feedburner
Enter your email address:

Delivered by FeedBurner

feedburner count
Custom Search

Part - 3 MCSE Interview

QUESTION 12
You work as the database administrator at Mcse.com. Mcse.com has a Windows NT 4.0 network. The Mcse.com network contains a SQL Server 7.0 database server named MCSE -DB01. MCSE -DB01 hosts a database named CK_Data that stores business data for the company. You have been instructed to implement SQL Server 2000 on a new database server named MCSE -DB02. You must configure MCSE -DB01 as a linked server on MCSE -DB02 once SQL Server 2000 has been implemented. Mcse.com users must query only the SQL Server 2000 database. You must ensure that users can perform distributed queries. What should you do?

A. Enable the Named Pipes client Net-Library on MCSE -DB01.
B. Install SQL Server 7.0 client tools and connectivity components on MCSE -DB02.
C. Install SQL Server 2000 client tools and connectivity components on all clientcomputers.
D. Enable the Named Pipes client Net-Library on MCSE -DB02.

Answer: C

Explanation: To enable users to perform distributed queries on the SQL Server 2000 database, you must upgrade the SQL Server 7.0 client tools and connectivity components on their client computers to SQL Server 2000. The SQL Server 2000 client tools and connectivity components support the new features in SQL Server 2000 that were not supported in SQL Server 7.0. Incorrect answers:
A, D: The Named Pipes client Net-Library is not required to allow users to perform distributed queries on the SQL Server 2000 database.
B: SQL Server 2000 client tools and connectivity components are backward compatible with SQL Server 7.0 client tools and connectivity components. Therefore you do not need to install SQL Server 7.0 client tools and connectivity components on MCSE -DB02.

QUESTION 13
You work as the database administrator at Mcse.com. The Mcse.com network consists of a single Windows 2000 domain named Mcse.com. All servers on the Mcse.com network run Windows 2000 Server. The Mcse.com network contains a SQL Server 2000 database server named MCSE -DB01, and a Microsoft Exchange Server 5.5 mail server named MCSE -EX01.
(MAPI) is enabled on MCSE -EX01. You configure the SQL Server Agent to log in to Windows 2000 under a user account named SQLAgent when firing alerts. You want the SQL Server Agent service to send an e-mail when an alert is fired. What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. Add the SQLAgent user account to the Enterprise Admins group.
B. Log on to MCSE -DB01 as SQLAgent.
C. Log on to MCSE -EX01 as SQLAgent.
D. Configure a mail profile for the SQLAgent user account.
E. Configure the mailbox properties for the SQLAgent user account.

Answer: B, D

Explanation: You need to create a mail profile for the SQLAgent user account. You can accomplish this by logging on to the database server as SQLAgent and using the SQL Server Enterprise Manager console to create the mail profile. Incorrect answers:
A: Membership to the Enterprise Admins group is not required to enable SQL Mail.
C: You must create a mail profile for the SQLAgent user account to allow it to send
e-mail. This is performed on the database server and not the mail server.
D: You must create a mail profile for the SQLAgent user account, not the mail box
properties.

QUESTION 14
You work as a network administrator at Mcse.com. The Mcse.com network consists of a single Windows NT 4.0 domain. The Mcse.com network contains a SQL Server 2000 database server named MCSE -DB01, and a Microsoft Exchange Server 5.5 mail server named MCSE -EX01. (MAPI) is enabled on MCSE -EX01. The MSSQLServer and MSSQLServerAgent services on MCSE -DB01 are configured to run under different domain user accounts.
MCSE -DB01 hosts a database named CKSales that is used to store sales related data for the company. You want the MSSQLServerAgent service to send an e-mail to the backup operator when database backup jobs have completed successfully. You configure a mail profile for the MSSQLServerAgent service. You test your solution by backing up the master database on MCSE -DB01. The designated backup operator reports that she has received the e-mail.
Mia Hamm is the manager of the Purchasing department. Mia Hamm wants to be informed whenever changes are made to the Inventory table in the CK_Sales database. You create a trigger to send an e-mail message to Mia Hamm whenever INSERT, UPDATE or UPDATE statements are run against the Inventory table. You configure the trigger to use the xp_sendmail extended stored procedure and configure the Mia Hamm's user account as the designated operator. You test your solution by inserting a row into the CKSales.Inventory table. However, Mia Hamm does not receive an e-mail message. You need to ensure that Mia Hamm receives an e-mail message whenever changes are made to the CKSales.Inventory table. You want to accomplish this task using the least amount of administrative effort What should you do? (Choose all that apply.)

A. Configure the MSSQLServer service and the MSSQLServerAgent service to rununder the local System account.
B. Configure the MSSQLServer service and the MSSQLServerAgent service to rununder the same user account.
C. Configure the MSSQLServer service and the MSSQLServerAgent service to use thesame mail profile.
D. Configure the permissions on MCSE -EX01 to allow multiple connections to theSQL Server mailbox.
E. Configure the permissions on MCSE -EX01 to allow connections from theMSSQLServer service account.

Answer: B, C

Explanation: SQL Server 2000 has two independent mail mechanisms - SQL Mail and SQLServerAgent Mail. SQLServerAgent Mail sends mail messages in response to alerts and jobs while SQL Mail handles stored procedures related to e-mail. Because the two mail mechanisms operate independently, you need to create mail profiles for both mechanisms. The easiest way to accomplish this is to configure the MSSQLServer service to use that same user account and mail profile as the MSSQLServerAgent service.
Incorrect Answers:
A: Configuring the MSSQLServer and MSSQLServerAgent services to run under the local System account will not allow the services to send e-mail messages as the local System account cannot access the network.
D, E: There is no need to configure any permissions on MCSE -EX01 as the MSSQLServerAgent service can send mail successfully. You need to configure the MSSQLServer service to use that same user account and mail profile as the MSSQLServerAgent service.

QUESTION 15
You work as a network administrator at Mcse.com. The Mcse.com network consists of a single Windows 2000 domain named Mcse.com. The Mcse.com network contains 12 Windows 2000 Server computers, 70 Windows 2000 Professional client computers, 45 Windows NT Workstation 4.0 client computers, 20 Windows 98 client computers and 5 Macintosh client computers. The AppleTalk protocol is installed and enabled on the Macintosh client computers. The Mcse.com network also contains a SQL Server 2000 database server named
MCSE -DB01. A default instance and a named instance of SQL Server 2000 are installed on MCSE -DB01. The default instance is configured to use the Named Pipes and TCP/IP Sockets Net-Libraries while the named instance is configured to use the AppleTalk and TCP/IP Sockets Net-Libraries. You add 10 new Novell NetWare client computers to the network. Only the IPX/SPX protocol is installed and enabled on the Novell NetWare client computers.
The Windows-based client computers will only connect to the default instance while the Macintosh and Novell NetWare clients will only connect to the named instance. You need to ensure that the respective client computers can connect to the appropriate instance. You want the minimum number of Net-Libraries enabled on MCSE -DB01.
What should you do? (Choose all that apply.)

A. Enable the Shared Memory Net-Library on the default instance.
B. Enable the Shared Memory Net-Library on the named instance.
C. Disable the TCP/IP Sockets Net-Library on the default instance.
D. Disable the TCP/IP Sockets Net-Library on the named instance.
E. Enable the NWLink IPX/SPX Net-Library on the default instance.
F. Enable the NWLink IPX/SPX Net-Library on the named instance.
G. Enable the AppleTalk Net-Library on the default instance.
H. Disable the Named Pipes Net-Library on the default instance.

Answer: D, F, H

Explanation: To enable that Novell NetWare clients can connect to the named instance, you must enable the NWLink IPX/SPX Net-Library on the named instance.
You should disable the TCP/IP Sockets Net-Library on the named instance as neither the Macintosh nor the Novell NetWare clients require the TCP/IP Sockets Net-Library. You should also configure the default instance to use only the TCP/IP Sockets Net-Library as Windows 98 clients can only use TCP/IP Sockets Net-Library and not the Named Pipes Net-Library. This means you must disable the Named Pipes Net-Library on the default instance.
Incorrect answers:
A, B: Shared Memory is only supported for local database connection on the database
server. It does not support database connections from client computers over the network.
Furthermore, Shared Memory is enabled by default and cannot be disabled.
C: You should also configure the default instance to use only the TCP/IP Sockets
Net-Library as Windows 98 clients can only use TCP/IP Sockets Net-Library and not the
Named Pipes Net-Library. This means you must disable the Named Pipes Net-Library
rather than the Named Pipes Net-Library on the default instance.
E, G: Only the Macintosh and Novell NetWare clients use the AppleTalk and NWLink
SPX/IPX Net-Libraries respectively. As these clients will only connect to the named
instance, the AppleTalk and NWLink SPX/IPX Net-Libraries are not required on the
default instance.

QUESTION 16
You work as a network administrator at Mcse.com. The Mcse.com network consists of a single Windows 2000 Active Directory domain named Mcse.com. All servers on the Mcse.com network run Windows 2000 Server. The client computers run a variety of operating systems, including Windows 98, Windows NT Workstation 4.0, Macintosh and UNIX. Mcse.com wants to implement a SQL Server 2000 database server named MCSE -DB01. MCSE -DB01 will store business information for the company. Some of the business information is of a sensitive nature. To protect the sensitive information, you must secure all network communication between MCSE -DB01 and the Mcse.com client computers. What should you do?

A. Enable SSL encryption on all Net-Libraries and protocols.
B. Configure MCSE -DB01 to use IPSec.
C. Configure MCSE -DB01 to use the only the Multiprotocol Net-Library andenable RPC encryption.
D. Configure MCSE -DB01 to use the only the IP/TCP Sockets Net-Library.Answer: A
Explanation: SQL Server 2000 supports Secure Sockets Layer (SSL) encryption for all protocols and Net-Libraries.
Incorrect answers:
B: IPSec can only be used on TCP/IP and is only supported by Windows 2000. C: The Multiprotocol Net-Library does not support Macintosh clients. D: Using only the IP/TCP Sockets Net-Library will not provide security on its own. It also does not support Macintosh clients.





Part -4 MCSE Interview

QUESTION 16

You work as a network administrator at MCSE .com. The MCSE.com network consists of a single Windows 2000 Active Directory domain named MCSE.com . All servers on the MCSE.com network run Windows 2000 Server. The client computers run a variety of operating systems, including Windows 98, Windows NT Workstation 4.0, Macintosh and UNIX. MCSE.com wants to implement a SQL Server 2000 database server named MCSE - DB01. MCSE. -DB01 will store business information for the company. Some of the business information is of a sensitive nature. To protect the sensitive information, you must secure all network communication between
mcse -DB01 and the MCSE.com client computers.
What should you do?

A. Enable SSL encryption on all Net-Libraries and protocols.

B. Configure Certkiller -DB01 to use IPSec.

C. Configure Certkiller -DB01 to use the only the Multiprotocol Net-Library and
enable RPC encryption.

D. Configure Certkiller -DB01 to use the only the IP/TCP Sockets Net-Library.

Answer: A

Explanation: SQL Server 2000 supports Secure Sockets Layer (SSL) encryption for
all protocols and Net-Libraries.

Incorrect answers:

B: IPSec can only be used on TCP/IP and is only supported by Windows 2000.
C: The Multiprotocol Net-Library does not support Macintosh clients.
D: Using only the IP/TCP Sockets Net-Library will not provide security on its own. It
also does not support Macintosh clients.

QUESTION 17

You work as the database administrator at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows 2000 Server and all client computers run Windows 2000 Professional. The Certkiller .com network contains a SQL Server 2000 database server named Certkiller -DB01. Certkiller -DB01 hosts a database named CK_Orders. CK_Orders is a decision-support system (DSS) database.
Following is an exhibit that illustrates the physical characteristics of the CK_Orders datafile:
Exhibit:


Part of your duties at Certkiller .com includes the creation of SQL Server 2000 databases. A few months ago you created a job that runs several DTS packages to transform and load data from a third party ODBS-compliant database to the CK_Orders database. This job was scheduled to occur on a regular basis. An amount of approximately 50 MB of new data is loaded every time the job executes.
Today, however, the job failed to execute and no new data was thus added to the DDS CK_Orders database. The following exhibit illustrates the properties of the disk on which CK_Orders is hosted. This disk also holds the transaction logs.


Exhibit:




Your instructions are to ensure that the data is transferred successfully without
incurring extra administrative cost. To this end you need to provide a solution that
will alleviate the problem temporarily.
What should you do?

A. The active portion of the transaction log must be truncated.

B. Another data file should be created in the new filegroup on the disk.

C. File growth should be restricted to 4 GB.

D. File growth should be restricted to 2,500 MB.

Answer: C

Explanation: It is clearly indicated in the exhibit that 3.10 BG free disk space exists on the disk. The fact that the transfers did not occur is probably due to a lack of space because the data file probably reached its maximum size and thus cannot
grow anymore. This means that you should increase data file size to accommodate
regular data transfers temporarily. It is also mentioned in the question that
approximately 50 MB of new data is transferred at a time. Thus increasing the data
file's maximum size by 1 GB should provide enough space to complete at least 20
more data transfers. Thereafter you will be compelled to add another disk and
create another data file for the database. But for the purposes of this question you
should restrict the file growth to 4 GB to alleviate the problem temporarily.

Incorrect answers:

A: The active portion of a transaction log cannot be truncated because it is associated with change records that are associated with uncommitted transactions and must be available in case of recovery of the database.
B: Although you could create another data file in a new filegroup on the same disk,
you would not be providing extra space, unless you moved some of the existing
database objects to the additional disk space. This thus means administrative extra
cost because then you would also have to monitor space usage in two files instead of onebecause SQL Server does not automatically balance space usage between files that
belong to separate filegroups.
D: You cannot restrict the data file maximum size to 2,500 MB because the file already contains approximately 3 GB of data as shown in the exhibit.

QUESTION 18

You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows Server 2000 and all database servers run SQL
Server 2000. The Certkiller .com network contains a SQL Server 2000 database
server named Certkiller -DB01 that runs on a Windows 2000 Server computer.
Certkiller -DB01 hosts a database named CK_Orders. The CK_Orders properties
are illustrated in the exhibit below:
Exhibit:



Approximately 2 GB of data was loaded into the database after it was created, and
every other business data approximately 120 MB of new data is added. Three weeks
after CK_Orders was created and in operation, you attempt to add new data.
However, the database is very sluggish, and the disk was thrashing. On the
following Monday you added new data to CK_Orders and did not experience any
problems. The Wednesday, when attempting to ass new data to CK_Orders, you
again find that the database is sluggish and the disk is thrashing.
You do not want the periodic performance degradation and thus investigate the
issue. You found that the disk contains 30 GB of free space. You now need to decide
on a plan of action to alleviate the problem.

What should you do?

A. The transaction log should be truncated.

B. The sp_spaceused stored procedure should be executed.

C. CK_Orders should be backed-up using the NO_TRUNCATE option.

D. The current size of the file and the growth increment should be increased.

Answer: D

Explanation: Gauging by what is mentioned in the question; you failed to accurately
assess the amount of space that CK_Orders would use. This resulted in the periodic
performance deterioration every time new data is added when the data file is full.
When creating a database it is recommended to configure the file and growth
increments to accommodate the database. In this case you need to increase the
current size of the data file to a reasonable amount and you should adjust the
growth increment accordingly.

Incorrect answers:

A: Truncating the transaction log will remove the older transactions that have been
committed to CK_Orders, but it will not reallocate space on a disk to a data file.
B: The sp_spaced used stored procedure is used to determine how much space a
database or table holds. It will not be of use in this situation.
C: Backing-up CK_Orders will not alleviate the space issues at hand. And also the
NO_TRUNCATE option cannot be specified when you perform a transaction log backup.
Reference:

QUESTION 19

You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows Server 2000 and all database servers run SQL
Server 2000. The Certkiller .com network contains a SQL Server 2000 database
server named Certkiller -DB01. Certkiller -DB01 hosts a database named
CK_Orders. Several data capturers enter data into the CK_Orders database
everyday. The Simple Recovery Model is implemented for the CK_Orders database.
A Full backup of the CK_Orders database is performed every Saturday at 2:00
P.M. You are concerned that data loss may occur should Certkiller -DB01 suffer a hard
disk failure. You decide to implement additional backups of the CK_Orders
database on a daily basis. You want to minimize the amount of time required for the
backups as well as the time required to restore the database.

What should you do?

A. Perform differential backups of the CK_Orders database on every week day.

B. Switch the CK_Orders database to the Full Recovery Model.

C. Perform a Full backup of the CK_Orders database on every week day.

D. Perform incremental backups of the CK_Orders database on every week day.

Answer: A

Explanation: To minimize the amount of time required to perform the backups, you
need to perform differential backups on the week days. Differential backup ups only
backs up the data that has changed since the last Full backup.

Incorrect answers:

B: The recovery model will not affect the time required for the backup or the restore.
C: Restoring data from transaction log backups will not minimize restore times.
D: SQL Server 2000 does not support incremental backups.

QUESTION 20

You work as the database administrator at Certkiller .com. The Certkiller .com
network consists of a single Active Directory domain named Certkiller .com. All
servers on the Certkiller .com network run Windows Server 2000. The Certkiller .com
network contains two SQL Server 2000 database servers named Certkiller -DB01
and Certkiller -DB02, and a member server named Certkiller -SR33. A database
mirroring session operating in synchronous mode is in operation between
Certkiller -DB01 and Certkiller -DB02, with Certkiller -DB01 being the
principal database server. Certkiller -DB01 hosts a database named CK_Sales that
stores sales data from Certkiller .com's e-Commerce Web site.
One Monday morning you discover that the CK_Sales database is unavailable. You
discover that Certkiller -DB01 is offline while Certkiller -DB02 is online;
however, failover to Certkiller -BD02 did not occur. This failure has adversely
affected the profitability of Certkiller .com's e-Commerce division. You need to
improve the availability of the CK_Sales database. You are unable to acquire any
additional hardware.
What should you do?

A. Configure Certkiller -DB01 and Certkiller-DB02 in a failover cluster with two
active nodes.

B. Configure the mirrored database session to run in asynchronous mode.

C. Install SQL Server 2000 on Certkiller -SR33 and configure it as a witness server.

D. Configure the mirrored database to operate in high-safety mode.

Answer: C

Explanation: High-safety mode supports synchronous operation in which all transactions must be committed to both partners. This provides zero-loss of data
but requires a witness to provide automatic failover.

Incorrect answers:

A: Failover clustering would require additional hardware in the form of a shared
external hard disk drive. You, however, are unable to acquire additional hardware.
Database mirroring is a software solution, but requires a witness server to provide
failover.
B: In Asynchronous mode a transaction is committed to the principal database
without requiring the principal database to wait for the mirror database to write the
transaction log to disk. This maximizes performance for the mirrored database but
at the expense of high-availability.When the principal server of a mirrored database in asynchronous operation fails, you must manually stop the mirror session, update the database and begin a new mirroring
session.
D: High-safety mode supports synchronous operation in which all transactions must
be committed to both partners. This provides zero-loss of data but requires a witness to provide automatic failover.





70-297 - 1 MCSE Interview

QUESTION NO: 1

You are designing a DNS strategy to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the
solution. Choose two)

A. Create a dynamic reverse lookup zone for each subnet.

B. Create a dynamic forward lookup for each domain.

C. Install caching-only DNS servers in the branch offices.

D. Enable the BIND secondaries option for each DNS server.

Answer: A, B

Explanation:

The scenario states: "UNIX instructors require support of pointer (PTR) resource records for several applications used from their home computers." It also says: "The company anticipates more focus on the online course offerings in the future."
A reverse lookup zone is a database which stores a mapping of IP address to friendly
DNS domain names. In DNS Manager, reverse lookup zones are based on the
in-addr.arpa domain name and typically hold pointer (PTR) resource records..
A forward lookup zone is a name-to-address database that helps computers translate DNS names into IP addresses and provides information about available resources.
Incorrect options:
C: Caching-only servers do not host any zones and are not authoritative for any
particular domain.
D: Windows DNS zone files can contain RRs that can cause problems for BIND
secondaries. These records include those that use an underscore in the host or domain
name and the WINS and WINS-R records. On some versions of BIND, notably BIND
8.0, the presence of these records can cause the zone to fail to load.

QUESTION NO: 2

You need to ensure that only authorized personnel are able to modify student
grades. Which desktop environment or environments should you use? (Choose all that
apply)

A. Windows XP Professional

B. Windows 2000 Professional

C. Windows 98 with Active Directory client installed

D. Windows NT Workstation 4.0 with the latest service pack and Active Directory client installed

Answer: A, B

Explanation:

In order for authentication to occur from a centralized point, you need to apply group policies. The desktop environments that support these features are, Windows XP
Professional and Windows 2000 Professional.

Incorrect options:

C and D: These desktop environments do not support group policies.

QUESTION NO: 3

You need to ensure that the sales representatives are provided with adequate
NetBIOS name resolution.
What should you do?

A. Install WINS on the PDC emulator.

B. Install WINS on servers in Atlanta and Seattle.

C. Enable WINS lookup on the DNS server in Atlanta.

D. Enable WINS on one domain controller in each office.

Answer: D

Explanation:
As the sales representatives are currently using Windows 98 computers, they need
NetBIOS name resolution which is provided for by WINS. In the scenario they also say
that there are sales representatives in all offices, which means domain controllers in each office has to be WINS enabled, because they control all activities on the domain.

QUESTION NO: 4

You are designing a strategy to install the new scheduling application.
Which two actions should you perform? (Each correct answer presents part of the
solution. Choose two)

A. Assign the scheduling application package to the Instructor OU.

B. Publish the scheduling application package to the Instructor OU.

C. Ensure that the scheduling application can install across slow WAN links.

D. Prevent the scheduling application from installing across slow WAN links.

Answer: A, C

Explanation:

The scenario states: "Additionally, instructors are not receiving updated teaching
schedule information on a timely basis. The issue should be addressed by ensuring that our new scheduling program is installed on all instructor computers, including the computers that the instructors use when accessing our network remotely."
All instructor computers form part of the Instructor OU, so by assigning the application to this OU ensures that the package will be installed with minimum administrative effort. The need for ensuring that the scheduling application can install across slow WAN linksis due to the network having connections with different speeds.

QUESTION NO: 5

You are designing a VPN authentication strategy to meet the business and technical
requirements.
What should you do?

A. Implement the RADIUS service in Atlanta.

B. Implement the RADIUS service in each branch office.

C. Configure network address translation (NAT) on all VPN servers.

D. Configure the Connection Manager Administration Kit (CMAK) on the PDC.

Answer: A

Explanation:

Remote Authentication Dial-In User Service (RADIUS) is a widely used protocol that
enables centralized accounting, authentication, and authorization for remote network
access. With RADIUS, you can manage network access for VPN, dial-up, and wireless
networks. Since the online course content is already developed and in use in the Atlanta office, which is also the main office, it is viable to implement RADIUS there.

Incorrect Options:

B: The online course content is already developed and in use in the Atlanta office.
C: Network Address Translation (NAT) is a technology that enables a local-area
net-work (LAN) to use one set of Internet Protocol (IP) addresses for internal traffic and a second set of addresses for external traffic.
D: This is used to Automate VPN client installation.





Part - 5 MCSE Interview

QUESTION 21
You work as the database administrator at Certkiller .com. The Certkiller .com
network consists of a single Active Directory domain named Certkiller .com. All
servers on the Certkiller .com network run Windows Server 2000 and all client
computers run Windows 2000 Professional. The Certkiller .com network contains a
SQL Server 2000 database server named Certkiller -DB01 that hosts a database
named CK_Projects. The CK_Projects database contains a table named Documents
that contains an XML column named DocLocation. Certkiller .com users complain
that queries against the DocLocation column are processed very slowly.
You want to improve the performance of queries that are run against the
DocLocation column by creating an index on the column.
What should you do?

A. Create a primary index on the primary key of the Documents table and secondary
index on the DocLocation column.
B. Create a clustered index on the primary key of the Documents table and secondary
index on the DocLocation column.
C. Create a nonclustered index on the primary key of the Documents table and primary
index on the DocLocation column.
D. Create a clustered index on the primary key of the Documents table and primary index on the DocLocation column.

Answer: D

Explanation: You can create XML on XML data type columns to index all tags,
values and paths in the column. This will improve query performance. The first
XML index must be a primary index and the Documents table must have a clustered index on the primary key. A clustered index determines the physical ordering of the rows in a table and is required as the primary key is used to correlate XML index rows with the rows in the table.

Incorrect Answers:
A: You cannot create a unique index, clustered index or nonclustered index but not
a primary index on a non-XML column. You must create a clustered index on the
primary key as the primary key is used to correlate XML index rows with the rows
in the table. Also, the first XML index must be a primary index. Secondary indexes
can be created once the primary index has been created.
B: The first XML index must be a primary index. Secondary indexes can be created
once the primary index has been created.
C: You must create a clustered index on the primary key as the primary key is used
to correlate XML index rows with the rows in the table. A clustered index determines
the physical ordering of the rows in a table while a nonclustered index creates a logical ordering.



QUESTION 22
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows 2000 Server, all client computers run
Windows 2000 Professional and all database servers run SQL Server 2000. The
Certkiller .com network contains a SQL Server 2000 database server named
Certkiller -DB01. Certkiller -DB01 hosts a database named CK_Manufacturing
that stores data from the Manufacturing department and a database named
CK_Sales that stores sales data for the company.


Due to the growth of the CK_Sales database, Certkiller -DB01 is running low on
free disk space. It is anticipated that the CK_Sales database will grow even further
over the next few months. You add a second SQL Server 2000 database server
named Certkiller -DB02 to the Certkiller .com network. You want to move the
CK_Sales database to Certkiller -DB02. You need to accomplish task in minimum
time.
What should you do?

A. A Full backup of the CK_Sales database and its transaction logs must be performed.
Restore the Full backup to Certkiller -DB02.
Restore the transaction logs to Certkiller -DB02.
B. Detach the CK_Sales database on Certkiller -DB01 by executing the sp_detach_db
stored procedure.
Copy the data and log files for CK_Sales to Certkiller -DB02.
Attach the CK_Sales database to Certkiller -DB02 by executing the sp_attach_db
stored procedure.


C. Stop the SQL Server service on Certkiller -DB01.
Detach the CK Sales database on Certkiller -DB01 by executing the sp_detach_db
stored procedure.
Copy the data and log files for CK_Sales to Certkiller -DB02.
Attach the CK_Sales database to Certkiller -DB02 by executing the sp_attach_db
stored procedure.
D. A new database named CK_Sales on Certkiller -DB02 must be created.
Copy data from the CK_Sales database on Certkiller -DB01 to the new CK_Sales
database on Certkiller -DB02 using the SQL Server Import and Export Wizard.

Answer: B

Explanation: The fastest method of moving a database from one server to another is
to detach the database and attach it to the destination server. This can be
accomplished by running the sp_detach_db stored procedure to detach the database
on source server, copying the data and log files for the database to the destination
server, and then running the sp_attach_db stored procedure to attach the database
to the destination server.

Incorrect answers:
A: The Use the detach and attach method option does not allow active connections to
the database while it is being moved and thus will not allow the database to be queried
while it is being moved.
C: You can move the database by restoring a backup of the database to the destination
server but it is quicker to detach and attach the database.
D: The SQL Server Import and Export Wizard can be used to move a database but it is
quicker to detach and attach the database.



QUESTION 23
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows 2000 Server, all client computers run
Windows 2000 Professional and all database servers run SQL Server 2000. The
Certkiller .com network contains a SQL Server 2000 database server named
Certkiller -DB01 B01.
Certkiller -DB01 hosts a database named CK_Products that contains 60 lookup
tables. The lookup tables should remain static at all times and users should not be
able to alter the static data. You discover that some of the data in the lookup tables
have been altered. You need to ensure that users cannot change any of the data in
the lookup tables.

What should you do?

A. Create a new filegroup and move the lookup tables to the new filegroup.
Enable the Read-Only option on the filegroup.
B. A view of the lookup tables should be created.
Allow users to access the lookup tables through the view only.
C. Stored procedures for modifying data in the lookup tables should be created.
Allow users to modify data through the stored procedures only.
D. A new database role should be created and all users should be added to the new role.
Grant SELECT permissions to the new role.

Answer: A

Explanation:
You can prevent users form modifying data in the lookup tables by moving the
tables to a separate filegroup and making the file group read-only.

Incorrect answers:
B: Views are used to limit the part of the database that the users can see. It does not
prevent them from modifying the data in the underlying table.
C: Users should not be able to modify the data in the lookup tables. Allowing them to
modify data through the stored procedures only would not meet this requirement.
D: This option will require considerable administrative effort as there are 60 look
up tables. You will need to grant SELECT permissions for each of these tables. Less
effort is required when using a read-only filegroup.



QUESTION 24
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows 2000 Server, all client computers run
Windows 2000 Professional and all database servers run SQL Server 2000. The
Certkiller .com network contains a SQL Server 2000 database server named
Certkiller -DB01. Certkiller -DB01 hosts a database named CK_Sales that stores
data sales data for the company. The following exhibit illustrates the database
properties of the CK_Sales database.
Exhibit:






CK_Sales contains two data files named CK_Sales1 and CK_Sales2. Both are
located on drive E. Drive E has 50 MB of free space available. The Sales department
members gain access to the database via a custom application that allows them to
create new tables and indexes. Thus all user tables and their indexes were created
by the Sales department members using this custom application only. The custom
application does not make provision for users to specify a filegroup on which to
place the objects that are creating.

You received a report from the Sales department members that they are unable to
create new objects. You need to address this issue and thus need to provide
additional disk space to enable users to continue working. You want to address this
issue using the least amount of administrative effort.
What should you do?

A. Automatic file growth should be disabled for the Primary filegroup.
B. Additional transaction log files should be created on drive E.
C. Additional files should be created in the Primary filegroup on drive E.
D. Secondary should be configured as the default filegroup.
E. The maximum allowed size for the secondary file should be reduced on the Properties sheet for the database.

Answer: D

Explanation: In the event of no filegroup explicitly specified as the default filegroup, then Primary will become the default filegroup resulting in all new tables and indexes that are created to be placed in the default filegroup. The custom application does not allow for users to specify a filegroup. Thus one can conclude that the reason why the sales Department members cannot create new objects must be that the Primary filegroup is nearly full. It is also mentioned in the question that all user tables and indexes have been created using the custom application only. Thus no objects should currently reside on Secondary, and thus its file would be empty. To remedy the situation with the least amount of effort should then be to specify Secondary as the default filegroup. This should allow users to create new tables and indexes which will then be assigned to Secondary.

Incorrect answers:
A: .Disabling automatic file growth for Primary filegroup will not provide additional
disk space.
B: .Creating additional log files will result in more than the required administrative effort
to remedy the situation.
C: This situation can be remedied by creating an additional file in the Primary
filegroup on drive E. But drive E only has 50 MB of available free space.
E: You cannot reduce the maximum allowed size for the secondary file on the
Properties sheet for the database.

QUESTION 25
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows 2000 Server, all client computers run
Windows 2000 Professional and all database servers run SQL Server 2000. The
Certkiller .com network contains a SQL Server 2000 database server named
Certkiller -DB01. Certkiller -DB01 hosts a database named CK_Sales that stores
sales and product data. The Simple Recovery Model is implemented for the
CK_Sales database. A Full backup of the CK_Sales database is performed every
Saturday at 8:00 P.M.
The sales data is updated frequently throughout the day. Over the last six months
the CK_Sales database has grown considerably. At present the Full backup requires
6 hours to complete. You are concerned that data loss may occur should
Certkiller -DB01 suffer a hard disk failure. You decide to implement additional
backups of the CK_Sales database on a daily basis. However, the backup may only
run between midnight and 4:00 A.M. on week nights.
What should you do? (Each correct answer presents part of the solution. Choose
TWO.)

A. Schedule a Full backup of the CK_Sales database at 12:00 P.M. every week night.
B. Schedule a differential backup of the CK_Sales database at 12:00 P.M. every week
night.
C. Create two filegroups. Backup a different filegroup every other week night.
D. Backup the transaction log every week night.

Answer: C, D

Explanation: Creating two filegroups and backing up a different filegroup every
other week night will allow you to backup the database within the given time frame
during the week.

You should also backup the transaction logs every night to ensure full
recoverability as only one filegroup is backed up each night.

Incorrect answers:
A: A Full backup requires six hours to complete but the backup can only run from
12:00 P.M. until 4:00 P.M. during the week. Thus there is insufficient time to complete a Full backup during the week.
B: A differential backup will backup all data that has changed since the last Full backup. Towards the end of the week the differential backup may take quite some depending on the number of changes made since the last Full backup and may require more than 4 hours to complete.


QUESTION 26
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows 2000 Server, all client computers run
Windows 2000 Professional and all database servers run SQL Server 2000. The
following exhibit illustrates the database properties of the CK_Sales database:
Exhibit:


All Certkiller .com users interact with the database via a custom database application that enables certain Sales department members the ability to create new tables and indexes on those tables. Unfortunately the custom application does not make allowance for users to specify a filegroup in which to place new objects. To compound problems, you notice that drive E is running out of space. To this end you
need to mitigate this problem so as to ensure that users will be able to continue
creating tables and indexes in the database.
What should you do?

A. Drive E should be compressed.
B. Secondary should be specified as the default filegroup.
C. Additional files should be created in Secondary on drive E.
D. Primary filegroup's primary data file requires shrinking.
Additional data files should be created in Primary filegroup on Drive E

Answer: B

Explanation: Since the Sales Department members use a custom application to access
SQL Server 2000 and create new objects it stands to reason that all new objects are
automatically placed in the default filegroup. Originally SQL Server designates the
Primary filegroup as the default filegroup. It is also mentioned in the question and
on the exhibit that another filegroup exists on drive E. as an administrator you can
specify another filegroup as the default filegroup. Thus if you specify Secondary as the default filegroup, then new objects will be created on that filegroup, which should contain sufficient free space because all new objects to date had been creates only by using the custom application.

Incorrect answers:
A: SQL Server data files cannot reside on compressed drives.
C: The question pertinently states that only the custom application is used to create
new objects. Thus it does not matter how many files were created in Secondary or
how much free space were available on drive E. the custom application automatically
places new objects on the default filegroup which is currently Primary.
D: The growth on the primary data file is not currently restricted. Thus the growth
of the primary data file is the most likely reason which drive E is running out of
space. Hence there is no free disk space that could be returned to the operating
system by shrinking. And thus you also cannot create additional data files.

QUESTION 27
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows 2000 Server, all client computers run
Windows 2000 Professional and all database servers run SQL Server 2000. The Certkiller .com network contains a SQL Server 2000 database server named
Certkiller -DB01 that runs on a Windows 2000 Server computer.
Certkiller -DB01 hosts a database named CK_Staff. The Full Recovery Model is
implemented for the CK_Staff database.
Certkiller .com acquires another company named TestLabs.com. You import staff
data from the new company into the CK_Staff database. Soon after ward you notice
that Certkiller -DB01 is performing quite poorly. You discover that the
transaction logs for the CK_Staff database has increased by almost five times in size
and has consumed most of the free disk space. To this end you need to recover disk
space as soon as possible.
What should you do?

A. The transaction log files should be backed up.
B. Switch to the Simple Recovery Model.
C. The DBCC SHRINKFILE Transact-SQL statement should be executed.
D. The transaction log files should be truncated.

Answer: C

Explanation: TheDBCC SHRINKFILE statement is used to reduce the log files to a
specified size.

Incorrect answers:
A: Backing up the log file clears the log file but does not reduce the physical size of the transaction log file.
B: Switching to the Simple Recovery Model will not reduce the physical size of the
transaction log file.
D: Truncation reduces the logical size of the transaction log file but it does not reduce the physical size of the transaction log file.

QUESTION 28
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows NT Server 4.0 and all database servers run
SQL Server 2000. The Certkiller .com network contains a SQL Server 2000 database
server named Certkiller -DB01 that runs on a Windows 2000 Server computer.
Certkiller -DB01 hosts a database named CK_Customers. The CK_Customers
database has almost completely filled the available space. An original size of 3 GB
had been allocated when the data file was created, and this data file has since grown
to 10 GB.
You this need to create another database, but you cannot add any new disks to the
computer. There is no free space on the other drives. Thus you archive a portion of
the older data to a decision-support system (DSS) database. Thereafter you remove
the archived data from CK_Customers. However, you find that you cannot create
the new database since the size of the data file has not decreased. You need to ensure that you have enough disk space to create another database.
What should you do?

A. The DBCC SHRINKFILE (DataFile, 2000) statement should be executed.
B. The Read-Only option should be enabled on the CK_Customers database.
C. The Transaction Log should be truncated.
D. The Space available parameter should be set to 1 GB on CK_Customers database.

Answer: A

Explanation: The DBCC SHRINKFILE (DataFile, 2000) statement causes free
space to be relocated to the end of the file and then reclaimed. This free space can
then be returned to the operating system.

The remaining file size should then be approximately 2,000 MB which will accommodate
the creation of a new database.

Incorrect answers:
B: Enabling the Read-Only option will permit users to query the database; it does
not prevent them from manipulating data. Thus there would be no gain in space to
create a new database.
C: Truncating the Transaction Log removes committed transaction from the log,
but it does not reclaim free space that is available in the log. You need to shrink the log. However, this could result in poor database performance.
D: No gains in Space available parameter appears on the General tab in the
database Properties sheet. This parameter cannot be configured.

QUESTION 29
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows Server 2000 and all database servers run SQL
Server 2000. The Certkiller .com network contains a SQL Server 2000 database
server named Certkiller -DB01 that runs on a Windows 2000 Server computer.
Certkiller -DB01 hosts a database named CK_Customers.
Certkiller -DB01 has its operating system located on drive C, its program files
located on drive D and its only data file and the transaction log file located on drive E. Drive E has only 250 MB of free space remaining and Drive F has 8 GB of free
space.

You received instruction to load 1 GB of new data into the existing tables in
CK_Customers. CK_Customers is configured for the Bulk-Logged Recovery Model.
You need to make use of the BULK INSERT statement to insert the new data into
the existing tables on CK_Customers. You thus need to prepare the database to
accommodate the new data since there is only 250 MB of free space on the drive on
which the data file and transaction log file is located.
What should you do?

A. You need to allow unrestricted growth for the data file.
B. A new transactional log file should be created on drive F.
C. A new data file should be created in the Primary filegroup on drive F.
D. A new filegroup should be created on drive F.

Answer: C

Explanation: It is mentioned that there are not enough free space on Drive D to
accommodate the new data that must be loaded into the tables on CK_Customers.
Thus you need to create a new data file in the Primary filegroup on drive F since
drive F contains 8 GB of free space. Space for new data is automatically allocated
proportionately to the amount of free space available from both files.

Incorrect answers:
A: Allowing unrestricted growth for the primary file would not be an effective solution as drive E does not contain sufficient free space.
B: It is mentioned in the question that CK_Customers is configured for the
Bulk-Logged Recovery Model. This means that the bulk load operation will not be
fully logged and the transaction log will not require much space for growth.
Creating a new transactional log file on drive F will not accommodate new data.
Data files and transaction log files cannot be places on a compressed drive or a network drive.
D: Adding a new filegroup will not have any objects in it and the question states
pertinently that the new data should be loaded into the existing tables on
CK_Customers. These existing tables are located in the primary file in the Primary
filegroup.

QUESTION 30
You work as the database administrator at Certkiller .com. All servers on the
Certkiller .com network run Windows Server 2000 and all database servers run SQL
Server 2000. The Certkiller .com network contains a SQL Server 2000 database
server named Certkiller -DB01 that runs on a Windows 2000 Server computer.
Certkiller -DB01 hosts a database named CK_Customers. The CK_Customers
Categories table is illustrated in the following exhibit:
Exhibit:




A Certkiller .com user named Mia Hamm is responsible for updating information on
this table. She needs to delete the 'pizza' value in the CatName column since this
item is no longer on the menu. Certkiller .com is replacing pizza with pasta which is
currently being tested. Mia Hamm intends making use of the following statement to
carry out her task:

UPDATE Categories SET CatName = NULL
Unfortunately she finds that the statement fails. You need to enable Mia Hamm to
delete the 'pizza' value in the CatName column.
What should you do?

A. An AFTER DELETE trigger must be created on the CatName column.
B. The Mia Hamm user account should be granted permission to execute the CREATE
PROCEDURE statement. Instruct Mia Hamm to create a stored procedure to replace the value in the CategoryName column with a NULL value.
C. Modify the table to allow nulls in the CatName column.
D. A PRIMARY KEY constraint should be defined on the CatName column.

Answer: C

Explanation: a Null value is not the equivalent of zero, an empty string of a string of zero length; instead it indicates that a particular value is unknown. In the exhibit you can see that the CatName column is not configured to allow null values. If MiaHamm is to be permitted to delete the current value without having to specify a new value, you should change the definition of the CatName column to allow null values by executing the following statement:
ALTER TABLE Categories ALTER COLUMN CatName nvarchar (15) NULL

Incorrect answers:
A: Creating an AFTER DELETE trigger will result in the trigger only being fired after a user successfully executed a delete statement. But this is not possible at the moment
since the CatName column does not allow for null values.
B: This option will not work because the CatName column currently does not allow
null values and any stored procedure that attempted to replace the current value with a null value would thus fail.
D: A PRIMARY KEY constraint enforces entity integrity in a table. Though it can
be created in a table, it will not work in this case since the primary key is defined on the CatID column. And also the column that is defined as a primary key cannot accept null values.



Test - 2

QUESTION NO: 6

You are designing a DHCP strategy for the new Active Directory environment.
Which two groups have the necessary rights to authorize the DHCP servers? (Each
correct answer presents part of the solution. Choose two)

A. IT staff in Atlanta

B. IT staff in Seattle

C. DHCP administrators in all offices

D. DHCP administrators in Atlanta only

E. Members of the Enterprise Admins group

Answer: A, E

Explanation:

This question is about DHCP Authorization. Only Enterprise Admins have the ability to
authorize DHCP servers. An administrator in the Root Domain of the Forest would
simultaneously be a member of the Enterprise Admins Group. The fact that they are
going to have full administrative privilege for the domain, as well as being admins in the root domain, makes them Enterprise Admins. According to the scenario, the Atlanta office will deal with the administration of active directory. Therefore the IT staff in Atlanta is the correct answer, and "B" is incorrect..

Incorrect Options:

C and D: DHCP Administrator is a built-in group in AD that does not have the ability to authorize DHCP.

QUESTION NO: 7

You are designing the placement of operations master roles in the new environment.
In which location or locations should a PDC emulator be designated? (Choose all
that apply)

A. Atlanta

B. Chicago

C. Dallas

D. Seattle

Answer: A

Explanation:

Seeing that the Atlanta office is responsible for the administration of Active Directory, it must be where the Forrest Root domain is located. So if this is true, then the PDC Emulator should be designated to them.
The Primary Domain Controller (PDC) is the first domian controller created in the
domain, while all other domain controllers are considered backup domain controllers
(BDCs). Therefore, B, C and D are incorrect.

QUESTION NO: 8

You are designing a DNS and DHCP implementation strategy to support the new
environment.
What should you do?

A. Create a WINS resource record in the Active Directory DNS zone.

B. Create a WINS referral zone in the DNS zone that supports Active Directory.

C. Configure a DNS domain name on the DHCP server.

D. Configure the DHCP server to update DNS for DHCP clients that do not support
dynamic updates.

Answer: D

Explanation:

The future of IT certification, www.real-exams.com One of the dynamic update settings you can configure on the DNS tab of the DHCP server properties dialog box determines whether the DHCP server should provide dynamic DNS update service on behalf of DHCP clients not capable of performing dynamic updates, such as computers running Microsoft Windows NT 4. By default, Windows Server 2003 DHCP servers do not attempt to perform dynamic updates on behalf of these clients.

Incorrect Options:

A: The WINS resource record instructs the DNS service to use WINS to look up and
forward queries for host names not found in the zone database.
B: You should configure a WINS referral zone to provide a means of organizing and
distinguishing between WINS and DNS records.
C: An option that specifies the domain name that DHCP clients should use when
resolving unqualified names during DNS domain name resolution. This option also
allows clients to perform dynamic DNS updates.



Test - 3

Overview

City Power & Light is a large provider of electrical services for residential and
business customers throughout Europe.

The company purchases electricity from large power-producing companies, as well
as from small wind-energy providers, such as local farmers and ranchers.

Physical Locations
The company's main office is located in Amsterdam. The company has three branch
offices in the following locations:

Network Infrastructure
The following infrastructure requirements must be considered:
1. To improve customer service, information from App1 databases in all locations
must be consolidated in the NewApp database.

2. The number of services at the satellite offices must be kept to the absolute
minimum.

3. Client computers must always obtain a valid IP address, even when a DHCP
server is not available for 24 hours.

4. Field technicians must be able to connect directly to the NewApp database from
their portable computers by using a remote connection. They will connect to the
nearest branch office when they have to make a remote connection.
Users

The following user requirements must be considered:

1. All users must have Microsoft Office and NewApp automatically deployed on
their desktop computers. Network administrators at the branch offices must be able
to decide which components of Office get installed at their locations.

2. Resetting user passwords will be delegated to each user's manager. All customer
service representatives need to be able to reset the passwords of the wind-energy
providers.

QUESTION NO: 1

You need to evaluate whether the currently available network bandwidth is
adequate to run NewApp.
Which three actions should you perform? (Each correct answer presents part of the
solution. Choose three)

A. Use a debug version of NewApp to collect information about NewApp.

B. Use Performance Monitor to collect data about the saturation of each WAN link.

C. Use Network Monitor to analyze the data that is transmitted over the network for
App1.

D. Install SNMP on all computers that are connected to App1 to obtain information about App1.

E. Build a test environment for NewApp to analyze how much bandwidth is required for
NewApp. The future of IT certification, www.real-exams.com

Answer: B, C, E

Explanation:

Performance Monitor, which is replaced by System Monitor in Windows Server 2003,
allows us to obtain stats on total bandwidth used. The System Monitor is designed for
real-time reporting of data to a console interface, and can be reported in graph,
histogram, or numeric form. SNMP allows for the monitoring the status of network components. A test environment would be ideal in this case to prevent disruption of the active network.


QUESTION NO: 2

You need to ensure that there is adequate bandwidth available to meet the
service-level agreement requirements.
Which action or actions should you perform? (Choose all that apply)

A. Upgrade all WAN lines in six months.

B. Upgrade all WAN lines prior to implementing NewApp.

C. Analyze the cause of a peak in network usage in February.

D. Analyze network usage characteristics for NewApp.

Based on these results, create an upgrade plan for the WAN lines.

Answer: C, D

Explanation:

This option allows you to obtain a baseline of the network usage.
The case study stated that they would only upgrade the WAN links if justified. Keeping a running report on the effects of NewApp would allow this.

Incorrect Options:

A and B: These options are invalid, since the case study stated that they would only
upgrade the WAN links if justified.


QUESTION NO: 3

You need to ensure that the network administrators are able to administer the
NewApp database servers.
Which two actions should you perform? (Each correct answer presents part of the
solution. Choose two)

A. Create an organizational unit (OU) for all users who log on to any of the NewApp
servers.

B. Create an organizational unit (OU) named NewApp Users for the NewApp users.

C. Create an organizational unit (OU) named NewApp Servers for the NewApp servers.

D. Create a Group Policy object (GPO) for the NewApp Users OU to enforce the use of
IPSec.

E. Create a global group for all NewApp servers. Add this group to the NewApp Servers
OU.

F. Create a Group Policy object (GPO) for the NewApp Servers OU to enforce the use of
smart cards.

G. Use the account properties to force all users who have to log on to the NewApp
servers to use smart cards.

Answer: C, F

Explanation:

The case study says "Network Administrators should only be allowed to access NewApp
database server by using smart card authentication. However, network administrator must be able to log on to users computers to fix problems without using a smart card".

Answer C and F combined would create the OU for the NewApp servers and then force
anyone logging into the server directly (network administrators) to use smart cards. Since customers and users will be using the web based NewApp they will not be logging on interactively so the GPO won't apply to them
An organizational unit (OU) is an Active Directory container object used within a
domain. An OU is a logical container into which you can place users, groups, computers, and other OUs. It can contain objects only from its parent domain. An OU is the smallest scope to which you can apply a Group Policy or delegate authority.
Smart Card Is Required For Interactive Logon - is an option used to designate that
the user must use a smart card during the authentication process, which is found in Account Properties by clicking the account tab. Smart cards are portable, tamper-resistant hardware devices that store unique identification information for a user. They are inserted into a card reader attached to a computer and provide an additional physical identification component to the authentication process.

Incorrect Options:

G: Turning this setting on would require smart card logon to all computers not just the app servers because it is tied with the user account not the server account.


QUESTION NO: 4

You are designing a strategy for migrating the UNIX user accounts to Active
Directory.
Which three actions should you perform? (Each correct answer presents part of the
solution. Choose three)

A. Import the user accounts as inetOrgPerson objects.

B. Import the user accounts into Active Directory by using the Ldifde command-line
tool.

C. Export all user accounts from the UNIX servers to a text file.

D. Export all user accounts and their passwords from the UNIX servers to a text file.
Encrypt this file to achieve extra security.

E. Assign random passwords to each user object, and securely distribute the password to the users.

F. Create the same strong password for each user object, and require users to change their passwords at first logon.

G. Instruct users to use the same name and password as they used on the UNIX servers.

Answer: B, C, F

Explanation:

The LDIFDE tool can be used to import user accounts into AD, so it is correct to export the accounts to a text file and then import them using LDIFDE. However, passwords cannot be added using LDIFDE upon object creation. Passwords can be modified using the following command:

ldifde -i -f chPwd.ldif -t 636 -s dcname -b username domain password
Here's the line in the MS doc that refers to that:
The password attribute used by Active Directory is "unicodePwd." This attribute can be written under restricted conditions, but cannot be read. This attribute can only be modified, not added on object creation or read by a search.
A strong password is a password that provides an effective defense against unauthorized access to a resource.

Incorrect Options:

A: InetOrgPerson is an object-similar to a user object-that is used to migrate users from other Lightweight Directory Access Protocol (LDAP) directory services to Active
Directory, not from one OS to another.
D: Passwords cannot be added using LDIFDE upon object creation.
G: This cannot be done, since the password attribute for UNIX and Active Directory is
different.


QUESTION NO: 5

You are designing a site topology to meet the business and technical requirements.
What should you do?

A. Increase the replication interval between sites,

B. Use SMTP as the transport protocol for replication.

C. Create site links to represent the physical topology.

D. Disable the Knowledge Consistency Checker (KCC) and manually configure site
replication.

Answer: C

Explanation:

A site link is an Active Directory object that represents the physical connectivity between two or more sites. For replication to occur between sites, you must establish a link between the sites. There are two components to this link: the actual physical connection between the sites (usually a WAN link) and a site link object. The site link object determines the protocol used for transferring replication traffic (IP or SMTP) and governs when replication is scheduled to occur.
Incorrect Options:

A: The scenario states: "Replication latency between sites must be minimized." This
option reduces the amount of traffic over the WAN, but also increases replication
latency.
B: SMTP can be used for replication between sites that are not connected with permanent connections (which are required for RPCs).
D: Knowledge Consistency Checker (KCC) is a built-in service that runs on all
domain controllers and automatically establishes replication connections between
domain controllers in the same site and between bridgehead servers in different sites.


QUESTION NO: 6

You are designing a strategy to optimize the DNS name resolution for the satellite
offices that connect to the branch offices by using ISDN lines.
What should you do?

A. Use caching-only DNS servers at these satellite offices.

B. Configure a Hosts file for all client computers at these satellite offices.

C. Configure a DNS server to use WINS forward lookup at these satellite offices.

D. Place a DNS server with secondary zones of all domains at these satellite offices.

Answer: A

Explanation:

A caching-only server, as its name implies, caches the answers to queries and returns the results. This saves time and reduces network traffic because calls to multiple DNS servers are not required.

Incorrect Options:

B: HOSTS files, still in use on some networks, are a predecessor to DNS and are files
with static mappings of hostnames to IP addresses.
C: You use the WINS tab or the WINS-R tab in reverse lookup zones-to configure
Windows Internet Name Service (WINS) servers to aid in name resolution for a given
zone after DNS servers have failed to resolve a queried name.
D: This kind of zone is an authoritative backup zone for the primary zone or for other secondary zones.


QUESTION NO: 7

You are designing the Active Directory infrastructure to meet the business and
technical requirements. You run ADSizer, and find that it provides a solution that
contains only one domain controller for Amsterdam.
What should you do?

A. Place at least two domain controllers in Amsterdam.

B. Configure the domain controller as a bridgehead server.

C. Configure the domain controller as a global catalog server.

D. Distribute the users among sites in ADSizer and recalculate the number of domain
controllers.

Answer: A

Explanation:

This question may be ambiguous, but it does only speak about the Amsterdam office.
Presumably, other offices have also been assigned Domain Controllers.
The problem is not to distribute the users in the Amsterdam office among sites; rather AD Sizer believes that one DC can handle the logon requests. The case study states the need for 24-7 availability, and two domain controllers in a site would allow for this as it increases fault tolerance.

Incorrect Options:

B: A bridgehead server is a server that is responsible for transferring directory replication information between sites.
C: A global catalog server is a domain controller that stores a read-only copy of all
Active Directory objects in a forest, with the exception of objects stored in application directory partitions. Global catalog servers are used to store universal group membership information, authenticate users who log on using a UPN, and facilitate searches for objects across the entire forest.


QUESTION NO: 8


You are designing a DHCP solution to meet the business and technical
requirements.
What should you do?

A. Increase the default lease time on all DHCP servers.

B. Split all address ranges across multiple DHCP servers.

C. Configure duplicate scopes on at least two DHCP servers.

D. Force client computers to obtain an IP address from Automatic Private IP Addressing
(APIPA).

Answer: B

Explanation:

We need the users to receive an IP address from the DHCP server even if it is not
available for 24 hours. Configuring 2 DHCP servers, with split address ranges, would add redundancy.

Incorrect Options:

A: It is a best practice not to set your lease duration too high, because other DHCP
clients on your network may be unable to obtain an IP address lease if all addresses are used up before current leases expire.
C: Scopes provide the essential means for the server to manage distribution and
assignment of IP addresses and of any related configuration parameters to clients on the network. This means that duplicating it would cause conflict in the IP addressing.
D: If you do not have a DHCP server, the new interface will obtain a network address
using Automatic Private IP Addressing (APIPA).



Test - 4

Overview

Coho Vineyard is an importer and distributor of fine wines from around the world.
Physical Locations
The company's main office is located in Los Angeles. The company has two branch
offices in the following locations:

1. Paris

2. Sydney

The company plans to open two additional branch offices within the next year.
These offices will be located in Barcelona and Lisbon.
Planned Changes

To reduce costs and streamline business processes, the company wants to implement
a Windows Server 2003 Active Directory environment.

Business Processes
Coho Vineyard consists of the following departments:
1. Accounting
2. Distribution

QUESTION NO: 1

As part of your design, you are evaluating whether to upgrade all domains to
Windows Server 2003.
Based on current configurations, which server or servers prevent you from
achieving this goal? (Choose all that apply)

A. DC2

B. DC3

C. DC4

D. DC5

E. DC6

F. Server1

Answer: D, E

Explanation:

The question asks what is preventing you from upgrading the DOMAINS to Windows
Server 2003. The correct answer is D and E. Both these servers are PDC in their domain.

The problem is that they are RISC servers. There is no RISC version of Windows 2003
so the domain cannot be upgraded.

Incorrect Options:

A, B and C: These BDC's are running Pentium processors which do support Windows
Server 2003. Furthermore, BDC's can be upgraded from Windows NT Server 4.0
domains to Windows Server 2003 domains.
F: The case study says that Server1 is currently hosting a mission critical application, and that the application vendor does not support running this application on any operating system other than Windows NT Server 4.0.


QUESTION NO: 2


You are designing the Windows Server 2003 Active Directory forest structure to
meet the business and technical requirements.
Which forest structure should you use?

A. One Active Directory forest with one domain.

B. One Active Directory forest with three domains.

C. One Active Directory forest with four domains.

D. Two Active Directory forests with one domain in each forest.

E. Three Active Directory forests with one domain in each forest.

Answer: A

Explanation:

In the security section of the case study it states: "Regional network administrators must have only limited control over the Active Directory Service. They will be responsible for managing user and computer accounts for their regions. Therefore, the locations will become OU's and we will delegate control."

The network administrator in the Los Angeles office will manage all domain controllers, configure sites and perform other high-level administrative tasks. This would then be the Root of the forest. There was no reason in the case study given that would state the requirement of a multi domain model such as different passwords or schema. It is for this reason that B, C, D and E are incorrect.


QUESTION NO: 3

You are designing the top-level organizational unit (OU) structure to meet the
business and technical requirements. Your design must accommodate the
anticipated growth of the company.

Which top-level OU structure should you use?

A. Paris OU, Sydney OU, Los Angeles OU, Lisbon-Barcelona OU

B. IT Administration OU, All CohoVineyard Departments OU, All CohoVineyard
Offices OU

C. Sales OU, Purchasing OU, Marketing OU, Accounting OU, Distribution OU, Human
Resources OU

D. CohoVineyard Users OU, CohoVineyard Computers OU, CohoVineyard Servers OU,
CohoVineyard Applications OU

Answer: A


Explanation:



In the security section of the case study it states: "Regional network administrators must
have only limited control over the Active Directory Service. They will be responsible for
managing user and computer accounts for their regions".


Under the Organizational Roles section it states: "Because of the small size of the
Barcelona branch office, it will have no IT staff and no servers. The Lisbon IT staff will
manage users and computers for both the Lisbon and Barcelona branch offices". This
justifies the creation of the "Lisbon-Barcelona" OU


Although you should not create separate OUs based on geographic locations just because
it's an obvious dividing point for structure, there are times when it is an appropriate
decision. When the network is dispersed over a wide area and connected by slower wide
area network (WAN) links, you can make it easier to design site boundaries by creating a
separate OU for each location and then creating nested OUs that delegate administrative
control.


Sites in Active Directory provide a way to abstract the logical organization of the
directory structure (the forest, domain, and organizational unit [OU] structure) from the
physical layout of the network. Sites take the responsibility for representing the physical
layout within Active Directory. Because sites are independent of the domain structure, a
single domain can include multiple sites or a single site can include multiple domains.



QUESTION NO: 4



As part of your design, you are evaluating whether a second-level organizational
unit (OU) structure is required.
Which factor necessitates the need for a second-level OU structure?


A. Audit policy settings


B. Software deployment needs


C. Client operating systems in use


D. Delegation of administrative authority


Answer: B


Explanation:


The Active Directory Section states: "Departments within Coho Vineyard have thier own
unique needs, which include but are not limited to, specialized departmental
applications." This would justify a 2nd level OU structure by Departments.
Creating OUs based on software management needs allows you to target applications to
the appropriate set of users.


Incorrect Options:


A: Audit policy settings is an administrative tool, and "D" says: "rules for OU placement
at lower levels of the domain are based more on user and computer management than
delegating administrative privileges."
C: There are no organizational requirements specific to either Windows Workstation 4.0
or Windows XP Professional. In addition, all workstations are to be standardized to
Windows XP.
D: The rules for OU placement at lower levels of the domain are based more on user and
computer management than delegating administrative privileges.



QUESTION NO: 5



You are designing a DNS name resolution strategy to meet the business and
technical requirements.
Which action or actions should you perform? (Choose all that apply)


A. Create an Active Directory-integrated zone named cohovineyard.com on a domain
controller in Los Angeles.


B. Create an Active Directory-integrated zone named paris.cohovineyard.com on a
domain controller in Paris.


C. Create an Active Directory-integrated zone named sydney.cohovineyard.com on a
domain controller in Sydney.


D. On a domain controller in Los Angeles, delegate paris.cohovineyard.com to a domain
controller in Paris.


E. On a domain controller in Los Angeles, delegate sydney.cohovineyard.com to a
domain controller in Sydney.


Answer: A


Explanation:


We only have a single domain, and the Network Infrastructure section states: "A
domain-naming strategy must be identified that reduces administrative complexity and is
intuitive to other users." You can't get anymore simple than a Single Active Directory
Domain.


In this type of zone, the DNS database is stored within Active Directory. All DNS servers
in an Active Directory-integrated zone are considered primary servers because the DNS
information actually becomes part of the Active Directory database; any DNS server can
be updated and any of them can resolve client requests. Active Directory is responsible
for replicating zone information between DNS servers, often making replication quicker
and making it a part of Active Directory management instead of a separate management
practice


The Active Directory section states: "Centralized control over Active Directory must
be maintained by the network administrator in the Los Angeles office."
Therefore, B,C, D and E are incorrect.



QUESTION NO: 6



You are designing a plan for maintaining the WINS infrastructure on the new
Windows Server 2003 Active Directory environment.
Which factor or factors necessitate the need to maintain the WINS infrastructure?
(Choose all that apply)


A. Client operating systems in use.


B. Server operating systems in use.


C. VPN client access by using PPTP.


D. Installation of Active Directory client software.


Answer: A, B


Explanation:


Server1 will not be upgraded due to the mission critical application. Until the upgrade of
the client computers to Windows XP Pro takes place, there are still several that are
running pre-Windows 2000 operating systems.


As long as there are computers running versions of Windows older than Windows 2000,
there will be a need for WINS.


Incorrect Options:


C: Point-to-Point Tunneling Protocol (PPTP) is a data-link layer protocol used to provide
secured communications for virtual private network (VPN) connections.
D: In environments that include any combination of Windows 95, Windows 98,
Windows Me, and Windows NT 4.0, the Active Directory client software will need to be
installed on these systems in order to participate in an Active Directory domain.



QUESTION NO: 7



You are designing a DNS implementation strategy for the Paris office.


Which two actions should you perform? (Each correct answer presents part of the
solution. Choose two)


A. Create an Active Directory-integrated zone named cohovineyard.com.


B. Create an Active Directory-integrated zone named paris.cohovineyard.com.


C. Create a standard primary zone named paris.cohovineyard.com.


D. Configure all computers in Paris to use DC3 as their DNS server.


E. Configure all computers in Paris to use DC6 as their DNS server.


Answer: A, D


Explanation:


In the Network Infrastructure Section it states: "One domain controller in each of the
current offices will have the DNS service installed. DNS name resolution traffic must be
minimized over all WAN links". The local server for Paris is DC3, which is also a domain controller. Also, seeing as how DC3 is a local server, it would minimize traffic over its WAN link.


Incorrect Options:


B: paris.cohovineyard.com is not a valid domain name.
C: The master copy of the DNS database resides in a standard ASCII text file, in this
zone. Only this primary zone can be directly modified.
E: DC6 is located in Sydney, so this option would increase traffic on the WAN lines.



QUESTION NO: 8



You are designing a strategy for implementing Internet Authentication Service
(IAS) to meet the business and technical requirements.
What should you do?


A. Install IAS on VPN1, VPN2, and VPN3.


B. Install IAS, on VPN1.
Configure VPN2 and VPN3 as RADIUS clients.


C. Install IAS on VPN1.
Configure VPN1, VPN2, and VPN3 as RADIUS clients.


D. Install IAS on DC1.
Configure VPN2 and VPN3 as RADIUS clients.


Create all remote access policies on VPN1.


E. Install IAS on DC2.
Configure VPN2 and VPN3 as RADIUS clients.
Configure remote access logging on VPN1.


Answer: C


Explanation:


Internet Authentication Service (IAS) Server is Microsoft's implementation of Remote
Authentication Dial-In User Service (RADIUS). A RADIUS server is a server that
authenticates, authorizes, and performs accounting functions when a connection attempt
is made from a remote access client. It is also a network access server (NAS) that is
running IAS. A RADIUS client can be a dial-up server, VPN server, or a wireless access
point (AP). "C" is the most likely answer because it conforms to the above rule, except that the
policies have not been included.


Incorrect Options:


A: Only one IAS server is required.
B: All VPN servers have to be IAS clients.
D and E: Policies are created on the IAS server.



QUESTION NO: 9


You are designing a DNS infrastructure to meet the Internet name resolution
requirements.
What should you do?


A. Create a standard primary zone named "." on all DNS servers.


B. Create an Active Directory-integrated zone named "." on a DNS server on Los
Angeles.


C. Configure all DNS servers to use forwarders. Specify the IP address of the DNS server
at the local ISP.


D. Enable default root hints on all DNS servers.


E. Disable recursion on all DNS servers.



Answer: C


Explanation:


Since all clients will use their local DNS servers for name resolution, they will need to
have Forwarders enabled on the DNS servers for Internet Host Name resolution.
If your organization is connected to the Internet by means of a slow wide area link, you
can optimize name resolution performance by channeling all DNS queries through a
forwarder.



QUESTION NO: 10



You are designing the placement of the PDC emulator role to meet the business and
technical requirements.
In which location should you place the PDC emulator role? (Choose all that apply)
A. Los Angeles
B. Paris
C. Sydney
D. Lisbon
E. Barcelona


Answer: A


Explanation:
When upgrading Windows NT 4.0 and earlier domains, only one domain controller
running Windows Server 2003 can create security principals (users, groups, and
computer accounts). This single domain controller is configured as a PDC emulator
master. The PDC emulator master emulates a Windows NT 4.0 and earlier PDC.
Los Angeles has the most NT 4.0 users, so placing it there would minimize traffic over
the WAN lines.


Therefore, B, C, D and E are incorrect.



QUESTION NO: 11


You are designing the IP addressing scheme for the new Barcelona office.
Which network address or addresses are valid for your design? (Choose all that
apply)
A. 10.10.10.0/28
B. 10.10.255.0/24
C. 131.15.0.0/24
D. 151.10.10.0/24
E. 192.168.11.0/25


Answer: A, B, E


Explanation:
Private addresses are confined to specific ranges that can be used by any private network
but that cannot be seen on the public Internet. For example, a user connecting computers
in a home TCP/IP network does not need to assign a public IP address to each host. The
user instead can take advantage of the address ranges shown in the table to provide
addresses for hosts on the network.



Table of Private Address Ranges







Incorrect Options:
C and D: The case study says that the IT staff in the Lisbon office will manage users in
the Barcelona office because Barcelona will not have any servers installed. It also says
that a VPN server will provide NAT services, which enables a local-area network (LAN)
to use one set of Internet Protocol (IP) addresses for internal traffic and a second set of
addresses for external traffic.





Test - 5

Network Infrastructure

The following infrastructure requirements must be considered:
1. Users in the Chicago office access Internet-based resources frequently. This
Internet-related traffic accounts for most of the bandwidth used between the
Chicago and New York offices. Bandwidth utilization between these two offices is
currently a cause for concern. Network traffic between the Chicago and New York
offices must be minimized whenever possible.
2. Because of the Boston office's data access requirements, a high level of
availability and reduced latency between the New York and Boston offices is
required. Bandwidth utilization between the Boston and New York offices is
minimal and is not a concern in the foreseeable future.
3. A Windows Server 2003 computer will provide VPN access to the network by
using both L2TP and PPTP. Usage statistics will be gathered over time to identify
which users establish VPN connections to the network, and the duration of their
connections. These usage statistics will help the company track trends and plan for
future growth.
4. The network administrator in Chicago has extensive knowledge of DNS, and will
manage the implementation of the DNS infrastructure for the Litware. Inc.,
network.
5. The DNS structure must be secured against any unauthorized modifications, but
also must be easy to maintain and manage.


QUESTION NO: 1
You are designing a forest and domain structure to address the concerns of
Contoso, Ltd., and to meet the business and technical requirements. You want to use
the minimum number of domains and forests that are required.
Which domain structure should you use?
A. One forest and two domains.

B. One forest and three domains.
C. One forest and four domains.
D. Two forests and three domains.
E. Two forests and four domains.

Answer: E

Explanation:

This question address a concept Microsoft has recently adopted for Windows 2003:
isolation vs. autonomy. The "Organizational Goals" section of the case states:
The company has also agreed that management of Contoso, Ltd. data must be completely
isolated from all other Litware, Inc. data. This included the ability to manage security of
Contoso, Ltd. resources. There will be no exceptions. The key phrases in the case are "data must be completely isolated" and "included the ability to manage security". If Contoso becomes a sub-domain or OU in the Litware forest, there will always be higher level administrators (non-client related)
who canassign themselves rights to Contoso data. The security boundary for isolation is the
forest, and the answer should reflect that.

Use multiple forests when you need to provide support for multiple distinct companies or
when you need to provide autonomy or isolation to a unit within a company.

Incorrect Options:

A and C: To provide autonomy or isolation to a unit within a company, you need
multiple forests.
B: This option only provides for data autonomy for Contoso, which does not address the
case. D:


QUESTION NO: 2
You are designing the top-level organization unit (OU) structure to meet the
administrative requirements. What should you do?

A. Create a top-level OU named New York.
Place all user and computer accounts from New York in the New York OU.
B. Create a top-level OU named Chicago.
Place all user and computer accounts from Chicago in the Chicago OU.
C. Create a top-level OU named Coho.
Place all user and computer accounts that are assigned to the Coho Vineyard customer
project in the Coho OU.
D. Create a top-level OU named Sales.
Place all user and computer accounts from the sales department in the Sales OU.

Answer: C

Explanation:
The case study states: "To reduce the burden on IT staff, trusted individuals within the
organization should be identified to help reduce the IT administrative burden."
In the Active Directory section of the case study it states: "The trusted individuals will be
allowed to manage only user accounts within the customer project to which they have
been assigned." So we would create OU's for each project and Delegate Authority.
It is for this reason that A, B and D are incorrect.


QUESTION NO: 3
You are designing a security group strategy to meet the business and technical
requirements.
What should you do?

A. Create one global group named G_Executives.
Make all executives user accounts members of that group.
B. Create two global groups named G_Executives and one universal group named
U_Executives.
Make the two global members of U_Executives.
Make the executive user accounts members of the appropriate global group.
C. Create three global groups named G_NY_Executives and G_Chi_Executives and
G_Executives.
Make G_NY_Executives and G_Chi_Executives members of G_Executives.
Make the executive user accounts members of the appropriate global group.
D. Create one domain local group named DL_Executives.
Make all executive user accounts members of that group.

Answer: B

Explanation:
Global groups are used to gather users that have similar permissions requirements. One
of its characteristics is they can be assigned permissions or be added to local groups in
any domain in a forest. We have already established the need for two forests, so we also
need two global groups because each forest can have only one global group.
Universal groups are normally used to assign permissions to related resources in multiple
domains. Universal groups share the following characteristics:
1. Universal groups are available only when the forest functional level is set to Windows
2000 native or Windows Server 2003.
2. Universal groups exist outside the boundaries of any particular domain and are managed by Global Catalog servers.
1. Universal groups are used to assign permissions to related resources in
multipledomains.
2. Universal groups can contain users, global groups, and other universal groups from
any domain in a forest.
3. You can grant permissions for a universal group to any resource in any domain.

Incorrect Options:

A and C: Global groups cannot be applied across forests.
D: Domain local groups exist on domain controllers and are used to control access to
resources located on domain controllers in the local domain.


QUESTION NO: 4
You are designing an Active Directory implementation strategy to present to
executives from your company and from Contoso, Ltd.
Which implementation strategy should you use?

A. Upgrade the New York domain.
Upgrade the Chicago domain.
Create a pristine forest for Contoso, Ltd.
B. Create a pristine forest.
Upgrade the New York domain.
Upgrade the Chicago domain.
Do nothing further.

C. Create pristine forest.
Upgrade the New York domain.
Upgrade the Chicago domain.
Create a pristine forest for Contoso, Ltd.
D. Create a pristine forest.
Upgrade the New York domain.
Upgrade the Chicago domain.
Create a new child domain for Contoso, Ltd.

Answer: C

Explanation:
The case study states:"...the company has decided to implement a Windows Server 2003
Active Directory environment." It also says that "Currently, Litware, Inc. has two
Windows NT 4.0 domains..."

The Active Directory Installation Wizard simplifies upgrading a Windows NT domain to
Windows Server 2003 Active Directory. The Active Directory Installation Wizard
installs and configures domain controllers, which provide network users and computers
access to the Active Directory directory service. Any member server (except those with
restrictive license agreements) can be promoted to domain controllers using the Active
Directory Installation Wizard. During this process you will define one of the following
roles for the new domain controller:
1. New forest (also a new domain)
2. New child domain
3. New domain tree in an existing forest
4. Additional domain controller in an existing domain
By creating two new forests, you are providing isolation and. This satisfies the
organizational requirements.

Incorrect Options:

A and D: To provide autonomy or isolation to a unit within a company, you need
multiple forests.
B: This option only provides for data autonomy for Contoso, which does not address the
case.


QUESTION NO: 5
You are designing the DNS infrastructure to meet the business and technical
requirements.
What should you do?

A. Create an Active Directory-integrated zone on DC4.
Set the replication scope to all DNS servers in the domain.
B. Create an Active Directory-integrated zone on DC5.
Set the replications scope to all DNS servers in the forest.
C. Create an Active Directory-integrated zone on any domain controller in the forest root
domain.
Set the replication scope to all domain controllers in the domain.
D. Create a standard primary zone on DC4
E. Create a standard primary zone on any domain controller in the forest root domain.

Answer: B

Explanation:

The answers refer to a DC4 and DC5 which do not exist in the scenario - a diagram or
chart of some kind is missing. However, answer C does not make any sense. Typically
you will store the root domain DNS info in AD (AD-I zone) and set the replication to
Forest DNS Zones, i.e., to all DCs with DNS in the forest, especially the msdcs
subdomain, found in the root domain. Based on that simple fact, the answer is B,
assuming that DC5 is in the root domain of the forest.

You can control the replication scope of Domain Name System (DNS) zone data stored
in Active Directory so that only specific domain controllers in the forest participate in
DNS zone replication.


QUESTION NO: 6
You are designing a DNS implementation strategy for the network.
Which two zone types should you use? (Each correct answer presents part of the
solution. Choose two)

A. Reverse lookup zones
B. Standard primary zones
C. Standard secondary zones
D. Active Directory-integrated zones

Answer: A, D

Explanation:

Reverse lookup zones provide IP and Hostname restrictions for IIS.
Active Directory-integrated zones are fault tolerant and secure.

Incorrect Options:

C: This zone type is usually implemented when there is UNIX or older DNS systems in
place.
D: Secondary zones can increase fault tolerance and availability, but zone transfer traffic
can consume unacceptable amounts of bandwidth in some circumstances.


QUESTION NO: 7
You are designing a strategy to upgrade the DHCP servers after the new Active
Directory structure is in place.
Who can authorize the DHCP servers? (Choose all that apply)

A. Chief information officer
B. IT support staff in Boston
C. IT support staff in New York
D. Network administrator in Chicago
E. Network administrator in New York

Answer: A

The case study states: "The chief information officer is the only person who is authorized
to implement any changes that will impact the entire company."


QUESTION NO: 8
You are designing the placement of the global catalog servers. You want to use the
minimum number of global catalog servers that are required.
Which design should you use?

A. One global catalog server in New York.
B. Two global catalog servers in New York.
C. One global catalog server in Chicago and one global catalog server in New York.
D. Two global catalog servers in Chicago and two global catalog servers in New York.
E. One global catalog server in Chicago, one global catalog server in New York, and one
global catalog server in Boston.

Answer: E

Explanation:

The "Network Infrastucture" section of the case states that Boston requires high
availability and reduced latency. The only way to achieve these goals is to give them
their own GC which would process logons locally (universal group membership needs to
be checked during logon), instead of contacting a GC in the NY office. An argument
could be made that a DC in the Boston office could have universal group membership
caching enabled, thus removing the requirement for a local GC, but this was not an
option in the answer matrix.

QUESTION NO: 9
You are designing an IP addressing strategy for your VPN solution.
How many public addresses should you use?
A. 1
B. 25
C. 50
D. 255

Answer: A
Explanation:
VPN connections will be assigned through the New York office.




Enter Valid e-mail to get all updates of this sites in mail

Enter your email address:

Delivered by FeedBurner

Cheapest predictive dialer for callcenter power dial

Power Dial predictive dialer for callcenter with less investment and more features based in the heart of Hyderabad AP India.Power Dial has setup more then 200 centers and more then 5000 seats supports is provided.
For best quotes, pricing and other details mail me asap at powerdial.hyd@gmail.com

Vivaan Kumar
http://powerdial.blogspot.com/
Cheapest Predictive Dialer power Dial
cheap pd power dial
predictive dialer
predictive dialer for callcenter with less investment power dial
predictive dialer for callcenter with low price
predictive dialer form india
predictive dialer from hyderabad
power dial predictive dialer