Microsoft Exam 070-290 Preparation

Microsoft Exam 070-290
Managing and Maintaining a Microsoft Windows Server 2003 Environment

For reference, you can read this book:
MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment (ISBN 0-7356-1437-7)1

Contents at a Glance for this book:
Part I Learn at Your Own Pace
Introducing Microsoft Windows Server 2003
Administering Microsoft Windows Server 2003
User Accounts
Group Accounts.
Computer Accounts
Files and Folders.
Backing Up Data.
Printers.
Maintaining the Operating System.
Managing Hardware Devices and Drivers.
Managing Microsoft Windows Server 2003 Disk Storage
Monitoring Microsoft Windows Server 2003
Recovering from System Failure.

Part II Prepare for the Exam
Managing and Maintaining Physical and Logical Devices
Managing Users, Computers, and Groups
Managing and Maintaining Access to Resources
Managing and Maintaining a Server Environment
Managing and Implementing Disaster Recovery

Part III Appendix
Terminal Server

Sample Question and Answer (Q&A) for exam 70-290:
QUESTION 1:
You work as the network administrator at Itexamworld .com. The Itexamworld .com network consists of a single Active Directory domain named Itexamworld .com. The Itexamworld .com network contains six database servers named Itexamworld -DB01 through Itexamworld -DB06 that each run a database application named DataApp1. The Itexamworld .com written policy requires
that when a new user is added to DataApp1, they must be added to the server that has the most available disk space. Itexamworld .com hires ten new employees. The new employees will require access to DataApp1. You need to add these users to DataApp1.
What should you do to ensure that you meet the written policy requirements when you add the new users to DataApp1?
A. Review the application logs on each of the six database servers by using Event Viewer.
B. Record the PhysicalDisk object on all six database servers by using Performance Logs and Alerts.
C. Review the performance data on each of the six database servers by using Task Manager.
D. Generate a histogram view of the LogicalDisk object on all six database servers by using System Monitor.

Answer: D

Labels: ,

Read more!
Posted by certkiller, Saturday, April 14, 2007 8:04 PM | 0 comments |

Microsoft Exam 070-229 Preparation

Microsoft Exam 070-229
Installing, Configuring and Administering Microsoft
SQL Server 2000, Enterprise Edition

For reference, you can read this book:
MCSE Training Kit: Microsoft SQL Server 2000 Database Design and Implementation (0-7356-1248-X)

Here is Chapter and Appendix Overview:
This self-paced training course combines notes, hands-on procedures, and review questions to teach you how to design and implement databases with SQL Server 2000. It is designed to be completed from beginning to end, but in some cases you
can choose a customized track and complete only the sections that interest you. (See the next section, “Finding the Best Starting Point for You,” for more information.) If you choose the customized track option, see the “Before You Begin” section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters refer to the appropriate chapters.
Part 1 is divided into the following sections and chapters:
■ The “About This Book” section contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which
lessons you will complete.
■ Chapter 1, “Introduction to Microsoft SQL Server 2000,” introduces you to SQL Server 2000 and explains what SQL Server is. The chapter provides a cohesive overview of SQL Server so that you can understand how all the pieces
fit together.
■ Chapter 2, “Using Transact-SQL on a SQL Server Database,” introduces you to Transact-SQL and provides details about how to create and execute Transact-SQL statements in order to manage a SQL Server database and its data. The chapter also introduces you to the SQL Server programming tools that allow you to use Transact-SQL to interface with the database.
■ Chapter 3, “Designing a SQL Server Database,” introduces you to the process of creating a SQL Server database. It describes the basic concepts of database design and provides information about planning a database, identifying system
requirements, and developing a logical data model.
■ Chapter 4, “Implementing SQL Server Databases and Tables,” explains how to create and manage a SQL Server database. It then discusses data types and how to identify which ones to use when creating a table. The chapter also describes
how to create these tables—using the data type information—and how to modify the tables after they have been created.
■ Chapter 5, “Implementing Data Integrity,” provides an overview of the various methods that you can use to maintain data integrity and a description of the types of data integrity that you will find in a SQL Server database. The chapter also
provides detailed information about the various types of integrity constraints that you can use to enforce data integrity and how to implement them in a database.
■ Chapter 6, “Accessing and Modifying Data,” provides detailed information about four Transact-SQL statements (SELECT, INSERT, UPDATE, and DELETE) and describes how each statement is used in Query Analyzer to retrieve and modify data. This chapter also introduces you to other methods for adding, modifying, and deleting data.
■ Chapter 7, “Managing and Manipulating Data,” describes more techniques for managing and manipulating data, including how to import and export data, how to manipulate heterogeneous data, how to use Transact-SQL cursors, and how to extract data in XML format.
■ Chapter 8, “Implementing Stored Procedures,” introduces you to the types of stored procedures available in SQL Server 2000 and how to create, execute, and alter them. You are also introduced to programming stored procedures.
■ Chapter 9, “Implementing Triggers,” introduces you to triggers and how to use them to extend data integrity and implement complex business logic. You will learn when it is appropriate to implement triggers and when basic constraints will suffice. You will also learn how to program triggers and how to use system commands and functions commonly used in trigger programming.
■ Chapter 10, “Implementing Views,” introduces you to views and the various functionality that they support. You will learn how to use views to insert, update, and modify data.
■ Chapter 11, “Implementing Indexes,” introduces you to the structure and purpose of indexes and the types and characteristics of indexes. You will learn how to determine when an index is appropriate, the type of index to create, and how to create it.
■ Chapter 12, “Managing SQL Server Transactions and Locks,” introduces you to the fundamentals of transactions and locks and describes how transactions and locks are used to process data modifications.
■ Chapter 13, “Designing and Admini stering SQL Server 2000 Security,” introduces you to SQL Server security. You will learn how to design SQL Server security to accommodate user requirements and protect the database from unauthorized access.
■ Chapter 14, “SQL Server Monitoring and Tuning,” examines how to use SQL Profiler to monitor a database system and explores methods of improving database performance through partitioning and index tuning.
Following Part 2 you will find:
■ The Appendix, “Questions and Answers,” lists all of the review questions from the book and the suggested answers.
■ The Glossary provides definitions for SQL Server terminology.

