Shared Flashcard Set

Details

Windows Server 2003
Quiz Help
50
Other
Professional
10/21/2008

Additional Other Flashcards

 


 

Cards

Term
The person nominated in the Name field of the Managed By tab of the computer accounts properties must exist in Active Directory.
Definition
True
Term
When you use Dsadd to create a computer account, the DN must be surrounded by quotation marks in order for the account to be created successfully
Definition
False
Term
You can use the Ping utility to prove that the printer is connected to the network, powered on, and online.
Definition
False
Term
When you install a printer that is connected directly to the Windows Server 2003 system, the installation process does not create a logical printer device for it.
Definition
False
Term

What security principal is assigned as the owner of files and folders created by the operating system?

 

a. The Administrator account

 

b. The Administrators group

 

c. The SYSVOL special identity

 

d. The SYSTEM special identity

Definition
The Administrators group
Term

Which of the following commands creates a computer account for computer1.sales .contoso.com?

 

a. dsadd computer CN=computer1,CN=sales,DC=contoso,DC=com

 

b. dsadd comp CN=computer1,CN=sales,DC=contoso,DC=com

 

c. dsmod computer CN=computer1,CN=sales,DC=contoso,DC=com

 

d. dsrm computer CN=computer1,CN=sales,DC=contoso,DC=com

Definition
a. dsadd computer CN=computer1,CN=sales,DC=contoso,DC=com
Term

You are the network administrator for a telecommunications company in Mobile, Alabama. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. The company employs 134 people, and all of them have a Windows XP Professional system. One morning, you get a call from a user who has received the following error message: Windows cannot connect to the domain, either because the domain controller is down or otherwise unavailable, or because your computer account was not found. Please try again later. If this message continues to appear, contact your system administrator for assistance. The user logged on to the system without any problem the previous day, and you have received no other reports of users experiencing problems. You reset the computer account in Active Directory Users And Computers, but the user still cannot connect to log on to the domain. Which of the following do you try next?

 

a. Disable and reenable the computer account.

 

b. Disable and reenable the user account.

 

c. Change the computer system’s membership to a workgroup, and then rejoin it to the domain.

 

d. Delete the existing computer account, and re-create a new computer account with the same name.

Definition
c. Change the computer system’s membership to a workgroup, and then rejoin it to the domain.
Term

You have just taken over as the network administrator for a paper manufacturer in Springfield, Ohio. You are in the process of implementing a new file structure to better accommodate users’ needs and make file access more secure. Today, you are working on the E:\SALES folder structure, which is used by the 65 users in the Sales department. All 65 users need the ability to read files in the folder and run programs from that folder. In addition, three managers need the ability to edit and delete files in that folder. All of the users and managers in the Sales department are members of the SALES group. Which of the following statements best describes how to configure permissions to meet these requirements?

 

a. Create a share, and assign the Modify share permission to the SALES group. Assign the SALES group the NTFS Read & Execute permission. Assign the three managers in the Sales department the NTFS Modify permission.

 

b. Create a share, and assign the Read share permission to the SALES group. Assign the SALES group the NTFS Read & Execute permission. Assign the three managers in the Sales department the NTFS Modify permission.

 

c. Create a share, and assign the Full Control share permission to the SALES group. Assign the SALES group the NTFS Read & Execute permission. Assign the three managers in the Sales department the NTFS Modify permission.

 

d. Create a share, and assign the Full Control share permission to the SALES group. Assign the SALES group the NTFS Read permission. Assign the three managers in the Sales department the NTFS Modify permission.

Definition
c. Create a share, and assign the Full Control share permission to the SALES group. Assign the SALES group the NTFS Read & Execute permission. Assign the three managers in the Sales department the NTFS Modify permission.
Term

You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?

 

a. The NTFS permissions on the folders were reset to Read for the Everyone special identity during the restore process.

 

b. The ACLs for the folders were re-created by the restore process and are now empty.

 

c. The shares that the users used to connect to the server were removed.

 

d. The shares that the users used to connect to the server were automatically set to deny access to the Everyone special identity, as a security precaution.

Definition
c. The shares that the users used to connect to the server were removed.
Term

You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?

 

a. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.

 

b. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98.

 

c. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. Select the Automatic Update Of Clients option in the Sharing tab of the printer’s properties.

 

d. Install the new Windows 98 drivers on the Windows 98 client systems. Install the Windows Server 2003 drivers on the server.

Definition
a. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.
Term

After you create a new printer and share it out, users can start printing to the device even if you have not made any permission assignments for the printer. How is this possible?

 

a. The default permission assignment for a newly created printer is Everyone, Full Control.

 

b. The default permission assignment for a newly created printer is Everyone, Print.

 

c. The default permission assignment for a newly created printer is Domain Users, Print.

 

d. The default permission assignment for a newly created printer is Domain Users, Full Control.

Definition
b. The default permission assignment for a newly created printer is Everyone, Print.
Term

By default, members of which Active Directory groups can assign ownership of an NTFS file or folder to another user?

 

a. Administrators, Backup Operators

 

b. Administrators, Backup Operators, Server Operators

 

c. Administrators, Server Operators

 

d. Administrators, Backup Operators, Account Operators

Definition
b. Administrators, Backup Operators, Server Operators
Term

Which of the following is considered a standard NTFS permission?

 

a. List Folder Contents

 

b. Read Extended Attributes

 

c. Create Folders/Append Data

 

d. List Folder/Read Data

Definition
a. List Folder Contents
Term

Which of the following tasks can be performed with the Full Control share permission but not the Change share permission?

 

a. Changing the name of the file

 

b. Changing file permissions

 

c. Changing the contents of the file

 

d. Deleting the file

Definition
b. Changing file permissions
Term

You want a user to take ownership of a file or folder that she did not create. Which of the following groups do you not add her to?

 

a. Administrators group

 

b. Backup Operators group

 

c. Creator/Owner special identity

 

d. Server Operators group

Definition
c. Creator/Owner special identity
Term

A user is assigned the Change share permission to the \\SERVER2\DATA share that represents the C:\Data folder on Server2. The user connects to the DATA share across the network and opens a file from the \\SERVER2\DATA\SALES folder. He then decides that he no longer needs that file, and he tries to delete it. However, he is unable to do so and receives an error. Which of the following is a possible explanation for this?

 

a. NTFS permissions are restricting the user’s access to the folder.

 

b. The user is a member of a group that is assigned the Read share permission to the DATA share.

 

c. Share permissions on the SALES folder in the DATA share are preventing the user from deleting the file.

 

d. The user is a member of a group that has been denied all permissions to the DATA share.

Definition
a. NTFS permissions are restricting the user’s access to the folder.
Term

31. You are the network administrator for a small furniture manufacturing company in Portland, Oregon. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. Each server has three disk drives in it. One drive is dedicated to the system and boot partition, and the other two drives hold the company sales order-processing database. All of the drives use NTFS. One day, a user reports that she has been configuring a folder that she created, removing all of the users, including herself, from the ACL. Now she is unable to access the files in the folder. How do you restore her access to the files in the folder?

 

a. Restore the folder and its files from a backup taken before the user made the changes.

 

b. Have the user assign herself permission to the folder again.

 

c. Retake ownership of the folder, and reassign permissions to the users as necessary.

 

d. Assign the user to the Creator/Owner special identity so she can edit the ACL.

Definition
b. Have the user assign herself permission to the folder again.
Term

You are troubleshooting a file access problem reported by a user called SallyJ from the Sales department. As a member of that department, she is a member of the Sales group. She is connecting to a shared folder called DATA, which is shared on the E:\DATA folder. You examine the share permissions and NTFS permissions on the folder and see the following: Share permissions for DATA share: Sales - Change NTFS permissions for E:\DATA folder: Sales - Write SallyJ - Read&Execute No permissions are applied to any files in the folder. What should SallyJ be able to do in the folder?

 

a. Open files but not make any changes.

 

b. She should not be able to open the files.

 

c. Open files and make changes to those files, but not create any new files.

 

d. Open files, make changes to those files, and create new files.

Definition
d. Open files, make changes to those files, and create new files.
Term

You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?

 

 a. The NTFS permissions on the folders were reset to Read for the Everyone special identity during the restore process.

 

b. The ACLs for the folders were re-created by the restore process and are now empty.

 

c. The shares that the users used to connect to the server were removed.

 

d. The shares that the users used to connect to the server were automatically set to deny access to the Everyone special identity, as a security precaution.

Definition
c. The shares that the users used to connect to the server were removed.
Term

You are the network administrator for a small company that develops integrated circuit chips for mobile communications manufacturers. The company network comprises a single Windows Server 2003 system that provides file and print services to the company’s 25 users. Three of the users are working on a top-secret project. They require a folder on the server that only they can access. Auditing is enabled on the server, but the manager wants to make sure that no one, including the Administrator, can access the files except the three engineers working on the project. The manager asks you to remove all entries from the ACL for the folder for users, groups, and special identities other than the three engineers. Will this prevent all others from seeing or opening the files in the folder?

 

a. Yes.

 

b. No. Someone else might be able to open or see the files, but you will have no way of knowing if this has occurred.

 

c. No. Someone else might be able to open or see the files, but you will be able to tell if this has occurred.

 

d. No. Members of the Administrators group will also be able to see or open the files.

Definition
c. No. Someone else might be able to open or see the files, but you will be able to tell if this has occurred.
Term

You are the network administrator for a charity based in Dallas, Texas. You have a single Windows Server 2003 system, running Active Directory, that provides file and print server services to 50 users. The system was donated by a local business, and while it is powerful enough for your needs, storage capacity on the server is limited. Your manager has assured you that as soon as funds become available, you will be able to purchase an additional disk drive, but in the meantime he has asked you to use any available means to control the storage situation. As a result, you have implemented disk quotas so that one user cannot monopolize all the available disk space. After creating a new directory structure for a user and copying a number of large files from the user’s workstation to the server, you want to make sure the files are counted toward the user’s disk quota. Which approach are you most likely to use?

 

a. Make the user a member of the Administrators group, which allows her to take ownership of the files. Once she has done that, remove her from the Administrators group.

 

b. Make the user a member of the Creator/Owner special identity to allow her to take ownership of the files.

 

c. Give the user the Modify NTFS permission so she can take ownership of the files.

 

d. While logged on as a user account that is a member of the Server Operators group, assign ownership of the files to the user.

Definition
d. While logged on as a user account that is a member of the Server Operators group, assign ownership of the files to the user.
Term

You have created a printer on a Windows Server 2003 system. During the creation process, you shared the printer out, but now you want to configure the printer so it is not listed in Active Directory. Which of the following is the correct way to do this?

 

a. Select the printer icon in the Printers And Faxes window and, from the File menu, select Properties. In the General tab, clear the List In The Directory check box.

 

b. Select the printer icon in the Printers And Faxes window. Right-click the icon, and deselect List In The Directory on the menu.

 

c. Select the printer icon in the Printers And Faxes window and, from the File menu, select Sharing. Clear the List In The Directory check box.

 

d. Locate the corresponding printer object in Active Directory Users And Computers, and delete or disable it.

Definition
c. Select the printer icon in the Printers And Faxes window and, from the File menu, select Sharing. Clear the List In The Directory check box.
Term

You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?

 

a. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.

 

b. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98.

 

c. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. Select the Automatic Update Of Clients option in the Sharing tab of the printer’s properties.

 

d. Install the new Windows 98 drivers on the Windows 98 client systems. Install the Windows Server 2003 drivers on the server.

Definition
a. On the Windows Server 2003 systems, update the drivers for both Windows Server 2003 and Windows 98. In addition, install the Windows 98 drivers on the client systems.
Term

You are the network administrator for a small computer distributor. The network comprises a single Windows Server 2003 system, which is configured as a domain controller, and 17 Windows XP Professional workstations. There is a single high-performance laser printer, which is directly connected to the network. The Windows Server 2003 system acts as a print server for the device, with a single logical printer. You are due to take a week’s vacation, and although you anticipate few problems, you want to give a user with some technical expertise the ability to pause and restart the printer if a printing problem arises. You also want to allow him to manage jobs in the print queue other than his own. To give him the necessary rights, you want to make a single group assignment for the user. If possible, though, you do not want to add him to a group that grants him more rights than he needs. Which of the following predefined Active Directory groups do you add him to?

a. Print Operators

b. Administrators

c. Power Users

d. Print Managers

Definition
a. Print Operators
Term

Which of the following statements is true of global groups?

 

a. Global groups can include only users from within their domain.

 

b. Global groups can include users from any domain in the tree.

 

c. Global groups can include users from any domain in the forest.

 

d. Global groups can include users from any domain in Active Directory

Definition
a. Global groups can include only users from within their domain.
Term

       You are the network administrator for a small specialty auto parts manufacturer. The network comprises two Windows Server 2003 systems, both of which are configured as domain controllers. Active Directory is operating at the Windows 2000 mixed domain functional level. The company has recently created a new Research and Development department, and 25 new Windows XP Professional systems are being installed in that department. The users in the department will join the domain when they first use their PCs. Rather than have the computer accounts for the department created in the Computers container, you would like to have the computer accounts in the R&D OU so that they can immediately be subject to the group policy applied to that OU. Which of the following do you do to achieve this?

 

a.     Have users create the computer accounts during the domain joining process, and then move them from the Computers container to the R&D OU.

 

b.    Create the computer accounts in the R&D OU, and then have the users join the computers to the domain.

 

c.    Apply the same group policy that is applied to the R&D OU to the Computers container.

 

d.    Direct the users to specify the R&D OU for the computer account creation when they join the computers to the domain.

Definition

b.    Create the computer accounts in the R&D OU, and then have the users join the computers to the domain.

 

Term
You are the network administrator for a bank. The network comprises 3 Windows Server 2003 systems, 23 Windows 98 client systems, 3 Windows NT 4 systems, and 14 Windows XP Professional systems. You have one laser printer that is connected directly to the network. One of the servers is configured as a print server for the printer, and the Windows 98 and Windows XP Professional systems all have a logical printer configured that connects to the printer via the print server. The Windows NT 4 workstation systems print directly to the printer across the network. You have just purchased a new printer and are in the process of configuring it. The users on the Windows NT 4 workstation systems do not need to access it. The new printer will be attached directly to the print server by a parallel interface. What platforms do you install drivers for when you configure the printer?
a.Windows Server 2003
b.Windows Server 2003 and Windows 98
c.Windows Server 2003, Windows XP Professional, and Windows 98
d.Windows Server 2003 and Windows XP Professional
Definition
c.Windows Server 2003, Windows XP Professional, and Windows 98
Term

How many processors does the 64-bit version of Windows Server 2003 Datacenter Edition support?

 

a. 4

b. 8

c. 32

d. 64

Definition
d. 64
Term
Before you create a domain controller, a DNS server must be available on the network.
Definition
False
Term

Which of the following media has the largest data storage capacity?

 

a. Zip cartridge

b. CD

c. DVD

d. Jaz cartridge

Definition
c. DVD
Term

You are reconfiguring a SQL Server database application on a member server. The reconfigurations seem to go smoothly, but after you have finished, a user calls you to report that they are having an issue accessing certain records in the database. In which of the following places are you most likely to look for events related to this problem?

 

a. In the System log of Event Viewer

b. In the Database log of Event Viewer

c. In the Application log of Event Viewer

d. In the Security log of Event Viewer

Definition
c. In the Application log of Event Viewer
Term

What does the Server: Bytes Total/Sec Performance console counter reflect?

 

a. The amount of data that is being written to the page file every second

b. The amount of data that is being processed by the server service each second

 c. The amount of data sent and received by the server over all of its network interfaces

d. The amount of data being written to disk each second

Definition
c. The amount of data sent and received by the server over all of its network interfaces
Term

You are troubleshooting a problem with a Windows Server 2003 system whereby users cannot connect to the server. The server itself appears to be running, but you notice that there is no link light on the port of the hub into which the server is connected. As a result, you suspect that the network card in the server may have failed. Where would you look to see events related to the network card?

 

a. The Network log of Event Viewer

b. The System log of Event Viewer

c. The Application log of Event Viewer

d. The Security log of Event Viewer

Definition
b. The System log of Event Viewer
Term

You are working on a Windows Server 2003 system that has just been installed by another administrator. The administrator completed the installation but did not make any configuration changes following the installation. While checking the maximum log sizes in Event Viewer, you notice that the maximum size of the Security log is 16 MB. What does this tell you about the system?

 

a. That Auditing has been enabled

b. That the system is running either the DNS or DHCP service

c. That the system is a domain controller

d. That the system is not a domain controller

Definition
d. That the system is not a domain controller
Term

You are the network administrator for a property development company in Salt Lake City, UT. You have a single Windows Server 2003 system that is a domain controller, a DHCP and DNS server, a file and print server, and the company e-mail server. The server also hosts a document management system. One Wednesday afternoon, without warning, the server crashes. You reboot the server and it comes up without a problem. You examine the system performance through System Monitor, but everything seems in order. Two weeks later, the server crashes again. As before, you reboot the server and it comes up without any errors. Immediately after the restart, you use System Monitor and observe the following counters and values. Server Work Queues: Queue Length = 2 Memory: Page Faults/Sec = 2 Memory: Pages/Sec = 7 Memory: Available Bytes = 452,332,145 PhysicalDisk: % Disk Time = 34 Network Interface: Output Queue Length = 1 Two days later, you monitor the same counter statistics and note the following: Server Work Queues: Queue Length = 1 Memory: Page Faults/Sec = 3 Memory: Pages/Sec = 11 Memory: Available Bytes = 124,342,841 PhysicalDisk: % Disk Time = 43 Network Interface: Output Queue Length = 0 Which of the following strategies are you likely to take with the server?

 

a. Move an application off of the server and on to another server.

b. Examine memory usage for each application on the server.

c. Upgrade the network card from a 10 Mbps card to a 100 Mbps card.

d. Nothing. The counter statistics do not indicate any issues.

Definition
b. Examine memory usage for each application on the server.
Term

You are the network administrator for an electrical goods importer in Brandon, FL. You have a single Windows Server 2003 system that is a domain controller, a DHCP and DNS server, a file and print server, and the company e-mail server. The server also hosts the inventory database and sales order processing system. Early one morning, a user calls to report that the server appears to be running very slowly. Using System Monitor, you examine some of the performance counters for the server and make the following observations: Server Work Queues: Queue Length = 2 Memory: Page Faults/Sec = 9 Memory: Pages/Sec = 35 PhysicalDisk: % Disk Time = 5 Network Interface: Output Queue Length = 1 Which of the following are you most likely to do to cure the problem?

 

a. Replace the memory.

b. Install more memory.

c. Install a faster network interface.

d. Install a larger hard disk.

Definition
b. Install more memory.
Term
True or False? If a server that you are working on has a File Replication Service event log and a Directory Service event log, then it must be a domain controller.
Definition
True
Term

What utility do you use to mark specific Active Directory objects as authoritative?

 

a. ADutil.exe

b. Auth.exe

c. DSAuth.exe

d. Ntdsutil.exe

Definition
d. Ntdsutil.exe
Term

Which of the following backup types does not alter the archive bit on a newly created file?

 

a. Full

b. Incremental

c. Symmetrical

d. Differential

Definition
d. Differential
Term
True or False: In an authoritative restore of Active Directory, the objects in the Active Directory database are restored with updated sequence numbers that prevent them from being overwritten during the next replication pass.
Definition
True
Term

When you configure volume shadow copy, which of the following parameters cannot be configured?

 

 a. Which folders on the drive should be included in the volume shadow copy.

b. The drives that should be included in the volume shadow copy.

c. The maximum size of the storage area for shadowed files.

d. The frequency with which shadow copies should be made.

Definition
a. Which folders on the drive should be included in the volume shadow copy.
Term
True or False: To use SUS, clients must be running Windows Server 2003, Windows 2000, or Windows XP.
Definition
True
Term

A user calls you because he cannot log on to the system. After verifying his identity, you determine that he recently returned from vacation and is unsure of his password. You decide to reset the password. How do you do accomplish this?

 

 a. In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the existing password, and then enter a new password. Retype the new password in the Confirm Password box, and click OK.

 

b. In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the new password, retype the new password in the Confirm Password box, and click OK.

 

c. In the Active Directory Users And Computers MMC snap-in, select the user. On the Account properties page for the user, click Change Password and then enter a new password. Retype the password in the Confirm password box, and click OK.

 

 d. On the General properties page for the user, click Change Password and then enter a new password for the user. Retype the password in the Confirm password box, and click OK.

Definition
b. In the Active Directory Users And Computers MMC snap-in, select the user and then select Reset Password from the Action menu. Enter the new password, retype the new password in the Confirm Password box, and click OK.
Term
True or False: There is always less data included in an incremental backup than a full backup
Definition
False
Term

You have recently been employed as the network administrator for a commercial real estate company. The company is relatively small and has a highly mobile workforce. The company has two Windows Server 2003 systems and one Windows 2000 system. Active Directory is configured at a Windows 2000 mixed domain functional level. Many of the sales representatives spend a great deal of time on the road and use the dial-in features of Windows Server 2003. The others are based primarily in the office and rarely work remotely. Late one evening, a user who normally works from the office pages you to report that he can’t gain access to the system over his dial-up link. He is calling from a hotel, where he is staying while at a conference. He explains that he connected the previous night from home without any problems, but this is the first time he has tried to connect from anywhere other than his home. Since you started working with the company, you have not made any changes to the user’s account properties. Based on the information he has provided, which of the following could be the problem?

 

a. The user has Verify Caller ID enabled, and his home phone number is defined for that property.

 

b. The static routes for the user have been configured to only allow the user to connect from his home phone number.

 

c. The Always Callback To property on the user’s Dial-In page has been configured with the user’s home phone number.

 

d. The phone number that the user is calling from is not listed on the Telephones properties page.

Definition
c. The Always Callback To property on the user’s Dial-In page has been configured with the user’s home phone number.
Term

You are the network administrator for a healthcare provider in Denver, Colorado. The network comprises three Windows Server 2003 systems. You have recently installed a new database application that requires a service account to be created. This service account needs to impersonate a client to access computer resources on behalf of other user accounts. Which of the following approaches do you take to do this?

 

a. Create a new user account. Then, in the General properties tab for that user account, select the Account Is Trusted For Delegation check box.

 

b. Create a new user account. Then, in the Account properties tab for that user, select the Account Is Trusted For Delegation check box.

 

c. Create a new user account. Then, in the Advanced properties tab for that user, select the Account Is Trusted For Delegation check box.

 

d. Use an existing user account. In the Account properties tab for that user, select the Account Is Trusted for Delegation check box.

Definition
b. Create a new user account. Then, in the Account properties tab for that user, select the Account Is Trusted For Delegation check box.
Term
True or False: On a domain controller, members of the Power Users group can create user and group accounts and modify the users and groups they have created.
Definition
False
Term

Where do you change the scope?

 

a. In the Scopes properties tab of the group in Active Directory and Computers

 

b.In the General properties tab of the group in Active Directory and Computers

 

c.In the Members properties tab of the group in Active Directory and Computers

 

d.In the Type properties tab of the group in Active Directory and Computers

Definition

b.In the General properties tab of the group in Active Directory and Computers

 

Term

On a Windows Server 2003 system, where do you go to join the computer to a domain?

 

a. Control Panel, System, Computer Name

 

b.Control Panel, System, Network Identification

 

c.Control Panel, System, Advanced

 

d.Control Panel, System, General

Definition
a. Control Panel, System, Computer Name
Supporting users have an ad free experience!