
RAID 0 is not a fault tolerant measure in the software level RAID.
37.
If you were to implement Cluster service between two servers, at least one of the server can still be accessed even if the Data Center lost complete power. T/F?
Correct Answer
B. False
Explanation
This question cannot be analyzed unless we know that he Data Center has fault tolerance for power failure too. If the answer is No, then the moment the Data Center loses power, both the servers in the 2-node cluster will be inaccessible.
38.
When using a 1-bit wide SCSI drive, which of the following drives will be a bootable drive?
Correct Answer
A. 0
Explanation
When using 16-bit wide SCSI there will be 16 devices that can be connected possibly. 0-15. There is no device that will have Id 16. The bootable drive will be the one with Id 0.
39.
Which of the following is not the correct way of terminating SCSI devices?
Correct Answer(s)
B. On one end at least
C. On one of the devices in between
Explanation
The SCSI device needs to be terminated on both ends for proper functioning. If terminated on one end, it will lead to intermittent problems. SCSI devices should never be terminated on any of the in between devices.
40.
You wish to improve the performance of data transaction on the network without bothering about data redundancy. Which of the following RAID levels is apt for this situation?
Correct Answer
A. RAID 0
Explanation
RAID 0 is the software level RAID that enhance Read/Write performance without providing fault tolerance.
41.
Which of the following statements about clustering is true? Choose two.
Correct Answer(s)
A. Improves network availability
B. Improves network scalabiltiy
Explanation
Implementation of cluster service improves network availability and allows for scalability. It does not relate to troubleshooting procedures in any way.
42.
Intel Xeon processor can access physical memory of maximum 64 MB. T/F?
Correct Answer
B. False
Explanation
Intel Xeon processor can access maximum of 64 GB of physical memory.
43.
Which of the following tape backup methods alter the archive attribute? (Choose two.)
Correct Answer(s)
C. Full
D. Incremental
Explanation
A full backup backs up as well as an incremental backup backs up can affect the archive attribute.
Incorrect Answers
A, B
Differential backup as well as the sequential backup does not affect the archive attribute.
44.
You have just upgraded you Server computer�s motherboard by adding an additional CPU as per instructions. You power On the server and observe that the second CPU is not recognized at all. What could be the possible cause for this?
Correct Answer
B. The motherboard BIOS may not support the second CPU
Explanation
The CPU that has been added may not function if faulty but it will detected for during POST. The only reason why it would not be detected is that the BIOS may not be supporting it. It is also necessary to ensure that the BIOS be upgraded if necessary.
45.
What should you use to inhibit the spread of viruses on your peer-to-peer network?
Correct Answer
D. Antivirus software on each computer.
Explanation
It is mandatory to use a antivirus software on each workstation.
Incorrect Answers
A. A firewall stops traffic at port and protocol level.
B. The scandisk utility is used to diagnose and fix hard disk problems.
C. An antivirus suite is more relevant to huge client/server networks.
46.
You have decided to provide for AFT (Adapter Fault Tolerance) on your network. Your router has just one port free where as you have hundreds of clients on your network. Will it be possible to implement the said fault tolerance in your network?
Correct Answer
A. Yes
Explanation
AFT requires additional network adapter card and one additional port on the router/switch on whose network you wish to implement the said fault tolerant measure. Since the question statement iterates that the router has one port free. It will be possible to implement the fault tolerance on this network.
47.
You have installed the Server hardware on a clients� place recently. The client complains that the Server is receiving intermittent supply. Upon reaching the clients place and observing the symptoms you suspect the problem is related to SCSI. How will you isolate this problem?
Correct Answer
C. Shut off power to the SCSI panel and see if the problem still persists.
Explanation
By shutting off power to SCSI panel, you can be sure if the problem is related to SCSI as any shorting that was occurring will now be done away with. By shutting of power to the server, you will not be able to troubleshoot the problem at all. Stopping to use the SCSI devices is not a solution at all since the devices are powered ON and running irrespective of whether they are being used or not.
48.
You have installed the Server hardware on a clients� place recently. The client complains that the Server is functioning intermittently. Upon reaching the clients place and observing the symptoms you suspect the problem is related to RAM. How will you isolate this problem?
Correct Answer
B. Remove and replace one single RAM module at a time and observe the beeps
Explanation
Removing all memory modules and restarting the server will give the same error beeps that it would have given when you started the server with faulty modules. Just replacing all memory modules will definitely put the server in functional state but will not help you isolate the problem. Removing and replacing one RAM module at a time will help you isolate the exact faulty module.
49.
Which of the following protocols is required by an email Server?
Correct Answer
C. SMTP
Explanation
Mail servers need SMTP and mail clients need POP. FTP and SNMP are not related email services
50.
Which of the following would make an ideal administrator password?
Correct Answer
D. User$0ne
Explanation
Administrator passwords are most secure when they are a combination of numeric, alpha numeric and special characters.