What should you use?
Servers in your company run Windows Server 2003 SP1. You plan to create role-based security templates for new deployments of Windows Server 2003 SP2. You need to compare the services that are configured on an existing server with a security template. What should you use?
What should you do in the custom security template?
Your company has an Active Directory directory service domain. The network environment includes servers that run Windows Server 2003 and servers that run Windows 2000 Server. You plan to create a custom security template that configures the NTLM protocol setting that is used by the domain controllers to the most secure setting possible. You need to ensure that all servers continue to communicate with the domain controllers.
What should you do in the custom security template?
What should you do?
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster.
What should you do?
Which two actions should you perform on the stand-alone servers?
Your company has an Active Directory directory service domain. You have two stand-alone servers that run Windows Server 2003, Standard Edition. You plan to create a server cluster. You need to create the server cluster with the stand-alone servers as cluster nodes.
Which two actions should you perform on the stand-alone servers? (Each correct answer presents part of the solution. Choose two.)
What should you do on DC1?
Your company has a single Active Directory directory service domain. The forest functional level is set to Windows Server 2003. A domain controller named DC1 runs Active DirectoryCintegrated DNS. You configure an external DNS server as a forwarder on DC1. You need to ensure that DC1 passes all DNS queries to the forwarder only. What should you do on DC1?
Which IP addressing scheme should you use?
Your company has a main office and two branch offices. All servers run Windows Server 2003. All client computers have dynamically assigned IP addresses. The main office has 50 servers and no client computers. The branch offices each have 200 client computers and no servers. You are planning a network infrastructure strategy. You need to minimize unused IP addresses. Which IP addressing scheme should you use?
What should you do?
You are a network administrator for your company. The network consists of a single Active Directory forest that contains three domains. The functional level of the forest and of all three domains is Window Server 2003. The company has a main office and 30 branch offices. Each branch office is connected to the main office by a 56-Kbps WAN connection. You configure the main office and each branch office as a separate Active Directory site. You deploy a Windows Server 2003 domain controller at the main office and at each branch office. Each domain controller is configured as a DNS server. You can log on to the network from client computers in the branch offices at any time.
However, users in the branch offices report that they cannot log on to the network during peak hours. You need to allow users to log on to the network from branch office computers. You do not want to affect the performance of the branch office domain controllers. You need to minimize Active Directory replication traffic across the WAN connections.
What should you do?
Which command-line utility should you use on the RRAS server?
All servers in your environment run Windows Server 2003. You have a Routing and Remote Access service (RRAS) server that is a member of the domain. The RRAS server uses the NAT/Basic Firewall routing protocol. Users report intermittent Internet connectivity failures. You need to troubleshoot the failures. Which command-line utility should you use on the RRAS server?
Which tool should you use?
You are planning to deploy multiple servers that run Windows Server 2003. You need to ensure that all necessary security updates have been applied to the servers before you connect the servers to the network. Which tool should you use?
Which two actions should you perform?
Your company has an Active Directory directory service domain. All servers are located in a single organizational unit (OU). You install Windows Server 2003 on a new server named Server1, and you configure all security settings.
You plan to install Windows Server 2003 on additional servers and to apply the security settings from Server1 to the new servers. You need to apply the security settings to the new servers before they are joined to the domain.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)