The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Reckon you know about computers? In this quiz, we’ll be putting your knowledge of Windows 2003 Server 70-290, chapters one through four to the test. Test all your knowledge on remote desktop, active directories and much more in this one!
Questions and Answers
1.
The person nominated in the Name field of the Managed By tab of the computer accounts properties must exist in Active Directory.
A.
True
B.
False
Correct Answer
A. True
Explanation The statement is true because in order for the person nominated in the Name field of the Managed By tab of the computer accounts properties to exist in Active Directory, they must be a valid user or group within the Active Directory system. This ensures that the person or group assigned as the manager or administrator of the computer account has the necessary permissions and access rights to perform their duties effectively.
Rate this question:
2.
When you use Dsadd to create a computer account, the DN must be surrounded by quotation marks in order for the account to be created successfully
A.
True
B.
False
Correct Answer
B. False
Explanation When using Dsadd to create a computer account, the DN (Distinguished Name) does not need to be surrounded by quotation marks for the account to be created successfully. Quotation marks are not required in this case.
Rate this question:
3.
You can use the Ping utility to prove that the printer is connected to the network, powered on, and online.
A.
True
B.
False
Correct Answer
B. False
Explanation The statement is false because the Ping utility is used to test network connectivity between devices by sending ICMP echo requests and receiving ICMP echo replies. It cannot be used to directly prove that a printer is connected to the network, powered on, and online. To verify printer connectivity, one would typically need to check the printer's status or perform a test print.
Rate this question:
4.
When you install a printer that is connected directly to the Windows Server 2003 system, the installation process does not create a logical printer device for it.
A.
True
B.
False
Correct Answer
B. False
Explanation When you install a printer that is connected directly to the Windows Server 2003 system, the installation process does create a logical printer device for it. This means that even though the printer is physically connected to the server, it is still recognized as a separate device and can be accessed and managed accordingly. Therefore, the statement "the installation process does not create a logical printer device for it" is false.
Rate this question:
5.
What security principal is assigned as the owner of files and folders created by the operating system?
A.
The Administrator account
B.
The Administrators group
C.
The SYSVOL special identity
D.
The SYSTEM special identity
Correct Answer
B. The Administrators group
Explanation The Administrators group is assigned as the owner of files and folders created by the operating system. This group is a built-in security group in Windows that has full control over the system and all files and folders on it. By assigning the Administrators group as the owner, it ensures that members of this group have the necessary permissions to manage and control the files and folders.
Rate this question:
6.
Which of the following commands creates a computer account for computer1.sales .contoso.com?
Correct Answer
A. Dsadd computer CN=computer1,CN=sales,DC=contoso,DC=com
Explanation The correct answer is "dsadd computer CN=computer1,CN=sales,DC=contoso,DC=com". This command creates a computer account for "computer1.sales.contoso.com" by using the "dsadd computer" command, followed by the distinguished name (DN) of the computer account. The DN specifies the location of the computer account in the Active Directory hierarchy, including the domain and organizational units (OU).
Rate this question:
7.
You are the network administrator for a telecommunications company in Mobile, Alabama. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. The company employs 134 people, and all of them have a Windows XP Professional system. One morning, you get a call from a user who has received the following error message: Windows cannot connect to the domain, either because the domain controller is down or otherwise unavailable, or because your computer account was not found. Please try again later. If this message continues to appear, contact your system administrator for assistance. The user logged on to the system without any problem the previous day, and you have received no other reports of users experiencing problems. You reset the computer account in Active Directory Users And Computers, but the user still cannot connect to log on to the domain. Which of the following do you try next?
A.
Disable and reenable the computer account.
B.
Disable and reenable the user account.
C.
Change the computer system’s membership to a workgroup, and then rejoin it to the domain.
D.
Delete the existing computer account, and re-create a new computer account with the same name.
