Você está na página 1de 19

Which of the following protocols lie above the internet Protocol in the TCP/IP architecture?

ICMP and IGMP Network Access Layer C ICMP and ARP C ICMP and RARP Which of the following protocols is used by client application in bootp environment to download all the required bootup information? smtp http tftp ftp Which container lists the default users and group accounts created by Windows Server 2003? Bulltin and Computers Users and Domain Controllers Builtin and Users Users and Computers Which of the following RFC defines BOOTP? RFC 951 RFC 826 RFC 802 RFC 980 Which of the following group is used to assign rights and permissions to members who perform similar operations and access similar resources in any domain in the forest? Distribution group Security group Domain local group Universal group An IPv6 address consists of___________bytes 16 8ytes 32 Bytes 24 Bytes 12 Bytes Which file system supports partitions only up to 2 TB in size? NTFS FAT 32 FAT 16 FAT

Which file system supports partitions that are less than 2 GB and is typically used on systems that require dual booting? NTFS FAT 32 FAT FAT 16 Which of the following options enables a print device to communicate with the operating system? System Monitor Print Server Print Driver Print Job Which of the following options specifies whether a GPO is enabled or disabled? List of GPO List of extensions Version Information Status Information What is the minimum length of IP header? 60 Bytes 46 Bytes 20 Byte 40 Bytes identify the correct method to create local user accounts? Select the Start ( Programs (Administrative Tools menu command. Select the Start ( Programs ( Administrative Tools ( Microsoft Management Console menu command. Select the Start ( Programs ( Administrative Tools { Computer Management menu command. Select the Start ( Programs ( Administrative Tools (Active Directory Users and Computers menu command. Which file system provides file and folder level security? NTFS FAT T FAT 32 FAT 16 Which of the following is the function of the Session layer of the OSI reference model? It establishes, manages, and synchronizes the communication between the two nodes. it breaks the data packets into small block of data known as frame.

it defines the type of interface required between the network adapter of the sending and receiving node and the transmission medium. it translates logical address to the physical addressWhich of the following special identities includes users who have created a resource? Authenticated Users Anonymous Logon Everyone Creator Owner Which of the following is a reliable protocol of the Transport layer? ip icmp udp TCP Which edition of Windows Server 2003 supports Microsoft Metadirectory Services? Windows Server 2003, Enterprise Edition Windows Server 2003, Standard Edition Windows Server 2003, Web Edition Windows Server 2003, Datacenter Edition Which GPO is linked to the domain and affects all the users and computers included in the domain as well as the domain controller? Default GPO based policy Default Domain Controllers policy C Default Domain GPO based policy Default Domain policy Network printer device is connected to the print server using network ______ interface. RJ-40 RJ-50 RJ-45 RJ-55 Which administrative shared folder is used to access the C:\WINNT folder of Windows Server 2003 computer from the client computer? AdminS ds Prints cs What is the minimum length of an Ethernet data field? 1500 Bytes 24 Bytes r 512 Bytes

46 Bytes Which of the following options distinguishes between a user account and a user template? Password never expires. Password is disabled. Account never expires. Account is disabledWindows Server 2003 8 bit 16 bit 32 bit 64 bit bit version runs on Pentium-based systems.

Which of the following is an unreliable protocol of the Transport layer? ICMP IP TCP Udp Which of the following is NOT a feature of Windows 2000? it provides centralized management of users and resources over the network. It uses nds to manage the user and resource information in a central database It uses Active Directory for maintaining information about network objects, such as users, disks, applications, and peripheral devices. it also provides enhanced security management of users, computers, and devices. Which of the following enables you to centrally administer files and applications over a network? Shared folder NTFS Group Policy User Accounts Which of the following parameters of the Gpupdate command enables you to specify any one of the user or computer Group Policy that needs to be refreshed? Target Boot Force Logoff Which option will enable you to change the password of a user account? Create a new user account with the same user name and password Open the user account properties dialog box to change the password. Double-click the user name to change the password, Right click the user name and select the Reset Password option.

Which tab of the Advanced Security Settings dialog box enables you to view user or group permissions on files and folders? Effective Permissions Auditing Permissions Owner Which edition of Windows Server 2003 is intended for medium to large-size organizations and supports clustering up to eight computers for enhanced fault tolerance in case of system failure? Web Edition Datacenter Edition Enterprise Edition Standard Edition Which component of the Administrative Template node includes User Profiles, Scripts, Logon, Ctrl-Alt-Del Options, Group Policy, and Power Management? Network Computer Windows Components System What is the size of the port address? 32 bits 24 bits 8 bits 16 bits Which of the following domain specify the country/region or the type of organization? Root-level domain Sub domain Second-level domain Top-level domain identify the hardware device required for printing a document Print job print driver Print server Print device Which of the following is the feature of the Infrared transmission? It uses two modes of transmissions, line of sight and scatter They can be applied in any of the networking environments, such as LAN, extended LAN or mobile computing.

