Top Posters
Since Sunday
5
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
A free membership is required to access uploaded content. Login or Register.

Windows 2000 Server Technologies.docx

Uploaded: 6 years ago
Contributor: redsmile
Category: Operating Systems
Type: Other
Rating: N/A
Helpful
Unhelpful
Filename:   Windows 2000 Server Technologies.docx (795.37 kB)
Page Count: 73
Credit Cost: 2
Views: 101
Last Download: N/A
Transcript
Implementing and Maintaining Highly Available Web Solutions with Microsoft Windows 2000 Server Technologies and Microsoft Application Center 2000 QUESTION 1: You are a domain administrator of Certkiller . Certkiller 's network consists of three domains, as shown in the exhibit. You are responsible for the sandiego. Certkiller .com domain. The sandiego. Certkiller .com domain contains user accounts for 50 of the employees in the finance department. Recently, a shared folder named FinanceA was created in the sandiego. Certkiller .com domain. FinanceA can be accessed by only those 50 employees. FinanceA contains forms that are used by the 50 employees. You are instructed to create a group on your domain controllers that will allow finance users whose user accounts are in global groups from the other domains to access Finance A. You must accomplish this goal while minimizing replication overhead. What should you do? A. Create a global group. Add the appropriate groups from the other domains to the global group. Assign the global group permissions for FinanceA. B. Create a domain local group. Add the appropriate groups from the other domains to the domain local group. Assign the domain local group permissions for FinanceA. C. Create a universal group. Add the appropriate groups from the other domains to the universal group. Assign the universal group permissions for FinanceA. D. Create a distribution group. Add the appropriate groups from the other domains to the distribution group. Assign the distribution group permissions for FinanceA. Answer: B QUESTION 2: You are a network administrator for Certkiller . Company executives plan to deploy 25 new Windows 2000 member servers and 25 new Windows 2000 domain controllers. All Active Directory server accounts are in the default locations. You need to install 20 hot fixes as part of the operating system installation on the new computers. The hot fixes must be installed on any current Windows 2000 Server computers. You create a distribution folder for the hot fixes. What should you do next? Use Setup Manager to create an answer file that will run a script to install the hot fixes from the distribution folder during setup. Use Setup Manager to create an answer file. Add lines in the Cmdlines.txt file to install the hot fixes from the distribution folder during setup. C. Create a script that will install all of the hot fixes automatically. Configure a Group Policy object (GPO) and link it to the domain level to run this script on startup. D. Create a Group Policy object (GPO) and link it to the Domain Controllers OU and to the Computers container. Configure the GPO to assign the hot fixes as assigned applications. Answer: B QUESTION 3: You are a domain administrator for Certkiller . The network contains three Windows 2000 Server domain controllers and one Windows 2000 Server member server. The member server contains three hard disks, which use software RAID-5. The member server also contains an ISA card that has 12 modems attached for Routing and Remote Access dial-up access. Usage of the member server's disk subsystem is occasionally as much as 80 percent. This level of usage results in slow response times for dial-in users. You run System Monitor on the member server. The System Monitor results are shown in the following table. Object Counter Average value System Processor Queue 1 Length Processor % Processor Time 56 Processor Interrupts/sec 320 PhysicalDisk Disk Queue Length 1 PhysicalDisk Disk Bytes/sec 1900 KB PhysicalDisk %Disk Time 74 Memory Page Faults/sec 10 Memory Page Reads/sec 9 Memory Pages/sec 50 You want to maximize the performance of the member server. What should you do? Increase the number of hard disks in the RAID-5 system. Upgrade the RAM. Upgrade the processor. Upgrade the ISA card to PCI. Answer: B QUESTION 4: You are the administrator of a Windows 2000 Server computer in Certkiller 's accounting department. The server runs Terminal Services in application mode. All users in the accounting department run their business applications in Terminal Services sessions. A manager in the accounting department runs an application on the server. The application requires three hours to process financial and accounting data. This application must be run every Friday morning so that the data will be available to the director of accounting by 5:00 P.M. Friday afternoon. Users in the accounting department report that when this application is running, the performance of other business applications is significantly slower. You need to allow the accounting application to run with the least amount of performance impact on the other business applications. What should you do? Configure all other business applications to have High priority. Configure all other business applications to have RealTime priority. Configure the accounting application to have AboveNormal priority. Configure the accounting application to have BelowNormal priority. Answer: D QUESTION 5: You are the administrator of a Windows NT Server computer named Certkiller 1. Certkiller 1 is the Routing and Remote Access server for your network. Certkiller 1 is connected to the Internet and is configured to provide virtual private network (VPN) connections to your intranet. You want to prevent unauthorized users from gaining access to your network by using VPN connections on Certkiller 1. You want to ensure that only VPN connections are used on Certkiller 1. What should you do? Configure the VPN connection on computers that connect to Certkiller 1 to require data encryption. Configure the VPN connection on computers that connect to Certkiller 1 to use the Extensible Authentication Protocol (EAP). Configure Routing and Remote Access Service (RRAS) on Certkiller 1 to disable IP forwarding. Configure TCP/IP on Certkiller 1 to enable PPTP filtering for the network adapter that is connected to the Internet. Answer: D QUESTION 6: You are the administrator of a network that consists of a single Windows NT domain. The domain contains Windows NT Server computers and Windows 2000 Professional computers. A Windows NT Server computer named Certkiller 1 provides DHCP, WINS, and DNS services. The DNS service is used to provide name resolution for access to Certkiller 's intranet Web site. The domain also contains UNIX client computers that use a UNIX-based DNS service. The UNIX DNS server is configured to forward unresolved name resolution requests to Certkiller 1's DNS service. You want to enable the UNIX computers to access new Windows NT Server computers when they are added to the network. You want the UNIX computers to be able to connect to the Windows NT Server computer by using host names rather than IP addresses. You want to accomplish this task by using the least amount of ongoing administrative effort. What should you do? Configure the WINS service to have static mapping for each UNIX client computer. Configure Certkiller 1's DNS service to use WINS name resolution. Configure Certkiller 1's WINS service to use the UNIX DNS server as a push partner. Configure a HOSTS file on Certkiller 1 that contains an entry for each Windows NT Server computer. Answer: B QUESTION 7: You are the Webmaster of Certkiller 's intranet. The intranet is hosted by a Windows NT Server computer. You need to install a new server component that Web developers will use to create a new service. The new component is an ISAPI-based application. You install the component in a virtual directory named Apps. You define the Read permission and enable all Execute permissions. When the developers begin to test the new service that uses the new component, they receive an error message that states that the component could not be started. You view the properties of the intranet Web site, which are shown in the exhibit. You need to ensure that developers can use the component. What should you do? Configure the Apps virtual directory to run at an Application Protection level of Medium. Configure the Apps virtual directory to run at an Application Protection level of High. Configure the Web site Application Settings to enable Scripts and Executables. Configure the Web site to remove the Default Application. Answer: C QUESTION 8: You are the administrator of a Windows NT domain. The domain contains Windows NT Server computers and Windows 2000 Professional computers. You are responsible for supporting all of the computers in the domain. Another group in Certkiller manages the network routers. A portion of your network is shown in the exhibit. A user named Jack is using the computer named Client1. Jack reports that she cannot access a resource on Certkiller 1. You verify that you can connect to Certkiller 1 from the computer named Nina. You want to find out whether Client1 can connect to Certkiller 1. What should you do? On Client1, run the ping command to test the address of 10.10.30.1. On Client1, run the tracert command to test the address of 10.10.14.25. On Certkiller 1, run the ping command to test the address of 10.10.14.1. On Certkiller 1, run the tracert command to test the address of 10.10.13.1. Answer: B QUESTION 9: You are the administrator of a Windows NT Server network that contains Windows 2000 Professional computers. The network is divided into five TCP/IP subnets, and each subnet has its own Windows NT Server computer. You add a Windows NT Server computer named Certkiller 1 to one of the subnets, and you configure the DHCP Server on Certkiller 1. You create a DHCP scope for each of the subnets. You configure all of the client computers to use DHCP. When the client computers start, only computers on the same subnet as Certkiller 1 can obtain DHCP addresses. You want to allow all of the client computers to obtain their TCP/IP configurations from Certkiller 1. You want to accomplish this task by using the least amount of administrative effort. What should you do? A. Configure the DHCP Server service on each Windows NT Server computer, and assign an IP scope for each subnet. Configure the DHCP Server service on Certkiller 1 to exclude the IP addresses of the routers from the subnet scopes you have defined. Configure the DHCP Relay Agent on each Windows NT Server computer. Configure a WINS service on each Windows NT Server computer. Answer: C QUESTION 10: You are the administrator of a Windows NT Server computer. The server runs Microsoft Internet Information Server (IIS) and hosts a Web site. The Web site is configured so that it has the default settings. Company employees access the Web site by means of Certkiller intranet and the Internet. The first page that employees see when they access the Web site is named Default.asp. This page allows them to provide a user name and password. The page then redirects employees to a menu of available options. You want to ensure that employee user names and passwords are not transmitted over the Internet in plain text. You also want to ensure that the server's performance is minimally affected by employees who access the Web site. You install a server encryption certificate on the server. What should you do next? Configure Default.asp to disallow anonymous access. Configure Default.asp to require secure communications for all connections. Configure the Web site to require secure communications for all connections. Configure the Web site to allow Windows NT Challenge/Response authentication. Answer: B QUESTION 11: You are the administrator of a Windows NT Server computer. The computer is used as a print server and shared 20 printers. The server contains two hard disks, which are named drive C and drive D. Drive C has a 2-GB capacity and contains all of the operating system files. Drive D has a 10-GB capacity and contains no files. During a maintenance inspection, you notice that drive C has only 3 MB of free disk space. You need to make space available on drive C and prevent the drive from filling up again. What should you do? Disable the creation of memory dump files when a STOP error occurs. Configure the server to place spooled print jobs in a folder on drive D. Stop and restart the Print Spooler service. Create a new disk quota limit on volume C to deny