Sample Question and Answer (Q&A) for exam 70-229:
QUESTION 1:
You are designing for a large grocery store chain. The partial database schema is shown in the Partial Database Schema Exhibit. The script that was used to create the Customers table is shown in the Script for Customers Table Exhibit. The store managers want to track customer demographics so they can target advertisements and coupon promotions to customers. These advertisements and promotions will be based on the past purchases of existing customers. The advertisements and promotions will target buying patterns by one or more of these demographics: gender, age, postal code, and region. Most of the promotions will be based on gender and age. Queries will be used to retrieve the customer demographics information. You want the query response time to be as fast as possible. What should you do?
A. Add indexes on the PostalCode, State, and DateOfBirth columns of the Customers table.
B. Denormalize the Customers table
C. Create a view on the Customers, SalesLineItem, State, and Product tables.
D. Create a function to return the required data from the Customers table.

Answer: B.


QUESTION 2:
You work as database developer at certkiller.blogspot.com. The Certkiller Sales personal want to track sales by multiple parameters such as age, country, etc to be able to spot relevant sales patterns. To produce such information you need to join four tables from the highly normalized database.
How should you make the query response time as fast as possible in this scenario?
A. Create a view on the four tables. Create an index on the view.
B. Denormalize the database design.
C. Further normalize the table.
D. Add more indexes on the relevant columns in the tables that are joined.
E. Improve performance by using functions to implement the query.

Answer: B.


QUESTION 3:
You are a database developer for Proseware, Inc. You are implementing a database for the database of the company's human resources department. This database will store employee information. You create a table named EmployeeContact that contains the following columns: HomePhone, BusinessPhone, FaxNumber, and EmailAddress You must ensure that each record contains a value for either the HomePhone column or the BusinessPhone column. What should you do?
A. Create a rule that disallows null values. Bind the rule to both the HomePhone and BusinessPhone columns.
B. Create a rule that prevents null values from being entered into both the HomePhone
and BusinessPhone columns. Bind the rule to the table.
C. Add CHECK constraints on the HomePhone and BusinessPhone columns that prevent null values from being entered into the columns.
D. Add a CHECK constraint on the table to validate that at least one of the values entered into the HomePhone and BusinessPhone columns is non-null.
E. Create a trigger that counts the number of items entered without a value in the HomePhone column and then counts the number of items entered without a value in the BusinessPhone column. Configure the trigger so that if one or more rows are found that meet these conditions, the trigger will cancel the data modification.

Answer: D.


QUESTION 4:
You are a database developer for Itexamworld 's SQL Server 2000 online transaction processing database. Many of the tables have 1 million or more rows. All tables have a clustered index. The heavily accessed tables have at least one non-clustered index. Two RAID arrays on the database server will be used to contain the data files. You want to place the tables and indexes to ensure optimal I/O performance. You create one filegroup on each RAID array. What should you do next?
A. Place tables that are frequently joined together on the same filegroup. Place heavily accessed tables and all indexes belonging to those tables on different filegroups.
B. Place tables that are frequently joined together on the same filegroup. Place heavily accessed tables and the nonclustered indexes belonging to those tables on the same filegroup.
C. Place tables that are frequently joined together on different filegroups. Place heavily accessed tables and the nonclustered indexes belonging to those tables on different filegroups.
D. Place tables that are frequently joined together on different filegroups. Place heavily accessed tables and the nonclustered indexes belonging to those tables on the same filegroup.

Answer: C.


QUESTION 5:
You are a database developer for a shipping company. You have a SQL Server 2000 database that stores order information. The database contains tables named Order and OrderDetails. The database resides on a computer that has four 9-GB disk drives
available for data storage. The computer has two disk controllers. Each disk controller controls two of the drives. The Order and OrderDetail tables are often joined in queries. You need to tune the performance of the database.
What should you do? (Each correct answer presents part of the solution. Choose two.)
A. Create a new filegroup on each of the four disk drives.
B. Create the clustered index for the Order table on a separate filegroup from the nonclustered indexes.
C. Store the data and the clustered index for the OrderDetail table on one filegroup, and create the nonclustered indexes on another filegroup.
D. Create the Order table and its indexes on one filegroup, and create the OrderDetail table and its indexes on another filegroup.
E. Create two filegroups that each consists of two disk drives connected to the same controller.

Answer: D, E.

Labels: , , ,

Read more!
Posted by certkiller, 7:30 PM | 0 comments |

Microsoft Exam 070-228 Preparation

Microsoft Exam 070-228
Installing, Configuring and Administering Microsoft
SQL Server 2000, Enterprise Edition

For reference, you canread this book:
MCSA/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server
2000 System Administration, Exam 70-228, Second Edition. from Microsoft Press.

