mcsa mcse exam 70-296 study guide phần 9 potx

85 199 0
mcsa mcse exam 70-296 study guide phần 9 potx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

1. You are assigning the newest member of your staff responsibility for a new file server running Windows Server 2003. He will be an Administrator on the server, and you want him to be able to ask for help from his coworkers so that they can walk him through steps to resolve any issues that arise. How would you have the new server configured so that this new administrator can request Remote Assistance? A. Check the Remote Assistance box on the Remote tab in System Properties, and enable remote control in the Remote Assistance Settings dialog box. B. Check the Remote Desktop box on the Remote tab in System Properties. C. Check the Remote Assistance box on the Remote tab in System Properties, and add him as a Remote User in the Add New Users window. D. Enable Remote Assistance through Local Remote Assistance Group Policy. 2. You just recently finished configuring the properties for Solicited Remote Assistance in Remote Assistance Group Policy, and you start receiving complaints that certain experts outside the organization cannot respond to the invitations that are embedded in the body of e-mail messages.You verify that the correct ports on the firewall are open and that the property for the format of e-mail invitations is set to Mailto.What could be the problem? A. The experts do not have the Remote Assistance client installed. B. The experts’ e-mail client cannot read HTML-formatted messages. C. The Remote Assistance timeout period is too short. D. The experts do not have the correct password. 3. You want to restrict who can offer remote assistance to immediate members of the server support team in your IT organization.You decide that creating a group is the most efficient way to manage this function.What kind of group is required, and where do you create it? A. Create a Local group on each server that could request remote assistance, and add the group to the Local Administrators group. B. Create a Domain group and add it to the Local Administrators group on each server that could request remote assistance. C. Create a Universal group and add it to the Offer Remote Assistance Group Policy. D. Create a Domain group and add it to the Offer Remote Assistance Group Policy. www.syngress.com 642 Chapter 10 • Remote Management Self Test A Quick Answer Key follows the Self Test questions. For complete questions, answers, and explanations to the Self Test questions in this chapter as well as the other chapters in this book, see the Self Test Appendix. 272_70-296_10.qxd 9/29/03 12:19 PM Page 642 4. You have given the ability to offer unsolicited Remote Assistance to members of the server support team. However, they find that they can connect but not take control of the servers they are supposed to manage.What is the most efficient way of enabling the server support team members to take control of the servers they manage through unsolicited Remote Assistance while controlling the amount of access they have? A. Add the members of the server support team to the Domain Administrators group, and add the Domain Administrators group to the Local Administrators group on each server that could request Remote Assistance. B. Add the Domain group for the server support team members to the Local Administrators group on each server that could request Remote Assistance. C. Add the Domain account for each member of the server support team to the Local Administrators group on each server that could request Remote Assistance. D. Create Local accounts for each member of the server support team and add them to the Local Administrators group on each server that could request Remote Assistance. 5. You work for a consulting firm that has just installed Windows Server 2003.While at your office, you receive a Remote Assistance invitation to resolve a hardware issue from your client.You connect to the remote server without any problems; however, during the Remote Assistance session, your attempt to send a file with an updated driver is unsuccessful.What is the most probable cause for the lack of success? A. The client is refusing to accept the file. B. The required ports on one or both firewalls are closed. C. The client has insufficient rights to accept the file. D. Windows Messenger is not installed on the remote server. 6. The corporate service desk is overloaded, and management wants to leverage technical knowledge that exists throughout the organization. However, due to concerns over the security of corporate data, managers are wary of providing access to the organiza- tion’s desktop and laptop systems to individuals outside the organization.They are also wary of allowing individuals who do not possess the required knowledge to provide “help.”What strategy would you recommend to satisfy management’s requirements with the least amount of effort? (Choose all that apply.) A. Block Remote Assistance at the firewall. B. Enable Remote Assistance in domain Group Policy and restrict it to members of the IT group. C. Enable Remote Assistance in System Properties on every desktop and laptop, and add the appropriate users. D. Enable Remote Assistance in local