TEST NAME: NT SERVER 4
TEST#: 70-067
MY NAME: LUKE
DUMP:
1. When installing Windows NT Server 4.0, you can create three setup
disks.
These disks can be used later to start the computer in case of startup
problems. How can you recreate the setup disks if you lose the original
set?
a. run Disk Administrator
b. run Winnt.Exe from the installation CD-ROM
c. choose the System option in Control Panel and select Create Emergency
Repair Disk
d. choose the Add/Remove Programs option in Control Panel and select
Startup
Disk
Answer: b
- Your response: [None] (Incorrect)
Section: 6. Troubleshooting
Choice b is correct. Setup disks are normally created during
installation.
If you lose or misplace your setup disks, you can recreate them by
running
Winnt.Exe from the installation CD-ROM. If you use the /ox switch with
Winnt.Exe, Setup will only create the setup disks without initializing
the
actual installation process. INTS4, Chapter 1, Starting Installation,
pp.
17-18.
2. You suspect that the increase in network traffic you have been
observing
on your LAN is due to an incorrect Pulse or PulseConcurrency setting on
one
of the domain controllers. Under what registry hive would you find the
current values of these settings on each domain controller?
a. HKEY_CLASSES_ROOT
b. HKEY_LOCAL_MACHINE
c. HKEY_CURRENT_CONFIG
d. HKEY_DYN_DATA
Answer: b
- Your response: [None] (Incorrect)
Section: 5. Monitoring and Optimization
Choice b is correct. One of the functions of the NetLogon service on
each
domain controller is to regulate domain synchronization. Registry key
entries dealing with domain synchronization can be found in the
HKEY_LOCAL_MACHINE\SYSTEM \CurrentControlSet\Services
\Netlogon\Parameters
registry key. INTS4, Chapter 3, Configuring Domain Synchronization, p.
132.
3. You are planning to transfer user accounts from a NetWare server to a
Windows NT domain controller using the Migration Tool for NetWare. By
default, how will the Migration Tool for NetWare handle user accounts
being
migrated from the NetWare server for which a user account with the same
name
already exists on the Windows NT domain controller?
a. The user account on the Windows NT domain controller will be
overwritten
by the user account from the NetWare server.
b. The user account on the NetWare server will not be transferred.
c. The user account on the NetWare server will be transferred to the
Windows
NT domain controller, and it will be renamed to a system-generated user
account by adding a prefix onto the original user account name.
d. You will be prompted by the Migration Tool for NetWare to choose
whether
you want to overwrite an existing Windows NT user account or whether you
want to prevent the NetWare server user account from being transferred.
Answer: b
- Your response: [None] (Incorrect)
Section: 4. Connectivity
Choice b is correct. By default, if a user account on a NetWare server
has
the same name as a user account previously existing on a Windows NT
domain
controller, the Migration Tool for NetWare will not transfer the user
account. Options to overwrite Windows NT user accounts or to create new
system-generated user accounts based on a prefix plus the old account
name
can also be specified in the User and Group Options dialog box. If
multiple
NetWare servers containing the same user accounts are being migrated to
a
single Windows NT domain controller, then a mapping file that renames
NetWare user account names to Windows NT user account names should be
created. Using a mapping file will allow better control for capturing
all
NetWare user account information to a Windows NT domain controller.
NTNS,
pp. 198-201.
4. Certain startup problems can be corrected by running the emergency
repair
process. Which of the following tasks can be accomplished by the
emergency
repair process?
a. verifying Windows NT system files
b. inspecting the startup environment
c. inspecting the boot sector
d. replacing the Master Boot Record
Answer: abc
- Your response: [None] (Incorrect)
Section: 6. Troubleshooting
Only choices a, b and c are correct. If the screen freezes or error
messages
are displayed during startup, you can run the emergency repair process
to
inspect and repair the boot sector, the startup environment and/or the
registry files. The emergency repair process can also be used to verify
Windows NT system files. If the files (including Boot.Ini and
Ntoskrnl.Exe)
that are needed to start Windows NT are corrupt or missing, the
emergency
repair process can replace or restore them. The emergency repair process
cannot be used to repair all disk problems. Although it can verify the
Partition Boot Sector for the system partition on the first hard disk,
it is
not used to verify or replace the Master Boot Record. WSRK, Chapter 20,
Using the Emergency Repair Disk, pp. 705-712.