space to users who exceed their quota limit. Pause the Print Spooler service. In the shared printer properties, use a smaller file type for the print mode. Restart the Print Spooler service. Answer: B QUESTION 12: You are the Systems development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. You are having massive problems with a member of the cluster. You need to remove it quickly and put another in its place. From the list below, what is one thing you must have to remove a member from the cluster? When removing members, you must supply log-on credentials that have administrative privileges on the member. You can remove members, they are part of the Cluster for good. When removing members, you must supply log-on credentials that have administrative privileges on both the controller and the member. When removing members, you must supply log-on credentials that have administrative privileges on the controller. Answer: C QUESTION 13: You are an Application Center specialist. You are responsible for designing a solution that runs on the Windows 2000 platform. Your Windows 2000 system has two network adapters. The system is part of a load-balanced cluster. To allow the server to support NLB, you configure the server's IP addresses. Which of the following is true regarding the way IP addresses can be configured if this server is a cluster member? (Choose all that apply) You may have the front-end adapter configured with only one address. This address must be dynamic. You may have the front-end adapter configured with only one address. This address must be static. You may have the front-end adapter configured with more than one address. You have the front-end adapter configured with a static or a DHCP assigned address. Answer: C, D QUESTION 14: You are the System Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. You are setting up Application Center 2000 and configuring Affinity. Which level of affinity is when NLB associates clients with particular members by using the Class C portion of the client's IP address thus, clients coming form the same Class C address range always access the same member and provides the best performance for clusters serving the Internet? Single None Class B Class C Answer: D QUESTION 15: You are the System development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. You have one Windows 2000 Server and 2 Windows 2000 Advanced Server machines. You want to install Application Center 2000 on all three and make a cluster. Is this possible? No, this is not possible because Application Center will not install on 3 Machines. No, this is not possible because Windows 2000 server does not support CLB. Yes, this is possible because Application Center will install on all three machines. No, this is not possible because Application Center 2000 will only install on Datacenter. No, this is not possible because Windows 2000 server does not support NLB. Answer: C QUESTION 16: You are the administrator for an Application Center 2000 Web cluster that uses hardware-based, third-party load balancing and consists of six servers. The Web cluster supports six production Web sites, each for a different customer. All Web sites use the default HTTP port, and host headers are not used. A customer informs you that the name of the customer's Web site must change. You need to rename the Web site and ensure that Internet traffic will still be load balanced across the cluster. What should you do? Modify the external DNS host record for the Web site to reflect the new name. Modify the hosts file on each server in the cluster to reflect the new name. Use the Internet Information Services (IIS) snap-in to modify the name of the Web site on the cluster controller. Run ipconfig /registerdns from a command line. Remove each cluster member from the cluster. Use the Application Center snap-in to modify the name of the Web site on the cluster controller. Add each member back to the cluster. Answer: A QUESTION 17: You are the Web infrastructure administrator for Certkiller . The relevant portion of the existing Web site infrastructure is shown in the exhibit. You configure a second COM+ Component Load Balancing (CLB) cluster that hosts components for a new Web site application. You want the Web servers to be able to use the new COM+ cluster. What should you do? A. Create a separate COM+ routing cluster. Install the new COM+ components on the routing cluster. Configure dynamic load balancing for the COM+ components. Add the names of the servers that are members of the new COM+ CLB cluster to the COM+ routing list. On the Web servers, create and install COM+ proxies that use the routing cluster address. B. Create a separate COM+ routing cluster. Install the new COM+ components on the routing cluster and the Web cluster. Configure dynamic load balancing for the COM+ components on the Web cluster and the routing cluster. On the routing cluster, add the named of the servers that are members of the new COM+ CLB cluster to the COM+ routing list. C. On the Web cluster, install the new COM+ components. Configure dynamic load balancing for the COM+ components. On the new COM+ CLB cluster, add the names of the servers that are members of the new COM+ CLb cluster to the COM+ routing list. On the new COM+ CLB cluster, configure dynamic load balancing for the COM+ components. Add the names of the servers that are members of the new COM+ CLB cluster to the COM+ routing list. On the new COM+ CLB cluster, configure dynamic load balancing for the COM+ components. On the Web cluster, add the names of the servers that are members of the new COM+ CLB cluster to the COM+ routing list. Answer: A QUESTION 18: You are the Web infrastructure administrator for Certkiller . Certkiller has acquired sex Web servers ( Certkiller 1, Certkiller 2, ..., Certkiller 6) to host several different Web sites. You install Microsoft Windows 2000 Server on all of the servers and configure them in a dedicated Windows 2000 domain as shown in the exhibit. You install Application Center 2000 on each server and select all default options. You create a Web cluster on Certkiller 6 and attempt to join the other five servers to the cluster. However, you are unable to join all of the servers to the cluster. You must be able to create a Web cluster that includes all six servers. What should you do? Install Windows 2000 Advanced Server on all of the servers. ReinstallApplicationCenter. Install at least one other domain controller in the domain. Run the dcpromo.exe file on Certkiller 1 and Certkiller 2. ReinstallApplicationCenteron Certkiller 1 and Certkiller 2. Dissolve the Web cluster, and create the cluster again on Certkiller 1 or Certkiller 2. Run the dcpromo.exe file on Certkiller 3, Certkiller 4, Certkiller 5, and Certkiller 6. Join them to the tailspintoys.com domain. Answer: B QUESTION 19: You are the network administrator for Certkiller . You need to create an Application Center 2000 cluster to host Certkiller 's intranet Web site. The stand-alone servers are pre-installed with Microsoft Windows 2000 Server, Service Pack 2, and security settings as mandated by Certkiller 's security policy. You log on to the first sever by using your account and start the installation of Application Center. You receive the following error message. You want to install all the components of Application Center. What should you do? Set the proper permissions on the \WINNT directory to allow the account to write to it. Create a directory for the log file and allow the account to write it. Log on to the server by using an account that has local administrative rights. Log on to the server by using a Domain Administrator account. Answer: C QUESTION 20: You are the network administrator for Certkiller . You need to install Application Center 2000 on three servers. You install Application Center on two servers successfully. However, on the third server, the installation fails. During troubleshooting, you view the following entry in the ac_setup.log file: 'Internal Error 2744. register CLBSetup.exe, E:\Program Files\Microsoft Application Center\CLBSetup.exe, /i The Program experienced an internal error. If this condition persists, restart the application' You want to further troubleshoot this error. What should you do? Run the mdutil.exe file to check and repair metabase misconfigurations, and then reinstall Application Center. Stop and restart the COM+ applications by using the Component Service snap-in. Check and repair COM+ misconfigurations, and then reinstall Application Center. Log on as a member of the Local Administrators group, and then reinstall Application Center. Answer: C QUESTION 21: You are the network administrator for Certkiller . Certkiller is planning the launch of a new Web site. The initial deployment of the site will contain five Application Center 2000 clusters that use Network Load Balancing (NLB), a staging server, and two management severs. You want to accomplish the following goals: You must be able to centrally manage the load balancing of the front-end severs from both management servers. You must be able to aggregate site performance data for each cluster in a central location. You must be able to view the performance data from both management servers. You must be able to deploy content from the staging server to the cluster by using either of the management servers. You must be able to synchronize members of a cluster from both management servers. You must be able to check the synchronization status of the cluster and individual members from both management servers. You take the following actions: Install Application Center 2000 on all the Web servers by using the typical installation. Install Application Center 200 on one of the management servers by using the custom installation. For the installation, select only the client option. Verify that you can connect to the cluster Web client from both management servers. Which result or results do these actions produce? (Choose all that apply) You are able to centrally manage the load balancing of the front-end severs from both management servers. You are able to aggregate site performance data for each cluster in a central location. You are able to view the performance data from both management servers. You are able to deploy content from the staging server to the cluster by using either of the management servers. You are able to synchronize members of a cluster from both management servers. You are able to check the synchronization status of the cluster and individual members from both management servers. Answer: B, C, F QUESTION 22: You are the network administrator for Certkiller . Certkiller has 20 production Web servers. You need to install Application Center 2000 on these servers. You also need to set up a log file to capture any errors that might occur during installation. What are two possible ways to accomplish these goals? (Each correct answer presents a complete solution. Choose two) A. Use the MSIEXEC command, and include the /q and /lv* switches. Run this command on each server. Use the MSIEXEC command, and include the /q switch and the ACLogging option. Run this command on each server. On each server, run the Microsoft Application Center 2000.msi file that is included on the Application Center 2000 CD-ROM. On each server, run the setup.exe file that is included on the Application Center 2000 CD-ROM. On each server, run the setup.hta file that us included on the Application Center 2000 CD-ROM. Answer: A, E QUESTION 23: You are planning to deploy a Web site by using Application Center 2000. The Web application uses a three-tiered architecture that has a Web interface, a COM+ application, and a clustered Microsoft SQL Server 2000 database. The Web tier has eight servers, the business-logic tier has two servers, and the data tier has two servers. You want to accomplish the following goals: Load balance the Web site. Load balance the COM+ application across the business-logic tier. Provide security between the Web tier and the business-logic tier. What are two possible ways to accomplish these goals? (Each correct answer presents a complete solution. Choose two) Use Application Center on the Web tier servers, and configure the servers as a Web cluster that uses Network Load Balancing (NLB). UseApplicationCenteron the business-logic tier servers to load balance the COM+ application by using Component Load Balancing (NLB). Implement a firewall between the COM+ cluster and the Web cluster. Use Application Center on the Web tier servers, and configure the servers as a Web cluster that uses a third-party load balancer. UseApplicationCenteron the business-logic tier servers to load balance the COM+ application by using Component Load Balancing (CLB). Implement a firewall between the COM+ cluster and the Web cluster. Use Application Center on the Web tier servers, and configure the servers as a Web cluster that uses a third-party load balancer. UseApplicationCenteron the business-logic tier servers to load balance the COM+ application by using Network Load Balancing (NLB). Implement a firewall between the COM+ cluster and the database cluster. Use a third-party load balancer on the Web tier servers. UseApplicationCenteron the business-logic tier servers to load balance the COM+ application by using Component Load Balancing (CLB). Implement a firewall between the COM+ cluster and the Web cluster. E. Use a third-party load balancer on the Web tier servers. UseApplicationCenteron the business-logic tier servers to load balance the COM+ application by using Network Load Balancing (NLB). Implement a firewall between the COM+ cluster and the database cluster. Answer: A, B QUESTION 24: You are the desktop administrator for Certkiller . Certkiller is migrating from a Windows NT 4.0 domain to a new Windows 2000 domain. As part of the migration, you are removing Windows NT Workstation 4.0 computer accounts from the Windows NT domain and adding them to a Windows 2000 Active Directory domain. You add 10 Windows NT Workstation computer accounts to the Active Directory domain. When you attempt to add another Windows NT Workstation computer account to the Active Directory domain, you receive the following error message: "The machine account for this computer either does not exist or is unavailable." You need to be able to add Windows NT Workstation computer accounts to the Windows 2000 Active Directory domain. What should you do? Configure a DNS server for the Windows NT Workstation computers that have not been added to the Active Directory domain. Delete from the Windows NT domain the computer accounts for the Windows NT Workstation computers that have not been added to the Active Directory domain. Ask the domain administrator to assign you the Allow - Create Computer objects permission for the Computer container. Ask the domain administrator to assign you the Allow -Create Computer objects permission for the Domain Controllers container. Answer: C QUESTION 25: You are the system administrator for Certkiller 's sales department. Maria is the administrator of the Microsoft SQL Server computers that are used in the sales department. Maria wants the serves to be as secure as possible. You need to find out whether a specific security hot fixes is installed on all the SQL Server computers in the sales department. What should you do? Run the hfnetchk command on your client computer and specify each SQL Server computer. Run the File Signature Verification tool on each SQL Server computer. Open the URL http//windowsupdate.microsoft.com on each SQL Server computer. Run the msiexec command on each SQL Server computer. Answer: A QUESTION 26: You are the network administrator for Certkiller . The network consists of a single Windows 2000 Active Directory domain. The domain contains an organizational unit (OU) named Servers. The Servers OU contains two Windows 2000 Server computers name Certkiller 1 and Certkiller 2. A user reports that it takes a long time to access applications and files from Certkiller 1 and Certkiller 2. You discover that several unnecessary services running on Certkiller 1 and Certkiller 2 are causing the servers to perform slowly. You need to disable the unnecessary services on both servers. Your solution must ensure that these services are not reenabled. The solution must also affect all servers that are added to the Serves OU in the future. What should you do? Use Computer Management to disable the services. Use Active Directory Sites on Services to disable the services. Create a Group Policy Object (GPO) to disable the services at startup. Link the GPO to the Servers OU. Create a Group Policy object (GPO) to restrict the access that the System account has to the Services registry key. Link the GPO to the Servers OU. Answer: C QUESTION 27: You are the administrator of a Windows NT Server computer named Certkiller 1. Two users, who are named Jack and King, report that network performance is something very slow when they access Certkiller 1. You want to be notified when network performance is slow for Jack's and King's computers. Which two actions should you take? (Each correct answer presents part of the solution. Choose two) Install the SNMP service on Jack's and King's computers. Install the SNMP service on Certkiller 1. Install Network Monitor Agent on Jack's and King's computers. Install Network Monitor Agent on Certkiller 1. Run Performance Monitor in Alert View on your client computer to view the Network Segment counter for Jack's and King's computers. Run Performance Monitor in Log View on your client computer to log the Network Interface counter for Jack's and King's computers. Answer: C, E QUESTION 28: You are the administrator of a network that contains Windows NT Server computers and NetWare 3.x servers. A Windows NT Server computer named Certkiller 1 is the Routing and Remote Access server for your network. Certkiller 1 has a 12-port analog 56-Kbps modem card installed. Routing and Remote Access Service (RRAS) is configured to use the modem card for incoming analog connections. Users connect to Certkiller 1 by using portable computers that have PC Card modems. A user named Marc was recently assigned dial- in permission to Certkiller 1. Jack reports that every time hercomputer dials in to Certkiller 1, she receives confirmation that her use name and password were verified, and then Certkiller 1 disconnects. You want to enable Jack to dial in successfully. What should you do? Configure Certkiller 1 to use DHCP leases for dial-in users, and configure the DHCP scope to use the local default gateway. Configure Certkiller 1 to use TCP/IP, NetBEUI, and NWLink IPX/SPX Compatible Transport for the dial-in ports. Configure Jack's account so that is has no restrictions for logon hours. Configure Jack's account to disable callback. Answer: D QUESTION 29: You are the Webmaster for an Internet hosting company. Certkiller uses Windows NT Server computers and Microsoft Internet Information Server (IIS) to host multiple Web sites on each server. Microsoft Index Server is also used to provide indexing and searching services. Each server hosts approximately 20 individual Web sites. The hosted Web sites are created by using virtual servers. You notice that when users perform searches on any of the hosted Web sites, Index Server returns results from all of the hosted Web sites. You want searches that are performed in a Web site to return results for only that Web site What should you do? Re-create hosted Web sites by using virtual directories. Re-create Web sites by placing them under the default Web site. Create and Index Server catalog for each hosted Web site, and assign a catalog to each hosted Web site by using the Web site's IP address. Create a single Index Server catalog for the default Web site, and add the name of each hosted Web site on the server's Noise.enu file. Answer: C QUESTION 30: You are the administrator of a Windows NT Server network. Three of the Windows NT Server computers on the network are named Certkiller 1, Certkiller 2, and Certkiller 3. The network also contains Windows 2000 Professional client computers and UNIX servers. A portion of the network is shown in the exhibit. Certkiller 1 is a DHCP server that is configured to use a DHCP scope of 10.10.20.10 to 10.10.20.255. All of the UNIX servers are configured to use static IP addresses, and the Windows 2000 Professional computers are configured to use DHCP. Every day, users report that they cannot connect to the network when they first start their computers. The users usually receive the following error message: The system has detected an IP address conflict with another system on the network. The local interface has been disabled. More details are available in the system event logs. Consult your network administrator to resolve the conflict. Each user can connect to the network after waiting about 30 minutes and restarting the computer. You want to enable users to connect to the network and log on successfully without having to wait and restart their computers. What should you do? Change the DHCP scope on Certkiller 1 to 10.10.20.50 to 10.10.20.255. Change the DHCP scope on Certkiller 1 to exclude the addresses of the UNIX servers. Configure the WINS server address on all of the following Windows 2000 Professional computers to 10.10.20.80. Configure the DNS server address on all of the Windows 2000 Professional computers to 10.10.20.80. Answer: B QUESTION 31: You are the administrator of a Windows NT Server computer named Certkiller 1. Certkiller 1 runs Microsoft Internet Information Server (IIS) and hosts an intranet Web site The Web site is configured so that is had the default settings. You add a virtual directory named Marketing to the Web site. The virtual directory points to the \\Files1\MktDocs shared folder, which contains documents that are published by Certkiller 's marketing department. You verify that users can view the documents by means of a Web browser and HTTP. Several months later, users report that they can no longer access the documents by using HTTP. Some users can access the documents on their client computers by means of the \\Files1\MktDocs shared folder. You need to ensure that all users can access the documents by using the Web site. What should you do? Assign the Everyone group the Read permissions for the files in \\Files1\MktDocs. Assign the Everyone group the Read permission for \\Files1\Marketing. Configure the Web site to allow anonymous access and to disallow Basic authentication. Configure the user account that the virtual directory uses to access \\Files\MktDocs so that account is not locked out and so that the password never expires. Answer: D QUESTION 32: You are the Systems development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. You just brought down the cluster controller. (You did it correctly by promoting another member to the controller status). You now need to remove the content form this server. What will allow you to do that? ac cluster /clean format x: /s ac clean None of these answers are correct. fdisk /mbr fdisk Answer: A QUESTION 33: You are the Web server administrator for Certkiller . You have just finished establishing a new Web cluster and want to verify visibility of all cluster members. What should you do to test this? (Choose all that apply) From the cluster controller, you should ping all cluster members by machine name, which should resolve into the back-end adapter IP address. From each cluster member, you should ping the proxy server by its machine name, which should resolve into the Virtual IP address. From the cluster controller, you should ping all cluster members by machine name, which should resolve into the front-end adapter IP address. From the cluster controller, you should ping all the clusters by dedicated IP addresses. From the cluster controller, you should ping the Virtual IP address. From each cluster member, you should ping the cluster controller by its dedicated IP address. From each cluster member, you should ping the cluster controller by its machine name, which should resolve into the back-end adapter IP address. Answer: A, E, G QUESTION 34: You are the Systems development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. Your project manager tasks you to implement a Network Load Balanced solution to keep Certkiller 's web site highly available. You are asked to do it in the most time effective way. If you were not going to manually perform all the tasks involved, what utility could you use to get an Application Center 2000 cluster up and running quickly? Application Center WIN2K.exe utility. Application Center clust.com. Application Center Cluster /new /p command. Application Center New Cluster Wizard. Answer: D QUESTION 35: You are the Web server administrator for a large e-commerce company Certkiller International. You are always on the lookout for new ways to make your job easier and improve the performance of your Web servers. The CIO asks you this question: "Does Application Center help to ensure correct configuration of network settings across all cluster members ands what settings can it replicate?" What will you tell him? (Choose all that apply) Yes, Application Center will replicate the correct network settings to all cluster members automatically. The settings for the Virtual IP address, IP subnet, heartbeat adapter IP addresses, WINS servers and DNS domain will be replicated. The settings for the IP subnet, load balanced adapter IP addresses, DNS domain and DNS servers will be replicated. Yes, Application Center will replicate the correct network settings to all cluster members, but this must be configured manually during the setup of the cluster controller. No settings will be replicated. No, Application Center will not replicate the correct network settings to all cluster members automatically. The settings for the Virtual IP address, IP subnet, default gateway and metric, DNS servers, DNS domain, WINS servers and WINDS mode type will be replicated. Answer: A, G QUESTION 36: You are the administrator for an Application Center 2000 Web cluster that uses Network Load Balancing (NLB) and consists of two servers. The Web cluster needs to support the www. Certkiller .com Web site. The servers are connected to the network as shown in the exhibit. The network adapters are configured as shown in the following table. Network adapter IP address Dynamic DNS enables Certkiller 1 Network 131.107.20.21, No Adapater 1 dedicated Certkiller 1 Network DHCP and WINS Yes Adapter 2 client Certkiller 2 Network 131.107.20.22, No Adapter 1 dedicated Certkiller 2 Network DHCP and WINS Yes Adapter 2 client NLB primary IP 131.107.20.10 No The DNS server provides name resolution for the Internet. You want to configure name resolution for the Internet clients of the Web cluster by using the least amount of administrative effort. What should you do? Configure Network Adapter 1 on each server to use DHCP. Manually configure a host address (A) resource record for www.fabrikam.com to resolve to 131.107.20.10 in DNS. Enable dynamic DNS registrations on Network Adapter 1 on each server. Configure Network Adapter 2 on each server with a static IP address. Manually configure Network Adapter 1 and Network Adapter 2 on each server to be WINS clients. E. Configure Network Adapter 2 on each server with a static IP address. Manually configure a hosts file entry on Certkiller 1 for Network Adapter 2 of Certkiller 2. Manually configure a hosts file entry on Certkiller 2 for Network Adapter 2 of Certkiller 1. Answer: B QUESTION 37: You are the Web infrastructure administrator for Certkiller . Two Microsoft Windows 2000 Advanced Server computers are configured as Web servers in a round-robin DNS. The servers are connected to the network as shown in the exhibit. You install Application Center 2000 on each server. You plan to use Network Load Balancing (NLB) for load balancing on Network Adapter 1 on each server. The servers are configured as shown in the following table. You need to create a Web cluster that consists of two servers. You want Certkiller 1 to be the cluster controller. Which configuration change should you make to the servers before creating the cluster? Change the Interface metric for Network Adapter 1 on each server to 2. Change the Interface metric for Network Adapter 2 on each server to 2. Change the system root path on each server to C:\WINNT. Change the Web site root folder on Certkiller 1 to D:\wwwroot. Change the drive letter assignment for the current drive E to drive D on Certkiller 2. Answer: E QUESTION 38: You are the network administrator for Certkiller . Certkiller 's Web site has experienced a large amount of traffic, so you decide to add another server to the cluster. You use a sparse server that is configured as a file and print server. You start the installation of Application Center 2000 and receive warning that only the Administrative client can be installed. During troubleshooting you view the ac_setup.log file, which is shown in the exhibit. You want to install the server components of Application Center by using the least amount of administrative effort. What should you do? A. Install the post-Service Pack 1 hotfixes. Run the dcpromo.exe file. Install Internet Information Services (IIS), and enable the IIS Administration Service. Reformat the server, and install Microsoft Windows 2000 Server. Answer: A QUESTION 39: You are the network administrator for Certkiller . There are five servers in a Web cluster. After examining performance statistics on the site hosted on the cluster, you decide that one server can be removed from the cluster and used elsewhere. You uninstall Application Center 2000 from this server. When you use the Application Center snap-in to view the cluster, you find that the server still appears as a member of the cluster. You need to remove the server from the cluster by using the least amount of administrative effort. What should you do? Reinstall Application Center on the server, connect to the cluster controller, remove the server from the cluster, and then uninstall Application Center. Reinstall Application Center on the server, connect to the server, remove the server from the cluster, and then uninstall Application Center. Run the Application Center snap-in, connect to the cluster controller, and then remove the server from the cluster. Run the Application Center snap-in. connect to the server, and then remove the server from the cluster. Answer: C QUESTION 40: You are the network administrator for Certkiller . Certkiller is planning the launch of a new Web site. The initial deployment of the site will contain 10 front-end Web servers and one management server. You want to accomplish the following goals: The site must be highly available and scalable beyond 10 servers. You must be able to synchronize all the front-end servers with content updates from the management server. You must have consolidated logging of events for centralized monitoring of each cluster. You must be able to centrally manage the load balancing of the front-end servers from the management server. You must be able to aggregate site performance data for each cluster in a central location You take the following actions: Install Application Center 2000 on all the servers by using the customer installation. For the installation, select only the server option and do not enable Application Center Events and Performance Logging. * Create two Application Center clusters of five servers that use Network Load Balancing (NLB) and default settings. Load balance the clusters by using round-robin DNS. Use the Microsoft Windows 2000 Performance tool to monitor all the servers. Which result or results do these actions produce? (Choose all that apply) The site is highly available and scalable beyond 10 servers. You are able to synchronize all the front-end servers with content updates from the management server. You have consolidated logging of events for centralized monitoring of each cluster. You are able to centrally manage the load balancing of the front-end severs from the management server. You are able to aggregate site performance data for each cluster in a central location. Answer: A QUESTION 41: You are the network administrator for Certkiller . You plan to deploy Application Center 2000 in a single-site environment, which contains three tiers: Web, business logic, and database. The network environment is shown in the exhibit: Perimeter Network 1 is connected to the Internet. You want to provide a secure staging mechanism to deploy content. What should you do? A. Host a staging server in Perimeter Network 2. Configure the firewall to allow Application Center traffic from the staging server to Perimeter Network1. B. Host a staging server in Perimeter Network 1. Configure the firewall to allow Application Center traffic from the staging server to Perimeter Network 2. C. Host a staging server in Perimeter Network 1 and Perimeter Network 2. Configure the firewall to allow Application Center traffic between the two staging servers. D. Host a staging server in Perimeter Network 2. Configure the firewall to prevent all Application Center traffic from the staging server to Perimeter Network 1. Answer: A QUESTION 42: You are the desktop administrator for Certkiller . A new shipment of computers arrived recently. These new computer will replace outdated client computers. You install Windows 2000 Professional on one of the new computers. You attempt to join the computer to the domain. You receive an error message stating that access has been denied. You need to be able to add the new computers to the domain. After you install Windows 2000 Professional on all of the new computers, what should you do? Log on to each computer as local Administrator, and then join each computer to the domain. Obtain permissions to create computer objects, and then join each computer to the domain. For each computer, create a computer account in Active Directory, and then join each computer to the domain. Run the ipconfig /registerdns command on each computer, and then join each computer to the domain. Answer: B QUESTION 43: You are a network administrator for Certkiller . The network contains 2,500 Windows 2000 Professional computers, 70 Windows 2000 Server member servers, and 5 Windows 2000 Server domain controllers. All computer accounts are in their default location in Active Directory. You need to deploy the most recent service pack to all of the computes with the least amount of administrative effort. What should you do? Create a script named Update.bat that runs the Update.exe file from a network share. Create a Group Policy object (GPO) and link it to the Computers container. Set the computer configuration to run the Update.bat script on startup. Restart each computer. Create a Group Policy object (GPO) and link it to the domain level. Configure the GPO to assign the Update.msi file under the user configuration logon script. Log on to reach computer as Administrator. C. Create a Group Policy object (GPO) and link it to the domain level. Configure the GPO to assign the Update.msi file under the computer configuration. Restart each computer. D. Create a Group Policy object (GPO) and link it to the Computers container. Configure the GPO to assign the Update.msi file under the computer configuration. Restart each computer. Answer: C QUESTION 44: You are the network administrator for Certkiller . The network contains a Windows 2000 Server computer named Certkiller 1. Certkiller 1 runs four server applications, which are accessed by company employees. Certkiller 's software developers install a new application on Certkiller 1. Several employees now report that all the applications are responding very slowly. You notice that the hard disks on Certkiller 1 are constantly busy. You open Task Manager on Certkiller 1. The information on the Performance tab is summarized in the following table. Performance item Performance value Commit Charge Total 735214 Commit Charge Limit 736819 Commit Charge Peak 736819 CPU Usage 86% MEM Usage 734687 Physical Memory Total 130612 Physical Memory 65535 Available Physical Memory System 66400 Cache Total Processes 58 You need to improve the performance of Certkiller 1 as much as possible. What should you do? Increase the amount of RAM installed in Certkiller 1. Install an additional processor in Certkiller 1. Install more hard disks in Certkiller 1. Increase the size of the paging file on Certkiller 1. Answer: A QUESTION 45: You are the administrator of a Windows NT domain. The domain contains Windows NT Server computers and Windows 2000 Professional computers. The domain uses DNS and WINS for name resolution. Certkiller 1 is a Windows NT Server computer that provides a DNS service. The DNS service is used to provide name resolution for access to Certkiller 's intranet Web site and Internet Web sites. You want to provide fault tolerance for the DNS service on Certkiller 1. What should you do? Configure another server as a caching-only DNS server. Configure another server as a secondary DNS server. Configure Certkiller 1's DNS service to use a WINS server as a push partner. Configure Certkiller 1's DNS service to use WINS name resolution. Answer: B QUESTION 46: You are the Webmaster of Certkiller 's intranet. The intranet is hosted by a Windows NT Server computer named Certkiller 1. Users access the intranet by using the URL http://intranet. You are adding a new Web site to Certkiller 1. Certkiller plans to use the new Web site to track details of customer projects. You want users to be able to access the site by using the URL http://Projects. What should you do? Add a WINS entry for Projects that includes the IP address of Certkiller 1. Configure the Projects Web site to use host headers. Add a DNS entry for Projects that includes the IP address of Certkiller 1. Configure the Projects Web site to use host headers. Create the Projects Web site as a virtual directory, and place it under the intranet Web site. Create the Projects Web site as a folder in the intranet Web site. Answer: B QUESTION 47: You are the new administrator of Certkiller 's Windows NT Server computer. A server named Certkiller 1 hosts a Web site, which is configured to use integrated security and to disallow anonymous access. Company employees access the Web site by means of Certkiller intranet or Internet. An employee named Marc reports that he cannot access the Web site from his home computer. You verify that Marc can log on to the Web site from the client computer in his office. You verify that Marc is using the correct browser version on his home computer. Marc's home computer connects to the Internet by using a dial-up account to an Internet Service Provider (ISP). You need to ensure that Marc can access the Web site from his home computer. What should you do? Assign the IUSR_ Certkiller 1 user account and the Domain User group the Read permission for the Web site files. Remove any permission that are assigned to Marc's user account. Configure the Web site to allow anonymous access. C. Create a new user account. Verify that the user account can access the Web site from your home computer. Instruct Marc to use the new account when he access the Web site from his home computer. D. Remove any IP address restrictions from the Web site's directory security settings. Answer: D QUESTION 48: You are the Systems development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. Your application Center 2000 cluster seems to be experiencing problems with load. You monitor the cluster and see that you may need to bring down the cluster controller because it's having hard disk problems. Can you remove this server from the Cluster? A. You cannot remove a cluster controller. To remove a controller, you must promote another member to controller before you can remove the original controller. B. You cannot remove a cluster controller. To remove a controller, you must reinstall Application Center 2000 on the machine. C. You cannot remove a cluster controller. Once you make A Cluster Controller, you are stuck with that server. You need to setup a Controller backup server called a CCBK. D. You cannot remove a cluster controller. To remove a controller, you must demote the server to controller (Backup) before you can remove it. Answer: A QUESTION 49: You are the System development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. On one-tier clusters, Application Center can use NLB to distribute requests across a COM+ application cluster. On multi-tier clusters, Application Center can use CLB to load balance requests to activate COM+ applications. Why is this method more efficient than NLB for a COM+ application cluster? CLB works faster than NLB, NLB is the older version of CLB. Because CLB load balances only the activation requests. NLB is what you use, there is no such thing as CLB. CLB is only used when you use IIS. Answer: B QUESTION 50: What is different about deploying Global ISAPI Filters than deploying other applications or COM+ applications? When deploying a COM+ application, some (maybe all) services will be restarted on the target computer. When deploying Global ISAPI Filters, IIS will be restarted on the target computer. When deploying a COM+ application, the ACC_computername account is used. When deploying Global ISAPI Filters, the IUSR_computername account is used. When deploying a COM+ application, the IUSR_computername account is used. When deploying Global ISAPI Filters, the ACC_computername account is used. When deploying a COM+ application, IIS will be restarted on the target computer. When deploying Global ISAPI Filters, some (maybe all) services will be restarted on the target computer. Answer: A QUESTION 51: You are the administrator for an Application Center 2000 Web cluster that consists of eight servers. The Web cluster supports five production Web sites. You want to replace the cluster controller with a new server. You attempt to remove the cluster controller by using the Web-based Administrative client, but you are unable to do so. You need to remove the cluster controller from the cluster. What should you do? Use the Application Center snap-in to disband the cluster. From the command line, run the AC CLUSTER /CLEAN command on the cluster controller. Focus the Web-based Administrative client on the cluster, and remove the cluster controller from the cluster. Promote one of the other cluster members to cluster controller. Use the Application Center snap-in to remove the former cluster controller from the cluster. Answer: D QUESTION 52: You are the Web infrastructure administrator for Certkiller . Certkiller has acquired eight Web servers to host two different Web sites. The servers have been placed in a data center as shown in the exhibit. Both Web sites must remain available in the event of server or network component failures. You install Application Center 2000 on each of the servers. How should you configure Application Center on the servers? Create a single Web cluster that consists of all eight servers. Host both Web sites on the cluster. Create two separate Web clusters, one on Segment A and one on Segment B. Host both Web sites on each cluster. Configure round-robin DNS entries for each cluster. Create two separate Web clusters, each one containing two servers from each segment. Host both Web sites on each cluster. Configure round-robin DNS entries for each cluster. Create two separate Web clusters, one on Segment A and one on Segment B. Host one Web site on each cluster. Answer: B QUESTION 53: You are the network administrator for Certkiller . You need to install Application Center 2000 on several servers. You want to verbosely monitor the installation of Application Center by using dbmon.exe. After installing Application Center on the first server, you view the capture file from dbmon.sex and discover there is no data. You need to be bale to see the DBMON data on future installs. What should you do? A. Run the traceoutput.reg file. Run the wbemdump.exe file. Run a command line that includes the ACLogging option. Run the dumphm.exe file. Answer: A QUESTION 54: You are the network administrator for Certkiller . You installed Application Center 2000 on all Web servers by using an unattended installation. All the servers are added to the cluster and are functioning properly. However, when you try to invoke the Web monitoring of the servers from a client computer, monitoring is unavailable for the cluster. You discover that Application Center Events and Performance Logging was not installed. You want to enable Web monitoring. What should you do? Disband the cluster. Uninstall Application Center Install Application Center by using the unattended installation script with the ACLogging option included. Reconfigure the cluster. Disband the cluster. Uninstall Application Center. Install Application Center by using the unattended installation script without the ACLogging option included. Reconfigure the cluster. C. Disband the cluster. Install Application Center Events and Performance Logging by using the unattended installation script with the ACLogging option included. Reconfigure the cluster. D. Keep the cluster. Install Application Center Events and Performance Logging by using the unattended installation script with the ACLogging option included. Reconfigure the cluster. Answer: A QUESTION 55: You are a network administrator for Certkiller . You are responsible for a child domain in your enterprise. The human resources (HR) department uses this child domain. The domain contains Windows 2000 domain controllers and Windows NT 4.0 member servers. The HR department institutes a new employee review process. Under the new process, documents that are used for performance reviews will be stored in a shared folder, and managers will be the only personnel who will have access to that shared folder. In the organizational unit (OU) named Mgr1, existing global groups for managers are the It Manages group, the HR Managers group, the Finance Managers group, and the Manufacturing Managers group. You want to add these manager groups to a new security global group named All Managers. The All Managers group is in a separate OU named AIIMgr. However, when you attempt to add each of the managers groups to the All Managers group, you notice that only individual user accounts are available to be added and that the managers groups are not available to be added. What should you do? Move the All Managers global group to the Mgr1 OU. Ask the domain administrator to switch the domain to native mode. Change the All Managers group from a global group to a universal group. Ask the domain administrator to assign you the Allow - Change permission for each of the managers global groups. Answer: B QUESTION 56: You are a network administrator for Certkiller . The network contains 50 Windows 2000 Server computers, which are in the Server organizational unit (OU) in Active Directory. The network also contains 1,500 Windows 2000 Professional computers, which are in the Computers container in Active Directory. You need to deploy the most recent Windows 2000 service pack. The service pack must update only the servers. You download the service pack and extract the files into a newly created shared folder named SPFiles. You need to install the service pack on all of the servers, and you want the installation to occur with no user interaction. What should you do? A. Create a Group Policy object (GPO) and link it to the Servers OU. Under the computer configuration, configure the GPO to assign the Update.msi file form the SPFiles folder. Restart each server. B. Create a Group Policy object (GPO) and link it to the domain level. Under the computer configuration startup script, configure the GPO to assign the Update.msi file from the SPFiles folder. Restart the computer. C. Create a Group Policy object (GPO) and link it to the domain level. Under the user configuration logon script, configure the GPO to assign the Update.msi file from the SPFiles folder. Log on to each server as Administrator, D. Create a script that runs the Update.exe file from the SPFiles folder. Create a Group Policy object (GPO) and link it to the Servers OU. Modify the computer configuration of the GPO to run the script on startup. Restart each server. Answer: A QUESTION 57: You are the administrator of a Windows NT Server computer that hosts Certkiller 's Internet Web site. Your site receives approximately 100,000 hits per day. Site visitors report that they occasionally receive connection error messages when they attempt to connect to the Web site. You notice that the Web site responds very slowly every two or three hours. During one of the slowdowns, you run Performance Monitor and receive the results shown in the exhibit. You want to eliminate the slowdowns and enable users to connect to the Web site without receiving connection error messages. What should you do? Configure Microsoft Index Server to run index catalog builds during off-peak hours. Reconfigure the Web site as a virtual directory under the default Microsoft Internet Information Server (IIS) Web site. Configure the Web site properties to run with performance settings for more than 100,000 hits per day. Configure the Web site to run at an Application Protection level of high. Answer: A QUESTION 58: You are the administrator of a network that consists of a single Windows NT domain. The domain contains Windows NT Server computers, UNIX servers, and Windows 2000 Professional client computers. The client computers are configured to use DHCP and WINS. You are adding a new UNIX server named Certkiller 1 to the network. You want users to be bale to connect to Certkiller 1 by using its name rather than its IP address. What should you do? Create an Internet Group WINS record that points to the IP address of Certkiller 1. Create a Unique WINS record that points to the IP address of Certkiller 1. Configure the network DHCP scope to include the IP address of Certkiller 1 in its range. Configure the network DHCP scope to use Certkiller 1 as a DNS server. Answer: B QUESTION 59: You are a Webmaster for a company that provides Internet hosting services for Internet Web sites. Certkiller is adding a new low-cost service to provide Web site hosting for low-usage sites. Fro this service, Certkiller plans to use a Windows NT Server computer that has a dedicated T1 line. The server is expected to host approximately 50 Web sites. You want to ensure that the Internet connection to the server will be sufficient to handle the anticipated number of Web sites. What should you do? Configure the default Microsoft Internet Information Server (IIS) Web site to use bandwidth throttling set to 25 Kbps. Configure each Web site to use bandwidth throttling set to 25 Kbps. Configure the default Microsoft Internet Information Server (IIS) Web site to use a connection limit of 50. Configure each Web site to use a connection limit of 50. Answer: B QUESTION 60: You are the administrator of a Windows NT Server named Public, which is a member of a Windows NT domain named CORP. Public runs Microsoft Internet Information Server (IIS) and hosts an FTP site. The FTP site is configured so that is has the default settings. The site's home directory is C:\Inetpub\Ftproot. You need to use Public to allow a specific customer to upload and download files. You do not want this customer to have any other type of access. You do not want anyone else to have this type of access. You need to configure Public to support these requirements. Which three actions should you take? (Each correct answer presents part of the solution. Choose three) Create a user account named Customer on Public. Create a user account named Customer in CORP. Assign the IUSR_Public user account the appropriate NTFS permissions for C:\Inetpub\Ftproot. Assign Customer the appropriate NTFS permission for C:\Inetpub\Ftproot. Configure the FTP site to allow anonymous access. Configure the FTP site to disallow anonymous access. Answer: A, D, F QUESTION 61: You are the Systems development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. You are having many problems with a server and you would like to take it offline. You can also use this procedure to set a member offline or to bring a member online. When setting members offline, you can specify a period of time for the server to drain existing client connections. Why are you going to do a drain? A member that is offline is no longer receiving new requests for content, but it might still be synchronized with the controller and draining it will make it function better. This option helps prevent disruptions in client connections because it allows these connections to complete before the member is taken offline. There is no such option to drain connections off. You want to drain connections because you need to free up licenses. Answer: B QUESTION 62: You are the Systems development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. You need to configure affinity on your Application Center 2000 Cluster. Why is it not efficient for Internet clients to use Single affinity? All answer are wrong, there is no such things as Single affinity. In Single affinity, CLB load balances each client by the client's entire IP address, which can span a broad range. By using Class C affinity, NLB associates clients with only the same Class C portion of the IP address with particular members. Therefore, you essentially reduce the range of IP addresses by which NLB load balances clients. In Single affinity, NLB load balances each client by the client's entire IP address, which can span a broad range. By using Class C affinity, NLB associates clients with only the same Class C portion of the IP address with particular members. Therefore, you essentially reduce the range of IP addresses by which NLB load balances clients. D. In Single affinity, NLB does not load balances each client by the client's entire IP address, which can s pan a broad range. By using Class C affinity, NLB associates clients with only the same Class C portion of the IP address with particular members. Therefore, you essentially, reduce the range of IP addresses by which NLB load balances clients. Answer: C QUESTION 63: You are an Application Center specialist. You are responsible for designing a solution that runs on the WINDOWS 2000 platform. When you configure the server services on the Application Center server which also has the SQL server service running, a "Misconfigured Services" error is received. Jay suspects that the SQL Server service is not properly configured. What should you do? On the Recovery tab of the MSSQLMSAC service properties, click Take No Action for each of the lists. In the Reset fail count after [x] days box, enter -1. On the General tab of the MSSQLMSAC service properties, click Hide for each of the lists. On the Recovery tab of the MSSQLMSAC service properties, click Take No Action for each of the lists. In the Rest fail count after [x] days box, enter 0. On the Recovery tab of the MSSQLMSAC service properties, click Restart for each of the lists. In the Reset fail count after [x] days box, enter 1. Answer: C QUESTION 64: You are the Web infrastructure administrator for Certkiller . There is a four-node Network Load Balancing (NLB) cluster consisting of COM+ application servers. NLB is configured to use Single affinity. Each server has a single network adapater. This cluster hosts COM+ components for a front-end, four-node Application Center 2000 Web cluster that uses hardware-based, third-party load balancing. You notice that the CPU usage between the COM+ application servers differs significantly. You want to balance the load more evenly among the COM+ application servers. Which action or actions should you take? (Choose all that apply) Reconfigure NLB on the four COM+ application servers to use Class C affinity. Disable NLB on the four COM+ application servers. Create an Application Center COM+ cluster that consists of the four COM+ application servers and that uses Component Load Balancing (CLB). On the front-end Web cluster, configure the COM+ routing list and dynamic load balancing for the COM+ components. E. On the COM+ cluster, configure the COM+ routing list and dynamic load balancing for the COM+ components. Answer: B, C, D QUESTION 65: You are the Web infrastructure administrator for Certkiller . Four computers running Microsoft Windows 2000 Server are configured as Web servers in a round-robin DNS. You install Application Center 2000 on each server. You plan to use Network Load Balancing (NLB) for load balancing. However, when you try to create the cluster, the option to use NLB is not available. You do not have access to hardware-based, third-party load balancers. You must be able to create an Application Center cluster and load balance the traffic among the servers. What should you do? Manually configure NLB on the server that will be the cluster controller. Rerun the New Cluster Wizard. Configure the cluster to use Component Load Balancing (CLB) for load balancing. Install Windows 2000 Advanced Server on the servers. Reinstall Application Center, and rerun the New Cluster Wizard. D. Install a second network adapter in each server. Rerun the New Cluster Wizard. Answer: D QUESTION 66: You are the network administrator for Certkiller . Certkiller 's Web site has experienced a large amount of traffic, so you decide to add another server to the cluster. You use a server that is configured as a file and print server. You start the installation of Application Center 200 and receive a warning that only the Administrative client can be installed. During troubleshooting, you view the ac_setup.log file and chkosreq output, which are shown in the Ac_setup.log File exhibit and the Chkosreg Output exhibit. You want to install the server components of Application Center by using the least amount of administrative effort. What should you do? Install the post-Service Pack 1 hotfixes. Run the dcpromo.exe file. Install Internet Information Services (IIS), and enable the IIS Administration Service. Reformat the server, and install Microsoft Windows 2000 Server. Answer: C QUESTION 67: You are the network administrator for Certkiller . Certkiller is planning the launch of a new Web site. The initial deployment of the site will contain 10 font-end Web servers and one management server. You want to accomplish the following goals: The site must be highly available and scalable beyond 10 servers. You must be able to synchronize all the front-end servers with content updates from the management server. You must have consolidated logging of events for centralized monitoring of each cluster. You must be able to centrally manage the load balancing of front-end servers from the management server. You must be able to aggregate site performance data for each cluster in a central location. You take the following actions: Install Application Center 2000 on all the Web servers by using the customer installation. For the installation, select only the server option and do not enable Application Center Events and Performance Logging. Install Application Center 2000 on the management server by using the custom installation and selecting all options. Create two Application Center clusters of five servers that use Network Load Balancing (NLB) and default settings. Load balance the clusters by using round-robin DNS. * Use System Monitor to monitor all the servers. Which result or results do these actions produce? (Choose all that apply) The site is available and scalable beyond 10 servers. You are able to synchronize all the front-end servers with content updates from the management server. You have consolidated logging of events for centralized monitoring of each cluster. You are able to centrally manage the load balancing of the front-end servers from the management server. You are able to aggregate site performance data for each cluster in a central location. Answer: A, B, D QUESTION 68: You are the network administrator for Certkiller . Certkiller wants to ease the deployment of content to its Web servers. A developer wants to use Microsoft FrontPage to publish content. The developer also wants the content to be automatically synchronized across the Web servers. You want to ensure that the FrontPage requests are sent to one server and that all Web servers receive the published updates while maintaining ASP session state. You install Application Center 2000 on the Web servers and create a cluster. What should you do next? Enable Web request forwarding only. Enable the forwarding of Microsoft FrontPage publishing requests only. Enable Web requests forwarding, and enable the forwarding of Microsoft FrontPage publishing requests. Enable the forwarding of Distributed Authoring and Versioning (DAV) requests and Microsoft FrontPage publishing requests. Answer: C QUESTION 69: You are a network administrator for Certkiller . You create a global distribution group named ITStaff. The ITStaff group is a member of a domain local group named Public. The public group has the Read permission for a resource on the domain controller. The resource is named Res1. Ten employees in the IT department need access to Res1. You add the user accounts for the 10 employees to the ITStaff group, and you instruct the 10 employees to attempt to access Res1 immediately. They report that they cannot access Res1. You need to ensure that 10 employees can access Res1. What should you do? A. Configure the ITStaff group's group scope to be a universal group, and instruct the 10 employees to log out and to log in again. Configure the Public group's group scope to be a universal group, and instruct the 10 employees to log out and to log in again. Configure the ITStaff group's group type to be a security group, and instruct the 10 employees to log out and to log in again. Move the user accounts of the 10 employees so that the accounts are in the same organizational unit (OU) as the ITStaff group, and instruct the 10 employees to log out and to log in again. Answer: C QUESTION 70: You are the network administrator for Certkiller . The network contains a Windows 2000 Server computer named Certkiller 1. Certkiller 1 runs three software applications that were created by Certkiller 's software developers. One of the developers reports that all the software applications running on Certkiller 1 are responding slowly. The developers suspects that one of the applications is affecting the others. However, the developers does not know which application might be causing the problem, You open Task Manager on Certkiller 1 and view the results shown in the exhibit. You need to ensure that the developers can reset the application that is causing the problems. You also need to ensure that the other applications on Certkiller 1 function properly. What should you do? In Task Manager, select moderator.exe and click End Process. In Task Manager, right-click System, select Set Priority, and then select High. From the command line, run the net stop 712 command. From the command line, run the start mstask.exe /high command. Answer: A QUESTION 71: You are the Webmaster of Certkiller 's Internet Web site. The Web site is hosted by a Windows NT Server computer. You create an FTP site to allow users to upload and download documents. You want to assign user names and passwords to each user who is authorized to access the site. You also want to hide the FTP site from users who might be randomly trying to access FTP sites on various servers. Which three actions should you take? (Each correct answer presents part of the solution. Choose three) Configure the FTP site to use port 21. Configure the FTP site to use port 26. Configure the FTP site to disallow anonymous access. Configure the FTP site to assign the Read and Write permission for the IUSR_FTP account. Configure the FTP site to assign the Read and Write permission for each FTP user account. Answer: B, C, F QUESTION 72: You are the administrator of a Windows NT Server network. You are adding a new Windows NT Server computer named Certkiller 1 to the network. A portion of the network is shown in the Network Configuration exhibit. You install and begin to test Certkiller 1. You log on to Client1 and connect to a shared folder on Certkiller 1. You then log on locally to Certkiller 1 and attempt to connect to a shared folder on Certkiller 2 by using the path \\ Certkiller 2\Share1. You receive the following error message: "The network path \\ Certkiller 2\Share1 could not be found". You run the ipconfig command on Certkiller 1 and receive the results shown in the IP Configuration exhibit. You need to ensure that Certkiller 1 can connect to Certkiller 2 What should you do? Force Certkiller 2 to replicate Certkiller 1's [1Ch] record to all other WINS servers. Configure Certkiller 2 to use Certkiller 1 as a pull partner. Configure Certkiller 1 to use 10.10.13.10 as its primary and secondary WINS address. Configure Certkiller 1 to use 10.10.13.254 as the default gateway. Answer: C QUESTION 73: You are an Application Center specialist, You are responsible for designing a solution that runs on the WINDOWS 2000 platform. When you configure the server services on the Application Center server, a "Misconfigured Services" error message is received. Jay suspects that the Application Center Cluster service is not properly configured. What should you do? On the Recovery tab of the Application Center Cluster service properties, click Restart for each of the lists. In the Reset fail count after [x] days box, enter 0. On the Recovery tab of the Application Center Cluster service properties, click Restart of the lists. In the Reset fail count after [x] days box, enter 0. In the Restart service after [x] minutes box, enter 1. On the Recovery tab of the Application Center Cluster service properties, click Restart for each of the lists. In the Reset fail count after [x] days box, enter 49710. In the Restart service after [x] minutes box, enter 0. On the Recovery tab of the Application Center Cluster service properties, in the Reset fail count after [x] days box, enter 10. In the Restart service after [x] minutes box, enter 1535. Answer: C QUESTION 74: You are the Web cluster administrator for Certkiller . While using the Application Center console to monitor synchronization, you see various states displayed. What synchronization states exist in Application Center and what do they mean? (Choose all that apply) Writing - The replicated files and configuration settings are being written to the target. Initializing - The source server is starting a replication job. Preparing - The CContent list on the target is compared to the CContent list on the source computer and used to create the Install list. Moving - The CContent list is used to move the required files to the target machine in preparation for writing. Transferring - The Update list is sent to the target and the required files are copied to a temporary directory in preparation for writing. Applying - The replicated files and configuration settings are being written to the target. Preparing - The source server is starting a replication job. Scanning - The IHave lists are created on both the target and source computers and the lists are compared to generate the Action list. Answer: E, F, H QUESTION 75: You are the Web server infrastructure administrator for Certkiller . There are currently three Web sites and six Web servers that use round-robin DNS for load balancing. The Web sites and Web servers are configured as shown in the exhibit. All of the servers are configured with identical hardware. The average CPU usage during peak periods is 50 percent for both the www.adatum.com www.fabrikam.com Web sites. The average CPU usage during peak periods is 80 percent for the www. Certkiller .com Web site. You install Application Center 2000 on each server and plan to use Network Load Balancing (NLB) for load balancing. You want to configure Application Center to provide the maximum amount of load balancing and fault tolerance for all three Web sites. What should you do? Create a Web cluster that consists of Certkiller 1 and Certkiller 2, and host the www.adatum.com Web site on both servers. Create a Web cluster that consists of Certkiller 3 and Certkiller 4, and host www. Certkiller .com Web site on both servers. Create a Web cluster that consists of Certkiller 5 and Certkiller 6, and host the www.fabrikam.com Web site on both servers. Create a Web cluster that consists of Certkiller 1, Certkiller 2, Certkiller 3, Certkiller 4, Certkiller 5, and Certkiller 6, and host the www.adatum.com, www.contoso.com, and www.fabrikam.com Web sites on each server. Create a Web cluster that consists of Certkiller 1, Certkiller 2, Certkiller 3, Certkiller 4, Certkiller 5, and Certkiller 6. Host the www.adatum.com Web site on Certkiller 1 and Certkiller 2. Host the www. Certkiller .com Web site on Certkiller 3 and Certkiller 4. Host the www.fabrikam.com Web site on Certkiller 5 and Certkiller 6. D. Create a Web cluster that consists of Certkiller 1, Certkiller 2, Certkiller 3, Certkiller 4, Certkiller 5, and Certkiller 6. Host the www.adatum.com Web site on Certkiller 1, Certkiller 2, and Certkiller 3. Host the www.fabrikam.com Web site on Certkiller 4, Certkiller 5, and Certkiller 6. Host the www. Certkiller .com Web site on Certkiller 1, Certkiller 2, Certkiller 3, Certkiller 4, Certkiller 5, and Certkiller 6. Answer: B QUESTION 76: You are the network administrator for Certkiller . Three servers in a Web cluster were installed by using unattended installation scripts. The installation scripts include Microsoft Windows 2000 Server with default settings and Windows 2000 Service Pack 1 (SP1). You manually install Application Center 2000 on this Web cluster by using setup.exe. During the Application Center installation, the setup fails and you receive the following message: "Setup had detected this computer is configured to work with the Administrative client only." You need to resolve this problem. What should you do? Apply only the post-SP1 security hotfixes. Apply all the post-SP1 hotfixes. Reapply SP1. Install Internet Information Services (IIS). Answer: B QUESTION 77: You are a network administrator for Certkiller . A new company policy requires that new server installations include the most recent service pack. Company executives plan 100 new server installations during the next three months. You need to deploy the new servers with the least amount of administrative effort. What should you do? When each new computer is delivered, install Windows 2000 Server on it. Then run the update.exe command from the service pack CD-ROM. When each new computer is delivered, install Windows 2000 Server on it. Then run the setup.exe command from the service pack CD-ROM. When the first new computer is delivered, install Windows 2000 Server on it. On drive C, create a folder named Win2000 and copy the contents of the Windows 2000 Server CD-ROM into this folder. Run the update.exe -s:c:\Win2000 command from the service pack CD-ROM. Create a new installation CD-ROM that contains the contents of the Win2000 folder, and use this CD-ROM for all subsequent new server installations. D. Install Windows 2000 Server on an existing server. On drive C, create a folder named i386 and copy the contents of the Windows 2000 Server CD-ROM into this folder. Run the setup.exe -s:c:\i386 command from the service pack CD-ROM. Create a new installation CD -ROM that contains the contents of this folder, and use this CD-ROM for all subsequent new server installations. Answer: C QUESTION 78: You are the administrator of a Windows NT domain named CORP. The CORP domain is configured as shown in the exhibit. Certkiller 1 is a new Windows NT Server computer. You are installing Routing and Remote Access Service (RRAS) on Certkiller 1. You also install a 12-port analog 56-Kbps modem card and configure RRAS to use the modem card for incoming analog connections. You configure RRAS to use a static pool of IP addresses for client computers when they use a dial-up connection. The static pool uses the IP address range of 10.11.10.201 to 10.11.10.220. The network subnet mask is 255.255.0.0 Remote users report that they cannot access shared resources when the dial in to the network. You want remote users to be able to access all shared resources when the dial into the network. What should you do? Configure RRAS on Certkiller 1 to use DHCP to obtain IP addresses for remote users. Configure TCP/IP on Certkiller 1 to use DHCP for its Ethernet network adapter. Create a computer account in the CORP domain for all computers that are used by remote users. Configure the computers that connect to Certkiller 1 to use 10.10.20.9 as the default gateway. Answer: A QUESTION 79: You are the administrator of Certkiller 's Internet Web server. The Web server is a Windows NT Server computer that hosts five public Web sites. One of these five sites is Certkiller 's public Web site. You want to allow employees to download company documents from the Web server when the employees are away from the office. You want to protect the security of each employee's user name and password when employees are accessing the documents. You also want to ensure that only employees can access the documents. What should you do? Create a FTP site, and configure it to allow only Windows NT user connections. Create a FTP site, and configure it to allow only anonymous user connections. Create a new Web site, configure it to use Windows NT Challenge/Response authentication, and enable directory browsing. Configure Certkiller 's Web site to use Windows NT Challenge/Response authentication, and enable directory browsing. Answer: C QUESTION 80: You are the administrator of a Windows NT Server computer. The computer is used as a file and print server and shared four printers. The printers are shared as Printer1, Printer2, Printer3, and Printer4. A use reports that a document has been first in the Printer2 print queue for several hours and that nothing is printing on the print device. You examine the print queue and discover that the first job is spooling. Several other print jobs are waiting in the print queue. You verify that the print device is functioning correctly. You attempt to cancel spooling print job, but its status remains unchanged. You need to remove the spooling print job, and you want to minimize downtime for other users. What should you do? A. Restart the computer. Reset the Printer2 print device while the computer is restarting. Stop the Print Spooler service, and then delete the files in the folder that contains spooled print jobs. Start the Print Spooler service. Reset the Printer2 print device. Stop and restart the Server service. Stop the Print Spooler service and the Server service. Reset the Printer2 print device, and then restart both services. Delete any zero-byte files from the print spool folder. Answer: B QUESTION 81: You are the System development Engineer for Certkiller . You are currently responsible for rolling out Application Center 2000 in your organization. You are setting up a NLB and CLB based solution. You look on one of the nodes to see if there is a replication directory. From the list below, which one is the correct directory for replication? $ACSRPLS $ACSRPRS $ATSRPLS $ACSLPLS Answer: A QUESTION 82: You are an Application Center specialist. You are responsible for designing a solution that runs on the WINDOWS 2000 platform. You configure an Application Center cluster. Refer to the exhibit. Under which of the following conditions should you consider making changes to the settings in this exhibit? (Choose all that apply) In your cluster, there are members that are also handling e-mail traffic. There are hardware-based performance differences between the cluster members. In your cluster, there are members that are also handling FTP traffic. In your cluster, updates to the Web server occur frequently. In your cluster, a large volume of data is replicated throughout the day. Answer: A, B, C, D, E QUESTION 83: You are the Web infrastructure administrator for Certkiller . You configure an Application Center 2000 Web cluster that consists of five servers. In addition, there is a single staging server running Microsoft Windows 2000 Advanced Server. Any changes to the Web site must be fully tested before being deployed. You want to configure the staging server so that Application Center can be used to deploy content form the staging server to the Web cluster. What should you do? A. Install Application Center on the staging server. Join the server to the Web cluster, and make the server the cluster controller. B. Install Application Center on the staging server. Join the server to the Web cluster, and make the server a member of the cluster. Install Application Center cluster that consists of only the staging server. Configure an Application Center cluster that consists of only the staging server. Install the Client tools only for Application Center on the staging server. Use the Application Center snap-in to deploy content from the staging server to the Web cluster. Answer: C QUESTION 84: You are the network administrator for Certkiller . There are five Web servers that are load balanced by using round-robin DNS. All the servers are running Microsoft Windows 2000 Server, Windows 2000 Service Pack 1, and the post-Service Pack 1 (SP1) hotfixes required for Application Center 2000. Each server has two network adapters. You want to install Application Center on these Web servers and Use Network Load Balancing (NLB) for load balancing. You want to accomplish this by using the least amount of administrative effort. What should you do? A. Install Application Center on the servers. Add all the servers to single Application Center cluster that uses NLB. B. Install Application Center on the servers. Add each server to its own Application Center cluster that use NLB. C. Reformat the servers. Install Windows 2000 Advanced Server, Windows 2000 Service Pack 1, the post-SP1 hotfixes, and Application Center on the servers. Add the servers to a single Application Center cluster that uses NLB. D. Reformat the servers. Install Windows 2000 Adapter Server, Windows 2000 Service Pack 1, the post-SP1 hotfixes, and Application Center on the servers. Add each server to its own Application Center cluster that uses NLB. Answer: A QUESTION 85: You are a domain administrator for Certkiller . The network contains a Windows 2000 Server computer that is configured as a member server. You use a Windows 2000 Professional computer named Desktop1. You run Performance Monitor on the member server and configure an alert to notify you at Desktop1 when CPU usage is more than 90 percent. You want to ensure that you receive alerts on Desktop1. Which two actions should you take? (Each correct answer presents part of the solution. Choose two) Ensure that the Alerter service is running on the member server. Ensure that the Server service is running on the member server. Ensure that the Messenger service is running on the member server. Ensure that the Alerter service is running on Desktop1. Ensure that the Messenger service is running on Desktop1. Ensure that the Workstation service is running on Desktop1. Answer: A, E QUESTION 86: You are the administrator of a Windows NT Server computer named Certkiller 1. Certkiller 1 is the Routing and Remote Access server for your network. The server has a 12-port analog 56-Kbps modem card installed. Routing and Remote Access Service (RRAS) is configured to use the modem card for incoming analog connections. You create a new user account for a consultant named Jenny. Jenny is using a UNIX computer to work on a database project for Certkiller . Jenny reports that she cannot connect to Certkiller 1 by using her UNIX-based SLIP client software. When you dial in to Certkiller 1 from your Windows 2000 Professional computer, you can connect by using Jenny's account. You need to resolve this problem. What should you do? Configure Jenny's account to disable callback. Configure Jenny's account to include the MAC address of her UNIX computer in the list of authorized logon workstations. Configure Jenny's computer to use UNIX-based PPP client software. Configure Jenny's computer to disable data encryption in her dial-up connection properties. Answer: C QUESTION 87: You are the administrator of a network that consists of a single Windows NT domain. The domain contains Windows NT Server computers, UNIX computers, and Windows 2000 Professional computers. The domain also contains a DHCP server and a WINS server. The UNIX computers use a DNS service on a computer named UNIX1 that is managed by an offsite contractor. The contractor usually takes three to five days to respond to requests. Users of the Windows 2000 Professional computers are required to use IP addresses to access the UNIX computers. You want to configure the network to make it easier for these users to access the UNIX computers. You also want to eliminate the need for a contractor to manage the name resolution for the UNIX computers. Which two actions should you take? (Each correct answer presents part of the solution. Choose two) Configure the network DHCP scope to include the IP addresses of the UNIX computers in its range. Configure the network DHCP scope to use UNIX1 as a DNS server. Configure the network DHCP scope to use a Windows NT Server computer as a DNS server. Install the DNS Server service on a Windows NT Server computer, and configure the UNIX computers to use the new DNS Server service. Install an additional WINS server, and create WINS records for each UNIX computer. Answer: C, D QUESTION 88: You are the administrator of Certkiller 's network. The network includes two identical print devices and a Windows NT Server computer. The printers for these print devices are shared as Printer1 and Printewr2. The server is used as a print server. Users can print to both shared printers. However, most of the client computers are configured to use only one printer or the other. Client computers in the accounting department are configured to use Printer1. Client computers in the operations department are also configured to use Printer1. Users in the operations department report that the users in the accounting department often print large reports. The users in the operations department must wait for their documents to be printed even though few or no documents are being printed on Printer2. You want to configure the printers so that the printing load from both departments is evenly distributed. What should you do? A. Create a new shared printer named Printer3. Configure Printer3 to use both print devices in a printer pool. Configure all user accounts to print to Printer3. B. Configure Printer1 to print to the same port as Printer2. Set the priority on Printer1 to 50 and the priority on Printer2 to 75. C. Configure Printer2 to print to the same port as Printer1. Set the priority on Printer1 and Printer2 to 50. D. Modify the registry so that Printer1 and Printer2 use the same folder to store spooled print jobs. Answer: A QUESTION 89: You are an Application Center specialist. You are responsible for designing a solution that runs on the WINDOWS 2000 platform. You are removing a cluster member from a cluster which serves web requests. This member is found to be unstable for a while. What should you do? First remove it from the cluster, then run CLUSTER /REGCLEAN to clean up all the cluster configuration settings. First remove it from the cluster, then run CLUSTER /CLEAR to clean up the cluster configuration settings. First remove it from the cluster, then run CLUSTER /CLEAN to clean up all the cluster configuration settings. First remove it from the cluster, then run CLUSTER /REMOVE to clean up all the cluster configuration settings. Answer: C QUESTION 90: You are the administrator for an Application Center 2000 Web cluster that uses Network Load Balancing (NLB) and consists of five servers. The Web cluster uses host headers to host several Web sites. Certkiller is changing its Internet service provide, so you need to change all Internet IP addresses. You appropriately configure the new dedicated IP addresses on each server in the cluster. You need to configure NLB to work with the new IP address range. What should you do? Using the network adapter properties dialog box, modify the primary NLB IP address on the cluster controller and on each member of the cluster. Manually synchronize the cluster. Using the NLB properties dialog box, modify the primary NLB IP address on the cluster controller. Manually synchronize the cluster. Bring each server online. Using the NLB properties dialog box, modify the primary IP address on the cluster controller. Using the network adapater properties dialog box, modify the primary IP address on the cluster controller. Bring each server online. Using the NLB properties dialog box, modify the primary IP address on each member of the cluster. Using the network adapter properties dialog box, change the primary NLB IP address on the cluster controller. Bring each server online. Answer: C QUESTION 91: You are the network administrator for Certkiller . Certkiller 's Web site has experienced a large amount of traffic, so you decide to add another server to the cluster. You use a spare production server. You start the installation of Application Center 2000 and receive a warning that only the Administrative client can be installed. During troubleshooting, you view the ac_setup.log file and chkosreq output, which are shown in the Ac_setup.log File exhibit and the Chkosreq Output exhibit. You want to install the server components of Application Center by using the least amount of administrative effort. What should you do? Install the post-Service Pack 1 hotfixes. Run the dcpromo.exe file. Install Internet Information Services (IIS), and enable the IIS Administration Service. Reformat the server, and install Microsoft Windows 2000 Server. Answer: B QUESTION 92: You are the network administrator for Certkiller . Certkiller is planning the launch of a new Web site. The initial deployment of the site will contain 10 front-end Web servers and one management server. You want to accomplish the following goals: The site must be highly available and scalable beyond 10 servers. You must be able to synchronize all the front-end servers with content updates from the management server. You must have consolidated logging of events for centralized monitoring of each cluster. You must be able to centrally manage the load balancing of the front-end servers from the management server. You must be able to maintain client state for ASP sessions. You take the following actions: Install Application Center 2000 on all the Web servers by using the custom installation. For the installation, select all the server options. Install Application Center 2000 on the management server by using the custom installation. For the installation, select only the client option. Create two Application Center clusters of five servers that use Network Load Balancing (NLB) and default settings. Load balance the clusters by using round-robin DNS. Create a Microsoft Management Console (MMC) view of Event Viewer from all the servers. Which result or results do these actions produce? (Choose all that apply) The site is highly available and scalable beyond 10 servers. You are able to synchronize all the front-end servers with content updates from the management server. You have consolidated logging of events for centralized monitoring of each cluster. You are able to centrally manage the load balancing of the front-end servers from the management server. You are able to maintain client state for ASP sessions. Answer: A, C, D

Related Downloads
Explore
Post your homework questions and get free online help from our incredible volunteers
  954 People Browsing
Your Opinion
How often do you eat-out per week?
Votes: 79