Correct Answer
C. Change the computer system’s membership to a workgroup, and then rejoin it to the domain.
Explanation In this scenario, the user is unable to connect to the domain and has already tried resetting the computer account in Active Directory Users And Computers with no success. The next step would be to change the computer system's membership to a workgroup and then rejoin it to the domain. This can help troubleshoot any potential issues with the computer's connection to the domain and ensure that the computer account is properly authenticated and connected to the domain.
Rate this question:
8.
You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?
A.
The NTFS permissions on the folders were reset to Read for the Everyone special identity during the restore process.
B.
The ACLs for the folders were re-created by the restore process and are now empty.
C.
The shares that the users used to connect to the server were removed.
D.
The shares that the users used to connect to the server were automatically set to deny access to the Everyone special identity, as a security precaution.
Correct Answer
C. The shares that the users used to connect to the server were removed.
Explanation The most likely cause of the problem is that the shares that the users used to connect to the server were removed. When the new drive was installed and the data was restored, the shares might not have been recreated or properly configured. As a result, the users are unable to access the sales order-processing system and the inventory database. This is indicated by the "CANNOT READ DATAFILE" errors they receive when trying to start either application.
Rate this question:
9.
You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?
A.
On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.
B.
On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98.
C.
On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. Select the Automatic Update Of Clients option in the Sharing tab of the printer’s properties.
D.
Install the new Windows 98 drivers on the Windows 98 client systems. Install the Windows Server 2003 drivers on the server.
Correct Answer
A. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.
Explanation To install and update the printer drivers, the network administrator should update the drivers for both Windows Server 2003 and Windows 98 on the Windows Server 2003 systems. Additionally, they should install the Windows 98 drivers on the client systems. This ensures that both the server and the client systems have the necessary drivers to communicate with the printers.
Rate this question:
10.
After you create a new printer and share it out, users can start printing to the device even if you have not made any permission assignments for the printer. How is this possible?
A.
The default permission assignment for a newly created printer is Everyone, Full Control.
B.
The default permission assignment for a newly created printer is Everyone, Print.
C.
The default permission assignment for a newly created printer is Domain Users, Print.
D.
The default permission assignment for a newly created printer is Domain Users, Full Control.
Correct Answer
B. The default permission assignment for a newly created printer is Everyone, Print.
Explanation When a new printer is created and shared out, the default permission assignment is set to "Everyone, Print." This means that all users, regardless of their specific permissions, have the ability to print to the device. This allows for easy and immediate access to the printer without the need for additional permission assignments.
Rate this question:
11.
By default, members of which Active Directory groups can assign ownership of an NTFS file or folder to another user?
A.
Administrators, Backup Operators
B.
Administrators, Backup Operators, Server Operators
Correct Answer
B. Administrators, Backup Operators, Server Operators
Explanation Members of the Administrators, Backup Operators, and Server Operators Active Directory groups can assign ownership of an NTFS file or folder to another user.
Rate this question:
12.
Which of the following is considered a standard NTFS permission?
A.
List Folder Contents
B.
Read Extended Attributes
C.
Create Folders/Append Data
D.
List Folder/Read Data
Correct Answer
A. List Folder Contents
Explanation List Folder Contents is considered a standard NTFS permission. This permission allows users to view the contents of a folder, including files and subfolders, but does not allow them to make any changes to the folder or its contents. It is a basic level of access that grants read-only privileges to the folder.
Rate this question:
13.
Which of the following tasks can be performed with the Full Control share permission but not the Change share permission?
A.
Changing the name of the file
B.
Changing file permissions
C.
Changing the contents of the file
D.
Deleting the file
Correct Answer
B. Changing file permissions
Explanation With the Full Control share permission, a user can perform all tasks related to managing the file, including changing the name of the file, changing the contents of the file, and deleting the file. However, the user cannot change file permissions with the Change share permission. This means that while they can make changes to the file itself, they do not have the authority to modify the access rights and permissions associated with the file.
Rate this question:
14.
You want a user to take ownership of a file or folder that she did not create. Which of the following groups do you not add her to?
A.
Administrators group
B.
Backup Operators group
C.
Creator/Owner special identity
D.
