Which of the following is most likely the cause of this problem?
You have configured a VPN server running Windows Server 2003 and RRAS. Most clients are
able to access the server, but clients running Windows 98 are reporting that they are unable to
connect. Which of the following is most likely the cause of this problem?
Which of the following additional tasks may be necessary to ensure that wireless clients can connect?
You have configured a WAP using the EAP-TLS protocol. The WAP is connected to a LAN with a
Windows Server 2003 server. Which of the following additional tasks may be necessary to ensure
that wireless clients can connect? (Choose all that apply.)
How can you ensure that the application performs at its best on the hardware provided?
You have recently purchased a new single-CPU, Intel Xeon-based server. This hardware will be
used to run a multithreaded CPU-intensive application. How can you ensure that the application
performs at its best on the hardware provided?
What is the proper process for recovering from this problem?
You are working on an existing server. The NIC manufacturer has notified you of an updated
driver for your card that will greatly improve performance. You download and install the new driver.
Before you reboot the system, you perform an ASR backup. When you reboot the system, it
reaches the graphical portion of the boot process and presents a STOP message. What is the
proper process for recovering from this problem?
What is the most likely cause of the problem?
You are a consultant. You have been called in to troubleshoot a malfunctioning NLB cluster that is
supposed to serve Web pages with IIS. The cluster contains four hosts, but only one host at a time
will successfully form the cluster. Clients appear to have no problems connecting to any of the
single-host cluster configurations. What is the most likely cause of the problem?
How should you accomplish this goal?
One of your hosts in multiple-host NLB cluster requires maintenance. The cluster is heavily used
and central to the profitability of your company. You want to bring the node down for service in the
least disruptive way. How should you accomplish this goal?
What are the authentication methods that can be used with IPSec?
You have been hired as a consultant to help deploy IPSec for the network of a mediumsize
manufacturing firm that is developing a number of new products and must share sensitive data
about its products over the network. As part of the planning process, you must determine the best
authentication method to use with IPSec. What are the authentication methods that can be used
with IPSec? (Select all that apply.)
What is the problem?
You want to use the RSoP tool in logging mode to build some reports on the existing policy
settings of one of your client computers. You have used RSoP before in planning mode, but never
in logging mode. You open the RSoP Wizard from the Active Directory Users and Computers
console, as youve done before, but you notice that there is no mechanism for selecting the mode,
and only planning mode seems to be available. What is the problem?
Which of the following are contained in the security descriptor for an object?
You have recently hired a new junior administrator to assist you in running the network for a
medium-sized manufacturing company. You are explaining to your new assistant that AD objects
are assigned security descriptors to allow you to implement access control. You tell your assistant
that the security descriptor contains several different components. Which of the following are
contained in the security descriptor for an object? (Select all that apply.)
What information should you change?
You are implementing a new wireless network and need to change the default settings for the
equipment on the WLAN. What information should you change? (Select all that apply.)