This technology can be employed in two forms, namely satellite links and terrestrial links. They are difficult to install because they require extreme precision Which of the following groups are primarily used for backward compatibility with the Windows NT 4.0 operating system? Security groups Local groups Distribution groups Global groups Which of the following is the feature of the Microwave transmission? it uses two modes of transmissions, line of sight and scatter It can be applied in any of the networking environments, such as LAN, extended LAN or mobile computing it can travel over long distances without significant distortions it is the most commonly used medium of communication Which of the following options are used with the DSMOD and DSADD commands to create user-specific profile folders? Username #Username# C 96Username% C CN=Username Which of the following is a disadvantage of peer-to-peer network? Lower cost for small networks Easy Setup No extra investment in server hardware or software is required Low security A user account that has similar properties already configured is called___________. Local account template Local user account template Domain user account User account template Identify the NTFS folder permission that enables users to only view the names of files and subfolders contained within a folder? Modify Full Control Read and Execute List folder contents Which of the following options is required to install Active Directory? FAT 32 partition

NTFS partition FAT 16 partition DHCP server Which administrative shared folder is used to access the C:\WINDOWS\SYSTEM32\spool\drivers folder of Windows Server 2003 computer from the client computer? Prints AdminS d$ c$ Which of the following technology is known as Thinnet Ethernet? lOBaseS Ethernet lOBaseT Ethernet 100BaseT Ethernet 10Base2 Ethernet To enable reverse lookups over the Internet, a special domain called the has been built into the DNS structure over the Internet. arpa-in.addr in-addr.arpa arpa.in.addr in.addr.arpa domain

Which of the following field in the IP header indicates reliability, precedence delay and throughput parameters? Flags Fragment Offset Service Options Which of the following is the process of sending data packets to a group of hosts that are identified by a single IP address? Multicasting Multiplexing Multitasking Multiprocessing Which command-line tool enables you to identify user and group accounts that have not been used for the past 3 months? DS QUERY DSGET DSADD DSMOD

For which of the following field the length varies in the IP header? Fragment Offset Flag Protocol Options Which of the following is the network component of LAN? Gateway Bridge Router Brouter Which tab in the Properties dialog box of a shared folder enables you to configure NTFS permissions for a folder? Security Publish Share Permissions General Which of the following organizations is a large working committee of operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet? Internet Corporation for assigned Names and Numbers (ICANN) Internet Engineering Task Force (IETF) Internet Research Task Force (IRTF) Internet Architecture Board (IAB) Which of the following enables you to monitor the performance of printers? Performance Console Device Manager Event Viewer Task Manager Which of the following protocols functions at the Internet Layer of the TCP/IP Architecture? C FTP Tcp ICMP SMTP How should you configure your DNS server if you want to resolve internet names? You already have a DNS server for intranet traffic* As a Caching Server As a Secondary Server As a Forwarding Server As a Primary Server

Consider the following statements: Statement A: A spanned volume enables you to combine disk storage, but it does not improve the speed with which a computer can access data. Statement B: A spanned volume provides fault tolerance. Which of the following is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are True, Both, Statement A and Statement B are False, Both, Statement A and Statement B are False, Consider the following statements: Statement A: NTFS is a new feature of Windows Server 2003 that provides file and folder-level security and supports partitions up to 16 Exa bytes, which is equivalent to 1024 TB. Statement B: NTFS provides the flexibility to assign disk quotas, which are used to limit the amount of disk space that a user can use. Which of the following is correct about the above statements? Both, Statement A and Statement B are False. Statement A is False and Statement B is True. Both, Statement A and Statement B are True. Statement A is True and Statement B is False. Consider the following statements: Statement A: The root domain can be renamed. Statement B: The root domain controller can be changed without demoting the domain controller to a member server. Which of the following options is correct about the above statements? Statement A is False and Statement B is True Both, Statement A and Statement B are True. Both, Statement A and Statement B are False, Statement A is True and Statement B is FalseConsider the following statements: Statement A: A Group Policy is applied to a site, domain, and the forest. Statement B: The Default Domain Policy is a default CPO that is created when Active Directory is installed. Which of the following options is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are True. Both, Statement A and Statement B are False. Statement A is False and Statement B is True, Consider the following statements: Statement A: Local user accounts can be created on a domain controller. Statement B: Local user accounts are created using the Computer Management console. Which of the following options is correct about the above statements? Statement A is False and Statement B is True. Both, Statement A and Statement B are True.