Server Operators group
Correct Answer
C. Creator/Owner special identity
Explanation The Creator/Owner special identity should not be added to the user in this scenario because it refers to the person who originally created the file or folder. Since the user did not create the file or folder, adding her to this group would not give her ownership or control over it.
Rate this question:
15.
A user is assigned the Change share permission to the \\SERVER2\DATA share that represents the C:\Data folder on Server2. The user connects to the DATA share across the network and opens a file from the \\SERVER2\DATA\SALES folder. He then decides that he no longer needs that file, and he tries to delete it. However, he is unable to do so and receives an error. Which of the following is a possible explanation for this?
A.
NTFS permissions are restricting the user’s access to the folder.
B.
The user is a member of a group that is assigned the Read share permission to the DATA share.
C.
Share permissions on the SALES folder in the DATA share are preventing the user from deleting the file.
D.
The user is a member of a group that has been denied all permissions to the DATA share.
Correct Answer
A. NTFS permissions are restricting the user’s access to the folder.
Explanation The possible explanation for the user being unable to delete the file is that NTFS permissions are restricting the user's access to the folder. This means that the user does not have the necessary permissions to perform the delete operation on the file.
Rate this question:
16.
You are the network administrator for a small furniture manufacturing company in Portland, Oregon. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. Each server has three disk drives in it. One drive is dedicated to the system and boot partition, and the other two drives hold the company sales order-processing database. All of the drives use NTFS. One day, a user reports that she has been configuring a folder that she created, removing all of the users, including herself, from the ACL. Now she is unable to access the files in the folder. How do you restore her access to the files in the folder?
A.
Restore the folder and its files from a backup taken before the user made the changes.
B.
Have the user assign herself permission to the folder again.
C.
Retake ownership of the folder, and reassign permissions to the users as necessary.
D.
Assign the user to the Creator/Owner special identity so she can edit the ACL.
Correct Answer
B. Have the user assign herself permission to the folder again.
Explanation Since the user removed all users, including herself, from the ACL, she no longer has permission to access the files in the folder. To restore her access, she can assign herself permission to the folder again. This can be done by right-clicking on the folder, selecting "Properties," going to the "Security" tab, clicking "Edit," and then adding herself back to the list of users with the necessary permissions.
Rate this question:
17.
You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?
A.
The NTFS permissions on the folders were reset to Read for the Everyone special identity during the restore process.
B.
The ACLs for the folders were re-created by the restore process and are now empty.
C.
The shares that the users used to connect to the server were removed.
D.
The shares that the users used to connect to the server were automatically set to deny access to the Everyone special identity, as a security precaution.
Correct Answer
C. The shares that the users used to connect to the server were removed.
Explanation The most likely cause of the problem is that the shares that the users used to connect to the server were removed. This would explain why the users are unable to access the sales order-processing system and the inventory database. Without the shares, the applications cannot be accessed. The other options, such as the NTFS permissions being reset or the ACLs being empty, do not directly address the issue of the shares being removed. Similarly, the option about the shares being set to deny access as a security precaution does not align with the fact that the shares were previously set to Full Control for the Everyone special identity.
Rate this question:
18.
You are the network administrator for a small company that develops integrated circuit chips for mobile communications manufacturers. The company network comprises a single Windows Server 2003 system that provides file and print services to the company’s 25 users. Three of the users are working on a top-secret project. They require a folder on the server that only they can access. Auditing is enabled on the server, but the manager wants to make sure that no one, including the Administrator, can access the files except the three engineers working on the project. The manager asks you to remove all entries from the ACL for the folder for users, groups, and special identities other than the three engineers. Will this prevent all others from seeing or opening the files in the folder?
A.
Yes.
B.
No. Someone else might be able to open or see the files, but you will have no way of knowing if this has occurred.
C.
No. Someone else might be able to open or see the files, but you will be able to tell if this has occurred.
D.
No. Members of the Administrators group will also be able to see or open the files.
