1.
Which
of the following does not rely on certificates and public key cryptography?
Correct Answer
D. Workgroup security
Explanation
Workgroup security does not rely on certificates and public key cryptography. Workgroup security refers to the security measures implemented within a small group or network of computers that share resources and information. It typically involves the use of passwords, access controls, and user permissions to protect the network and its resources. Unlike SSL, EFS, and IPSec, workgroup security does not involve the use of certificates and public key cryptography for authentication and encryption purposes.
2.
Which
protocol provides names and name resolution for workgroups in Windows?
Correct Answer
A. NetBIOS
Explanation
NetBIOS is a protocol that provides names and name resolution for workgroups in Windows. It allows computers on a local area network (LAN) to communicate with each other using names instead of IP addresses. NetBIOS enables the identification and location of resources, such as shared folders and printers, within a workgroup. It also facilitates the establishment of connections and the sharing of data between computers in a Windows network. NetBIOS is commonly used in older versions of Windows, but newer versions have transitioned to more modern protocols like DNS.
3.
Which
of the following are automatically configured in Windows Server 2003?
Correct Answer
A. Local area connections
Explanation
In Windows Server 2003, local area connections are automatically configured. This means that when a network adapter is installed, Windows Server 2003 will automatically detect and configure the local area connection settings, such as IP address, subnet mask, and default gateway. This allows for easy setup and connection to a local network. Dial-up networking and routing tables, on the other hand, are not automatically configured and require manual configuration by the administrator.
4.
Which
of the following components are automatically assigned to connections?
Correct Answer
C. Client for Microsoft Networks
Explanation
The Client for Microsoft Networks is automatically assigned to connections. This component allows the computer to connect to and communicate with Microsoft networks. It provides the necessary protocols and services for network communication, such as file and printer sharing. This component is essential for accessing resources on a Microsoft network and is automatically included in the network configuration.
5.
Which
of the following features is not configurable through the Routing and Remote Access
console?
Correct Answer
D. Active Directory
Explanation
The Routing and Remote Access console allows for the configuration of various features related to network connectivity, such as dial-up networking, packet filtering, and Internet Connection Sharing. However, it does not provide configuration options for Active Directory, which is a separate service used for managing and organizing network resources, such as users, groups, and computers. Therefore, the correct answer is Active Directory.
6.
Which
of the following is a requirement for networking on a Windows Server 2003 network?
Correct Answer
B. Network protocol
Explanation
A requirement for networking on a Windows Server 2003 network is a network protocol. Network protocols are essential for communication between devices on a network. They define the rules and procedures for transmitting data across the network. Without a network protocol, devices would not be able to communicate with each other effectively. DHCP and WINS are also important components of a network, but they are not specifically mentioned as requirements for networking on a Windows Server 2003 network in the given options.
7.
Which
Windows component should you install if you want to set up DHCP, DNS, and WINS?
Correct Answer
B. Networking Services
Explanation
To set up DHCP, DNS, and WINS on a Windows system, you should install the "Networking Services" component. This component includes the necessary tools and services for managing and configuring network-related functions such as DHCP (Dynamic Host Configuration Protocol), DNS (Domain Name System), and WINS (Windows Internet Name Service). By installing the Networking Services component, you can easily set up and manage these essential networking services on your Windows system.
8.
You
want your computer running Windows Server 2003 to interoperate with a NetWare
network that contains servers running both NetWare 3.11 and NetWare 4.1. How
should you configure the NWLink protocol to handle this situation?
Correct Answer
D. Configure the Registry to allow both 802.2 and 802.3 frame types.
Explanation
To interoperate with a NetWare network containing servers running both NetWare 3.11 and NetWare 4.1, the NWLink protocol should be configured to allow both 802.2 and 802.3 frame types in the Registry. This will ensure compatibility with both versions of NetWare, allowing the Windows Server 2003 computer to communicate effectively with the NetWare network.
9.
Which
of the following network features does not rely on a Public Key Infrastructure?
Correct Answer
B. File sharing
Explanation
File sharing does not rely on a Public Key Infrastructure. Unlike IPSec and SSL, which both use public key cryptography for secure communication, file sharing typically uses other methods such as access control lists, passwords, or encryption specific to the file sharing application. Public Key Infrastructure is primarily used for authentication, encryption, and digital signatures, which are not essential for file sharing.
10.
Which
is the only layer of the TCP/IP reference model that does not contain any TCP/IP
protocols?
Correct Answer
A. The network interface layer
Explanation
The network interface layer is the only layer of the TCP/IP reference model that does not contain any TCP/IP protocols. This layer is responsible for the physical transmission of data over the network and handles tasks such as encoding and decoding data into bits. It interacts directly with the hardware and network devices, such as network interface cards (NICs), to send and receive data. Unlike the other layers, which have specific protocols assigned to them, the network interface layer does not have any TCP/IP protocols associated with it.
11.
Which
of the following TCP/IP protocols does not function at the internet layer?
Correct Answer
C. TCP
Explanation
TCP does not function at the internet layer. The internet layer is responsible for routing packets across different networks, while TCP operates at the transport layer and is responsible for establishing and maintaining reliable connections between devices. TCP relies on the services provided by the internet layer, such as IP, to transport its data packets. Therefore, TCP is not a protocol that functions directly at the internet layer.
12.
Which
of the following is a transport-layer protocol?
Correct Answer
B. UDP
Explanation
UDP (User Datagram Protocol) is a transport-layer protocol. It is a connectionless protocol that provides a simple and unreliable method of delivering datagrams from one host to another. UDP is often used for applications that require fast transmission and minimal overhead, such as real-time streaming or online gaming. Unlike TCP (Transmission Control Protocol), UDP does not provide error-checking, flow control, or retransmission of lost packets. Therefore, it is considered less reliable but faster than TCP.
13.
Which
of the following services connect to UDP ports? (Choose all that apply.)
Correct Answer(s)
A. NetBIOS
B. DNS
Explanation
NetBIOS and DNS are the services that connect to UDP ports. NetBIOS (Network Basic Input/Output System) is a protocol that allows applications on different computers to communicate over a local area network (LAN). It uses UDP for its transport layer protocol. DNS (Domain Name System) is responsible for translating domain names into IP addresses. It also uses UDP for communication between DNS servers and clients. Ethernet and Telnet are not services that directly connect to UDP ports. Ethernet is a networking technology, while Telnet is a protocol that allows remote login to a computer.
14.
What
does the local host use to determine the destination network ID of a particular
packet?
Correct Answer
B. The subnet mask
Explanation
The subnet mask is used by the local host to determine the destination network ID of a particular packet. The subnet mask is a binary pattern that is applied to the IP address to determine the network portion of the address. By comparing the IP address with the subnet mask, the local host can determine which network the packet belongs to. This allows the local host to properly route the packet to the correct destination.
15.
A
host determines that the destination network ID of a packet is the same as its own
network ID. What does the host do with the packet?
Correct Answer
A. It broadcasts an ARP request to determine the Media Access Control (MAC) address of the destination host and transmits the packet on the local network.
Explanation
When the host determines that the destination network ID of a packet is the same as its own network ID, it broadcasts an ARP request to determine the Media Access Control (MAC) address of the destination host. This is done to ensure that the packet is delivered to the correct host on the local network. Once the MAC address is determined, the host then transmits the packet on the local network using that MAC address. This allows for proper delivery of the packet within the local network.
16.
Which
of the following is the dotted-decimal notation equivalent of the binary address
11001100 00001010 11001000 00000100? To answer the question, first perform notation
conversion manually, and then verify your answer with Calculator.
Correct Answer
C. 204.10.200.4
Explanation
The given binary address can be converted to dotted-decimal notation by dividing it into four octets. The first octet is 11001100, which is equivalent to 204 in decimal. The second octet is 00001010, which is equivalent to 10 in decimal. The third octet is 11001000, which is equivalent to 200 in decimal. The fourth octet is 00000100, which is equivalent to 4 in decimal. Therefore, the dotted-decimal notation equivalent of the binary address is 204.10.200.4.
17.
Which of the following is the
binary equivalent of the dotted-decimal address 207.209.68.100? To answer the
question, first perform notation conversion manually, and then verify your
answer with Calculator.
Correct Answer
A. 11001111 11010001 01000100 01100100
Explanation
The correct answer is 11001111 11010001 01000100 01100100. This is the binary equivalent of the dotted-decimal address 207.209.68.100.
