1. Trang chủ
  2. » Công Nghệ Thông Tin

mcse exam 70-293 planning and maintaining a windows server 2003 network infrastructure phần 10 pot

104 300 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 104
Dung lượng 1,56 MB

Nội dung

Self Test Questions, Answers, and Explanations • Appendix A 963  C.The problem your boss is describing is cache pollution. Although you can enable pro- tection against cache pollution to mitigate this risk, you should try to stop the potential risk at the firewall, if possible. By configuring the firewall to not allow any inbound traffic that uses the DNS ports from reaching DNS-B, you are preventing any potentially mali- cious traffic in the form of bogus DNS queries from reaching DNS-B in the first place. You can’t use the same restriction for DNS-A, because it provides name resolution for Internet hosts that wish to connect to your Web and mail servers. However, if recursion is disabled on DNS-A, it will still answer queries for zones that it is authoritative for, but it will send a negative response to recursive queries. Disabling recursion also has the added benefit of providing a degree of protection against DoS attacks.  A, B, D. Answer A is workable and provides additional security. However, the boss wants the highest level of protection against multiple common attacks on DNS servers, so this choice is not as good as Answer C. Answers B and D are wrong because they compromise the ability of DNS-A to resolve the names of your Web and mail servers. 3. You are the administrator of a Windows network that consists of a mixture of Windows NT 4,Windows 2000, and Windows Server 2003 servers, providing a mix of file, print, messaging, and other services critical to your network.You are currently running WINS, DNS, and DHCP services on your network.You have already enabled dynamic DNS on your forward and reverse lookup zones, but you want to ensure that all of your client computers can find the name-to-address mapping of all your servers using DNS.You want to minimize the administrative effort for this project.What action should you take? (Select the best answer.) A. Place the DHCP servers in the DnsUpdateProxy group. B. Enable DHCP to update forward and reverse lookup zones on behalf of all DHCP clients. C. Manually enter the records for servers that have static addresses. D. Create a WINS resource record in the forward and reverse lookup zones.  D.Windows NT 4 operating systems are not able to update static addresses in a dynamic zone.You must either manually enter resource records for these servers or con- figure the DNS to query the WINS server when it cannot resolve a name mapping. Since the latter involves the least administrative effort, Answer D is the correct choice.  A, B, C. Answer A is incorrect because it will not have an effect on whether resource records for clients are created in the DNS zones.Answer B is incorrect because it is unlikely a server is going to be configured as a DHCP client.Answer C would work, but it involves more administrative effort than the correct response and has a greater risk of introducing error. www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 963 964 Appendix A • Self Test Questions, Answers, and Explanations 4. You are using ISA Server 2000 as a firewall and Web proxy server to protect your internal AD network and provide Web proxy and caching services for HTTP requests.You cur- rently are using three DNS servers to support the DNS queries. DNS-A is used for your internal AD root. DNS-B is used to provide name resolution for Internet clients that want to connect to your public Web and mail servers. DNS-C is used to provide Internet name resolution. How should you configure the DNS and ISA Server access rules to provide the maximum security and functionality for your DNS infrastructure? A. On DNS-A, remove the root hints file and enable recursion. Configure ISA Server to allow no traffic to or from this server. On DNS-B, remove the root hints file and dis- able recursion. Configure ISA Server to allow inbound traffic on TCP and UDP port 53 to the DNS server with a source port of ANY. On DNS-C, enable recursion and update the root hints file. Configure ISA Server to allow outbound traffic on TCP and UDP port 53 with a source port of ANY. B. On DNS-A, remove the root hints file and disable recursion. Configure ISA Server to allow no traffic to or from this server. On DNS-B, remove the root hints file and dis- able recursion. Configure ISA Server to allow inbound traffic on TCP and UDP port 53 to the DNS server with a source port of ANY. On DNS-C, enable recursion and update the root hints file. Configure ISA Server to allow outbound traffic on TCP and UDP port 53 with a source port of ANY. C. On DNS-A, remove the root hints file and enable recursion. Configure ISA Server to allow no traffic to or from this server. On DNS-B, remove the root hints file and dis- able recursion. Configure ISA Server to allow outbound traffic on TCP and UDP port 53 to the DNS server with a source port of ANY. On DNS-C, enable recursion and update the root hints file. Configure ISA Server to allow inbound traffic on TCP and UDP port 53 with a source port of ANY. D. On DNS-A, remove the root hints file and disable recursion. Configure ISA Server to allow no traffic to or from this server. On DNS-B, update the root hints file and enable recursion. Configure ISA Server to allow inbound traffic on TCP and UDP port 53 to the DNS server with a source port of ANY. On DNS-C, disable recursion and update the root hints file. Configure ISA Server to allow outbound traffic on TCP and UDP port 53 with a source port of ANY.  