Group Policy on every desktop and laptop. www.syngress.com Remote Management • Chapter 10 643 272_70-296_10.qxd 9/29/03 12:19 PM Page 643 7. You receive your first Remote Assistance invitation from a colleague who works in a highly secure unit within your organization, and you immediately respond. Every time you try to connect, however, your connection attempt is refused.You are on the same subnet and can ping to verify that you can “see” the remote server.There is no Domain Remote Assistance Group Policy; therefore, you verify the settings in your Local Remote Assistance Group Policy. Everything looks normal to you.You notice that Client Connection Encryption Levels is set to Client Compatible.What do you suspect is happening? A. Port 3389 is closed on the firewall. B. The client is refusing your request to take control of the remote server. C. The Client Connection Encryption Level is set to High Level. D. The Client Connection Encryption Level is set to Low Level. 8. A network administrator is experiencing difficulty with one of his Windows Server 2003 servers and sends a Remote Assistance invitation via Windows Messenger to a col- league who works in another office.The colleague accepts the invitation and attempts to connect to the remote system, but he is unsuccessful.All offices are interconnected using VPN connections over the Internet, and each office’s private network is protected by its own firewall that is not running NAT.What should be done to enable the Remote Assistance session? (Choose all that apply.) A. Have the firewall administrators in each office open the TCP/IP ports for Windows Messenger on their firewalls. B. Have the firewall administrators in each office open the TCP/IP ports used by Remote Desktop on their firewalls. C. Instruct the network administrator to enable Remote Assistance in the Terminal Services section of the local Group Policy Object Editor. D. The network administrator should create a Remote Assistance invitation file, attach it to an electronic mail message, and send it to his colleague. 9. You are experiencing a series of problems with a particular server that you manage remotely, and the hardware vendor is asking you for the system configuration.You know you can display the data on screen using msinfo32.exe, but the vendor is requesting a paper copy.What is the best way to print the information? A. Save the information from msinfo32.exe as a text file and copy it to your worksta- tion to print it on your default printer. B. Configure printer redirection in Remote Desktop Connection, reconnect to the server, and print the output of msinfo32.exe to your default printer. C. Have msinfo32.exe print to the server’s default printer. D. Display the output of msinfo32.exe in a Remote Desktop for Administration window and capture the window to your default printer. www.syngress.com 644 Chapter 10 • Remote Management 272_70-296_10.qxd 9/29/03 12:19 PM Page 644 10. You decide to start using Remote Desktop for Administration to manage the servers for which you have direct responsibility. Because you expect to have several Remote Desktop Connection windows open, you configure Audio Redirection in your Remote Desktop Connection client to “Bring to this computer.”This seems to be working well because you notice that sound is being directed to your workstation for all your servers except one.The sound system on your workstation is fully operational. What are the possible reasons that audio features are not being redirected from this one server? (Choose all that apply.) A. The server does not have a sound system or the sound system is disabled. B. The “Allow audio redirection” setting in local Terminal Services Group Policy on your workstation is set to Disabled. C. The “Allow audio redirection” setting in local Terminal Services Group Policy on the server is set to Disabled. D. The “Allow audio redirection” setting in domain based Terminal Services Group Policy is set to Disabled. 11. You take responsibility for a mission-critical server that absolutely has to be available on a 24/7 basis. As a result, you are issued a laptop computer so that you can manage the server whenever the need arises.You decide to use Remote Desktop for Administration to connect remotely to the server. At the office you can use the LAN, but at home only a dialup connection is available. How should you configure Remote Desktop Connection on your laptop to work efficiently from both locations? (Choose all that apply.) A. Before you attempt a Remote Desktop for Administration session, click the Experience tab and select LAN (10Mbps or higher) when connecting at the office or Modem (28.8Kbps) when connecting from home. B. Before you attempt a Remote Desktop for Administration session, click the Experience tab and select Custom and check the appropriate boxes depending on your location. C. Click the Experience tab, select Custom from the drop-down box, check the appropriate boxes for your location, and save the settings with a unique name on the General tab for future use. D. Use the default setting for Remote Desktop Connection—Modem (56Kbps)— for all connections. www.syngress.com Remote Management • Chapter 10 645 272_70-296_10.qxd 9/29/03 12:19 PM Page 645 12. You find that you consistently keep several Remote Desktop Connection sessions open during the course of your workday.You are beginning to get a little frustrated when you issue Windows keystroke combinations, expecting them to execute on your desktop but they end up executing on a remote server, or vice versa.What can you do to ensure that when you issue Windows keystroke combinations, they execute where you expect them to? A. Configure Apply Windows key combinations in Remote Desktop Connection to On the local computer. B. Configure Apply Windows key combinations in Remote Desktop Connection to In full screen mode only. C. Configure Apply Windows key combinations in Remote Desktop Connection to On the remote computer. D. Disable keyboard redirection in Local Terminal Services Group Policy on the remote servers that you manage. 13. Your organization has implemented VPN technology in support of the IT depart- ment’s new on-call policy for network administrators. As part of this policy, network administrators have the ability to connect to and manage corporate servers using their own ISPs.You find that the performance of Remote Desktop for Administration con- nections degrades in the early evening when utilization of your cable ISP’s services are at their highest.What can you do improve the performance of Remote Desktop for Administration on those rare occasions when you need to manage a server during your ISP’s busy times? A. Select Broadband (128Kbps–1.5Mbps) on the Experience tab in Remote Desktop Connection. B. Select Custom on the Experience tab in Remote Desktop Connection and accept the items that are checked by default. C. Select LAN (10Mbps or higher) on the Experience tab in Remote Desktop Connection. D. Select Custom on the Experience tab in Remote Desktop Connection and clear all check boxes. www.syngress.com 646 Chapter 10 • Remote Management 272_70-296_10.qxd 9/29/03 12:19 PM Page 646 14. You have been asked to take primary responsibility for a server that is used to perform systems management and track software licensing for your organization’s entire net- work. Due to the number of servers to which you need to connect, you need an effi- cient way to store the different connection configurations to the various servers. For some servers you need direct access to the server console; for others you need a workspace to enter data or generate reports. How can you manage remote access to each server for different levels of access? A. Install the Remote Desktop snap-in on the server and create connections for every server which you need to access remotely, configuring some connections to connect to the console and others to connect to individual sessions. B. Install the Remote Desktops snap-in on the workstation you will use to connect to the servers, configuring some connections to connect to the console and others to connect to individual sessions. C. Edit the Local Terminal Services Group Policy on the workstation you will use to connect to the servers, configuring some connections to connect to the console and others to connect to individual sessions. D. On the workstation you will use to connect to the servers, create a connection profile for each server, and save the profiles as .RDP files in your home directory. www.syngress.com Remote Management • Chapter 10 647 272_70-296_10.qxd 9/29/03 12:19 PM Page 647 www.syngress.com 648 Chapter 10 • Remote Management Self Test Quick Answer Key For complete questions, answers, and explanations to the Self Test questions in this chapter as well as the other chapters in this book, see the Self Test Appendix. 1. A 2. B 3. D 4. B 5. B 6. A, B 7. C 8. B 9. B 10. A, C 11. C ,D 12. B 13. B 14. A 272_70-296_10.qxd 9/29/03 12:19 PM Page 648 649 Disaster Recovery Planning and Prevention Exam Objectives in this Chapter: 3.1 Plan services for high availability 3.1.1 Plan a high availability solution that uses clustering service 3.1.2 Plan a high availability solution that uses Network Load Balancing 3.2 Plan a backup and recovery strategy 3.2.1 Identify appropriate backup types. Methods include full, incremental, and differential. 3.2.2 Plan a backup strategy that uses volume shadow copy. 3.2.3 Plan system recovery that uses Automated System Recovery (ASR). Chapter 11 MCSA/MCSE 70-296  Summary of Exam Objectives  Exam Objectives Fast Track  Exam Objectives Frequently Asked Questions  Self Test  Self Test Quick Answer Key 272_70-296_11.qxd 9/29/03 12:22 PM Page 649 Introduction Our final topic for discussion is disaster recovery.We could dedicate an entire book to this topic simply because it is an issue that can make or break your company. Having a disaster recovery plan in place is crucial to an organization’s livelihood. Many companies have felt the pain of being unprepared for a major catastrophe. For example, let’s say that one of your critical database servers suffers a major hardware catastrophe. All your company’s customer records and order information are stored on this system. If you do not have a backup of the information stored on this server, how do you plan to fulfill your customer’s orders and bill them for your products if your server is destroyed? While certain aspects of disaster recovery are beyond the scope of this book, one