Both, Statement A and Statement B are False. Statement A is True and Statement B is False It is developed to implement file transfer, printer sharing, and mail service among Apple systems. Macintosh machines have them installed by default. Identify the protoco SNA AppfeTalk DLC IPX/SPX Consider the following statements: Statement A: Minimum 133 MHz Pentium CPU is required for installing Windows Server 2003. Statement B: 733 MHz Pentium CPU or higher is recommended for installing Windows Server 2003, Which of the following is correct about the above statements? Both, Statement A and Statement B are True. Statement A is False and Statement B is True, Both, Statement A and Statement B are False. Statement A is True and Statement B is False Consider the following two statements: Statement A: DPS facilitates load balancing in a network by providing multiple servers to maintain files in an organization's network. Statement B: DFS enables you to replicate files across multiple servers. Which of the following is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are False, Both, Statement A and Statement B are True, Statement A is False and Statement B is True Consider the following two statements. Statement A: You can use the Device Manager window to update the device drivers and enhance their performance. Statement B: You can use the Hardware Update Wizard to update a device driver. Which of the following is correct about the above statements? Both, Statement A and Statement B are True. Statement A is True and Statement B is False. Both, Statement A and Statement B are False. Statement A is False and Statement B is True. Which of the following field in the ARP packet format helps to define the type of network on which ARP is running? HTYPE field PLEN field

PTYPE field HLEN field Which of the following layer requires the help of RARP and ARP protocol for transmission of data by determining the logical and physical address? Internet layer Physical layer Data link layer Network access layer Which of the following function is performed by the transaction ID field of the BOOTP packet? It defines the length of hardware address. It is a random no used to associate the message and response between the client and the server application, it is used to define the hardware address. It defines the maximum no of hops that the packet can travel Consider the following statements: Statement A: You can apply disk quotas on a FAT partition to track and limit the disk space used for a selected volume or disk. Statement B: You can use the shadow copies utility to store read-only copies of files stored in shared folders at specific time intervals. Which of the following is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are True. Both, Statement A and Statement B are False. Statement A is False and Statement B is True Consider the following statements: Statement A: The User Configuration node specifies Group Policies that can be applied to users, regardless of which computer they have logged on to. Statement B: CPOs can be applied to Windows 95, Windows 98, and Windows XP Professional computers. Which of the following options is correct about the above statements? Statement A is True and Statement B is False. Statement A is False and Statement B is True. Both, Statement A and Statement B are True, Both, Statement A and Statement B are False. Statement A: The SA field of Ethernet data frame Identifies the node or nodes, which receives the frame. Statement B: The PRE field of the Ethernet data frame indicates the start of the frame. Which of the following options is correct about the above statements? Both, Statement A and Statement B are true

Both, Statement A and Statement B are false. Statement A is true, and statement B is false Statement A is false, and statement B is true Consider the following statements: Statement A: By default, IIS is not installed with Windows Server 2003. Statement B: By default, support for Active Server Pages is enabled in US. Which of the following is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are False Both, Statement A and Statement B are True Statement A is False and Statement B is True. You are developing a Shockwave application. Which of the types of port Shockwave use? Private Ports Dynamic Ports Registered Ports Ephemeral ports Which component of Active Directory needs to be installed on an NTFS partition? SVSVOL folder Windows Server 2003 operating system Active Directory database Active Directory log files Consider the following statements: Statement A: Remote Desktop for Administration is installed by default during the installation of Windows Server 2003-Statement B: Remote Desktop for Administration is enabled by default. Which of the following is correct about the above statements? Both, Statement A and Statement B are True. Statement A is False and Statement B is True. Statement A Is True and Statement B Is False. Statement A Is True and Statement B Is False. Consider the following statements: Statement A: A basic disk can have a maximum of four primary partitions. Statement B: An extended partition can be subdivided into a maximum of 24 subsections. Which of the following is correct about the above statements? Statement A is False and Statement B is True. Both, Statement A and Statement B are False. Both, Statement A and Statement B are True. Statement A is True and Statement B is False.

