Internet Information Server1. What is the primary function of the MMC? A. It is the main administration tool for IIS. B. It provides the architectural structure for IIS. C. It holds the metabase. D. It provides a common environment
2. What is stored in the Metabase? (Choose all that apply) A. SSL key properties B. Logging properties C. Files properties D. User properties
3. As the head of an Informatics Unit, you wish to supply members of your first-level support team various components of the Internet Service Manager. Three members are responsible for the MTS, five are responsible for Index Server. How can you give each member access to the snap-ins they need to do their job, without giving them access to the entire ISM? A. Assign the appropriate permissions to the appropriate snap-in and allow access only to those team members that need them. B. Create a MTS group and an Index Server group. Create a MMC console for each and assign permissions to the group. C. Create customized MMC consoles, one including the Index Server snap-in, another with the MTS snap-in, and a third with the IIS snap-in only. Save the consoles to a file with the default extension of .msc. Share the appropriate consoles with the appropriate team members. D. There is no way to control access to MMC.
4. You want to create a proprietary authentication that meets the needs of your company. What technique should be used? A. Create a Win32 program that will interact with the NT user database. B. Create an ISAPI filter using the Win32 SDK. C. Create a CGI script that handles all user authentication. D. A proprietary authentication method cannot be created.
5. Which Internet Information Server service layer provides support for process isolation? A. Transport Services B. Internet Services C. Application Services D. Network Services
6. Which of the following are components of Application Services? (Choose all that apply) A. ISAPI B. Server Side Include C. HTMLA (HTML-based Administration) D. HTTP ODBC
7. How does a data request route through IIS 4.0? A. 1. The data request enters the IIS server via NT System Services 2. The data is forwarded to Web Services 3. The data is passed to Application Services 4. The response retraces the data request's route. B. 1. The data request enters the IIS server through Web Services. 2. The data is forwarded to Windows NT System Services 3. The data is passed to Application Services 4. The response retraces the data request's route. C. 1. The data request enters the IIS server via NT System Services 2. The data is forwarded to Application Services 3. The data is passed to Web Services 4. The response retraces the data request's route. D. 1. The data request enters the IIS Server via Application Services 2. The data is forwarded to Windows NT System Services 3. The data is passed to Web Services 4. The response retraces the data request's route.
8. IIS 4.0 supports which TCP/IP protocols? (Choose all that apply) A. File Transfer B. Hypertext Transfer C. Gopher D. Network News Transfer E. Simple Mail Transfer
9. Which of the following connectors are supported by IIS 4.0? (Choose all that apply) A. Microsoft Exchange Server/Web Connector B. ODBC Connector C. CGI D. ISAPI Filters E. Active Server Pages
10. In which layer of IIS architecture does data enter through TCP/IP and exit through WinSock A. System Services B. Internet Services C. Web Services D. Application Services E. Presentation Services
11. The system administrator has told you that you can edit the metabase using an ASDI provider. Upon returning to your desk, what do you do? A. Go to www.microsoft.com/downloads and download the latest ASDI provider. B. Load HTMLA C. Use the Resource Kit Utilities CD to load the appropriate tool. D. Use REGEDT32.EXE
12. John works on the second floor of Tower A and the locked server room is on the twenty-fourth of Tower B. It is inconvenient to have to go to the server room every time he has an administrative task to perform on the IIS server, so John as decided to remotely manage the server from his NT 4.0 Workstation. What steps must he take to set this up? A. He cannot remotely administer an IIS 4.0 Server from an NT 4.0 Workstation. B. Run NT Option Pack installation program. Select Next, then Accept. Select Custom. Uncheck all components except for MMC and Option Pack Common Files. Under Peer Web Services, select ISM. Ensure this is the only component selected. Click next and follow the remainder of the instructions. C. Run NT Option Pack installation program. Select Next, then Accept. Do a standard install. Under Peer Web Services, select ISM. Ensure this is the only component selected. Click next and follow the remainder of the instructions. D. Run NT Option Pack installation program. Select Next, then Accept. Do a standard install. Under Internet Information Server, select ISM. Ensure this is the only component selected. Click next and follow the remainder of the instructions.
13. In order to remotely administer an IIS server, you must connect to it. What steps do you take to do this? A. It is not possible to remotely administer an IIS Server. B. Open the ISM, right-click the IIS snap-in and select "Connect". Type in the domain name of the server you wish to manage and click OK. C. Open the ISM, right-click the IIS snap-in and select "Connect". Type in the NetBIOS name of the server you wish to manage and click OK. D. Open the ISM, right-click the domain name of the server, and select connect. Click OK.
14. Your visitor's browser is requesting an ISAPI server-side script but lacks the appropriate credentials. Which error will be given to the browser in response to this request? A. 403 B. 505 C. 911 D. 401
15. The domain name for a Web server is www.xyz.com. If the product directory from this domain contained an .html file called widgets, the URL for this file would be: A. http://www.xyz.com/Products/widgets.html B. file://www.xyz.com/Products/widgets.html C. http://widgets.html D. http://www.xyz.com/widgets.html
16. Jana wants to create remote virtual servers. In order for her to do this, which of the following conditions is required? A. Assign each site a unique host header name B. Separate domains for every virtual server C. Separate gateways for each virtual server D. Install Proxy on each virtual server
17. After installing IIS4, you want to make sure that the WWW service is running. What two things can you do to test your installation? A. Connect to the Internet using a client running IE 4.01, and specify the URL that points to the home directory of your Web server. B. Ping the Web server from a computer that is connected to the Internet and running IE 4.01. C. On the machine where IIS4 was just installed, use Internet Service Manager to confirm that the WWW service is running. D. Using IE 4.01 on the machine where IIS4 was just installed, specify the URL that points to the home directory of your Web server.
18. UDP is supported by: (Choose all that apply) A. WindowsSock Proxy B. Web Proxy C. Socks Proxy D. Proxy Server 2.0 (all services)
19. Which of the following tasks should be performed to configure IIS 4.0 to support the WWW service? (Choose all that apply) A. Set the bandwidth, user connections and default pages B. Set user logon and authentication requirements. C. Modify the port settings. D. Enable the HTTP Keep-Alives.
20. At the ABC company, administration has required internal users accessing the Web server to authenticate using a username and password with NT Challenge / Response authentication. External users are to authenticate using the anonymous account with BASIC (Clear Text) authentication. Where would you configure this? A. Administrative Tools, User Manager for Domains, Policies, User Rights B. Internet Service Manager, WWW Properties Sheet, Services Tab C. Internet Service Manager, Web Site Properties Sheet, Directory Security, Edit D. You cannot have more than one authentication method at the same time.
21. Your client advertises on the internet with a Banner and wants to measure the success of her business's marketing effort by performing a cost/benefit analysis at the end of each month. She knows how much she pays for the Banner advertising but wishes to track the effectiveness of viewers looking at the banner. She asks you for your assistance in tracking this information. Which of the following will achieve this goal? A. Enable logging on the Web Site property sheet. Use SSX to produce analysis reports. B. Enable Log Access on the Home Directory tab of the Web property sheet. C. Using Performance Monitor, monitor the SSLAccess Counter. D. There is no way to accurately monitor hits on a web page using IIS 4.0. Rather, use FrontPage 98 to create a hit counter for your client.
22. A user calls to complain that she cannot run an ISAPI application on the corporate intranet. She suspects her password, which she changed less than two minutes ago. The application runs on a virtual directory. What action would allow the user immediate access to the application? A. entering her new password on the application's Directory Properties tab B. giving her account Administrator rights C. having her select a new password D. stopping and restarting the WWW Service
23. When access a web site, which port is used by default? A. Port 21 B. Port 23 C. Port 70 D. Port 80
24. Which of the following log formats is a customizable ASCII format? A. MS IIS Log Format B. W3C Extended Log Format C. ODBC Logging D. NCSA Common Log File Format
25. Which of the following Log Formats are fixed (non-customizable)? (Choose all that apply) A. MS IIS Log Format B. W3C Extended Log Format C. ODBC Logging D. NCSA Common Log File Format
26. Microsoft IIS Log Format is: A. dynamic and configurable B. fixed (non-customizable) C. no longer available with IIS 4.0 D. not an ASCII format
27. What are three good reasons to re-direct a browser? A. Part of the Web site is under construction B. The home directory was moved to a new location. C. Performance tuning for the workstation D. Many older browsers do not support the use of host header names
28. If you were setting up both a Web site and an FTP site on the same computer what would be the default home directory for the WWW service and the FTP service? A. C:\Wwwroot and c:\Ftproot B. C::\InetPub\Wwwroot and C:\InetPub\Ftproot C. C:\InetPub\Wwwhome and C:\InetPub\Ftphome D. C:\Wwwhome and C:\Ftphome
29. To access files in your home directory on an intranet and your server name is MyServer, then browsers use the URL: A. http://myserver B. http://www.myserver.com C. http://www.myserver.com/home D. \\myserver
30. If your site's Internet domain name is www.mydomain.com and your home directory is C:\Website\Mydomain, then browsers accessing files in your home directory will use the URL: A. https://www.mydomain.com B. ftp://www.microsoft.com C. http://www.mydomain.com D. http://www.mydomain.com/website
31. How many home directories can each Web or FTP site have? A. One B. Two C. Three D. Four
32. What is Internet Information Server 4? Select the best answer. A. IIS 4 is a website manager for the NT Server 4.0 OS B. IIS 4 is an firewall server for the NT Server 4.0 OS C. IIS 4 is a network file server for the NT Server 4.0 OS D. IIS 4 is a network file and application server for the NT Server 4.0 OS
33. Which are true about Global Groups and Local Groups? (Choose all that apply) A. Global Groups cannot contain Local Groups B. Local Groups can contain Global Groups C. Global Groups can contain Local Groups or Users D. Local Groups can only contain Users
34. Who is the technical advisory group responsible for setting Internet standards? A. Internet Architectural Authorities (IAA) B. Internet Society (ISOC) C. Internet Engineering Task Force (IETF)) D. Internet Architecture Board (IAB)
35. Which of the following is the best definition for Microsoft IIS 4.0? A. Is a network file and application server for the NT server 4.0. It supports standard Information protocols and is highly extensive through the use of both ISAPI and CGI. B. Is a network file and application server for the NT server 4.0 operating system. It supports customized protocols and is limited in its use of both ISAPI and CGI. C. Is a network file and application server for the NT server 4.0 operating system. It supports standard Information protocols but is not compatible with ISAPI and CGI. D. None of the above
36. Microsoft Internet Information Server 4.0 is the base component for implementing an Internet or intranet on the following operating systems: (Choose all that apply) A. Windows NT Server 4.0 B. Windows NT Server 3.51 C. Windows NT Workstation 4.0 D. Windows NT Workstation 3.51 E. Windows 95
37. Listed below are some of the components of the NT 4.0 Option Pack. Which are considered core components of the IIS Platform? (Choose all that apply) A. Microsoft Certificate Server 1.0 B. Microsoft Data Access Components 1.5 C. Microsoft Management Console 1.0 D. Microsoft Site Server Express 2.0 E. Microsoft Transaction Server 2.0
38. Which of the following is contained in the metabase? (Choose all that apply) A. IIS help file location B. Virtual directory security C. Website home directory D. MMC snap-in information E. MIME mapping
39. You are installing IIS on a Windows 95 machine and want to use Index server. What do you need to do? A. Choose Custom Install B. Choose Minimum Install C. Choose Typical Install D. Install NT Server 4.0
40. Rhianna, the Director of R-U-Able Nursing Home, has requested that you install IIS 4.0 on her computer. Which of the following tasks are required before you perform the installation? A. Configure a Microsoft Windows NT Server 4.0 computer. B. Download the IIS 4.0 software from the Microsoft Web site. C. Install Service Pack 3. D. Configure the existing operating system software on Rhianna's computer to recognize IIS 4.0 when installed. E. Verify that the TCP/IP protocol is being used.
41. You have just completed setting up IIS on your machine to manage the company intranet. Hours are from 6am to 6pm. You do not want logons or access to your server, or the network, after 6pm. How can you accomplish this? (Choose all that apply) A. In User Manager for Domains, select all user accounts. Under the User menu, Properties Item, Hours button, deselect 6pm to 6am B. In System Policy Editor, Default User, Properties, System, Restrictions, set logon hours. Add the Everyone group. C. In User Manager for Domains, Policy Menu, Account Item, select "Forcibly Disconnect Remote Users from Server when Logon Hours Expire". D. In System Policy Editor, create a new default group policy. In Properties, System, Restrictions, set logon hours. Add the Everyone group. E. In System Policy Editor, Default Computer, Properties, NT System, Logon, set logon hours for the computer.
42. When implementing an Internet site for a single-domain environment, you can resolve the host header name by: (Choose all that apply) A. using a HOSTS file on the client computer B. using DNS C. using a LMHOSTS file on the client computer. D. none of the above.
43. Internet Information Server 4.0 will run on which three operating systems? (Choose all that apply) A. Windows NT Server 3.51 B. Windows 95 OSR2 C. Windows NT Server 4.0 SP3 D. Windows NT Workstation 4.0 E. Windows for Workgroups 3.11
44. Which of the following are components of IIS 4.0? (Choose all that apply) A. File Transfer Protocol Service B. Gopher Service C. Simple Mail Transfer Protocol Service D. Microsoft Transaction Server E. Certificate Server
45. Lauren, the system administrator, is installing IIS 4.0 on two computers: one is a Pentium and the other, an Alpha. After installation, she notices some differences between the two installs. What are they? A. The Intel lacks Visual Basic and Visual J++ components and samples, as well as the Server-Side Java Virtual Machine. B. The Alpha lacks Visual Basic and Visual J++ components and samples, as well as the Server-Side Java Virtual Machine. C. The Intel lacks Visual InterDev and Visual C++ components, as well as the Server-Side Java Virtual Machine. D. The Alpha lacks Visual InterDev and Visual C++ components, as well as the Server-Side Java Virtual Machine.
46. Judy wants to set up Internet Information Server to run Microsoft Transaction Server, but also wants to take advantage of the remote administration features of Internet Service Manager (HTML). Which installation options should Judy choose? (Choose all that apply) A. Minimum B. Maximum C. Typical D. Custom
47. Which of the following is the recommended hardware requirement to implement IIS 4.0 on an Intel x86 platform? A. Processor: 486/50 MHz RAM: 16 MB Disk Space: 50 MB Monitor: VGA B. Processor: 486/66 MHz RAM: 16 MB Disk Space: 50 MB Monitor: VGA C. Processor: P90 MHz RAM: 32 MB Disk Space: 200 MB Monitor: Super VGA D. Processor: 150 MHz RAM: 48 MB Disk Space: 50 MB Monitor: VGA E. Processor: 200 MHz RAM: 64 MB Disk Space: 200 MB Monitor: Super VGA
48. Which of the following is the minimum hardware requirement to implement IIS 4.0 on an Intel x86 platform? A. Processor: 486/50 MHz RAM: 16 MB Disk Space: 50 MB Monitor: VGA B. Processor: 486/66 MHz RAM: 16 MB Disk Space: 50 MB Monitor: VGA C. Processor: P90 MHz RAM: 32 MB Disk Space: 200 MB Monitor: Super VGA D. Processor: 150 MHz RAM: 48 MB Disk Space: 50 MB Monitor: VGA E. Processor: 200 MHz RAM: 64 MB Disk Space: 200 MB Monitor: Super VGA
49. Patrick is a Network Administrator who is responsible for maintaining a small network consisting of 2 NT Workstation:s and an NT server attached to a high-speed cable modem. Both clients access the Internet via the LAN through the Proxy Server. Currently, Proxy 1.0 is installed. When Patrick tries to install IIS4, he is told he must upgrade to Proxy 2.0 and he does so. After successfully upgrading from IIS3 to IIS4, none of the clients can see the Internet. Why? A. IIS version 4.0 is not compatible with Microsoft Proxy Server 1.0. B. Patrick used ISM for IIS 3.0 to configure administrative properties for IIS 4.0. C. In order to install the newer IIS 4.0 version of this file, you must manually remove the older version of Default.ost D. Present installations of Proxy Server 2.0 will not function properly after IIS 4.0 has been installed. You should rerun Proxy Server 2.0 Setup after installing IIS 4.0.
50. Using HTMLA, one can manage the server remotely from anywhere on the Internet. Which tasks cannot be managed remotely? A. Certificate mapping B. Managing user accounts C. Adjusting server properties D. Administering authentication keys E. Tracking event logs
51. If you are using NTFS access permissions and users need to run CGI applications, what directory permissions will they need for the directory the application resides? A. Create B. Read C. Special Access D. Full Control
52. John, the system administrator for Widgets Technology, has been directed to implement an IIS 4.0 server. He is presently running NT 4.0 with SP 3 installed, on a PII/400, with 128 MB RAM and 500 MB of free hard disk space. The server is currently being used to run Exchange 5.0, which is running NetBEUI. There is no money in the budget to purchase or upgrade systems. Required result: Implement IIS 4.0 to provide the company's Internet presence as well as provide the employees with Internet mail access. Optional Result 1: Provide employees with secure access through a Web page to confidential information. Optional Result 2: Allow the webmaster to publish content to the Internet. Proposed Solution: Install IIS 4.0, and convert the partition to NTFS. Provide the company's Internet presence as well as provide the employees with Internet mail access. A. The solution meets the required result and both optional res B. The solution meets the required result and one optional resu C. The solution meets the required result only. D. The solution does not meet the required result.
