PrepAway - Latest Free Exam Questions & Answers

Category: 70-293 (v.2)

Exam 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (update 11 March, 2013)

What is the most like cause of the issue?

Mark works as a Network Administrator for ABC.com. The company has a Windows 2003 single
domain-based Active Directory network. The network has five Windows 2003 member servers and
200 Windows XP Professional client computers. One of the member servers named VPNS is
configured as a VPN server. The VPNS internal interface is on a 192.168.0.1/24 private network.
The VPN server’s IP address is 192.168.0.25 with a subnet mask 255.255.255.0.

Mark installs a new Windows 2003 server named FSERVER with default settings. FSERVER is
configured as a file server. The file server’s IP address is 192.168.0.28 with a subnet mask
255.255.255.0. The VPN users on the network complain that they are unable to access files stored
on FSERVER. Mark checks that the file and folder permissions on FSERVER are correctly
assigned. Mark is also able to ping FSERVER by using the IP address from VPNS. However, he is
unable to ping VPNS from FSERVER. What is the most like cause of the issue?

What will happen after taking the required steps?

You work as a Network Administrator for ABC.com. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows
Server 2003. An application named Accounts is installed on the network. The Accounts application
uses a shared folder named AccFolder to keep all its data. The AccFolder folder is placed on a file
server named uCFileServer. All users in the network use the application to update the accounts
information of various clients of the company. The application opens various data files to work
upon.
You are required to accomplish the following tasks:
All files in the AccFolder folder should be backed up automatically twice daily.
The backup process should take a backup of all the open files in the folder.
In order to accomplish the tasks, you take the following steps:
Configure the Backup and Restore Wizard to take a backup of AccFolder.
Unselect the Disable volume shadow copy check box in the Backup and Restore Wizard.
Set the schedule of the Backup and Restore Wizard to take a backup every 12 hours through the
Advanced Schedule Options.
What will happen after taking the required steps?

Which of the required tasks will be accomplished by taking these steps?

You work as a Network Administrator for ABC.com. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows
Server 2003. An intranet-based Web site is required to be installed on the network. Two servers
are available for installing the application. You are required to accomplish the following tasks:
The Web site should be available all the time for the clients.
Both servers should be capable of fulfilling the clients’ requests at a time.
You take the following steps:
Create a two-node server cluster.
Configure one server as an active server and the other as a passive server.
Which of the required tasks will be accomplished by taking these steps?

What will this plan accomplish?

You work as a Network Administrator for ABC.com. The company has a Windows Active
Directorybased single domain single forest network. The functional level of the forest is Windows
Server 2003. All client computers in the network run Windows XP Professional. You have been
assigned the task to provide a plan for keeping the operating systems up-to-date with the latest
critical security patches and operating system fixes. The written policy of the company dictates the
following points:
All critical updates must be tested before deploying them to the computers on the network.
All computers must be up-to-date with the latest fixes and security patches from Microsoft as
soon as possible.
You provide the following plan to accomplish the task:

Configure two servers to run Software Update Services (SUS) and name them TestServer and
FinalServer.
Designate five computers on the network to test updates. Configure an Automatic Updates policy
for these computers to point to TestServer to download updates.
For the rest of the computers, configure another Automatic Updates policy to point to FinalServer
to download updates.
Configure FinalServer to point to TestServer to download updates.
On TestServer, set up a synchronization schedule to check the Windows Update server for
updates everyday at 5:30 pm.
At 5:45 pm, deploy the updates from TestServer onto the test computers.
Approve the updates on TestServer after the successful deployment of the updates.
Schedule FinalServer to query for the updates daily at 7:30 pm.
Configure all computers, except the test computers, to synchronize automatically with the
FinalServer daily at 8:30 am.
What will this plan accomplish?

Which action should you include in your plan?

You are the network administrator for your company’ single Active Directory domain. All network
servers run Windows Server 2003. All client computers run Windows XP Professional.
You are responsible for backing up and restoring all data on 10 file servers. Each file server has
two hard disks: Disk0 and Disk1. The system volume is contained on Disk0. User files and data
are stored on Disk1.
You must define a plan that allows each server to be completely restored in the event that you
have problems with a file, driver, or service. This plan must include what you should do after you
have tried and failed at using the Last Known Good Configuration and Safe Mode. Your plan
should include recovery using the least amount of administrative effort and with minimal data loss.
This plan must apply to all servers for preventive measures.

Which action should you include in your plan?

Which of the following should you do?

You administer your company’s network. The network consists of a single Active Directory
domain. All servers run Windows Server 2003. The network contains a two-node server cluster.
The company’s security expert informs you that the password on the domain user account that is
used for the Cluster service has been compromised and must be changed immediately. Your
actions should cause minimal or no disruption of the services provided by the cluster because the
cluster is running a mission-critical application.
Which of the following should you do?

What else should you do?

You are the network administrator for your company. The network consists of a single Active
Directory domain. Your network contains a DMZ. It also contains a DNS server named DNSExt,
three Web servers, and an e-mail server. These servers all run the Windows Server 2003
operating system.
The internal network contains one DNS server, which contains an Active Directory-Integrated
zone. The internal network also contains four domain controllers, five file and print servers, and a
WINS server. All servers on the internal network run the Windows Server 2003 operating system.
Five subnets exist on the internal network, each containing either a DHCP server or a DHCP

Relay Agent.
The network includes 4,000 client computers. These computers run either the Windows 2000
Professional operating system or the Windows XP Professional operating system. All clients
receive their IP addressing through the DHCP server, including their DNS and WINS addressing.
For better performance, you add a DNS server named DNS2 to Subnet5. You configure the DHCP
server, DNS server, and firewall to allow for the new DNS server. This server should be configured
to allow for DNS resolution for internal resources. The external DNS server should resolve all host
names for Internet access.
You configured a forward lookup zone for the internal network on DNS2. What else should you
do?

which goal(s) are met?

You are the network administrator for ABC.com. The network consists of a single Active Directory
domain named thorntonlibraries.com. Each server on the network runs Windows Server 2003.
Certificate Services is deployed to support the company’s PKI infrastructure. The functional level
of the domain is Windows Server 2003. Each client computer runs the Windows XP Professional
operating system.
All desktop computers used by library employees are in locations that are accessible to library
visitors. The network also contains five kiosks that are used by library partners and visitors. Library
partners access shared files on the local network and can also access the Internet from the kiosks.
Library visitors use the kiosks only to perform searches and are not allowed the same level of
network access as the library partners. All library partners have been assigned domain user
accounts to provide specialized network access.
The library is implementing a new security policy to protect the library network. These goals must
be met:
Each employee must authenticate to their desktop computer using a smart card.
Each partner must authenticate to the kiosk computers using a smart card.
When an employee removes his smart card from his desktop computer, he must be allowed to

maintain a protected session.
When a partner removes their smart card from a kiosk, the user account is automatically logged
off.
You perform these actions:
Configure all employee and partner user accounts to require smart card authentication.
Create an organizational unit (OU) named Computer_OU and place all desktop computer
accounts in this OU. Create a new Group Policy Object (GPO) named Employee Smart Cards with
the Interactive Logon: Smart card removal behavior and enable the Force Logoff option. Link this
GPO to Computer_OU.
Create an OU named Partner_Comps_OU and place all kiosk computer accounts in this OU.
Create a new GPO named Smart Cards and configure this GPO with the Interactive Logon: Smart
card removal behavior and enable the Lock Workstation option. Link this GPO to the Partner_OU.
With these actions, which goal(s) are met? (Choose all that apply.)

What should you do?

You are the network administrator for your company’s network. The network consists of two Active
Directory domains: lmiweb.com and hr.lmiweb.com. The lmiweb.com domain supports most of the
company’s user accounts and resources. The hr.lmiweb.com domain contains the user accounts
and resources for the company’s human resources department.
The company has deployed an extensive 802.11b wireless network. Access points (APs) have
been deployed throughout the company to provide users in all departments with wireless
connectivity and serve as bridges to the wired LAN. A total of 325 users, including all members of
hr.lmiweb.com, have been issued laptops with 802.11bcompliant network adapters. No other
computers have wireless connectivity. All wireless LANs have Wired Equivalent Privacy (WEP)
enabled to secure these communications.
Human resources users work throughout the company providing employee training and
informational seminars. These users require access to the wireless LAN in all company locations.
You must ensure that all human resources data is as secure as possible as it is transmitted across
the wireless LAN. Only users with accounts in only specific users/computers groups should be
able to access the human resources division’s wireless LAN. In addition, users without accounts in
this domain should not be able to view or select the LAN from their list of available networks.

What should you do? (Choose three. Each correct answer presents part of the solution.)

What should you do?

You are the network administrator for your company. The network consists of a single Active
Directory domain with five domain controllers that run Windows Server 2003, Enterprise Edition.
You are updating the public key infrastructure (PKI) for your company. Issuing Certification
Authorities (CAs) have been provided certificates with a validity period of five years. Certificates
are issued to enable network users to encrypt files on their computers. Basic EFS certificates have
been issued and have been configured with the default validity period. You want to configure all
new EFS certificates so that they are valid for up to three years.
What should you do? (Choose all that apply. Each correct answer presents part of the solution.)


Page 6 of 10« First...45678...Last »