Name: CN1270 Chapter 9 Review (70-291) Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ____ 1. Which tool could be used to determine which application or applications are utilizing the processor the most? a. Network Monitor b. Task Manager c. Performance console d. System Monitor ____ 2. Which tool included in Microsoft Windows Server 2003 can be used to quickly assess the amount of bandwidth used by each network connection? a. Task Manager b. Performance console c. Network Monitor d. Packet Monitor ____ 3. Which command could be entered at the command line to determine which application is using a particular port? a. Nbtstat -a b. Ipconfig c. Netstat -o d. Netstat -a ____ 4. Microsoft Windows Server 2003 includes which version of Network Monitor? a. Network Monitor Standard b. Network Monitor Premium c. Network Monitor Deluxe d. Network Monitor Lite ____ 5. Which command can be issued at the command line to determine the IP configuration of a particular computer? a. Netstat -a b. NetDiag c. Ipconfig /all d. Ipconfig /view ____ 6. Which command-line tool displays each route between a client computer and a destination IP address? a. Ping b. PathPing c. Netstat -R d. Route Ping ____ 7. Which command-line tool issues a series of tests that is designed to help isolate networking and connectivity problems? a. Netstat -a b. Traceroute c. PathPing Name: d. Netdiag ____ 8. One of your servers that runs Microsoft Windows Server 2003 is very slow to respond when clients attempt to access information stored on it. Which process could you use to examine statistics related only to read attempts? a. Configure Task Manager to not display the Bytes Received counter information. b. Configure Task Manager to not display the Bytes Sent counter. c. Configure an alert that captures only read attempts by using the Performance console. d. You cannot view statistics related only to read attempts. ____ 9. You are the network administrator for the Contoso domain. Your branch office employees connect to the corporate network through a VPN connection to a Microsoft Windows Server 2003 Routing and Remote Access server. How could you monitor the overall performance of the Routing and Remote Access services on your network? a. Configure Network Monitor to capture packets coming from the Routing and Remote Access server. b. Use Task Manager to monitor the Routing and Remote Access server. c. Configure System Monitor to monitor the RAS Total performance object. d. Configure System Monitor to monitor the RAS Port performance object. ____ 10. Your network users are working on a project that utilizes audio and video files that require an enormous amount of disk space for storage. You must ensure adequate disk space is always available and that free disk space never drops below 30 percent. What action could you take so that you are notified if free disk space drops below 30 percent? a. Use the Performance Logs And Alerts snap-in in the Performance console to configure an alert that notifies you when free disk space is less than 30 percent. b. Use Disk Manager in Administrative Tools to create an alert that notifies you when free disk space is less than 30 percent. c. Use Task Manager to send an alert when free disk space drops below 30 percent. d. You cannot configure Microsoft Windows Server 2003 to send notification when free disk space reaches a specified amount. ____ 11. You have created an alert using the Performance Logs And Alerts snap-in that tracks the percent usage for the Paging File performance object. It is your intention that when the percent usage exceeds the specified limit, you will receive a network message. Several days after configuring the alert, you notice that the Application log in Event Viewer contains several entries indicating that the percent usage for the paging file exceeded the defined threshold, but you did not receive any network messages. Which of the following could be the reason you did not receive a network message when the threshold for the percent usage counter was exceeded? a. The alert was configured with the default setting in the Action tab. b. Your e-mail system is not working. c. The Alerter service is not running on the target computer. d. You configured the alert but have not started it. ____ 12. You have configured Performance Logs And Alerts to send a message to a computer named Computer 2 to notify the operator when the network usage on a computer named Computer 1 gets too high. However, Computer 2 never receives the message sent from Computer 1. What must you do to enable messages sent by Computer 1 to be received by Computer 2? a. Start the Messenger service on Computer 1. b. Configure a performance alert on Computer 2. Name: c. Start the Messenger service on Computer 2. d. Configure Computer 1 to ping Computer 2 before sending a message. ____ 13. Which service must be started on a computer for the computer to send a message triggered by a performance alert? a. The Messenger service b. The Alerter service c. The Net Send service d. The Mail service ____ 14. You install a new application, which reports that it is installing a service on the computer. However, when you run the application for the first time, it is unable to start. You inspect the event log to determine the nature of the problem. You receive an error stating, “The service did not start due to a logon failure.” What should you do? a. Grant the account the Log On As A Service right. b. Change the password to the same name as the account. c. Verify that the username of the account that is attempting to run the service is the correct user account. d. Grant the account administrative rights. ____ 15. You install a new application, which reports that it is installing a service on the computer. However, when you run the application for the first time, it is unable to start. You inspect the service dependencies of the new service and notice that a required service that the application is dependent on is not started. However, your security policy states that services must remain stopped unless another application requires them to be started. In which state should you configure the dependent service to be? a. Automatic b. Automatic, but pause the service c. Manual d. Disabled ____ 16. You install a new application on a member server. The application reports that it is installing a service on the computer. The installation of the service requests a username and password for which to run the service. You provide a username and password, but, when you attempt to run the application the first time, the application is unable to start. You suspect that the account has not been given sufficient privileges to run the service. What should you do to resolve this problem? a. On the member server, grant the user account the Log On As A Service right. b. In the domain, grant the user account the Log On As A Service right. c. On the member server, grant the user account the Log On As A Batch Job right. d. In the domain, grant the user account the Log On As A Batch Job right. ____ 17. You have a server on your network that has experienced a reduction in performance. Using the Performance console, you determine that the server has an unusually high Pages/Sec counter. What should be done to resolve this issue? a. Increase the amount of hard disk space on the server. b. Increase the amount of RAM in the server. c. Decrease the size of the paging file on the server. d. Install a 100-MB network interface card in the server. ____ 18. Which performance object should you monitor if you would like to capture information related to TCPv4 connections? Name: a. Network Interface object b. TCPv4 object c. TCP/IP object d. NBT Connections object ____ 19. You have configured a performance alert to monitor network usage. You want to be notified if network usage exceeds the specified threshold only during peak work hours, which are 8:00 A.M. until 6:00 P.M. How should you configure the performance alert so that it will alert you only if the counter is exceeded during specific hours? a. Use the Schedule tab to configure the alert to start at 8:00 A.M. and stop at 6:00 P.M. b. Use Interval settings to configure the alert to run every 8 hours. c. Manually start the Alerter service each day at 8:00 A.M., and manually stop the service each evening at 6:00 P.M. d. Manually start the Messenger service each day at 8:00 A.M., and manually stop the service each evening at 6:00 P.M. ____ 20. As a network administrator, you are concerned about which ports on your servers are listening for connections. How can you determine which ports on a computer are listening for a connection? a. Enter netstat -o at the command prompt. b. Use Network Monitor to capture all of the packets sent and received by the server. c. Use the Performance console to capture statistics about listening ports. d. Enter netstat -a at the command prompt. ____ 21. You are concerned about the performance of your network and would like to gather information about the amount and types of traffic that are present on the network. To view the traffic, you install Network Monitor through Add And Remove Programs on your server that runs Microsoft Windows Server 2003. However, you are able to view only traffic that is sent and received by the server. What could you do so that you could view 100 percent of the network traffic available to the network interface? a. Install the standard version of Network Monitor available in Microsoft System Management Server. b. Set the server to run Network Monitor in promiscuous mode. c. Use Task Manager to view the traffic. d. Set the server to run Network Monitor in verbose mode. ____ 22. You are the network administrator for Contoso, Ltd. Your network has a single subnet. One user is unable to reach the Internet. However, you can successfully access the Internet, and no other users have indicated that they are experiencing problems with Internet connectivity. Which type of approach should you use when troubleshooting this user’s problem? a. Outside in b. Inside out c. Trial and error d. Divide and conquer ____ 23. What step could you take to determine whether your Internet connectivity problem is related to your DNS server not having the correct IP address for a specific host computer? a. Issue the Nslookup command for the FQDN of the host computer. b. Ping the IP address of the host computer. c. Issue the Traceroute command, and specify the IP address of the host computer. d. Issue the Traceroute command, and specify the FQDN of the host computer. Name: ____ 24. Your clients can access internal resources by FQDN. However, they are experiencing difficulty accessing Internet Web sites by FQDN; they can access Web sites by IP address. Which of the following is a possible cause of this problem? a. Your DNS server does not have a forward lookup zone configured. b. Your DNS server does not have a reverse lookup zone configured. c. Your DNS server is not configured to forward queries that it cannot resolve. d. Your DNS Server service is not started. ____ 25. This morning, your network users began to report having problems connecting to Internet sites. When you left work yesterday evening, no users were experiencing problems on the network. You are certain that your DNS server is functioning properly. However, you would like to verify whether the DNS server to which your DNS server forwards queries it cannot resolve locally is working properly. What could you do to determine whether the Internet connectivity problem is related to the remote DNS server? a. Ping the remote DNS server. b. Perform an iterative query test on your DNS server. c. Ping a remote Web site. d. Perform a recursive query test from your DNS server. ____ 26. One of the clients running Microsoft Windows XP on your network is experiencing a network connection problem. To repair the connection, you would like to issue several commands at the command line. With the least amount of administrative effort, how can you automate the process so that several commands are issued automatically on the network connection? a. Write a batch file that would perform each of the tests. b. Click the Repair button in the Support tab on the network interface. c. Issue each of the commands at the command line. d. Issue each of the commands at the run line. ____ 27. Which command issued by the Repair feature clears the DNS cache on the computer? a. Netstat -c b. Ipconfig /clearcache c. Ipconfig /flushdns d. Ipconfig /registerdns ____ 28. Which of the following would not prevent DHCP information from being delivered to client computers? a. The DHCP relay agent does not exist on segments without a DHCP server. b. Addresses are not available in the DHCP scope. c. The DHCP server is not running. d. The router is 1542-compliant and is configured to allow DHCP broadcasts to pass through. ____ 29. Your network is experiencing intermittent addressing problems. You notice that sometimes client computers receive incorrect configuration parameters from a DHCP server. Your network is supposed to have only one authorized DHCP server, but you suspect that another DHCP server might be causing this problem. What could you do to discover whether other DHCP servers are authorized on your network? a. Use the Dhcploc tool that is located in the Microsoft Windows Server 2003 Support Tools. b. Use the DHCP console on one of the computers that runs Windows Server 2003 to search for all DHCP servers on the network. Name: c. Run the Ipconfig /dhcp command to list all DHCP servers on the network. d. Open Active Directory Sites And Services in Administrative Tools, and view the list of DHCP servers on the network. ____ 30. Your network consists of one Ethernet segment and one Token Ring segment. Both segments must use a single WAP for Internet access. What steps must you take to allow both the Ethernet and Token Ring segments to share a single WAP? a. Install the Ethernet relay agent on the Token Ring segment. b. Create a bridged network connection on a server that connects to the wireless network, the Ethernet network, and the Token Ring network. c. Install two WAPs, one for the Ethernet segment and one for the Token Ring segment. Then create a bridged connection between the two wireless points. d. No additional action is required. The WAP will recognize both segments by default. ____ 31. Most services that are installed by Microsoft Windows Server 2003 run under which account? a. The local administrator account b. The Local System account c. The Domain System account d. The Local Service Operator account ____ 32. You are the network administrator for Contoso, Ltd. One of the applications that runs on a member server on your network requires that the Messenger service be started. Periodically, the application generates an error that stops the Messenger service. Your server is configured with the default settings. Which step could you take to allow the server to attempt to correct this problem when it occurs? a. Configure the server to automatically reboot any time the application generates an error stating that the service had stopped. b. In the properties of the Messenger service, configure the Recovery option to restart the service when it fails. c. Manually restart the service whenever an error occurs that stops the service. d. Write a batch file that will restart all services every 5 minutes.
Pages to are hidden for
"70 291Ch09ReviewQ"Please download to view full document