-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()
A . Bandwidth 56000
B . Bandwidth 56000000
C . Bandwidth 56
D . Bandwidth 56k
-
An administrator must verify all filesets are completely installed before an upgrade. Which of the following commands will perform this task()
A . Islpp -v
B . Ippchk -v
C . installp -v
D . instfix -v
-
You need to design an administrative model for the Exchange Server environment. What should you do?()
A . Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staff
B . Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staff
C . Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxes
D . Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxe
-
Which command would an administrator use to list which filesystems are in volume group datavg?()
A . lspv datavg
B . lslv -a datavg
C . lsfs -v datavg
D . lsvg -l datavg
-
You need to provide an administrator the ability to view and interact with your current logon session. What should you do?()
A . At the command prompt, run Psr.exe.
B . At the command prompt, run Winrm.exe quickconfig.
C . From the Start menu, open Remote Desktop Connection.
D . From the Start menu, open Windows Remote Assistance.
-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
You need to design an administrative model that meets the business and technical requirements. What should you do?()
A . Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins group
B . Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins group
C . Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins group
D . Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins grou
-
Which of the following should you enable to prevent a switch from forwarding packets with source addresses that are outside an administratively defined group? ()
A . DAI
B . STP
C . PVLAN
D . port security
-
You need to design an administrative model for Exchange Server 2003. What should you?()
A . Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groups
B . Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manage
C . Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative group
D . Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative grou
-
As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()
A . NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
B . NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C . NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
D . NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
-
A Cisco Catalyst switch is part of the CIS network. As an experienced network administrator, you are thinking of filtering the traffic within VLANI00 with the use of a VACL named "test" on that switch. Which of the following command will enable that?()
A . interface vlan 100 ip access-group test in
B . interface vlan 100 ip access-group test
C . vlan access-map test 100
D . vlan filter test vlan-list 100
-
You are provisioning a DS-1 circuit on an ONS 15454 2F-BLSR with a XC-10G card. Each VT1.5 connection must also terminate via the STS matrix. On the originating circuit node, how many STS ports are now available for VT1.5 circuits?()
A . 2
B . 3
C . 4
D . 20
E . 22
F . 24
-
You are the Database Administrator (DBA) of your company. You execute the following statement on an Oracle 10g instance: SQL> ALTER SYSTEM SWITCH LOGFILE; Which two tasks are performed when the statement is executed? ()
A . The DBWn process writes to the datafile.
B . Changes in the background process are recorded.
C . The log file is updated with the current SCN number.
D . The System Change Number (SCN) is recorded in the control file.
E . The changes to the listener configuration in the listener.ora file are recorded.
-
You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()
A . Get-EventLogLevel
B . Get-ExchangeServer
C . Exchange Best Practices Analyzer
D . Microsoft Baseline Security Analyzer (MBSA)
-
You need to design an administrative control strategy for Denver administrators. What should you do?()
A . Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains
B . Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains
C . Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain
D . Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domai
-
You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()
A . show ppp authentication
B . debug PAP authentication
C . debug PPP authentication
D . show interface serial0
E . show CHAP authenticatio
-
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()
A . Enable Internet Connection Sharing
B . Enable on-demand dialing
C . Enable sharing a modem on one computer on the network
D . Configure a DHCP Server
E . Disable Internet Connection Sharing
F . Configure all the other computers to be DHCP enabled.
-
You need to design an administrative model that meets all business and technical requirements. What should you do?()
A . Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.
B . Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group
C . Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative group
D . Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative grou
-
You are the administrator of a Windows Server 2003 computer named Testking1.An application on Testking1 gradually uses more and more memory until it causesTestking1 to stop responding. If you restart the application before it uses theavailable memory, there is no interruption of user services.You need to configure Testking1 to notify you when it encounters a low-memorycondition.What should you do?()
A. Using Task Scheduler, schedule a repeating task that runs the tracert command.
B. Using Performance Logs and Alerts, configure an alert for the appropriate performance object.
C. Using System Monitor, configure the appropriate performance object to display.
D. Using Startup and Recovery Settings, configure Testking1 to send an Administrative Alert.
-
You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO\Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()
A. In the Web.config file, enable impersonation.
B. In IIS, enable anonymous access.
C. In IIS, disable anonymous access.
D. In the Web.config file, set the authentication mode to Windows.
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.A member server named TestKing3 hosts files and folders. On TestKing3, you configure a normal backup to run every night. The backup data will be saved to magnetic tape, and a detailed log file will be generated. The backup job will use an account named BackupUser, which is a member of the Backup Operators group.One week later, you use your Administrator account credentials to log on to TestKing3. You start the Backup utility. However, no backup logs are available.You need to verify that the backup jobs are completing successfully.What should you do?()
A.Use a text editor to open C:\windows\security\logs\Backup.log. Search for the dates when backups were scheduled.
B. Start the Backup utility by using the Run As option. Provide the account credentials of BackupUser. From the Tools menu, select Report, and then select the most recent report.
C. Open the Removable Storage snap-in. Examine the properties of the most recently completed Work Queue object.
D. Open the Removable Storage snap-in, and then open the properties of the Operator Requests object. On the General tab, clear the Automatically delete completed requests option
-
You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain.You need to enable the user to log on to the domain.What should you do? ()(Choose two)
A. Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.
B. Use Active Directory Users and Computers to open the account properties for the user‘s user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.
C. Use Active Directory Users and Computers to reset the user‘s password. Give the user the new password.
D. Use Computer Management to reset the password for the local Administrator account.
-
You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.
However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?
A. STP
B. GVRP
C. SNMP
D. VTP
E. DHCP
F. None of the above