Here is Chapter and Appendix Overview:
This book combines text, hands-on procedures, and review questions to teach you database administration using SQL Server 2000. It is designed to be completed from the beginning to the end, but you can choose to complete only those sections that interest you. If you choose the customized track option, see the “Before You Begin” section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters refer to the appropriate chapters.
This self-paced training book is divided into the following chapters:
■ The “About This Book” contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete.
■ Chapter 1, “Overview of SQL Server 2000,” introduces SQL Server 2000. It defines some of the important characteristics of SQL Server 2000 and explains the environments in which it is designed to work. You will be introduced to the different parts of the product and given some idea as to the role played by these parts.
■ Chapter 2, “Installing SQL Server 2000,” explains how to install SQL Server 2000. It lists the hardware and software requirements of the program, and it explains the specific information you have to supply and the decisions you have to make during the installation process. This chapter covers using default, named, and multiple instances of SQL Server 2000. The chapter also covers performing unattended and remote installations of SQL Server 2000.
■ Chapter 3, “Preparing to Use SQL Server 2000,” reviews the results of installing SQL Server 2000. This chapter explains starting, stopping, and pausing SQL Server services. The chapter also covers working with OSQL, SQL Query Analyzer, and SQL Server Enterprise Manager.
■ Chapter 4, “Upgrading to SQL Server 2000,” shows you how to perform a version upgrade of a complete SQL Server 6.5 or 7.0 installation to SQL Server 2000. This chapter also explains how to perform an online database upgrade from SQL Server 7.0.
■ Chapter 5, “Understanding System and User Databases,” explains SQL Server 2000 databases. This includes the structure of a data file and the architecture of the transaction log. This chapter concludes with a discussion about system tables, including the querying of system and database catalogs.
■ Chapter 6, “Creating and Configuring User Databases,” teaches how to create a new user database, set database options for new or existing databases, and manage the size of data and transaction log files. This chapter concludes with a discussion about placing database files on multiple disks for recovery, fault tolerance, and performance.
■ Chapter 7, “Populating a Database,” discusses the population of user databases with existing data. It shows you how to transfer and transform data. This chapter focuses on the use of DTS, Bcp, and the BULK INSERT Transact-SQL statement.
■ Chapter 8, “Developing a Data Restoration Strategy,” presents an overview of the SQL Server 2000 backup and restore processes and discusses the issues that you should consider when planning a backup and restore strategy for a SQL Server 2000 installation.
Chapter 9, “Backing Up and Restoring SQL Server,” teaches you how to perform
database backups using disk and tape. It also teaches you how to perform
database restorations. This chapter explains how to use SQL Server Enterprise
Manager and Transact-SQL statements.
■ Chapter 10, “Managing Access to SQL Server 2000,” discusses controlling
access to SQL Server 2000, including the authentication process and the authorization
process. The chapter concludes by showing you how to create and manage
logins.
■ Chapter 11, “Managing SQL Server Permissions,” shows how to grant database-
specific permissions. It also discusses the use of application roles. The
chapter concludes by teaching you how to design an access and permissions
strategy.
■ Chapter 12, “Performing Administrative Tasks,” teaches you how to perform a
variety of configuration tasks and setup tasks. These include the configuration
of the SQL Server service, the SQL Server Agent service, SQL Mail,
SQLAgentMail, and XML. The chapter concludes with a discussion of the performance
of periodic maintenance tasks.
■ Chapter 13, “Automating Administrative Tasks,” shows you how to automate routine
tasks using operators, jobs, and alerts. It also teaches the creation of a database
maintenance plan. It concludes by teaching you to create multiserver jobs.
■ Chapter 14, “Monitoring SQL Server Performance and Activity,” discusses the
development of a performance monitoring methodology. This chapter introduces
each of the monitoring tools and shows you how to use each tool. The
chapter concludes by teaching you how to perform specific monitoring tasks,
such as for memory use or slow-performing queries.
■ Chapter 15, “Using SQL Server Replication,” introduces planning for, implementing,
monitoring, and administering replication. This includes covering the
types of replication that are available for automatically replicating data between
instances of SQL Server or with heterogeneous data sources.
■ Chapter 16, “Maintaining High Availability,” discusses the use of standby servers,
including the use of log shipping to automate the process of maintaining a
standby server. The chapter also discusses the use of SQL Server failover clusters
using the Microsoft Cluster Service.
Following Part 2 you will find:
■ The Appendix, “Questions and Answers,” lists all of the review questions from
the book, showing suggested answers.
■ The Glossary provides definitions for many of the terms and concepts presented
in this training kit.


Sample Question and Answer (Q&A) for exam 70-228:
QUESTION 3:
You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company. The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers. How should you configure the database?
A. Configure the database on the two servers as a SQL Server 2000 cluster.
B. Configure the database on one server, and then configure a standby database on the second server.
C. Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.
D. Configure the database as a federated database, and then partition half the data on each server.

Answer: A.


QUESTION 4:
You are the administrator of a new Microsoft Windows 2000 server computer named HQSQL5. HQSQL5 is a member server in your company's Windows NT 4.0 domain, which is named HQMAIN. After installing SQL Server 2000 on HQSQL5, you configure the MSSQLServer service account to use the HQMAIN\sqladmin user account, which is a member of the local administrators group on HQSQL5. You can use the HQMAIN\sqladmin user account to log on the HQSQL5. However, the MSSQLServer service fails to start. You need to start the service. What should you do?
A. Revoke Log on interactivity rights for the HQMAIN\sqladmin user account.
B. Add the HQMAIN\sqladmin user account to the HQMAIN\Domain Admins group.
C. Select the Password Never Expires check box for the HQMAIN\sqladmin user account.
D. Grant Log on as a service rights to the HQMAIN\sqladmin user account.

Answer: D.


QUESTION 5:
You are the administrator of a SQL server computer. The server is running SQL Server 6.5 and SQL Server 7.0. You install a named instance of SQL Server 2000, and then run the SQL server upgrade wizard. On the database selection screen, some of the SQL Server 6.5 databases are not listed. You cancel the SQL Server upgrade wizard. You need to ensure that the SQL Server 6.5 databases are listed in the wizard. What should you do?
A. Uninstall SQL Server 7.0, and then rerun the SQL Server upgrade wizard.
B. Run the Microsoft SQL Server-switch application, and then rerun the SQL Server upgrade wizard.
C. Create a data transformation services package that imports the databases from SQL Server 6.5 to SQL Server 2000, and then execute the package.
D. Uninstall SQL Server 2000, and then reinstall SQL Server 2000 as the default instance.

Answer: D


QUESTION 6:
You are the administrator of a SQL Server 2000 computer. Your company uses the server to store service contract information for its customers. You are also the administrator of Oracle relational database management system (RDBMS) server. This server is used to store your company's financial information. The financial information is updated frequently throughout the day. You need to create a series of reports that combine the service contract information
and the financial information. These reports will be updated several times a day. You want to create reports on the SQL Server computer by using the minimum amount of disk space. What should you do?
A. Set up SQL server replication to replicate the data from the oracle server to the SQL server computer.
B. Set up the oracle server as a linked server. Create a view that joins the service contract information and the financial information.
C. Set up data transformation services (DTS) package that imports and transforms the database from the oracle server to the SQL server computer. Use SQL server agent to execute the DTS package throughout the day as needed.
D. Set up Microsoft ActiveX script that connects to the oracle server and imports the financial information into SQL server temporary table. Create a view that joins the service contract information and the temporary table.

Answer: B.


QUESTION 5:
You are the administrator of a SQL Server 2000 computer named SQL1. You want to perform ad hoc distribution queries against a database that is stored on a SQL Server 2000 computer named SQL2. SQL2 contains several databases, and each of these databases uses a different collation. You want to ensure that comparisons in distributed queries are evaluated correctly. You also want to minimize administrative overhead.
How should you configure SQL1?
A. Use the ALTER DATABASE statement to change the collation of the databases on SQL1.
B. Add SQL2 as remote server.
C. Add SQL2 as a linked server. Select the Use Remote Collation check box, and do not specify a collation name.
D. Add SQL2 as a linked server. Select the Use Remote Collation check box, and specify a collation name. Repeat this process once for each database on SQL2.

Answer: C.

Labels: , , ,

Read more!
Posted by certkiller, 7:20 PM | 0 comments |

Microsoft Exam 070-227 Preparation

Microsoft Exam 070-227
Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server.

For reference, you can read this book:
MCSE Training Kit: Microsoft Internet Security and Acceleration Server 2000. from Microsoft Press.

Here is Chapter and Appendix Overview:
This self-paced training course combines notes, hands-on procedures, multimedia presentations, and review questions to teach you how to install, configure, and implement Microsoft Internet Security and Acceleration Server 2000. It is designed to be completed from beginning to end, but you can choose a customized track and complete only the sections that interest you. (See the next section, "Finding the Best Starting Point For You" for more information.) If you choose the customized track option, see the "Before You Begin" section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters refer to the appropriate chapters.

The book is divided into the following chapters:
The "About This Book" section contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete.

Chapter 1, "Introduction to Microsoft Internet Security and Acceleration Server 2000," provides an overview of the features and benefits of ISA Server.

Chapter 2, "Installing Microsoft Internet Security and Acceleration Server 2000," teaches you how to perform an ISA Server installation, including the process of planning for an installation and migrating from Proxy Server 2.0.

Chapter 3, "Configuring Secure Internet Access," teaches you how to establish secure Internet access for ISA Server clients. This includes installing and configuring clients as Firewall clients and SecureNAT clients, configuring automatic discovery, configuring Internet access through a dial-up connection, and troubleshooting Internet connectivity.

Chapter 4, "Configuring Internet Security through Access Policies," explains how to create a customized and secure Internet access policy. This chapter teaches you how to create policy elements such as schedules and destination sets that you may later use in site and content rules or in protocol rules. It also shows you how to create these rules so that you can control network traffic to and from your network. The chapter then includes a lesson describing ISA Server's packet filtering feature and how to configure packet filters suited to your network needs. Finally, the chapter explains how to configure intrusion detection in ISA Server so that you will know when someone has launched an attack against your network.

Chapter 5, "Configuring Internet Acceleration through the ISA Server Cache," teaches you how to use ISA Server as a means to accelerate Internet connectivity for server clients. This includes configuring cache properties, active caching, and scheduled content downloads.

Chapter 6, "Secure Server Publishing," teaches you how to publish servers on the Internet securely behind ISA Server. This includes publishing Web servers, mail servers, and other Internet servers (such as FTP servers).

Chapter 7, "Securing Enterprise Networks with ISA Server," teaches you how to deploy ISA Server in more complex enterprise networks, including those that require the use of virtual private networks and of a centralized, multi-tiered policy.

Chapter 8, "Secure Videoconferencing with H.323 Gatekeeper," teaches you how to deploy videoconferencing in an ISA Server network. This chapter describes how to use ISA Server's H.323 Gatekeeper as a central switch for videoconferencing calls, and how to use rules to route calls to aliases.

Chapter 9, "Monitoring and Optimizing ISA Server Performance," teaches you how to use various tools in ISA Server to monitor and optimize ISA Server behavior. This includes configuring alerts, using ISA Server logs and reports, configuring bandwidth rules, and using ISA Server Performance Monitor counters.

Chapter 10, "Troubleshooting ISA Server," introduces you to the many tools and strategies that you can use to troubleshoot problems in ISA Server behavior.

Appendix A, "Questions and Answers," lists all of the review questions from the book showing the page number where the question appears and the suggested answer.

Appendix B, "Deploying and Administering ISA Server in a Complex Network," walks you through several hypothetical installations of Microsoft Internet Security and Acceleration Server 2000 (ISA Server) Enterprise Edition to test your understanding of and ability to troubleshoot the product. Because the exam is based on both knowledge of the software and real-world experience, we strongly recommend that you study this appendix before taking MCP exam 70-227.

Appendix C, "Event Messages," is a reference used to aid troubleshooting in ISA Server. It presents the full list of Event Messages in ISA Server, along with a description of the probable cause and action necessary to remedy problems, if necessary.

A Glossary of terms related to firewalls and ISA Server is also included as a means to help you become familiar with these topics.


Sample Question and Answer (Q&A) for exam 70-227:
QUESTION 1
You are the new network administrator for Certkiller . The network includes an ISA Server computer named Certkiller 1. Certkiller 1 was configured by a previous administrator. Certkiller 1 functions as a firewall between the Certkiller network and the Internet. During a routine audit of Certkiller 1's log files, you discover that several non-standard services are installed and configured to start automatically. Your manager tells you that the previous administrator installed additional services on Certkiller 1 for monitoring and reporting purposes. Your manager wants Certkiller 1 to function only as a firewall. You want to ensure that no additional services on Certkiller 1 are opening ports on Certkiller 1. You do not want to change the status of any built-in services.
What should you do?
A. Run the nbtstat - an command. Disable any of the additional services that are listed as Registered.
B. Run the netstat -an command. Disable all services that are listening on authorized ports.
C. Run the ISA Server Security Wizard to set the system security level of Certkiller 1 to Secure.
D. Run the ISA Server Security Wizard to set the system security level of Certkiller 1 to Limited Services.

Answer: D


QUESTION 2
Certkiller network consists of a single Microsoft Windows 2000 site. It includes an ISA server enterprise array consisting of a single computer named ISA1. You install ISA server on a new computer, which you name ISA2. You decide to add ISA2 to the array on a different subnet in the same Windows 2000 site. ISA2 successfully joins the enterprise array, and the setup log file indicates that the setup was successful. Your SecureNAT and firewall client computers are still capable of accessing Internet resources through the default enterprise policies of ISA1. However, these computers cannot access Internet resources through ISA2. You must enable ISA2 to provide access to Internet resources.
What should you do?
A. Create a custom enterprise policy setting for ISA2. Enable outbound client access through the new policy.
B. Disable array-level access rules that restrict your enterprise policies.
C. Delete the ISA installation directory. Run the installation again.
D. Edit the local address table to ensure that it contains only address ranges from Certkiller network.

Answer: D


QUESTION 3
You are the administrator of Certkiller network, which includes a main office and a branch office. The branch office connects to the Internet through a Microsoft Proxy server 2.0 computer named Prx2. Prx2 is chained to another Proxy server 2.0 computer named Prx1, which is located in the main office. You upgrade Prx1 to ISA server. Now, users in both offices report that they cannot browse the Internet. You need to enable users in both offices to browse the Internet. Your
solution must involve the least possible administrative effort.
What should you do?
A. Configure your internal DNS server with a host record that points to a WSPAD.DAT file.
B. Configure your DHCP server to inform client computers of the location of a WPAD.DAT file.
C. Configure Prx1 to listen for outbound web requests on TCP Port 80.
D. Configure Prx1 to provide an automatic configuration script to Web browsers on your network

Answer: C


QUESTION 4
You are the administrator for Certkiller 's network. The network consists of a single Microsoft Windows 2000 domain named Certkiller .com. The domain contains all the user accounts. Certkiller uses an ISA Server computer to control Internet access. The ISA Server computer is a member of the domain and its not a member of an array. Users on the network use different CERN-compliant Web browsers to connect to Web sites on the Internet. The Web browsers are configured to use the ISA Server computer as a proxy server. Certkiller policy states that the ISA Server computer log files must include information about which users access which Web sites. You configure a protocol rule that allows outgoing Web requests. The rule applies to the Domain Users group. The outgoing Web requests properties of the ISA Server computer are configured to ask unauthenticated users for identification. You receive reports that some users are not able to access the Internet, while other users have no difficulty accessing the Internet. You do not want to install new Web browsers on the client computers. What should you do?
A. Change the protocol rule that allows outgoing Web requests to apply to any requests.
B. Disable the option to ask unauthenticated users for identification for outgoing Web requests.
C. Enable the option to configure listeners per individual IP address for outgoing Web requests.
D. Change the listener configuration to enable Basic authentication for outgoing Web requests.

Answer: D


QUESTION 5
You are the administrator for Certkiller 's ISA Server computers. The network contains Microsoft Windows 2000 Professional client computers and Windows 2000 Server computers. The ISA Server computers are used to control Internet access. Users on the internal network access video streams and high quality audio streams from the Internet. Certkiller policy states that the ISA Server computers must be configured to be as secure as possible, as long as Internet access is not affected. You secure the ISA Server computers by changing several of the configuration options for IP packet filters. However, users now report that they can no longer access video streams and high quality audio streams from the Internet.
What should you do?
A. Select the Enable IP routing option.
B. Clear the Enable filtering of IP fragments option.
C. Clear the Enable filtering IP options option.
D. Enable the ICMP source quence IP packet filter.
E. Enable the ICMP ping response (in) IP packet filter.

Answer: B
Multimedia is receiving in blocks = fragmented.

Labels: ,

Read more!
Posted by certkiller, 9:44 AM | 0 comments |

Microsoft Exam 070-210 Preparation

Microsoft Exam 070-210 Preparation
Installing, Configuring, and Administering Microsoft Windows 2000 Professional.

For Exam 070-210 , you can read this book for reference:
MCSE Training Kit—Microsoft Windows 2000 Professional from Microsoft Press.

Here is Chapter and Appendix Overview:
This self-paced training course combines notes, hands-on procedures, and review questions to teach you how to install, configure, administer, and support Windows 2000 Professional. It is designed to be completed from beginning to end, but you can choose a customized track and complete only the sections that interest you. (See the next section, "Finding the Best Starting Point for You," for more information.) If you choose the customized track option, see the "Before You Begin" section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters refer to the appropriate chapters.
The book is divided into the following chapters:
The "About This Book" section contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete.

Chapter 1, "Introduction to Windows 2000," presents an overview of the Windows 2000 operating system and the four products that make up this family. It introduces some of the new features and benefits of Windows 2000 and explains why Windows 2000 is easier to use and manage and provides greater compatibility, file management capabilities, and security than previous versions of Windows. This chapter also provides an introduction to workgroups and domains.

Chapter 2, "Installing Windows 2000 Professional," presents a list of preinstallation tasks that you need to complete before you begin your installation, as well as the hardware requirements for installing Windows 2000 Professional. It then steps you through the process of installing from a CD-ROM, and as a hands-on exercise, has you install Windows 2000 Professional on your computer. Finally the chapter discusses installing Windows 2000 over the network and how to troubleshoot installation problems.

Chapter 3, "Using Microsoft Management Console and Task Scheduler," presents two of the primary administrative tools available in Windows 2000: the Microsoft Management Console (the MMC) and Task Scheduler. It defines custom consoles, console trees, details panes, snap-ins, and extensions, and discusses the differences between Author mode and User mode. It also explains how you can use custom consoles for remote administration and troubleshooting. The hands-on portion has you use the MMC to create custom consoles, and then add a snap-in to an existing custom console. In the second hands-on practice, you configure Task Scheduler to launch a program, at a specified time.

Chapter 4, "Using Windows Control Panel," presents some of the applications in Control Panel that you use to customize the hardware and software configuration for a computer. You use the System icon to configure hardware devices or services by creating and configuring hardware profiles. You also use it to configure performance options, environment variables, and startup and recovery settings. The hands-on practice allows you to change the paging file size and to add an environment variable. You use the Display icon to view or modify display properties. Windows 2000 supports a maximum of nine monitors. This chapter also includes a section on installing hardware, both Plug and Play hardware and non-Plug and Play hardware. It explains how to use the Add/Remove Hardware Wizard and how to manually install hardware.

Chapter 5, "Using the Registry," introduces the registry, the hierarchical database where Windows 2000 stores system configuration information. This chapter also presents an overview of Registry Editor, a tool that allows you to view and modify the registry. The hands-on practice has you use Registry Editor to view information in the registry, use the Find Key command to search the registry, modify the registry by adding a value to it, and save a subtree as a file so that you can use an editor, like Notepad, to search the file.

Chapter 6, "Managing Disks," presents an overview of Windows 2000 disk management. You can manage disks locally or on remote computers. You can create a custom console and add the Disk Management snap-in to it, or you can use the Disk Management snap-in included in the preconfigured Computer Management snap-in. The Disk Management snap-in provides shortcut menus to show you which tasks you can perform on the selected object, and it includes wizards to guide you through creating partitions and volumes and upgrading disks. The hands-on practice has you upgrade a basic disk to a dynamic disk, create a new volume, and mount a volume.

Chapter 7, "Installing and Configuring Network Protocols," presents the skills and knowledge necessary to configure Transmission Control Protocol/Internet Protocol (TCP/IP) and to install other network protocols, including NWLink, NetBIOS Enhanced User Interface (NetBEUI), and Data Link Control (DLC). The chapter also discusses the process for configuring network bindings. The hands-on practices allow you to verify your computer's configuration and then configure your computer to use a static IP address. Next you configure your computer to use a DHCP server to automatically assign an IP address to your computer, and test the Automatic Private IP Addressing feature in Windows 2000. Finally, you install and configure NWLink, change the binding order, unbind a protocol, and then bind a protocol.

Chapter 8, "Using the DNS Service," introduces Domain Name System (DNS), a distributed database that is used in TCP/IP networks to translate computer names to IP addresses. It also presents the skills and knowledge necessary to configure clients to use the DNS Service. In the hands-on practice, you configure a computer running Windows 2000 Professional to be a DNS client.

Chapter 9, "Introducing Active Directory Directory Services," presents the Windows 2000 directory service, Active Directory directory services. A directory service uniquely identifies users and resources on a network. Active Directory directory services provide a single point of network management, allowing you to add, remove, and relocate users and resources easily. Active Directory directory services are available only with the Windows 2000 Server family of products.

Chapter 10, "Setting Up and Managing User Accounts," introduces you to user accounts and how to plan your user accounts. It also presents the skills and knowledge necessary to create local user accounts and to set properties for them. In the hands-on practices, you create local user accounts. You then test the user accounts, modify some of the user account properties, and then test the modified user account properties.

Chapter 11, "Setting Up and Managing Groups," introduces you to groups and to group user accounts to allow for easier assignment of permissions. It also presents the skills and knowledge necessary to implement local groups and built-in groups. In the hands-on practice, you create local groups, add members to the local groups when you create them, and add members to the groups after the groups have been created. You delete a member from one of the groups, and then you delete one of the local groups that you created.

Chapter 12, "Setting Up and Configuring Network Printers," introduces you to the Windows 2000 printing terminology, as well as presenting the skills and knowledge necessary to set up and share network printers. This chapter also presents how to troubleshoot common printing problems that are associated with setting up network printers. In the hands-on practice, you use the Add Printer wizard to install and share a local printer. This chapter also introduces printer pools and setting priorities.

Chapter 13, "Administering Network Printers," presents the four major types of tasks involved with administering network printers: managing printers, managing documents, troubleshooting printers, and performing tasks that require the Manage Printers permission. This chapter also explains how Microsoft Windows 2000 allows you to control printer usage and administration by assigning permissions. In the hands-on practices, you assign forms to paper trays, set up a separator page, and take ownership of a printer. You also print a document, set a notification for a document, change the priority for a document, and then cancel a document.

Chapter 14, "Securing Resources with NTFS Permissions," introduces the NTFS folder and file permissions and explains how to assign them to user accounts and groups. It explains how moving or copying files and folders affects NTFS file and folder permissions. It also explains how to troubleshoot common resource access problems. In the hands-on practices, you plan and apply NTFS permissions for folders and files based on business scenarios, and then test them. You also observe the effects of taking ownership of a file, and determine the effects of permission and ownership when you copy or move files.

Chapter 15, "Administering Shared Folders," explains how to share folders so that the folders and their contents are accessible over the network. This chapter also explains how sharing folders provides another way to secure file resources, one that can be used on FAT or FAT32 partitions. In the hands-on exercises, you share a folder, determine the current permissions for the shared folder and assign shared folder permissions to groups, and stop sharing a folder. In the optional hands-on exercises, you connect to a shared folder and test the combined effects of shared folder permissions and NTFS permissions.

Chapter 16, "Auditing Resources and Events," introduces the Microsoft Windows 2000 Local Security Policy and Group Policy. One of the features controlled by Local Security Policy or Group Policy is auditing. Auditing is a tool for maintaining network security that allows you to track user activities and systemwide events. This chapter also introduces audit policies and what you need to consider before you set one up, as well as how to set up auditing on resources and how to maintain security logs. In the hands-on practices, you plan an audit policy for your computer, set up an audit policy by enabling auditing on certain events, view the security log file, and configure Event Viewer to overwrite events when the log file is filled.

Chapter 17, "Configuring Group Policy and Local Security Policy," explains how to use the Windows 2000 Local Security Policy or Group Policy snap-in to improve the security on your computer. This chapter explains the Windows 2000 Account Policies and some of the available Security Options. In the first hands-on practice, you configure and test one of the Account Policies settings, Minimum Password Length. In the second hands-on practice, you configure and test three of the Security Policy settings.

Chapter 18, "Managing Data Storage," introduces data storage management on NTFS-formatted volumes. Data management includes using compression, using disk quotas, increasing the security of files and folders on your computer by using the Encrypting File System (EFS), and defragmenting a disk. In the hands-on practice, you compress files and folders, display the compressed files and folders in a different color, uncompress a file, and test the effects that copying and moving files have on compression. You also configure default quota management settings to limit the amount of data users can store on a drive and configure a custom quota setting for a user account. You test the disk quota and then turn off quota management. Finally, you encrypt a file and then attempt to access it.

Chapter 19, "Backing Up and Restoring Data," introduces the Windows Backup tool that allows you to back up and restore data. It explains the five types of backup—normal, copy, incremental, differential, and daily—and how these can be combined to meet your backup needs. In the hands-on practices, you use the Backup Wizard to back up some files to your hard disk, and you create a backup job to perform a backup operation later by using Task Scheduler. You then restore some of the files you backed up.

Chapter 20, "Monitoring Access to Network Resources," prepares you to monitor network resources. You learn about the Shared Folders snap-in and how to use it to view and create shares. You also learn how to use the Shared Folders snap-in to view sessions and open files and how to use it to disconnect users from shared folders. In the hands-on practices, you use the Shared Folders snap-in to view the shared folders, to open files, and to disconnect all users from all open files. You also use the Shared Folders snap-in to create a new share and then stop sharing it.

Chapter 21, "Configuring Remote Access," presents the new protocols for use with remote access, and it provides an understanding of the new options and interfaces in Windows 2000 to connect computers and configure protocols correctly to meet all your remote access requirements. In the hands-on practices, you use Network And Dial-up Connections to launch the Network Connection wizard to configure an inbound dial-up connection and allow Virtual Private Connections, and then to configure an outbound connection.

Chapter 22, "The Windows 2000 Boot Process," introduces the Microsoft Windows 2000 boot process for Intel-based computers. It also introduces the Boot.ini file and explains how to create a Windows 2000 boot disk. In the hands-on practice, you create a Windows 2000 boot disk for Intel-based computers and then test it. In addition, you repair a boot problem by using a Windows 2000 boot disk and by using the Last Known Good Configuration option.

Chapter 23, "Deploying Windows 2000," introduces Setup Manager and the system preparation tools. Setup Manager makes it easy to create the Unattend.txt files that are necessary for scripted installations, and the System Preparation tool helps you prepare master disk images for efficient mass installations. This chapter also explains remote installations, outlines how to install and configure remote installation servers, lists the client requirements for remote installations, and lists the steps to create boot floppies and a remote boot disk to help you efficiently deploy Windows 2000 Professional. Finally, this chapter explains how to upgrade previous versions of Windows to Windows 2000 and how to deploy service packs.

Chapter 24, "Configuring Windows 2000 for Mobile Computers," introduces the new features in Microsoft Windows 2000 Professional that make mobile computing easier to do. The features discussed in this chapter include using offline folders and files, using Synchronization Manager, configuring and using power schemes, enabling Hibernate mode, and enabling Advanced Power Management.

Chapter 25, "Implementing, Managing, and Troubleshooting Hardware Devices and Drivers," introduces Device Manager and explains how you use it to manage and troubleshoot devices. It also introduces the System Information snap-in and explains how it helps you manage your system. You learn how to use Device Manager, the System File Checker utility, and the Windows Signature Verification utility to configure, monitor, and troubleshoot driver signing. You also learn how to use Device Manager to upgrade your computer from a single processor to a multiprocessor system, and you learn how to use Performance Console as a tool to monitor system performance. Finally, you learn how to install, configure, and troubleshoot miscellaneous devices, including fax support, scanners, cameras, and mouse devices.

Appendix A, "Questions and Answers," lists all of the practice questions and review questions from the book, showing the chapter and section where the question appears, and the suggested answer.

Appendix B, "Creating Setup Boot Disks," outlines the steps to create the Windows 2000 Setup disks for computers that don't support booting from a CD-ROM drive.

Appendix C, "Understanding the DHCP Service," provides an introduction to the DHCP service.

Appendix D, "Managing Backup Tapes," provides an introduction to rotating and archiving backup tapes.

The glossary provides definitions for many of the key words and concepts presented in the course. It also contains some additional basic networking terminology.


Sample Question & Answer (Q&A) for Exam 070-086:

QUESTION 1
You are the senior desktop administrator for Certkiller . Your new trainee needs your advice. He needs to install Windows 2000 Professional on 35 new computers on the company LAN and has done some preparations. First, he created a distribution folder on the network server and a network boot disk to install Windows 2000 Professional from the distribution folder. Now he needs to create the batch file, which the network boot disk will execute to start the installation. The batch file must contain a source path and temporary drive for the installation files. He also needs the accessibility options to be installed with the batch file. The batch file must execute a hardware-specific application to run after the GUI-mode Setup has completed.
Which command should you tell him to use in the batch file?
A. Z:\i386\winnt /s:z:\i386 /t:d: /a /e:z:\hardware\setup.exe
B. Z:\i386\winnt /s:z:\i386 /rwinnt.tmp /a /e:z:\hardware\setup.exe
C. Z:\i386\winnt32 /s:z:\i386 /tempdrive:d /cmd:z\hardware\setup.exe
D. Z:\i386\winnt32 /s:z:\i386 /cmdcons:z:\hardware\setup /makelocalsource

Answer: A


QUESTION 2
You have received a request from the laboratory in your company to upgrade a Windows NT 4.0 Workstation. The users wish to use Windows 2000 Professional for everyday work. However, after studying the documentation for some laboratory equipment connected to the computer you find out that the equipment ONLY works under Windows NT 4.0 Workstation. You need to configure a multiboot system with Windows NT Workstation and Windows 2000 Professional.
What should you do?
A. When installing Windows 2000 Professional run chkdisk in Windows NT Workstation.
B. Disable the disk compression in Windows NT Workstation.
C. Install service pack four or later in Windows NT Workstation.
D. Install the distributed file system client on the Windows NT Workstation.

Answer: C

QUESTION 3
You are the administrator of a Windows 2000 network with 75 Windows NT Workstation 4.0 computers. You have received 50 new PXE-compliant computers and wish to add them to the network as soon as possible. All the new computers have identical hardware. You deploy Windows 2000 Professional to the 50 computers by using a RIS image. The first 10 computers successfully install Windows 2000 Professional. However, you cannot install Windows 2000 Professional on remaining 40 computers.
What should you do?
A. Configure the DHCP scope to add additional IP addresses.
B. Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.
C. Modify the startup sequence in the CMOS of the remaining computers.
D. Create computer accounts on the remaining computers in the Active Directory.

Answer: A


QUESTION 4
You have been assigned the task to install Windows 2000 Professional on 45 new computers on Certkiller 's network. You start by installing Windows 2000 Professional on one of the new computers. Microsoft Office 97, a virus scanner and other company-standard applications is installed by logging in as the local Administrator on the computer. Next you create a RIS image
of the newly configured computer. You have to ensure that the standard applications will be accessible to the user when the user first logs on to the network on the computers installed with this RIS image.
What should you do?
A. Run Rbfg.exe before installing the standard applications.
B. Run RIPrep.exe before installing the standard applications.
C. Copy the All Users profile to the Default Users profile.
D. Copy the local Administrator account profile to the Default Users profile

Answer: D


QUESTION 5
Certkiller has received a shipment with new computers that have to be installed with Windows 2000 Professional as soon as possible. 30 of the new computers have PXE-compliant NICs (Network Interface Cards) while 35 of the new computer are
non-PXE-compliant. All hardware in the new computers is included on the current hardware compatibility list (HCL). The administrator of Certkiller 's RIS server has created and loaded a RIS image that you will use to install these new computers. When you start the 65 computers you discover that only the 30 PXE-Compliant computers can connect to the RIS server. You need to install Windows 200 Professional on all 65 computers by using RIS.
What should you do?
A. Run Rbfg.exe to create a Non-PXE-compliant startup disk.
B. Run Riprep.exe to create a Non-PXE complaint startup disk.
C. Grant the Everyone group NTFS Read permission for the RIS image.
D. Grant the Administrators group NTFS Read permission for the RIS image.

Answer: A

Labels: ,

Read more!
Posted by certkiller, 9:19 AM | 0 comments |

Microsoft Exam 070-086 Preparation

Microsoft Exam 070-086
Implementing and Supporting Systems Management Server 2.0

For this exam you can read this book for reference:
Microsoft Systems Management Server 2.0 Training Kit from Microsoft Press

Here is Chapter and Appendis Overview:
This course combines notes, hands-on procedures, multimedia presentations, and review questions to teach you systems management, design, and implementation methods using SMS 2.0. It is designed to be completed from beginning to end, but you can choose to complete only the sections that interest you. (See the next section, "Finding the Best Starting Point for You" for more information.) If you choose the customized track option, see the "Before You Begin" section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters is explained in "Before You Begin."

The self-paced training book is divided into the following chapters:

* "About This Book" (this chapter) contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete. It is imperative that you complete the "Getting Started" section to properly prepare the computers for the exercises in the chapters.
* Chapter 1, "Introduction to Microsoft Systems Management Server" introduces SMS 2.0. It provides an overview of the functional areas, hierarchy, and network configurations of SMS 2.0.
* Chapter 2, "Installing a Primary Site" explains how to install SMS 2.0 to function as a primary site server. It lists the hardware and software requirements of the program, and it explains the specific information you have to supply and the decisions you have to make during the installation process. Following installation, the modifications made by SMS setup is described. Post installation procedures, making computer resources client computers, and upgrading SMS 1.2 to SMS 2.0 conclude this chapter.
* Chapter 3, "Administering Inventory Collection" describes how to install, configure, and customize inventory collection. Explains the process of inventory collection and how to use Resource Explorer to view collected inventory.
* Chapter 4, "Distributing Software" addresses how packages, programs, collections and advertisements work together to complete the software distribution process to client computers. The final lesson in this chapter explains how to use the SMS Installer.
* Chapter 5, "SMS Software Metering" discusses SMS Software Metering. The roles played by software metering site systems and client computers are delineated. How to configure and manage software metering using the Software Metering application, concludes this chapter.
* Chapter 6, "Using Remote Tools" provides information on supporting various client computer operating systems using remote support utilities accessed through the SMS Administrator console.
* Chapter 7, "SMS Network Management Components" details the use of critical network management tools, including Network Monitor, the Network Monitor Control Tool, and the Event to Trap Translator.
* Chapter 8, "Querying the Database and Producing Reports" describes the purpose and construction of queries and reports. Query Builder and Crystal Info are explored in this chapter.
* Chapter 9, "Planning for SMS" explains how to successfully design and implement SMS 2.0.
* Chapter 10, "Configuring Site Systems" describes the site system creation and configuration process. The last lesson in this chapter describes how to monitor site systems with Network Trace.
* Chapter 11, "Site-to-Site Communications" describes how SMS communicates between sites. Details are provided that explain how to create an SMS hierarchy, and install a secondary site. The chapter concludes by explaining how to successfully remove SMS software from a computer acting as a primary or secondary site server.
* Chapter 12, "Configuring SMS Security" discusses how the file system, users, groups, and the WBEM/SMS Provider interface protect SMS from unauthorized access.
* Chapter 13, "Administering SMS Databases" discusses SQL Server features important to the operation of SMS 2.0, and how to maintain SMS in case a recovery procedure is required in the future. The last lesson in this chapter explains how to restore an SMS site.
* Chapter 14, "Monitoring and Troubleshooting SMS" addresses the major categories where problems occur in SMS 2.0 and the tools included with SMS 2.0 for analysis of various problems.
* The Appendix, "Questions and Answers" lists all of the practice and review questions from the book, showing suggested answers.
* The "Glossary" provides definitions of commonly used terms relating to SMS.

Sample Question and Answer for this exam:
QUESTION 1
You have installed an SMS primary site by using Custom Setup. During installation, you enabled NetWare Bindery support. You want information about NetWare binary client computers on your network to appear in your SMS site database.
What should you do?
A.Enable NetWare NDS Logon Discovery.
B.Enable NetWare NDS Client Installation.
C.Install Gateway Services for NetWare.
D.Install File and Print Services for NetWare.
E.Add Smls.scr to the logon script of the site server.
Answer: A


QUESTION 2
You want to use SNMP manager to view error messages that are generated on Microsoft Windows NT computers on your network.
What should you do?
A.Configure the SNMP Trap Receiver on the site server only.
B.Configure the SNMP Trap Receiver on all the Windows NT computers.
C.Configure the SNMP Event to Trap Translator on the site server.
D.Configure the SNMP Event to Trap Translator for all the Windows NT computers.
Answer: D

QUESTION 3
You install SMS client software on a computer running Microsoft Windows NT Workstation.
Which service is added by default to the workstation?
A.SMS Executive.
B.SMS Client Service.
C.Network Monitor.
D.SMSINVENTORY AGENT NT
E.SMS CLIENT CONFIG MANAGER
Answer: B

QUESTION 4
You are using Health Monitor to monitor a Microsoft Windows NT server computer on your network. Health Monitor reports a value of 100.00 in the Percent Critical column for the network interface component on the server computer. Health Monitor reports a value of 100.00 in the percent normal column for the other components on the server computer.
What is the most likely cause of the value reported for the network interface?
A.An IP address conflict was detected.
B.Packets are being rejected by the router.
C.Many collisions are occurring on the network.
D.The SNMP service is not installed.
E.Network Monitor is not installed.
Answer: D

QUESTION 5
A Microsoft Windows NT server computer is configured as a client access point in your SMS site. You want to use Health Monitor the network interface component on the server computer.
What can you install on the server computer to make network interface information available?
A.WBEM
B.SNMP service.
C.Response probe.
D.Health Monitor console.
E.Network monitor.
Answer: B

More : Complete Question & Answer Exam 070-086

Labels: ,

Read more!
Posted by certkiller, 8:53 AM | 0 comments |

Certification

Welcome to my blog.

From now on you can learn about All Certification Sample Exam Question for :

So Always Watch This Blog...
Roll On...
Read more!
Posted by certkiller, Saturday, April 7, 2007 6:12 PM | 0 comments |

//-->