Windows 2000 Network Infrastructure


1. Your enterprise has implemented Active Directory. The Active Directory forest consists of two domains: corp.com and research.corp.com. You install the Dynamic Host Configuration Protocol (DHCP) Server service and the Remote Installation Service (RIS) on RIS10, a computer running Windows 2000 Server that is a member of research.corp.com. Your user account, JoeJones, is a member of the group Domain Admins in research.corp.com and a member of RIS10\Administrators. Tom's user account, TomThompson, is a member of the group Domain Admins in corp.com. Sandra's user account, SandraSmith, is a member of the group Enterprise Admins in corp.com. Which user or users can authorize the DHCP and RIS services on RIS10 in Active Directory by default? (Choose all that apply)

A. TomThompson can authorize RIS.
B. SandraSmith can authorize RIS.
C. JoeJones can authorize RIS.
D. TomThompson can authorize DHCP.
E. SandraSmith can authorize DHCP.
F. JoeJones can authorize DHCP.

>> !
Answer: B & E

Only SandraSmith can authorize DHCP and RIS by default. A user account must be a member of the Enterprise Admins group in the forest root domain to authorize both the DHCP and the RIS services in Active Directory. The Enterprise Admins group exists only in the forest root domain. You cannot authorize a DHCP or RIS server in Active Directory if your user account is a member of the Domain Admins group in any domain in the forest if your account is not also a member of the Enterprise Admins group in the forest root domain. You cannot authorize a DHCP or RIS server in Active Directory if your user account is a member of the Administrators group on the DHCP or RIS server if your account is not also a member of the Enterprise Admins group in the forest root domain. A member of the Enterprise Admins group can delegate the authority to authorize DHCP and RIS servers to another group or to a specific user account.


2. The company has expressed a desire to migrate many of their databases from the mainframe to SQL Server. As such, they have decided that room can be made in the budget to ensure that it is done right. What will your design call for regarding SQL implementation?

[view the scenario]

A. It will call for the use of load balancing between two SQL Servers computers.
B. It will call for the use of clustering between the two SQL Server computers.
C. It will call for the use of load balancing between four SQL Server computers.
D. It will call for the use of clustering between the four SQL Server computers.

>> !
Answer: B

Microsoft SQL server supports full clustering (also called server clusters). Server clustering is only available on Windows 2000 Advanced Server and Windows 2000 Datacenter server. The main task of a server cluster is to preserve access to data at all times. In order to participate in a server cluster, the application must be able to make use of the clustering API. Not all applications have this capability. Computers that participate in server clusters frequently share the same hard drive system. The company's implementation calls for the use of Windows 2000 Advanced Server. Advanced Server can only cluster between two computers.Windows 2000 Help, Search for the articles entitled: Business scenarios; Planning your groups; Windows Clustering; and Choosing applications to run on a server cluster.


3. In reviewing the information you have collected about the hospital's network, what would you say are its three most significant problems at the moment?

[view the scenario]

A. The fact that it desperately needs to be upgraded.
B. The very poor performance it is currently producing.
C. The fact that there are frequent network outages.
D. The fact that it is very hard to monitor, much less manage.
E. The fact that the staff has not had proper systems training.
F. The amount of incompatible hardware and software that is on the network.
G. The fact that network communication between all branches of the hospital is not possible.

>> !
Answer: B, D & G

The fact that it needs to be upgraded is obvious. However, remember during the test to try to answer questions more specifically. Why does the network need to be upgraded? Two of the most important reasons are that it is virtually impossible to manage and that its performance is poor. In addition, the background information provided by the company makes it very clear that access to information is a matter of life or death. Despite this, currently a doctor working at a satellite center may not have access to the records that they need at the main hospital because the network is not integrated.


4. What will your design call for implementing in Seattle to improve Internet access for the North American offices?

[view the scenario]

A. Your design will call for implementing Internet Connection Sharing.
B. Your design will call for upgrading the firewall.
C. Your design will call for a proxy server array.
D. Your design will call for replacing the proxy servers with NAT.

>> !
Answer: C

Multiple proxy servers can be combined to form a Proxy Array. Proxy Arrays have many advantages over stand alone proxy servers, including increased performance.


5. You install the Domain Name System (DNS) service on a computer running Windows 2000 Server and connect to the server in the DNS console. You do not create any zones on this computer because you want to use it as a caching-only server. You also want the server to cache information about name resolution requests that cannot be resolved. Which value should you ensure is greater than zero to enable support for this feature?

A. The registry value NegativeTimeCache
B. The time value in the cache.dns file
C. The Retry time for the DNS server
D. The Expire time for the DNS server

>> !
Answer: A

You should ensure that the registry value NegativeTimeCache in the key HKEY_Local_Machine\System\CurrentControlSet\Services\DNSCache\Parameters is set to a value greater than zero. The maximum setting for this value is 900 seconds (15 minutes). This feature is referred to as negative caching. This feature helps to minimize the number of queries submitted to resolve a name that cannot be found. You set the Retry time in the Start of Authority record for a zone to define the number of seconds that a secondary name server will wait before it attempts to retry a zone transfer that has failed. You set the Expire time in the Start of Authority record for a zone to define the number of seconds that a secondary name server will continue to respond to client queries even if it cannot complete a successful zone transfer from its master name server. You use the cache.dns file to define the Internet Protocol (IP) addresses of root name servers. This file does not contain a time value.


6. You are a network architect for a manufacturing enterprise. You evaluate the existing network infrastructure to ascertain if it will be able to support additional traffic that will be generated when the computers for the enterprise are upgraded to run Windows 2000 operating systems and Active Directory is implemented. For which type of traffic should you ensure that latency is minimized?

A. Thin client application traffic
B. Web-based application traffic
C. Client/server traffic
D. Authentication traffic

>> !
Answer: D

You should insure that latency is minimized for authentication traffic. Since additional communication cannot occur until the authentication completes, you want to optimize performance for authentication. One way to do this is to ensure that servers providing authentication services, such as domain controllers, communicate with computers requesting authentication services over a local area network (LAN) rather than a wide area network (WAN). One of the key issues that should be addressed when implementing Active Directory is the placement of domain controllers. Other examples of latency sensitive traffic are logons and negotiations required to provide encryption services. Thin client applications, web based applications, and client server applications are examples of traffic that are sensitive to bandwidth issues rather than to latency issues. Communications that are sensitive to bandwidth constraints involve the transfer of large amounts of data, often in one direction, with only acknowledgement traffic flowing in the opposite direction.


7. You are a member of the IT staff at the headquarters office of BCD Train. You learn that a member of the finance team in the business office located in Kansas City has been given permission to work from home two days a week. This employee must submit confidential financial information to the headquarters office. You configure a virtual private network (VPN) using the Layer Two Tunneling Protocol (L2TP) and Internet Protocol Security (IPSec) to provide authentication and encryption services. The employee will access the VPN through an Internet Service Provider (ISP) in Kansas City. What protocols and ports must you enable on the firewall to support the IPSec traffic? (Choose three)

A. IP protocol 50
B. IP protocol 51
C. User Datagram Protocol (UDP) port 500
D. User Datagram Protocol (UDP) port 139
E. IP protocol 47
F. Transmission Control Protocol (TCP) port 389

>> !
Answer: A, B & C

You must enable support for Authentication Header (AH) traffic (IP protocol 50), Encapsulating Security Protocol (ESP) traffic (IP protocol 51), and Internet Security Association and Key Management Protocol (ISAKMP) traffic (UDP port 500). AH is used to insure data integrity. ESP is used to provide data encryption. ISAKMP is used to negotiate the keys that are used for a security association. UDP port 139 is needed to support the NetBIOS session service. IP protocol 47 is used for Generic Routing Encapsulation (GRE) traffic. TCP port 389 is used for Lightweight Directory Access Protocol (LDAP) traffic. 2.1.7. Evaluate the company's existing and planned technical environment and goals. Analyze security considerations. 4.1. Design an Internet and extranet access solution. Components of the solution could include proxy server, firewall, routing and remote access, Network Address Translation (NAT), connection sharing, web server, or mail server.


8. You are responsible for network planning and configuration for a medical supplies manufacturing enterprise. Approximately 2000 of the employees of the enterprise work at the headquarters office, and most networking services run on computers at this office, as well. Management has budgeted for a new server to allow consolidation of key network services on one server. Their goal is to minimize the number of servers that must be administered. Which two network services could you combine on a server running Windows 2000 Advanced Server with a low to medium level of impact on the memory and processor subsystems of the server?

A. Windows Internet Name Service (WINS) and the Dynamic Host Configuration Protocol (DHCP) relay agent.
B. Network Address Translation (NAT) and Internet Protocol Security (IPSec).
C. Dynamic Host Configuration Protocol (DHCP) and Routing and Remote Access as a remote access server.
D. Internet Authentication Service (IAS) and Domain Name System (DNS).

>> !
Answer: A

You could combine WINS and the DHCP relay agent services with a low to medium level of impact on the memory and processor subsystems of a server. Both services have low memory requirements. The WINS server service has a low level of processor utilization. The relay agent has a medium level of processor utilization. Both NAT and IPSec require a high level of processor utilization. NAT also has a high level of memory utilization. DHCP and a remote access server both require a high level of processor utilization. A remote access server also has a high level of memory utilization. IAS and the DNS server service both require a high level of memory utilization.


9. You are the network administrator for your enterprise. All of the employees of the enterprise are housed in the same building with a separate network segment configured for each department. A project team in the marketing department is working on a publicity plan for a new product soon to be announced. Management wants to ensure that details about the new product are only available to those employees who developed the new product and the members of the marketing project team. You decide to implement Internet Protocol Security (IPSec) policies to protect information being exchanged among employees in these two groups. How should you configure authentication, encryption, and key exchange settings to protect the data with the lowest processing overhead?

A. Use Message Digest 5, 56-bit Data Encryption Standard, and Diffie-Hellman Group 1.
B. Use Message Digest 5, Triple Data Encryption Standard, and Diffie-Hellman Group 2.
C. Use Secure Hash Algorithm, 56-bit Data Encryption Standard, and Diffie-Hellman Group 2.
D. Use Secure Hash Algorithm, Triple Data Encryption Standard, and Diffie-Hellman Group 1.

>> !
Answer: A

You should configure the IPSec policies to use Message Digest 5 (MD5), the 56-bit Data Encryption Standard (DES), and Diffie-Hellman Group 1. These settings will provide protection for the data with the least impact on your processors. To minimize processor overhead for authentication, you should use MD5 instead of the Secure Hash Algorithm (SHA). MD5 uses 128-bit key while SHA uses a 160-bit key.

To minimize processor overhead for encryption, you should use 56-bit Data DES instead of Triple DES (3DES). 3DES uses a 128-bit key. To minimize processor overhead for the exchange of keys, you should use Diffie-Hellman Group 1 instead of Group 2. Group 1 uses 768 bits and Group 2 uses 1024 bits.


10. You are responsible for the configuration of routers for your corporation. One of the routers is a computer running Windows 2000 Server on which Routing and Remote Access is enabled. You need to provide support for multicasting on this router, so you install the Internet Group Management Protocol (IGMP). The computer contains two network interface cards named Internal and External. External is connected to a network on which a multicast-enabled router is installed. Internal is connected to your corporation's internal network. How should you configure multicasting on External and Internal?

A. Configure both External and Internal in IGMP router mode.
B. Configure both External and Internal in IGMP proxy mode.
C. Configure External in IGMP router mode. Configure Internal in IGMP proxy mode.
D. Configure External in IGMP proxy mode. Configure Internal in IGMP router mode.

>> !
Answer: D

You should configure External in IGMP proxy mode and Internal in IGMP router mode. An interface in IGMP proxy mode is responsible for forwarding multicast traffic from an interface configured in IGMP router mode to and from a multicast-enabled network. An interface in IGMP router mode listens for IGMP traffic from hosts and sends IGMP queries. Both types of interfaces update the TCP/IP multicast forwarding table. You should not configure both interfaces in IGMP router mode. External, the interface that is connected to the network on which a multicast-enabled router is installed must be in IGMP proxy mode. You should not configure both interfaces in IGMP proxy mode. Internal, the interface that is connected to the internal network must be in IGMP router mode.


11. You have been hired as a network consultant for a corporation. You learn that their network includes three computers running Windows 2000 Server and the Windows Internet Name Service (WINS). Each WINS server is located on a separate subnet. There are computers running Windows 2000 Professional that are configured as WINS clients on these three subnets as well as four other subnets. You recommend that the network administrators select the option Enable Automatic Partner Configuration on the Advanced tab of the Properties dialog box of the Replication Partners node in the WINS console for each server. What else should you recommend that the network administrators do to ensure that the WINS servers discover each other and self-configure?

A. Configure the routers between the subnets on which the WINS servers are located to support multicasting.
B. Configure a WINS proxy agent on each subnet on which there is no WINS server.
C. In the WINS console for each WINS server, add the other two WINS servers as replication partners from the context menu of the Replication Partners node.
D. In the WINS console for each WINS server, configure a static mapping for each of the other two WINS servers.

>> !
Answer: A

You should recommend that they configure the routers between the subnets on which the WINS servers are located to support multicasting. When automatic partner configuration is enabled, the WINS servers use the multicast address 224.0.1.24 to discover each other. Once the WINS servers discover each other, each pair of WINS servers are automatically configured as push and pull partners with replication occurring every two hours. The network administrators do not have to configure a WINS proxy agent on each subnet on which there is no WINS server to enable the WINS servers to discover each other. You use a WINS proxy agent to respond to name resolution request broadcasts on the subnet on which the WINS proxy agent is installed. The proxy agent forwards the request to its configured WINS server and then returns the reply to the non-WINS client that issued the broadcast.
In the situation described here the client computers are configured as WINS clients, so WINS proxy agents are not needed at all. The network administrators do not need to add the other two WINS servers as replication partners from the context menu of the Replication Partners node for each WINS server. Once the servers discover each other via multicasting, they will be automatically configured as partners. The network administrators should not create static mappings on each WINS server for the other WINS servers. You create static mappings for computers that use NetBIOS but cannot be configured as WINS clients. The static mappings ensure that applications running on computers configured as WINS clients can locate the computers that are not WINS clients.


12. You are the network administrator for your enterprise. Your management recently signed an agreement with a business partner that will require that employees of the partner access data on your network. You decide to provide access via an extranet configured on a computer that resides in a screened subnet. The computer is running Windows 2000 Server and the Internet Information Service. You learn that the partner's employees use a variety of Web browsers. You plan to allow mutual authentication between the server and clients and to protect passwords exchanged during the security negotiation process. You plan to manage access to the data by using NTFS permissions. Which authentication mechanism should you implement for the Web site defined for the extranet?

A. Certificate-based Authentication
B. Digest Authentication
C. Basic Authentication
D. Integrated Windows Authentication

>> !
Answer: A

You should implement a certificate-based authentication mechanism using the Secure Sockets Layer and Transport Layer Security (SSL/TLS) protocols. You can associate each client certificate with a specific Windows 2000 user account. You can create a security group in Windows 2000, include the appropriate user accounts in the security group, and configure access control entries (ACEs) in the access control list (ACL) that governs access to each resource. The client and server certificates can be granted by a Windows 2000 Certificate Authority (CA) or by an external CA. You should not use Integrated Windows Authentication since it is only supported by Internet Explorer. Integrated Windows Authentication supports both Kerberos and Windows NT Challenge/Response authentication. Kerberos is supported by Internet Explorer 5.0 and above. Kerberos can work across a firewall.
Windows NT Challenge/Response is supported by Internet Explorer 3.01 and above and cannot be used across a firewall. You should not use Digest authentication because it is only supported in InternetExplorer 5.0 and later. It does support authentication across a firewall. You should not use Basic Authentication because it does not protect passwords exchanged during the security negotiation process. With Basic Authentication, a password is encoded but not encrypted. Basic Authentication does work with most web browsers. Basic Authentication does work across firewalls.


13. You have been hired as a network consultant by the business manager of a group of physicians who own and operate clinics in five cities, a main clinic and four satellite clinics. All of the computers in use at the clinics are running Windows 2000 Professional or Windows 2000 Server and belong to a Windows 2000 mixed-mode domain. You learn that each clinic maintains its own patient data in a local database. Twice a day, the patient information is uploaded to a central database at the main clinic. Three or four times a day, employees at the satellite clinics need to reference information in a medical information database that is stored at the main clinic. You recommend that a computer running Windows 2000 Server at each clinic be configured as a router. You recommend that Dial-on-Demand connections be configured between the Windows 2000 router at each satellite clinic and the Windows 2000 router at the main clinic to help minimize communication costs. You recommend that the routing protocol RIP version 2 for Internet Protocol be installed on the routers at all five clinics. What configuration should you recommend to allow the routers to share Routing Information Protocol (RIP) routes but avoid the overhead of RIP multicasts over the demand-dial connections?

A. Configure RIP for autostatic update mode on the demand-dial interfaces.
B. Enable ICMP router discovery.
C. Configure a static route to the remote router for the user account used for the demand-dial interfaces.
D. Configure RIP for periodic update mode on the demand-dial interfaces.

>> !
Answer: A

You should configure RIP for autostatic update mode on the demand-dial interfaces. Autostatic update mode is the default configuration for demand-dial interfaces. In this mode, the routers exchange routes only when initiated by an administrator. You initiate an update by selecting "Update routes" from the context menu of the demand-dial interface in the General node of the IP Routing node in the Routing and Remote Access console. You can also create a batch file that uses the netsh utility to execute autostatic updates, and then use Task Scheduler to run the batch job periodically. You should not configure RIP for periodic update mode on the demand-dial interfaces. Periodic update mode initiates RIP updates every 30 seconds. This mode generates too much traffic for a demand-dial interface. In a mixed-mode domain, you cannot configure a static route on a user account. In a native-mode domain, this attribute is available on the Dial-in tab of the Properties dialog box of a user account. This attribute is used to define static routes for a demand-dial connection. You enable ICMP router discovery to allow a computer running Windows 2000 Professional or Server to detect routers on the same subnet as the computer. If a default gateway is not configured for a host or the configured default gateway is not available, the host can send a router solicitation message to discover a router to use as a default gateway.


14. You are responsible for the configuration of routers for your corporation. The corporation has ten branch offices that connect to the main office via demand-dial routers. The demand-dial routers are computers running Windows 2000 Server on which Routing and Remote Access is enabled. You need to configure all communication between one branch office and the main office to use Internet Protocol Security (IPSec) in tunnel mode. How should you configure IPSec to use tunnel mode between these locations?

A. By configuring the properties of a rule defined for an IPSec policy.
B. By configuring the properties of a filter used by a rule in an IPSec policy.
C. By configuring the general properties of an IPSec policy.
D. By configuring the properties of the interface used for demand-dial routing.

>> !
Answer: A

You configure tunnel mode by configuring the properties of a rule defined for an IPSec policy. On the Tunnel Setting tab you enable the option "The tunnel endpoint is specified by this IP address" and designate the address to be used. You use the General tab of the Properties dialog box of an IPSec policy to configure settings for key exchange. IPSec policies are managed in a Local Security Policy or a Group Policy Object (GPO). An IPSec policy must be assigned in the Local Security Policy or the GPO to make it the active policy. You use the Properties dialog box of a filter used by a rule in an IPSec policy to configure addresses, protocols, and ports for which traffic will be allowed. You use the Properties dialog box of an interface defined for demand-dial routing to enable the interface for IP routing, to enable router discovery, to configure input and output filters, and to configure multicast settings. The demand-dial routing interface is managed from the General node of the IP Routing node in the Routing and Remote Access console.


15. You are the network architect for a travel agency. The agency recently acquired two new offices from another travel agency. You plan to lease T1 lines to connect each of the new offices to the main office of the agency. You use the private IP address 172.20.64.0/19 for the subnet identifier at the main office. Which values can you use as subnet identifiers for the new offices?