A. DNS-A is used for internal DNS resolution.You do not want it to perform recursion to the Internet or be accessible through the firewall.You need to remove the root hints file and prevent ISA Server from forwarding Internet traffic to it. However, it should still be able to perform recursion on your internal network. DNS-B is used to provide authoritative responses to requests from Internet clients who wish to connect to Web and mail servers, but it should not be able to perform recursion.You should disable recursion and remove the root hints file on this server. ISA Server needs to be configured to allow inbound traffic to this server on TCP and UDP port 53 with a source port of ANY. DNS-C is used by ISA Server itself to provide name resolution for Web proxy requests. It www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 964 Self Test Questions, Answers, and Explanations • Appendix A 965 needs to be able to perform recursion. ISA Server should be configured to allow it to communicate with external DNS servers using TCP and UDP port 53 with a source port of ANY.  B, C, D. The remaining responses are incorrect because they do not meet the require- ments, as explained above. 5. You are the administrator of a Windows Server 2003 network.Your company has recently merged with another company and you have set up trusts between the AD forests and have set up conditional forwarding on your DNS servers to resolve names in the AD forest of the newly merged company.You would like your users to be able to resolve names in the newly merged company with the least possible effort and typing on their part.You would like to implement a solution with the least possible effort on your part. What should you do? A. Using ADSI, create an msDS-AllowedDNSSuffixes attribute in the domain object container and include the domain suffix of the newly merged AD forest in the list of allowable suffixes. B. Create a group policy that configures the DNS clients with a custom DNS suffix search list. C. Configure the DHCP server option 81 to supply the name of the domain suffix of the newly merged AD forest to DHCP clients. D. Configure a stub zone for a root domain of the newly merged company on your DNS servers.  B.To enable DNS clients to resolve unqualified names (single computer names that require the least typing on the part of the client) in a disjointed namespace, you must create a custom DNS suffix search list.You can manually configure this on the DNS clients. However, Group Policy is the most efficient means of implementing this config- uration on the client computers.  A, C, D. Answer A would allow the primary computer name to be different from the AD domain name the computer is a member of and is not a relevant solution. Answer C is incorrect because DHCP option 81 allows you to specify only one domain name, which should be the domain name used for your own AD domain. Answer D is incor- rect because a stub zone would only accomplish what your conditional forwarding is already doing. 6. You are a DNS administrator of a large, distributed Windows Server 2003 network.The AD domain tree consists of a number of child domains that reflect the geographic loca- tions of the different offices of the company.You are responsible for the DNS root domain of the AD forest and the child domain of the office where you work.All administrative responsibility for the remaining child domains is performed by locally based administrators in their respective offices.The capacity of the WAN links connecting the various offices is www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 965 966 Appendix A • Self Test Questions, Answers, and Explanations showing signs of being insufficient.You want to ensure that DNS resolution for the child domains outside your administrative control will work company-wide in a fault-tolerant manner without adding additional strain to available resources.What should you do? (Select the best answer.) A. On the root DNS servers, configure conditional forwarding for the child domains. B. On the DNS servers in the child domain under your control, configure secondary zones for the other child domains. C. On the root DNS servers, configure stub zones for the child domains. D. On the DNS servers in the child domain under your control, configure secondary zones for the other child domains.  