What should you do?
Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user. What should you do?
What are two possible commands that you can run to achieve this goal?
You have a single Active Directory directory service forest named contoso.com. You create baseline security settings for a group of computers, and you store the settings in a database. You deploy the baseline security settings. You need to confirm that the security settings on one of the computers are applied correctly. What are two possible commands that you can run to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Which port should you open on the firewall?
Your companys DNS server runs Windows Server 2003. Client computers on a network segment that is protected by an internal firewall cannot resolve any host names. You need to ensure that DNS clients can resolve host names. Which port should you open on the firewall?
What should you do first?
Your company has a single Active Directory directory service domain. You are planning a security model for an application. You will use role-based security. You install a server that runs Windows Server 2003. You promote the server to be the first domain controller for a new child domain. You need to configure Authorization Manager to use an Active Directory store type to support role-based security.
What should you do first?
What should you use?
Servers in your company run Windows Server 2003 SP1. You plan to create role-based security templates for new deployments of Windows Server 2003 SP2. You need to compare the services that are configured on an existing server with a security template. What should you use?
What should you do in the custom security template?
Your company has an Active Directory directory service domain. The network environment includes servers that run Windows Server 2003 and servers that run Windows 2000 Server. You plan to create a custom security template that configures the NTLM protocol setting that is used by the domain controllers to the most secure setting possible. You need to ensure that all servers continue to communicate with the domain controllers.
What should you do in the custom security template?
What should you do?
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster.
What should you do?
Which two actions should you perform on the stand-alone servers?
Your company has an Active Directory directory service domain. You have two stand-alone servers that run Windows Server 2003, Standard Edition. You plan to create a server cluster. You need to create the server cluster with the stand-alone servers as cluster nodes.
Which two actions should you perform on the stand-alone servers? (Each correct answer presents part of the solution. Choose two.)
What should you do on DC1?
Your company has a single Active Directory directory service domain. The forest functional level is set to Windows Server 2003. A domain controller named DC1 runs Active DirectoryCintegrated DNS. You configure an external DNS server as a forwarder on DC1. You need to ensure that DC1 passes all DNS queries to the forwarder only. What should you do on DC1?
Which IP addressing scheme should you use?
Your company has a main office and two branch offices. All servers run Windows Server 2003. All client computers have dynamically assigned IP addresses. The main office has 50 servers and no client computers. The branch offices each have 200 client computers and no servers. You are planning a network infrastructure strategy. You need to minimize unused IP addresses. Which IP addressing scheme should you use?