Leads4pass > Juniper > JNCIE-SP > JPR-961 > JPR-961 Online Practice Questions and Answers

JPR-961 Online Practice Questions and Answers

Questions 4

You administer your company's network. A single-domain Active Directory forest is configured on the network. All servers run Windows Server.

The network contains a server named Server5 that hosts confidential business datA. Access to Server5 must be restricted to only a few authorized personnel. You must ensure that those users, including designated Server5 administrators,

cannot share Server5's desktop with other users.

What should you do?

A. Disable Remote Assistance in the local policy on Server5.

B. Create a new OU, move Server5 to the OU, create a GPO that disables Remote Assistance, and link the GPO to the OU.

C. Create a new OU, move Server5 to the OU, create a GPO that disables Remote Desktop, and link the GPO to the OU.

D. Disable Remote Desktop in the local policy on Server5.

E. Disable Remote Assistance in System Properties on Server5.

F. Disable Remote Desktop in System Properties on Server5.

Buy Now
Questions 5

You are the administrator for your company's network. Your company's logical network design consists of a single Active Directory domain. All servers have the Windows Server operating system installed. All client computers run Windows

XP Professional.

Woody is the manager for the company. He uses his client computer to read and edit large documents from the publishing department. The computer is configured with a single basic disk consisting of two partitions. One partition is used as

the boot and system partition. The other partition hosts user data folders. Both partitions are formatted using NTFS. The user data partition contains shared folders and files that use both share and NTFS permissions to grant access to

employees in the editorial department.

Woody informs you that his computer is beginning to perform at a speed that is moderately slower than other client computers in the editorial department. You use System Monitor and discover that a disk bottleneck exists.

How can Woody improve performance on this computer?

A. Defragment the hard disk.

B. Reformat the data partition using FAT32.

C. Convert the hard disk to a dynamic disk.

D. Delete the two existing partitions on the hard disk, and create a single partition.

Buy Now
Questions 6

You are your company's network administrator. The network consists of a single subnet. All servers run Windows Server. The network is connected to the Internet through a private WAN link. A computer named Server1 provides Internet

access for the network. Server1 is equipped with two NICs, and Internet Connection Sharing (ICS) is enabled on the NIC that is connected to the Internet.

Your company employs several telecommuters who work from their homes. The remote employees require some files that contain information about the company's business operations. Those files are updated on a daily basis. To provide the

remote employees with those files, you set up an FTP site on a computer named FTPSrv.

You must ensure that the users on the corporate network can access Internet Web sites and that the remote employees can download the necessary files from FTPSrv. The corporate network must be protected against possible Internet-

based attacks. Access to the corporate network from the Internet must be restricted to only the FTP site on FTPSrv.

What should you do?

A. On FTPSrv, enable Internet Connection Firewall, and specify that FTP traffic be allowed to pass to FTPSrv.

B. On Server1, enable Internet Connection Firewall, and specify that FTP traffic be allowed to pass to FTPSrv.

C. Configure Server1 to use IPSec for all communications on the NIC that is connected to the Internet.

D. On Server1, enable Internet Connection Firewall, and configure it to allow only HTTP and FTP traffic to pass to the corporate network.

Buy Now
Questions 7

Mark works as a Network Administrator for ABC.com. The company has a Windows domainbased network. The domain contains four Windows servers and 500 Windows Professional client computers.

The company's Marketing department uses a member server named Fserv that stores confidential files. The files are stored in a folder named DATA. The Marketing department users are members of a group named Market. The NTFS

permissions on the DATA folder and files in that folder allow access only to the Administrators group and the Market group.

The NTFS permissions are configured to allow full control on the DATA folder. The share permissions are the default permissions. Mark wants to track users who attempt to gain access to files in the DATA folder on Fserv. For this purpose,

he configures auditing on the DATA folder and files in that folder. He configures auditing on the Failed attempts for each access type on the Everyone group. When he checks the auditing configuration by attempting to access the files with a

domain user account that does not have access permissions to the files, he receives an "Access Denied" message. However, this Failed attempt does not appear in the security log on Fserv. What will Mark do to resolve the issue?

A. Grant the Generate security audits privilege to the Fserv computer account.

B. Enable the Audit object access policy for Failed and Successful attempts in a new Group Policy object (GPO) that applies only to Fserv.

C. Configure the auditing entries to apply to the Administrators group and the Market group, instead of the Everyone group.

D. Enable the Audit object access policy for Failed attempts in a new Group Policy object (GPO) that applies only to Fserv.

Buy Now
Questions 8

Your network is running three DNS servers, NS1, NS2, and NS3. NS1 is running Windows Server, whereas NS2 and NS3 are still running Windows NT 4.0. In reviewing the error log on NS1, you notice an error that lists NOTIMPL(4) being returned by NS3.What does this error indicate?

A. NS3 does not support extended DNS (EDNS0).

B. NS1 does not support extended DNS (EDNS0).

C. The OPT record received from NS3 contained an illegal Time-To-Live.

D. The OPT record needs to be added to all three name servers.

Buy Now
Questions 9

You’ve just created a new zone in DNS on a Windows Server -based computer. You check the zone and notice that the only records in it are the SOA and NS RRs. You check the configuration and see that the zone is configured to accept dynamic updates. What should you do next?

A. Manually add all RR for the zone including A, CNAME, PTR, and SRV records.

B. Manually add A RR for all hosts that cannot use dynamic updating.

C. Manually add A RR and PTR RR for all hosts that will be using dynamic updating.

D. Manually initiate a zone transfer to replicate all the needed RR to the new zone.

Buy Now
Questions 10

You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. The servers at the ABC.com network run Windows Server. ABC.com has a subsidiary named Test Labs, Inc. that has a domain

named testlabs.com.

The ABC.com network has a DNS server named ABC-SR05. ABC-SR05 acts as a secondary zone for testlabs.com

What actions must you take to track when the DNS server at Test Labs, Inc. sends notifications of modifications in the zone of testlabs.com to ABC-SR05?

A. You must run the gpresult command in verbose mode.

B. You must select debug logging and set the log to store Notification events on ABC- SR05.

C. You must run the secedit command in analysis mode.

D. You must configure a two-way initiated demand-dial connection.

Buy Now
Questions 11

You are working as the administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a DMZ that contains a two-node Network Load Balancing cluster, which

is located in a data centre that is physically impenetrable to unauthorized persons.

The cluster servers run Windows Server Web Edition and host an e-commerce website. The NLB cluster uses a virtual IP address that can be accessed from the Internet.

What can you do to mitigate the cluster's most obvious security vulnerability?

A. Configure the cluster to require IPSec.

B. Configure the network cards to use packet filtering on all inbound traffic to the cluster.

C. Use EFS on the server hard disks.

D. Configure intrusion detection the servers on the DMZ.

E. Configure Mac addressing on the servers in the DMZ.

Buy Now
Questions 12

The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server and all client computers run Windows XP Professional.

A domain controller named ABC-DC1 is configured as a DNS server. DC1 hosts the DNS zone for the ABC.com internal LAN.

An external DNS server named ABC-DNS1 hosts the DNS zone for the ABC.com external website and is configured with root hints. ABC-DNS1 is outside of the network firewall.

You need to protect the client computers by minimizing the risk of DNS-related attacks from the Internet, without impacting on their access to Internet-based sites.

How should you configure the DNS servers and client computers?

A. DNS forwarding should be configured on ABC-DNS1 for ABC-DC1 and client computers must be configured to use ABC-DC1.

B. The firewall should be configured to block all DNS traffic.

C. DNS forwarding should be configured on ABC-DC1 for ABC-DNS1 and client computers must be configured to use ABC-DNS1.

D. A root zone should be added to ABC-DC1 and client computers must be configured to use ABC-DC1.

Buy Now
Questions 13

The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server and all client computers run Windows XP Professional. The ABC.com network contains an application server named ABC-SR20.

You had to reboot ABC-SR20 after you installed a new service on it but the logon screen was not displayed once ABC-SR20 has rebooted. Your attempts to restore the server by using the Last Known Good Configuration and Safe Mode startup options also fail. You restore ABC-SR20 from backup. After later researching the problem, you discover that the service you installed was not compatible with a driver.

How could you configure the servers to enable you to recover from this type of failure as quickly as possible if this type of problem happens again?

A. By checking the hardware compatibility list before installing the service.

B. By installing the Recovery Console on the servers.

C. By configuring Automated System Recovery (ASR) backups.

D. By configuring the server hard disks in a RAID system.

Buy Now
Exam Code: JPR-961
Exam Name: Juniper Networks Certified Internet Expert (JNCIE-SP)
Last Update:
Questions: 65
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99