18.
Your ISP has assigned you 2 Class
C network addresses, 131.107.10.0 and 131.107.11.0, to accommodate your
network’s 400 hosts. Which network address and subnet mask (expressed as a
network prefix) can you assign to this address space so that your routers and
hosts view these 2 networks as a single network?
Correct Answer
A. 131.107.10.0/23
Explanation
The given answer, 131.107.10.0/23, is correct because it represents a subnet mask of 23 bits, which allows for a larger number of hosts to be accommodated in the network. By using this subnet mask, both the network addresses 131.107.10.0 and 131.107.11.0 can be combined into a single network, as it provides enough address space for the 400 hosts required.
19.
Which
of the following is most likely true for a computer with an IP address of 169.254.130.13?
Correct Answer
C. No DHCP server is on the network.
Explanation
The IP address 169.254.130.13 falls within the range of addresses reserved for Automatic Private IP Addressing (APIPA). APIPA is used when a computer is unable to obtain an IP address from a DHCP server. Therefore, it is most likely that there is no DHCP server on the network, leading to the computer using an automatically assigned IP address.
20.
You
have configured an alternate static IP address for a computer as 192.168.0.1. However,
when you run the Ipconfig utility, you see that the computer is reporting a
different address. What is the most likely cause of this?
Correct Answer
A. A DHCP server is assigning the computer an address.
Explanation
Another manually configured address is taking precedence over the alternate address.
21.
Which
of the following is not a requirement to capture frames from a network adapter
on a remote computer?
Correct Answer
D. Install the full version of Network Monitor on the remote computer.
Explanation
To capture frames from a network adapter on a remote computer, the Network Monitor Driver needs to be installed on both the remote computer and the local computer. The full version of Network Monitor only needs to be installed on the local computer for analysis and viewing purposes. Therefore, the correct answer is "Install the full version of Network Monitor on the remote computer" as it is not a requirement to capture frames from a remote computer.
22.
Which
session-layer interface is used to connect Client for Microsoft Networks to the
TCP/IP protocol?
Correct Answer
C. NetBT
Explanation
NetBT (NetBIOS over TCP/IP) is the session-layer interface used to connect Client for Microsoft Networks to the TCP/IP protocol. NetBT allows the client to communicate with other devices on the network using the NetBIOS (Network Basic Input/Output System) protocol over TCP/IP. This enables the client to access shared resources, such as files and printers, on other devices in the network that also support NetBIOS. The NetBT interface handles the session establishment, data transfer, and session termination between the client and the TCP/IP protocol.
23.
You
are the network administrator of a large company with headquarters in Boston and
five branch offices throughout North America. The company has recently deployed
a new network application that uses a distinct protocol called XTXA developed
by your organization. The application package includes an Xtxa.dll file that
enables Network Monitor to parse this proprietary protocol. You want to take advantage
of this function so that you can troubleshoot and solve problems related to the
application. Which steps must you perform so that you can capture and analyze
XTXA traffic in Network Monitor? (Choose two.)
Correct Answer(s)
B. Copy the Xtxa.dll file to the \System32\Netmon\Parsers folder.
C. Add an entry for the Xtxa.dll file to the \System32\Netmon\Parser.ini file.
Explanation
To capture and analyze XTXA traffic in Network Monitor, you need to perform two steps. First, you should copy the Xtxa.dll file to the \System32\Netmon\Parsers folder. This will enable Network Monitor to parse the proprietary protocol used by the application. Second, you need to add an entry for the Xtxa.dll file to the \System32\Netmon\Parser.ini file. This will ensure that Network Monitor recognizes and includes the XTXA protocol in its analysis. By completing these two steps, you will be able to troubleshoot and solve problems related to the application's network traffic.
24.
You
cannot ping to a computer on a local subnet, even after you reboot the
computer. What should you do next?
Correct Answer
B. Run Ipconfig with the /all switch.
Explanation
Running Ipconfig with the /all switch will provide detailed information about the network configuration of the computer, including the IP address, subnet mask, default gateway, and DNS servers. By examining this information, you can verify if the computer has the correct IP address and subnet mask for the local subnet. If there is a misconfiguration, you can then troubleshoot and correct it accordingly.
25.
After
changing the network card of a certain computer, you have found that you can no
longer ping that computer from another computer on the local subnet. You have
checked the TCP/IP configuration on both computers and find no errors. Both
computers can also ping themselves successfully. Finally, you have also verified
that the most recent version of the new NIC driver is installed and that Device
Manager reports the device is working correctly. What should be your next step?
Correct Answer
A. Check for errors in the ARP cache.
Explanation
The next step should be to check for errors in the ARP cache. The ARP cache is used to map IP addresses to MAC addresses on a local network. If there are errors in the ARP cache, it could be preventing the computer from being pinged by other computers on the local subnet. By checking the ARP cache, any incorrect or outdated entries can be identified and cleared, allowing for successful communication between the computers.
26.
From a host named C1, you cannot
ping another host named C2 that is located on the same subnet. You have
examined the IP properties of both computers and have determined that neither
computer contains TCP/IP configuration errors. Both computers can ping
themselves, but only C2 can ping other computers. You have also verified that
no errors exist in either computer’s IP-to-hardware address mappings. What
should be your next step?
Correct Answer
A. Check for hardware errors on C1.
Explanation
The next step should be to check for hardware errors on C1. Since both computers can ping themselves and C2 can ping other computers, it suggests that there may be an issue with the network adapter or other hardware on C1 that is preventing it from successfully pinging C2. Checking for hardware errors on C1 will help identify and resolve any hardware-related issues that may be causing the problem.
27.
You are experiencing a delay when
you connect to a remote Web site. Which tool allows you to determine whether
particular routers are responsible for the delay?
Correct Answer
D. PathPing
Explanation
PathPing is a tool that combines the functionality of both Ping and Traceroute. It provides information about the latency and packet loss at each hop along the network path. By using PathPing, you can determine whether particular routers are causing the delay by analyzing the round-trip time and packet loss statistics.
28.
The
network you administer includes 10 computers running Windows Server 2003 and
200 computers running Microsoft Windows XP Professional. In the network, you
have deployed a DNS server named DNS1 to host the zone lucernepublishing.com.
You have also configured the zone to allow dynamic updates. A DHCP server is
responsible for the IP configuration of all computers running Windows XP
Professional. One of these computers, c1.lucernepublishing.com, can be
contacted only by IP address and not by name. Which of the following actions
can you take to reregister this computer in DNS? Choose all that apply.
Correct Answer(s)
B. Execute the Ipconfig /registerdns command.
C. Shut down and restart c1.lucernepublishing.com.
Explanation
The correct answer is to execute the Ipconfig /registerdns command and to shut down and restart c1.lucernepublishing.com. By executing the Ipconfig /registerdns command, the computer will attempt to register its DNS records with the DNS server. Shutting down and restarting the computer will also trigger a DNS registration process. These actions will allow c1.lucernepublishing.com to reregister itself in DNS and be contacted by name instead of just by IP address.
29.
Which
of the following is a legal NetBIOS computer name?
Correct Answer
B. Host1_local
Explanation
The correct answer is "host1_local". NetBIOS computer names can consist of up to 15 characters and can include letters, numbers, and underscores. The name "host1_local" meets these criteria and is therefore a legal NetBIOS computer name.
30.
What
is the root domain of a namespace containing the FQDN first.domain1.local.?
Correct Answer
D. “” (empty string).
Explanation
The root domain of a namespace is the highest level domain in the hierarchy. In this case, the FQDN (Fully Qualified Domain Name) is first.domain1.local. The root domain is the part that comes before the first dot. In this case, there is no text before the first dot, so the root domain is an empty string.
31.
Which
step does the resolver first perform to resolve a DNS name?
Correct Answer
A. It checks its local cache.
Explanation
The resolver first checks its local cache to see if it already has the IP address associated with the DNS name. If the information is found in the cache, it can be quickly retrieved without needing to perform any further steps. This helps to improve the efficiency of the DNS resolution process by avoiding unnecessary network traffic.
32.
Your
network computers are turned on for the first time after a power outage. When a
DNS client first submits a recursive query to a local DNS server to resolve an
Internet name for which the server is not authoritative, which step takes place
first?
Correct Answer
D. The DNS server contacts root servers configured in the Cache.dns file.
Explanation
When a DNS client first submits a recursive query to a local DNS server to resolve an Internet name for which the server is not authoritative, the first step that takes place is the DNS server contacts root servers configured in the Cache.dns file. This is because the local DNS server does not have the requested information in its cache, so it needs to reach out to the root servers to start the process of resolving the name.
33.
Which
resource record is used to resolve domain names specified in e-mail addresses
to the IP address of the mail server associated with the domain?
Correct Answer
B. MX
Explanation
The resource record used to resolve domain names specified in e-mail addresses to the IP address of the mail server associated with the domain is the MX record. The MX record stands for Mail Exchanger record and it specifies the mail server responsible for accepting incoming e-mail messages on behalf of a domain.
34.
On
a new DNS server, you create a zone “” and then create subdomains from that root
domain. Which function will the new server be able or unable to perform?
Correct Answer
C. The server will be unable to resolve Internet names.
Explanation
The server will be unable to resolve Internet names because it is not able to cache names.
35.
You
administer a network that consists of a single domain. On this network, you have
configured a new DNS server named DNS1 to answer queries for Internet names
from the local domain. However, although DNS1 is connected to the Internet, it
continues to fail its recursive test on the Monitoring tab of the server
properties dialog box. Which of the following could be the potential cause for
the failure?
Correct Answer
B. DNS1 hosts a zone named “.”
Explanation
DNS1 hosts a zone named ".". This means that DNS1 is configured to be authoritative for the root zone, which is not allowed. The root zone should only be hosted by the root servers on the Internet. This misconfiguration is causing the failure of the recursive test on DNS1.
36.
Which of the following events could serve as a legitimate reason to modify (but not delete) the default root hints on the Root Hints tab of a DNS server properties dialog box? (Choose all that apply.)
Correct Answer(s)
A. The Internet root servers have changed.
D. Your server is not used to resolve Internet names.
Explanation
The first event, "The Internet root servers have changed," could serve as a legitimate reason to modify the default root hints. If the root servers have changed, the DNS server needs to be updated with the new root hints information to ensure proper resolution of domain names.
The fourth event, "Your server is not used to resolve Internet names," could also be a reason to modify the default root hints. If the server is not being used to resolve internet names, it may not need the default root hints. Modifying the root hints in this case could help optimize the DNS server's performance and resources.
37.
You oversee administration for a
wide area network (WAN) belonging to the Prose ware Company, which has one
central office in Rochester and two branch offices in Buffalo and Syracuse. The
network, which consists of one domain, has one primary DNS zone running on a
Windows Server 2003 computer at the central office, and one secondary DNS zone
at each branch.Network users are complaining that they often cannot connect to
sites at remote branches. Administrators have determined that network bandwidth
between the central office and a branch has become saturated with zone
transfers, and that zone transfers are being initiated before they can
complete. Which of the following steps would help resolve the problem with the
least effort?
Correct Answer
C. Increase the refresh interval on the primary DNS server.
Explanation
Increasing the refresh interval on the primary DNS server would help resolve the problem with the least effort. This would reduce the frequency at which zone transfers are initiated, giving more time for the transfers to complete before new ones are started. By increasing the refresh interval, the primary DNS server will not send zone updates as frequently, reducing the network bandwidth usage and alleviating the saturation issue. This solution does not require any additional hardware or configuration changes, making it the least effort option.
38.
You
discover that an administrator has adjusted the default TTL value for your company’s
primary DNS zone to 5 minutes. Which of the following is the most likely effect
of this change?
Correct Answer
B. DNS clients have to query the server more frequently to resolve names for which the server is authoritative.
Explanation
The most likely effect of adjusting the default TTL value to 5 minutes is that DNS clients will have to query the server more frequently to resolve names for which the server is authoritative. The TTL (Time to Live) value determines how long a DNS record can be cached before it expires. By setting it to 5 minutes, the DNS clients will need to query the server every 5 minutes to get the most up-to-date information, increasing the frequency of queries.
39.
Which
of the following is not a benefit of storing DNS zones in the Active Directory database?
Correct Answer
A. Less frequent transfers
Explanation
Storing DNS zones in the Active Directory database does not provide the benefit of less frequent transfers. This means that the DNS zones would still need to be transferred regularly between DNS servers, regardless of whether they are stored in the Active Directory database or not.
40.
You are the network administrator
for Lucerne Publishing. The Lucerne Publishing network consists of a single
domain, lucernepublishing.com, which is protected from the Internet by a
firewall. The firewall runs on a computer named NS1 that is directly connected
to the Internet. NS1 also runs the DNS Server service, and its firewall allows
DNS traffic to pass between the Internet and the DNS Server service on NS1 but
not between the Internet and the internal network. The DNS Server service on
NS1 is configured to use round robin. Behind the firewall, two computers are
running Windows Server 2003—NS2 and NS3—which host a primary and secondary DNS
server, respectively, for the lucernepublishing.com zone.Users on the company network
report that, although they use host names to connect to computers on the local
private network, they cannot use host names to connect to Internet destinations
such as www.microsoft.com. Which of the following actions requires the least
amount of administrative effort to enable network users to connect to Internet
host names?
Correct Answer
C. Configure NS2 and NS3 to use NS1 as a forwarder.
Explanation
Configuring NS2 and NS3 to use NS1 as a forwarder would require the least amount of administrative effort to enable network users to connect to Internet host names. By setting NS1 as a forwarder, NS2 and NS3 will forward DNS queries for external host names to NS1, which is directly connected to the Internet. This allows NS1 to resolve the queries and provide the necessary information to NS2 and NS3, allowing network users to connect to Internet destinations using host names. Disabling recursion on NS2 and NS3, enabling netmask ordering on NS1, or disabling round robin on NS1 would not address the issue of network users being unable to connect to Internet host names.
41.
You are the administrator for a
large network consisting of 10 domains. You have configured a standard primary
zone for the mfg.lucernepublishing.com domain on a DNS server computer named
Server1. You have also configured a UNIX server, named Server2, to host a
secondary zone for the same domain. The UNIX server is running BIND 8.2.1.You notice that zone transfers
between the primary and secondary servers seem to generate more traffic than
expected, putting a strain on network resources. What can you do to decrease
the network burden of zone transfers between the primary and secondary servers?
Correct Answer
A. Clear the BIND Secondaries check box on Server1.
Explanation
Clearing the BIND Secondaries check box on Server1 will decrease the network burden of zone transfers between the primary and secondary servers. By clearing this check box, Server1 will not send zone transfer requests to any secondary servers, reducing the amount of traffic generated during zone transfers. This will help alleviate the strain on network resources.
42.
You
are designing the DNS namespace for a company named Proseware, which has a
registered domain name of proseware.com. Proseware has a central office in Rochester
and one branch office each in Buffalo and Syracuse. Each office has a separate
LAN and network administrator. You want to configure a single DNS server at
each location, and you want the central office to host the proseware.com domain.
In addition, you want the administrators in Buffalo and Syracuse to maintain responsibility
for DNS names and name resolution within their networks. Which of the following
steps should you take?
Correct Answer
C. Configure the DNS server in Rochester to host a standard primary zone for the proseware.com domain. Configure the DNS servers in both Buffalo and Syracuse to each host a standard primary zone for a subdomain of proseware.com. Create a delegation from the DNS server in Rochester to each of these subdomains.
Explanation
The correct answer is to configure the DNS server in Rochester to host a standard primary zone for the proseware.com domain. Then, configure the DNS servers in both Buffalo and Syracuse to each host a standard primary zone for a subdomain of proseware.com. Finally, create a delegation from the DNS server in Rochester to each of these subdomains. This solution allows the central office in Rochester to maintain control over the main domain while delegating responsibility for the subdomains to the branch offices in Buffalo and Syracuse.
43.
You
are the administrator for your company’s network, which consists of a central office
LAN and three branch office LANs, all in different cities. You have decided to
design a new DNS infrastructure while deploying Active Directory on your
network. Your goals for the network are first to implement a single Active
Directory forest across all four locations and second to minimize response
times for users connecting to resources anywhere on the network. Assume that
all branch offices have domain controllers running DNS servers. Which of the
following actions best meets these goals?
Correct Answer
A. Configure a single Active Directory domain for all four locations and configure a single Active Directory–integrated DNS zone that replicates through the entire domain.