Which group has the right to create computer accounts in an organizational unit? Server Operators on a server Account Operators on a domain controller Server Operators on a domain controller After the File Verification Signature utility is used, which of the following default files is created to show the logged results of file signature verification? \windir\sigverif.txt \windir\fllesigsJog \windir\sigverifJog \windir\filesigs.ncf Consider the following statements: Statement A: Security group is a group on which rights and permissions can be applied to access network resources. Statement E: Distribution group is a group created to define distribution lists for directory-enabled e-mail applications. Which of the following options is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are False. Statement A is False and Statement B is True Both, Statement A and Statement B are True. Which of the following options contains the Group Policy settings for configuring the user environment? Windows Settings Windows Templates Administrative Templates Administrative Settings Statement A: Windows NT 4.0 provides the necessary tools and features to centrally manage, administer and control a network. Statement B: Windows 2000 does not support advanced multitasking and multiprocessing. which of the following options is correct about the above statements? Statement A Is true, and statement B is false Both, Statement A and Statement B are false. Both, Statement A and Statement B are trueStatement A is false, and statement B is true Statement A: Internet protocol version 6 (IPv6) is the next generation protocol designed by the Internet Engineering Task Force (IETF) to replace the current version Internet Protocol, IPv4. Statement B: Internet protocol version 5 (IPv5) was a proposal based on OSI model but this version never went beyond the proposal stage due to the projected cost. Which of the following options is correct about the above statement?

Statement A is false and Statement B is true. Both, Statement A and Statement B are false. Both, Statement A and Statement B are true. Statement A is true and Statement B is false. You are the system administrator of CellCo. You want to hide one of the file server drives from the domain end users. How will you achieve it with minimum administrative cost? Open Active Directory and remove the Share from the snap-in. Share the drive with the name AdminS. Disable the view option from the registry of each machine. Share the drive with a name ending with S. Which of the following is the minimum NTFS permission required to open documents and run programs stored in a shared folder? Modify Write Read and Execute Full Control Consider the following statements: Statement A: In striped volumes, as the data is written consecutively in stripes, it gives the advantage of multiple I/O performance on different disks. Statement B: Striped volumes do not provide fault tolerance. Which of the following is correct about the above statements? Both, Statement A and Statement B are True* Statement A is False and Statement B is True. Both, Statement A and Statement B are False Statement A is True and Statement B is False Statement A: CSMA/CA is the access method used in Ethernet and wireless Ethernet networks* Statement B: CSMA/CD is a slower access method than CSMA/CA. Which of the following options is correct about the above statements? Statement A is true, and statement B is false Both, Statement A and Statement B are false. Both, Statement A and Statement B are true Statement A is false, and statement B is true Consider the following two statements: Statement A: In stand-alone DFS, a server stores and administers the DFS tree structure from a central location. Statement B: A domain-based DFS is hosted on several domain controllers or member servers. Which of the following is correct about the above statements? Both, Statement A and Statement B are False.

Statement A Is False and Statement B is True. Both, Statement A and Statement B are True. Statement A is True and Statement B is False. Consider the following two statements: Statement A: Publishing of shared folders enables the users to easily locate them through the Computer Management services. Statement 6: Users cannot access the published shared folders if the shared folders are moved from the original location. Which of the following is correct about the above statements? Statement A is False and Statement B is True, Statement A is True and Statement B is False, Both, Statement A and Statement B are True, Both, Statement A and Statement B are False Statement A: A domain is a logical group of computers over a large network. Statement 6: Resolver is a computer that maintains the database of host names and their corresponding IP addresses for name resolution. Which of the following options is correct about the above statements? Statement A is true, and statement B is false C Statement A is false, and statement B is true C Both, Statement A and Statement B are true. C Both, Statement A and Statement B are false Statement A: Internet Standard is achieved when a draft standard for which successful demonstration of its execution and significant operational and functional experience has been obtained. Statement B: A standard or specification is called an historic standard or specification when it has been outdated by a more recent specification. Which of the following options is correct about the above statement? Statement A is true and Statement B is false Statement A is false and Statement B is true. Both, Statement A and Statement B are false. Both, Statement A and Statement B are true Consider the following statements: Statement A: Croup Policy Management Console is an in-built feature of Windows Server 2003 operating system. Statement B: Croup Policy Object Editor can be downloaded from www.microsoft.com. Which of the following options is correct about the above statements? Statement A is False and Statement B is True. Statement A is True and Statement B is False. Both, Statement A and Statement B are False. Both, Statement A and Statement B are True. Consider the following two statements.

Statement A: When you select the Ignore option to set driver signing, it enables you to install device drivers that are not digitally signed. Statement B: When you select the Block option to set driver signing, it prevents the installation program of any unsigned file. Which of the following is correct about the above statements? Both, Statement A and Statement B are False. Both, Statement A and Statement B are True. Statement A is True and Statement B is False. Statement A is False and Statement B is True. Statement A: The Transport layer at source node establishes connection with the destination node so that their processes can communicate with each other. Statement B: The Transport layer can only deliver the data reliably. Which of the following options is correct about the above statements? Statement A is false, and statement B is true Both, Statement A and Statement B are false, Statement A is true, and statement B is false Both, Statement A and Statement B are true. What is the function of DNS Secondary server? It does not maintain any zone files. It neither creates nor updates the zone files. it is responsible for creating, maintaining, and updating the zone file. it advances the name resolution requests to the root servers that cannot be resolved locally. Which command-line tool enables you to create domain computer accounts in Active Directory? DSRM DSGET NETSH DSADD Consider the following statements: Statement A: Internet Information Services (IIS) 6.0 is a feature of Windows Server 2003 that enables you to develop and deploy Web applications. Statement B: Shadow copies of shared folders is a feature of Windows Server 2003 that enables you to restore files that have been accidentally deleted, modified, or corrupted. Which of the following is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are True. Both, Statement A and Statement B are False. Statement A is False and Statement B is True. Statement A: FCS contains an 8-byte CRC value used for error checking.

Statement B: The sending node creates the CRC value in Network Access layer. Which of the following options is correct about the above statements? Both, Statement A and Statement B are false, Both, Statement A and Statement B are true. Statement A is true, and statement B is false Statement A is false, and statement B is true Consider the following statements: Statement A; Integrated Windows Authentication method provides high-level security because the credentials of a user are confirmed through a cryptographic exchange between the Web server and the Web browser of the user-Statement B: Integrated Windows Authentication method is recommended on the intranet of an organization. Which of the following is correct about the above statements? Statement A is True and Statement B is False. Both, Statement A and Statement B are False. Statement A is False and Statement B is True Both, Statement A and Statement B are True. Statement A: IP generates control messages related to any error in connection or flow control over the network. Statement B: IP is responsible for addressing and forming the data packets to be transferred over the network. Which of the following options is correct about the above statement? Statement A is false and Statement B is true. Statement A is true and Statement B is false. Both, Statement A and Statement B are false. Both, Statement A and Statement B are true. Consider the following statements: Statement A: Active Directory installation requires the DNS server to be installed. Statement B: The server that is being promoted as a Domain Controller needs to have an NTFS partition. Which of the following options is correct about the above statements? Statement A is False and Statement B is True. Both, Statement A and Statement B are False. statement A is True and Statement B is False. Both, Statement A and Statement B are True. Consider the following two statements: Statement A: DFS is a service that centralizes the file system resources that are physically spread over the network. Statement B: DFS Microsoft Management Console enables configuration of replication services and topologies. Which of the following is correct about the above statements? Both, Statement A and Statement B are True.

Statement A is False and Statement B is True. Statement A is True and Statement B is False. Both, Statement A and Statement B are False. Which component is shared by all domains in a forest? 1 External trusts Parent domain Global Catalog server Active Directory objects Consider the following two statements: Statement A: DFS is a service that centralizes the file system resources that are physically spread over the network. Statement B: DFS Microsoft Management Console enables configuration of replication services and topologies. Which of the following is correct about the above statements? Statement A is False and Statement B is True Both, Statement A and Statement B are False. Both, Statement A and Statement B are True. Statement A is True and Statement B is False. The domain controller needs to have a(n)__________address. Route ip Dynamic ip Static ip ip Consider the following two statements. Statement A: The device driver error code 1 indicates that the device is not configured properly. Statement B: The device driver error code 3 indicates that the driver for the device may be corrupt. Which of the following is correct about the above statements? Both, Statement A and Statement B are False. Both, Statement A and Statement B are True, statement A is True and Statement B is False. Statement A is False and Statement B is True. You are analyzing ip data packets in a network analyzer. You found that in the protocol field it is specified as 7. For which of the higher-level protocol, data is encapsulated in the ip datagram? cmp tcp igmp udp Consider the following statements: Statement A: Croup Policy is a feature of the Computer Management utility.

Statement 6: Croup Policies can only be applied to multiple users. Which of the following options is correct about the above statements? Both, Statement A and Statement B are True. Statement A is False and Statement B is True. Statement A is True and Statement B is False. Both, Statement A and Statement B are False. You have created a corporate Web site that will be accessed by local and remote users. To ensure secure transactions over the Web site, you want that users should log on with a valid Windows 2000 or Windows Server 2003 user name and password. Which authentication method should you use for this purpose? HTTP Authentication Anonymous Authentication Digest Authentication SSL Authentication

Você também pode gostar