Вы находитесь на странице: 1из 2

M icrosoft Windows Server 2003 Network I nfrastructure

1. As a newly recruited network administrator of a company your boss has told


you that the network I D of this network is 192.168.1.1 and subnet mask is
255.255.255.240 and has two subnets, but he wanted to create a new subnet for
I T and M arketing departments. What is the total number of subnets that can be
created from the existing subnet mask?
A. 5
B. 4
C. 14
D. 41
Answer: C
2. What is the maximum number of PPTP and L2TP connections that can be
supported on a Windows 2003 Enterprise edition?
A. 1000 and 5000
B. 1000 and 1500
C. 1000 and 1000
D. 5000 and 1000
Answer: C
3. As part of trouble shooting errors in a VPN connection, what logs must be checked?
A. IPSec logging
B. Event viewer
C. VPNSec Log
D. All of above
Answer: a
4. A network has an unauthorized DHCP server. What is the utility to detect this?
A. DHCPUnatho
B. DetectDHCP
C. DHCPLOC
D. There is no way to detect an authorised DHCP server
Answer: C
5. What is the recommended way for making DNS servers aware of other namespaces?
A. STUB Zone
B. Conditional Forwarding
C. Forward lookup
D. Reverse lookup
Answer: B
6. What is the broadcast address of the subnet 192.18.12.128 / 255.255.255.224 and
address range 192.18.12.129 through 192.18.12.158?
A. 192.18.12.159
B. 192.18.12.128
C. 192.18.12.158
D. 192.18.12.129
Answer: D
7. Which is the best option for troubleshooting name resolution problems?
A. NSlookup
B. Systems Monitor
C. DNS log in Event Viewer
D. Network Monitor
Answer: A
8. You have installed a Windows Server 2003 DNS server, but because of security
reasons, you have to install this behind a firewall. What port on the firewall must be
opened so that users can access the server?
A. IP and UDP port 42
B. UDP and TCP port 53
C. TCP 53 but not UDP
D. PPTP and UDP 21
Answer: B
9. I n an I PSec tunnel what types of traffic can be secured?
A. Multicast
B. Unicast
C. Kerberos
D. Resourse Reservation Protocol(RSVP)
Answer: B
10. An administrator has to choose between compatibility at the same time security is
the top most priority for implementing a Virtual Private Network?
A. PPPoE
B. LT2P
C. PPTP
D. PPP
Answer: B

Вам также может понравиться