Explanation
Configuring a single Active Directory domain for all four locations and a single Active Directory-integrated DNS zone that replicates through the entire domain is the best option to meet the goals of implementing a single Active Directory forest and minimizing response times for users. This configuration ensures that all domain controllers in each location have a copy of the DNS zone, allowing for faster access to resources anywhere on the network. Additionally, having a single domain simplifies management and reduces administrative overhead.
44.
Which
of the following is not a benefit of using a stub zone?
Correct Answer
D. Increasing fault tolerance for DNS servers
Explanation
A stub zone is a copy of a zone that contains only the resource records necessary to identify the authoritative DNS servers for that zone. It does not store the entire zone's information. While stub zones provide benefits such as improving name resolution performance, keeping foreign zone information current, and simplifying DNS administration, they do not directly increase fault tolerance for DNS servers. Fault tolerance refers to the ability of a system to continue operating even in the event of a failure. Stub zones do not provide redundancy or backup for DNS servers in case of failure, so they do not increase fault tolerance.
45.
Which
command should you execute at the Nslookup prompt to view all contents of the
zone contoso.com?
Correct Answer
A. Ls –d contoso.com
Explanation
The command "ls -d contoso.com" should be executed at the Nslookup prompt to view all contents of the zone contoso.com.
46.
Which
command should you execute at the Nslookup prompt to view a list of all SRV
resource records in a domain?
Correct Answer
C. Ls –t srv
Explanation
To view a list of all SRV resource records in a domain, you should execute the command "ls -t srv" at the Nslookup prompt. This command sets the query type to SRV (service) and lists all the SRV resource records in the domain.
47.
Which
of the following actions should you perform to enable name resolution for clients
at the Syracuse branch? Assume that you want to keep or restore the default security
settings for zone transfers.
Correct Answer
D. Add an NS resource record to the treyresearch.net zone pointing to the computer ns5.treyresearch.net.
Explanation
Adding an NS (Name Server) resource record to the treyresearch.net zone pointing to the computer ns5.treyresearch.net will enable name resolution for clients at the Syracuse branch. This record specifies that ns5.treyresearch.net is authoritative for the treyresearch.net domain and is responsible for resolving names within that domain. By adding this record, clients at the Syracuse branch will be able to query ns5.treyresearch.net for name resolution.
48.
The
syr.treyresearch.net domain is configured as an Active Directory–integrated zone
at the Syracuse branch office. The zone replication scope has been set to All DNS
Servers in The Active Directory Forest. Which partition in Replication Monitor should
you use to force replication of the zone data for the syr.treyresearch.net domain?
Correct Answer
B. DC=ForestDnsZones,DC=treyresearch,DC=net
Explanation
The correct answer is "DC=ForestDnsZones,DC=treyresearch,DC=net". This is the partition in Replication Monitor that should be used to force replication of the zone data for the syr.treyresearch.net domain. The reason for this is that the syr.treyresearch.net domain is an Active Directory-integrated zone, and the replication scope for the zone has been set to All DNS Servers in The Active Directory Forest. Therefore, the replication needs to occur within the ForestDnsZones partition, which is specific to the forest, rather than the DomainDnsZones partition, which is specific to the domain.
49.
Which
of the following servers are eligible to be the first DHCP server on your
network? (Choose all that apply.)
Correct Answer(s)
A. A Windows Server 2003 domain controller in an Active Directory network
B. A Windows 2000 Server workgroup server in a network with no domains
D. A Windows 2000 Server member server in an Active Directory network
Explanation
The first DHCP server on a network can be any server that meets the requirements for hosting a DHCP server. In this case, the Windows Server 2003 domain controller in an Active Directory network, the Windows 2000 Server workgroup server in a network with no domains, and the Windows 2000 Server member server in an Active Directory network all meet the requirements and can be the first DHCP server on the network.
50.
A
DHCP scope has been configured with the 003 Router option, which provides clients
with the address of a default gateway. However, after running the Ipconfig /renew
command and then the Ipconfig /all command at a computer named Client1, you
find that this client is being assigned an IP address within the defined scope
but not the address of a default gateway. Which of the following answers could
explain this behavior?
Correct Answer
B. Client1’s IP address is acquired by means of a reservation at the DHCP server.