You are working as the administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a DMZ that contains a two-node Network Load Balancing cluster, which
is located in a data centre that is physically impenetrable to unauthorized persons.
The cluster servers run Windows Server Web Edition and host an e-commerce website. The NLB cluster uses a virtual IP address that can be accessed from the Internet.
What can you do to mitigate the cluster's most obvious security vulnerability?
A. Configure the cluster to require IPSec.
B. Configure the network cards to use packet filtering on all inbound traffic to the cluster.
C. Use EFS on the server hard disks.
D. Configure intrusion detection the servers on the DMZ.
E. Configure Mac addressing on the servers in the DMZ.
The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server.
The ABC.com domain contains two Active Directory sites named ABC-Site1 and ABC-Site2. ABC-Site1 contains a domain controller named ABC-DC1. ABC-Site2 contains a domain controller named ABC-DC2. Each domain controller is
configured as a DNS server and hosts the ABC.com Active Directory Integrated Zone.
Users in ABC-Site2 report that they are unable to log on to the domain.
On a client computer in ABC-Site2, you run the “nslookup ABC-DC2” command. The command returns the IP address of ABC-DC2.
You open Active Directory Users and Computers on the client computer but you are unable to connect to ABC-DC2.
How can you resolve this problem?
A. Run the ipconfig /registerdns command on ABC-DC2.
B. Configure a secondary zone on ABC-DC2 for the ABC.com domain and force replication from ABC-DC1.
C. Use Active Directory Sites and Services to force Active Directory replication.
D. Use the Services console to restart the Net Logon service on ABC-DC2.
The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server. Your instruction is to set up a child domain named us.ABC.com.
You install Windows Server on a new standalone server named ABC-DC03 and manually assign an IP address. You attempt to run dcpromo to promote ABC-DC03 to a domain controller. You select the new domain in an existing forest
option. The wizard prompts you for the network credentials to join the us.ABC.com to the ABC.com forest. You then receive an error message indicating that a domain controller in the ABC.com domain cannot be found.
How can you ensure that ABC-DC03 can be promoted to a domain controller in the us.ABC.com domain?
A. By installing the DNS Server service on ABC-DC03.
B. By creating a host (A) record for ABC-DC03 on a DNS server in the ABC.com domain.
C. By first joining ABC-DC03 to a workgroup named us.ABC.com.
D. By having the ABC-DC03 client DNS settings configured to use a DNS server in the ABC.com domain.
E. By creating a delegation on a ABC.com DNS server to delegate the us.ABC.com zone to ABC-DC03.
You administer your company's network. The network consists of a single Active Directory domain. All servers run Windows Server. The network contains a two-node server cluster. The company's security expert informs you that the
password on the domain user account that is used for the Cluster service has been compromised and must be changed immediately. Your actions should cause minimal or no disruption of the services provided by the cluster because the
cluster is running a mission-critical application.
Which of the following should you do?
A. Use Active Directory Users and Computers to reset the password.
B. Use the Services console to change the password on any one of the cluster nodes.
C. Use the Cluster command with the appropriate options.
D. Use the dsmod user command with the appropriate options.
E. Use the dsmod computer command with the appropriate options.
You are the network administrator for your company's network. The network consists of two Active Directory domains: lmiweb.com and hr.lmiweb.com. The lmiweb.com domain supports most of the company's user accounts and resources.
The hr.lmiweb.com domain contains the user accounts and resources for the company's human resources department.
The company has deployed an extensive 802.11b wireless network. Access points (APs) have been deployed throughout the company to provide users in all departments with wireless connectivity and serve as bridges to the wired LAN. A
total of 325 users, including all members of hr.lmiweb.com, have been issued laptops with 802.11bcompliant network adapters. No other computers have wireless connectivity. All wireless LANs have Wired Equivalent Privacy (WEP) enabled
to secure these communications.
Human resources users work throughout the company providing employee training and informational seminars. These users require access to the wireless LAN in all company locations. You must ensure that all human resources data is as
secure as possible as it is transmitted across the wireless LAN. Only users with accounts in only specific users/computers groups should be able to access the human resources division's wireless LAN. In addition, users without accounts in
this domain should not be able to view or select the LAN from their list of available networks.
What should you do? Each correct answer presents part of the solution. (Choose three.)
A. Configure MAC filtering on each department's wireless LAN.
B. Configure MAC filtering on the human resources wireless LAN.
C. Enable Service Set Identifier (SSID) broadcasting on each department's access point.
D. Configure a unique Service Set Identifier (SSID) for each department's wireless LAN.
E. Configure a unique Service Set Identifier (SSID) for the human resources wireless LAN.
F. Enable Service Set Identifier (SSID) broadcasting on all the human resources access points.
G. Disable Service Set Identifier (SSID) broadcasting on all the human resources access points.
You administer your company's network. The network consists of a single Active Directory domain. All servers run Windows Server. The network contains a two-node server cluster. The company's security expert informs you that the password on the domain user account that is used for the Cluster service has been compromised and must be changed immediately. Your actions should cause minimal or no disruption of the services provided by the cluster because the cluster is running a mission-critical application.
Which of the following should you do?
A. Use Active Directory Users and Computers to reset the password.
B. Use the Services console to change the password on any one of the cluster nodes.
C. Use the Cluster command with the appropriate options.
D. Use the dsmod user command with the appropriate options.
E. Use the dsmod computer command with the appropriate options.
You have configured a WAP using the EAP-TLS protocol. The WAP is connected to a LAN with a Windows Server server. Which of the following additional tasks may be necessary to ensure that wireless clients can connect? (Choose all that apply.)
A. Enable PPP authentication.
B. Issue computer certificates to clients.
C. Issue user certificates or smart cards to users.
D. Install and configure IAS.
You have recently purchased a new single-CPU, Intel Xeon-based server. This hardware will be used to run a multithreaded CPU-intensive application. How can you ensure that the application performs at its best on the hardware provided?
A. Turn on hyperthreading.
B. Add a second CPU.
C. Boost the processing priority of the applications threads.
D. Disable hyperthreading.
You have been hired as a consultant to help deploy IPSec for the network of a mediumsize manufacturing firm that is developing a number of new products and must share sensitive data about its products over the network. As part of the planning process, you must determine the best authentication method to use with IPSec. What are the authentication methods that can be used with IPSec? (Select all that apply.)
A. Kerberos v5
B. Perfect Forward Secrecy (PFS)
C. Shared secret
D. Diffie-Hellman groups
You work as the network administrator at ABC.com. The ABC.com network consists of a domain named ABC.com.
ABC.com has several subsidiary companies whose Web sites and DNS zones are hosted on servers at ABC.com.
What actions must you take to allow the DNS server at ABC.com to generate a report of the listed zones on a weekly basis?
A. You need to utilize the ipconfig/registerdns.
B. You need to NetMon utility on the DNS server.
C. You need to utilize the dnscmd utility on the DNS server.
D. You need to utilize the ADSIEdit utility on the DNS server.