A. 172.20.40.0/19
B. 172.20.144.0/19
C. 172.20.88.0/19
D. 172.20.32.0/19
E. 172.20.128.0/19

>> !
Answer: D & E

You can use 172.20.32.0/19 and 172.20.128.0/19. The private network identifier (ID) being used in this scenario is 172.16.0.0/12. As implemented in this design, 7 bits are being used to divide the network ID into subnets. Each subnet must be represented by a unique value in those 7 bits. Since all of the proposed answers include the value 20 in the second octet, we need to analyze the third octet. In the third octet, three bits are being used for the subnet ID. The remaining 5 bits in this octet and the 8 bits of the fourth octet are used for the host IDs on each subnet. The three bits in the third octet can be any of the following values: 32, 64, 96, 128, 160, or 192. The value 172.20.40.0/19 is a host ID on the 172.20.32.0 subnet. The value 172.20.88.0/19 is a host ID on the 172.20.64.0 subnet. The value 172.20.144.0/19 is a host ID on the 172.20.128.0 subnet.


16. In your opinion, what was the most significant reason behind the company's decision to implement different levels of network administrators?

[view the scenario]

A. The fact that the network desperately needs to be upgraded.
B. The fact that the networks performance is very poor.
C. How difficult the network is to use.
D. The fact that the network is very difficult to manage and monitor.

>> !
Answer: D

The company is moving from a centralized to a decentralized management model. We know from the background information that centralized management proved impractical because of the size and geographic distribution of the network and that these factors made the network very difficult to both manage and monitor. By identifying different levels of network administrators, the company hopes to bring the network under control.


17. You have been retained as a network consultant by an advertising agency. The agency has offices in eight cities throughout Europe. While analyzing the current network and the agency's plans for integrating Windows 2000 into its existing Windows NT 4.0 network, you learn that the agency plans to acquire another advertising firm with two offices. The computers used by the firm being acquired include servers running Novell NetWare 4.11 and client computers running Windows 98 and the Novell NetWare client. The owners of the agency report that the new offices will continue to use their existing hardware and software, but employees of these offices must have access to directories in a shared folder on a computer at the headquarters office of the agency. This computer will be upgraded to Windows 2000 Server. What should you recommend be installed on the upgraded server to allow the employees to access data in the shared folder?

A. Directory Services Manager for NetWare (DSMN)
B. Microsoft Directory Synchronization Services (MSDSS)
C. Gateway (and Client) Services for NetWare (GSNW)
D. File and Print Services for NetWare (FPNW)

>> !
Answer: D

You should recommend that FPNW be installed on the computer running Windows 2000 Server. This product can be purchased as part of Services for NetWare version 5. With FPNW installed, a computer running Windows 2000 Server can emulate a NetWare 3.12 file and print server. No changes are required on the client computers to access the shared resource on the Windows 2000 server. You use GSNW to allow computers running a Windows operating system and a Microsoft network client to access resources on a computer running NetWare via a computer running Windows 2000 Server and GSNW. After installing GSNW on the server, a gateway must be defined to allow access to a shared resource on a NetWare volume. The gateway is then shared to allow access by Microsoft clients, so it appears to the client computers as if they are accessing the resource on the Windows 2000 server. MSDSS is another component of Services for NetWare version 5. You use MSDSS to synchronize information between Active Directory and Novell Directory Services (NDS). You use DSMN to synchronize information between Windows NT Server 4.0 domain controllers and NetWare bindery servers. DSMN can be purchased as part of the Microsoft Services for NetWare Add-on Pack.


18. One of your design alternatives mandates the use of Windows 2000 DHCP servers. Given the information you collected from the company, which of the following will your design call for regarding DHCP?

[view the scenario]

A. Your design will call for a single DHCP server that has scopes configured for each subnet in the network.
B. Your design will call for a DHCP cluster that is located in the Red building and has scopes configured for each subnet on the network.
C. Your design will call for a DHCP server on each subnet that has scopes configured for every subnet on the network.
D. Your design will call for a DHCP server on each subnet that has a scope configured for its subnet only.
E. Your design will call for a DHCP cluster on each subnet that has a scope configured for its subnet only.
F. Your design will call for outsourcing your DHCP server to your Internet Service Providers.

>> !
Answer: C

Remember that the company does not have a lot of money to spend on servers. Because of this, clusters are out of the question for DHCP. With clusters excluded, the best option is to place a DHCP server on each subnet that has clients located on it. If the local DHCP server does go down for some reason, clients will be able to obtain address leases from another DHCP server on the network. This is possible because every DHCP server has address scopes configured on it for every subnet on the network. In order to obtain addresses from a DHCP server that was not local, the routers connecting the subnets will need to have BOOTP forwarding enabled or DHCP relay agents would need to be in use on the network.Windows 2000 Help, Search for the articles entitled: DHCP servers; DHCP defined; Planning DHCP networks; BOOTP and DHCP; Understanding relay agents; Understanding DHCP; Configuring scopes; To exclude an address from a scope; Cluster support for DHCP servers; and TCP/IP configuration methods.


19. You have been hired as a network consultant by the Information Services (IS) department chairperson of a college. You are to analyze the existing network at the college and recommend modifications that should be made. You learn that there are three computers running Windows 2000 Server that are configured as network routers. Each computer serves as a router for three subnets. RouterABC is connected to SubnetA, SubnetB, and SubnetC. RouterCDE is connected to SubnetC, SubnetD, and SubnetE. RouterEFG is connected to SubnetE, SubnetF, and SubnetG. You recommend that the Routing Information Protocol (RIP) for Internet Protocol (IP) be added to all three computers. You then develop a procedure for the network administrators to follow when configuring RIP. What is the first step you should include in the procedure to configure each router to ensure that computers on SubnetA can communicate with computers on SubnetG?

A. Enable router authentication.
B. Define the interface or interfaces that should use RIP.
C. For each interface configure the IP address of other routers connected to a common segment as default gateways.
D. Delete all static routes.

>> !
Answer: B

You should insure that the network administrators define the interfaces on each router that should use RIP. When you install RIP, no interfaces are configured by default to use RIP. You do not have to instruct the network administrators to delete all static routes on each router. You do not have to instruct the network administrators to configure the IP address of other routers connected to a common segment as default gateways. If you have only two computers running Windows 2000 that are configured as routers, you do not need to use RIP. Instead, you can configure the default gateway on the interface on the common segment with the IP address of the other router's interface on the common segment. You do not need to instruct the network administrators to enable router authentication. If you do enable authentication on an interface, you must configure other routers that make announcements to that interface to use authentication and you must configure the same passwords on the routers. Router authentication is used primarily for identification of other RIP-enabled routers. Before you can enable router authentication, you must define the interfaces that should use RIP.


20. Because of the importance of DNS on the network, it needs to be highly available. Which of the following is the best DNS design for the company?

[view the scenario]

A. The creation of a primary DNS zone on a server in the Red building with Secondary zones located on servers in each of the other two buildings.
B. The creation of a primary DNS zone on a server in each building.
C. The creation of a primary DNS zone on a server in each building with servers in the Blue and Green building configured to use the DNS server in the Red building as a forwarder.
D. The creation of an Active Directory integrated zone on a server in the Red building with Secondary zones located in each of the other two buildings.
E. The creation of an Active Directory integrated zone on a server in each building.

>> !
Answer: E

The company mentioned Security and high availability as high priorities. To this end, Active Directory integrated DNS zones have many advantages over standard zones. Once converted, the zone information is stored in Active Directory, not zone files. Transfer of zone information takes place as part of Active Directory replication and is therefore encrypted. Zone information can be updated on any domain controller that is also acting as a DNS server, rather than just the Primary server when using standard zones. In essence, all Active Directory integrated DNS servers function as Primary servers. Finally, a major benefit of Active Directory integrated zones is their support for secure dynamic updates. This ensures that only the system that registered a given resource record in DNS can alter or delete the record. It prevents unauthorized computers or users from altering DNS records.Windows 2000 Help, Search for the articles entitled: Namespace planning for DNS; DNS domain names; Checklist: Deploying DNS for Active Directory; Understanding DNS integration; Interoperability issues; and Dynamic update.


21. Before you begin to actually write the design specifications for a network that you are working on, you like to get a feel for what is important to the company. Over the years you have found that this helps to guide your design and avoid complications. What high level considerations are the most significant to DSI (Select all that apply)?

[view the scenario]

A. The company's need for remote connectivity to the mainframe is one of the most significant concerns.
B. The company's' need to update and replace their existing topology, especially regarding strategic systems is one of the most significant concerns.
C. The company's budget for the implementation is one of the most significant concerns.
D. Maintaining the company's systems so that there is interoperability with the current environment is one of the most significant concerns.
E. Establishing Internet connectivity for the company's internal users is one of the most significant concerns.
F. The company's need to train their staff on the new systems is one of the most significant concerns.
G. The ability for all staff members to be able to dial into the network is one of the most significant concerns.

>> !
Answer: C & D

Two items stand out from the list of possible answers. The first is that the company stressed the fact that it had very little money to spend on the project. The second is that everything currently revolves around access to the mainframe. An interruption in access to the data the mainframe contains could seriously affect the business.


22. If users and staff at the satellite medical centers need to access the Internet, what can you recommend to improve the speed of access for them while minimizing traffic on the internal network?

[view the scenario]

A. You can recommend that all clients in the satellite medical centers use a proxy server at the main hospital building.
B. You can recommend providing each satellite medical center with its own connection to the Internet.
C. You can recommend increasing the available bandwidth between the satellite medical centers and the main hospital.
D. You can recommend having a proxy server at each satellite medical center.

>> !
Answer: D

A proxy server can cache web content locally. For example, when a client that is configured to access the Internet or a website on an Intranet attempts to access a webpage, the proxy server goes out on behalf of the client and obtains the page. It then caches it and returns the page to the user that requested it. When another user requests the page, it is returned from cache. Because the page was in cache, it did not need to go out and access the Internet again, thus reducing bandwidth. Proxy servers can also be used to control which websites are accessible. It can do this for all users or for specific groups of users.


23. You are very concerned about the company's request that partners be allowed dial in access to data on the mainframe. You know from past (and current) experience that dial in access can be a serious security threat. With this and the company's other specifications in mind, which of the following will you specify for dial up connections (Select all that apply)?

[view the scenario]

A. You will specify allowing PAP dial-in connections.
B. You will specify allowing SPAP dial-in connections.
C. You will specify allowing MS-CHAP dial-in connections.
D. You will specify allowing MS-CHAP v2 dial-in connections.
E. You will specify allowing PPTP VPN connections to secure communications.
F. You will specify allowing L2TP VPN connections to secure communications.
G. You will mandate basic encryption for all connections.
H. You will mandate strong encryption for all connections.
I. You will specify allowing IPSec for all connections.
J. You will mandate PGP encryption for all connections.

>> !
Answer: D & H

Remember that the company will require its partners to only dial in from Windows 98 and 2000 clients. Both of these clients support the highest level of Windows security for authentication, MS-CHAP version 2. Because security is critical, no other authentication protocol should be allowed. Due to the sensitive nature of the data, it would also be best to strongly encrypt the data that passes over the wire. This is supported by dial-in clients using MS-CHAP and MS-CHAPv2.The above solution is preferable to a VPN. VPN's are designed to be used over the Internet or other persistent forms of connection. Because the partners will be directly dialing into the network, a VPN is not necessary. In addition, IPSec is supported by Windows 2000, but not Windows 98. If all of the dial in clients were Windows 2000 clients, it would be the strongest method of data encryption available.Windows 2000 Help, Search for the articles entitled: MS-CHAP version 2; MS-CHAP; Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2); Dial-up networking clients; PAP; Password Authentication Protocol (PAP); SPAP; Shiva Password Authentication Protocol (SPAP); Authentication methods and protocols; Authentication methods; EAP; Extensible Authentication Protocol (EAP); Using smart cards for remote access; and Dial-up connection authentication and data encryption.


24. Your initial client side name resolution specifications for the hospital called for only using DNS. The company rejected the design as not being fault tolerant enough. They also noted that it failed to accommodate any older Windows clients that were accessing the network via VPN. Given this, what will your design call for regarding post implementation name registration and resolution that will take the company's concerns into consideration (Select all that apply)?

[view the scenario]

A. Your design will call for having all client computers register directly with DNS.
B. Your design will call for having DHCP servers register the host (A) records for Windows 2000 clients.
C. Your design will call for having all client computers register with WINS.
D. Your design will call for having DHCP servers register the host (A) records for non-Windows 2000 clients.
E. Your design will call for having all servers register with DNS exclusively.
F. Your design will call for having only non-Windows 2000 client computers register with WINS.
G. Your design will call for having all servers register with DNS and WINS.

>> !
Answer: C & G

Resources will be made available from servers, not clients. Therefore, it is not necessary for clients to register with DNS. Because both WINS and DNS will be made available on the network, clients and servers should be configured to use each for name resolution. A client does not need to have registered a DNS record in order to query the DNS database. A client does, however, need to have registered a record in WINS in order to be able to query WINS for the address of server. Although all clients and servers on the network will be running Windows 2000 post implementation, the hospital could use both methods of name resolution to increase its name resolution fault tolerance. In addition, older Windows clients will be connecting from the medical office building that use WINS for name resolution. Servers will need to be configured to register with DNS so that their records will be available for DNS clients on the network.Windows 2000 Help, Search for the articles entitled: Planning WINS networks; WINS defined; When to use WINS; WINS; Checklist: Deploying DNS for Active Directory; Understanding DNS integration; Interoperability issues; and Dynamic update.


25. You have been hired as a network architect by the Information Services (IS) department chairperson of a college. You learn that the college has a Windows NT 4.0 domain to which three computers running Windows 2000 Server have been added. Fifteen members of the faculty request that they be given a means of accessing the computers on campus from their home offices. You recommend that Routing and Remote Access be enabled on two of the computers running Windows 2000 Server and that the computers be configured as remote access servers. You learn that most of the computers that the faculty members need to access use TCP/IP as the networking protocol, but a few use NWLink. The faculty members use laptop computers running Windows 2000 Professional on which only TCP/IP is installed. What should you recommend that the network administrators do to allow the faculty members to access all servers when they dial in to the remote access servers?

A. Install NWLink, in addition to TCP/IP, on all the laptop computers.
B. Install TCP/IP and NWLink on the remote access servers.
C. Install TCP/IP on all the servers.
D. Enable support for multilinking on the remote access servers.

>> !
Answer: B

You should recommend that the network administrators install TCP/IP and NWLink on the remote access servers. A remote access server acts as a gateway between clients and other servers on a network as long as the remote access server has at least one protocol in common with the client and one protocol in common with the servers. The network protocol that is used to communicate with the client can be a different protocol from the one used to communicate with another server.
A best practice is to minimize the number of protocols installed on each computer, since each protocol on a computer incurs its own overhead. You should not recommend that TCP/IP be installed on all of the servers, since the remote access server can act as a gateway between the protocol on a client and the protocol on a server. You should not recommend that NWLink, in addition to TCP/IP, be installed on all of the laptop computers, since the remote access server can act as a gateway between the protocol on a client and the protocol on a server. You should not recommend that support for multilinking be enabled for the remote access servers to enable access to the other servers on the network. Multilinking provides the ability for a client to use multiple physical connections to the remote access server as a single logical connection. The client uses a network protocol across the logical connection that it has in common with the remote access server.


26. You have arrived at the portion of the design that calls for specification of the network routing strategy. What will your design call for?

[view the scenario]

A. Your design will call for using Routing Information Protocol (RIP) version 1 on all router interfaces.
B. Your design will call for using Routing Information Protocol (RIP) version 1.5 on all router interfaces.
C. Your design will call for using Routing Information Protocol (RIP) version 2 on all router interfaces.
D. Your design will call for using Open Shortest Path First (OSPF) on all router interfaces.
E. Your design will call for using Internet Group Management Protocol (IGMP) on all router interfaces.
F. Your design will call for using static routes on all router interfaces.
G. Your design will call for using autostatic routes on all router interfaces.

>> !
Answer: F

Because the company has a very small number of routers and segments, there is no reason to use dynamic routing protocols. Such protocols would only introduce unnecessary traffic onto the network. It is a simple matter to configure the routers statically when there are so few of them. Windows 2000 Help, Search for the articles entitled: Routing overview; IP routing protocols; OSPF; OSPF design considerations; The OSPF environment; Deploying OSPF; RIP for IP; RIP-for-IP design considerations; Deploying RIP for IP; The RIP-for-IP environment; The static routed environment; Static routing design considerations; and Deploying static routing.


27. The company wishes to use an internal Class B addressing scheme on the network. They have asked you to calculate a subnet mask that will allow them plenty of opportunity for growth. Which of the following will your design include?

[view the scenario]

A. 255.255.240.0
B. 255.255.248.0
C. 255.255.252.0
D. 255.255.254.0
E. 255.255.255.0

>> !
Answer: E

The company is currently using a Class B address which means that the first 16-bits of the subnet mask are taken. This means that the last two octets are available for further subnetting. A 24-bit subnet mask will provide you with the most subnet and host range flexibility while maintaining consistency with all of the background information provided in the design.Windows 2000 Help, Search for the articles entitled: Numbering your network; Routing overview; Subnet masks; IP addressing and routing; IP addressing; IP routing; Understanding routing; and Routing scenarios.


28. You are the network architect for your enterprise. You are responsible for developing procedures to be used by the network administrators for troubleshooting problems with both Domain Name System (DNS) servers and Windows Internet Name Service (WINS) servers. The DNS and WINS server services are installed on computers running Windows 2000 Server. Each standard primary DNS zone is configured to use a WINS server to resolve NetBIOS names, as needed. You need to document how to analyze data returned from the nslookup utility to determine if a record returned by nslookup is from a WINS server. What features of the information that is returned by nslookup can an administrator use to determine which records are being provided by a WINS server?

A. Records returned in response to the nslookup request that were obtained from a WINS server will be marked as authoritative and the Time-to-Live value will be the same on subsequent requests.
B. Records returned in response to the nslookup request that were obtained from a WINS server will be marked as non-authoritative and the Time-to-Live value will be the same on subsequent requests.
C. Records returned in response to the nslookup request that were obtained from a WINS server will be marked as non-authoritative and the Time-to-Live value will be shorter on subsequent requests.
D. Records returned in response to the nslookup request that were obtained from a WINS server will be marked as authoritative and the Time-to-Live value will be shorter on subsequent requests.

>> !
Answer: D

Records obtained by a DNS server from a WINS server will be marked as authoritative. These records are stored in the cache of the DNS server, not in a zone. The Time-to-Live (TTL) value of the records obtained from a WINS server is decreased while the records are in cache. Therefore, if a record returned from an nslookup query is marked as authoritative but the TTL decreases on subsequent queries, the information for the record came from a WINS server.


29. You are designing the risk assessment documents for the project. Given what you know about the implementation requirements which of the following poses the greatest risk to the functioning of the medical center during the implementation?

[view the scenario]

A. The greatest risk is posed by file and print service interruptions.
B. The greatest risk is posed by domain authentication interruptions.
C. The greatest risk is posed by client/server application access interruptions.
D. The greatest risk is posed by remote connectivity interruption.

>> !
Answer: C

The SQL server databases hold all patient information. Interruptions in access to these servers could seriously hamper patient care. For this reason, client/server application access interruptions pose the most significant risk during project implementation.


30. You are the network architect for an enterprise that has offices in ten cities throughout Canada. The traffic on the subnet at the office in Toronto has increased dramatically, so you recommend that a new router be added in Toronto to create another subnet. At the same time, you want to implement an internal Internet Protocol (IP) addressing scheme that uses addresses from the private IP range 192.168.0.0/16 to replace the addresses from the public address range that is currently used for computers at the Toronto office. Addresses are currently assigned by a computer running Windows 2000 Server on which the Dynamic Host Configuration Protocol (DHCP) server service is installed. Which feature of DHCP can you use to support the existing addresses as well as migrate to the new addresses?

A. Supernetting
B. Superscopes
C. Variable length subnet masks
D. Automatic Private IP Addressing (APIPA)

>> !
Answer: B

You can use superscopes to support the existing addresses as well as migrate to the new addresses. A superscope allows you to combine two or more scopes for a physical network segment into a single scope. Typically, you would configure the existing scope, in this case the one that is using addresses from the public range, with a short lease so that these leases expire. You then deactivate the scope. After the clients obtain addresses from the new scope, the original scope can be deleted. Supernetting allows you to consolidate multiple consecutive IP network identifiers into a single entry to be included in a routing table. Variable length subnet masks allow you to implement a subnet addressing scheme that uses a variable number of bits for the host identifiers on different subnets. APIPA is used by a computer when it is configured as a DHCP client but cannot locate a DHCP server. APIPA addresses are in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of 255.255.0.0. Computers using APIPA addresses can only communicate with other computers using APIPA on the same subnet.


