Topic Implementing Managing and Maintaining Routing and Remote Access Questions

Part 1 Configure Routing and Remote Access user authentication. A Configure remote access authentication protocols.(3 Questions) You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The functional level of the domain is Windows Server 2003. The network configuration is shown in the exhibit. You need to configure a redundant secure Internet connection between the two offices. You install and enable Routing and Remote...

Info

You move the inventory application to TestKing2 and then remove TestKing3 from the network. You need to ensure that all client computers can connect to TestKing2 for both the accounting and inventory application and you do not want to modify the client computers. You need to minimize administrative time. A. Configure the network adapter on TestKing2 to use IP addresses 192.168.1.5 and 192.168.1.6. B. On TestKing1, add a CNAME DNS record that refers TestKing3 to...

Topic Miscellaneous Questions

The network is connected to the Internet through a Microsoft Internet Security and Acceleration (ISA) Server computer named Testking4. Testking4 is set to automatically configure client proxy settings. Your supervisor tells you to install Software Update Services (SUS) on a computer named Testking5. Testking5 is the only SUS server on your network. SUS installation must comply with the following limitations 1. Use the least amount of disk space on Testking5. 2. All updates must be tested...

You create a shared folder named Test King Docs on a member server named Test King Test King Docs will store project

You need to ensure that users can access previous version of the documents in TestKing Docs. A. Modify the Offline Settings option for TestKing Docs to make all files available offline. B. Configure shadow copies of the volume containing TestKing Docs. C. Use Task Scheduler to create a job that uses the Copy command to copy all changed documents to another folder every day. D. Use the Backup utility to schedule a backup of all changed documents every hour. Explanation Shadow Copies of Shared...

G K

A NAT server needs a minimum of two network connections. One connects to the public internet and one connects to the private LAN. When you configure a NAT server, you need to configure each network adapter as either a Public interface connected to the internet or a Private interface connected to private network. The question states that this is the network adapter that is connected to the Internet. Therefore, this network adapter must be configured as the public interface by selecting the...

Oyy

You need to ensure that King can immediately manage groups. Which two actions should you perform Each correct answer presents part of the solution. Choose two A. Modify the default security policy for each domain controller. Refresh the policy by using Secedit.exe. B. Modify the default security policy for the domain. Refresh the policy by using Gpupdate.exe. C. Modify the default security policy for the Domain Controllers organizational unit OU . Refresh the policy by using Secedit.exe. D....

Ports Select from these

DNS port number is TCP UDP 53. HTTP port number is TCP UDP 80. POP3 port number is TCP UDP 110. LDAP port number is TCP UDP 383. HTTPS port number is TCP UDP 443. Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide amp DVD Training System, Syngress Publishing Inc., Rockland, 2003, p. 732 You are a network administrator for TestKing. The network...

What should you do

In the Internet Explorer settings for the VPN dial-up connection on TestKing6, select the Bypass proxy server for local addresses check box. B. In the Internet Explorer settings for the VPN dial-up connection on TestKing6, enter 10.10.0.1 C. In the Internet Explorer settings for the VPN dial-up connection on TestKing6, select the Automatically detect settings check box. D. On the network properties for the 131.107.68.92 connection on ISA1, clear the Register this connection's addresses in...

Branch Properties

General Options Security Net working Redial alternpts Average redial intervals' Redial alternpts Average redial intervals' Answer Activate the Persistent connection as the Connection type tab in the Options Tab in the properties window. You also need to set the redial attempts higher than 15 in the Dialing policy tab. Explanation When a demand-dial connection has been created, you can configure it further using the Properties window for the connection. From the Options tab, configure the...

Xar

You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. All computers are members of the domain. The Secure Server Require Security IPSec policy is assigned to a file server named TestKing2. The policy is configured as shown in the exhibit. Users report that they cannot access shared folders on TestKing2. Users were able to access shared...

C

Create a new user account and add the account to only the built-in Domain Users groups. Log on to your client computer by using the new user account. Run all administrative tools by using the runas smartcard command. D. Create a new user account and add the account to the following built-in groups. Domain Users, Server Operators, and Account Operators. Log on to your client computer by using the new user account. Run all administrative tools by using the runas smartcard command. Explanation You...

Remove Access To Use All Windows Update Features Server 2003

The Secure templates define enhanced security settings that are least likely to impact application compatibility. For instance, the Security templates define stronger password, lockout, and audit settings. In addition to this, the Security templates limit the use of LAN Manager and NTLM authentication protocols by configuring clients to send only NTLMv2 responses and configuring servers to refuse LAN Manager responses. The securews.inf template is used to increase security on workstations and...

You Need To Configure The Dns Zone To Accommodate The New Unix Server. What Should You Do

You create a global group named TestKingDNS. You need to be able to assign the TestKingDNS global group necessary permissions to create and delete the child entries in the testking.com zone. A. Change the testking.internal zone to an Active Directory-integrated primary zone. B. Change the testking.internal zone to an Active Directory-integrated stub zone. C. Change the testking.com zone to an Active Directory-integrated primary zone. D. Change the testking.com zone to an Active...

On a server named Testking you configure Routing and Remote Access to be a VPN server Testking is configured to use

Each day, a vendor establishes a VPN connection to Testking1 and uploads data to Testking1. Only the vendor has remote access permissions for Testking1. You discover that the vendor has accessed others computers on the network. You need to prevent the vendor from gaining access to the network to which Testking1 is connected. A. From a command prompt on Testking1, run the route -p command. B. Create a remote access policy for the vendor. Add the NAS-Port-Type matches Virtual VPN condition for...