C.When you configure stub zones on the DNS servers responsible for the root, the SOA, NS, and A records that indicate the authoritative servers for the child domains are automatically updated whenever a local administrator makes changes to these records in the primary zone.These DNS servers for these subdomains are not under your control, so, if you were to configure conditional forwarding on the root DNS servers, the local administrators would need to inform you so that you could manually make the required configuration changes. Stub zones provide the most fault-tolerant solution. Configuring secondary zones on the root DNS servers would also allow fault-tolerant name resolu- tion, but would increase replication traffic across the WAN.  A, B, D. Answers B and D are incorrect because the solution must ensure DNS reso- lution for the entire company. If you were to implement these solutions in your child domain, the scope of the solution would be limited to your domain and not the other child domains. Of course, you and the other administrators may want to implement such solutions to minimize the amount of DNS referral traffic that would occur if DNS servers had to walk the tree to perform iterative queries in an attempt to resolve names in the various child domains. 7. You are the enterprise administrator of a Windows network that comprises a number of Windows 2000 and Window 2003 domain controllers.You want to use Active Directory- integrated zones for your zone data to enhance security and optimize replication of zone data.What should you choose as the replication scope? (Select the best answer.) A. To all DNS servers in the forest B. To all domain controllers in the AD domain C. To all DNS servers in the AD domain D. To all domain controllers specified in the scope of an application partition  B. Because you still have Windows 2000 domain controllers in your environment, your only choice is store the zone data in the domain partition.  A, C, D.These answers are incorrect because they require the presence of an applica- tion directory partition, which is not available on Windows 2000 domain controllers. www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 966 Self Test Questions, Answers, and Explanations • Appendix A 967 Planning for NetBIOS Name Resolution 8. You are an administrator of a Windows Server 2003 network.You want to automate the backups of the WINS database.You want this backup to occur at least once every 24 hours.What should you do? (Select the best answer.) A. Configure the Windows Backup utility to back up the contents of the %system- root%\System32\Wins folder once every 24 hours. B. Using the AT command scheduler, create a batch file that temporarily stops the WINS service, copies the WINS database to another location, and then restarts the service. C. Use a third-party backup solution that is capable of backing up open files and con- figure it to back up the contents of the %systemroot%\System32\Wins folder once every 24 hours. D. In the WINS server console, configure a path to store backups of the database and ini- tiate a manual backup.  D.The WINS service includes the ability to back up the WINS database automatically once every 24 hours and on the WINS service shutdown, or to back it up manually.To configure WINS to perform automatic backups of the database, you must specify a path for the backup and perform at least one manual backup of the database.You can subse- quently use Windows Backup or a third-party backup solution to back up the contents of the WINS backup folder without needing to be concerned about the consequences of backing up an open file.  A, B, C. The remaining answers are partially viable to varying degrees, but do not rep- resent the best solution. 9. You are the administrator of a Windows Server 2003 network.You are responsible for a number of WINS servers that are set up as push/pull replication partners to each other. You have a number of static mappings in your WINS database and want to remove one of these mappings from the WINS database.You want to ensure that the record is deleted on all servers with the least administrative effort. How should you delete the WINS static mapping? (Select the best answer.) A. On the owner server of the mapping, find the record and perform a simple deletion. B. On the owner server of the mapping, find the record and perform a tombstone dele- tion. C. On all of the WINS servers, find the record and perform a simple deletion. D. On all of the WINS servers, find the record and perform a tombstone deletion.  