53. John, the system administrator for Widgets Technology, has been directed to implement an IIS 4.0 serev. He is presently running NT 4.0 with SP 3 installed, on a PII/400, with 128 MB RAM and 500 MB of free hard disk space. The server is currently being used to run Exchange 5.0, which is running NetBEUI. There is no money in the budget to purchase or upgrade systems. Required result: Implement IIS 4.0 to provide the company's Internet presence as well as provide the employees with Internet mail access. Optional Result 1: Provide employees with secure access through a Web page to confidential information. Optional Result 2: Allow the webmaster to publish content to the Internet. Proposed Solution: Install TCP/IP protocol through the Network icon in Control Panel, and have the DHCP Server automatically assign the IP address. Install IIS 4.0 and verify that SMTP service is selected. Convert the partition to NTFS. A. The solution meets the required result and both optional res B. The solution meets the required result and one optional resu C. The solution meets the required result only. D. The solution does not meet the required result.
54. What administrative tools are provided with Internet Service Manager? (Choose all that apply) A. Network Monitor B. Performance Monitor C. System Policy Editor D. User Manager E. Disk Administrator
55. What is a metabase? A. A registry hive that controls the IIS 4.0 configuration deta B. A memory resident data store that contains configuration par C. IIS 4.0's replacement for the registry D. A large SQL database that uses ODBC connectivity
56. You want to create a proprietary authentication that meets the needs of your company. What technique should be used? A. Create a Win32 program that will interact with the Windows NT user database. B. Create an ISAPI filter using the Win32 SDK. C. Create a CGI script that handles all user authentication. D. A proprietary authentication method cannot be created.
57. Which Internet Information Server service layer provides support for process isolation? A. Transport Services B. Internet Services C. Application Services D. Network Services
58. Which of the following are components of Application Services? A. ISAPI B. Server Side Include C. HTMLA (HTML-based Administration) D. HTTP ODBC
59. You are having trouble preventing an anonymous user from accessing your site. What measures should be taken to prevent this occurrence? A. Disable the anonymous user account in Server Manager for Domains B. Delete the anonymous user account in Server Manager for Domains. C. Convert the current partition to NTFS. D. In the Authentication Methods dialog box, make sure that the Allow Anonymous Access check box is not selected.
60. An anonymous user cannot access your site. What could be the cause? (Choose all that apply) A. The anonymous user's password is the same in both Internet Service Mgr and User Mgr B. The anonymous user's password is the different in Internet Service Mgr from User Mgr C. Allow Anonymous Access is selected, but Allow Only Anonymous Access is not D. The account IUSR_computername is disabled in User Manager
61. You need to be able to configure the extended logging features of the WWW service to display the resource accessed; for example, an HTML page, a CGI program, or a script. What field would you choose on the Extended Properties property sheet? A. URI Query B. Cookie C. Http Status D. URI Stem
62. Where would you start to change configuration properties pertaining to connections on the WWW Service: how many users can connect, and how long you tolerate an idle connection before dropping it? A. Web Site property sheet B. Directory property sheet C. Optimization property sheet D. Connections property sheet and the Idle time property sheet
63. You wish to maximize the security on your FTP server, while allowing the greatest number of users to download data. You have set the security for the FTP home directory to Read and Log Access. You have created virtual directories What else should you do? A. Under the Security Accounts tab of the FTP Properties sheet, deselect Allow Anonymous Connections. Assign share and NTFS security permissions to NT users and groups. Access will be given only to valid NT user accounts. B. In User Manager for Domains, create a Global Group, Anonymous. Create a specific account for anonymous access, and make it a member of the Anonymous Group. Under the Security Accounts tab of the FTP Properties sheet, select Allow Anonymous Connections. Assign share and NTFS security permissions to NT users and groups. Access will be given only to those using the correct anonymous username and password, or those with valid NT user accounts. Access level will depend on NT security. C. Under the Security Accounts tab of the FTP Properties sheet, select Allow Anonymous Connections. Assign share and NTFS security permissions to the IUSR_COMPUTERNAME account and to valid NT users and groups. Access level will depend on NT security. D. Under the Security Accounts tab of the FTP Properties sheet, select Allow Anonymous Connections and Allow only anonymous connections. Assign share and NTFS permissions to the default account created by NT. Access level will depend on NT security.
64. Patrick, a member of the Systems and Informatics Directorate of a Government department, has recently set up the subnetting scheme so that all Directorates are on their own subnet, using static IP addresses. The IP address is Class C, 192.1.1.x, with a subnet mask of 255.255.255.240. Systems and Informatics Directorate is using 192.1.1.16-31. Finance and Planning is using 192.1.1.32-47. Corporate is using 192.1.1.48-63. Human Resources are using 192.1.1.64-79. Publications are using 192.1.1.80-95. Shipping and Receiving is using 192.1.1.96-111. The remainder of the subnets are being held for future growth. Patrick has also recently set up a private intranet site for the Human Resources Directorate. There will be sensitive information available on this site, and only senior members of this directorate should be able to access it. Which two steps should Patrick take to accomplish this? A. Under the WWW Service Properties, Directory Security Tab, IP Address and Domain Name Restrictions, select Deny Access. B. Under the WWW Service Properties, Directory Security Tab, IP Address and Domain Name Restrictions, select Grant Access. C. Click the Add button. Select Single Computer and add the first allowed IP Address. Click OK. Repeat this procedure until all allowed IP addresses have been added. D. Click the Add button. Select Group of Computers. In the Network ID, type 192.1.1.64 (the first number belonging to the Human Resources subnet), and in the subnet mask box, enter 255.255.255.240. E. Click the Add button. Select Domain Name. Type in Human Resources.
65. Chris administers a WWW Site that allows both anonymous access for the public and NT User Account access for corporate employees. The general public is to have access to the public page only, while the corporate employees need to be able to access the private intranet. Permissions have been set through NTFS security. Recently, he has discovered that a hacker has gotten hold of a number of NT Usernames and passwords, because the information has been transmitted in clear text format. How should Chris resolve this problem? A. Under WWW Site Properties, Security Accounts Tab, Password Authentication Method, Edit Button, he should select Windows NT Challenge/Response Authentication so that the passwords are encrypted. Allow Anonymous Access should already be selected. B. Under WWW Site Properties, Directory Security Tab, Password Authentication Method, Edit Button, he should deselect Allow Clear Text and select Basic Authentication, so that the passwords are encrypted. C. Under WWW Site Properties, Directory Security Tab, Password Authentication Method, Edit Button, he should select Windows NT Challenge/Response Authentication, so that the passwords are encrypted. Allow Anonymous Access should already be selected. D. Under WWW Site Properties, Security Accounts Tab, he should selection Allow only anonymous connections, so that no NT usernames or passwords are sent.
66. As the administrator of a Web Server, you wish to block access to one group of clients, whose IP addresses range from 152.1.32.1 to 152.1.63.254. What network ID and subnet mask would you use to accomplish this? A. Under Network ID, enter 152.1.0.0. Under Subnet Mask, enter 255.255.192.0. B. Under Network ID, enter 152.1.32.0. Under Subnet Mask, enter 255.255.224.0. C. Under Network ID, enter 152.1.32.0. Under Subnet Mask, enter 255.255.192.0. D. Under Network ID, enter 152.1.0.0. Under Subnet Mask, enter 255.255.224.0.
67. Ricki wants to use Host Headers to assign one IP address to multiple FTP sites. How does she do this? A. Through the Host headers tab in the properties sheet. B. Through the Host headers icon in Control Panel. C. Through the Network Icon, Protocol tab, TCP/IP Properties. D. She cannot do this.
68. While in the process of setting up virtual servers, Joseph decides to enable logging. He right clicks on the computer icon and brings up the master properties sheet. He then selects Logging. After completing the setup of virtual server:s, he begins the testing stage. He notices that some servers are logging the information requested, while others are not. What is the problem? A. There is no Master property sheet for the WWW Service. B. Changing the settings on Master Property sheets will only change settings for actual servers, not virtual ones. C. Changing the settings on Master Property sheets will only change settings for virtual servers, but not actual servers. D. Changing the settings on Master Property sheets will only change settings for subsequent sites, not the ones previously created.
69. How do you adjust Performance Tuning for a WWW Site? A. Through Control Panel, Services Icon, select WWW Services, Click Edit B. Through MMC, Right Click WWW Service, Properties, Performance Tab C. Through System Administrator, Click WWW Service, Properties, Configuration Tab D. Through ISM, Right Click WWW Service, Performance Monitoring, Edit
70. Which of the following can be the Home Directory for a web site? (Choose all that apply) A. \Wwwroot B. Any directory on the local computer C. A share located on another computer D. A redirection to an URL E. Only the default home directory configured for IIS at installation
71. Jack has been hired by a major movie studio to create web pages for upcoming releases. Always conscious of his customer base, Jack wants to ensure that the web pages for the more violent movies cannot be accessed by younger children whose parents are monitoring their Internet use. What should Jack do? A. Jack should develop a Welcome page that lists the new releases and their theatre ratings. Parents will then be warned if the content is inappropriate for their children. B. Under Web Site Properties, Directory Security, Jack should select Content Ratings, so that each page is automatically rated. If their browser supports this, parents will then be warned if the content is inappropriate for their children. C. On the Web Server browser, View, Internet Options, Content Tab, Jack should enable Content Advisor. If their browser supports this, parents will then be warned if the content is inappropriate for their children. D. Under Web Site Properties, HTTP Header, Jack should edit Content Ratings to set ratings on each site, so that each page is automatically rated. If their browser supports this, parents will then be warned if the content is inappropriate for their children.
72. Rather than have her users receive a 403 - Access Forbidden code when they go to a page on their Intranet for which they do not have permission, Nicole would like a more user-friendly message to appear "You do not have access rights to this page. Please use the 'back' button to return to your previous location.". How can she do this? A. Using a redirector, Nicole can route those users to an URL which displays the message. B. Nicole can configure the message using NT. NT's messenger service will notify users with the personal message when they do not have access to the site. C. Using Custom Errors, Nicole can configure the message to appear after the 403 - Access Forbidden code. D. This is not configurable, as the messages occur on the Internet and are out of Nicole's control.
73. What are the steps involved in creating a virtual directory? A. Right click Web Site, click New, click Virtual Directory. Type the path (e.g.: :\inetpub\vdir).Click next. Create an alias. Click Finish B. Right click Web Site, click New, click Virtual Directory. Create an alias. Click next. Type the path (e.g.: http://computername /inetpub/vdir). Click Next. Click Finish C. Right click Web Site, click New, click Virtual Directory. Create an alias. Click next. Type the path (e.g.: c:\inetpub\vdir). Click Next. Click Finish D. Right click Web Site, click New, click Virtual Directory. Click next. Type the path (e.g.: http://computername /inetpub/vdir). Click Next. Create an alias. Click Finish
74. What steps are involved to create a virtual server using Host Headers? A. In ISM, right-click the computer icon. Click "New" and then "Web Site". Enter a description, click next, enter the loopback address, click next, enter the path (e.g.: c:\Inetpub\Vir), click next, choose the permissions, etc., click finish. Right click the new Web Site and access the properties dialog box. Click advanced. Select the IP address, and in the Host Header box enter the alias. Click OK. Click OK in the Advanced Multiple Web Site Configuration box. B. In ISM, right-click the computer icon. Click "New" and then "Web Site". Enter a description, click next, enter the IP address of the computer running IIS, click next, enter the path (e.g.: c:\Inetpub\Vir), click next, choose the permissions, etc., click finish. Right click the new Web Site and access the properties dialog box. Click advanced. Select the IP address, and in the Host Header box enter the alias. Click OK. Click OK in the Advanced Multiple Web Site Configuration box. C. In ISM, right-click the computer icon. Click "New" and then "Web Site". Enter a description, click next, enter the loopback address, click next, enter the path (e.g.: http://Inetpub/Vir), click next, choose the permissions, etc., click finish. Right click the new Web Site and access the properties dialog box. Click advanced. Select the IP address, and in the Host Header box enter the alias. Click OK. Click OK in the Advanced Multiple Web Site Configuration box. D. In ISM, right-click the computer icon. Click "New" and then "Web Site". Enter a description, click next, enter the IP address of the computer running IIS, click next, enter the path (e.g.: (e.g.: http://Inetpub/Vir)), click next, choose the permissions, etc., click finish. Right click the new Web Site and access the properties dialog box. Click advanced. Select the IP address, and in the Host Header box enter the alias. Click OK. Click OK in the Advanced Multiple Web Site Configuration box.
75. When Host Headers have been enabled, what else must be done to allow users to view virtual servers? (Choose all that apply) A. Install and configure DNS B. Place a LMHOSTS file on each client's computer C. Install WINS D. Place a HOSTS file on each client's computer
76. Users have been complaining that they cannot access the new web sites that Sean has recently set up. He used host header names to operate multiple domain names under the same IP address. All users are using IE 4.0. Sean has doubled checked the set up and found the following information: All ports have been set to 80 All sites have been assigned the same IP address Each site has a unique host header name All names have been registered with the DNS Server. Everything looks fine, but no one can reach the sites. What is wrong? A. Each web site must be on a separate port B. The users' browsers are not compatible with host headers C. Sean has forgotten to start the web sites D. The names must be registered with a WINS Server also
77. What two ways can you access the Properties menu for an item in the MMC? A. Right-click the object, select Properties B. Under File, select Properties C. Under Action, select Properties D. Under Edit, select Properties
78. You wish to configure a server to run SQL, host an FTP Site and multiple web sites. You only have one IP Address. You are using Host Headers. How are you going to configure this? A. You cannot host an FTP site and multiple web sites under one IP address. Host Headers can only be used for the WWW Service, and not for FTP. B. Install SQL Server on a separate NTFS partition. Create one FTP Site, configure it appropriately. Create multiple web sites, use host headers to assign one IP address to the multiple sites. C. You cannot install SQL Server on the same machine as your FTP and Web Sites. D. Put SQL Server on a FAT partition. Assign it SSL security. Create one FTP Site, configure it appropriately. Create multiple web sites, use host headers to assign one IP address to the multiple sites.
79. Sharon calls you to inform you that she has recently been promoted to Manager and needs access to Reporter, a custom ISAPI application on the corporate intranet. You add her to the Managers group, who has NTFS Execute permission. Five minutes later, Sharon calls back. She is still unable to run the application, even though Mark, another member of the group, is having no problem. What can you do to allow Sharon immediate access to the application? A. Assign Sharon's user account Execute permission. B. Assign the Manager's group Read permission. C. Stop and restart the WWW Service. D. Assign Sharon's user account Read permission.
80. You are running an ISAPI application that is slowly utilizing more and more resources. How do you resolve this problem? A. Implement Microsoft Transaction Server B. Run the application in its own memory space C. Covert it to a CGI script D. Add RAM E. Open the application in Word 97 and enter the following line: unable to follow directions Save the file.Before closing, highlight the new line of code and press SHIFT-F7 Verify the information contained in the right hand dialog box.
81. You want all your web pages to have the extension .HTMH. How do you add this so that users can access your pages? A. Custom HTTP Headers B. MIME Map C. Default Directory D. This cannot be done
82. For IDC, the ODBC Data Source Name must be a: A. File DSN B. System DSN C. Global DSN D. Public DSN
83. Which ODBC drivers can be used with the IDC? (Choose all that apply) A. 32-bit SQL server B. Access 2.0 C. Access 95 D. 32-bit FoxPro
84. The IDC DLL is built using: A. CGI B. VB C. HTTP D. ISAPI
85. Words ignored during a search are called: A. Ignore words B. Noise words C. Common words D. Non-indexed words
86. Free text queries begin with what prefix? A. $Contents B. $Free C. $Query D. $Index
87. A query of the form "setup program"[400] is called a/an: A. Array query B. Weighted query C. Vector space query D. Free text query
88. From the following list, identify the three main ADO objects: A. Connection B. Input C. Command D. Research E. Recordset
89. ADO is designed to work with which of the following programming languages: (Choose all that apply) A. Fortran B. Visual Basic C. C++ D. Java
90. A search condition consists of: A. One or more predicates combined with AND, OR, and NOT. B. A syntax statement. C. The identity of the search source. D. The FreeText Predicate only.
91. The child process that is responsible for filtering documents by identifying the correct filter DLL and word-breaker DLL associated with a specific document is: A. Index B. CiDaemon C. CiCatalog D. CiChild
92. What information is contained in the metabase. A. IIS Help file location B. Web site home directory location C. MMC snap-in information D. Site Server toolbar settings
93. John is accessing the Web site of his company from home. While browsing the site, he receives the following error message: HTTP/1.1 403 Access Forbidden Which of the following problems could be causing the above error. A. The system administrator of the Web site changed John´s access to the Web site yesterday. B. The default document has not been specified in the Web site, Properties, Documents tab. C. The hypertext link John is trying to access is broken. D. Windows Challenge/Response is being used.
94. As a security measure, you change the TCP port in the FTP Site Properties to 19,860. Some users complain that they are unable to access the FTP site. What might be the cause of the problem. A. You cannot set the TCP port to a number above1023. B. The users having problems are still accessing port number 21. C. The users must access port number 80. D. You cannot set the TCP port to an even number.
95. Which of the following is the default TCP port number for the WWW service. A. 20 B. 21 C. 25 D. 80
96. You want to monitor FTP service sessions in real time. What is the best utility to use. A. netstat B. Performance Monitor C. Windows NT Application Event Monitor D. FTP Logging
97. What are the requirements for the installation of the SMTP service. (Choose all that apply) A. DHCP B. NTFS C. TCP/IP on the clients D. Server NetBIOS name resolution E. Server host name resolution
98. During the installation of IIS on the Windows NT server named PCAGE, an account named IUSR_PCAGE is created. After one week Mike, the system administrator, changes that account´s default password in the Web Site Properties, Directory Security, Anonymous user account. The users start complaining that they cannot log on as anonymous users. What should Mike do to fix this problem. A. Re-install IIS B. Re-generate the randomly generated password C. Change the IUSR_PCAGE account password in the User Manager to the same password assigned in IIS D. Change the Guest account password in the User Manager to the same password assigned in IIS
99. Mike was a member of the Sales group. In the restructuring of the company, he is promoted to the Finance department of the company. The Finance department people access an ISAPI application, Books.dll, over the intranet. Mike tries to use this application, but he receives an error message. Tom, another employee of the Finance department, is able to run the application without any problems. What is the best way to allow Mike to run the finance application. A. Give Mike the appropriate NTFS file permissions on the finance application. B. Add Mike to the Finance group using User Manager for Domains. C. Configure Mike's account to give him access to all the files being accessed by the Finance department. D. Mike has to use an SSL-enabled browser to use the finance application on the intranet.
100. What can be saved in the MMC file which has the extension .msc. (Choose all that apply) A. Loaded snap-ins B. Web site security settings C. Window configuration D. Virtual directory location E. TCP port numbers for Web sites
101. John's friend gives him the URL of a new Web site he designed himself. John goes home and tries to access the new site, but he gets the following message: Error 403.2 Access Forbidden Why did John get this error message. A. SSL is not being used on the browser. B. SSL is being used on the browser. C. Windows NT Challenge/Response is being used. D. The NTFS file permissions are not correct.
102. Your company has been assigned one IP address from InterNic. You want to configure two virtual servers on IIS 4.0. What is the best way you can configure two virtual servers using just one IP address. A. Assign the same IP address to each server. B. You cannot configure two virtual servers using just one IP address. You must obtain another IP address. C. Use custom HTTP headers on IIS 4.0. D. Add host headers on IIS 4.0.
103. You are away from your office for a meeting with representatives of a prospective client. Your company creates Web sites for its customers. You want to show the representatives a sample of a site you developed, but they do not have an Internet connection. You have access to the Internet in your hotel room, and you have a laptop computer running Windows NT Server 4.0. You decide to download a Web site, along with all of its links and linked pages, onto your laptop to show the representatives. What can you use to do this. A. Microsoft Certificate Server B. Microsoft Transaction Server C. Microsoft Index Server D. Microsoft Site Server Express
104. You have a Web site which contains a lot of image and audio files. You want to find out how may HTML pages have images which are larger than 32K. What is the easiest way to find this out? A. Perform a Windows NT Explorer search for files larger than 32K. B. Perform an Index Server search for files larger than 32K. C. Use a Webmap in Site Server Express and search Load Size over 32K. D. Set the Performance Monitor counter for Files over 32K.
105. You are the IIS administrator of your Web site, and you want to make your Web site secure. You want a certain range of computers to be unable to access the Web site. In the Directory Security tab and in the IP Address and Domain Name Restrictions in the Web Site properties, you check the Granted Access option and type the following in the exception list: IP address 125.45.65.32 and subnet mask 255.255.255.248. Which range of computers will be denied access to your Web site. A. IP addresses 125.45.65.32 to 125.45.65.39 B. IP addresses 125.45.65.32 to 125.45.65.57 C. IP addresses 125.45.65.64 to 125.45.65.71 D. IP addresses 125.45.65.64 to 125.45.65.79
106. You have 2 IIS servers: one in Los Angeles and one in Seattle. Each location has 100 Web sites on its IIS server. To limit bandwidth usage, you want to change the maximum number of connections for each Web site to 1000. What is the easiest way to change the maximum connections parameter in Web Site Properties for each of the 200 Web sites. A. Use Internet Service Manager to change ports on individual sites. B. Use Internet Service Manager (HTML) to change ports on individual sites. C. Write a VB script and run it at both IIS servers. D. Write a VB script and run it at one IIS server. E. Write a VB script and run it at all 200 virtual Web sites.
107. You have installed a new content filter on the Index Server. You issue a query for documents that you know are in the directory in which the content filter is installed, but you get no response. What is the best way to fix this problem. A. Force a full scan. B. Force an incremental scan. C. Force a master merge. D. Force a shadow merge.
108. In IIS 4.0, where are the MIME settings stored. A. Registry B. Metabase C. Windows Explorer, File, Options D. Internet Service Manager
109. On your IIS server, you have defined a virtual directory on a server running NetWare Server 4.11. During virtual directory configuration, you enter the UNC path for the virtual directory. You have also configured the IUSR_<computername> account with the necessary Read permission using Windows NT User Manager for Domains. Anonymous users still cannot connect to the Web site on the virtual directory. What is the most likely reason that these users cannot connect to the site. A. You cannot enter an UNC name for a NetWare-based virtual directory. B. You have to give Execute permission on the resources to the IUSR_<computername> account. C. You have to create a similar IUSR_<computername> account on the NetWare server which has access to the resources in the NetWare server. D. You cannot have a virtual directory on a NetWare server. Copy the files from the NetWare server to the Windows NT server and make that the path to the virtual directory.
110. On your Microsoft Index Server, the word lists are taking up too much memory. What can you do to decrease the amount of memory used by the word lists. (Choose all that apply) A. Decrease the number of word lists. B. Increase the number of word lists. C. Decrease the size of word lists. D. Increase the size of word lists. E. You cannot adjust the size of word lists. F. You cannot adjust the number of word lists.
