Home      Articles      About Us      Contact Us      


 

SourceCode.

HimArticles.com

Free Source Code on ASP, Visual Basic,

C++, Java Script, Java

Our mission is to provide High Quality material

 

Source Code
Navigation

ASP

C++

Visual Basic

Java

Java Script


 

 
 

Additional Resources

Projects

Visual Basic
▪  C++
 

 

Certification Question Papers


Windows 2000 EXAM - 70-216
.........


Implementing and Administering a Microsoft Windows 2000 Network Infrastructure
 


1) You are creating a DHCP scope for your 192.168.1.32/28 subnet. The subnet consists of Windows 2000, Windows 98, and Windows 95 computers. You have two UNIX computers on this subnet that will be assigned the two highest available static IP addresses. The subnet's default gateway will be assigned the lowest available IP address on the subnet. Which scope should you create on your DHCP server?

A) 192.168.1.34 to 192.168.1.46
B) 192.168.1.34 to 192.168.1.44
C) 192.168.1.33 to 192.168.1.45
D) 192.168.1.34 to 192.168.1.61
E) 192.168.1.33 to 192.168.1.60

Answer : B

2) You install Network Monitor on a Windows 2000 Server to analyze ISO and TP4 communications to the Microsoft Exchange Server on your network. How should you configure Network Monitor? (Choose two)

A) change the Temporary Capture Directory.
B) Copy ISO.dll and TP4.dll to Netmon Subdirectory.
C) Copy ISO.DLL and TP4.DLL to the NetMon\Parsers subdirectory.
D) Modify the Parser.ini.
E) Modify the Netmon.ini.

Answer : C,D

3) You administer your company's Windows 2000 network. Your network consists of 5 Windows 2000 Server computers, 300 Windows 2000 Professional computers, and 10 UNIX servers. One of your Windows 2000 Server computers is your DNS server. The DNS zone is configured as an Active Directory integrated zone. The DNS zone is also configured to allow dynamic updates. Users report that although they can access the Windows 2000 computers by host name, they cannot access the UNIX servers by host name. What should you do?

A) Manually enter A (host) records for the UNIX servers in the zonedatabase 
B) Manually add the UNIX servers to the Windows 2000 domain 
C) On the DNS server, manually create a HOSTS file that contains therecords for the UNIX servers 
D) Configure a UNIX computer to be a DNS server in a secondary zone 

Answer : A

4) You are the administrator for a Windows 2000 network. Your internal DNS server is located behind a firewall. When you test your DNS server by using the Monitoring tab on the server's properties page, the DNS server passes the simple test but fails the recursive test. What should you do?

A) Run ipconfig /registerdns 
B) Delete the %systemroot%\system32\dns\cache.dns file 
C) Copy the %systemroot%\system32\dns\samples\cache.dns file to%systemroot%\dns, and overwrite the existing cache.dns file 
D) Create a forward lookup zone for the root zone. Name the forward lookupzone "." 

Answer : C

5) Your WAN network consists of ten internal subnets in two physical buildings connected by routers. An additional subnet is configured for Internet access. All routers on the network will be multihomed Windows 2000 Servers running Routing and Remote Access. You take the following actions: 1) Install RIP version 1. 2) Configure RIP to use all interfaces on all multihomed computers. 3) Enable RIP authentication by specifying a password on each interface. What results do these actions produce? (Choose all that apply)

A) Administrative overhead for routing tale configuration is minimized. 
B) Broadcast traffic for routing table configuration is minimized. 
C) Link redundancy within ten minutes is ensured in case of routerfailure. 
D) Ensure convergence times of less than one minute for all known routes. 
E) Internal routing information will never be exposed to external routers. 

Answer : A

6) Your Web server is configured to run a third party Web application for users on your network. Users complain that each time they try to connect to a secure Web page stored on the Web server, they receive the error message "Web page requested is not available". They have no problem connecting to FTP. You have verified that the Web service has started. What should you do to diagnose this problem?

A) Verify that port 443 is permitted in your TCP/IP filter. 
B) Verify that port 80 is permitted in your TCP/IP filter. 
C) Verify that port 21 and port 20 is permitted in your TCP/IP filter. 
D) Verify that the correct NTFS file permissions 

Answer : A

7) Your domain is in mixed mode. Routing and Remote Access is enabled for remote access on Srv1. The domain also has a Windows NT 4.0 member server computer named Srv2. Srv2 is running Remote Access Service (RAS). Users in the domain use Windows 2000 Professional computers to dial in to the network through Srv1 or Srv2. However, Srv2 is not able to validate remote access credentials of domain accounts. How should you configure the network to enable Srv2 to validate remote access domain users?

A) Add the Everyone group to the RRAS access group 
B) Configure srv2 as a DHCP relay agent 
C) Configure Srv1 to use MSChap for authentication and Srv2 to use ChapD: Add the Everyone group to the Pre-Windows 2000 Compatible Access group. 

Answer : C

8) You are the administrator of your domain. You have client computers evenly distributed across five sites. Atlanta.xco.com recently upgraded its two DNS servers that service the subdomain. You suspect the upgrade has resulted in an incorrect configuration of your zone delegation. What should you do to verify proper zone delegations?

A) Use System Monitor to confirm that the counters for the DNS zone transfer failure are zero. 
B) Use System Monitor to confirm that the counters for the DNS recursive query are zero. 
C) Run the nslookup -querytype=ns atlanta.xco.com command with the server option set to query the atalanta.xco.com server. Ping the records displayed in the output of the nslookup command. 
D) Run the nslookup -ls -d atlanta.xco.com command. Ping the records displayed in the output of the nslookup command. 

Answer : C

9) Your domain has a Windows 2000 member server computer named London and a DHCP server. Routing and Remote Access is enabled for remote access on London. The domain is in native mode. Users in the domain dial in to the network by using Windows 2000 Professional portable computers. Dial-up connection configuration for the Windows 2000 Professional computers is set to obtain an IP address automatically. You do not want to change this configuration. You want to designate a fixed IP address for each of the users. All users should receive a different fixed IP address when a dial-up connection is made. How should you configure the network to accomplish this goal?

A) Configure each laptop with a specific static IP address 
B) Create a user class for the laptops and exclude these IP addresses fromthe DHCP scope 
C) In Active Directory Users and Computers, assign a static IP address foreach user 
D) Create a separate subnet for the laptops and configure DHCP to issue IPaddresses for this subnet only to the laptops 

Answer : C

10) To allow Internet access through a dial-up connection to Server A, you install NAT routing protocol. All computers in your network use Automatic Private IP addressing. There is no DHCP server in the network. Server A is configured as below: LAN interface has an IP address of 10.65.3.1 and a subnet mask of 255.255.255.0. NAT automatically assigns IP addresses of 10.65.3.2 through 10.65.3.60 to computers on the private interface. NAT uses a demand-dial interface named Dial ISP to connect to the ISP. The demand-dial interface uses an address pool of 207.46.179.33 through 207.46.179.36. The routing table has a default static route for the public interface. What configuration should you use for the static route for the public interface?

A) Interface: Local Network ConnectionDestination: 207.46.179.44 Network Mask: 255.255.255.255 Gateway: 0.0.0.0 
B) Interface: Local Network ConnectionDestination: 10.65.3.0 Network Mask: 255.255.255.0 Gateway: 10.65.3.1 
C) Interface: Dial ISPDestination: 0.0.0.0 Network Mask: 0.0.0.0 Gateway: None 
D) Interface: Local Network ConnectionDestination: 207.46.174.32 Network Mask: 255.255.255.240 Gateway: 207.46.179.32 

Answer: C

11) Your network has 1,900 hosts, and requires Internet connectivity. Your network is not routed, except for the connection to the Internet. You have been assigned the following eight network addresses from your ISP: (192.24.32.0/24, 192.24.33.0/24, 192.24.34.0/24, 192.30.35.0/24, 192.30.36.0/24, 192.30.37.0/24, 192.30.38.0/24, 192.30.39.0/24). Your goal is to minimize the complexity of the routing tables, while maintaining Internet connectivity for all hosts. What subnet mask should you use?

A) 255.255.252.0 
B) 255.255.248.0 
C) 255.255.255.248 
D) 255.255.240.0 

Answer : B

12) You are the administrator of your company's network You are configuring your users' portable computers to allow users to connect to the company network by using Routing and Remote Access. You test the portable computers on the LAN and verify that they can successfully connect to resources on the company network by name. When you test the connection through Remote Access, all of the portable computers can successfully connect, but they cannot access files on computers on different segments by using the computer name. What should you do to resolve this problem?

A) Set the authentication method to Allow remote systems to connectwithout authentication 
B) Enable the computer account for each portable computer 
C) Change the computer name on each portable computer 
D) Install the DHCP Relay Agent on the Remote Access server 

Answer : D

13) You are configuring a Windows 2000 network for dial-up access. Your company issues smart cards to all users who have dial-up access. What should you do to configure your Routing and Remote Access server? (Choose two)

A) Configure the use of Mutual Authentication. 
B) Configure the RRAS server to use SLIP for dial-in 
C) Select the Extensible Authentication Protocol (EAP) check box 
D) Install a smart card logon certificate on the RRAS. 
E) Configure the RRAS server to use the PAP protocol 
F) Configure the RRAS server to use the IPSec protocol 

Answer : C,D

14) You install and configure DHCP Server service on a Windows 2000 Server to automate TCP/IP client configuration. You create a scope that contains the range of valid IP addresses. You create an exclusion range, and address reservations for your TCP/IP network printers so they will always receive the same address. None of your printers are receiving addresses from the DHCP server. Client computers are not experiencing problems. What should you do?

A) Remove the address reservation for the printers 
B) Remove the exclusion range for the addresses that are in use by theprinters. 
C) Disable address conflict detection feature of the dhcp server service 
D) Enable address conflict detection feature of the dhcp server service 

Answer : B

15) You are configuring a Windows 2000 network for dial-up access. Your company issues smart cards to all users who have dial-up access. What should you do to configure your Routing and Remote Access server? (Choose two)

A) Configure the use of Mutual Authentication. 
B) Configure the RRAS server to use SLIP for dial-in 
C) Select the Extensible Authentication Protocol (EAP) check box 
D) Install a smart card logon certificate on the RRAS. 
E) Configure the RRAS server to use the PAP protocol 
F) Configure the RRAS server to use the IPSec protocol 

Answer : C,D

16) Your network consists of a Windows 2000 Server (Net_Serv) and several Windows 2000 Professional computers. Your server has a dial-up connection to the Internet. Your Windows 2000 Professional computers are configured to use APIPA. There is no DHCP server on the network. You want to implement Internet Connection Sharing to allow the Windows 2000 Professional computers to access the Internet through the dial up connection on Net_Serv. How should you configure the server? (Choose all that apply)

A) Enable Internet Connection sharing Lan interface of Net_Serv 
B) Enable Internet Connection Sharing on the dial-up connection of theserver. 
C) Configure Net_Serv to use a static IP address of 10.1.1.1 for the Laninterface 
D) Configure the server to use APIPA for the LAN interface. 
E) Install and configure the DHCP server service on Net_Serv. 

Answer :B,D

17) You are planning to migrate your 100 network computers from IPX/SPX to TCP/IP and establish connectivity with the Internet. Your ISP assigns the address 192.168.16.0/24 to your network. You require 10 subnets with at least 10 hosts per subnet. What subnet mask should you use?

A) 255.255.255.224 
B) 255.255.255.192 
C) 255.255.255.240 
D) 255.255.255.248 

Answer : C

18) Your network has two Windows 2000-based WINS servers. How should you configure the network to automatically backup the WINS database of both WINS servers?

A) Use the backup command and backup the Wins.db database 
B) In the WINS console on both WINS servers configure the Generalproperties of the WINS server to specify a default backup path. 
C) Backup the sysvol folder on both servers 
D) Use the file replication service and replicate the WINS database to asecure location 

Answer :   B

19) You have seven Windows 2000-based WINS servers in separate locations. How should you configure these servers to have a convergence time of less than 60 minutes. What should you do?

A) Create a display of the seven WINS servers in a circular arrangementConfigure each WINS server as a push/pull partner with the two WINS servers beside it in the circle .Use a replication interval of 25 minutes 
B) Designate one of the WINS servers as the central WINS server. Configurethe other WINS servers as push/pull partners with the central server. Configure the central WINS server as push/pull partner with the other WINS servers. Use a replication interval of 25 minutes. 
C) Configure each WINS server to automatically configure the other WINSservers as its replication partners Use the default interval time for automatic partners configuration. 
D) Configure each WINS server to use a renew interval of 50 minutes . Usethe default value for the verification interval 

Answer : B

20) You are the administrator of your company's network. You want to configure remote administration for your network. You install Routing and Remote Accessona Windows 2000 domain controller. You take the following actions: 1) Set the level or levels of encryption to No Encryption and Basic. 2) Add Domain Admins to the Windows Group Policy condition. 3) Configure the rest of the remote access policy as shown in the exhibit. 4) Configure the remote access policy 'Disconnect if idle for 60 minutes'. 5) Configure the remote access policy 'Restrict maximum session time 20 minutes'. 6)Configure the remote access policy Restrict access to the following days and times to-- Sun 07:00-16:00, Mon 07:00-16:00, Tue 07:00-16:00, Wed 07:00-16:00, Thu 07:00-16:00, Fri 07:00-16:00, Sat 07:00-16:00. What result or results do these actions produce? (Choose all that apply)

A) Only administrators have dial-up access 
B) Dial-up connections are accepted only between 4:00 PM and 7:00 A.M 
C) Connections are forcibly disconnected after 20 minutes of inactivity 
D) All connections encrypt all communications 
E) Connections are limited to 60 minutes 

Answer : A

21) You are planning to migrate your 100 network computers from IPX to TCP/IP and connect with the Internet. Your ISP assigns the address 192.168.16.9/24 to your network. You require 10 subnets with at least 10 hosts per subnet. What subnet mask should you use?

A) 255.255.255.224 
B) 255.255.255.192 
C) 255.255.255.240 
D) 255.255.255.248 

Answer : C

22) You are the administrator of a Windows 2000 network that consists of a single domain. Because no employee in your company should have the ability to encrypt files by using Encrypting File System (EFS), you need to remove this ability from all users in the domain What should you do to accomplish this goal? (Choose all that apply)

A) From the Run command, start Secpolmsc 
B) Go to the Encrypted Data Recovery Agents container and delete thecertificate you find. From the Active Directory Users and Computers console, access the Group Policy Editor and edit the domain policy. 
C) Go to the Public Key Policies container and delete the Encrypted DataRecovery Agents policy. From the Active Directory Users and Computers console, access the Group Policy Editor and edit the domain policy. 
D) From the Active Directory Users and computers MMC console select theEncrypted Data Recovery Agents container and delete the certificate you find. 
E) From the Active Directory Users and computers MMC console access theGroup Policy Editor and edit the domain policy, select the Encrypted Data Recovery Agents container and initialize the empty policy. 
F) From the Active Directory Users and Computers console, select thePublic Key Policies container and initialize the empty policy. 

Answer : D, E

23) Your main office and two branch offices are connected by dedicated T1 lines. Two additional branch offices use 128-Kbps ISDN lines and Routing and Remote Access over the Internet to connect to the company's network. You are designing your DNS name resolution environment, and want to accomplish the following goals: 1) DNS Name resolution traffic across the WAN should be minimized. 2) DNS Replication traffic across the WAN should be minimized. 3) DNS Replication traffic across the public WAN should be secure. 4) Name resolution performance for client computers should be optimized. You take the following actions: 1) Install the DNS Server service on one server at each office. 2) Create a standard primary zone at the main office. 3) Create a standard secondary zone at the four other offices. 4) Configure client computers to query their local DNS server. What results do these actions produce?

A) DNS Name resolution traffic across the WAN should be minimized. 
B) DNS Replication traffic across the WAN should be minimized. 
C) DNS Replication traffic across the public WAN should be secure. 
D) Name resolution performance for client computers should be optimized. 

Answer : A, D

24) You are a branch office network administrator. You are connected to the company network via a Windows 2000 Routing and Remote Access two-way demand-dial connection over ISDN. Sensitive company data, e-mail, and application traffic is sent across the connection. You take the following actions: 1) Install a Certificate Services server at the main office. 2) Enable EAP-TLS as the authentication protocol on both Routing and Remote Access servers. 3) Enable RIP version 2 on the demand-dial interfaces. Which results (goals) do these actions produce? (Choose all that apply)

A) All data should be secure. 
B) Rogue routers will be prevented from exchanging router information witheither router. 
C) Both routers will be able to validate each other. 
D) Both routers will maintain up-to-date routing tables. 
E) Traffic over the link during peak business hours will be minimized. 

Answer : A, D

25) You are a branch office network administrator. You are connected to the company network via a Windows 2000 Routing and Remote Access two-way demand-dial connection over ISDN. Sensitive company data, e-mail, and application traffic is sent across the connection. You want to accomplish the following goals: All data should be secure. Rogue routers will be prevented from exchanging router information with either router. Both routers will be able to validate each other. Both routers will maintain up-to-date routing tables. Traffic over the link during peak business hours will be minimized. You take the following actions: Enable MS-CHAP as the authentication protocol on both Routing and Remote Access servers. Enable OSPF on the demand-dial interfaces. Set the 'Require Encryption' option on both Routing and Remote Access servers. Which results do these actions produce? (Choose all that apply)

A) All data transmitted over the connection is secure. 
B) Prevent Rogue routers from exchanging router information with eitherrouter. 
C) Both routers will be able to validate each other. 
D) Both routers maintain up-to-date routing tables. 
E) Traffic over the link during peak business hours will be minimized.

Answer : A,D

 

 ? Copyright 2006  - SourceCode.HimArticles.com  -  All rights reserved SourceCode