1.
Your company has a main office and one branch office. Your network consists of an Active Directory domain. You have a remote access server in the main office named Server1. You have a remote access server in the branch office named Server2. Server2 has a demand-dial interface that connects to Server1. The demand-dial interface connects by using a domain account named Ras1. You need to prevent Server2 from establishing new demand-dial connections to the main office between 18:00 and 08:00. What should you do?
2.
Your network consists of a single Active Directory domain.You have a member server named Web1 that runs Windows Server 2003 Service Pack 2 (SP2).Web1 has the Application server role installed.Remote Desktop is not enabled. Your company's security policy only permits domain administrators to log on to the console of company servers. You create an account named WebAdmin.You add WebAdmin to the local Administrators group on Web1. You need to ensure that WebAdmin can manage Web sites on Web1. What should you do next on Web1?
3.
You have a VPN server named Server1 and a file server named Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2). VPN clients report that they cannot access shares on Server2 after connecting to Server1. You confirm that VPN clients receive the appropriate IP configurations and that they have permissions to the shared folders on Server2. You need to ensure that VPN clients can access the shares on Server2 when they connect to the network by using a VPN connection. What should you do?
4.
You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). You create a FTP site on Server1. You need identify how many users are connected to the FTP site. What should you do?
5.
Your network contains 20 subnets.You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).Server1 has an IP address of 192.168.10.10 and is located on a subnet named Subnet10. All client computers run Windows XP Professional Service Pack 3 (SP3). Users on a subnet named Subnet1 report that they cannot connect to Server1. Users on Subnet10 report that they can connect to Server1. You log on to a computer on Subnet1. You need to identify the point of failure on the network. Which command should you run?
6.
Your network consists of a single Active Directory domain.The network contains a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to enable a user named User1 to stop and start the World Wide Web Publishing Service on the Web server.User1 must be prevented from stopping other services on the Web server. What should you do?
7.
You have a server that runs Windows Server 2003 Service Pack 2 (SP2).The server contains a single network connection named Local Area Connection. A user reports that when he copies a large file to a shared folder on the server, it seems unusually slow. You need to view the current network utilization on the server. What should you do?
8.
Your network consists of a single Active Directory domain named contoso.com.All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Web server named Server1. Users access the server by using the URL http:// server1.contoso.com. You need to create a new resource record that will allow users to access the server by using the URL http:// www.contoso.com.The solution must prevent the need to modify the new record if the IP address of Server1 changes. Which type of resource record should you configure?
9.
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: .Allow Admin1 to monitor events in the system event log and the application event log .Allow Admin1 to create and view counter logs in Performance Monitor
10.
You are the network administrator for your company.The network consists of a single Active Directory domain.The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers. The written company security policy states that network traffic to Web servers must be audited on a regular basis.A server named Server1 is configured as a Web server on the company's intranet.You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1. You run Network Monitor on Server1 for three hours.When you stop the network capture, you see that Network Monitor captured over 40,000 frames.As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address. In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address. What should you do?