70 291Ch09ReviewQ by 908jn13y

VIEWS: 9 PAGES: 6

									             Name:


CN1270 Chapter 9 Review (70-291)

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.

____    1. Which tool could be used to determine which application or applications are utilizing the processor
             the most?
             a. Network Monitor
             b. Task Manager
             c. Performance console
             d. System Monitor
____    2.   Which tool included in Microsoft Windows Server 2003 can be used to quickly assess the amount of
             bandwidth used by each network connection?
             a. Task Manager
             b. Performance console
             c. Network Monitor
             d. Packet Monitor
____    3.   Which command could be entered at the command line to determine which application is using a
             particular port?
             a. Nbtstat -a
             b. Ipconfig
             c. Netstat -o
             d. Netstat -a
____    4.   Microsoft Windows Server 2003 includes which version of Network Monitor?
             a. Network Monitor Standard
             b. Network Monitor Premium
             c. Network Monitor Deluxe
             d. Network Monitor Lite
____    5.   Which command can be issued at the command line to determine the IP configuration of a particular
             computer?
             a. Netstat -a
             b. NetDiag
             c. Ipconfig /all
             d. Ipconfig /view
____    6.   Which command-line tool displays each route between a client computer and a destination IP
             address?
             a. Ping
             b. PathPing
             c. Netstat -R
             d. Route Ping
____    7.   Which command-line tool issues a series of tests that is designed to help isolate networking and
             connectivity problems?
             a. Netstat -a
             b. Traceroute
             c. PathPing
            Name:


            d. Netdiag
____   8. One of your servers that runs Microsoft Windows Server 2003 is very slow to respond when clients
            attempt to access information stored on it. Which process could you use to examine statistics related
            only to read attempts?
            a. Configure Task Manager to not display the Bytes Received counter information.
            b. Configure Task Manager to not display the Bytes Sent counter.
            c. Configure an alert that captures only read attempts by using the Performance
                console.
            d. You cannot view statistics related only to read attempts.
____   9.   You are the network administrator for the Contoso domain. Your branch office employees connect
            to the corporate network through a VPN connection to a Microsoft Windows Server 2003 Routing
            and Remote Access server. How could you monitor the overall performance of the Routing and
            Remote Access services on your network?
            a. Configure Network Monitor to capture packets coming from the Routing and
                Remote Access server.
            b. Use Task Manager to monitor the Routing and Remote Access server.
            c. Configure System Monitor to monitor the RAS Total performance object.
            d. Configure System Monitor to monitor the RAS Port performance object.
____ 10.    Your network users are working on a project that utilizes audio and video files that require an
            enormous amount of disk space for storage. You must ensure adequate disk space is always available
            and that free disk space never drops below 30 percent. What action could you take so that you are
            notified if free disk space drops below 30 percent?
            a. Use the Performance Logs And Alerts snap-in in the Performance console to
                configure an alert that notifies you when free disk space is less than 30 percent.
            b. Use Disk Manager in Administrative Tools to create an alert that notifies you when
                free disk space is less than 30 percent.
            c. Use Task Manager to send an alert when free disk space drops below 30 percent.
            d. You cannot configure Microsoft Windows Server 2003 to send notification when
                free disk space reaches a specified amount.
____ 11.    You have created an alert using the Performance Logs And Alerts snap-in that tracks the percent
            usage for the Paging File performance object. It is your intention that when the percent usage
            exceeds the specified limit, you will receive a network message. Several days after configuring the
            alert, you notice that the Application log in Event Viewer contains several entries indicating that the
            percent usage for the paging file exceeded the defined threshold, but you did not receive any
            network messages. Which of the following could be the reason you did not receive a network
            message when the threshold for the percent usage counter was exceeded?
            a. The alert was configured with the default setting in the Action tab.
            b. Your e-mail system is not working.
            c. The Alerter service is not running on the target computer.
            d. You configured the alert but have not started it.
____ 12.    You have configured Performance Logs And Alerts to send a message to a computer named
            Computer 2 to notify the operator when the network usage on a computer named Computer 1 gets
            too high. However, Computer 2 never receives the message sent from Computer 1. What must you
            do to enable messages sent by Computer 1 to be received by Computer 2?
            a. Start the Messenger service on Computer 1.
            b. Configure a performance alert on Computer 2.
           Name:


           c. Start the Messenger service on Computer 2.
           d. Configure Computer 1 to ping Computer 2 before sending a message.
____ 13. Which service must be started on a computer for the computer to send a message triggered by a
           performance alert?
           a. The Messenger service
           b. The Alerter service
           c. The Net Send service
           d. The Mail service
____ 14.   You install a new application, which reports that it is installing a service on the computer. However,
           when you run the application for the first time, it is unable to start. You inspect the event log to
           determine the nature of the problem. You receive an error stating, “The service did not start due to a
           logon failure.” What should you do?
           a. Grant the account the Log On As A Service right.
           b. Change the password to the same name as the account.
           c. Verify that the username of the account that is attempting to run the service is the
               correct user account.
           d. Grant the account administrative rights.
____ 15.   You install a new application, which reports that it is installing a service on the computer. However,
           when you run the application for the first time, it is unable to start. You inspect the service
           dependencies of the new service and notice that a required service that the application is dependent
           on is not started. However, your security policy states that services must remain stopped unless
           another application requires them to be started. In which state should you configure the dependent
           service to be?
           a. Automatic
           b. Automatic, but pause the service
           c. Manual
           d. Disabled
____ 16.   You install a new application on a member server. The application reports that it is installing a
           service on the computer. The installation of the service requests a username and password for which
           to run the service. You provide a username and password, but, when you attempt to run the
           application the first time, the application is unable to start. You suspect that the account has not been
           given sufficient privileges to run the service. What should you do to resolve this problem?
           a. On the member server, grant the user account the Log On As A Service right.
           b. In the domain, grant the user account the Log On As A Service right.
           c. On the member server, grant the user account the Log On As A Batch Job right.
           d. In the domain, grant the user account the Log On As A Batch Job right.
____ 17.   You have a server on your network that has experienced a reduction in performance. Using the
           Performance console, you determine that the server has an unusually high Pages/Sec counter. What
           should be done to resolve this issue?
           a. Increase the amount of hard disk space on the server.
           b. Increase the amount of RAM in the server.
           c. Decrease the size of the paging file on the server.
           d. Install a 100-MB network interface card in the server.
____ 18.   Which performance object should you monitor if you would like to capture information related to
           TCPv4 connections?
           Name:


           a.  Network Interface object
           b.  TCPv4 object
           c.  TCP/IP object
           d.  NBT Connections object
____ 19.   You have configured a performance alert to monitor network usage. You want to be notified if
           network usage exceeds the specified threshold only during peak work hours, which are 8:00 A.M.
           until 6:00 P.M. How should you configure the performance alert so that it will alert you only if the
           counter is exceeded during specific hours?
           a. Use the Schedule tab to configure the alert to start at 8:00 A.M. and stop at 6:00
               P.M.
           b. Use Interval settings to configure the alert to run every 8 hours.
           c. Manually start the Alerter service each day at 8:00 A.M., and manually stop the
               service each evening at 6:00 P.M.
           d. Manually start the Messenger service each day at 8:00 A.M., and manually stop
               the service each evening at 6:00 P.M.
____ 20.   As a network administrator, you are concerned about which ports on your servers are listening for
           connections. How can you determine which ports on a computer are listening for a connection?
           a. Enter netstat -o at the command prompt.
           b. Use Network Monitor to capture all of the packets sent and received by the server.
           c. Use the Performance console to capture statistics about listening ports.
           d. Enter netstat -a at the command prompt.
____ 21.   You are concerned about the performance of your network and would like to gather information
           about the amount and types of traffic that are present on the network. To view the traffic, you install
           Network Monitor through Add And Remove Programs on your server that runs Microsoft Windows
           Server 2003. However, you are able to view only traffic that is sent and received by the server. What
           could you do so that you could view 100 percent of the network traffic available to the network
           interface?
           a. Install the standard version of Network Monitor available in Microsoft System
               Management Server.
           b. Set the server to run Network Monitor in promiscuous mode.
           c. Use Task Manager to view the traffic.
           d. Set the server to run Network Monitor in verbose mode.
____ 22.   You are the network administrator for Contoso, Ltd. Your network has a single subnet. One user is
           unable to reach the Internet. However, you can successfully access the Internet, and no other users
           have indicated that they are experiencing problems with Internet connectivity. Which type of
           approach should you use when troubleshooting this user’s problem?
           a. Outside in
           b. Inside out
           c. Trial and error
           d. Divide and conquer
____ 23.   What step could you take to determine whether your Internet connectivity problem is related to your
           DNS server not having the correct IP address for a specific host computer?
           a. Issue the Nslookup command for the FQDN of the host computer.
           b. Ping the IP address of the host computer.
           c. Issue the Traceroute command, and specify the IP address of the host computer.
           d. Issue the Traceroute command, and specify the FQDN of the host computer.
           Name:


____ 24. Your clients can access internal resources by FQDN. However, they are experiencing difficulty
           accessing Internet Web sites by FQDN; they can access Web sites by IP address. Which of the
           following is a possible cause of this problem?
           a. Your DNS server does not have a forward lookup zone configured.
           b. Your DNS server does not have a reverse lookup zone configured.
           c. Your DNS server is not configured to forward queries that it cannot resolve.
           d. Your DNS Server service is not started.
____ 25.   This morning, your network users began to report having problems connecting to Internet sites.
           When you left work yesterday evening, no users were experiencing problems on the network. You
           are certain that your DNS server is functioning properly. However, you would like to verify whether
           the DNS server to which your DNS server forwards queries it cannot resolve locally is working
           properly. What could you do to determine whether the Internet connectivity problem is related to the
           remote DNS server?
           a. Ping the remote DNS server.
           b. Perform an iterative query test on your DNS server.
           c. Ping a remote Web site.
           d. Perform a recursive query test from your DNS server.
____ 26.   One of the clients running Microsoft Windows XP on your network is experiencing a network
           connection problem. To repair the connection, you would like to issue several commands at the
           command line. With the least amount of administrative effort, how can you automate the process so
           that several commands are issued automatically on the network connection?
           a. Write a batch file that would perform each of the tests.
           b. Click the Repair button in the Support tab on the network interface.
           c. Issue each of the commands at the command line.
           d. Issue each of the commands at the run line.
____ 27.   Which command issued by the Repair feature clears the DNS cache on the computer?
           a. Netstat -c
           b. Ipconfig /clearcache
           c. Ipconfig /flushdns
           d. Ipconfig /registerdns
____ 28.   Which of the following would not prevent DHCP information from being delivered to client
           computers?
           a. The DHCP relay agent does not exist on segments without a DHCP server.
           b. Addresses are not available in the DHCP scope.
           c. The DHCP server is not running.
           d. The router is 1542-compliant and is configured to allow DHCP broadcasts to pass
               through.
____ 29.   Your network is experiencing intermittent addressing problems. You notice that sometimes client
           computers receive incorrect configuration parameters from a DHCP server. Your network is
           supposed to have only one authorized DHCP server, but you suspect that another DHCP server
           might be causing this problem. What could you do to discover whether other DHCP servers are
           authorized on your network?
           a. Use the Dhcploc tool that is located in the Microsoft Windows Server 2003
               Support Tools.
           b. Use the DHCP console on one of the computers that runs Windows Server 2003 to
               search for all DHCP servers on the network.
           Name:


           c. Run the Ipconfig /dhcp command to list all DHCP servers on the network.
           d. Open Active Directory Sites And Services in Administrative Tools, and view the
             list of DHCP servers on the network.
____ 30. Your network consists of one Ethernet segment and one Token Ring segment. Both segments must
         use a single WAP for Internet access. What steps must you take to allow both the Ethernet and
         Token Ring segments to share a single WAP?
         a. Install the Ethernet relay agent on the Token Ring segment.
         b. Create a bridged network connection on a server that connects to the wireless
             network, the Ethernet network, and the Token Ring network.
         c. Install two WAPs, one for the Ethernet segment and one for the Token Ring
             segment. Then create a bridged connection between the two wireless points.
         d. No additional action is required. The WAP will recognize both segments by
             default.
____ 31. Most services that are installed by Microsoft Windows Server 2003 run under which account?
         a. The local administrator account
         b. The Local System account
         c. The Domain System account
         d. The Local Service Operator account
____ 32. You are the network administrator for Contoso, Ltd. One of the applications that runs on a member
         server on your network requires that the Messenger service be started. Periodically, the application
         generates an error that stops the Messenger service. Your server is configured with the default
         settings. Which step could you take to allow the server to attempt to correct this problem when it
         occurs?
         a. Configure the server to automatically reboot any time the application generates an
             error stating that the service had stopped.
         b. In the properties of the Messenger service, configure the Recovery option to restart
             the service when it fails.
         c. Manually restart the service whenever an error occurs that stops the service.
         d. Write a batch file that will restart all services every 5 minutes.

								
To top