area that you must be familiar with for the 70-296 exam is backup and recovery.You need to understand the types of backup strategies that are available in Windows Server 2003, how to develop a plan for backing up your data, and the security concerns associated with doing so. Aside from backup and recovery, you also need to know some of the additional tools that Microsoft provides to aid you with disaster recovery issues, such as Automated System Recovery and the Recovery Console. In this chapter, you will learn about these topics as well as the various types of clus- tering services available in Windows Server 2003 to help reduce the impact of a disaster. Microsoft offers tools such as Network Load Balancing and Server Clustering in Windows Server 2003 to give you another degree of fault tolerance in your networking environment. By the time you reach the end of this chapter, you will be able to plan, configure, and implement these clustering services within your environment. Let’s begin this chapter with a discussion of the general concepts of disaster recovery. Understanding Disaster Recovery Disaster recovery could be described as the Rodney Dangerfield of IT—it gets no respect. The irony here is that disaster recovery can be your best friend if you give it the attention that it requires.Too many times we’ve seen environments in which IT staff diligently swap tapes on a daily basis while otherwise ignoring their disaster recovery plans—assuming they have even developed them. As a networking professional, you should make it a priority to stay diligent in all aspects of disaster recovery. Perhaps the most common reason that IT professionals do not pay attention to all aspects of disaster recovery is lack of understanding.This section covers two specific areas relating to disaster recovery. First, we discuss planning for disaster recovery and the funda- mentals of disaster recovery, as well as the steps you need to consider when planning a dis- aster recovery strategy.Then we discuss some of the ways that Microsoft assists you in the recovery of your Windows Server 2003 environment. Let’s begin with a discussion of disas- ters and define the types of disaster. www.syngress.com 650 Chapter 11 • Disaster Recovery Planning and Prevention EXAM 70-296 OBJECTIVE 3.2.3 272_70-296_11.qxd 9/29/03 12:22 PM Page 650 www.syngress.com Planning for Disaster Recovery If you follow current events, the widespread effects of any disaster will become clear to you rather quickly. Equipment, data, and personnel can be destroyed and staggering amounts of money lost by individual businesses, the economic after-effects of which can be felt inter- nationally on a regular basis. Some companies can tolerate a certain amount of downtime, but some never recover and find themselves out of business. A disaster recovery plan identi- fies potential threats against your network, including terrorism, fire, and flood, in order to provide employees guidance on how to deal with such events when they occur. Disasters can also result from the actions of people. Such disasters can occur as a result of employees accidentally or maliciously deleting data, system intrusions by hackers, viruses and malicious programs that damage data, and other events that cause downtime or damage. As with environmental disasters, a disaster recovery plan can be used to prepare and deal with such “human catastrophes.” Preparation for disaster recovery begins long before a disaster actually occurs. Data backups must be performed daily to ensure that data can be recovered, plans need to be created that outline the tasks that need to be performed and by whom, and other issues need to be addressed as well. Of course, we hope that such preparation will never be needed, but it is vital that you put a strategy in place to deal with incidents that could arise. The disaster recovery plan should identify as many potential threats as possible and include easy-to-follow procedures. In greater detail, a plan should provide countermeasures that address each threat effectively. Disaster recovery plans are documents that are used to identify potential threats and out- line the procedures necessary to deal with various types of threats.When creating a disaster recovery plan, administrators should try to identify all the types of threats that could affect their company. For example, a company in California would need to be concerned about earthquakes, fire, flood, power failures, and other kinds of natural disaster but would need to worry less about blizzards. Once the administrators have determined the disasters that their company could face, they can create procedures to minimize the risk of such disasters. Disasters are not limited to acts of nature but can be caused by electronic means. For example, DoS attacks occur when large numbers of requests are sent to a server, which over- loads the system and causes legitimate requests for service to be denied.When an e-com- merce site experiences such an attack, the losses can be as significant as any natural disaster. Risk analysis should be performed to determine the company resources that are at risk when a disaster occurs.This analysis should include such elements of a system as: ■ Loss of data ■ Loss of software and hardware ■ Loss of personnel Software can be backed up, but the cost of applications and OSs can make up a consid- erable part of a company’s operating budget.Thus, copies of software and licenses should be Disaster Recovery Planning and Prevention • Chapter 11 651 272_70-296_11.qxd 9/29/03 12:22 PM Page 651 [...]... two extremes is the key to creating a disaster recovery plan that is affordable and effective www.syngress.com 272 _70- 296 _ 11.qxd 9/ 29/ 03 12:22 PM Page 653 Disaster Recovery Planning and Prevention • Chapter 11 EXAM 70- 296 OBJECTIVE Windows Disaster Recovery 3.2.3 As a Windows Server 2003 MCSE, you need to know the various methods of disaster recovery that Microsoft provides Aside from Windows backup... backups need to be locked up, and policies must be in place that detail who is authorized to pick up the data when it’s needed www.syngress.com 665 272 _70- 296 _ 11.qxd 666 9/ 29/ 03 12:22 PM Page 666 Chapter 11 • Disaster Recovery Planning and Prevention EXAM 70- 296 OBJECTIVE Backup Strategies 3.2.1 Backing up data is a fundamental part of any disaster recovery plan.When data is backed up, it is copied to a... MSCS2planning_6.asp EXAM 70- 296 OBJECTIVE Planning a High-Availability Solution 3.1 In this section, we use the information on using Windows clustering to plan for a high3.1.1 availability solution using the two high-availability services.Within our plans, we take a 3.1.2 look at some of the considerations that you must assess prior to implementing a server www.syngress.com 272 _70- 296 _ 11.qxd 9/ 29/ 03 12:22 PM... a question about the Recovery Console on your exam, read it carefully If you are asked about logging into the Recovery Console, check to see if the question mentions that the server is a domain controller or a standalone server This information will determine which administrator account to use www.syngress.com 272 _70- 296 _ 11.qxd 9/ 29/ 03 12:22 PM Page 6 59 New & Noteworthy… Disaster Recovery Planning... Wizard (Advanced) option www.syngress.com 667 272 _70- 296 _ 11.qxd 668 9/ 29/ 03 12:22 PM Page 668 Chapter 11 • Disaster Recovery Planning and Prevention Figure 11.8 The Backup Utility 4 When the Backup Wizard starts, click Next 5 When you are prompted on what you want to backup, select Backup everything on this computer (see Figure 11 .9) and click Next Figure 11 .9 Selecting Data for Backup 6 Choose a location... www.syngress.com 272 _70- 296 _ 11.qxd 9/ 29/ 03 12:22 PM Page 6 69 Disaster Recovery Planning and Prevention • Chapter 11 Figure 11.10 Completing the Backup 8 Now we will select the type of backup (see Figure 11.11) Since we are using a differential backup for this exercise, click the down arrow beneath Select the type of backup and choose Differential Figure 11.11 Selecting a Type of Backup 9 Click Next 10 When... select “Repair a Windows installation using Recovery Console.” www.syngress.com 6 59 272 _70- 296 _ 11.qxd 660 9/ 29/ 03 12:22 PM Page 660 Chapter 11 • Disaster Recovery Planning and Prevention 5 The installation process terminates and begins launching the Recovery Console 6 You will be prompted to select a Windows installation In our example, choose option 1, C:\WINDOWS 7 Next you may need to enter the administrator... of the lines in bold text that indicate drivers that failed to load during system startup www.syngress.com 272 _70- 296 _ 11.qxd 9/ 29/ 03 12:22 PM Page 655 Disaster Recovery Planning and Prevention • Chapter 11 Figure 11.1 A Sample ntbtlog.txt File Microsoft (R) Windows (R) Version 5.2 (Build 3 790 ) 5 18 2003 20:48:05.500 Loaded driver \WINDOWS\system32\ntoskrnl.exe Loaded driver \WINDOWS\system32\hal.dll... Continued www.syngress.com 655 272 _70- 296 _ 11.qxd 656 9/ 29/ 03 12:22 PM Page 656 Chapter 11 • Disaster Recovery Planning and Prevention Figure 11.1 A Sample ntbtlog.txt File Loaded driver \SystemRoot\system32\DRIVERS\atimpae.sys Loaded driver \SystemRoot\system32\DRIVERS\cdrom.sys Loaded driver \SystemRoot\system32\DRIVERS\usbuhci.sys Loaded driver \SystemRoot\system32\DRIVERS\el90xbc5.sys Loaded driver \SystemRoot\system32\DRIVERS\rdpdr.sys... Figure 11.6 www.syngress.com 272 _70- 296 _ 11.qxd 9/ 29/ 03 12:22 PM Page 663 Disaster Recovery Planning and Prevention • Chapter 11 Figure 11.6 Copying the ASR Files to Diskette 8 You will be prompted to insert a blank diskette into your drive; the system then copies the system settings and backup media information to the diskette This completes the ASR backup process EXAM WARNING ASR is not a full-system . Recovery (ASR). Chapter 11 MCSA/ MCSE 70- 296  Summary of Exam Objectives  Exam Objectives Fast Track  Exam Objectives Frequently Asked Questions  Self Test  Self Test Quick Answer Key 272 _70- 296 _ 11.qxd 9/ 29/ 03. D 4. B 5. B 6. A, B 7. C 8. B 9. B 10. A, C 11. C ,D 12. B 13. B 14. A 272 _70- 296 _ 10.qxd 9/ 29/ 03 12: 19 PM Page 648 6 49 Disaster Recovery Planning and Prevention Exam Objectives in this Chapter: 3.1. disaster. www.syngress.com 650 Chapter 11 • Disaster Recovery Planning and Prevention EXAM 70- 296 OBJECTIVE 3.2.3 272 _70- 296 _ 11.qxd 9/ 29/ 03 12:22 PM Page 650 www.syngress.com Planning for Disaster Recovery If

Ngày đăng: 13/08/2014, 15:20

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan