INSTANT DOWNLOAD WITH ANSWERS
TEST BANK 70-297 MCSE GUIDE TO DESIGNING A MICROSOFT WINDOWS SERVER 2003 ACTIVE DIRECTORY AND NETWORK INFRASTRUCTURE 1ST EDITION BY JAY ADAMSON
Chapter 6: Remote Access and Address Management TRUE/FALSE
- Whenever Windows Server 2003 is installed as a DC, it automatically becomes a Kerberos Key Distribution Center service.
ANS: T PTS: 1 REF: 394
- RIP Version 1 supports classless interdomain routing and variable-length subnet mask implementation.
ANS: F PTS: 1 REF: 398
- There is a limit to the number of OUs that can exist within an individual domain.
ANS: F PTS: 1 REF: 410-411
- Lease duration affects the amount of time that the DHCP server can be offline before problems arise.
ANS: T PTS: 1 REF: 443
- The dial-in permission set on a user account overrides the permission option in the Properties dialog box, except in the case of native-mode administration model, where all user accounts are set to Control Access Through Remote Access Policy.
ANS: T PTS: 1 REF: 413 MODIFIED TRUE/FALSE
- Authentication messages are defined in RFC 2800. _________________________
ANS: F, 2865 PTS: 1 REF: 423
- All RADIUS messages use UDP for transmission. _________________________
ANS: T PTS: 1 REF: 423
- A(n) scope can span up to a single subnet. _________________________
ANS: T PTS: 1 REF: 443
- The maximum number of hops for RIP networks is 15 routers. _________________________
ANS: T PTS: 1 REF: 398
- The Extensible Authentication Protocol is used to send passwords in open text. _________________________
ANS: F, Password Authentication PTS: 1 REF: 394 MULTIPLE CHOICE
- Which of the following is a standard Internet protocol for authenticating users and systems, and is the primary authentication protocol used by Windows Server 2003?
|a.||NTLM||c.||Kerberos Version 5|
|b.||.NET Passport Authentication||d.||EAP|
ANS: C PTS: 1 REF: 393
- Which of the following uses a very simple, plain-text authentication protocol?
|a.||Kerberos Version 5||c.||NTLM|
ANS: B PTS: 1 REF: 394
- _____ is the process of identifying a user.
ANS: D PTS: 1 REF: 411
- _____ is the process of allowing or denying a user access to a system and the objects on that system based on the user’s identity.
ANS: C PTS: 1 REF: 411
- _____ is the authentication protocol most commonly used by Internet service providers.
ANS: B PTS: 1 REF: 422
- A(n) _____ is a range of possible IP addresses on a network.
ANS: C PTS: 1 REF: 443
- A(n) _____ is a collection of scopes gathered together into a single administrative grouping.
ANS: A PTS: 1 REF: 444
- The _____ layer of the OSI model is responsible for the end-to-end integrity of data transmission.
ANS: C PTS: 1 REF: 390
- Which of the following provides both the Authentication Service and Ticket Granting Service that is required in Kerberos authentication?
ANS: D PTS: 1 REF: 394
- The Key Distribution Center Service account _____ is used to authenticate a DC when it is authenticating users or client computers in other domains.
ANS: B PTS: 1 REF: 396
- _____ options apply to all clients of the DHCP server. The main use would be for parameters common across all scopes installed on the server.
ANS: A PTS: 1 REF: 438
- A DHCP client will always request a renewal of its lease when _____ percent of the lease time has expired. If it fails to connect to the DHCP server, it will try again when _____ percent of the lease time is up.
|a.||30, 50||c.||50, 85.5|
|b.||40, 75||d.||50, 95.5|
ANS: C PTS: 1 REF: 442
- One of the main reasons for using superscopes is _____.
|a.||You need to remove the DHCP server from the subnet.|
|b.||The DHCP client cannot contact the DHCP server.|
|c.||A scope has too many IP addresses.|
|d.||You need to renumber the IP network and therefore move the clients from one set of addresses to another.|
ANS: D PTS: 1 REF: 444
- Which of the following protocols enables the use of Active Directory information during the authentication of Internet, intranet, and extranet users?
|a.||Kerberos Version 5||c.||NT LAN Manager|
|b.||.NET Passport Authentication||d.||Extensible Authentication Protocol|
ANS: B PTS: 1 REF: 393
- There are three levels of OSPF design: _____.
|a.||autonomous system design, area design, and network design|
|b.||subnet design, area design, and network design|
|c.||subnet design, host design, and network design|
|d.||autonomous system design, subnet design, and host design|
ANS: A PTS: 1 REF: 398
- RADIUS uses UDP ports _____.
|a.||65 and 92||c.||10 and 21|
|b.||1812 and 1813||d.||1645 and 1646|
ANS: B PTS: 1 REF: 423 YES/NO
- Will the definition of an extensive logging and auditing strategy lower the performance of your server on your network?
ANS: Y PTS: 1 REF: 424
- Is it necessary for a TCP/IP-based network to use DHCP?
ANS: Y PTS: 1 REF: 430
- Is it necessary for DHCP servers running on Windows NT 4.0 to register and be authorized by Active Directory?
ANS: N PTS: 1 REF: 439
- Kerberos tickets are maintained in a local cache and are aged. Do they have any value after they have expired?
ANS: N PTS: 1 REF: 395
- Can you store remote access policies on the server that hosts the RRAS?
ANS: Y PTS: 1 REF: 410 COMPLETION
- The default length of time Kerberos tickets are valid is ____________________ hours.
ANS:eight8 PTS: 1 REF: 396
- The ____________________ Protocol was designed as an extension to the Point-to-Point Protocol and provides greater extensibility and flexibility in the implementation of authentication methods for the PPP connection.
ANS:Extensible Authenticationextensible authentication PTS: 1 REF: 394
- You can determine whether your DHCP server has been authorized in Active Directory using the Active Directory ____________________ console.
ANS: Sites and Services PTS: 1 REF: 439
- The default lease time for a Widows Server 2003 server is ____________________ days.
ANS:eight8 PTS: 1 REF: 442
- A(n) ____________________ attack can be initiated on your computer by a hacker performing a large number of dynamic updates through the DHCP.
ANS:DoSdenial of service PTS: 1 REF: 445 MATCHING Match each item with a statement below.
|b.||Presentation layer||g.||Internet Authentication Service|
|d.||Kerberos Key Distribution Center||i.||Scope|
- Used for network and dial-up authentication.
- The dominant routable protocol.
- Performed when the client sends the user’s username and password to the server using an authentication protocol.
- Can be used to provide encryption and decryption services.
- RADIUS authentication message.
- Role is to authenticate Kerberos clients.
- Used to set aside a range or a pool of consecutive IP addresses that can be distributed to clients.
- Uses the data stored on the domain controller to verify authentication requests received through the RADIUS protocol.
- Set on a user account and denied by default.
- ANS: C PTS: 1 REF: 393
- ANS: A PTS: 1 REF: 390
- ANS: E PTS: 1 REF: 411
- ANS: B PTS: 1 REF: 390
- ANS: H PTS: 1 REF: 423
- ANS: D PTS: 1 REF: 394
- ANS: I PTS: 1 REF: 443
- ANS: G PTS: 1 REF: 422
- ANS: F PTS: 1 REF: 413
- List five security features of IPSec.
ANS:The features include: Authentication using digital signature to identify the sender Integrity through the use of hash algorithms, ensuring that the data has not been altered Privacy through encryption that protects the data from being read Anti-replay, which prevents unauthorized access by an attacker who resends packets Nonrepudiation through the use of public-key digital signatures that prove the message’s origin Dynamic rekeying that allows keys to be generated during communication so that the different transmissions are protected with different keys Key generation using the Diffie-Hillman key agreement algorithm, which allows computers to agree on a key without having to expose it Key lengths that are configurable to allow for export restrictions or highly sensitive transmissions PTS: 1 REF: 409-410
- For each layer in the OSI model, list the common remote access components.
ANS:Layer 7 FTP, SMTP, HTTP, RLOGIN, DHCP, BOOTPLayer 6 Lightweight Presentation ProtocolLayer 5 LDAP, DNS, NetBIOSLayer 4 TCP, DNS, NetBIOSLayer 3 IPLayer 2 CHAP, PPP, PPTPLayer 1 Analog, ISDN, ADSL, Frame Relay PTS: 1 REF: 391
- List three factors to be considered when designing your DHCP network.
ANS:Factors to be considered: Draw yourself a map of your network. Make sure you show each physical and logical subnet and the routers between the various subnets. If the network uses routers to subnet the network, do the routers support forwarding DHCP broadcasts? Most new routers do, but that option must be turned on. Sectioning the IP address range between two servers will provide fault tolerance. Depending on the speed and reliability of your network and the links between your subnets, the routers can be configured to forward DCHP broadcasts (or you could add a DMCP relay agent). If you are planning to the DHCP server to update DNS records for legacy clients, do not run the DHCP service on a domain controller. Doing so would cerate a security risk. Remember that the recommendation is that a single DHCP server can provide services for 10,000 or fewer clients and 1000 or fewer scopes; therefore, make sure you size your servers appropriately. DHCP servers access their disk drives very frequently. Make sure you use either a disk drive with a fast access time or a hardware RAID disk controller. If you are still using any Windows NT 4 domain controllers, make sure you have them upgraded to Windows Server 2003. PTS: 1 REF: 430-431
- What decisions do you need to make when creating a scope?
ANS:The decisions include: The starting and ending addresses of the range you want to use The subnet mask of the subnet in question Whether there are clients using static IP addresses within this range that will need to be excluded from the pool The amount of time the lease duration should be for the IP addresses leased from this scope The IP configuration information you want to pass to clients, in addition to the IP address and the subnet mask Whether you need to reserve specific IP addresses for specific clients PTS: 1 REF: 444
- In the administer-access-by-policy model in a Windows 2000 native or Windows Server 2003 domain, there are two alternatives for controlling access. List the two alternatives.
ANS:Set the remote access permissions on every user account to Control Access through Remote Access Policy. Determine your remote access permissions by the Remote Access Permission setting on the remote access policy. PTS: 1 REF: 416 Chapter 7: Service Sizing and Placement TRUE/FALSE
- The more Group Policy Objects a computer and user need to process at boot and logon, the longer the process will take.
ANS: T PTS: 1 REF: 464
- DCs should always be located in secure sites.
ANS: T PTS: 1 REF: 469
- Domain controllers automatically defragment their local copy of the Active Directory database every 24 hours.
ANS: T PTS: 1 REF: 482
- The sizing of each individual Application Directory Partition can be done precisely.
ANS: F PTS: 1 REF: 485
- The Domain Naming Master role must be assigned to at least two DCs in the forest.
ANS: F PTS: 1 REF: 504 MODIFIED TRUE/FALSE
- Active Directory can be used to store data relating to applications. _________________________
ANS: T PTS: 1 REF: 471
- Each Domain Controller houses a local copy of the Active Directory database. _________________________
ANS: T PTS: 1 REF: 486
- For DCs accessed by fewer than 1000 users, all four (database, logs, operating system, SYSVOL) components can be collocated on the same RAID 5 array. _________________________
ANS: F, RAID 1 PTS: 1 REF: 487
- A role should be seized only if the current holder cannot be contacted to transfer the role in a graceful manner. _________________________
ANS: T PTS: 1 REF: 514
- A FSMO role should be seized if the hosting DC is to be made unavailable for an extended period of time. _________________________
ANS: F, transferred PTS: 1 REF: 514 MULTIPLE CHOICE
- _____ house the Active Directory database.
|a.||Domain Naming Masters||c.||FQDNs|
|b.||Domain Controllers||d.||Application Directory Partitions|
ANS: B PTS: 1 REF: 468
- _____ is a database that is used to store objects that exist within the organization.
ANS: D PTS: 1 REF: 471
- Which of the following statements is correct?
|a.||Size of domain partition in GB = (number of users in domain/1000) * 0.7|
|b.||Size of domain partition in GB = (1000) * 0.4|
|c.||Size of domain partition in GB = (number of users in domain/1000) * 0.4|
|d.||Size of domain partition in GB = (number of users in domain/10) * 0.4|
ANS: C PTS: 1 REF: 479
- A(n) _____ can be used to store data pertinent to a particular application.
|a.||Application Directory Partition||c.||PDCe|
ANS: A PTS: 1 REF: 485
- Which of the following statements is correct?
|a.||If the domain controller requirement is 3.2GB then the global catalog requirement is 6.4GB.|
|b.||Each DC stores transaction log files relating to the database and a local operating system.|
|c.||If the number of resource records housed by a server is 100, the RAM requirement is 1MB.|
|d.||If the number of resource records housed by a server is 1000, the RAM requirement is 5MB.|
ANS: B PTS: 1 REF: 486
- Rather than directly provide answers to various questions and thus promote a member server to a DC manually, the process is automated using a(n) _____.
|a.||dcpromo answer file||c.||FSMO file|
ANS: A PTS: 1 REF: 494
- Dcpromo can be executed in the following way _____.
|a.||dcpromo /answerfile.txt||c.||dcpromo /answerfile.txt|
|b.||dcpromo = answer:answerfile.txt||d.||dcpromo /answer:answerfile.txt|
ANS: D PTS: 1 REF: 494
- What is the Domain Controller disk space requirement when there are 2000 users per domain?
ANS: A PTS: 1 REF: 499
- Each domain in a forest must have a unique _____.
ANS: C PTS: 1 REF: 504
- The DNS representation of the domain name is the _____.
ANS: B PTS: 1 REF: 504
- It is the job of the _____ to ensure that each domain created has a unique name within the forest.
|b.||Domain Naming Master||d.||PDC|
ANS: B PTS: 1 REF: 504
- The _____ exists as a partition within Active Directory and is replicated as a read-only partition to every DC in the forest.
ANS: C PTS: 1 REF: 505
- When a new security principal is created, it is assigned a unique _____.
ANS: C PTS: 1 REF: 509
- The _____ role is responsible for updating the referenced objects whenever changes are made in the source domain.
ANS: A PTS: 1 REF: 510
- The _____ role will be housed on the first DC built in the forest, by default.
|a.||infrastructure master||c.||Domain Naming Master|
ANS: C PTS: 1 REF: 510
- The _____ role will be housed on the first DC built in each domain in the forest, by default.
ANS: B PTS: 1 REF: 511 YES/NO
- Is there an associated replication traffic overhead with every Domain Controller deployed?
ANS: Y PTS: 1 REF: 470
- Does Microsoft advise that you place SYSVOL and the database on separate RAID arrays?
ANS: N PTS: 1 REF: 487
- Is the minimum requirement for Logs (DC component) at least 500 MB free space?
ANS: Y PTS: 1 REF: 487
- Is the domain controller requirement for 6000 users per domain approximately 1.6GB?
ANS: N PTS: 1 REF: 499
- Is the space requirement for GC servers equivalent to the space requirements of a DC in the same domain?
ANS: N PTS: 1 REF: 499 COMPLETION
- Startup and logon scripts are located in the SYSVOL share, which is replicated using the ____________________ System between each DC in the same domain.
ANS: File Replication PTS: 1 REF: 464
- In order that ADPs can be created and configured, the DC hosting the Domain Naming Master (DNM) FSMO role must first be upgraded to ____________________.
ANS: Windows Server 2003 PTS: 1 REF: 485
- The most popular approach to promoting servers to become DCs is the ____________________ approach.
ANS: manual PTS: 1 REF: 492
- The Active Directory “equivalent” of the Windows NT PDC is the ____________________.
ANS: PDCe PTS: 1 REF: 506
- The ____________________ role will be housed on the first DC built in each domain in the forest, by default.
ANS: Infrastructure Master PTS: 1 REF: 513 MATCHING Match each item with a statement below.
|a.||Transfer the role||f.||Active Directory database|
|d.||Startup and logon scripts||i.||Forestwide roles|
- Housed on precisely one DC at any one point in time.
- Should be thoroughly tested in an environment that simulates the actual production environment.
- House the Active Directory database.
- Allows at least 500MB free space.
- Used to implement all changes to GPOs, by default.
- Will be transferred to a DC in the same domain, or any DC in the forest if necessary.
- The preferred method of moving FSMO roles from one DC to another.
- Comprised of discrete partitions, or naming contexts.
- Will be transferred to another DC in the same domain.
- ANS: B PTS: 1 REF: 514
- ANS: D PTS: 1 REF: 464
- ANS: E PTS: 1 REF: 468
- ANS: G PTS: 1 REF: 487
- ANS: H PTS: 1 REF: 508
- ANS: I PTS: 1 REF: 514
- ANS: A PTS: 1 REF: 514
- ANS: F PTS: 1 REF: 478
- ANS: C PTS: 1 REF: 514
- When designing service placement, we must take into consideration the actual time to start up. What are the factors that will affect the actual time?
ANS:The factors include: Complexity of startup and logon scripts.Number of group policies processed for the computer and userNetwork speed from client to DC, DNS server, and GC PTS: 1 REF: 464
- List the four partitions supported by Windows Server 2003 Active Directory.
ANS:They include: SchemaConfigurationDomainApplication Directory partitions PTS: 1 REF: 478
- Before commencing with the promotion of a member server into a DC, several checks and best practices should be performed to ascertain whether the server is ready and able to be promoted. List five items on the pre-promotion checklist.
ANS:The checklist includes: Check event logs for boot-related issuesConfigure event logsConfigure servicesCheck IP configurationCheck network connectivity PTS: 1 REF: 490-491
- What is the Active Directory infrastructure requirement for providing a self-sufficient startup and logon?
ANS:The infrastructure requirement is: DC from the user’s domainGC from the user’s domainDNS server hosting forest root domain zoneDNS server hosting user’s domain zone PTS: 1 REF: 467-468
- What are the functions that should be performed by the designer or architect of an active Directory infrastructure deployment?
ANS:The functions include: Document each location and the number of users at the location. Assess the type of users at each location and determine if they require Active Directory authentication 24 hours per day, 7 days per week. Determine if the users require Active Directory authentication even in the event of a WAN failure. Create user population bandings Deploy the appropriate Active Directory infrastructure components to each location based on the user population banding assigned to that location and the other factors mentioned previously. PTS: 1 REF: 471-472