PrepAway - Latest Free Exam Questions & Answers

Category: 70-293 (v.2)

Exam 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (update 11 March, 2013)

What is the proper process for recovering from this problem?

You are working on an existing server. The NIC manufacturer has notified you of an updated
driver for your card that will greatly improve performance. You download and install the new driver.
Before you reboot the system, you perform an ASR backup. When you reboot the system, it
reaches the graphical portion of the boot process and presents a STOP message. What is the
proper process for recovering from this problem?

What is the most likely cause of the problem?

You are a consultant. You have been called in to troubleshoot a malfunctioning NLB cluster that is
supposed to serve Web pages with IIS. The cluster contains four hosts, but only one host at a time
will successfully form the cluster. Clients appear to have no problems connecting to any of the
single-host cluster configurations. What is the most likely cause of the problem?

What are the authentication methods that can be used with IPSec?

You have been hired as a consultant to help deploy IPSec for the network of a mediumsize
manufacturing firm that is developing a number of new products and must share sensitive data
about its products over the network. As part of the planning process, you must determine the best
authentication method to use with IPSec. What are the authentication methods that can be used
with IPSec? (Select all that apply.)

What is the problem?

You want to use the RSoP tool in logging mode to build some reports on the existing policy
settings of one of your client computers. You have used RSoP before in planning mode, but never
in logging mode. You open the RSoP Wizard from the Active Directory Users and Computers
console, as youve done before, but you notice that there is no mechanism for selecting the mode,
and only planning mode seems to be available. What is the problem?

Which of the following are contained in the security descriptor for an object?

You have recently hired a new junior administrator to assist you in running the network for a
medium-sized manufacturing company. You are explaining to your new assistant that AD objects
are assigned security descriptors to allow you to implement access control. You tell your assistant
that the security descriptor contains several different components. Which of the following are
contained in the security descriptor for an object? (Select all that apply.)


Page 9 of 10« First...678910