31. You are the network architect for a manufacturing enterprise. The computers on your network run Windows 2000 Server and Windows 2000 Professional. About 100 employees travel frequently and need access to the network from their laptop computers. You plan support for a virtual private network (VPN) on a computer on which Routing and Remote Access has been enabled. You plan to use the Point-to-Point Tunneling protocol (PPTP) and to limit the network adapter card that is used for VPN access to allow only PPTP traffic. For what Internet Protocol (IP) protocol and port numbers should you allow access in the input and output filters for the VPN interface in the Routing and Remote Access console?

A. IP protocol number 47 and TCP port 1723
B. IP protocol number 47 and TCP port 1701
C. IP protocol number 89 and UDP port 500
D. IP protocol number 50 and UDP port 500

>> !
Answer: A

You should enable support only for IP protocol number 47, which is Generic Routing Encapsulation (GRE), and TCP port 1723, which is reserved for PPTP. The Encapsulating Security Payload (ESP) is IP protocol number 50. The Open Shortest Path First (OSPF) routing protocol is IP protocol number 89. TCP port 1701 is used for Layer 2 Tunneling Protocol (L2TP) traffic. UDP port 500 is used for Internet Security Association and Key Management Protocol (ISAKMP).


32. You have recently been hired as the network architect for a corporation that has manufacturing facilities and offices in four countries. While analyzing the existing network, you learn that computers running Windows 2000 Server have been configured as routers to manage communications between locations. The computers have been configured to use Routing Information Protocol (RIP) version 2. You also learn that the corporation plans to acquire three new facilities in the next year. You decide to switch to the routing protocol Open Shortest Path First (OSPF) in preparation for the integration of the new facilities into the network. You decide that RIP and OSPF should co-exist until OSPF is installed on all routers. If a route to a remote network is learned through both RIP and OSPF, which route will be chosen when a user attempts to access a computer on the remote network?

A. The route with the lowest metric.
B. The route from the protocol that is configured as the preferred protocol.
C. The route that was learned from RIP.
D. The route that was learned from OSPF.

>> !
Answer: B

The route that is learned by the preferred routing protocol is used. You define a preferred routing protocol by configuring a preference level. This is done in the Routing and Remote Access console from the Properties dialog box of the IP Routing\General node on the Preference Levels tab. The path from the source with the lowest value in the rank field on the Preference Levels tab is chosen. If there are multiple routes learned by each routing protocol, the route with the lowest metric for that protocol will be the route that is included in the IP routing table. Since the definition of a metric varies with each routing protocol, the metric is not the determining factor when comparing routes learned from different protocols. The route that was learned from RIP is chosen only if RIP is configured as the preferred routing protocol. The route that was learned from OSPF is chosen only if OSPF is configured as the preferred routing protocol.


33. You need to create the DNS namespace design for the company. Which of the following will your design list as appropriate DNS namespaces to use? (Select all that apply)

[view the scenario]

A. evilempire.com
B. northamerica.evilempire.com
C. westerneurope.evilempire.com
D. southpacific.evilempire.com
E. ad.evilempire.com
F. northamerica.ad.evilempire.com
G. westerneurope.ad.evilempire.com
H. southpacific.ad.evilempire.com

>> !
Answer: E, F, G & H

The company has mandated that their name space be contiguous with their root DNS name. However, their root DNS name is hosted on a BIND server that does not support Active Directory integrated zones. The version of BIND in use by the company does support the use of service (SRV) records. Because of this, it could technically support Active Directory. However, in the background information, the company specifically states that the DNS servers for Active Directory must support multimaster operations. This means that DNS resource records must be able to be updated on any of the DNS servers that support Active Directory. The only zone type that supports this is Active Directory integrated which, again, BIND does not support.Because of this, the root DNS name cannot be used for the forest root and a subdomain (ad) must be used instead. This domain will also double as the domain for headquarters. All other domains will be child domains of the Active Directory root domain, d.Windows 2000 Help, Search for the articles entitled: Namespace planning for DNS; DNS domain names; Checklist: Deploying DNS for Active Directory; Understanding DNS integration; Interoperability issues; and Dynamic update.


34. The company wants to leverage Windows 2000 to create a method for managing its patient information forms. The forms are Excel spreadsheets that contain summaries of information about patients and are stored on servers at the satellite medical centers as well as the main hospital building. The medical center wants all forms to be available at all locations. They also want them to be stored in a well organized and easy to access way. What will your design specify to achieve this?

[view the scenario]

A. Your design will specify adding a Distributed file system (Dfs) root server to each satellite medical center that has a Patient Information child node. It will also specify adding a Dfs replica server in the main hospital building.
B. Your design will specify adding a Distributed file system (Dfs) root server in the main hospital building, and a child node at each satellite medical center.
C. Your design will specify adding a Distributed file system (Dfs) root server in each satellite medical center and a child node in the main hospital building.
D. Your design will specify adding a Distributed file system (Dfs) root server in the main hospital building that has a child node for each satellite medical center. It will also specify adding a Dfs replica server at each satellite medical center that corresponds to the child node for that center.

>> !
Answer: D

DFS is used to make it easier for users to locate files. Rather than having to search through My Network Places and look on several different servers to locate the shared folder that they need, users can access shares in a central location. One benefit of DFS is that it can be used to present a consistent location for client resources access over time. For instance, you may occasionally add and remove servers from the network. As you do so, users will need to be informed of where the resources they use are currently located and locate them.Although this does not seem like a big deal for people with experience in computers, it can be quite difficult for those with less experience. It certainly causes users to have to take time away from their standard work duties to locate the resources. DFS is designed to solve this problem. Using DFS, administrators can create a share that has pointers in it to all of the other shared folders on the network. These pointers appear as folders to clients, and are called child nodes or links. When servers are added and removed from the network, administrators update the pointers. Users still access the information from the same share point that they have always used, so the process is seamless for them.
Child nodes can take advantage of DFS technology to be more fault tolerant. They can also work with Active Directory to produce increased performance. When a child node is first defined, it consists of a pointer to a single share somewhere on the network that contains resources that the network administrator wants to make available using DFS. For fault tolerance purposes, additional locations can also be defined for the client node to point to. These additional locations are referred to as replicas. If the administrators wish, these locations can have their resources synchronized. The proper term for this in DFS is replication. Because DFS is a file system technology, when we talk about resources we are essentially referring to files. Thus when we talk about resource synchronization, we are really referring to a file replication process.In addition, DFS can integrate with Active Directory to examine where the user is attempting to access the resource from, and direct the user to a server that is located near them. In this way, the user may not be required to cross WAN links that can drive up the cost of resource access, and lower performance for the user.For instance, let's say that there are several shares on the network that contain a marketing spreadsheet. Each department is assigned a different server to access the file from. By using DFS, and administrator can create a central share point that all these users will access the resource from. DFS will contain a child node with several replicas that point to the different locations on the network that the file is located. When a user from accounting logs in to examine the file, DFS will examine where the user is coming from and attempt to locate a server near by that contains the file.
For purposes of the example, we will say that one of the replicas is a share in the accounting department, and that the user not only examines the file but also changes some of the data in it and saves it.If a user from marketing next attempts to access the file, that user will also be pointed to a replica that is near them. Again, for example purposes, we will say that there is a server in marketing that has a share with the file in it. The user will be directed to the server located near them to get the resource from. In addition, because the file contains data that is updated by people in several locations, the administrator would need to have set up synchronization so that the version of the file that was just updated on the accounting file server is available on the marketing file server when next requested.The DFS root server is the first server that contains the central share that is accessed on the network. This is the share that all users initially access. It contains the pointers to the other resources. It is possible to have replicas of the root in order to increase fault tolerance and speed up access to this top level share. Because of its importance, the root server should be located at the central hospital building. However, to increase fault tolerance and speed up performance for resource access, a replica server can be placed in each of the medical centers.Windows 2000 Help, Search for the articles entitled: Distributed file system overview; Distributed file system features; Distributed file system topology; Distributed file system topology; Platform compatibility; and Using the Distributed File System (Dfs).


35. You are the network architect for an enterprise that has offices in ten cities in the United States. The traffic on the subnet at the office in Bismarck has increased dramatically, so you recommend that a new router be added in Bismarck to create another subnet. You recommend that half of the client computers on the existing subnet be moved to the new subnet. You designate a subnet ID of 190.6.32.0 with a subnet mask of 255.255.248.0. You also recommend that a Dynamic Host Configuration Protocol (DHCP) server be installed to manage addresses for computers in Bismarck. What range of addresses should you have the network administrator configure for the DHCP scope that will contain addresses for clients on the new subnet?

A. 190.6.32.1 to 190.6.39.254
B. 190.6.32.1 to 190.6.63.254
C. 190.6.32.1 to 190.6.47.254
D. 190.6.32.1 to 190.6.32.254

>> !
Answer: A

You can use 190.6.32.1 to 190.6.39.254 for the host IDs. A subnet mask of 255.255.248.0 indicates that 21 bits are used for the subnet ID. The five bits of the third octet that can be used to define subnet IDs allow the use of 8, 16, 24, 32, 40, 48, etc., as subnet IDs. The subnet ID of 190.6.32.0 can be used to assign host IDs ranging from 190.6.32.1 to 190.6.39.254. Addresses that are assigned to the interface of the router on the new subnet and to the DHCP server should be excluded from the scope. A subnet ID of 190.6.32.0 with a subnet mask of 255.255.255.0 defines addresses in the range 190.6.32.1 to 190.6.32.254. This allows 24 bits for the subnet ID and 8 bits for the host IDs. A subnet ID of 190.6.32.0 with a subnet mask of 255.255.240.0 defines addresses in the range 190.6.32.1 to 190.6.47.254. This allows 20 bits for the subnet ID and 12 bits for the host IDs. A subnet ID of 190.6.32.0 with a subnet mask of 255.255.224.0 defines addresses in the range 190.6.32.1 to 190.6.63.254. This allows 19 bits for the subnet ID and 13 bits for the host IDs.


36. As a consultant for an advertising agency, you are helping your client design a network infrastructure to support a new web site. The agency has implemented an Active Directory domain and plans to use computers running Windows 2000 Advanced Server to support the web site and related resources. You recommend that they store the identical web site content on 4 servers and use the Network Load Balancing (NLB) feature of Windows 2000 to balance the incoming requests across the 4 servers. In testing, you notice that applications that use the ASP session object often lose the client session. What feature of NLB should you enable to avoid the client sessions being lost?

A. Affinity
B. Filtering modE. single host
C. Load weight
D. Multicast support

>> !
Answer: A

You should enable the Affinity feature. This feature is also referred to as the Sticky Sessions feature. This feature ensures that requests from a specific client are directed to the same server for consistency. You enable multicast support if you want the Media Access Control (MAC) address of the cluster to be converted to a multicast address. With this enabled, the Address Resolution Protocol (ARP) can resolve the multicast address correctly. You should configure the load weight to govern the percentage of traffic that a specific host in the NLB cluster should handle for a specific port rule. You should set the filtering mode to single host if you want all traffic defined for a specific port rule to be managed by a single host rather than just the traffic for a specific client session for the port rule.


37. You are the network architect for your enterprise. A Windows 2000 domain has been implemented for the enterprise. The Dynamic Host Configuration Protocol (DHCP) server service is installed on two computers running Windows 2000 Server. The DHCP servers are on different subnets. Each DHCP server is configured with a scope of addresses for each of the four subnets configured at the headquarters location. All routers support BootP forwarding. The Domain Name System (DNS) zone in which records for computers on these subnets are created and managed is configured for secure dynamic updates. Most of the client computers are running Windows 95, so you select the option "Enable updates for DNS clients that do not support dynamic updates" on both DHCP servers. What step should you take to ensure that each of these DHCP servers will be able to update the DNS record for a client when leasing a new address to a client that received its initial lease from the other DHCP server?

A. Create a reservation for each of these clients on both DHCP servers.
B. Add the computer accounts for both DHCP servers to the group DHCP Administrators.
C. Add the computer accounts for both DHCP servers to the group DNSUpdateProxy.
D. Create a superscope on each DHCP server that includes the existing scopes and new scopes that define the addresses managed by the other DHCP server.

>> !
Answer: C

You should add the computer accounts for both DHCP servers to the group DNSUpdateProxy. When DNS records are created by members of this group, the records have no security. Therefore, neither of the DHCP servers is assigned ownership of the records, and either DHCP server can update DNS records created by the other DHCP server. You should not create a reservation for each of these clients on both DHCP servers. If the servers are not members of the group DNSUpdateProxy, the server that assigns the initial lease to a client will own the DNS record that it creates and the other DHCP server will not be able to update the DNS record. You should not add the computer accounts group does not have the ability to update DNS records.
When you set up two DHCP servers to provide addresses for the same subnet, you create a scope on each DHCP server with the set of addresses to be managed by that server. You can expand this scope later to include additional addresses and then exclude the ones managed by the other DHCP server. However, you cannot create new scopes to define addresses managed by the other DHCP server because the address ranges with the required subnet masks will conflict with your existing scopes. You use a superscope to define multiple address ranges from different subnets in separate scopes that can be assigned to computers on the same physical segment.


38. You have been reviewing the bandwidth that is currently available on the network as well as the background information provided by the company. Which of the following changes should your design call for implementing before the network is deployed?

[view the scenario]

A. Your design should call for an increase in bandwidth at the Seattle office.
B. Your design should call for an increase in bandwidth for the regional offices.
C. Your design should call for the creation of a mesh network between all offices in the North American region.
D. Your design should call for the creation of a mesh network between all offices in each region.
E. Your design should call for the creation of a mesh network between all offices worldwide.

>> !
Answer: A

Despite its central importance, Seattle has a relatively small amount of network bandwidth available to it. If any changes are going to be made to the amount of bandwidth available on the network, Seattle would be a good place to start. Regional offices don't necessarily have a great deal of bandwidth either, however they are not as critical to the design as Seattle. A mesh network is a costly and ultra high availability solution that the company does not need.


39. You have been hired as a network consultant by the Chief Information Officer (CIO) of an enterprise that manufactures automobile parts in factories throughout the world. You learn that the enterprise uses the Open Shortest Path First (OSPF) routing protocol and needs to add two subnets to an existing area, Area1. A computer running Windows 2000 Server, Area1BR, is configured as an area border router. Area1BR is connected to Area 0.0.0.0 and to Area1. For Area 1, Area1BR advertises the summarized route 172.16.0.0/18. Which two Internet Protocol (IP) addresses define subnets that you can include in Area1?

A. 172.31.96.0/18
B. 172.31.224.0/18
C. 172.31.192.0/18
D. 172.31.128.0/18
E. 172.31.160.0/18

>> !
Answer: C & D

You can include the subnets 172.31.128.0/18 and 172.31.192.0/18 in Area1. With he routing protocol OSPF, an area consists of contiguous subnets that can be represented via route summarization. The network prefix "/18" indicates that the first 18 bits represent the subnet identifiers (IDs). This includes the first two bits of the third octet. The subnets that can be defined in this octet are represented in binary notation as 00000000, 01000000, 10000000, and 11000000. In decimal notation, the value of the subnet ID in the third octet can be 0, 64, 128, or 192. The address 172.31.96.0 represents a host on subnet 172.31.64.0. The address 172.31.160.0 represents a host on subnet 172.31.128.0. The address 172.31.224.0 represents a host on subnet 172.31.192.0.


40. The IT staff has mandated that computers should be automaticallyconfigured when brought up on the network. Keeping in mind the need for high availability, which of the following solutions could yourdesign call for? (Select all that apply)

[view the scenario]

A. Your design could call for a single DHCP server that has a scope configured for each subnet in the network.
B. Your design could call for a DHCP cluster that is located on a single subnet with smaller scopes configured for each subnet on the network.
C. Your design could call for a DHCP server on each subnet that has the primary scope for it's subnet and smaller scopes configured for every subnet on the network.
D. Your design could call for a DHCP server on each subnet that has a scope configured for its subnet only.
E. Your design could call for BOOTP compliant routers.
F. Your design could call for a DHCP cluster on each subnet that has a scope configured for its subnet only.

>> !
Answer: B, C & E

Remember that the key is high availability. Under this design, the main hospital building would house the DHCP cluster. A cluster is an ultra high availability solution that is often quite costly to implement. The cluster would contain backup scopes for every subnet on the network. Each subnet would get its own DHCP server. These servers would also be configured to hand out addresses for all of the subnets on the network, but would primarily serve as the principle DHCP server for their local subnet. Finally, BOOTP compliant routers would be necessary so that clients on one subnet could successfully communicate with DHCP servers on other subnets in the event their local DHCP server became unavailable.Windows 2000 Help, Search for the articles entitled: DHCP servers; DHCP defined; Planning DHCP networks; BOOTP and DHCP; Understanding relay agents; Understanding DHCP; Configuring scopes; To exclude an address from a scope; Cluster support for DHCP servers; and TCP/IP configuration methods.


41. You are the network architect for a manufacturing corporation. The servers on your network run Windows 2000 Advanced Server and belong to an Active Directory domain. Employees use computers running Windows NT 4.0 Workstation that belong to the same domain. Each employee's user account is configured to use a roaming profile, and the home directories of all employees reside on servers. You belong to a project team that is planning the rollout of Windows 2000 Professional. The current computers used by employees will be replaced with new computers. You recommend that the Remote Installation Service (RIS) be used to automate deployment of Windows 2000 Professional as well as required applications to the new computers. How should you recommend that RIS be used to automate the deployment process as well as minimize the amount of network traffic generated by the deployment effort?

A. Configure one computer running Windows 2000 Advanced Server as a Dynamic Host Configuration Protocol server. Configure a second computer running Windows 2000 Advanced Server as an RIS server. Create an image of Windows 2000 Professional and the required applications using the Remote Installation Preparation Wizard.
B. Configure a computer running Windows 2000 Advanced Server as a Dynamic Host Configuration Protocol server and an RIS server. Create an image of Windows 2000 Professional and the required applications using the Remote Installation Preparation Wizard.
C. Configure a computer running Windows 2000 Advanced Server as a Dynamic Host Configuration Protocol server and an RIS server. Create a CD-based image and an answer file. Use a Group Policy object to assign the required applications to the client computers.
D. Configure one computer running Windows 2000 Advanced Server as a Dynamic Host Configuration Protocol server. Configure a second computer running Windows 2000 Advanced Server as an RIS server. Create a CD-based image and an answer file. Use a Group Policy object to assign the required applications to the client computers.

>> !
Answer: B

To minimize network traffic, you should configure a computer running Windows 2000 Advanced Server as a Dynamic Host Configuration Protocol (DHCP) server and a RIS server and create an image of Windows 2000 Professional and the required applications using the Remote Installation Preparation Wizard. When DHCP and RIS are installed on the same computer, the client computer need only send one DHCPDiscover message and will receive a reply with both an IP address and information about the RIS server. If DHCP and RIS are installed on separate computers, additional network traffic is required. The Remote Installation Preparation Wizard is used to create an RIPrep image of a source computer on which Windows 2000 Professional and applications are installed. The RIPrep image contains only the files and registry keys needed for the defined configuration, so there is less information to copy to a client computer than there is when using a CD-based image.


42. You are one of the network designers for your enterprise. Your enterprise plans to implement an Active Directory infrastructure. Your network contains computers that run UNIX and the DNS Server service. Your design team has decided to maintain the existing DNS servers. To support Active Directory, the team will delegate responsibility for a zone for the Active Directory subdomain to ADDns1, a computer running Windows 2000 Advanced Server. The server Srv1 is the primary DNS server for the existing DNS domain of your enterprise. What records for ADDns1 must you define on Srv1 to ensure that requests to Srv1 for computers in the Active Directory zone can be resolved? (Choose two)

A. A canonical name record
B. A name server record
C. A start of authority record
D. A service locator record
E. An address record

>> !
Answer: B & E

You must define both an address (A) record and a name server (NS) record for ADDns1. If you define an NS record but not an A record, you will create a broken delegation. The nslookup command can be use to verify the integrity of the zone delegation. The NS record is sometimes referred to as a delegation record, and the A record is sometimes referred to as a glue record. You use a canonical name (CNAME) record to define an alias for a host or for multiple hosts. Each of the CNAME records must refer to an A record that contains the correct IP address for the host. You must define a start of authority (SOA) record on ADDns1 for the delegated zone. You use a service locator (SRV) record to locate servers that provide a specific service such as domain controllers, global catalog servers, and Lightweight Directory Access Protocol (LDAP) servers.


43. You are one of the network administrators for your corporation. The corporation contracts with 200 independent sales representatives who need access to internal corporate resources via the Internet. They use an application that relies on NetBIOS computer names, so you decide to install a Windows Internet Name Service (WINS) server in your corporate screened subnet. What ports must you enable on the firewall to support NetBIOS communications? (Choose three.)

A. 139/tcp
B. 161/upd
C. 445/tcp and 445/udp
D. 138/udp
E. 137/tcp and 137/udp
F. 389/tcp

>> !
Answer: A & D, E

You must enable ports 137/tcp, 137/udp, 138/udp, and 139/tcp. You enable ports 445/tcp and 445/udp to provide support for Common Internet File System (CIFS) communications. You enable port 389/tcp to provide support for the Lightweight Directory Access Protocol (LDAP). You enable port 161/upd to provide support for the Simple Network Management Protocol (SNMP).


44. Knowing what you do about this company, what do you feel its best routing strategy will be?

[view the scenario]

A. The best strategy would be to use Routing Information Protocol (RIP) version 1 on all router interfaces.
B. The best strategy would be to use Routing Information Protocol (RIP) version 2 on all router interfaces.
C. The best strategy would be to use Open Shortest Path First (OSPF) on all router interfaces.
D. The best strategy would be to use Internet Group Management Protocol (IGMP) on all router interfaces.
E. The best strategy would be to use static routes on all router interfaces.

>> !
Answer: B

Although the medical center doesn't have an excessive amount of subnets, they have strongly indicated that they want as much of the network configuration to be automated as possible. Because this is a smaller environment, RIP version 2 would be appropriate for use and would meet the automation requirements.Windows 2000 Help, Search for the articles entitleD. Routing overview; IP routing protocols; OSPF; OSPF design considerations; The OSPF environment; Deploying OSPF; RIP for IP; RIP-for-IP design considerations; Deploying RIP for IP; The RIP-for-IP environment; The static routed environment; Static routing design considerations; and Deploying static routing.


45. What is the minimum number of DNS servers that should be specified in the following design?

[view the scenario]

A. 0
B. 1
C. 2
D. 3
E. 4
F. 5
G. 6
H. 7
I. 8
J. 9

>> !
Answer: C

For fault tolerance purposes, the minimum number of DNS servers is always two. Designs will often require more than the minimum, however. In this case the performance and high availability needs of the network dictate that many more servers be used.


46. Given the medical center's need for high availability, what will you specify to meet the technical requirements for their web and SQL servers?

[view the scenario]

A. You will specify using load balancing for the IIS and SQL servers.
B. You will specify using load balancing for the IIS and clustering for the SQL Server computers.
C. You will specify using standalone servers for the IIS and SQL servers along with Round Robin DNS for fault tolerance.
D. You will specify using clustering for the IIS and SQL servers.

>> !
Answer: B

Microsoft Internet Information Server (IIS) supports load balanced clusters. Load balanced clustering is only available on Windows 2000 Advanced Server and Windows 2000 Datacenter server. Under this implementation, more than one server can be grouped together to form a load balanced cluster. If one of the servers fails or goes offline, this is detected and future client requests will be redirected to a server in the load balanced cluster that is still functioning. Any requests that are in the process of being fulfilled will fail and the client will need to resubmit the request, which will then be redirected. Under load balanced clustering, each of the computers that comprise the load balanced cluster access data from their own hard drive which may not contain the same data as hard drives in other computers of the load balanced cluster.
SQL server supports full clustering (also called server clusters). Server clustering is only available on Windows 2000 Advanced Server and Windows 2000 Datacenter server. The main task of a server cluster is to preserve access to data at all times. In order to participate in a server cluster, the application must be able to make use of the clustering API. Not all applications have this capability. Computers that participate in server clusters frequently share the same hard drive system.Windows 2000 Help, Search for the articles entitleD. Business scenarios; Planning your groups; Windows Clustering; and Choosing applications to run on a server cluster.


47. As a network manager for an enterprise, you are helping members of the Management Information Systems (MIS) staff plan an upgrade from Windows NT 4.0 servers to Windows 2000 servers. You learn that one of the computers running the Windows Internet Name Service (WINS) has a failed disk controller and has been removed from service. However, static entries for 50 computers running Windows NT Workstation 4.0 had been defined on that server and are still in the databases of two other WINS servers that have been upgraded to Windows 2000 Server. A new private Internet Protocol (IP) addressing scheme is being implemented, and you need to ensure that the existing static records are updated properly. Which feature of WINS should you use to allow the static records to be updated?

A. Block records
B. Extinction timeout
C. Manual tombstoning
D. Migrate on

>> !
Answer: D

You should use the "migrate on" feature, which will allow dynamic updates to replace existing static records. By default, this feature is disabled and WINS preserves static entries. You use the manual tombstoning feature to insure that records that are deleted from a WINS server are not replicated back to the WINS server from which the records are deleted. You use the "block records" feature to block replication of records from inactive WINS servers, but this removes the records rather than allowing them to be updated. You use the extinction timeout to define the amount of time between a record being marked as extinct and the record being eliminated from the WINS database.


48. As a consultant, you assist the Information Services staff members of one of your clients in planning an authentication strategy for their remote access clients. The remote access server is a computer running Windows 2000 that is a member of a Windows 2000 domain. The staff members plan to enable support for the Challenge Handshake Authentication Protocol (CHAP) in the remote access profile of one of their remote access policies. What step or steps should they take to ensure that clients who are configured to use CHAP can be authenticated?

A. Configure domain passwords to be stored using reversible encryption. Reset the passwords of users who will use CHAP.
B. Enable the Guest account on the Remote Access server.
C. Select the option "Do not require Kerberos preauthentication" on the Accounts tab in the Properties dialog box for each user who will use CHAP.
D. Add the group Everyone to the "Pre-Windows 2000 Compatible Access" domain group.

>> !
Answer: A

You should recommend that they configure domain passwords to be stored using reversible encryption and then reset passwords for the users who will use CHAP. You can configure the ability to store passwords using reversible encryption either by setting this option in each user's account or by enabling it in the Password Policy of a Group Policy Object (GPO) that is linked to the domain to which the user accounts are assigned. You add the group Everyone to the "Pre-Windows 2000 Compatible Access" domain group to allow computers running Windows NT 4.0 Server to access information in Active Directory. You do not need to take this step to enable support for CHAP. You should not recommend that they enable the Guest account because this will provide unauthenticated access. Although CHAP is not as secure as the Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), it is an authentication protocol and a user must have a valid user account and password to be authenticated. You select the option "Do not require Kerberos preauthentication" if the account object uses a different implementation of Kerberos than Windows 2000 uses.


49. Your enterprise installs the Windows Internet Name Service (WINS) on 6 computers running Windows 2000: NYWINS1, NYWINS2, and NYWINS3 are in the New York office and LAWINS4, LAWINS5, and LAWINS6 are in the Los Angeles office. There is a 56 Kilobits per second (Kbps) connection between the offices in New York and Los Angeles that is operating at about 85% capacity. You ensure that the option Replicate Only With Partners is set on each WINS server. How should you configure the WINS replication partnerships?

A. Configure NYWINS1 as push and pull partners of NYWINS2, NYWINS3, and LAWINS4. Configure LAWINS4 as push and pull partners of NYWINS1, LAWINS5, and LAWINS6.
B. Configure each WINS server as push and pull partners of the other five WINS servers.
C. Configure NYWINS1 and LAWINS4 as push and pull partners of each other. Configure NYWINS2 and LAWINS5 as push and pull partners of each other. Configure NYWINS3 and LAWINS6 as push and pull partners of each other. Configure each WINS server as push and pull partners of the other WINS servers in its city.
D. Configure each WINS server in Los Angeles as push and pull partners of the other 2 WINS servers in Los Angeles. Configure each WINS server in New York as push and pull partners of the other 2 WINS servers in New York. Configure NYWINS1 and LAWINS4 as push and pull partners of each other.

>> !
Answer: D

You should configure each WINS server in Los Angeles as push and pull partners of the other 2 WINS servers in Los Angeles, configure each WINS server in New York as push and pull partners of the other 2 WINS servers in New York, and configure NYWINS1 and LAWINS4 as push and pull partners of each other. This will keep the servers in each site up to date with each other. Allowing just NYWINS1 and LAWINS4 to exchange information will help minimize the wide area network (WAN) traffic. Also, you should configure the value of the pull interval so that replication across the WAN link does not interfere with other WAN traffic. You should not configure NYWINS1 as push and pull partners of NYWINS2, NYWINS3, and LAWINS4 and configure LAWINS4 as push and pull partners of NYWINS1, LAWINS5, and LAWINS6. This solution does not keep NYWINS2 and NYWINS3 (and LAWINS5 and LAWINS6) as up to date with each other as the first solution. You should not configure each WINS server as push and pull partners of the other 5 WINS servers as this would potentially impact the WAN link. You should not configure each WINS server in Los Angeles as a push and pull partner of a WINS server in New York with each server a partner of both other WINS servers in its city. This configuration could negatively impact the WAN link.


50. As you look over the design specifications for DSI you ponder the background information that the company provided. What stands out as the three most significant problems that need to be addressed?

[view the scenario]

A. The fact that the network needs to be upgraded stands out and needs to be addressed.
B. The amount of downtime that the network is currently experiencing stands out and needs to be addressed.
C. The poor performance that the network is currently exhibiting stands out and needs to be addressed.
D. The network's lack of scalability stands out and needs to be addressed.
E. The fact that the network is very hard to manage stands out and needs to be addressed.
F. The network's current lack of usability stands out and needs to be addressed.
G. The fact that sensitive company data is being lost to hackers.

>> !
Answer: B, E & G

The company has stated that a "driving goal" of the project is increasing the manageability of the network. In addition, network downtime is rarely unacceptable. This is especially true in an environment where the company has stressed the need to use redundancy to minimize downtime. Finally, the loss of sensitive company data to network security breaches is also a serious issue.


51. You have been hired as a consultant to assist a corporation with designing an Active Directory architecture and network infrastructure. While analyzing the current network and the corporation's plans for integrating Windows 2000 into its network, you learn that the corporation has a remote office at which 40 employees work. You learn from management that the computers at this office should be members of the corporation's Windows 2000 domain and that the employees should have access to resources both from the corporate headquarters office and from the Internet. You recommend that a computer running Windows 2000 Server and configured as a dial-on-demand router be installed. Which two protocols can be supported with this configuration that you could not support by implementing Network Address Translation (NAT)? (Choose two)

A. Internet Protocol Security (IPSec)
B. File Transfer Protocol (FTP)
C. Remote Procedure Call (RPC)
D. Point-to-Point Tunneling Protocol (PPTP)
E. Kerberos

>> !
Answer: A & E

NAT cannot process Kerberos and IPSec traffic because it cannot manipulate the IP address information properly for these protocols. IP information is stored in the encrypted portion of these packets and the IP information cannot be modified, therefore, the packets needed to negotiate security cannot pass through NAT. FTP headers contain IP address information, but a built-in NAT editor is used to modify the information stored outside of IP, Transmission Control Protocol (TCP), and User Datagram Protocol (UPD) headers. PPTP packets contain IP-related information that is stored outside of the IP, TCP, and UDP headers, but NAT includes a built-in NAT editor to modify the related information. RPC stores IP-related information outside of the IP, TCP, and UDP headers, but NAT includes proxy software to manage RPC packets.


52. You are designing a remote access solution for your corporation. The corporation has four computers running Windows 2000 Server on which Routing and Remote Access has been enabled. The computers are configured as remote access servers and are members of your corporation's Windows 2000 domain. You design three remote access policies to be deployed for use throughout the domain. You want to centralize the administration of the remote access policies. What procedure should you use to centralize the administration?

A. Create a security template. Use the Security Configuration and Analysis utility on each of the remote access servers to import the template and configure each of the servers.
B. Install the Internet Authentication Service (IAS) on a computer running Windows 2000 Server and configure all remote access clients to connect to the IAS server. Copy the remote access policies to the IAS server.
C. Design a Group Policy object (GPO). Link the GPO to the Organizational Unit (OU) or OUs to which the computer accounts for the remote access servers belong.
D. Install the Internet Authentication Service (IAS) on a computer running Windows 2000 Server. Copy the remote access policies to the IAS server and configure the remote access servers as clients of the IAS server.

>> !
Answer: D

You should install IAS on a computer running Windows 2000 Server, copy the remote access policies to the IAS server, and configure the remote access servers as clients of the IAS server. You can use the netsh command-line utility to copy remote access policies to the IAS server. IAS is Microsoft's implementation of the Remote Authentication Dial-In User Service (RADIUS). A RADIUS server provides both authentication and accounting services for remote access servers. You cannot manage remote access policies with a GPO, so you should not design a GPO and link it to the appropriate OUs. Remote access policies are stored on each remote access server or on an IAS server. You cannot manage remote access policies by using a security template to configure a remote access server. The Security Configuration and Analysis utility allows you to import templates to a security database, compare the current security settings on a computer to the database, and configure the server using the settings in the database. You should not configure all remote access clients to connect to the IAS server. A computer on which IAS is installed may not also be configured as a remote access server. IAS is a service used by remote access servers, not by remote access clients.


53. You are a network administrator for a corporation whose headquarters are in the United States. The corporation recently acquired a manufacturing facility in Paris, France. You need to design an Internet Protocol Security (IPSec) policy to protect data being transferred between headquarters and a group of research scientists at the new facility. Which authentication protocol and encryption algorithm should you use?

A. Secure Hash Algorithm and 56-bit Data Encryption Standard
B. Message Digest 5 and Triple Data Encryption Standard
C. Secure Hash Algorithm and 40-bit Data Encryption Standard
D. Message Digest 5 and 56-bit Data Encryption Standard

>> !
Answer: C

Since encrypted data is being transferred to and from France, you can only use the 40-bit Data Encryption Standard (DES). You can use either the Message Digest 5 (MD5) or Secure Hash Algorithm (SHA) authentication protocols. MD5 uses a 128-bit key. SHA uses a 160-bit key. SHA provides a higher level of security but incurs more processing overhead than MD5. 40-bit DES uses a 40-bit key. 56-bit DES uses a 56-bit key. Triple DES (3DES) uses a 128-bit key. The longer the key, the more secure the data is but this data security is at the expense of additional processor overhead. You cannot transfer data into or out of France if the data is encrypted with 56-bit DES or Triple DES.


54. You are designing a virtual private network (VPN) solution for your corporation. Management has decided that only 15 employees should have access to the VPN. You recommend that a domain local security group named VPN-Access be created in the corporation's Windows 2000 domain. VPN-Access should contain the user accounts of the 15 employees. You recommend that Routing and Remote Access be enabled on a computer running Windows 2000 server and that the computer be configured as a VPN server. You recommend that the option "Control access through remote access policy" be enabled for each of the user accounts in VPN-Access and that the default remote access policy be deleted. What else should you recommend that the network administrators do to limit access to the VPN to only members of VPN-Access?

A. Create a remote access policy and set the condition Windows-Groups to VPN-Access in the policy.
B. Create a remote access policy and configure the permissions of the remote access policy object to allow Read only to VPN-Access.
C. Create a remote access policy and configure the remote access profile associated with the policy to allow access only to VPN-Access.
D. Configure the remote access server to use only EAP-TLS authentication.

>> !
Answer: A

You should recommend that the administrators create a remote access policy and set the condition Windows-Groups to VPN-Access in the policy. This will allow only those who are members of VPN-Access to use the policy. Since this is the only policy, the connection parameters of other users who attempt to access the VPN will not match the policy and they will be denied access. You cannot control access via permissions on the remote access policy object or by configuring the remote access profile associated with a remote access policy. You do not need to use only EAP-TLS authentication. Other methods of authentication can be used as long as the remote access policy is configured correctly.


55. The company is concerned about the security of their DHCP infrastructure. Which of the following will your design call for that will increase the security of the DHCP infrastructure and reduce the risk of having unauthorized DHCP servers on the network? (Select all that apply.)

[view the scenario]

A. Your design will call for adding all user accounts to the DHCP Users group.
B. Your design will call for adding all user accounts to the DHCP Administrators group.
C. Your design will call for installing the DHCP service only on domain controllers.
D. Your design will call for adding members of the Regional administrator teams to the DHCP Administrators group.
E. Your design will call for adding members of the Regional administrator teams to the DHCP Users group.
F. Your design will call for replacing all DHCP servers on the network with Windows 2000 based DHCP servers.
G. Your design will call for replacing all DHCP servers on the network with Windows based DHCP servers.

>> !
Answer: D & F

The Windows 2000 DHCP server service installs two groups that can be used for DHCP management. The DHCP User group provides its members with the ability to view but not alter DHCP server service configuration data. Membership in the DHCP Administrators group allows users to fully administer the DCHP server service, but not the actual Windows 2000 server that hosts the service. Because Regional administrator teams will be allowed to manage DHCP information, they should be added to the DHCP Administrators group in their region's domain.Windows 2000 Help, Search for the article entitled: New features.


56. You are designing a remote access solution for a corporation. You recommend that a computer running Windows 2000 Advanced Server be configured as a remote access server. Client computers include computers running Windows 2000 Professional and computers running Windows NT 4.0 Workstation. The solution should provide the most secure form of authentication that can be used by all the client computers for dial-up connections. Also, users must be able to encrypt the data that is sent between the clients and the remote access server. Which authentication protocol should you recommend as part of the remote access solution?

A. MS-CHAP
B. PAP
C. MD5-CHAP
D. MS-CHAP v2

>> !
Answer: A

You should recommend Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), since it provides the most secure form of authentication that can be used for dial-up connections from Windows NT 4.0 and Windows 9x clients. It also allows the client and server to encrypt data using Microsoft Point-to-Point Encryption (MPPE). The Password Authentication Protocol (PAP) is the least secure protocol listed due to its use of clear-text passwords. Message Digest 5 Challenge Handshake Authentication Protocol (MD5-CHAP), also known as CHAP, does not support data encryption. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2), supports authentication of Windows NT 4.0 and Windows 98 clients for VPN connections, but not for dial-up connections.


57. You have been hired as a network consultant by the Information Services (IS) department chairperson of a college. You learn that a Windows 2000 domain has been implemented at the college. You also learn that an additional domain controller is being added to the subnet where computers in the biology research lab are installed. The IS chairperson reports that all traffic between this domain controller and the domain controller installed on the IS department subnet should be encrypted. What should you recommend about the use of Internet Protocol Security (IPSec) to protect this traffic?

A. Use an IPSec policy that includes a rule configured for transport mode. Configure the rule to use certificates for authentication.
B. Use an IPSec policy that includes a rule configured for tunnel mode. Configure the rule to use certificates for authentication.
C. Use an IPSec policy that includes a rule configured for transport mode. Configure the rule to use Kerberos for authentication.
D. Use an IPSec policy that includes a rule configured for tunnel mode. Configure the rule to use Kerberos for authentication.

>> !
Answer: A

You should use an IPSec policy that includes a rule configured for transport mode. Configure the rule to use certificates for authentication. You should create a filter list that manages all traffic from the IP address of one domain controller (DC) to the other DC and mirror it for traffic in the other direction. Since you want to encrypt all traffic between the DCs, you should use certificate authentication. Kerberos cannot be protected with IPSec transport filters. Multiple connections in transport mode can be active simultaneously on a computer. You use tunnel mode to protect data traveling between two networks across an unsecured network. Only one tunnel mode connection can be active at a time on a computer.


58. You are the network architect for your corporation. You decide to implement ISA Server, Enterprise Edition on a single computer running Windows 2000 Advanced Server to optimize access to Internet resources for your corporation's employees. The computer is a member of a Windows 2000 domain. You want to ensure that the configuration details of the ISA Server are stored in Active Directory. What step should you take?

A. Include the server in a Network Load Balancing (NLB) cluster.
B. Define the Domain Name System (DNS) resource records for the ISA Server in an Active Directory-integrated zone.
C. Establish a proxy array.
D. Configure the ISA Server to use Active Caching.

>> !
Answer: C

You should establish a proxy array. This ensures that the configuration information for the ISA Server, Enterprise Edition is stored in Active Directory. It also positions the server to support expansion as needed by allowing more servers to be added to the array. Including the server in an NLB cluster does not store the configuration information in Active Directory. Defining DNS resource records for the ISA Server in an Active Directory-integrated zone insures that the DNS information is stored in Active Directory. It does not provide storage of ISA Server configuration information in Active Directory. Configuring the ISA Server to use Active Caching allows the server to update the contents of the proxy cache automatically as resources allow.


59. You have been hired as a network consultant by the Chief Information Officer (CIO) of an enterprise that manufactures automobile parts in factories throughout the world. One of your tasks is to plan the Internet Protocol (IP) address configuration for the enterprise. You recommend that they use addresses from the private IP address block 172.16.0.0/12. You want to define a single subnet mask to be used throughout the enterprise. You need to plan for future growth up to 500 subnets with at most 2000 hosts on each subnet. Which subnet mask should you use?

A. 255.255.240.0
B. 255.255.248.0
C. 255.255.224.0
D. 255.255.252.0

>> !
Answer: B

You should use the subnet mask 255.255.248.0. This reserves nine bits for the subnet identifier and eleven bits for the host identifier. Nine bits will allow you to define up to 510 subnets. Eleven host bits will allow you to define up to 2046 hosts on each subnet. The subnet mask 255.255.224.0 only supports 126 subnets. The subnet mask 255.255.240.0 only supports 254 subnets. The subnet mask 255.255.252.0 only supports 1022 hosts per subnet. Note: If your routers and hosts support the all-zeros and all-ones subnets, you can define up to 512 subnets with the subnet mask 255.255.248.0, 128 subnets with the subnet mask 255.255.224.0, and 256 subnets with the subnet mask 255.255.240.0. Hosts and routers running Windows 2000 Server or Professional support these special subnets.


60. You have been retained as a network consultant by a telecommunications enterprise. The enterprise has grown steadily over the last three years by acquiring companies that have developed technologies that complement the existing technologies of the enterprise. Management reports that growth will continue over the next two years at least. You recommend that a planned electronic commerce web site for the combined businesses be implemented on a set of clustered computers running Windows 2000 Advanced Server to maximize reliability and performance. You also recommend that related services be implemented on the cluster to enhance performance. Which related service must be manually reconfigured on another server in the cluster if the primary server for the service fails?

A. Dynamic Host Configuration Protocol (DHCP)
B. Windows Internet Name Service (WINS)
C. Proxy Server
D. Domain Name System (DNS)

>> !
Answer: D

DNS is not a cluster-aware application, so you must manually enable the DNS server service on another computer in the cluster if the server on which DNS is running fails. You can minimize the time needed to bring the other server online if you store the DNS zone files on the cluster drive. DHCP, WINS, and Proxy Server are all cluster-aware applications. If the primary server for any of these services fails, another server in the cluster provides automatic failover support.


61. You are a member of the Information Technology (IT) team responsible for the network infrastructure of your corporation. Management has approved allowing 50 employees to work from home 2 days a week. You have caller identification hardware that is compatible with a computer running Windows 2000 Server on which Routing and Remote Access has been enabled. The server is configured as a remote access server. You configure the server to support Automatic Number Identification/Calling Line Identification (ANI/CLI). You create a user account for each of the phone numbers from which calls will be accepted. You create a remote access policy to support these ANI/CLI connections. Which option should you enable on the Authentication tab of the remote access profile for the policy?

A. Unencrypted authentication
B. Unauthenticated access
C. Encrypted authentication
D. MD5-challenge authentication

>> !
Answer: B

You should enable support for unauthenticated access on the Authentication tab of the remote access profile for the policy. Since a user name and password are not sent when an ANI/CLI connection is made, you must allow unauthenticated access. You also configure the User Identity setting for remote access policies in the registry to direct the remote access server or Internet Authentication Service (IAS) server to use the number from which the user is calling as the user identity. You enable support for unencrypted authentication when you need to support clients that use the Password Authentication Protocol (PAP). Passwords are transmitted in a plaintext or clear-text format with PAP. You enable support for encrypted authentication when you support clients that use either Challenge Handshake Authentication Protocol (CHAP) or Microsoft Challenge Handshake Authentication Protocol (MS-CHAP).
Both of these protocols encrypt passwords. You may enable support for Message Digest 5 (MD5) - Challenge when you enable support for the Extensible Authentication Protocol (EAP). This protocol is used to validate the connection during the connection authentication phase of establishing a connection to a remote access server.


62. As a consultant for an advertising agency, you are helping your client design a network infrastructure to support a new Web site. The agency has implemented an Active Directory domain and plans to use computers running Windows 2000 Advanced Server to support the Web site and related resources. Members of the agency report that the content they would like to use for the web site currently resides on 4 servers. You recommend that a Distributed File System (Dfs) hierarchy be created to provide access to the existing content. You also recommend that a virtual directory that references the Dfs hierarchy be created as part of the Web site. What steps should you take when configuring the Dfs root to provide redundancy in case the original server on which the Dfs root is created becomes inoperable?

A. Create a domain-based Dfs root and create one or more root replicas.
B. Create a standalone Dfs root and create replicas of each child node in the hierarchy.
C. Create a domain-based Dfs root and create replicas of each child node in the hierarchy.
D. Create a standalone Dfs root and create one or more root replicas.

>> !
Answer: A

You should create a domain-based Dfs root and create one or more root replicas. When you create a domain-based Dfs root, the Dfs configuration information is stored in Active Directory so it is available from any domain controller. This configuration information includes the Dfs topology. A domain-based Dfs root can be created on a Windows 2000 domain controller or on a computer running Windows 2000 Server or Advanced Server that is a member of a Windows 2000 domain. When you create a root replica, the content of the folder that is used as the root folder of the Dfs hierarchy is replicated to another server. Thus, if the original server becomes unavailable, the content of the root folder is still accessible. You can have up to 32 replicas of the root. You should not create a standalone Dfs root because the configuration information for a standalone Dfs root resides only on that root server.
Also, you cannot create replicas of the root folder for a standalone Dfs root. You should not create a domain-based Dfs root and create replicas of each child node in the hierarchy if you want to provide redundancy for the Dfs root itself. Although this solution stores the topology in Active Directory, this solution does not make a redundant copy of the root folder available.


63. You are a network architect for your corporation. You learn that the corporation has acquired a company that does business as a marketing research facility. The computers at the office that houses the research facility currently access the Internet through a 56 Kilobit per second (Kbps) line to an Internet Service Provider (ISP). The ISP hosts a File Transfer Protocol (FTP) server that allows employees of the facility to share files with research partners. Most of the employees at the new facility are researchers who do their research on Web and FTP sites throughout the Internet. They report that access to these sites is often slow. You learn that the employees primarily use 10 key web sites for data. Managers of your corporation ask you to rework the network at the new facility to improve access times to the key sites and to move the FTP services from the ISP to the new office. A budget has been approved to upgrade the servers at the new office to Windows 2000 Advanced Server and to purchase additional software, as needed. The client computers will continue to use Windows 98. Which Microsoft technology should you recommend?

A. Network Address Translation (NAT)
B. Internet Connection Sharing (ICS)
C. Proxy Server
D. Windows Load Balancing

>> !
Answer: C

You should recommend that Proxy Server be implemented both to improve access to external web sites and to support an external FTP server. With Proxy Server caching can be enabled to cache data and improve access to the content of the web and FTP sites that the employees use for research. The Proxy Server can also provide access to the internal FTP server. The client computers should be configured as proxy clients. Proxy Server is not included with Windows 2000, but management has approved the purchase of additional hardware and software. You should not recommend that NAT be implemented. NAT could be used to support an internal FTP server, but it will not serve to improve access to Internet resources. You should not recommend that ICS be implemented since it cannot be used to support an internal FTP server. You should not recommend that Windows Load Balancing be implemented. Windows Load Balancing helps to improve access to content on the servers on which Windows Load Balancing is implemented. It does not improve access to content on external servers.


64. You are the network architect for your corporation. One of the branch offices of the corporation uses a T1 line to connect to the headquarters office. You decide to assign addresses to computers at the branch office from a computer running Windows 2000 Server and the Dynamic Host Configuration Protocol (DHCP) server service at the headquarters office. You have three computers running Windows 2000 Server and the Domain Name System (DNS) server service. One of the DNS servers is at the branch office and two are at the headquarters office. All of the DNS zones are configured to accept dynamic updates. The DHCP server is configured to send dynamic updates. Where should you define the list of DNS servers to which the DHCP server will send dynamic updates?

A. In the DHCP scope options.
B. In the Properties dialog box of the DHCP server in the DHCP console.
C. In the Properties dialog box of the DHCP scope in the DHCP console.
D. In the TCP/IP properties of the DHCP server.

>> !
Answer: D

You should define the list of DNS servers in the TCP/IP properties of the DHCP server. If the DNS server that is authoritative for the zone in which the client's resource record is stored is not listed, the DNS servers that are listed will refer the request to the DNS server that is authoritative for the zone. You define DNS servers to be used by the DHCP clients in the DHCP scope options. You use the Properties dialog box of either the DHCP server or the DHCP scope in the DHCP console to configure the interaction between DHCP and DNS. Parameters that you can configure include when to automatically update DHCP client information in DNS and whether or not to update information for DNS clients that do not support dynamic updates.


65. You have been hired as a network consultant by the Chief Information Officer (CIO) of an enterprise that manufactures automobile parts in factories throughout the world. You learn that the enterprise has computers running Windows 2000 Server, Windows 2000 Professional, Windows 95, and OS/2 with LAN Manager 2.2c in one of the factories. The computers are all on the same subnet. You need to insure that applications on the OS/2 client that use NetBIOS names are able to resolve the NetBIOS names to IP. You recommend that the Windows Internet Name Service (WINS) be installed on one of the computers that is running Windows 2000 Server. What step should you suggest that the network administrator take to enable applications on the computer running OS/2 to resolve names to IP addresses from the WINS database?

A. Configure one of the computers running Windows 2000 Professional as a WINS proxy.
B. Configure a static mapping for the OS/2 client in the WINS database.
C. Configure the IP address of the WINS server in the TCP/IP parameters of the OS/2 client.
D. Create an LMHOSTS file on the computer running OS/2 with an entry for the WINS server.

>> !
Answer: A

You should recommend that the network administrator configure one of the computers running Windows 2000 Professional as a WINS proxy. A WINS proxy is a computer that responds to NetBIOS name resolution broadcasts. If the WINS proxy does not have a mapping of the requested name to an IP address in its NetBIOS name cache, it sends a request to the configured WINS server. Once it receives a response from the WINS server, it can reply to the original requester. WINS does not support LAN Manager for OS/2 as a WINS client, so you cannot configure the IP address of the WINS server in the TCP/IP properties of the client. Configuring a static mapping for the OS/2 client in the WINS database will not allow applications on the OS/2 client to resolve NetBIOS names to IP addresses. Configuring a static mapping will allow other computers to determine the IP address of the OS/2 client. You should not create an LMHOSTS file on the computer running OS/2 with an entry for the WINS server. This would not enable the client to send name resolution requests to the WINS server.


66. You have been hired as a network consultant for a corporation that manufactures copy machines. The corporation has implemented a Windows 2000 domain. You learn that Windows Internet Name Service (WINS) servers are located in Dallas, Texas, and Tacoma, Washington, at the two main offices of the corporation. The servers are configured as replication partners, and each WINS server is configured as a secondary WINS server for computers at the remote office. There are 1400 computers at the Dallas office and 450 computers at the Tacoma office, all configured as WINS clients. Users typically power down their computers each Friday and restart them about 8:00 a.m. on Monday. You discover that some of the computers in Dallas register with the WINS server in Tacoma when starting up on Monday mornings. What should you recommend that the network administrators do to increase the likelihood that the computers in Dallas will register their names with the WINS server in Dallas?

A. Modify the maximum number of records verified each period on both WINS servers.
B. Modify the extinction interval on both WINS servers.
C. Modify the renewal interval on the WINS server in Dallas.
D. Modify the burst handling setting on the WINS server in Dallas.

>> !
Answer: D

You should recommend that they modify the burst handling setting on the WINS server in Dallas to Low. This will allow the server to respond more quickly to registration requests when the demand is high. Burst handling enables a WINS server to issue short leases to clients without registering the names of the clients in the WINS database. When the clients send renewal requests, if the load on the server has decreased, it then issues normal leases and registers the names in the database. By setting the value of burst handling to Low, the burst handling will be triggered once 300 requests are queued. The default setting of Medium triggers burst handling when 500 requests are queued. A setting of High triggers burst handling when 1000 requests are queued. You use the extinction interval to define the period between the time an entry is marked in the WINS database as released and the time it is marked as extinct. When an entry is marked as extinct, it may then be removed from the database after the amount of time configured as the extinction timeout. You define the maximum number of records verified each period to govern the number of records in the database of a WINS server that are compared to the records in the database of the WINS server that owns the records. This setting is used when WINS servers are configured as WINS replication partners. You define the renewal interval to set the amount of time for which a name registration is valid.


67. You have recently been hired as the network architect for a corporation that has manufacturing facilities and offices in four countries. You work with the Directory Services design team to determine the appropriate Domain Name System (DNS) solution for an Active Directory implementation. The forest root domain, corp.com, is already established. The DNS zone for corp.com is an Active Directory integrated zone. The DNS server service is installed on three of the five domain controllers configured for corp.com - DC1, DC2, and DC3. The zone corp.com is the only zone hosted on DC1, DC2, and DC3. The next step in the implementation of Active Directory is to establish a child domain for the facilities in Europe. The domain name for this domain is europe.corp.com. You recommend that the DNS zone for europe.corp.com also be configured as an Active Directory-integrated zone and that the DNS server service be installed on DCEU1, the domain controller for europe.corp.com. Authority for europe.corp.com will be delegated to DCEU1. You recommend that the Preferred DNS server field in the TCP/IP properties for each domain controller be configured with that domain controller's address. What should you do to insure that DCEU1 can efficiently resolve requests for names in the domain corp.com?

A. Configure DC1, DC2, or DC3 as a master name server for DCEU1.
B. Configure DC1, DC2, and DC3 in the root hints of DCEU1.
C. Configure DC1, DC2, and DC3 as alternate DNS servers for DCEU1.
D. Configure DC1, DC2, or DC3 as a forwarder for DCEU1.

>> !
Answer: D

You should configure DC1, DC2, or DC3 as a forwarder for DCEU1. A forwarder is a DNS server to which a DNS server forwards queries. For example, if DC1 is configured as a forwarder for DCEU1, and DCEU1 receives a query that it cannot answer from its own set of records or the information in the DNS server cache, it forwards the query to DC1 for resolution. You should not configure DC1, DC2, or DC3 as a master name server DCEU1 because the servers host separate zones. A master name server is either a primary or a secondary name server for a zone from which a secondary name server can receive zone transfers. You should not configure DC1, DC2, and DC3 in the root hints of DCEU1, since DC1, DC2, and DC3 do not host a root zone. On all the DNS servers, the root hints should contain information about the name servers that host the root zone on the internet. This information is loaded by default from the preconfigured file cache.dns. You should not configure DC1, DC2, and DC3 as alternate servers for DCEU1. You configure an alternate server to allow the DNS resolver to contact a second server if the resolver cannot contact the primary DNS server. The DNS server service does not use this information to locate an alternate server.


68. You have recently been hired as the network architect for a corporation that has manufacturing facilities and offices in three cities in the United States. While analyzing the existing network, you learn that the company recently acquired a new facility in Miami, Florida. There is a computer named WINSB running Windows 2000 Advanced Server and the Windows Internet Name Services (WINS) at the new facility. In the corporation's facility in Denver, Colorado, the server WINSA is running Windows 2000 Advanced Server and WINS. All of the client computers in the Denver and Miami facilities are clients of their local Dynamic Host Configuration Protocol (DHCP) server. Employees in Denver and Miami will need to access computers in both cities, so you recommend that each DHCP server be configured to assign the address of the local WINS server as the primary WINS server and the remote WINS server as the secondary WINS server for addresses leased to clients. The offices will be connected by a 256 Kilobit per second (Kbps) line, so you want to minimize the amount of traffic used for WINS replication. What should you recommend as the replication configuration for WINSA and WINSB?

A. Configure WINSA and WINSB as push partners of each other. Configure updates to occur after every 30 changes.
B. Configure WINSA as a push partner of WINSB. Configure WINSB as a pull partner of WINSA. Configure WINSA to request changes beginning at 6:00 p.m. and every twelve hours after that.
C. Configure WINSA as a pull partner of WINSB. Configure WINSB as a push partner of WINSA. Configure WINSB to request changes beginning at 6:00 p.m. and every twelve hours after that.
D. Configure WINSA and WINSB as push and pull partners of each other. Configure WINSA to request changes beginning at 6:00 p.m. and every twelve hours after that. Configure WINSB to request changes beginning at 7:00 p.m. and every twelve hours after that.

>> !
Answer: D

You should recommend that WINSA and WINSB be configured as push and pull partners of each other. Each server should be configured to request updates during non-business hours or when traffic across the 256 Kilobit line is lowest. As push and pull partners, each server should be configured to contact its partner for updates or both databases will not stay up to date. You should recommend that the network administrator set the number of changes that will trigger a replication to a value greater than the number of updates the normally occur every twelve hours. This will help to ensure that replication happens primarily at the defined intervals. You should not recommend that WINSA and WINSB be configured as only push partners of each other because you will not be able to manage when replication occurs. Also, one must be a push partner and the other a pull partner to establish replication. You should not recommend that WINSA be configured only as a push partner of WINSB and WINSB as a pull partner of WINSA. In this configuration, changes on WINSA will not be replicated to WINSB. You should not recommend that WINSA be configured only as a pull partner of WINSB and WINSB as a push partner of WINSA. In this configuration, changes on WINSB will not be replicated to WINSA.


69. You have recently been hired as the network architect for a corporation that has manufacturing facilities and offices throughout the United States. While analyzing the existing network, you learn that the current backup procedure for domain controllers running Windows NT Server 4.0 is to do a normal backup each Friday and Tuesday and an incremental backup each of the other days, including weekends. The domain controllers will be upgraded to Windows 2000 Server to create a Windows 2000 domain. You want to ensure that the domain controllers can be recovered if any key system data becomes corrupt. You develop procedures to use a batch file to run the ntbackup utility with the systemstate switch. Which two types of backup should you use in the batch file when saving system state data? (Choose two)

A. Incremental
B. Differential
C. Daily
D. Normal
E. Copy

>> !
Answer: D & E

When you select the option systemstate, you must use normal or copy as the backup type. An incremental backup only saves data that has been modified since the last normal or incremental backup. A differential backup only saves data that has been modified since the last normal or incremental backup. A daily backup only saves data that has been modified on the day the backup is being done. When backing up system state data, you must back up all of the system state data to insure consistency, so incremental, differential, and daily backup types are not supported.


70. You have recently been hired as the network architect for an enterprise that has manufacturing facilities and offices in three countries. You work with the Directory Services design team to determine the appropriate Domain Name System (DNS) configuration for an Active Directory implementation that is currently in the planning stage. You learn that the enterprise uses a proxy server to access computers on the Internet. Internal communications are done over leased digital lines. You work with members of the Directory Services design team to set up a test lab to emulate the planned production environment. You install the DNS Server service on three computers running Windows 2000 Server: DNSSrv1, DNSSrv2, and DNSSrv3. You configure DNSSrv1 to host the DNS domain company.com. DNSSrv2 will host the DNS domain europe.company.com. DNSSrv3 will host the DNS domain asia.company.com. The design team plans to create three Active Directory domains using these DNS domain names. What steps should you take to enable all three DNS servers to resolve names for all of the computers in the Windows 2000 domains?

A. Create a root zone on DNSSrv1. Configure the cache.dns file on DNSSrv2 and DNSSrv3 with name server records for DNSSrv1.
B. Configure the cache.dns file on DNSSrv1 with name server records of the computers that maintain the root DNS domain for the Internet. Configure the cache.dns file on DNSSrv2 and DNSSrv3 with name server records for DNSSrv1.
C. Create a root zone on DNSSrv1, DNSSrv2, and DNSSrv3. Configure the cache.dns file on each DNS server with name server records for the other two DNS servers.
D. Create a root zone on DNSSrv1. Configure the cache.dns file on DNSSrv1 with name server records for DNSSrv2 and DNSSrv3.

>> !
Answer: A

Since the company is using a proxy server to access the Internet, private Internet Protocol (IP) addresses are used for internal communications. You should configure a root zone on DNSSrv1 since these DNS servers will be used to resolve internal names. You should also configure the cache.dns file on DNSSrv2 and DNSSrv3 with name server records for DNSSrv1 instead of the default name server records for computers that maintain the root DNS domain for the Internet. You should also insure that the Root Hints tab in the Properties dialog box of DNSSrv1 in the DNS Manager does not contain entries for the computers that maintain the root DNS domain for the Internet. You can also do this by deleting the default records in the cache.dns file. You should not create root zones on DNSSrv2 or DNSSrv3 nor should you configure the cache.dns file on DNSSrv1 with name server records of the other DNS servers.


71. You have recently been retained as a network consultant for a web-based information resource enterprise that specializes in publishing medical research data. You learn that management has approved the acquisition of a cluster of four servers running Windows 2000 Advanced Server. Management asks you to determine which service should be installed on the cluster to benefit from the load balancing feature of Windows 2000. What service should you recommend be installed on the clustered servers to take advantage of load balancing?

A. Dynamic Host Configuration Protocol (DHCP)
B. Domain Name System (DNS)
C. Proxy Server
D. Windows Internet Name Service (WINS)

>> !
Answer: C

Proxy Server would benefit the most from load balancing. DNS can be configured with a single Internet Protocol (IP) address for the cluster. Once an external client attempts to connect to this IP address, one of the servers in the cluster responds to the request, alternating the load among the servers. DHCP and WINS are cluster-aware services that benefit primarily from the failover services of a cluster rather than from the load balancing services. DNS is not a cluster-aware application, so you must manually enable the DNS server service on another computer in the cluster if the server on which DNS is running fails. You can minimize the time needed to bring the other server online if you store the DNS zone files on the cluster drive.


72. You manage the servers for the Sales department of your corporation. The Information Technology department implemented Active Directory for the corporation with permissions compatible only with Windows 2000 servers. All users in the corporation have been given user accounts in the corporation's Windows 2000 mixed-mode domain. There are three Windows 2000 domain controllers and two Windows NT 4.0 Backup Domain Controllers (BDCs) in the domain. The servers and laptop computers in the Sales department run Windows NT 4.0 and cannot be upgraded to Windows 2000 until the completion of a current project. When employees of the Sales department dial in to RAS10, the Routing and Remote Access Service server that is running Windows NT 4.0 Server for their department, they are not consistently able to make a successful connection. The latest service packs are installed on RAS10. What step should you or your domain administrator take to enable the users to make a successful connection to RAS10 consistently?

A. Configure support for Microsoft Handshake Authentication Protocol version 2 (MS-CHAP v2) on RAS10.
B. Add the computer accounts for the BDCs to the RAS and IAS Servers group.
C. Add the computer accounts for the Sales department's laptops to the Pre-Windows 2000 Compatible Access domain group.
D. Add the group Everyone to the Pre-Windows 2000 Compatible Access domain group.

>> !
Answer: D

You should add the group Everyone to the "Pre-Windows 2000 Compatible Access" group. The Routing and Remote Access Service on the computer running Windows NT 4.0 Server uses the LocalSystem account. This account cannot be used to establish a Null session with a domain controller running Windows 2000 Server when the domain is configured to use permissions compatible with Windows 2000 servers only. The account can be used to establish a Null session to a BDC running Windows NT 4.0 Server. Therefore, when RAS10 contacts a BDC to authenticate a user, the connection can be established successfully because the BDC can verify the user's dial-in access in its local Security Accounts Manager (SAM) database. When RAS10 contacts a domain controller running Windows 2000, a Null session cannot be established. Since it is RAS10 that must be able to communicate with all domain controllers, adding the computer account for the Sales department's laptops will not provide the support needed. You do not need to configure support for MS-CHAP v2 on RAS10, since Windows NT 4.0 clients can use MS-CHAP v2 only for Virtual Private Network (VPN) connections, not for dial-up connections. You should not add the computer accounts for the BDCs to the "RAS and IAS Servers" group. Members of this group can access user account properties related to remote access.


73. You own a network consulting company based in the United States. You specialize in servicing customers in the garment manufacturing industry. All of your customers require that their design department data be carefully protected. Two of your major customers are Acme Attire and Great Garments. Both companies are planning revisions to their current network infrastructure to support electronic commerce applications. Acme Attire has fifteen facilities throughout the United States. Great Garments has twenty facilities throughout the United States, France, Japan, and Latin America. When designing network solutions for these customers, which factor would be a greater influence on design decisions for Great Garments than on design decisions for Acme Attire?

A. Encryption levels
B. Government regulations
C. Authentication mechanisms
D. Server placement

>> !
Answer: A

The encryption levels to be used would have a greater influence on design decisions for Great Garments than on those for Acme Attire, since Great Garments has facilities in a number of countries. Encryption levels must be addressed when designing Internet Security Protocol (IPSec) policies, remote access policies, and the configuration of virtual private networks (VPNs), among others. The strongest level of encryption that can be exported out of the United States and Canada is 56-bit Data Encryption Standard (DES). Government regulations must be considered in all network designs, no matter what countries are involved. There are often additional regional and local government agency regulations that must be considered. The authentication mechanisms available in Windows 2000 can be used in any country. The placement of servers is more dependent on the network services installed at each location than on the country or countries in which an enterprise operates. The overall goal when placing servers is to minimize the amount of network traffic generated by the services running on each server and to optimize the responsiveness to user requests.


74. You are the Network Administrator for your company. You manage a network running Windows 2000 Server, Windows 2000 Professional, Windows 95, and OS/2 with LAN Manager 2.2c. The computers are all on the same subnet. You want applications on the OS/2 client that use NetBIOS names to be able to resolve the NetBIOS names to Internet Protocol (IP) addresses from a Windows Internet Name Service (WINS) database. You install the Windows Internet Name Service on one of the computers that is running Windows 2000 Server. What simple step should you take to enable applications on the computer running OS/2 to resolve names to IP addresses from the WINS database?

A. Configure one of the computers running Windows 2000 Professional as a WINS proxy.
B. Create an LMHOSTS file on the computer running OS/2 with an entry for the WINS server.
C. Configure the IP address of the WINS server in the TCP/IP parameters of the OS/2 client.
D. Configure a static mapping for the OS/2 client in the WINS database.

>> !
Answer: A

You should configure one of the computers running Win2000 Professional as a WINS proxy. A WINS proxy is a computer that responds to NetBIOS name resolution broadcasts. If the WINS proxy does not have a mapping of the requested name to an IP address in its NetBIOS name cache, it sends a request to the configured WINS server. Once it receives a response from the WINS server, it can reply to the original requester.

The LMHOSTS file is not dynamic, and therefore would require additional work to stay up to date.

The OS/2 client does not have a setting for the address of a WINS server.

Configuring a static mapping for the client will allow other computers to find the OS/2 computer but would not help the OS/2 computer resolve the other computers' names.


75. You are the assistant systems manager for your small company network. You are pondering whether to upgrade your RIPv1 implementation to RIPv2 or to use OSPF instead. As you consider your options, you know which of the following is true about OSPF.

A. OSPF uses IP multicast to send link-state updates
B. OSPF is a distance vector protocol
C. OSPF offers better convergence than RIP
D. OSPF allows transfer and tagging of external routes in an Autonomous System
E. OSPF is less complex than RIPv2
F. OSPF uses a hop count metric to measure each time it passes through a router

>> !
Answer: A, C & D

OSPF uses IP multicast to send link-state updates as well as offers better convergence than RIP. OSPF allows transfer and tagging of external routes in an Autonomous System. The use of IP multicast to send link-state updates means less processing for routers that are not listening for OSPF packets. OSPF offers better convergence than RIP because routing changes are propagated instantaneously, not periodically as in RIP. OSPF's transfer and tagging of external routes in an Autonomous System keeps track of external routes injected by exterior protocols such as BGP. RIPv1 and RIPv2 are distance vector protocols.

OSPF is more complex than RIPv2 and does not use a hop count metric. OSPF is a link-state protocol.


76. You are the assistant systems manager for a small company's network. You are building a new satellite network at your company's new location. Your boss directs you to set up an implementation of RIPv1 using Variable Length Subnet Mask (VLSM) and hop counts of greater than 15. You also will need to optimize convergence time and use broadcast announcements. What should you tell your boss?

A. RIPv1 is a link-state protocol and does not use hop counts
B. RIPv1's convergence time is far superior to OSPF, so convergence should be no problem
C. RIPv1 uses only multicast announcements
D. The above suggested implementation can't be carried out

>> !
Answer: D

Your boss, quite simply, is asking the impossible. RIPv1 does not support VLSM because it doesn't track subnet masks.

RIPv1 is a distance-vector protocol, not a link-state protocol, and uses hop counts.

RIPv2 does support VLSM but even then it should not be used if RIPv1 routers are present on the network.

Even RIPv2 cannot be configured to handle hop counts greater than 15. In this case, OSPF would be preferable because it supports up to 255 routers.

RIPv2 does allow you to optimize convergence times through the use of split horizon, poison reverse and triggered updates. However, OSPF would still give you the best convergence time.

RIPv1 uses broadcast announcements, while RIPv2 uses multicast.


77. You are the assistant Systems Manager on your small company's Windows 2000 network. Your Windows 2000 Server has three network adapters and will be configured to run RIP and OSPF. What is the maximum number of default gateways you can define on the server?

A. 3
B. 1
C. 4
D. 2

>> !
Answer: B

One default gateway is the most you can define on the server. Even with three adapters and two different IP routing protocols, you need define only one or no default gateways on the server. Windows 2000 has only one routing table and so there can be only one current default gateway. A hardware router, which may have many different routing tables, would require more than one defined gateway.


78. As IT manager at an accounting office, you've just finished configuring your demand-dial interfaces and your router's connections are authenticated. You now are turning your attention to the routing tables. You've decided to use an on-demand-dial connection. Which protocols may you use in this configuration?

A. RIPv1
B. RIPv2
C. OSPF
D. BGP
E. You'll use no routing protocols

>> !
Answer: E

In a demand-dial on-demand configuration, you use static routing with no routing protocols. If your demand-dial connection were persistent, then you would use dynamic routing and would use routing protocols.


79. You are the assistant systems manager for a small company's Windows 2000 network. You're getting ready to install ICS. What should you do before you begin the install?

A. Shut down any computers set to obtain an IP address automatically
B. Power on all computers set to obtain an IP address automatically
C. Replace all unidirectional device adapters (such as DirectPC)
D. Make sure all the host computers have two network adapters
E. Make sure all the computers have at least one network adapter. One is fine, so long as it's unidirectional

>> !
Answer: A & D

You should shut down any computers set to obtain an IP address automatically to be sure the IP information assigned by the old DHCP server doesn't interfere with addresses assigned by the ICS server. ICS does not function with unidirectional adapters (Q231648) and requires two network adapters on a host computer, the computer with a connection both to the Internet and the local LAN (Q265728).

Powering on all computers will give those computers the wrong IP addresses.

Unidirectional device adapters are only a problem on the PC running ICS, not its clients. The client network cards can be either unidirectional or bi-directional.


80. You are the assistant systems manager for your company's network. You've just completed installation and configuration of NAT and you are ready to designate which interfaces to use. What is the minimum number of interfaces you may designate?

A. 1
B. 2
C. 3
D. 4
E. 5
F. 6

>> !
Answer: B

The must be at least 2 adapters present: one to act as an internal interface, and one to act as an external interface. Therefore 1,3,4,5, and 6 are wrong answers.

Common examples are a NIC and a modem adapter. There should be at least one internal network interface card and an external interface. The external interface can be a modem, ISDN adapter or Ethernet adapter.


81. You are a tech for a network-consulting firm. You've been assigned to configure ICS for a SOHO network. The network already has a fully installed Windows 2000 Server, complete with a dial-up Internet connection. What else must a Windows 2000 Server have to run ICS?

A. An internal network interface
B. A unidirectional adapter
C. The RIP protocol
D. A null modem cable

>> !
Answer: A

If you do not have a connection to the LAN as well as to the Internet, you will not be able to install ICS.

ICS does not function with unidirectional adapters (such as the DirectPC system) (Q231648).

A null-modem cable permits two RS-232 "DTE" devices to communicate with each other without modems or other communication devices between them. This will do nothing to assist an ICS install.

The RIP protocol is not needed either.


82. You are the systems manager for a small company's Windows 2000 Network. You are pondering the benefits of switching from ICS to NAT. Which of the following are NOT benefits of NAT over ICS?

A. NAT allows the use of multiple network adapters
B. NAT allows the use of multiple Internet ports
C. NAT allows the use of more than one IP address
D. NAT is simpler to configure than ICS
E. NAT is better suited to single segmented private networks of up to 254 workstations

>> !
Answer: D & E

NAT allows the use of multiple network adapters, Internet ports and IP addresses. ICS is simpler to configure than NAT and is better suited to single segmented private networks of up to 254 workstations.


83. You are the assistant systems manager for your company's Windows 2000 Network. Your boss directs you to a Windows 2000 Professional Computer. He instructs you to set up NAT on this computer. Your boss wants to take advantage of a pool of public Internet addresses for better availability. He also wants flexibility in how DNS names are resolved and to configure settings for dynamic mappings. Your boss is very anxious all this be made so. What do you tell your boss?

A. That ICS would be a better choice on this computer and for what he wants you to do
B. Name resolution will have to be done by a separate DNS server
C. NAT does not offer dynamic mapping
D. He'll need to provide you a Windows 2000 Server

>> !
Answer: D

All the services your boss wants are offered in NAT but can be set up only on a Windows 2000 Server with Routing and Remote Access enabled. ICS can be setup on Windows 2000 professional but it can't use more than one IP address, doesn't offer flexibility in how DNS names are resolved, and doesn't allow for dynamic mapping.


84. You are the systems manager for a small company's Windows 2000 Network. You have been pondering the benefits of switching from ICS to NAT and you've decided to opt for NAT. What will you need to enable on your Windows 2000 Server so you can install NAT?

A. RRAS
B. RIP
C. OSPF
D. BGP
E. POTS

>> !
Answer: A

You need to enable the RRAS (Routing and Remote Access) Windows 2000 Server service, not install it. When it is enabled, it will trigger the Routing and Remote Access Server Setup Wizard. One of the wizard's options is to enable NAT. From there, you will be asked whether you want to use ICS or NAT.

RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are routing protocols.

BGP (Border Gateway Protocol) is an Internet protocol that enables groups of Autonomous Systems (AS) to share routing information.

POTS (Plain Old Telephone Service) is standard telephone service.


85. You are the Network Administrator for a detective agency. Your company communicates confidential information to another high-security organization. The information sent and received to and from the other organization needs to be authenticated and encrypted. In addition, neither company wants any information about the identity of the other side to be transmitted across the network connection. The managers put together a plan based on the IPSec protocol stack in order to provide the necessary security for the communication. What IPSec authentication method should they use to meet the need?

A. Kerberos V4
B. Kerberos V5
C. Public/Private Key from a certificate authority
D. Shared Secrets Authentication

>> !
Answer: C

A digital certificate from a valid CA provides the necessary authentication. Moreover, since a third party is involved, this maintains the anonymity of the computer that is initiating the connection.

The Kerberos protocol is used between computers in the same domain.

Shared secret protocols are usually used in wireless communications and the secrets are manually entered.


86. You are the assistant systems manager for a large company's Windows 2000 network. You've encountered disk problems on your Certificate Authority (CA) server and, as a result, you've lost access to file encryption certificates and private keys. You plan to use a recovery agent to recover the data by decrypting the files you can no longer access. After you've done this and the files are recovered, what should you do next?

A. Revoke the data recovery certificate so no one can access the decrypted data.
B. Move the data to a new partition and create new NTFS permissions.
C. Use the recovery agent to delete the data recovery certificate from the system.
D. Backup the files to tape and remove them from the system.

>> !
Answer: C

By deleting the data recovery certificate, only a person who has physical access to the data recovery certificate can recover data from that system.

If a Data recovery certificate is deleted, not revoked, only the person who can gain physical access to the data recovery certificate can recover data from that system.

Moving data to a different partition with different NTFS permissions will not insure physical access to the data recovery certificate.

Backing up the files and removing them from the system will make them unavailable.


87. You are the assistant systems manager for a medium-sized company's network. You are responsible for the Certificate Authority on the Windows 2000 server. You have used the EFS recovery agent to backup the recovery certificate and private key to a secure location. You now want to delete the recovery certificate for increased security. What steps do you take to make this so?

A. Revoke the policy after it is backed up to prevent unauthorized usage.
B. Use CA to delete the recovery certificate from the agent's recovery policy.
C. You must use the Certificates console in the MMC to view and delete certificates from the recovery agent's personal store.
D. Use CA to delete the recovery certificate from the agent's personal store.

>> !
Answer: C

Designated user accounts, called recovery agent accounts, are issued recovery agent certificates with public keys and private keys that can be used for EFS data recovery operations. Recovery agent accounts are designated by the EFS recovery policy. EFS requires that a data recovery policy be set at the domain level. This recovery policy is set by domain administrators that control the recovery keys for all computers in that domain. After these keys have been backed up, they can be deleted from the recovery agents store for additional security, using the Certificates console of the MMC.

Revoking the policy will not delete the recovery certificate.

Deletion of the recovery certificate is done with the Certificates console in the MMC, not by using the CA.


88. You are the network administrator for a medium-sized company's Windows 2000 network. The network's domain consists of domain controllers, two member servers and 765 Windows 2000 Professional workstations. Your supervisor informs you she suspects Sam, who was fired the week before last, is still accessing the network through the Internet. She wants you to put a stop to this immediately. She does not want Sam to access the network remotely at all, any more. Which of the following will keep Sam from accessing the network remotely?

A. Restrict permissions in Sam's assigned certificate
B. Publish the Revoked Certificate List
C. Revoke Sam's previously assigned certificate
D. Force Sam's certificate to expire early

>> !
Answer: C

If Sam's assigned certificate is revoked, he will not be able to access any network resources. Revoked certificates appear on the Revoked Certification list.

Restricting permissions may not effect all permissions.

Revoking a certificate is quicker than forcing a it to expire early.


89. You are the network administrator for an operation's Windows 2000 network, which consists of four domain controllers, two member servers and 462 Windows 2000 Professional workstations. Of these workstations, 143 are laptops used throughout the Midwest. You are instructed to find a way to ensure the data on these laptops and internal workstations is secure. The solution must be easy for users to understand. You also are to plan for growth and future technology. Which of the following is the best plan for securing data on this network?

A. Implement a stand alone Certificate Authority. User will be mapped to a certificate that will be downloaded each time they log onto the network.
B. Implement smart cards for all users, remote and local. You need do nothing else.
C. Implement smart cards for all users, remote and local. Create a Certificate Authority. For each user, issue certificates that will be stored in the smart card.
D. Implement smart cards for all users, remote and local. Create a root Certificate Authority. Certificates will be downloaded to users at each logon.

>> !
Answer: C

By creating a CA and issuing users a certificate to be stored within the smart card, only users with valid smart cards will be able to log on to the network.

If you are using a smart card, the certificate can be stored in the smart card, eliminating the need for downloading the certificate each time the user logs in.

Creating a standalone Certificate Authority (CA) will not accomplish all the goals listed.

A certificate must be issued if you are using smart cards.


90. You are the assistant systems manager for a large company's Windows 2000 network. You are setting up an Enterprise Subordinate Certificate Authority on a Windows 2000 server. You must obtain a certificate for this Subordinate CA from the parent authority. However, the parent CA is offline. How can you complete your task?

A. Install the CA as a root authority. When the parent becomes available, you can demoted the current role.
B. You can't. The parent CA must be available during installation.
C. Select "Sent Request Later." Later, when the parent CA is online, the certificate request can be sent to the active parent.
D. Copy a sample certificate from the Windows 2000 Resource Kit until you can get the correct certificate from the parent CA.

>> !
Answer: C

If a parent CA is unavailable, you can save the request to a file; give the path and filename. You can then obtain the subordinate CA's certificate from the parent when it comes online.

There may be only one CA root authority.