5. Suppose the following situation exists:
Your company uses disk mirroring on all Windows NT servers. You are
asked to
implement a new fault tolerance standard for the entire network.
Required result:
The new fault tolerant system must be able to recover from a single disk
failure.
Optional desired results:
The new fault tolerant system should place less demand on system memory
and
the CPU than disk mirroring.
The new fault tolerant system should provide better read performance
than
disk mirroring.
Proposed solution:
Implement volume sets on all Windows NT servers.
Which results does the proposed solution produce?
a. The proposed solution produces the required result and produces both
of
the optional desired results.
b. The proposed solution produces the required result and produces only
one
of the optional desired results.
c. The proposed solution produces the required result but does not
produce
any of the optional desired results.
d. The proposed solution does not produce the required result.
Answer: d
- Your response: [None] (Incorrect)
Section: 1. Planning
Choice d is correct. Like stripe sets without parity, volume sets do not
provide any fault tolerance. If a single disk of the volume set fails,
the
whole volume set will fail. Therefore, the proposed solution does not
produce the required result. NTCP, pp. 234-236.
6. In the MIS domain at your company, Infofile.Txt exists in the
\\MIS\Documents shared folder. Sam is a member of the Sales domain. What
type of trust relationship must be in place for Sam to be able to at
least
view Infofile.Txt?
a. The Sales domain must trust the MIS domain, and Read permission on
the
\\MIS\Documents folder must be assigned to Sam's user account.
b. The Sales domain must trust the MIS domain, and Sam's user account
must
be added to the Everyone special group on the MIS domain.
c. The MIS domain must trust the Sales domain. Full Control permission
is
granted by default on shared directories.
d. The MIS domain must trust the Sales domain, and Read permission on
the
\\MIS\Documents folder must be assigned to Sam's user account.
Answer: c
- Your response: [None] (Incorrect)
Section: 3. Managing Resources
Choice c is correct. By default, the Everyone special group is granted
Full
Control permission on shared folders. A trusting domain makes its
resources
(files, directories and printers) available to a trusted domain. In this
scenario, the MIS domain must trust the Sales domain. NTCP, pp. 37-38.
7. Which of the following statements best describes the trust
relationships
present in a multiple master domain model?
a. There are one-way trusts present between all master domains. No
trusts
are present between the master domains and the resource domains.
b. There are one-way trusts present between all domains.
c. There are two-way trusts present between all master domains. One-way
trusts are present between the master domains and the resource domains.
d. There are two-way trusts present between all domains in the model.
Answer: c
- Your response: [None] (Incorrect)
Section: 3. Managing Resources
Choice c is correct. Multiple master domains contain two-way trusts
between
all master domains and one-way trusts between the resource domains and
the
master domains. In this model, each master domain trusts all other
master
domains. Each resource domain trusts each master domain. However, master
domains do not trust resource domains, and resource domains are not
required
to trust each other. Multiple master domains are recommended for
organizations with over 40,000 users that require centralized or
decentralized administration. NTCP, pp. 24-25.
8. You own an Internet service provider corporation. You need to provide
five new companies with virtual servers to maintain their WWW home
pages.
The virtual servers will all reside on a single Internet Information
Server
(IIS) machine. Each virtual server will have its own domain name and IP
address. Your network is not currently using a WINS or DNS server. At a
minimum, which of the following steps must you perform to configure your
network to accommodate these virtual servers?
(Select all steps that apply.)
a. Assign each virtual server's IP address to the IIS server's network
adapter card. Create a WWW folder for each company. For each virtual
server's WWW folder, manually assign a corresponding IP address using
the
Directories Properties dialog box.
b. Install a DNS server. Add each virtual server's domain name and IP
address to the database of the DNS server.
c. Install a WINS server. Add the NetBIOS names and IP addresses of the
virtual servers to the database of the WINS server. Reconfigure the DNS
server to resolve its domain names by querying the WINS server.
d. Install a DHCP server. Configure the DHCP server to maintain lease
information on the IP addresses assigned to the IIS server's network
adapter
card.
Answer: a
- Your response: [None] (Incorrect)
Section: 4. Connectivity
Only choice a is correct. To maintain web pages for five client
companies on
one IIS server, you must assign each company's IP address to the network
adapter card of the IIS server. You must create separate WWW folders for
each company and assign the correct IP address for each company to each
of
these folders. In this scenario, DNS name resolution will occur on DNS
servers maintained by the InterNIC. The installation of a DNS server
will
not be required. Local DNS or WINS servers would be needed only if
additional URL zones were required for each company (as in an Intranet).
A
DHCP server cannot be used to assign or manage multiple addresses on a
single network adapter card. RKIG, Chapter 5, Enterprise Scenarios, pp.
95-107.
9. There are 80 computers on the network. Users belong to three
departments,
and the users need to access all servers in all departments. Centralized
user account administration is required. Which of the following is the
best
domain model for this network?
a. single domain
b. single master domain
c. multiple master domain
d. complete trust
Answer: a
- Your response: [None] (Incorrect)
Section: 1. Planning
Choice a is correct. Although there are three departments involved, the
single domain model is still best suited for this network. Since users
need
to access all servers in all departments and departmental resource
management is not specifically required, it is better to implement a
single
domain model than a single master domain model. The network
administrator
can administer all network servers, and therefore avoid the need to
create
more levels of administration. NTCP, pp. 22-23.
10. There are two domains in your company: Sales and Development. Five
members of the sales team are now assisting the development team with
verifying beta testing results. For support with this task, these
individuals need access to the shared NTFS folder \RESULTS on a server
named
BETA residing in the Development domain. The Development domain trusts
the
Sales domain. What is the recommended approach to grant the five members
of
the sales team Full Control permission to the \RESULTS folder?
a. Create a global group in the Sales domain called SALES_TESTERS.
Assign
each of the five individuals to this global group. Create a local group
on
BETA in the Development domain called BETA_RESULTS. Assign Full Control
permission for the \RESULTS folder to this local group. Include the
SALES_TESTERS global group in the BETA_RESULTS local group.
b. Create a global group in the Sales domain called SALES_TESTERS.
Assign
each of the five individuals to this global group. Create a global group
in
the Development domain called BETA_RESULTS. Assign Full Control
permission
for the \RESULTS folder to the BETA_RESULTS global group. Include the
SALES_TESTERS global group in the BETA_RESULTS global group.
c. Remove the existing trust relationship. Establish a new trust
relationship where the Sales domain trusts the Development domain.
Create a
global group in the Sales domain called SALES_TESTERS. Assign each of
the
five individuals to this global group. Create a local group on BETA in
the
Development domain called BETA_RESULTS. Assign Full Control permission
for
the \RESULTS folder to this local group. Include the SALES_TESTERS
global
group in the BETA_RESULTS local group.
d. Remove the existing trust relationship. Establish a new trust
relationship where the Sales domain trusts the Development domain.
Create a
global group in the Sales domain called SALES_TESTERS. Assign each of
the
five individuals to this global group. Create a global group in the
Development domain called BETA_RESULTS. Assign Full Control permission
for
the \RESULTS folder to the BETA_RESULTS global group. Include the
SALES_TESTERS global group in the BETA_RESULTS global group.
Answer: a
- Your response: [None] (Incorrect)
Section: 3. Managing Resources
Choice a is correct. The recommended approach to grant access to a
resource
in the Development domain to the users of the Sales domain is to add the
Sales users to a global group in the Sales domain (trusted domain) and
to
assign the newly created global group to a local group in the
Development
domain (trusting domain). The local group on the server in the
Development
domain should then be assigned Full Control permission to the directory
in
question (\RESULTS). Since the Development domain already trusts the
Sales
domain, members of the Sales domain can be granted access to resources
in
the Development domain. The trust relationship as stated in the question
does not need to be changed. NTCP, pp. 37-38, 66-67.
11. Your file server contains a database that is accessed by all users
in
your domain and all trusted domains. Currently, the server only has one
physical disk. You want to implement fault tolerance on your file
server.
Which of the following actions would accomplish this task?
a. install one additional physical disk and implement a stripe set with
parity
b. install one additional physical disk and implement a stripe set
without
parity
c. install three additional physical disks and implement a volume set
d. install three additional physical disks and implement a stripe set
with
parity
Answer: d
- Your response: [None] (Incorrect)
Section: 1. Planning
Choice d is correct. Volume sets and stripe sets without parity do not
provide any fault tolerance. Striping with parity requires at least
three
physical disks. Therefore, to implement fault tolerance on your file
server
you could install three additional physical disks and implement a stripe
set
with parity. NTCP, pp. 242-243; RKRG, Chapter 4, Planning a
Fault-Tolerant
Disk Configuration, p. 161.
12. You have just installed a client-server database application on ten
NetWare clients and a Windows NT server on your network. What must also
be
installed on the Windows NT server to allow the NetWare clients to
access
information from the server's database?
a. File and Print Services for NetWare
b. Gateway Service for NetWare
c. the NWLink protocol
d. SAP Agent
Answer: c
- Your response: [None] (Incorrect)
Section: 4. Connectivity
Choice c is correct. For NetWare clients to communicate with a Windows
NT
server, the NWLink protocol must be installed on the Windows NT server.
Since the client-server database application will manage the transfer of
information between the Windows NT server and the NetWare clients, File
and
Print Services for NetWare is not required on the Windows NT server.
File
and Print Services for NetWare is only required on the Windows NT server
if
the NetWare clients require access to files or printers that reside on
the
Windows NT server. Gateway Service for NetWare allows a Windows NT
server to
connect to NetWare servers, but it does not allow NetWare clients or
servers
to connect to a Windows NT server. Service Advertising Protocol (SAP)
Agent
assists with dynamic routing when using the IPX/SPX protocol. NTNS, pp.
167-168.
13. You want to install Windows NT Server on a computer, and configure
the
computer to be a member server for a domain named Sales. Your local
domain
is called Accounting. The computer is not currently connected to the
Sales
domain. How should you install Windows NT Server on this computer?
a. Install the computer as a member server in a your local domain. After
the
computer is physically connected to the Sales domain, it will
automatically
join the Sales domain.
b. Install the computer as a PDC in the Sales domain. After the computer
is
physically connected to the Sales domain, demote it to be a member
server.
c. Install the computer as a BDC in the Sales domain. After the computer
is
physically connected to the Sales domain, demote it to be a member
server.
d. Install the computer as a member server in a workgroup called Sales.
After the computer is physically connected to the Sales domain,
configure it
to join the Sales domain.
Answer: d
- Your response: [None] (Incorrect)
Section: 2. Installation and Configuration
Choice d is correct. Computers running Windows NT Server 4.0 can be
configured to participate in either a workgroup or a domain. If a
computer
belongs to a workgroup that has the same name as another domain, the
computer will appear in the browse list for that domain. After the
computer
is physically connected to the domain, you must manually configure the
computer to join the domain. This enables the computer to participate in
domain administration. NTCP, pp. 8-10.