Correct Answer
C. No. Someone else might be able to open or see the files, but you will be able to tell if this has occurred.
Explanation If all entries from the ACL for the folder are removed for users, groups, and special identities other than the three engineers, someone else might still be able to open or see the files. However, since auditing is enabled on the server, the administrator will be able to track and monitor any access or attempts to access the folder. This means that even though others may be able to access the files, the administrator will be able to tell if this has occurred through the auditing logs.
Rate this question:
19.
You are the network administrator for a charity based in Dallas, Texas. You have a single Windows Server 2003 system, running Active Directory, that provides file and print server services to 50 users. The system was donated by a local business, and while it is powerful enough for your needs, storage capacity on the server is limited. Your manager has assured you that as soon as funds become available, you will be able to purchase an additional disk drive, but in the meantime he has asked you to use any available means to control the storage situation. As a result, you have implemented disk quotas so that one user cannot monopolize all the available disk space. After creating a new directory structure for a user and copying a number of large files from the user’s workstation to the server, you want to make sure the files are counted toward the user’s disk quota. Which approach are you most likely to use?
A.
Make the user a member of the Administrators group, which allows her to take ownership of the files. Once she has done that, remove her from the Administrators group.
B.
Make the user a member of the Creator/Owner special identity to allow her to take ownership of the files.
C.
Give the user the Modify NTFS permission so she can take ownership of the files.
D.
While logged on as a user account that is a member of the Server Operators group, assign ownership of the files to the user.
Correct Answer
D. While logged on as a user account that is a member of the Server Operators group, assign ownership of the files to the user.
Explanation Assigning ownership of the files to the user while logged on as a user account that is a member of the Server Operators group is the most likely approach to ensure that the files are counted toward the user's disk quota. This approach allows the user to take ownership of the files without granting them excessive privileges or permissions, such as being a member of the Administrators group. By assigning ownership, the user will have control over the files and they will be included in their disk quota calculation.
Rate this question:
20.
You have created a printer on a Windows Server 2003 system. During the creation process, you shared the printer out, but now you want to configure the printer so it is not listed in Active Directory. Which of the following is the correct way to do this?
A.
Select the printer icon in the Printers And Faxes window and, from the File menu, select Properties. In the General tab, clear the List In The Directory check box.
B.
Select the printer icon in the Printers And Faxes window. Right-click the icon, and deselect List In The Directory on the menu.
C.
Select the printer icon in the Printers And Faxes window and, from the File menu, select Sharing. Clear the List In The Directory check box.
D.
Locate the corresponding printer object in Active Directory Users And Computers, and delete or disable it.
Correct Answer
C. Select the printer icon in the Printers And Faxes window and, from the File menu, select Sharing. Clear the List In The Directory check box.
Explanation To configure the printer so it is not listed in Active Directory, you need to select the printer icon in the Printers And Faxes window and access the printer's properties by selecting "Sharing" from the File menu. In the properties window, you should clear the "List In The Directory" check box. This will prevent the printer from being listed in Active Directory.
Rate this question:
21.
You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?
A.
On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.
B.
On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98.
C.
On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. Select the Automatic Update Of Clients option in the Sharing tab of the printer’s properties.
D.
Install the new Windows 98 drivers on the Windows 98 client systems. Install the Windows Server 2003 drivers on the server.
Correct Answer
A. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.
Explanation To install and update the printer drivers, the network administrator should update the drivers for both Windows Server 2003 and Windows 98 on the Windows Server 2003 systems. Additionally, they should install the Windows 98 drivers on the client systems. This ensures that both the server and the client systems have the updated drivers necessary for the printers to function properly.
Rate this question:
22.
You are the network administrator for a small computer distributor. The network comprises a single Windows Server 2003 system, which is configured as a domain controller, and 17 Windows XP Professional workstations. There is a single high-performance laser printer, which is directly connected to the network. The Windows Server 2003 system acts as a print server for the device, with a single logical printer. You are due to take a week’s vacation, and although you anticipate few problems, you want to give a user with some technical expertise the ability to pause and restart the printer if a printing problem arises. You also want to allow him to manage jobs in the print queue other than his own. To give him the necessary rights, you want to make a single group assignment for the user. If possible, though, you do not want to add him to a group that grants him more rights than he needs. Which of the following predefined Active Directory groups do you add him to?
A.
Print Operators
B.
Administrators
C.
Power Users
D.
Print Managers
Correct Answer
A. Print Operators
Explanation The correct answer is Print Operators. By adding the user to the Print Operators group, they will have the necessary rights to pause and restart the printer if a printing problem arises, as well as manage jobs in the print queue other than their own. This group specifically grants the user the required permissions for printer management without granting them more rights than necessary.
Rate this question:
23.
Which of the following statements is true of global groups?
A.
Global groups can include only users from within their domain.
B.
Global groups can include users from any domain in the tree.
C.
Global groups can include users from any domain in the forest.
D.
Global groups can include users from any domain in Active Directory
Correct Answer
A. Global groups can include only users from within their domain.
24.
You are the network administrator for a bank. The network comprises 3 Windows Server 2003 systems, 23 Windows 98 client systems, 3 Windows NT 4 systems, and 14 Windows XP Professional systems. You have one laser printer that is connected directly to the network. One of the servers is configured as a print server for the printer, and the Windows 98 and Windows XP Professional systems all have a logical printer configured that connects to the printer via the print server. The Windows NT 4 workstation systems print directly to the printer across the network. You have just purchased a new printer and are in the process of configuring it. The users on the Windows NT 4 workstation systems do not need to access it. The new printer will be attached directly to the print server by a parallel interface. What platforms do you install drivers for when you configure the printer?
A.
Windows Server 2003
B.
Windows Server 2003 and Windows 98
C.
Windows Server 2003, Windows XP Professional, and Windows 98
D.
Windows Server 2003 and Windows XP Professional
Correct Answer
C. Windows Server 2003, Windows XP Professional, and Windows 98
Explanation The correct answer is Windows Server 2003, Windows XP Professional, and Windows 98. This is because the print server is responsible for handling print jobs from the Windows 98 and Windows XP Professional systems, so drivers need to be installed on those platforms. Additionally, the Windows Server 2003 system itself needs drivers installed for the new printer as well. The Windows NT 4 systems do not need access to the new printer, so drivers do not need to be installed on those platforms.
Rate this question:
25.
Before you create a domain controller, a DNS server must be available on the network.
A.
True
B.
False
Correct Answer
B. False
Explanation The statement is false because a DNS server is not required to be available on the network before creating a domain controller. While it is recommended to have a DNS server for proper functioning of a domain controller, it is not a prerequisite. A domain controller can be created without a DNS server, but it may result in limited functionality and potential issues with name resolution and domain services.
Rate this question:
26.
Which of the following media has the largest data storage capacity?
A.
Zip cartridge
B.
CD
C.
DVD
D.
Jaz cartridge
Correct Answer
C. DVD
Explanation DVD has the largest data storage capacity among the given options. DVDs can store up to 4.7 GB or more of data, depending on the type and format, such as single-layer or dual-layer discs. This is significantly higher than the storage capacity of a CD, which can hold up to 700 MB of data, and a Zip or Jaz cartridge, which typically have capacities ranging from 100 MB to 2 GB. Therefore, DVD is the correct answer for the media with the largest data storage capacity.
Rate this question:
27.
You are reconfiguring a SQL Server database application on a member server. The reconfigurations seem to go smoothly, but after you have finished, a user calls you to report that they are having an issue accessing certain records in the database. In which of the following places are you most likely to look for events related to this problem?
A.
In the System log of Event Viewer
B.
In the Database log of Event Viewer
C.
In the Application log of Event Viewer
D.
In the Security log of Event Viewer
Correct Answer
C. In the Application log of Event Viewer
Explanation In the Application log of Event Viewer, you are most likely to look for events related to the problem of accessing certain records in the database. The Application log contains events that are generated by applications or programs on the server, including SQL Server. Therefore, it is the most relevant place to check for any errors or issues that could be causing the problem reported by the user. The System log may contain more general system-related events, while the Database log and Security log may not provide specific information about application-level issues.
Rate this question:
28.
What does the Server: Bytes Total/Sec Performance console counter reflect?
A.
The amount of data that is being written to the page file every second
B.
The amount of data that is being processed by the server service each second
C.
The amount of data sent and received by the server over all of its network interfaces
D.
The amount of data being written to disk each second
Correct Answer
C. The amount of data sent and received by the server over all of its network interfaces
Explanation The Server: Bytes Total/Sec Performance console counter reflects the amount of data sent and received by the server over all of its network interfaces. This counter measures the total amount of data, in bytes, that is being transmitted to and from the server through its network connections. It provides insight into the network traffic and can help monitor and analyze the server's network performance.
Rate this question:
29.
You are troubleshooting a problem with a Windows Server 2003 system whereby users cannot connect to the server. The server itself appears to be running, but you notice that there is no link light on the port of the hub into which the server is connected. As a result, you suspect that the network card in the server may have failed. Where would you look to see events related to the network card?
A.
The Network log of Event Viewer
B.
The System log of Event Viewer
C.
The Application log of Event Viewer
D.
The Security log of Event Viewer
Correct Answer
B. The System log of Event Viewer
Explanation The System log of Event Viewer is the correct answer because it contains events related to the overall system operation, including hardware and driver issues. Since the problem is suspected to be related to the network card, the System log would be the most appropriate place to look for any relevant events or error messages that could indicate a failure or malfunction of the network card. The Network log would not necessarily provide information about hardware issues, while the Application log and Security log are not directly related to network card problems.
Rate this question:
30.
You are working on a Windows Server 2003 system that has just been installed by another administrator. The administrator completed the installation but did not make any configuration changes following the installation. While checking the maximum log sizes in Event Viewer, you notice that the maximum size of the Security log is 16 MB. What does this tell you about the system?
A.
That Auditing has been enabled
B.
That the system is running either the DNS or DHCP service
C.
That the system is a domain controller
D.
That the system is not a domain controller
Correct Answer
D. That the system is not a domain controller
Explanation The maximum size of the Security log being only 16 MB suggests that the system is not a domain controller. Domain controllers typically have larger log sizes to accommodate the high volume of security events that they handle. Since no configuration changes were made following the installation, it implies that the system is not configured to perform domain controller functions.
Rate this question:
31.
You are the network administrator for a property development company in Salt Lake City, UT. You have a single Windows Server 2003 system that is a domain controller, a DHCP and DNS server, a file and print server, and the company e-mail server. The server also hosts a document management system. One Wednesday afternoon, without warning, the server crashes. You reboot the server and it comes up without a problem. You examine the system performance through System Monitor, but everything seems in order. Two weeks later, the server crashes again. As before, you reboot the server and it comes up without any errors. Immediately after the restart, you use System Monitor and observe the following counters and values. Server Work Queues: Queue Length = 2 Memory: Page Faults/Sec = 2 Memory: Pages/Sec = 7 Memory: Available Bytes = 452,332,145 PhysicalDisk: % Disk Time = 34 Network Interface: Output Queue Length = 1 Two days later, you monitor the same counter statistics and note the following: Server Work Queues: Queue Length = 1 Memory: Page Faults/Sec = 3 Memory: Pages/Sec = 11 Memory: Available Bytes = 124,342,841 PhysicalDisk: % Disk Time = 43 Network Interface: Output Queue Length = 0 Which of the following strategies are you likely to take with the server?
A.
Move an application off of the server and on to another server.
B.
Examine memory usage for each application on the server.
C.
Upgrade the network card from a 10 Mbps card to a 100 Mbps card.
D.
Nothing. The counter statistics do not indicate any issues.
Correct Answer
B. Examine memory usage for each application on the server.
Explanation The server crashes without warning and reboots without any errors, indicating that there may be a problem with memory usage. The memory counters in System Monitor show an increase in page faults per second and pages per second, as well as a decrease in available bytes. These statistics suggest that there may be a memory leak or excessive memory usage by one or more applications on the server. To address this issue, the network administrator should examine the memory usage for each application on the server to identify any potential memory-intensive processes or applications that may be causing the crashes.
