Q1. You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. You are in the process of choosing an authentication method for Exchange ActiveSync. You need an authentication method that requires both, a password and an external device. Which of the following authentication methods will you choose for Exchange ActiveSync?
A. Device-based authentication
B. Basic authentication
C. Certificate-based authentication
D. Token-based authentication
Answer: D
Q2. Which of the following is a service can be enabled to ensure that the servers are able to receive all essential software updates?
A. Windows Software Update Services
B. Read-Only domain controller (RODC)
C. Microsoft Baseline Security Analyzer
D. DNS dynamic update
Answer: A
Q3. Which of the following security zones is used for Web sites that the user does not trust?
A. Internet zone
B. Trusted zone
C. Restricted zone
D. Local Intranet zone
Answer: C
Q4. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. Mark configures Network Access Protection (NAP) on the network. He then configures secure wireless access to the network from all access points on the network. He also configures 802.1x authentication for accessing the network. Mark wants to ensure that all computers connecting to the network are checked by NAP for the required configuration and update status. What will Mark do to accomplish the task?
A. Configure all computers connecting to the network with IPSec.
B. Configure all access points as RADIUS clients to Distributed File System.
C. Configure Link-local Multicast Name Resolution (LLMNR) on the network.
D. Configure all access points as RADIUS clients to Network Policy Server (NPS).
Answer: D
Q5. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also in under pressure to make this new feature a winning strategy for a company. Mark wants the employees to be free to troubleshoot their own wireless connections before contacting him. Which of the following is the basic troubleshooting step that he can ask them to do?
A. To power cycle the wireless access points and then reboot the systems.
B. To configure the network to use only Extensible Authentication Protocol (EAP).
C. To reboot the computers they are using and then use the MAC filtering.
D. To right-click the network icon in the system tray and then select Troubleshoot Problems.
Answer: D
Q6. Mark works as the Network Administrator of a Windows 2000 based network. In order to reduce the administrative burden and to optimize the network performance, he implements the DHCP and the DNS servers on the network. What will he do integrate the working between the DHCP and the DNS servers? Each correct answer represents a part of the solution. Choose two.
A. Configure the clients to use the DHCP server.
B. Enable DNS updates on the DHCP server.
C. Enable dynamic update on the DNS server.
D. Use the TCP/IP protocol on the network.
Answer: BC
Q7. What are the main classes of biometric characteristics? Each correct answer represents a complete solution. Choose two.
A. Psychological
B. Behavioral
C. Fundamental
D. Physiological
Answer: BD
Q8. Which of the following collects email addresses of users and creates a mailing list?
A. Browser
B. Cookie
C. Spambot
D. Perimeter network
Answer: C
Q9. You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains 4 Windows Server 2008 member server and 120 Windows Vista client computers. Your assistant wants to know about the settings that make up Network Access Protection (NAP) health policies. Choose the settings that are the part of Network Access Protection (NAP) health policies.
Answer:
Q10. Which of the following is a disadvantage of using biometric identification?
A. It breaks the several firewall security rules.
B. It needs a new network configuration of the entire infrastructure.
C. It can be faked and will not be trusted by several organizations.
D. It is expensive and cannot be afforded by several organizations
Answer: D