14. Keith, a member of the ProjectExecs global group in the Sales
domain, is
temporarily assisting the Technical team of your company to test a new
project tracking system. The executable files for the new system are
stored
in a folder on a FAT partition. The folder is on a server in the
Technical
domain. No other members of the Sales domain besides Keith need to have
access to the new system. What is the best way to give Keith access to
the
new project tracking system's files?
a. Create a trust relationship in which the Sales domain trusts the
Technical domain. Assign Keith's user account Read permission to the
project
tracking system's folder.
b. Create a trust relationship in which the Technical domain trusts the
Sales domain. Assign Keith's user account Read permission to the project
tracking system's folder.
c. Create a two-way trust relationship between the Sales domain and the
Technical domain. Assign Read permission for the project tracking
system's
folder to the ProjectExecs global group. Revoke the right to remotely
log
onto the Sales domain for all members of the ProjectExecs global group
except Keith.
d. Create a trust relationship in which the Technical domain trusts the
Sales domain. Create a local group called NewSysTesters on the server
containing the project tracking system's folder. Add Keith's user
account to
this local group. Grant Read permission for the project tracking
system's
folder to the NewSysTesters local group.
e. Create a trust relationship in which the Technical domain trusts the
Sales domain. Create a share in the Technical domain for the folder
containing the project tracking system's program files. Assign Read
permission for the project tracking system's share to Keith's user
account.
Answer: e
- Your response: [None] (Incorrect)
Section: 3. Managing Resources
Choice e is correct. The correct trust relationship to be implemented in
this case is a one-way trust in which the Technical domain trusts the
Sales
domain. Since the folder containing the project tracking system's files
resides on a FAT partition, you cannot grant NTFS folder permissions to
Keith. You can limit Keith to reading and executing the files in the
folder
by assigning him Read permission on the folder's share. Had the folder
been
residing on an NTFS partition, assigning Read permission for the project
tracking system's folder to Keith's user account would be another way to
allow him to assist in the testing effort. NTCP, pp. 139-142.
15. Your company decides to install Windows NT Server 4.0 on all
computers
running Windows NT Server 3.51. What is the best way to upgrade the
servers
to Windows NT Server 4.0 if you want to minimize the amount of downtime
required to perform the upgrades?
a. run Setup.Exe from the installation directory with the /u switch
b. run Winnt.Exe from the installation directory with the /u switch
c. run Winnt.Exe from the installation directory with the /udf switch
d. run Winnt32.Exe from the installation directory with the /udf switch
Answer: d
- Your response: [None] (Incorrect)
Section: 2. Installation and Configuration
Choice d is correct. Winnt32.Exe is the Windows NT setup program used on
computers already running Windows NT. It allows the system files to be
upgraded to Windows NT Server 4.0 in the background while the server is
still running. The /udf switch is used to specify the location of a
uniqueness database file. The /u switch is used to specify the location
of
an answer file. The answer files and the uniqueness database files are
used
to automate the installation process. INTS4, Chapter 1, Starting
Installation, p. 18.
16. You have implemented a mirror set to protect the boot partition. One
of
the two disks in the mirror set fails. What is the best way to restore
the
mirror set?
a. Replace the failed disk with an identical disk and do nothing more.
Windows NT Server will automatically recreate the mirror set from the
remaining working partition.
b. Replace the failed disk with an identical disk and choose Recreate
from
the Partition menu in Disk Administrator.
c. Replace the failed disk with an identical disk and choose Regenerate
from
the Fault Tolerance menu in Disk Administrator.
d. Replace the failed disk with an identical disk, break the original
mirror
set and create a new mirror set.
Answer: d
- Your response: [None] (Incorrect)
Section: 6. Troubleshooting
Choice d is correct. If a member of a mirror set fails, you must first
break
the set by choosing Break Mirror from the Fault Tolerance menu. This
will
isolate the remaining working disk as a separate volume. You can then
create
a new mirror set by using the Establish Mirror command from the Fault
Tolerance menu in Disk Administrator. If one of the disks in the mirror
set
fails and you cannot boot Windows NT, use a fault tolerance boot disk to
boot Windows NT. NTCP, p. 255.
17. Your organization uses a single master domain model with the Corp
domain
as the master domain. The Sales domain in your organization trusts the
Corp
domain. Diane, a user whose computer is attached to the Sales domain,
logs
onto the Corp domain. What folders will she be able to view?
a. all folders in either the Corp or Sales domain for which the
Corp\Domain
Users global group has been granted Read Access
b. all folders in either the Corp or Sales domain for which the
Sales\Domain
Users global group has been granted Read Access
c. all folders in the Sales domain for which the Sales\Domain Guests
global
group has been granted Read Access
d. all folders in either the Corp or Sales domain for which the
Sales\Domain
Guests global group has been granted Read Access
Answer: a
- Your response: [None] (Incorrect)
Section: 3. Managing Resources
Choice a is correct. Since your organization uses a single master domain
model, Diane's user account will automatically be a member of the
Corp\Domain Users global group. She will have access to resources in any
domain for which the Corp\Domain Users global group has been granted
permissions. NTCP, pp. 23-24.
18. When Windows NT encounters data loss or failure of major functions,
it
produces kernel STOP errors. Which program would you use to view STOP
errors
and the time they occurred?
a. Event Viewer
b. Server Manager
c. Disk Administrator
d. Kernel Debugger
Answer: a
- Your response: [None] (Incorrect)
Section: 6. Troubleshooting
Choice a is correct. You can use Event Viewer to examine the Windows NT
system log. The system log can contain general system events, warning
messages and STOP error events. When you use Event Viewer to examine a
STOP
error, you will be able to identify the time it occurred as well as the
user
or computer associated with the event. Generally, the bottom-most STOP
error
listed in a series of STOP errors is the one that caused the other STOP
errors. INTS4, Chapter 12, Event Viewer, pp. 527-529.
19. You are installing Windows NT Server 4.0 on a machine. You want the
machine to be able to provide file and print resources to members in a
domain called Corp, but you do not want it to authenticate user logons.
How
would you configure the computer?
a. as the PDC in the Corp domain
b. as a BDC in the Corp domain
c. as a member server in the Corp domain
d. as a member server in a workgroup
Answer: c
- Your response: [None] (Incorrect)
Section: 1. Planning
Choice c is correct. A domain controller manages domain security and
processes logon requests. If you do not want a server to authenticate
user
logons, then you should not configure it to be a domain controller (a
PDC or
a BDC). However, for a server to share file and print resources with
members
in a domain, the server must participate in domain administration. NTCP,
p.
8.
20. Suppose the following situation exists:
Your company is based in Nashville, and has branch offices in New York
City,
Los Angeles, Atlanta and Dallas. Each of the five offices has 200 users.
Each branch office is connected to the Nashville office via 56 Kbps
frame
relay links. You are asked to implement a domain model for your company.
Required results:
Users from Nashville must be able to access resources in Dallas and
Atlanta.
Users from Los Angeles and New York City must be able to access
resources in
Nashville.
Logon validation traffic over the WAN links must be minimized.
Optional desired results:
You want centralized administration of all user accounts.
Each branch office wants to be able to manage its own resources.
Proposed solution:
Implement the complete trust model. Place all user accounts in the
Nashville
domain and configure all other branch offices to be resource domains.
(See Exhibit)
Which results does the proposed solution produce?
a. The proposed solution produces the required result and produces both
of
the optional desired results.
b. The proposed solution produces the required result and produces only
one
of the optional desired results.
c. The proposed solution produces the required result but does not
produce
any of the optional desired results.
d. The proposed solution does not produce the required result.
Answer: d
- Your response: [None] (Incorrect)
Section: 1. Planning
Choice d is correct. It is possible to have a complete trust model with
centralized account management and decentralized resource management.
However, the requirement to reduce logon validation traffic is not met
by
the proposed solution. If you place all user accounts in the Nashville
domain, then any time a user from a city other than Nashville needs to
log
on, he must connect to Nashville. This can produce a great amount of
logon
validation traffic over the WAN links. To minimize logon validation
traffic
over the WAN links, you should place at least one BDC from the Nashville
domain in each of the branch offices. INTS4, Chapter 2, Domain Models,
pp.
93-95.
>From Luke, Good Luck.