Rate this question:
32.
What utility do you use to mark specific Active Directory objects as authoritative?
A.
ADutil.exe
B.
Auth.exe
C.
DSAuth.exe
D.
Ntdsutil.exe
Correct Answer
D. Ntdsutil.exe
Explanation Ntdsutil.exe is the utility used to mark specific Active Directory objects as authoritative. This utility is a command-line tool that allows administrators to manage and control various aspects of the Active Directory database. By using Ntdsutil.exe, administrators can mark specific objects as authoritative, which means that these objects have the highest priority in terms of replication and will overwrite any conflicting changes from other replicas. This utility is commonly used in scenarios where data integrity and consistency are crucial, such as during disaster recovery or when resolving conflicts in a multi-site environment.
Rate this question:
33.
Which of the following backup types does not alter the archive bit on a newly created file?
A.
Full
B.
Incremental
C.
Symmetrical
D.
Differential
Correct Answer
D. Differential
Explanation Differential backup type does not alter the archive bit on a newly created file. Differential backups only back up the files that have changed since the last full backup, regardless of whether the archive bit is set or not. This means that the archive bit remains unchanged for newly created files, making it easier to identify which files have been modified since the last full backup.
Rate this question:
34.
In an authoritative restore of Active Directory, the objects in the Active Directory database are restored with updated sequence numbers that prevent them from being overwritten during the next replication pass.
A.
True
B.
False
Correct Answer
A. True
Explanation During an authoritative restore of Active Directory, the objects in the Active Directory database are restored with updated sequence numbers. These sequence numbers ensure that the restored objects are considered as the most recent version and prevent them from being overwritten during the next replication pass. This allows the restored objects to have higher priority and authority over other replicas, ensuring that the restored data remains intact and unaffected by subsequent replication processes. Therefore, the statement is true.
Rate this question:
35.
When you configure volume shadow copy, which of the following parameters cannot be configured?
A.
Which folders on the drive should be included in the volume shadow copy.
B.
The drives that should be included in the volume shadow copy.
C.
The maximum size of the storage area for shadowed files.
D.
The frequency with which shadow copies should be made.
Correct Answer
A. Which folders on the drive should be included in the volume shadow copy.
Explanation The question asks about the parameters that cannot be configured when configuring volume shadow copy. The correct answer is "Which folders on the drive should be included in the volume shadow copy." This means that when configuring volume shadow copy, you cannot choose specific folders on the drive to be included in the shadow copy.
Rate this question:
36.
A user calls you because he cannot log on to the system. After verifying his identity, you determine that he recently returned from vacation and is unsure of his password. You decide to reset the password. How do you do accomplish this?
A.
In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the existing password, and then enter a new password. Retype the new password in the Confirm Password box, and click OK.
B.
In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the new password, retype the new password in the Confirm Password box, and click OK.
C.
In the Active Directory Users And Computers MMC snap-in, select the user. On the Account properties page for the user, click Change Password and then enter a new password. Retype the password in the Confirm password box, and click OK.
D.
On the General properties page for the user, click Change Password and then enter a new password for the user. Retype the password in the Confirm password box, and click OK.
Correct Answer
B. In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the new password, retype the new password in the Confirm Password box, and click OK.
Explanation To reset the password for the user who cannot log on to the system, you need to go to the Active Directory Users And Computers MMC snap-in. From there, select the user and choose the "Reset Password" option from the Action menu. Enter the new password and confirm it by retyping it in the Confirm Password box. Finally, click OK to apply the changes. This process will reset the user's password and allow them to log on to the system with the new password.
Rate this question:
37.
There is always less data included in an incremental backup than a full backup.
A.
True
B.
False
Correct Answer
B. False
Explanation An incremental backup only includes the data that has changed since the last backup, while a full backup includes all the data. Therefore, a full backup typically has more data included than an incremental backup.
Rate this question:
38.
You have recently been employed as the network administrator for a commercial real estate company. The company is relatively small and has a highly mobile workforce. The company has two Windows Server 2003 systems and one Windows 2000 system. Active Directory is configured at a Windows 2000 mixed domain functional level. Many of the sales representatives spend a great deal of time on the road and use the dial-in features of Windows Server 2003. The others are based primarily in the office and rarely work remotely. Late one evening, a user who normally works from the office pages you to report that he can’t gain access to the system over his dial-up link. He is calling from a hotel, where he is staying while at a conference. He explains that he connected the previous night from home without any problems, but this is the first time he has tried to connect from anywhere other than his home. Since you started working with the company, you have not made any changes to the user’s account properties. Based on the information he has provided, which of the following could be the problem?
A.
The user has Verify Caller ID enabled, and his home phone number is defined for that property.
B.
The static routes for the user have been configured to only allow the user to connect from his home phone number.
C.
The Always Callback To property on the user’s Dial-In page has been configured with the user’s home phone number.
D.
The phone number that the user is calling from is not listed on the Telephones properties page.
Correct Answer
C. The Always Callback To property on the user’s Dial-In page has been configured with the user’s home pHone number.
Explanation The user is unable to gain access to the system over his dial-up link because the Always Callback To property on the user's Dial-In page has been configured with his home phone number. This means that the system is set up to automatically call back the user's home phone number for authentication before allowing access. Since the user is calling from a hotel and not his home, the system is unable to authenticate his connection and therefore denies access.
Rate this question:
39.
You are the network administrator for a healthcare provider in Denver, Colorado. The network comprises three Windows Server 2003 systems. You have recently installed a new database application that requires a service account to be created. This service account needs to impersonate a client to access computer resources on behalf of other user accounts. Which of the following approaches do you take to
A.
Create a new user account. Then, in the General properties tab for that user account, select the Account Is Trusted For Delegation check box.
B.
Create a new user account. Then, in the Account properties tab for that user, select the Account Is Trusted For Delegation check box.
C.
Create a new user account. Then, in the Advanced properties tab for that user, select the Account Is Trusted For Delegation check box.
D.
Use an existing user account. In the Account properties tab for that user, select the Account Is Trusted for Delegation check box.
Correct Answer
B. Create a new user account. Then, in the Account properties tab for that user, select the Account Is Trusted For Delegation check box.
Explanation The correct approach is to create a new user account and then select the "Account Is Trusted For Delegation" check box in the Account properties tab for that user. This allows the service account to impersonate a client and access computer resources on behalf of other user accounts.
Rate this question:
40.
On a domain controller, members of the Power Users group can create user and group accounts and modify the users and groups they have created.
A.
True
B.
False
Correct Answer
B. False
Explanation Members of the Power Users group on a domain controller do not have the ability to create user and group accounts or modify the users and groups they have created. This privilege is typically reserved for administrators or other higher-level user roles. Therefore, the statement is false.
Rate this question:
41.
Where do you change the scope?
A.
In the Scopes properties tab of the group in Active Directory and Computers
B.
In the General properties tab of the group in Active Directory and Computers
C.
In the Members properties tab of the group in Active Directory and Computers
D.
In the Type properties tab of the group in Active Directory and Computers
Correct Answer
B. In the General properties tab of the group in Active Directory and Computers
Explanation The scope of a group in Active Directory and Computers can be changed in the General properties tab. This tab allows administrators to modify various settings related to the group, including its scope. By changing the scope, administrators can control the visibility and accessibility of the group within the Active Directory environment.
Rate this question:
42.
On a Windows Server 2003 system, where do you go to join the computer to a domain?
A.
Control Panel, System, Computer Name
B.
Control Panel, System, Network Identification
C.
Control Panel, System, Advanced
D.
Control Panel, System, General
Correct Answer
A. Control Panel, System, Computer Name
Explanation To join a computer to a domain on a Windows Server 2003 system, you need to go to Control Panel, then click on System, and finally select Computer Name. In this section, you will find the option to join the computer to a domain.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.