111. Carol is interested in setting up a private Web site that would be accessed on the intranet. What can you use to authenticate users to this intranet Web site. A. Microsoft Certificate Server B. Microsoft Transaction Server C. Microsoft Site Server D. Microsoft Internet Information Server
112. You are the IIS administrator of your Web site. In the IP Address and Domain Name Restrictions dialog box, you check the Denied Access option and type the following in the exception list: IP address 192.80.245.96 and subnet mask 255.255.255.224. Which range of computers will be granted access to your Web site. A. IP addresses 192.80.245.48 to 192.80.245.63 B. IP addresses 192.80.245.48 to 192.80.245.79 C. IP addresses 192.80.245.96 to 192.80.245.111 D. IP addresses 192.80.245.96 to 192.80.245.127
113. In Windows NT, which group should a user belong to if he has to manage IIS using the Internet Service Manager (HTML). A. Everyone B. Domain Users C. Administrators D. Internet Users
114. What would you use to add your company logo to the bottom of every page on your company's Web site. A. .htx template B. .htm template C. server-side include D. You cannot automatically add the logo. You must cut and paste it into each Web page
115. Which of the following can you do from the Internet Service Manager (HTML). (Choose all that apply) A. Start and stop the Web site. B. Change the anonymous logon account for the Web site. C. Change the type of password authentication. D. Change the TCP port number.
116. You create a remote virtual directory called PCAGE on the IIS server PCAGE1. The physical directory is located on a server called PCAGE2. Anonymous users cannot access the virtual directory from your Web site. Which of the following is causing the problem. A. The account name and password which IIS will use to access the virtual directory have not been assigned in Web Site Properties. B. Users have not been assigned the necessary share permissions to access the directory. C. IIS is configured for Basic authentication. D. IIS is configured for Windows NT Challenge/Response authentication.
117. You are in an organization which has 200 Windows NT users. These users have to access three intranet Web sites which have been set up to use host headers. You do not have DNS enabled on the intranet. How can you let the users resolve the names of these intranet sites. A. Add a HOSTS file on the Internet Information Server. B. Add a HOSTS file on each client. C. Add a LMHOSTS file on each client. D. Add static IP addresses in the WINS server and enable WINS server resolution.
118. You have an IIS 4.0 installation which has 32 MB of RAM and 44 MB of virtual memory. You get calls that the Index Server is slow, so you increase the property cache value. But the Index Server is still slow. Why. A. The property cache is now using the RAM. B. The property cache is now using the virtual memory. C. The RAM is now using the virtual memory. D. You cannot change the property cache value.
119. As a user, you have to download sensitive information from the Web server to your client. Which of the following would you use to access this information over the Internet. A. SSL (Secure Sockets Layer) B. Windows NT Challenge/Response Authentication C. Microsoft Site Server D. NTFS file system
120. You do not want users to be able to search for certain high-security documents in your company which have the word "CONFIDENTIAL" in the heading. How can you prevent them from doing this. A. Use restrictive NTFS file permissions on the directory where documents are stored. B. Use the word "CONFIDENTIAL" in the noise word file. C. Use the word "CONFIDENTIAL" in the loud word file. D. Use the word "CONFIDENTIAL" in the restricted word file.
121. You have configured a Web site to log usage in an ASCII text file. Where can you get information on the user names and number of hits for the Web site. A. Web Application log in Event Viewer B. Web Site Properties, Number of hits field C. Web log file in %systemroot%\system32\LogFiles D. Performance Monitor
122. In an organization, there are two domains: Finance and Technology. There is no trust relationship between the two domains. IIS 4.0 and Index Server 2.0 are running on the server Finance1 in the Finance domain. The server Technology1 is located in the Technology domain. The system administrator wants to index \\Technology1\Data. What should the administrator do to index the information using Microsoft Index Server. (Choose all that apply) A. Create an account in the Technology domain that has access to the IIS server in the Finance domain. B. Create an account in the Finance domain that has permission to connect to \\Technology1\Data. C. Create a trust relationship in which the Technology domain trusts the Finance domain. D. You cannot use Microsoft Index Server to index across domains; the servers should be in the same domain.
123. When you run Microsoft Index Server (HTML), you see the following error message with certain browsers: Cannot open the Internet site http://localhost/iisadmin/isadmin/admin.htm What is the most likely cause of this error. A. Allow Anonymous authentication is selected. B. Basic authentication is selected. C. Windows NT Challenge/Response authentication is selected. D. None of the above.
124. You have an application file with the extension .frm. Whenever you click its link, your browser opens it as a text file instead of running the associated application, FormBuild. What should you do to fix this problem. A. Edit the text/html entry under \HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Inetinfo\Parameters\MimeMap. B. Create a MIME mapping for .frm on the IIS server. C. Modify the MIME mapping for .frm on the IIS server, and use text/html as the MIME type. D. Remove the MIME mapping for .frm on the IIS server.
125. What is the result of reducing the permissible amount of word lists in Index Server. A. Shadow merges will occur less often. B. Full scan will occur more often. C. Master merges will occur more often. D. The number of persistent indexes will increase.
126. You do not want anonymous users to be able to access your Web site. You have assigned the NTFS permission READ to the IUSR_<computername> account. What group should have NO ACCESS permission. A. Everyone B. Interactive C. Network D. Guests
127. You have SSL (Secure Socket Layer) enabled on the Web site of PC Age, Inc. Which URLs will the users be able to access. (Choose all that apply) A. http://www.pcage.com/public B. https://www.pcage.com/private C. httpssl://www.pcage.com/private D. httpssi://www.pcage.com/private
128. Which of the following rights should the IUSR_<computername> account have. A. Access this computer from a network B. Take ownership of files or other objects C. Log on remotely D. Log on locally
129. After you install SSL (Secure Socket Layer) on your Web server, the performance of the server decreases. What is the best way to fix this problem. A. Remove SSL (Secure Socket Layer). B. Increase the paging file size. C. Upgrade to a faster processor. D. Create more free space on the hard drive on which SSL (Secure Socket Layer) has been installed.
130. Your data that is retrieved using Index Server has grown to 200 MB, and people have started complaining that their Index Server queries are slow. You add another 100 MB free space to Index Server, but there is still no improvement in performance. How can you improve the query response. A. Perform a master merge. B. Perform a shadow merge. C. Filter all documents into the 100 MB of free space. D. Start and stop the WWW Service.
|