The certificate must be issued by the parent CA to be valid; therefore, installing a sample certificate would not accomplish the task.


91. You are in charge of a Windows 2000 Active Directory. Your company uses an internal certificate authority called "Mailcall." This CA can issue certificates for server authentication, client authentication, code signing and secure email. You want to use this CA only for secure email. How can you make this so?

A. You can't. You must use all the certificate types provided by the server. It is integrated with Active Directory.
B. Revoke the certificates for all but the secure email and publish the revoked list manually.
C. Create a Certificate Trust List (CTL) and apply it to a group policy. Specify only secure email in the CTL.
D. Create a subordinate CA that gets only the secure email delegation from Mailcall.

>> !
Answer: C

You can create a CTL to contain only secure email and apply this to your group policy object so that anyone in the group will use only Mailcall for secure email certificates.

You can pick and chose the types of certificates you use from a CA.

The goal is for the CA to only issue certificates for secure email; therefore, it should not have issued certificates that need to be revoked.

Creating a subordinate CA would be inefficient and unnecessary.


92. You are the Administrator of a medium sized Windows 2000 domain that has the main office in San Francisco, and has 3 other sites in Los Angeles, Boston, and Kansas City. You have been asked to set up DNS for all of the sites, which connect to each other over a WAN link. You want to limit the amount of time that is spent over the slow WAN link between the sites, which are all in the same Active Directory (AD) tree. How can you set up the WAN so that all sites are part of the same AD tree and intersite DNS queries are kept to a minimum?

A. Set up the San Francisco office as the first level domain and set up the DNS server there. Set up the other 3 sites to be second level domains.
B. Set up all four sites as second level domains and set up a DNS server at each site.
C. Set up the San Francisco office as a second level domain and set up the other 3 sites to be child domains. Install DNS servers at each of the sites.
D. Set up all four sites as second level domains and set up the DNS server at the San Francisco office.

>> !
Answer: B & D

Since you want all of the sites to have the same namespace, it is easiest to set each site up as a second level domain and ensure each site has a DNS server.

Setting up the San Francisco office as the first level domain and setting up the other three sites as second level domains will not insure that intersite DNS queries are kept to a minimum as the second level domains would have to synchronize with the first level domain.

There is no such thing as a DNS child domain.


93. You are the administrator of a Windows 2000 domain with 250 Windows 2000 Professional hosts and 15 servers. Management has decided to implement Active Directory on the domain, and it is your task to deploy it. At the current time you are using Hosts records in a HOSTS file for name resolution. What can you do to ensure that:
name resolution will continue and you can deploy Active Directory with the least dministrative effort?

A. Install and configure a DHCP server to automatically issue IP addresses.
B. Install and configure a WINS server for NetBIOS Name Resolution.
C. Set up the client computers with an LMHosts files in addition to the Hosts files.
D. Install and configure a DNS server.

>> !
Answer: D

The DNS server will provide the name resolution, and Active Directory requires it. If a DNS server is not present when Active Directory is installed, the Active Directory will have to install the DNS server.

DHCP servers do not provide for name resolution.

WINS servers with NetBIOS name resolution do provide for name resolution, but not in a way the Active Directory can use. Active Directory requires host names, not NetBIOS names.

LMHOSTS is similar to a host file. It will provide name resolution, but the administrative effort would require touching each machine.


94. You are the Administrator of a medium sized Windows 2000 domain that has the main office in San Francisco, and has 3 other sites in Los Angeles, Boston, and Kansas City. You have been asked to set up DNS for all of the sites, which connect to each other over a WAN link. You want to limit the amount of time that is spent over the slow WAN link between the sites, which are all in the same Active Directory (AD) tree. How can you set up the WAN so that all sites are part of the same AD tree and intersite DNS queries are kept to a minimum?

A. Set up the San Francisco office as the first level domain and set up the DNS server there. Set up the other 3 sites to be second level domains.
B. Set up all four sites as second level domains and set up a DNS server at each site.
C. Set up the San Francisco office as a second level domain and set up the other 3 sites to be child domains. Install DNS servers at each of the sites.
D. Set up all four sites as second level domains and set up the DNS server at the San Francisco office.

>> !
Answer: B

Since you want all of the sites to have the same namespace, it is easiest to set each site up as a second level domain and ensure each site has a DNS server.

Setting up the San Francisco office as the first level domain and setting up the other three sites as second level domains will not insure that intersite DNS queries are kept to a minimum as the second level domains would have to synchronize with the first level domain.

There is no such thing as a DNS child domain.


95. You are the Administrator of a small Windows 2000 domain. You have been asked to set up a name resolution system that will guarantee users do not have to refer any queries to the Internet for name resolution. What can you do to assure that all name resolution occurs locally?

A. Set your DNS server inside the DMZ
B. Set your DNS server behind a Proxy Server
C. Set up a DNS Caching Server
D. Set up a Root Name Server

>> !
Answer: D

Configuring a Root Name Server will be authoritative for all Top-Level Domain queries and thus will ensure that all name resolutions occur locally. This DNS structure will control which domains the users can resolve names for.

Setting up the DNS server inside the DMZ may still mean that the DNS servers will need to query other name servers on the Internet.

Setting up the DNS server behind the proxy server may still mean that the DNS servers will need to query other name servers on the Internet.

Setting up a DNS caching server will guarantee that the DNS server will need to query other name servers on the Internet.


96. You are the Administrator of a small Windows 2000 domain. Your domain consists of 50 Windows 2000 Professional hosts on two segments, (A and B), connected by a router. Segment A has the Primary Zone DNS server, and Segment B has the Secondary Zone DNS Server. The users in both segments report that the network seems to be slow, and when you monitor the network you find that a large amount of the traffic is being generated by zone transfers from the Primary Zone to the Secondary Zone. What change do you need to make to decrease the zone transfer traffic?

A. Decrease the Refresh Interval for the Start of Authority (SOA) records on the Primary Zone.
B. Increase the Refresh Interval for the Start of Authority (SOA) records on the Primary Zone.
C. Decrease the Time to Live (TTL) for the individual records on the Secondary Zone.
D. Increase the Time to Live (TTL) for the individual records on the Secondary Zone.

>> !
Answer: B

Increasing the Refresh Interval for the Start of Authority (SOA) records on the Primary Zone will cause the Secondary Zone to make fewer transfer requests.

Decreasing the refresh interval for the SOA will increase the amount of network traffic, because it will mean less time between zone transfers.

The TTL value determines how long a particular resource record is considered valid. Once the TTL on a record expires, the DNS client must resend a DNS query request for the same host name. DNS clients affected by the TTL include both DNS servers performing recursion and DNS client computers.


97. You are the Administrator of a small Windows 2000 domain. The domain has one DNS server and 53 Windows 2000 Professional hosts, which have all been assigned static IP addresses. Your junior administrator reports that he is unable to resolve the name of host HR6 using its Fully Qualified Domain Name (FQDN), but he can use the IP to connect to it at the same time. There are no problems with using the FQDNs to contact the other hosts in the domain. What do you suspect is the problem and the solution?

A. You must use DHCP and dynamic IP addresses in a domain with more than 10 hosts.
B. Your DNS cache is corrupted and needs to be flushed using IPConfig /flushdns and then reloaded.
C. There is no forward lookup Host record for HR6. You need to configure an A (Host) resource record.
D. There is no reverse lookup Pointer record for HR6. You need to configure a PTR (Pointer) resource record.

>> !
Answer: C

With no forward lookup Host record for a system, you will not be able to access that system via its host name. This is one of the reasons why it is an advantage to use a DHCP server to issue IP addresses and to set up Dynamic DNS.

There are no specifications on the number of hosts necessary to use DHCP.

Flushing the DNS cache may be an option, but it does not have the highest probability of solving the problem.

Reverse lookup would not play a part in this scenario. Reverse lookup resolves an IP address to a DNS name.


98. You are the Administrator of a small Windows 2000 domain with one DNS server and 50 Windows 2000 Professional hosts. You receive reports from users that they are getting error messages when they attempt to connect to FileSvr1. You run Tracert nslookup on FileSvr1 and find that the Forward Lookup Zone is corrupted. You correct the Forward Lookup Zone and attempt to connect to it from one of the client hosts but still get the same error message. What needs to be done to be able to connect to FileSvr1?

A. You need to run IPConfig /flushdns on all of the client hosts to clear the bad record out of their resolver caches.
B. You need to reboot the DNS Server.
C. You need to reboot FileSvr1.
D. You need to run IPConfig /release and IPConfig /renew on FileSvr1.

>> !
Answer: A

host will check its resolver cache first before sending a query to the DNS server, so it would still be receiving the wrong answer until the cache is cleared.

Rebooting the DNS server will clear the DNS resolver cache on that computer, but will not affect the cache on each of the client hosts.

FileSvr1 does not have a part in the name resolution scenario. It is the target, and is thus not providing any name resolution.

The release and renew parameters of IPConfig won't help clear the resolver cache but instead will download DHCP options.


99. You are the Administrator of a small Windows 2000 domain. There is a remote sales office that connects to the main office over a dialup WAN link. You find that a lot of the DNS server's time is being used to resolve DNS queries from the remote sales office. You want to alleviate the traffic over the WAN link without spending a lot of time and money. Your Primary objective is to allow the remote sales office to continue to get their DNS queries resolved without having to use the WAN link. Your secondary objectives are: a) to not spend a lot of money; and b) to not spend too much administrative time on the project. Which of the following solutions will meet your Primary and both Secondary objectives?

A. Set up a caching-only server in the remote sales office.
B. Set up a DNS server at the remote sales office.
C. Set up a DNS relay agent at the remote sales office.
D. Set up a VPN between the main office and the remote office.

>> !
Answer: A

The caching-only server will keep a record of the resolved names to the remote sales office and will thus not have to query the DNS server in the main office as much as in the past. Also, it is the least expensive and easiest solution to set up.

Setting up a DNS server at the remote sales office would not meet the criteria of spending too much administrative time on the project.

There is no such thing as a DNS Relay agent.

Setting up a VPN between the main office and remote office will have no effect on name resolution.


100. You are an Administrator of a Windows 2000 Domain with 5 Servers and 50 Windows 2000 Professional clients. You have a DHCP Server to deliver IP addresses to all computers in the Domain. You come to work on a Monday and find that the users report that although they can communicate with each other, no users can connect to the Internet. You attempt to log onto the Internet and confirm that the connection cannot be made. When you check the Event Viewer you find the following message: "Your computer has automatically configured the IP address for the Network Card with the network address of 0900859F3C35. The IP address being used is 169.254.203.111. Why can't this computer connect to the Internet?

A. The computer is configured with the wrong scope.
B. The DHCP server has failed and automatic addressing is being used.
C. The Internet Service Provider's server is down.
D. The IP address is in an invalid class.
E. The IP leases have expired.

>> !
Answer: B

The scope is configured at the DHCP server not at the local host.

There is no mention of the administrator attempting to contact the ISP's servers.

The IP address of 169.254.203.111 should be recognized as an Automatic Private IP Address.

If the DHCP server were still functioning, it would renew the IP leases.

If the DHCP server fails, the computers will use Automatic Private IP Addressing (APIPA) to configure themselves so that network communications can occur, but connections to the Internet will not. The APIPA network ID is 169.254.0.0/16. Windows 2000 clients assigned an APIPA address continue to issue DHCPDISCOVER broadcasts every five minutes, in the event the DHCP server comes back online.


101. You are the administrator of a small domain with 100 Windows 2000 hosts. You want to provide for a backup DHCP server in case the main DHCP server fails. What is the recommended way that you should define the scopes of each server so that they do not accidentally assign the same IP to two hosts?

A. Assign 80% of the addresses to the main DHCP server and 20% of the addresses to the backup DHCP server.
B. Assign 50% of the addresses to each DHCP server.
C. Assign 100% of the addresses to each DHCP server and configure them to take turns assigning IP addresses.
D. Assign 95% of the addresses to the main DHCP server and 5% to the backup DHCP server so that it will only assign addresses if the main DHCP server fails.

>> !
Answer: A

According to the Microsoft Windows(r) 2000 Server Resource Kit you should use the 80/20 Rule by assigning 80% of the scope to the main DHCP server and 20% of the scope to the backup DHCP server. This is the most efficient solution.

There is no way to configure DHCP server to "take turns assigning IP addresses". Assignment is done by the first server to respond to the DHCP client.

A DCHP server will respond to any request it receives. It will depend on which response reaches the DHCP client first as to which IP address is accepted.


102. You are setting up a DHCP server for your domain, and you have 5 print servers and 5 file servers that you want to always have the same IP addresses. How do you set up, with the least amount of administrative effort, the DHCP server to assure that these 10 servers always have the same IP addresses?

A. Manually configure the 10 servers with static IP addresses.
B. Place the 10 IP addresses in the "Exclusions" option.
C. Place the 10 IP addresses in a separate subscope.
D. Place the 10 IP addresses in the "Reserved" option. Create 10 client reservations; one for each server.

>> !
Answer: D

By placing the IP addresses in the Reserved option and creating ten client reservations, the servers will always have the same IP leased to them.

If you placed the addresses in the Exclusions option, thus creating an excluded address range, these addresses would not be available for lease.

You could manually configure the servers, but that would take more administrative effort.

Creating a separate subscope would not guarantee that the servers would receive the same address.


103. You are the administrator in a medium sized Windows 2000 domain that runs a mission critical application that must run 24x7. You want to use DHCP because you have over 2000 Windows 2000 Professional hosts. Your Primary objective is to provide a DHCP solution that guarantees that the DHCP service is always available. Your Secondary objectives are: a) To provide for automatic transfer of the namespace and all the services to a second node. b) To provide load balancing of the DHCP services. You decide to set up DHCP Clustering and to set up all of the nodes as one virtual node. This solution accomplishes which of the following?

A. The Primary objective only.
B. The Primary objective and one of the Secondary objectives.
C. The Primary objective and both of the Secondary objectives.
D. The proposed solution does not accomplish any of the objectives.

>> !
Answer: C

A DHCP Cluster that is set up as a virtual node will guaranty that the DHCP service will continue to function if any of the nodes fails and will automatically transfer the name space and services to one of the other nodes. Also, the cluster provides load balancing, so all of the objectives are met.


104. You are the administrator of a medium sized Windows 2000 domain that contains 10 segments with a DHCP server on each segment. You recently had to move a computer from one segment to another as a replacement for a host that failed. When you start up the computer, it receives a DHCPNAK message. What needs to occur next to get the host communicating on this segment of the network?

A. The host will send out a broadcast discover message with its MAC address requesting a new IP address.
B. The host will automatically be assigned the IP of the previous host at that location.
C. You will have to assign the host a static IP address.
D. Add a DHCP Relay Agent.

>> !
Answer: A

After receiving a DHCPNAK when it tries to renew its lease, the host will send a broadcast discover message, which contains its MAC address, in order to request a new IP address.

There is no record kept of the location of any host. All records are based on the MAC address of the network card in the host.

You will not have to assign a static IP address.

Since there is no router involved, a relay agent is not necessary.


105. Your small Windows 2000 domain contains 150 hosts that receive their IP addresses from a DHCP server and you want to have them automatically update the DNS server with their new IP address when they obtain a new lease. You open the DHCP snap-in and configure the server to automatically update the DNS server by putting a check in the box to "Automatically Update DHCP Client Information in DNS" and apply your changes. Sometime later, you find that the updates are not happening. What should you do next?

A. Change the setting from updating at the server level to updating at the scope level.
B. Remove the checkmark from "Discard forward (name-to-address) lookups when the lease expires".
C. Configure the DNS server to accept Dynamic DNS updates.
D. Configure the DHCP server to "Update DNS only if DHCP client requests".

>> !
Answer: C

You not only have to configure the DHCP server to "Always update DNS" and "Discard forward (name-to-address) lookups when the lease expires". You also have to configure the DNS server to accept Dynamic DNS updates.

Updating is done by the server. In this scenario, it is implied there is just one scope.

You want all clients to be registered with DNS, so the client should not have the ability to make a request.


106. You are the administrator of a small domain with 250 Windows 2000 Professional hosts on a multisegment network. You are installing DHCP service for the first time, and you need to set up the DHCP server. Which of the following do you have to have configured before you can install the DHCP service?

A. You must have Active Directory installed.
B. You must have a static IP on the server that will be the DHCP server.
C. You must have a static IP on the server that will be the DNS server.
D. You must have a subnet mask on the server that will be the DHCP server.
E. You must have a default gateway for the server that will be the DHCP server.
F. You must have a static IP on the server that will be the WINS server.

>> !
Answer: B, D & E

In order to install the DHCP service, the server used must have a static IP address and a subnet mask defined, and the network card needs to have TCP/IP set up with a default gateway in a routed network. The DNS server and Active Directory will be needed after the service has been installed. DNS, WINS and Active Directory are not required to install or maintain a DHCP server.


107. As if you're not busy enough, one of the servers you must maintain is a RAS server. You are asked to configure the RAS server so that connection links are added or dropped dynamically based on traffic demand. Which of the following protocols will you use to accomplish this task?

A. BAP
B. RAP
C. EAP
D. CHAP

>> !
Answer: A

The Bandwidth Allocation Protocol (BAP) is used to manage links based on the bandwidth required for the traffic flowing between two endpoints. BAP defines packets, parameters, and negotiation procedures allowing two endpoints to add or drop links from a multilink bundle as needed. BAP is a part of the overall RAS Access Policies (RAP) in Windows 2000.

Extensible Authentication Protocol (EAP) and Challenge Handshake Authentication Protocol (CHAP) are user authentication methods.

RAS Access Policies (RAP) is the name in Windows 2000 for the set of policies used to control remote access.


108. You are the assistant systems manager for an engineering company's Windows 2000 network. You are implementing a RAS server that runs Windows 2000 Server and is a member of a Windows 2000 domain. You want to define a remote access policy with an associated remote access profile for RAS. The policy will have these properties:
  • Defines the maximum length of a remote access session as 120 minutes
  • Enables use of the Bandwidth Allocation Protocol (BAP)
  • Limits the type of incoming packets to Point-to-Point Protocol (PPP)
  • Allows only Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) to be used as the authentication protocol, and
  • Limits the use of the policy to members of the universal group Development-Mgrs.
What steps can you take to make all this so?

A. Define the use of BAP and the use of the policy by members of Development-Mgrs in the remote access profile.
B. Define the maximum session length and the use of only PPP in the remote access profile.
C. Define the use of only PPP and the use of the policy by members of Development-Mgrs in the remote access profile.
D. Define the maximum session length, the use of BAP, and the use of MS-CHAP as the authentication protocol in the remote access profile.
E. Define the use of only PPP and the use of the policy by members of Development-Mgrs as conditions of the remote access policy.

>> !
Answer: D

You can define the maximum session length, the use of BAP, and the use of MS-CHAP as the authentication protocol in the remote access profile. The use of PPP and limiting the use of the policy to members of Development-Mgrs are conditions of the remote access policy.


109. You are the systems manager for your large company's Windows 2000 network. Company employees frequently access the network via remote access and each of these employees have a smart card to use with the company's Cisco RADIUS server for authentication into the network. The RADIUS server and employee workstations are configured to use encrypted passwords. The network includes Windows NT and Unix Servers. You are migrating the Windows NT servers to Windows 2000. You have implemented Windows 2000 RRAS and you want to incorporate the RADIUS authentication for use with the RRAS server. Which authentication protocol should you select for the RRAS server to use with the RADIUS server?

A. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
B. Kerberos
C. Extensible Authentication Protocol (EAP)
D. Password Authentication Protocol (PAP)

>> !
Answer: C

RRAS supports multiple authentication protocols that can be used for different purposes.

EAP (Extensible Authentication Protocol) allows requests to the RRAS server to be properly formatted and forwarded to the RADIUS server. EAP supports certificates and smart cards.

MS-CHAP can only be used in a Microsoft environment and does not support the use of smart cards.

Kerberos is used to authenticate Active Directory connections inside a network.

Passwords in PAP authentication are not encrypted and PAP does not support the use of smart cards.


110. You are setting up a VPN with a Windows 2000 remote access server. The remote access clients are Windows 95, Windows 98, Windows NT4 workstation, and Windows 2000 computers so you need to allow for as many authentication protocols as possible. You are in the process of standardizing the protocols to be used. What remote access authentication protocols does a Windows 2000 Remote Access Server support?

A. PAP
B. PPoE
C. CHAP
D. MPPE
E. SPAP
F. PPTP

>> !
Answer: A, C & E

Windows 2000 server can support the following remote access authentication protocols in a VPN environment: Shiva Password Authentication Protocol (SPAP); Versions 1 and 2 of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP); Challenge Handshake Authentication Protocol (CHAP); Password Authentication Protocol (PAP); and Extensible Authentication Protocol (EAP).

Point-to-Point over Ethernet (PPoE) is a common access protocol used in broadband connections and is not an authentication method.

Microsoft Point-to-Point Encryption (MPPE) provides encapsulation and encryption for VPN connections.

The Point-to-Point Tunneling Protocol (PPTP) is a tunneling protocol used to create a VPN.


111. You are the network administrator for a marketing company with branches all over the world. The sales staff uses remote connections to update their sales records to a database located on the company's Windows 2000 server. The sales staff has always experienced problems making remote connections but those problems have recently become more frequent. You've tried to fix the problems by modifying the RRAS server's existing remote access configuration, but that hasn't worked. You've come to the conclusion that the existing policy is in such bad shape that it's time to start anew. But you want to do this seamlessly. No user should have any clue you are configuring the RRAS server. You've deleted all policies listed in the list of remote access policies, including the default remote access policy. What will happen to your remote users until remote policy is created?

A. The RRAS server will not allow you to delete the default remote access policy, only to modify it. This means that only users allowed remote access under the conditions of the current default remote access policy will be permitted remote access.
B. Since no default remote access policy exists, the RRAS server will evaluate connection requests based on the user and remote access permissions.
C. All connection attempts will be rejected.
D. All connection attempts will be accepted.

>> !
Answer: C

If you want to do this seamlessly, this isn't the way. Without a default remote access policy, no user will be allowed access through the RRAS server. All connection requests are evaluated against the criteria contained in the remote access policy.

You may delete the default profile but if there are no other profiles, all connection attempts will be denied. It is usually best to keep the default policy and modify it to suit your needs.

The RRAS server uses user permission to determine what access rights you have to resources, not whether or not you can connect.

If there is no remote access policy, there are no conditions to compare and all requests are denied.


112. You are the network administrator for your company. You set up an RRAS server for your company's sales force. While on the road, the salespeople use Windows CE handheld devices for remote access. Windows CE supports PAP and CHAP authentication, so you enabled CHAP on the server. However, users report that they cannot connect using those devices. What you need to do to fix this problem?

A. All clients using CHAP for remote authentication must change their passwords.
B. Enable CHAP in the authentication filter set on the RRAS server.
C. Specify that Windows CE devices can not be used for remote connections.
D. Disable support for MS-CHAP v1 and v2.

>> !
Answer: A

Enabling CHAP on the server simply tells the server to accept this type of authentication. Additional steps must be taken for CHAP to work properly. One of the drawbacks of CHAP is that client passwords must be stored in the SAM database after CHAP is enabled. This means that all remote access users must change their password after CHAP is enabled on the server for CHAP to work.

Remote access is determined by the permissions assigned to the user and the remote access policy. What device you are using is immaterial as long as it is using the correct authentication method.

A Win2000 server is able to use multiple authentication methods for RRAS. The fact that MS-CHAP v1 and v2 are in use would not have any effect on the Windows CE devices.


113. You are administering the remote access server for your company. You receive a call from an employee, Chris, Tuesday morning. He reports that on Monday night, there were no problems accessing the network. This morning, however, he is trying to connect to the network by establishing a VPN connection but cannot connect successfully. He also reports that sometimes a connection can be established during the day, but a successful connection is more likely at night or on the weekends. He needs immediate access to a document to close a sale. What is the most likely reason that he cannot gain access to the network?

A. The connection has been accepted, but is currently held in a pending state.
B. The connection has been refused because the user is not authorized to connect during business hours.
C. The connection has been refused because no free ports are available.
D. The connection is accepted but Chris is locked out of the network.

>> !
Answer: C

The most likely reason Chris cannot connect is that there are no free VPN ports available. By default, 5 PPTP and 5 L2TP ports are installed on the remote access server. It would not be unusual for all of these ports to be in use during business hours.

Since Chris said that connection attempts were unsuccessful, this means that the connection was never accepted in the first place.

The fact that Chris can establish connections at different times of the day and different days of the week rules out a Time and Day policy creating the problem.

Chris did not report any error messages regarding passwords or any problems entering a password so that is a less likely source of trouble.


114. Your company hired 20 developers who are going to work from a remote location. Your corporate network is a Windows 2000 environment. The developers are using Windows 2000 professional. The RRAS server used for remote connectivity over VPNs has been configured with the default configuration. You tested the remote access configuration with several of the remote computers and everything has checked out fine. You sent word to the developers yesterday that they could begin using remote access. Today you began receiving support calls from some developers complaining that they cannot connect to network. What is the most likely reason for this problem?

A. The default RRAS configuration does not support L2TP, which is required by Windows 2000 clients.
B. The default RRAS configuration does not support enough VPN connections.
C. The Windows 2000 client default configuration does not support remote access.
D. The Windows 2000 clients are not configured to support VPN.

>> !
Answer: B

The default configuration for RRAS supports five PPTP ports and five L2TP ports. Since there are only 10 ports, only 10 users can connect at a time.

Windows 2000 Professional workstations support remote access and VPN connections using a variety of connection types.


115. You are working for a multinational company that has branches all over the world. Most user activity is confined to their local network, but sometimes users in one location need to exchange confidential information with servers in another location. Since the communication between remote locations is infrequent, you have configured RRAS to use demand dial lines to set up direct connections. Your management requires that the connection must be secure so you decide to require mutual authentication. Which of the following authentication protocols can you use in this situation?

A. PAP
B. SPAP
C. CHAP
D. MS-CHAP

>> !
Answer: D

MS-CHAP provides encrypted and mutual authentication between the respective RRAS locations. MPPE works with MS-CHAP and provides encryption for all the data between the locations.

PAP, SPAP and CHAP perform one-way authentication. They allow the user to authenticate to the server, but do not provide a mechanism for the server to authenticate back to the user.


116. You are the network administrator for your company. You have just finished upgrading all of the company's servers to Windows 2000. Your next project is to build the remote access system for all remote users. The requirements are that you must support remote access connections from Win98 SP1, WinNT SP3, Windows 2000 Professional and Linux workstations. Some users will dial directly into the network while others will dial their local ISPs and connect to your network via the Internet. Therefore, you want all authentication attempts to use encrypted passwords. Your manager wants you to use one authentication protocol for all remote users. What authentication Protocol should you use to satisfy these requirements?

A. MS-CHAP v1
B. MS-CHAP v2
C. CHAP
D. PAP

>> !
Answer: C

Challenge Handshake Authentication Protocol (CHAP) is a standard remote access authentication protocol that provides the use of encrypted passwords and is compatible with both Microsoft and non-Microsoft clients.

Neither version of MS-CHAP supports non-Microsoft clients.

PAP sends passwords in plain text (unencrypted).


117. Axe.com and Ooc.com are merging. Axe is a Windows 2000 environment and Ooc.com is a Netware 4 environment. Since you want to minimize support at the workstation level, you install Gateway Services for Netware on one of the Windows 2000 servers and migrate all the clients to Windows 2000. You have moved Ooc's Novell Netware servers into the server room at Axe. You also have RRAS on one of the servers to allow Internet access for everyone on the new network. What protocol is necessary on the Win2000 server that is running GSNW?

A. IPX/SPX
B. NetBEUI
C. AppleTalk
D. TCP/IP

>> !
Answer: D

TCP/IP is necessary on the server with Gateway Services for NetWare. All the workstations are running TCP/IP and connect to the Win2000 Gateway server through TCP/IP.

NetBEUI is not routable and therefore not appropriate for this type of environment.

Since you are migrating to windows 2000 you will not need to use IPX/SPX, a protocol developed by Novell.

AppleTalk is only needed if there were Apple computers on this network.


118. As the network administrator, you need to add a second IP address to one of your NICs. Which of the following statements is true about the IP address assignment?

A. This is done with the Advanced button in the TCP/IP properties dialog box.
B. You can only assign multiple addresses to an adapter whose MAC address is indexed on the DHCP server.
C. You cannot assign more than one IP address to an adapter.
D. You can add the second IP address only if you have a 10 Mbps NIC or better.

>> !
Answer: A

You use the Advanced button in the TCP/IP properties dialog box to assign the IP address.

The type of network card is immaterial, as long as it supports the TCP/IP.

A network adapter can only have one IP address assign to it. If a computer needs to have multiple IP's it must have multiple network adapters.


119. You are a Windows 2000 network administrator. You use the Group Policy Editor to create an Internet Protocol Security (IPSec) policy for the Group Policy object (GPO) linked to an organizational unit (OU) in your Win2000 domain. What is the first step you should take to ensure that the policy is applied to the four computers in the OU?

A. Use the IP Security Policies node in Group Policy Editor to assign the policy.
B. Run IPSECMON to establish the current state.
C. Stop and Restart the Policy Agent on each of the four computers.
D. Run SECEDIT /refresh_policy /machine_policy on each of the four computers.

>> !
Answer: A

The first step you should take to activate an IPSec policy is to assign the policy in the IP Security Policies node in the Group Policy Editor. If you create a new IPSec policy or want to put a predefined policy into effect, you must first assign the policy.

You use the utility SECEDIT with the refresh policy option to propagate changes to the settings of a GPO immediately rather than at the next scheduled update.

You use the IP Security Monitor (IPSECMON.EXE) to view IP Security associations and IPSec statistics.

You should restart the policy agent on a computer if you want to ensure that changes you have made to an IPSec policy are effective. However, the changes will not take effect if the policy has not been applied.


120. You are working for an airline company where you are the senior network administrator. A Web logic Application Server is running on the Windows 2000 server named Fnord. Fnord has a mission critical database application that stores confidential data such as passenger information, travel plans and the passenger billing information. This data is sent through the network via port 3029. Fnord is dedicated only to this application and not for anything else. There are 10 clients who work in the branch office and connect to Fnord remotely. These clients are dedicated to work only on Fnord and do nothing else. To ensure that all communications involved are secure, which of the following steps should you take?

A. Configure IP filtering to filter port 3029.
B. Configure IP filtering on the firewall of your network to only allow port 3029.
C. Configure Fnord to require the use of IPSec policy.
D. Configure Fnord to respond to IPSec policy.

>> !
Answer: C

IPSec in Windows 2000 is designated to protect sensitive data on a TCP/IP network. IPSec is useful when the network between two communicating computers is not secure. It provides confidentiality, integrity and authentication of IP traffic for each packet traversing the network. When using IPSec, the two computers communicating over the network first agree on the highest common security policy, and then each handles the IP Security at its respective end. Before sending data across the network, the computer initiating communication transparently encrypts the data by using IP Security.


121. You are the Network Administrator for your company. You are going to migrate from WinNT4 and NetWare 4.x to Win2000. You are presently using NWLink with 250 clients. You are also going to install Active Directory to take advantage of global policies that will help manage the new Win2000 desktops. You plan to take 5 months to complete the migration of all clients. What first step do you need to perform to begin this migration?

A. Install WINS to prepare for NetBIOS name resolution.
B. Install TCP/IP on the servers along with the existing NWLink.
C. Install Active Directory and configure it for NWLink interoperability.
D. Install DHCP to allow NWLink to be merged with TCP/IP.

>> !
Answer: B

Installing TCP/IP on the servers, along with the current NWLink, will allow the clients that have been newly migrated to use server resources, while still permitting all remaining clients to continue accessing the resources on the servers.

Installing WINS will not be necessary since all stations will be serviced by DHCP for their IP addressing needs. WINS instead deals with NetBIOS name to IP address translation.

AD does not support the NWLink protocol.


122. You are administering a small network. Your company has just merged with a new company, which has a network that contains several subnets connected by routers. The administrator from the acquired company sent you a preconfigured router with the network address that you provided them. After the line is installed, you connect the router and power it up. The Network Administrator of your company checks out the router connections and everything looks good - but when you try to connect to resources on remote networks, the attempts fail. All the local workstations continue to function properly but none of them can access anything across the router. What is the first tool you will use to troubleshoot this problem?

A. netstat -a
B. nslookup
C. ipconfig
D. nbtstat

>> !
Answer: C

Ipconfig displays configuration information about the TCP/IP stack of the machine you run it on. Your first step is to run Ipconfig and check the default gateway.

Nslookup would be used to determine the name associated with IP address of a host. Of course, if all attempts to connect to resources are failing this would be useless since you wouldn't be able to connect to the DNS server.

Netstat -a displays active TCP connections, and ports on which the computer is listening, but does not display the default gateway.

Nbtstat displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. It will not tell you the default gateway, however.


123. You are the Network Administrator for your company. After a vacation, you return to your office. You get an email from your manager stating that there are some machines which have lost their network connectivity. The systems are functioning normally when examined from the console; e.g. TCP/IP properties check out as fine. What should you check first?

A. If the network cards are damaged or have worn out.
B. If the DNS properties have been changed in your absence.
C. If one of the systems in the same network is broadcasting continuously.
D. If the machines' network cables are dislodged.

>> !
Answer: D

Checking the physical connections of a system will save time, and should be among the first things you check.

Continuous broadcasting on the network would flood the network and slow performance but it wouldn't terminate connections.

Network cards don't "wear out", and unless the stations are in a high traffic area or you have some sort construction or maintenance going on, there isn't much chance of damaging a cable.

DNS properties being changed would affect all stations, not just a some of them.


124. You are the Network Administrator for a financial institution. The accounts department has policies in place to control access to sensitive information. They have learned that if certain sensitive data is compromised, then the company could be liable for damages. You are told to ensure the security of the Accounting system when information is being transmitted. However, portions of the data on those systems must remain open to staff in other departments. You implemented IPSec on the Accounting servers and employees' workstations. In order to allow regular connections to those servers from other departments, while requiring IPSec connections from the machines that deal with confidential information, what security filter actions should you specify?

A. Allow Unsecured
B. Allow Only Secured
C. Block
D. Deny

>> !
Answer: A

An Allow Unsecured security filter action will always request an IPSec connection before it allows an unsecured request.

"Deny" would not allow any connections.

"Block" is not a valid option.

Allow only Secured will not request an IPSec connection. It will simply deny the unsecured connection.


125. You are in desktop support. You are asked to install two network cards on one system. You want to configure a specific IP address on one of the cards manually. How must you configure the other card?

A. One must be configured manually and the other must be allowed to accept a DHCP configuration dynamically.
B. Both cards must be configured manually.
C. With two cards, both must be configured dynamically.
D. Both cards may be configured either manually or dynamically.

>> !
Answer: D

Either DHCP or manual addressing can be used on the second card.


126. You learned that your company recently merged with another company. You were told that the systems of both companies need to be accessible from all the clients ASAP. The other company has a network that runs Windows 2000 Pro clients and a Netware 4.x server. Your company's network has Windows 2000 Pro clients, a Windows 2000 server and a Netware 4.x server. Your Windows 2000 server uses TCP/IP and provides DHCP services and the NetWare servers use IPX/SPX. What steps do you need to take to configure the Windows 2000 Professional machines, in addition to loading NWLink on them, so that they will be able to access all the resources on the network?

A. Install TCP/IP on all clients, and configure them to obtain an IP address from the DHCP server.
B. Install and manually configure TCP/IP, install NWLink IPX/SPX and set the frame type to 802.2.
C. Install and manually configure TCP/IP, install NWLink IPX/SPX and set the frame type to 802.3.
D. Use DHCP to assign the TCP/IP and NWLink IPX/SPX configurations.

>> !
Answer: A

Since DHCP is running, you can have the TCP/IP configuration downloaded from the server. Install TCP/IP and configure it to obtain an IP address automatically.


127. You are managing Windows 2000 Servers and Windows 2000 Professional computers distributed across 5 subnets, connected by a router on your network. The servers provide file and print services to the clients. You install the WINS Server service on a server on one subnet. You configure the WINS option in a DHCP scope to configure all of the other computers on the network to register with and query the WINS server. Users on the remote subnets report that they cannot access resources located on the WINS server if they use the NetBIOS name. However, if they use other TCP/IP connectivity options, they can connect. Users on the same subnet as the WINS server have no problem connecting at all. What is likely the problem?

A. You did not configure the WINS server to include its own IP address as the default gateway.
B. You configured the WINS server to include its default gateway IP address as a WINS client.
C. You did not configure the WINS server to include its own IP address as a WINS client.
D. You configured the WINS server to include its own IP address as a WINS client.

>> !
Answer: C

The WINS server itself should be a WINS client in order for other network nodes to access it based upon its NetBIOS name.

If you had configured the WINS server to include its own IP address as a WINS client, it would have worked.

The default gateway is a router. The WINS server may or may not fulfill that role.

You would not have to configure the default gateway address as a WINS client.


128. You are the administrator of a Windows 2000 network. You have recently installed a second WINS server for fault tolerance. You wish to ensure that the WINS servers remain as synchronized as possible. How should you configure the replication partners?

A. Configure both servers as pull partners so they can update their databases as needed.
B. Configure both servers as push partners so each can update the other server as soon as changes occur.
C. Configure them both as push/pull partners.
D. Configure one as a push partner and one as a pull partner.

>> !
Answer: C

Configuring both WINS servers as push/pull partners ensures the greatest level of synchronization possible. Both servers should have nearly identical databases at any given time. This method will greatly increase network traffic, however. This is the default WINS replication configuration.

You can also configure one server as a push partner and one as a pull partner, but this won't keep the databases as synchronized as the previous method.

Configuring both servers as pull partners will not ensure the greatest level of synchronization. Pull partners request information from their partners at configured time intervals.

Configuring both servers as push partners will not ensure the greatest level of synchronization. Push partners send update requests to their partner when a designated level of updates occurs.

If Network traffic is a concern, you can also disable persistent replication.


129. You are the Windows 2000 Administrator for your company. You administer a network which has three physical locations connected by WAN links. Each subnet has Windows 2000 Server and Windows 2000 Professional machines. One of the Windows 2000 Servers on each subnet is configured as a WINS server. You want all the machines on all the subnets to be able to access each other by name. How should you accomplish this task?

A. Configure push/pull replication partnerships between all the WINS servers.
B. Configure the clients to retrieve WINS information from just one of the WINS servers.
C. Configure push replication on one of the WINS servers.
D. Configure pull replication on one of the WINS servers.

>> !
Answer: A

Configuring clients to retrieve WINS information from just one server will not insure an up to date WINS database.

Configuring both servers as pull partners will not ensure the greatest level of synchronization. Pull partners request information from their partners at configured time intervals or when an update occurs on the push partner.

Configuring both servers as push partners will not ensure the greatest level of synchronization. Push partners send update requests to their partner when a designated level of updates occurs or at a specified time interval.

All WINS servers need to have the same name resolution information in each database. By establishing push/pull relationships between all the WINS servers, the information from each database is exchanged with other WINS servers until they all hold the same information.


130. You are the Network Administrator for your company. Your company is running WINDOWS 2000 Professional workstations in a WinNT4 domain called ABX. One subnet in a remote location is configured without a domain controller. You do not want WINS query traffic moving over the WAN connection. You understand that LMHOSTS files can be configured on each client to support logon validation over the WAN. Which of the following LMHOSTS file entries will allow clients, in the remote location, to log on to a domain controller called DC1?

A. 192.168.4.2 DC1 #PRE #DOM:DC1
B. 192.168.4.2 DC1 #PRE #DOM:ABX
C. 192.168.4.2 DC1 #PRE #INCLUDE_ABX
D. 192.168.4.2 DC1 #PRE #ABX

>> !
Answer: B

The LMHOSTS file should include an entry that includes the IP address and NetBIOS name of the server. The PRE tag will ensure that the entry is preloaded into the client's NetBIOS name cache on startup. The DOM tag identifies the server as a domain controller for the ABX domain.

The entry 192.168.4.2 DC1 #PRE #DOM:DC1 is incorrect because the #DOM tag identifies the DOMAIN. In this case the domain is ABX, not DC1.

The entry 192.168.4.2 DC1 #PRE #INCLUDE_ABX is incorrect because it does not identify the domain.

The entry 192.168.4.2 DC1 #PRE #ABX uses improper syntax.