B.When you perform a tombstone deletion, the record is marked with an attribute that is replicated with the record to other WINS server.The attribute instructs other WINS servers to remove the record through the scavenging process. www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 967 968 Appendix A • Self Test Questions, Answers, and Explanations  A, C, D. Answer A is incorrect because the record will still remain on the replication partners and will eventually be replicated back to the owner WINS server.Answers C and D are incorrect because they require unnecessary administrative effort to accom- plish something that can be performed in one simple operation. 10. You are the administrator of a Windows Server 2003 network.You have five WINS servers and need to reconfigure the replication topology as a result of some recent upgrades to your WAN links.All of your WAN links connecting the head office and your four branch offices now have ample bandwidth to handle additional traffic.You want to ensure the shortest convergence time of replicated records, while at the same time keep the number of replication partnership agreements to an absolute minimum.What replication topology should you choose? (Select the best answer.) A. Ring topology B. Mesh topology C. Hub-and-spoke topology D. Hybrid of ring and hub-and-spoke topology  C. A hub-and-spoke topology ensures the shortest convergence time with the fewest replication partnerships to manage.The longest path from one server to any other is two hops.The number of partnership agreements is eight. (You need to define a push/pull partnership agreement on each side of the replication path between the hub server and the spoke servers.)  A, B, D. Answer A is incorrect because it would require 10 push/pull partnership agreements to establish and would result in replication paths that were three hops in distance. Answer B is incorrect because it is an overly complex replication topology and would require 20 replication partnership agreements to manage.Answer D is an overly complex topology for the number of WINS servers and not required by the design. Troubleshooting Name Resolution Issues 11. You are an administrator of a Windows Server 2003 network.Your company, Syngress Industries, manages its own DNS for its public Web and mail servers.The primary DNS server for the syngress.com domain is located in a DMZ protected by ISA Server.Your ISP is hosting secondary servers for the syngress.com domain on its BIND 9 servers. While going through your performance logs, you notice a brief but sudden increase in the number of AXFR requests received and AXFR success sent events. Previously, these coun- ters had values of zero in your logs.You suspect your ISP has changed the configuration of its BIND servers, but the ISP denies it and insists that the secondary zones are behaving optimally.You are concerned by these values and decide to investigate the issue and cor- www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 968 Self Test Questions, Answers, and Explanations • Appendix A 969 rect it, if necessary.What is the likely cause of the problem and what should you do? (Select the best answer.) A. A rogue DNS server is attempting to pollute the cache on your DNS server by sending bogus queries over TCP, rather then UDP.You should turn on debug logging to determine the source IP address and block all traffic from this address on ISA Server.You should also enable protection against cache pollution and inform the ISP. B. A malicious user is issuing an nslookup –ls or equivalent command against your DNS server.You should configure the DNS server to allow zone transfers only to the IP addresses of the secondary servers at the ISP.You should also block all external requests destined for the primary DNS server on TCP port 53 with a source port of ANY, except for the external addresses of the secondary servers.You should inform the ISP managers and ask them to confirm an equivalent level of security on their servers. C. A malicious user is attempting to launch a DoS attack on your DNS.You should disable recursion on the DNS server.You should also turn on debug logging to determine the source IP address of the attack and block the IP address at ISA Server.You should inform the ISP to be on the lookout for similar attacks against its DNS servers. D. A malicious user is issuing an nslookup –ds or equivalent command against your DNS server to get detailed information.You should turn on debug logging to deter- mine the source IP address. Once you determine the IP address, you should block it from all communication with your DNS servers at ISA Server.You should inform the ISP managers and ask them to confirm an equivalent level of security on their servers.  B. AXFR is the DNS protocol used for full zone transfers. Counters in your perfor- mance logs indicate requests to do a full zone transfer have been received by and suc- cessfully responded to by your DNS server.That means that someone has issued an nslookup –ls or equivalent command against your DNS server. By default, BIND 9 servers will attempt to use IXFR to perform incremental zones transfers, unless this option is explicitly disabled. Since you experienced only a brief event, it is likely the user got what he or she wanted.You should, however, protect your server against future occurrences of zone transfers to unauthorized IP addresses, which is also known as footprinting or name dumping.TCP port 53 is used for zone transfers, and blocking this port should not affect the DNS server’s ability to respond to name queries, which should be taking place on UDP port 53.  A, C, D. Answer A is incorrect because an attempt to pollute the cache would nor- mally occur as a result of rogue DNS server replying with information that is super- fluous to a query issued against it by the DNS.Answer C is incorrect because a DoS attack is most effective if it ties up a DNS server with recursive query requests. It is no doubt possible to tie up a DNS server with excessive zone transfer requests, but you would expect this activity to be sustained over a period of time. Answer D is incorrect because the nslookup –ds command requests detailed information on a particular record and is used for debugging. It does not display the contents of the entire zone the way www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 969 970 Appendix A • Self Test Questions, Answers, and Explanations an nslookup –ls command would. (Note that the –ls switch is available only in NSLookup interactive mode; the nslookup –ds switch is available only in NSLookup noninteractive mode.) 12. You are the administrator of a Windows Server 2003 network. Recently, a junior adminis- trator has, on your instructions, rebuilt one of your WINS servers (WINS-A).You don’t have a backup of the WINS database and need to restore the database through reregistra- tions of WINS clients and replication with another WINS server,WINS-B. Both servers are configured as push/pull replication partners of each other. As soon as WINS-A is brought back online, users configured to use WINS-A as their WINS server immediately start to complain that they can’t access file server shares on this server. By the time you hear about the complaints and try to reproduce the results, you find that that the problem has disappeared. However, you take the complaints seriously and investigate further.You examine the WINS database on WINS-B and see some data that strikes you as odd. Based on the data shown in the table here, what problem is indicated? (Select the best answer.) Record Name Type IP Address Owner Version WINS-A [00h] Workstation 192.168.100.20 192.168.179.5 20D WINS-A [20h] File Server 192.168.100.20 192.168.179.5 20C A. There is a problem with the order of service registration.The workstation service needs to be registered before the file server service. B. There is a problem with WINS replication that has caused the wrong owner to be associated with WINS-A. C. The TCP/IP stack on WINS-A is configured with the IP address of WINS-B as its secondary WINS server. D. The TCP/IP stack on WINS-B is not configured to register itself with a WINS server.  C.WINS-A is registering its NetBIOS names with WINS-B, rather than itself.A com- parison of the IP Address and Owner fields show two different addresses.These should match or problems with name resolution on the network can occur. In the scenario described here, users who pointed to the WINS-B server would have no problem con- necting to file server shares on WINS-A because the WINS-B server has a mapping for the file server service on WINS-A. However, users pointing to WINS-A would not be able to resolve this mapping until replication had merged the record from WINS-B, hence the transient nature of the problem. A WINS server should always be configured to register NetBIOS names only with itself.  A, B, D. Answer A is incorrect because the order in which services register has nothing to do with NetBIOS name resolution.There might be problems with replication, but the evidence presented doesn’t point to this, so Answer B is incorrect.While you abso- www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 970 Self Test Questions, Answers, and Explanations • Appendix A 971 lutely should configure a WINS server to register its NetBIOS records with itself, it will eventually do so even if the configuration is left blank (this could take some time), so Answer D is incorrect. 13. You are the administrator of a Windows Server 2003 network using DNS and WINS to provide name resolution services.You have two WINS servers that are set up with the default push/pull configurations. Users have been complaining for days about problems connecting to a server called File_Server2.You ping File_Server2 and get a response from the computer. However, when you issue a net view \\File_Server2 command, you get an error message stating that a duplicate name exists on the network.What is the likely cause of the problem? (Select the best answer.) A. The underscore character cannot be used in a NetBIOS name. Rename the computer and reboot it. B. There is a problem with the replication of the records for File_Server2. Manually ini- tiate replication with the WINS server that is the owner of the record of File_Server2. C. The WINS database is corrupt. Manually initiate consistency checking to restore database integrity. D. The WINS server contains an incorrect name mapping for File_Server2.  D.You can ping File_Server2, so the issue is related to the NetBIOS name resolution. When you invoke the net view command, you force the use of the NetBIOS interface, which will subsequently enforce the rules for NetBIOS names. Computer names are exclusive and must be unique. Because host name resolution resolves the name to a dif- ferent IP address than the IP address resolved by the NetBIOS name mapping, you will get a duplicate name error message.We know the IP address returned by the ping is correct and that host name resolution is working for this computer.  A, B, C. Answer A is incorrect because underscores are valid characters for NetBIOS names. Underscores are problematic in some implementations of DNS, but are not a problem for Windows DNS.Answer B is a possibly correct answer because, if the WINS record has not replicated throughout the environment, you might see a similar problem. However, users have been complaining for some time—much longer than the default replication interval. Answer C is incorrect because if there were problems with database consistency, the problems would be more widespread. 14. You are the administrator of a WINS server.The WINS server has suffered a hardware failure, and you have subsequently been forced to reinstall Windows Server 2003 and the WINS service. Fortunately, you have a recent backup of the WINS database.You restore the database, but notice that none of the former WINS configuration settings are present. What should you do? (Select the best answer.) A. You need to use the %systemroot%\system32\jetpack.exe file to restore the WINS configuration after you restore the database. www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 971 972 Appendix A • Self Test Questions, Answers, and Explanations B. You need to restore the original system state from the backup to the Windows Server 2003 server. C. You need to invoke database consistency checking on the database. D. You need to set up replication with a WINS server that was a replication of the former WINS server.  B.WINS configuration settings are stored in the Registry.The WINS database contains only NetBIOS registration data, not configuration information.You therefore need to restore the Registry in order to restore the WINS configuration settings.You can do this by restoring the system state backup or a backup of the Registry itself.  A, C, D. Answer A is incorrect because the Jetpack utility does not have this function- ality.Answers C and D are incorrect because the database does not contain any WINS configuration information. 15. You are the administrator of a Windows Server 2003 network.After restoring the Windows Server 2003 domain controller that you had taken off the network for a few hours for maintenance, your Windows 95 and 98 users have begun complaining that they are unable to access resources on this computer.You remember seeing a message about a duplicate name on the network when you turned on the domain controller, but didn’t think much of it at the time because you had changed the IP address of the domain con- troller before you took it offline.What action should you take? A. Create static mappings in the WINS database for the domain controller and disable the migrate on setting. B. Create static mappings in the WINS database for the domain controller and enable the migrate on setting. C. Have the users of Windows 95 and 98 computers issue an nbtstat –RR command. D. Have the users of the Windows 95 and 98 computers issue an ipconfig /flushdns command.  A. It is likely that someone on your network has configured a computer with the same name as the domain controller and hijacked the NetBIOS registration of the domain controller, resulting in a redirection attack.Windows 95 and 98 clients will use NetBIOS for logon services and to connect to file sharing resources. Given the circumstances, the duplicate name message is clear evidence of this kind of attack. If another computer is registered with the same name and is online, the WINS server will report a duplicate name error message back to the computer that is trying to initialize with the same name. For mission-critical servers, it is good idea to create static mappings that cannot be over- written by dynamic registrations.This situation represents one of the few circumstances that can justify the use of static mappings.  B, C, D. Answer B is incorrect because enabling the migrate on setting would allow a dynamic registration to overwrite a static registration. Answers C and D are incorrect www.syngress.com 255_70-293_Appx.qxd 9/10/03 6:17 PM Page 972 [...]... administrator has told you that recent database growth is not the case.The databases have been consistently using between 40 and 45 percent of the available disk space.You have been asked to resolve this problem.What can you do to increase the responsiveness of the SQL database? A Install more RAM in the server B Change the RAID array to a RAID 0+1 configuration C Change the RAID array to a RAID 0 configuration... configuration A, B, and D.You will need to create a remote access policy, configure the WAPs to use RADIUS authentication, and add them as clients of the IAS server; therefore, Answers A, B, and D are correct Answer C is incorrect because the existing IAS server will act as the RADIUS server 8 You have configured a WAP using the EAP-TLS protocol.The WAP is connected to a LAN with a Windows Server 2003 server. Which... Remote Assistance www.syngress.com 979 255 _70-293_ Appx.qxd 980 9 /10/ 03 6:17 PM Page 980 Appendix A • Self Test Questions, Answers, and Explanations Chapter 8: Planning, Implementing, and Maintaining a High-Availability Strategy Understanding Performance Bottlenecks 1 You have been tasked with the implementation of enhancing the security of your network and have been allocated a modest budget to accomplish... and Network Load Balancing Making Server Clustering Part of Your High-Availability Plan 1 You have purchased a prepackaged solution that uses an eight-node majority node set (MNS) server cluster Because you have so many nodes, you have decided to install three nodes in your Atlanta data center, three in your Denver data center, and the last two in your Seattle sales office.You notice fairly soon that... Increasing demand on the system has led to lower than desirable performance Company management has authorized the purchase of new server hardware and would like you to upgrade the server as quickly as possible with the least amount of risk and additional expense.What is the best way to accomplish the upgrade in the fastest possible time, with the lowest risk, and no additional cost? A Use a third-party... supporting a server from a previous administrator The system has dual 1 GHz CPUs, 2048MB of RAM, and a dual-channel caching hardware RAID controller with sixteen 18GB hard drives configured as a RAID 5 array.The system has been running an important SQL database for some time, but over the last few weeks, responsiveness has decreased as more people have been accessing the SQL databases.Your part-time SQL administrator... combination of Windows Server 2003 and Windows 2000 Server domain controllers.Which of the following actions may be necessary to enable all of Windows Server 2003 s security features? (Choose all that apply.) A Eliminate or upgrade the Windows 2000 Server domain controllers B Eliminate all Windows 2000 clients C Raise the functional level to Windows Server 2003 D Raise the functional level to Windows Server. .. Planning for Fault Tolerance 13 You are responsible for administering a Windows Server 2003 system.The system has a Pentium III 800 MHz CPU, 102 4MB of RAM, and four hard drives configured in a www.syngress.com 255 _70-293_ Appx.qxd 9 /10/ 03 6:17 PM Page 987 Self Test Questions, Answers, and Explanations • Appendix A RAID 5 array that reside in an external seven-slot chassis.The array is controlled by a. .. initial funds have been allocated and, if necessary, ongoing funds will be made available.What backup strategy should you adopt? A Full backups nightly to a tape drive installed in each server B Full backups nightly to a single, centralized tape drive www.syngress.com 255 _70-293_ Appx.qxd 9 /10/ 03 6:17 PM Page 983 Self Test Questions, Answers, and Explanations • Appendix A C Full backups weekly, with daily... existing IAS server on the network. Which of the following tasks are necessary to support wireless access? (Choose all that apply.) A Create a remote access policy B Configure the WAPs to use RADIUS authentication www.syngress.com 975 255 _70-293_ Appx.qxd 976 9 /10/ 03 6:17 PM Page 976 Appendix A • Self Test Questions, Answers, and Explanations C Install a RADIUS server D Add the WAPs as clients in the IAS server s . server. Chapter 7: Planning, Implementing, and Maintaining a Remote Access Strategy Planning the Remote Access Strategy 1. You are planning a remote access server and need to enable access for several. A • Self Test Questions, Answers, and Explanations 12. You are operating a remote access server and currently allow VPN access and dial-in access.You have decided to disallow dial-in access after. 979 980 Appendix A • Self Test Questions, Answers, and Explanations Chapter 8: Planning, Implementing, and Maintaining a High-Availability Strategy Understanding Performance Bottlenecks 1. You have

Ngày đăng: 13/08/2014, 15:21

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN