You are on page 1of 7

Correction Imagine CUP 2008 Test 4

Jean-Benoit PAUX
SupporTech INSA .NET
INSA de Lyon
Rédaction : 12/2007

Question 1 of 30
Which of the following are correct about Domain Local groups?
 Domain Local Groups can have rights in any domain
 Domain Local Groups can have members from any domain
 Domain Local Groups can only have members from its own domain
 Domain Local Groups can only have local SAM members

Question 2 of 30
Intrusion Detection (IDS) and Intrusion Prevention (IPS) Systems are designed to detect intrusions on
a network and inform administrators of the suspicious activity. Which statement best defines the
difference between IPS and IDS systems?
 IDS detects intrusions and alerts administrators
 IPS detects and stops network traffic to and/or from the suspicious connection
 IDS detects and stops network traffic to and/or from the suspicious connection
 IPS solutions can be host-based, IDS solutions cannot

Question 3 of 30
Windows 2008 new Network Access Protection (NAP) is designed to identify vulnerabilities in
systems before they connect to the corporate network. Which of the following Windows 2003
technologies is being replaced by NAP?
 Encrypting File System
 Network Access Control
 Quarantine Policy Check
 Intelligent Network Quarantine Machine

Question 4 of 30
Spammers are sending thousands of messages to invalid recipients at your company. As an
administrator for the messaging systems, your manager has instructed you to configure your
Exchange 2003 server to only accept messages for accounts in Active Directory. Which feature is
enabled to prevent delivery of e-mail to accounts that don’t exist in Active Directory?
 Sender Policy framework (SPF)
 Recipient Filtering
 Tar Pitting
 SenderID
Question 5 of 30
You need to select the architecture for Exchange 2007 that will give you automatic redundancy in the
case of a server or storage failure. Which option is best ?
 Implement Continuous Local Backup on the Exchange 2007 mailbox server.
 Implement Exchange 2007 in a virtual server and copy the virtual server to another host each
night.
 Implement Clustered Continuous Replication on the Exchange 2007 mailbox server.
 Implement a Single Copy Cluster on the Exchange 2007 mailbox server.

Question 6 of 30
Which one of the following components is included in SharePoint Server 2007 Enterprise when the
product is installed on a server using the installation wizard ?
 Windows SharePoint Services v3
 Internet Information Services v6
 SharePoint Designer 2007
 Internet Security and Acceleration Server 2006

Question 7 of 30
You are the server administrator at a small company. You have just built a Windows Server 2003
Enterprise Cluster to be used as a file server. From the first node, you can see that there are 4 disks
available, 1 for the operating system and 3 that will be used to host files. You attempt to create a
Shared Disk resource in Cluster Admin and you cannot see any disks available. What is the most likely
problem?
 You are using SATA disks instead of SCSI disks
 The disks are configured as dynamic and not basic
 The disks have not been initialized yet
 The disks are larger than 250GB

Question 8 of 30
Your Windows XP SP2 workstations have come under attack from recent viruses, spyware, and
exploits. What is a simple and effective way to reduce their exposure to these threats?
 Run XP Diagnostics
 Turn on Threat Mitigation Detector
 Enable the XP SP2 Firewall
 Enable the XP Spyware Center

Question 9 of 30
You need to force Active Directory replication from the command line of a domain controller that has
the Windows Server 2003 Support tools installed. Replication must be forced across site boundaries
as well. What is the command line string that would properly force AD replication across sites?
 repadmin /syncall /E
 replmon /syncall /E
 repadmin /syncall /A
 replmon /syncall /A

Question 10 of 30
You are the network administrator at your company and use DHCP to assign addresses. What unique
attribute must you specify to create a DHCP reservation for a computer?
 MAC address
 Serial number
 Phone number
 System name

Question 11 of 30
You are the network administrator for your company. Which port should you open in the firewall to
allow access to remote Terminal Service computers?
 Port 389
 Port 189
 Port 3389
 Port 25

Question 12 of 30
You have just been handed a project to push a MSI package to 2000 desktops. If you had SMS in
place this would be an easy task, however the company has not purchased SMS yet. How would you
automate the installation of this MSI?
 AD installation service
 Create a custom script
 Have users manually install it
 Group Policy software installation

Question 13 of 30
The acronym RBAC stands for what?
 Rights Based Access Control
 Required Before Automating Commands
 Role Based Access Command
 Role Based Access Control

Question 14 of 30
You have completed an Outlook 2007/ Exchange 2007 implementation two months ago. A user just
returned from a 6-month leave of absence with her laptop and her Outlook 2003 reports that it
cannot connect to the server. Why can’t she connect to the server?
 The user profile is incorrect
 You have answered “No”• to the following question: "Do you have any client computers
running Outlook 2003 and earlier or Entourage in your organization?"
 You have answered “Yes”• to the following question: "You have removed any client
computers running Outlook 2003 and earlier or Entourage in your organization"
 The edge-sync server is not synced with Exchange 2007

Question 15 of 30
You are the Domain Administrator for the company network. You want to raise the domain
functional level to Windows Server 2003.Which tool do you use?
 Active Directory Users and Computers
 Active Directory Sites and Services
 NTDSUTIL
 DCPROMO

Question 16 of 30
You are the networking administrator for your company. Your servers run Windows 2003. You are
tasked with troubleshooting system performance on one of your Domain Controllers. You suspect
bad or inadequate memory but, first you want to check that the page file size and location are
configured properly. Where would you look to find the current configuration of page file?
 The Performance section in the Advanced tab of System Properties
 Security Center in the Control Panel
 Task Manager
 Administrative Tools

Question 17 of 30
You frequently need to monitor the Security event logs of your company’s Windows XP workstations.
Most of the workstations in the distributed domain run Windows Vista. What is the best way to do
this?
 Create a Saved Query in Active Directory Users and Computers
 Create an Excel spreadsheet listing each of the XP machines and their OUs
 Move all the XP machines to the same OU
 Add all the XP workstations to a new XP Workstations Global Security Group

Question 18 of 30
You are the messaging administrator for your company. Your messaging servers run Exchange 2007
and the workstations run Outlook 2007. You have been tasked with allowing the IT department to
demote Level 1 attachments to a Level 2 status in Outlook so they are able to view and download the
files from e-mail messages. Which of the following tools would you use to accomplish the task?
 Exchange Management Console
 Group Policy
 Office Customization Tool
 Either A or C
Question 19 of 30
What PowerShell feature makes it more usable then other command line shells?
 PowerShell can be called from within the cmd - command line shell
 PowerShell can be used to stop executables
 PowerShell is an object based shell
 PowerShell has an out-csv command

Question 20 of 30
Window Software Update Services (WSUS) is a patch management solution for Windows networks
that supplies service packs, security patches, and more to Windows clients and servers. What version
of Windows Software Update Services (WSUS) is required to provide updates to Windows Vista
clients and Windows 2008 servers?
 Version 1.0
 Version 2.0
 Version 3.0
 Version 4.0

Question 21 of 30
Which group has the minimum rights you must have in order to administer Active Directory Sites?
 Domain Admin
 Account Operator
 Enterprise Admin
 Schema Admin

Question 22 of 30
A user needs to create a PDF from a Word 2007 document. They should:
 Download Adobe PDF maker from the Internet and after installing the application select print
and then choose the new PDF printer
 Download and Install Adobe PDF writer from the Internet and after installing the application
select print and then choose the new PDF printer
 Download and install the “save as PDF”• add on to Office 2007 and after installing select
print and then choose the new PDF printer
 Download and install the “save as PDF” add on to Office 2007 and after installing select
save as PDF or XPS

Question 23 of 30
By default, what happens to a document when you upload it to a document library in SharePoint
Server 2007 by accessing the Upload drop-down menu, browse for the appropriate document, and
then click OK :
 The site administrator is emailed to approve the upload
 The document is uploaded to the SQL 2005 or SQL Express database
 A workflow is started to route the document for approval
 The document is uploaded to the SQL 2005 or SQL Express database and then the source
document is tagged as read-only

Question 24 of 30
You are the administrator of you company’s printers and print servers. Five users in the Accounting
department commonly need to print reports at the same time from three high speed printers. It is
important that the reports be printed as fast as possible. What should you do?
 Connect the printers directly to the users’ workstations
 Assign a high priority for the five users in Accounting
 Create a printer pool of the three high speed printers
 Prevent other users from using the three high speed printers

Question 25 of 30
Which is not a functionality of the PDC Emulator in Windows Server 2003 Active Directory?
 Account Lockout is processed by the PDC Emulator
 By default, all editing or creation of Group Policy Objects (GPO) is done from the GPO copy
found in the PDC Emulator's SYSVOL share.
 Time Synchronization
 All Password Changes.

Question 26 of 30
You need to move the PDC role from one domain controller to another domain controller. What tool
would you use?
 Active Directory Domains and Trusts
 Active Directory Sites and Services
 Active Directory Users and Computers
 DNS

Question 27 of 30
Windows Vista introduces the new security feature “User Account Control”•, which is designed to
prevent unauthorized or accidental changes to the operation system. Windows Vista changes how
certain tasks are run and who has rights to run them. In Windows XP, all of the following changes
require administrative rights. When User Account Control is enabled, which of the following changes
do not require administrative rights in Windows Vista?
 Creating and configuring Virtual Private Network connections
 Installing software
 Configuring Windows Firewall
 Configuring Remote Desktop Settings
Question 28 of 30
On a SharePoint Server 2007 “home”• page (such as http://servname/sites/sales/default.aspx) which
menu or icon would I access to log in as a different user?
 The Help icon
 The Welcome username drop-down menu
 The My Site menu
 The My Links menu

Question 29 of 30
Which DNS zone resolves an IP address to a fully qualified host names?
 Forward Lookup Zone
 Reverse Lookup Zone
 Stub Zone
 DNS Zone

Question 30 of 30
You are in charge of supporting office applications. A user has been given a task to send 30,000
copies of the same message to 30,000 contacts. How would you help this user automate this task?
 using Excel, create a formula to import the contacts and message
 using Word, use the automation wizard in help and support
 using Word, use the mail merge function to assist the user
 ask the user to create a message for each contact, automation is not possible

You might also like