70-293 testing bible(17 to 32) for consumer: Mar 2016 Edition

70-293 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

https://www.exambible.com/70-293-exam/

Product Description:
Exam Number/Code: 70-293
Exam name: Planning and Maintaining a Windows Server 2003 Network Infrastructure
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Free Certification Real IT 70-293 Exam pdf Collection

Question No. 17

Your company has an Active Directory directory service domain. You have a four-node failover cluster that is a member of the domain. You perform a quarterly Automated System Recovery (ASR) backup of the cluster, and you perform daily backups by using Windows Backup. A cluster disk fails. You need to restore the cluster disk signature to the failed cluster disk. 

What should you do? 

A. Run the cluster node command. 

B. Use the Cluster Administratortool. 

C. Power down the node with the failed cluster disk, and then use the ASR functionality. 

D. Power down all cluster nodes other than the node with the failed cluster disk, and then use the ASR functionality. 

Answer:


Question No. 18

Your company has multiple Active Directory directory service domain s. All servers in your environment run Windows Server 2003. All domain c ontrollers run Active Directory# integrated DNS. A member server hosts a database. You migrate the database server to a new internal network segment and correctly configure its local IP settings. Users report that they cannot use the database server. When you ping the database server# s fully qualified domain name (FQDN), the DNS client reports an incorrect IP address. You need to ensure that the DNS client reports the correct IP address. 

What should you do? 

A. Restart the database server. 

B. Restart the client computers of all database users. 

C. Run the ipconfig /flushdns command on the database server. 

D. Set the minimum default time-to-live (TTL) for the domain to 6 hours. 

Answer:


Question No. 19

All servers in your environment run Windows Server 2003. You need to enable and configure DNS Security Extensions (DNSSEC) support on a DNS server. 

What should you do on the DNS server? 

A. Edit the registry. 

B. Run the netsh command. 

C. Run the dnscmd command. 

D. Configure settings in the DNS management console. 

Answer:


Question No. 20

You are a network administrator for Woodgrove Bank. All servers run Windows Server 2003. The company uses WINS and DNS for name resolution. The LMHosts and Hosts files are not used. A user on a server named Server2 reports that when she runs a script to transfer files to a server named Server5, she receives the following error messag* "Unknown host Server5." You use Server2 to troubleshoot the problem. The results of your troubleshooting are shown in the exhibit. (Click the Exhibit button.) You need to allow the user on Server2 to use the script to transfer files to Server5. What should you do? 

A. On Server5, run the ipconfig command with the /registerdns option. 

B. Re-register Server5 with WINS. 

C. On Server2, run the ipconfig command with the /flushdns option. 

D. On Server2, purge and reload the remote NetBIOS cache name table. 

Answer:


Question No. 21

You are a network administrator for Company. You install Windows Server 2003 on a server named CompanyA. You install a production application on CompanyA. You create a shared folder named ProdData on CompanyA to support the needs of the production application. All critical data files for the application are stored in the ProdData shared folder on CompanyA. You install Windows Server 2003 in another server named CompanyB. You create a shared folder on CompanyB named ProdDataBackup. 

The production application keeps many data files open. All the files in the ProdData folder must be backed up during each shift change. You are not allowed to stop and restart the production application without special approval. You need to provide a backup solution for the critical files in the ProdData on CompanyA. Your solution must not affect the production application. What should you do? 

A. On CompnayA, use the Backup or Restore Wizard to select the ProdData folder. 

Type \\CompnayB\ProdDataBackUp for the backup destination, and the advanced backup options 

to select the Disable volume shadow copy check box. 


B. On CompnayB, use the Backup or Restore Wizard to select the ProdData folder. 

Type \\CompnayA\ProdData for the backup destination, and use the advanced backup options to 

select the Disable volume shadow copy check box. 


C. On CompnayA, use the Backup or Restore Wizard to select the ProdData folder. 

Type \\CompnayB\ProdDataBackUp for the backup destination. 


D. On CompnayA, use the Backup or Restore Wizard to select the ProdData folder. 

Type \\CompnayA\ProdData for the backup destination. 


Answer:


Question No. 22

You are a network administrator for your company. You install Windows Server 2003, Enterprise Edition on two servers named Server1 and Server2. You configure Server1 and Server2 as a two-node server cluster. Server1 and Server2 are connected to a shared fiber-attached array. You configure the server cluster for file sharing. You configure Server1 as the preferred owner of the file sharing resources. You perform the following backups by using the Backup or Restore Wizard. 

Tuesday 

Wednesday 

Server1 

Normal backup including 

system state 

Incremental backup and 

Automated System Recovery (ASR) backup 

Server2 

Normal backup including 

system state 

Incremental backup and ASR 

backup 

On Thursday morning, Server2 experiences a hard disk failure. The failed disk contains only the operating system for Server2. You evict Server2 from the server cluster. You need to recover Server2 and restore it to the cluster. You need to minimize data loss and recovery time. What should you do? 

A. Restore Server2 by using ASR, and add Server2 to the server cluster. 

B. Restore the quorum disk signature and data from the Tuesday backup of Server1, and add Server2 to the server cluster. 

C. Restore the Tuesday normal backup and the Wednesday incremental backup of Server2, and add Server2 to the server cluster. 

D. Restore the Tuesday backup of Server2, and add Server2 to the server cluster. 

Answer:


Question No. 23

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You are designing a public key infrastructure (PKI) that uses Certificate Services. You need to specify a certification authority (CA) that will issue certificates automatically. 

Which CA should you specify for your PKI? 

A. an Enterprise root CA 

B. a Stand-alone root CA 

C. an Enterprise issuing CA 

D. a Stand-alone issuing CA 

Answer:


Question No. 24

Your company has an Active Directory directory service domain. All servers in your environment run Windows Server 2003 and are members of the domain. You apply an IPSec policy to a Group Policy container that contains all servers. One server does not appear to have the policy applied. You need to identify which IPSec policies are being applied to the server. 

Which tool should you use? 

A. Resultant Set of Policy (RSoP) in logging mode 

B. Resultant Set of Policy (RSoP) in planning mode 

C. Ipsecpol 

D. Ipseccmd 

Answer:


Question No. 25

All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. 

You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name. 

What should you do? 

A. Create an LMHOSTS file on Server1. 

B. Create a static WINS entry for Server1. 

C. Configure Server1 to use Broadcast (B-node) mode. 

D. Configure Server1 to use Peer-to-Peer (P-node) mode. 

Answer:


Question No. 26

Your network consists of two subnets named SubnetA and SubnetB. SubnetA contains a server that runs Windows Server 2003 with the WINS Server role installed. It also contains client computers that run Windows XP and use WINS for name resolution. SubnetB contains client computers that run third-party operating systems and use broadcasts for name resolution. Client computers on SubnetB cannot resolve the NetBIOS names of any computers on SubnetA. 

You need to provide NetBIOS name resolution for all client computers. 

What should you do? 

A. Configure a WINS proxy on SubnetA. 

B. Configure a WINS proxy on SubnetB. 

C. Run the nbtstat -RR command on all computers on SubnetA. 

D. Configure a WINS server on SubnetB. Configure push/pull replication between the WINS servers. 

Answer:


Question No. 27

You are a network administrator for your company. The network consists of a single Active Directory domain. The network contains 80 Web servers that run Windows 2000 Server. The IIS Lockdown Wizard is run on all Web servers as they are deployed. Your company is planning to upgrade its Web servers to Windows Server 2003. You move all Web servers into an organizational unit (OU) named Web Servers. You are planning a baseline security configuration for the Web servers. The company's written security policy states that all unnecessary services must be disabled on servers. Testing shows that the server upgrade process leaves the following unnecessary services enable* SMTP Telnet 

Your plan for the baseline security configuration for Web servers must comply with the written security policy. You need to ensure that unnecessary services are always disabled on the Web servers. 

What should you do? 

A. Create a Group Policy object (GPO) and import the Hisecws.inf security template. Link the GPO to the Web Servers OU. 

B. Create a Group Policy object (GPO) to apply a startup script to stop the unnecessary services. Link the GPO to the Web Servers OU. 

C. Create a Group Policy object (GPO) to apply a logon script that disables the unnecessary services. Link the GPO to the Web Servers OU. 

D. Create a Group Policy object (GPO) to set the startup type of the unnecessary services to Disabled. Link the GPO to the Web Servers OU. 

Answer:


Question No. 28

Your company has an Active Directory directory service domain. All servers in your environment run Windows Server 2003. You use dynamically assigned IP addresses. You set Internet proxy settings by using Web Proxy Automatic Discovery (WPAD). After a new Group Policy is applied, multiple client computers cannot access the Internet. You verify that physical network connectivity for the client computers is functional and that the client computers can communicate with the DHCP server, the WPAD server, and the default gateway. 


On each affected client computer, the Internet options are configured as shown in the following graphic. You need to restore Internet connectivity on the affected client computers. What should you do? 

A. Select the Automatically detect settings check box. 

B. Select the Use automatic configuration script check box. 

C. Clear the Bypass proxy server for local addresses check box. 

D. Run the ipconfig /release and ipconfig /renew commands. 

Answer:


Question No. 29

Your company has a single Active Directory directory service domain. All servers run Windows Server 2003. You remotely administer all servers from client computers that use Remote Desktop Client 5.2. All remote administration connections that are made to servers must be authenticated with Kerberos and must use Transport Layer Security (TLS). You need to design a remote administration network authentication methodology. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On each server enable Remote Desktop, and configure the RDP security layer to Negotiate. 

B. On each server enable Remote Desktop, configure the RDP encryption level to FIPS, and configure the RDP security layer to SSL. 

C. Install user certificates on each server and on each client computer. 

D. Install computer certificates on each server and on each client computer. 

Answer: AD 


Question No. 30

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. All domain controllers run Active DirectoryCintegrated DNS. You create several static host (A) resource records. 

You need to verify that the DNS server is sending the correct host records to all client computers. 

Which command-line tool should you use? 

A. netsh 

B. tracert 

C. ntdsutil 

D. nslookup 

Answer:


Question No. 31

You are a network administrator for Company. You administer a file server named CompanySrvC. The file server stores all data files on a logical volume. You perform a full normal backup of the file server every Saturday. You perform a differential backup of the file server each day on Sunday through Friday. You perform a copy backup of the file server every Wednesday after the differential backup is complete. The copy backup is sent to an off-site facility that requires two hours for tape delivery. 

The logical volume fails on Friday morning. 

You need to restore the data that was stored on the failed volume. You need to minimize the loss of data and the time required to perform the restoration. What should you do? 

A. Restore the tapes from the copy backup that was performed on Wednesday and from the differential backup that was performed on Thursday. 

B. Restore the tapes from the normal backup that was performed on Saturday and from the differential backup that was performed on Thursday. 

C. Restore the tapes from the normal backup that was performed on Saturday and from the differential backups that were performed on Monday through Thursday 

D. Restore the tapes from the normal backup that was performed on Saturday, from the was performed on Thursday . 

Answer:


Question No. 32

You are the network administrator for Company. The network consists of a single Active Directory domain named Company.com. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named CompanyA. 

You are planning a public key infrastructure (PKI) for the company. You want to deploy an enterprise certification authority (CA) on CompanyA. 

You create a new global security group named Exam Approvers. You install an enterprise CA and configure the CA to issue Key Recovery Agent certificates. 

The company’s written security policy states that issuance of a Key Recovery Agent certificate requires approval from a member of the Exam Approvers group. All other certificates must be issued automatically. 

You need to ensure that members of the Exam Approvers group can approve pending enrolment requests for a Key Recovery Agent certificate. What should you? 

A. Assign the Exam Approvers group the Allow – Enroll permissions for the Key Recovery Agent. 

B. Assign the Exam Approvers group the Allow – Issue and Manage Certificates permission for the CA. 

C. For all certificate managers, add the Exam Approvers group to the list of managed subjects. 

D. Add the Exam Approvers group to the existing Exam Publisher group in the domain. 

E. Assign the Exam Approvers group the Allow – Full Control permission for the Certificate Templates container in the Active Directory configuration naming context. 

Answer: