You are the security administrator for your company. The company's network supports 500 users. All network server computers run Windows Server. All network client computers run Windows XP Professional. All domain account logon
events are audited.
A human resources manager requests that you produce a listing of the times and dates a user named JohnP logged on to the domain. The user was assigned to a client computer named HR09.
You should achieve this objective while reviewing the minimum amount of information. What should you do? (Choose two. Each correct answer presents part of the solution.)
A. Create a filter that will list all events for the JohnP user account.
B. Use the Find option to list only the events for the JohnP user account.
C. Open Event Viewer and access the security log on each domain controller.
D. Use the Find option to list only the events for the HR09 computer account.
E. Create a filter that will list only the events for the HR09 computer account.
F. Log onto HR09 as a local administrator, and open Event Viewer to view the local security log.
You are a network administrator for your company. The company network consists of two Active Directory forests. Verigon.com is the single-domain forest that contains all user accounts and resources for the corporate network, except the
resources that are allocated to the Development department. Dev.corp is the single-domain forest that is used only by the Development department. You configure an external trust between the two domains.
Developers must be able to log on from their computers to the verigon.com domain. In the verigon.com forest, you create a new user principal name (UPN) suffix of dev.corp and configure UPNs for the developers' user accounts in the
verigon.com domain with this suffix. Developers report that they cannot log on to the verigon.com domain from their computers, which belong to the dev.corp domain, by using their UPNs. You must enable developers to log on to the
verigon.com domain from their computers by using UPNs.
What should you do?
A. Replace the external trust with a forest trust.
B. Change the UPN suffix for the developers' user accounts to verigon.com.
C. Configure selective authentication on the trust.
D. Configure domain-wide authentication on the trust.
Jennifer, the network administrator at a chain of bakery stores called The Cheesecake Factory, recently upgraded the corporate office of a single segmented network to one that supports four separate virtual networks, or Virtual Local Area Network segments (VLANS). Jennifer is very conscious of production change and thus contacted the systems group in order to make sure all the technical aspects of the project were met. Jennifer wanted to make sure that when all the client workstations were on the new network segments, they were still able to gain IP connectivity to the rest of the network as they had before. The Cheesecake Factory has been running a Windows Server Active Directory domain at the Windows 2000 mixed functional level for over two months. Jennifer created four network segments and labeled them VLAN1, VLAN2, VLAN3, and VLAN4.VLAN1 was the original network and hosts the original DHCP server, called SERVER1. Its network address did not change. The systems team decided to put DHCP Relay Agents on VLAN2 and VLAN3, configured to relay DHCP messages to the original DHCP server on VLAN1. Due to a reluctance to permit more DHCP broadcast traffic than the router could handle, Jennifer suggested to her systems team that VLAN4 should host its own DHCP server. The systems group installed another DHCP server on VLAN4, set up the appropriate DHCP scopes on that server and set up the additional DHCP scopes for VLAN2 and VLAN3 on SERVER1.After the work was completed, all clients on all VLANs seemed to be working fine for about two weeks, until Jennifer got a call from the Help Desk stating that the users in the warehouse cannot boot up from their diskless workstations, where they run monthly accounting statistics, but can connect from all other workstations. Jennifer looks at her network diagram and determines that the warehouse is located on VLAN4. She also checks with users in the accounting department on VLAN1 to see if they can connect using their diskless workstations. They tell Jennifer that they can and have had no problems. What did the systems team most likely forget to do?
A. Install a DHCP Relay Agent on VLAN4.
B. Configure a BOOTP table on the new DHCP server on VLAN4.
C. Replace the router with an RFC 2131 compliant router.
D. Cold boot all the diskless workstations.
You are using WINS Forward Lookup integration in your mixed UNIX/Windows environment to allow your DNS-only UNIX clients to use only their configured Windows Server DNS server to query and resolve resolution requests for downlevel Windows NT 4.0 machines
John is the network administrator for a Windows Server network. Software Update Services will be used to deploy updates throughout the network. John wants to deploy the Automatic Updates settings for all clients through a group policy object. He opens the appropriate GPO but cannot find any automatic update settings. What is causing the problem?
A. The settings cannot be configured through a group policy object.
B. John does not have administrative privileges.
C. The Automatic Updates ADM template has not been loaded.
D. Software Update Services has not been installed.
You work as the network administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. The servers at the ABC.com network run Windows Server.
The ABC.com network has a Web server named ABC-SR11. During a routine monitoring you notice an increase in network traffic. Due to this you need to find out the MAC address of the workstation that initiated the transfers and the
command that was used. However, you action must not effect ABC-SR11.
What actions must you take?
A. You must run the ipconfig/registerdns.
B. You must use the Netmon utility.
C. You must capture the IP traffic to ABC-SR11.
D. You must Enable Server Message Block (SMB) signing on all the workstations.
You work as a network administrator for ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. There are currently 120 Web servers running Windows Server and are contained in an Organizational Unit (OU) named ABC_WebServers
ABC.com management took a decision to uABCrade all Web servers to Windows Server. You disable all services on the Web servers that are not required. After running the IIS Lockdown Wizard on a recently deployed web server, you discover that services such as NNTP that are not required are still enabled on the Web server.
How can you ensure that the services that are not required are forever disabled on the Web servers without affecting the other servers on the network? (Choose two.)
A. Set up a GPO that will change the startup type for the services to Automatic.
B. By linking the GPO to the ABC_WebServers OU.
C. Set up a GPO with the Hisecws.inf security template imported into the GPO.
D. By linking the GPO to the domain.
E. Set up a GPO in order to set the startup type of the redundant services to Disabled.
F. By linking the GPO to the Domain Controllers OU.
G. Set up a GPO in order to apply a startup script to stop the redundant services.
You are working as the administrator at ABC.com. ABC.com has headquarters in London and branch offices in Berlin, Minsk, and Athens. The Berlin, Minsk and Athens branch offices each have a Windows Server domain controller named ABC-DC01, ABC-DC02 and ABC-DC03 respectively. All client computers on the ABC.com network run Windows XP Professional.
One morning users at the Minsk branch office complain that they are experiencing intermittent problems authenticating to the domain. You believe that a specific client computer is the cause of this issue and so need to discover the IP address client computer.
How would you capture authentication event details on ABC-DC02 in the Minsk branch office?
A. By monitoring the logon events using the SysMon utility.
B. By recording the connections to the NETLOGON share using the SysMon utility.
C. By recording the authentication events with the NetMon utility.
D. By monitoring the authentication events using the Performance and Reliability Monitor.
The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server and all client computers run Windows XP Professional.
ABC.com contains a file server named ABC-SR24. ABC-SR24 hosts the home folders for all ABC.com users.
After about a month the ABC.com users raised complaints regarding the unacceptable long time their home folder takes to open at certain times during the day.
You need to determine the reason for the poor performance. You verify that the processor and memory usage is low. You suspect the hard disk may be the cause of the bottleneck.
How would you verify that the hard disk is the problem?
A. Use System Monitor to view the LogicalDisk and PhysicalDisk counters during a period of poor performance.
B. Use Task Manager to view the page faults counter.
C. Configure Auditing on the home folders.
D. Use Network Monitor to view the amount of network traffic to and from the server.
The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server and all client computers run Windows XP Professional.
A server named ABC-SR12 contains two volumes named Drive D and Drive E and has been designated to function as an application server.
The application on ABC-SR12 is a custom application that is currently used by the ABC.com Sales Department. The application has been installed on the ABC-SR12 Drive D. You configure the application database on Drive D, and you
configure the application to store its database transaction log files on the ABC-SR12 Drive E.
After a few days, Sales users report that the application has failed. You investigate the cause of the failure and discover that the ABC-SR12 Drive E is almost completely filled with the application's transaction log files.
You back up the database and delete the log files and the application runs successfully.
You want to design a solution that keeps the application running. The log files should not be deleted unless the database has been backed up.
What should you do to keep the application running? (Choose two.)
A. Enable file compression on the E: drive.
B. Have a script created that will back up the database then delete the log files.
C. Configure an alert on ABC-SR12 to run the script when there is less then 25 percent of free space on the E-drive.
D. Configure a script to delete the log files.
E. Create a scheduled task to run the script every week.