显示标签为“070-297”的博文。显示所有博文
显示标签为“070-297”的博文。显示所有博文

2014年4月23日星期三

Microsoftの070-298 070-297 070-294 070-293 070-291 070-290認定試験に関連する優秀な教材

Pass4TestのMicrosoftの070-298 070-297 070-294 070-293 070-291 070-290認証試験について最新な研究を完成いたしました。無料な部分ダウンロードしてください。きっと君に失望させないと信じています。最新Microsoftの070-298 070-297 070-294 070-293 070-291 070-290認定試験は真実の試験問題にもっとも近くて比較的に全面的でございます。

Pass4Testというサイトには全的な資源とMicrosoftの070-298 070-297 070-294 070-293 070-291 070-290の試験問題があります。それに、Microsoftの070-298 070-297 070-294 070-293 070-291 070-290の試験の実践経験やテストダンプにも含まれています。Pass4Testは受験生たちを助けて試験の準備をして、試験に合格するサイトですから、受験生のトレーニングにいろいろな便利を差し上げます。あなたは一部の試用問題と解答を無料にダウンロードすることができます。Pass4TestのMicrosoftの070-298 070-297 070-294 070-293 070-291 070-290の試験中に絶対な方法で転送することでなく、Pass4Testは真実かつ全面的な試験問題と解答を提供していますから、当社がオンラインするユニークなのMicrosoftの070-298 070-297 070-294 070-293 070-291 070-290の試験トレーニング資料を利用したら、あなたが気楽に試験に合格することができるようになります。Pass4Testは合格率が100パーセントということを保証します。

いま070-298 070-297 070-294 070-293 070-291 070-290認定試験の過去問問題集や参考書を必要とするでしょう。仕事に忙しいですから、試験の準備をする時間が足りないでしょう。ですから、効率が良い試験070-298 070-297 070-294 070-293 070-291 070-290参考書が必要です。もちろん、よりよく試験の準備をするように、自分に相応しいツールを選択するのは一番大事なことです。これは試験に合格できるかどうかに関連する大切な問題です。ですから、Pass4Testの070-298 070-297 070-294 070-293 070-291 070-290問題集を選択してください。

試験番号:070-298問題集
試験科目:Microsoft 「Designing Security for a MS Windows Server 2003 Network」
一年間無料で問題集をアップデートするサービスを提供いたします
最近更新時間:2014-04-22
問題と解答:全130問

試験番号:070-297問題集
試験科目:Microsoft 「Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure」
一年間無料で問題集をアップデートするサービスを提供いたします
最近更新時間:2014-04-22
問題と解答:全142問

試験番号:070-294問題集
試験科目:Microsoft 「Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 AD Infrastructure」
一年間無料で問題集をアップデートするサービスを提供いたします
最近更新時間:2014-04-22
問題と解答:全220問

試験番号:070-293問題集
試験科目:Microsoft 「Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure」
一年間無料で問題集をアップデートするサービスを提供いたします
最近更新時間:2014-04-22
問題と解答:全290問

試験番号:070-291問題集
試験科目:Microsoft 「Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure」
一年間無料で問題集をアップデートするサービスを提供いたします
最近更新時間:2014-04-22
問題と解答:全260問

試験番号:070-290問題集
試験科目:Microsoft 「Managing and Maintaining a Microsoft Windows Server 2003 Environment」
一年間無料で問題集をアップデートするサービスを提供いたします
最近更新時間:2014-04-22
問題と解答:全268問

弊社のMicrosoftの070-298 070-297 070-294 070-293 070-291 070-290勉強資料を利用したら、きっと試験を受けるための時間とお金を節約できます。Pass4TestのMicrosoftの070-298 070-297 070-294 070-293 070-291 070-290問題集を買う前に、一部の問題と解答を無料にダウンロードすることができます。PDFのバージョンとソフトウェアのバージョンがありますから、ソフトウェアのバージョンを必要としたら、弊社のカスタマーサービススタッフから取得してください。

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.pass4test.jp/070-293.html

NO.1 You are a network administrator for your company. The network consists of a single Active Directory
domain. All servers run Windows Server 2003.
All file servers for the Sales department are located in an organizational unit (OU) named SaleServers. All
file servers for the Accounting department are located in an OU named AccountServers.
You create a Group Policy Object (GPO) named SaleServersPolicy and link it to the SaleServers OU. You
create a GPO named AccountServersPolicy and link it to the AccountServers OU.
You need to ensure that only the AccountServersPolicy settings are applied to the AccountServers OU.
You must accomplish this task by using the Active Directory Users and Computers console. Your
operation must not affect other settings.
Answer.CP1 AND CP2
Step #1.
Open Active Directory Users and Computers by clicking Start > Administrative Tools > Active Directory
Users and Computers.
Step #2.
Expand the tree to show the Organizations Units (OUs). Right click on the AccountServers OU and select
Properties.
Step #3.
Go to the Group Policy tab.
Step #4.
Tick the Block Policy Inheritance checkbox then click Apply and OK.
Step #5.
Close Active Directory Users and Computers.

NO.2 You are the systems engineer for Contoso, Ltd. The internal network consists of a Windows NT 4.0
domain. The company maintains a separate network that contains publicly accessible Web and mail
servers. These Web and mail servers are members of a DNS domain named contoso.com. The
contoso.com zone is hosted by a UNIX-based DNS server running BIND 4.8.1.
Contoso, Ltd., is planning to migrate to a Windows Server 2003 Active Directory domain-based network.
The migration plan states that all client computers will be upgraded to Windows XP Professional and that
all servers will be replaced with new computers running Windows Server 2003.
The migration plan specifies the following requirements for DNS in the new environment:
Active Directory data must not be accessible from the Internet.
The DNS namespace must be contiguous to minimize confusion for users and administrators.
Users must be able to connect to resources in the contoso.com domain.
Users must be able to connect to resources located on the Internet.
The existing UNIX-based DNS server will continue to host the contoso.com domain.
The existing UNIX-based DNS server cannot be upgraded or replaced.
You plan to install a Windows Server 2003 DNS server on the internal network.
You need to configure this Windows-based DNS server to meet the requirements specified in the
migration plan.
What should you do?
A.Create a primary zone named ad.contoso.com on your Windows-based DNS server. Create a
delegation record for the new zone on the UNIX-based DNS server. Configure forwarders on your
Windows-based DNS server.
B.Create a primary zone named ad.contoso.com on the UNIX-based DNS server. Create a secondary
zone on your Windows-based DNS server for the ad.contoso.com domain.
C.Create a primary zone named contoso-ad.com on your Windows-based DNS server. Create a
secondary zone on the UNIX-based DNS server for the contoso-ad.com domain.
D.Create a primary zone named contoso-ad.com on the UNIX-based DNS server. Create a stub zone on
the Windows-based DNS server for the contoso-ad.com domain. Configure conditional forwarders on
your Windows-based DNS server for the contoso-ad.com and contoso.com domains.
Answer:A

Microsoft   070-293認定証   070-293過去問

NO.3 You are the network administrator for your company. All servers run Windows Server 2003. You
configure a baseline security template named Baseline.inf. Several operations groups are responsible for
creating templates containing settings that satisfy operational requirements. You receive the templates
shown in the following table.
The operations groups agree that in the case of conflicting settings, the priority order listed in the following
table establishes the resultant setting.
You need to create one or more Group Policy objects (GPOs) to implement the security settings. You want
to minimize the amount of administrative effort required when changes are requested by the various
operations groups. What should you do?
A. Create a GPO and import the following templates in the following order. Baseline.inf, Sec.inf. Create a
GPO for each server role and import only the specific template for that role into each respective GPO.
B. Create a GPO and import the following templates in the following order. Sec.inf, Baseline.inf. Create a
GPO for each server role and import only the specific template for that role into each respective GPO.
C. Create a GPO for each server role and import the following templates in the following order.
Baseline.inf, specific server role template, Sec.inf.
D.Create a GPO and import the following templates in the following order. Sec.inf, Db.inf, File.inf,
Baseline.inf.
Answer: A

Microsoft   070-293   070-293

NO.4 You are the network administrator for your company. The network consists of a single Active Directory
domain. The company's written security policy requires that computers in a file server role must have a
minimum file size for event log settings. In the past, logged events were lost because the size of the event
log files was too small. You want to ensure that the event log files are large enough to hold history. You
also want the security event log to be cleared manually to ensure that no security information is lost. The
application log must clear events as needed. You create a security template named Fileserver.inf to meet
the requirements. You need to test each file server and take the appropriate corrective action if needed.
You audit a file server by using Fileserver.inf and receive the results shown in the exhibit. (Click the
Exhibit button.) You want to make only the changes that are required to meet the requirements. Which two
actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. Correct the Maximum application log size setting on the file server.
B. Correct the Maximum security log size setting on the file server.
C. Correct the Maximum system log size setting on the file server.
D. Correct the Retention method for application log setting on the file server.
E. Correct the Retention method for security log setting on the file server.
F. Correct the Retention method for system log setting for the file server.
Answer: B E

Microsoft   070-293練習問題   070-293   070-293   070-293問題集

NO.5 You are the administrator for your company. The company has a new server which runs Windows
Server 2003 named Server1.
Server1 has two network connections. Internet connection is used to connect to the Internet and Local
Area Network connection is used to connect to the company network.
You need to ensure that company users can access the Internet through Server1. You also need to
prevent external, unauthorized users from accessing Server1 through the Internet. You must accomplish
this task by using the Routing and Remote Access Server Setup Wizard dialog box. Your operation must
not affect other settings on Server1.
Answer.CP1 AND CP2 AND CP3 AND CP4
Step #1.
Open the Routing and Remote Access console by clicking Start > Administrative Tools > Routing and
Remote Access.
Step #2.
Right click on Server1 and select Configure and Enable Routing and Remote Access.
Step #3.
The Routing and Remote Access Setup Wizard will open. Click Next.
Step #4.
Select Network address translation (NAT) and click Next.
Step #5.
Select "Internet Connection" as the public interface. Ensure that the "Enable security on the selected
interface...." checkbox is ticked. Then click Next.
Step #6.
Click Finish to close the wizard.
Step #7.
Close the Routing and Remote Access console.

NO.6 You are a network administrator for your company. The network contains a Windows Server 2003
computer named Server1 and ten Windows XP Professional client computers.
You configure Server1 with a LAN connection named Local Area Connection and an Internet connection
named Internet Connection. All of the client computers are connected to the LAN.
The users report that they cannot connect to the Internet. You discover that the IP configuration on the
client computers is correct.
You need to provide the ten client computers with Internet access. You must accomplish these tasks by
using the Server1's Network Connections console with the least amount of administrative effort. Your
operations must not affect other settings on Server1.
Answer.CP1 AND CP2
We need to enable Internet Connection Sharing (ICS) on the adapter named Internet Connection.
Step #1.
Open the Network Connections console by clicking Start > Control Panel > Network Connections.
Step #2.
Right click on Internet Connection and select Properties.
Step #3.
Click the Advanced tab.
Step #4.
Tick the checkbox to enable Internet Connection Sharing then click OK.
Step #5.
Click Yes.

NO.7 You are the network administrator for your company. The network consists of a single Active Directory
domain. All servers run Windows Server 2003.
When the network was designed, the design team set design specifications. After the network was
implemented, the deployment team set baseline specifications. The specifications for broadcast traffic
are:
The design specification requires that broadcast traffic must be 5 percent or less of total network traffic.
The baseline specification showed that the broadcast traffic is always 1 percent or less of total network
traffic during normal operation.
You need to monitor the network traffic and find out if the level of broadcast traffic is within design and
baseline specifications. You decide to use Network Monitor. After monitoring for 1 hour, you observe the
results shown in the exhibit. (Click the Exhibit button.)
You need to report the results of your observations to management.
Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A.Report that broadcast traffic is outside of the baseline specification.
B.Report that broadcast traffic is outside of the design specification.
C.Report that broadcast traffic is within the design specification.
D.Report that broadcast traffic is within the baseline specification.
Answer:A,B

Microsoft認証試験   070-293   070-293認定資格   070-293   070-293

NO.8 You are the network administrator for Tailspin Toys. The company has a main office and two branch
offices. The network in the main office contains 10 servers and 100 client computers. Each branch office
contains 5 servers and 50 client computers. Each branch office is connected to the main office by a direct
T1 line. The network design requires that company IP addresses must be assigned from a single classful
private IP address range. The network is assigned a class C private IP address range to allocate IP
addresses for servers and client computers. Tailspin Toys acquires a company named Wingtip Toys. The
acquisition will increase the number of servers to 20 and the number of client computers to 200 in the
main office. The acquisition is expected to increase the number of servers to 20 and the number of client
computers to 200 in the branch offices. The acquisition will also add 10 more branch offices. After the
acquisition, all branch offices will be the same size. Each branch office will be connected to the main
office by a direct T1 line. The new company will follow the Tailspin Toys network design requirements. You
need to plan the IP addressing for the new company. You need to comply with the network design
requirement. What should you do?
A. Assign the main office and each branch office a new class A private IP address range.
B. Assign the main office and each branch office a new class B private IP address range.
C. Assign the main office and each branch office a subnet from a new class B private IP address range.
D.Assign the main office and each branch office a subnet from the current class C private IP address
range.
Answer: C

Microsoft   070-293   070-293認定資格   070-293

NO.9 You are a network administrator for your company. All servers run Windows Server 2003. All client
computers run Windows XP Professional.
All client computers receive their TCP/IP configuration information from the DHCP server named Server1.
You discover that client computers get a new IP address every time they are restarted.
You need to ensure that client computers receive the same IP address as often as possible regardless of
a system restart. You must accomplish this task by using the DHCP console. Your operation must not
affect other settings.
Answer.(CP1 OR CP2) AND CP3
We need to change the lease time to "Unlimited".
Step #1.
Open the DHCP console by clicking Start > Administrative Tools > DHCP.
Step #2.
Expand the tree.
Step #3.
Right click on Scope1 and select Properties.
Step #4.
Select Unlimited then click Apply and OK.
Step #5.
Close the DHCP console.

NO.10 You are a network administrator for your company. The company has a main office and one branch
office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
The company needs to connect the main office network and the branch office network by using Routing
and Remote Access servers at each office. The networks will be connected by a VPN connection over the
Internet.
The company's written security policy includes the following requirements for VPN connections over the
Internet:
All data must be encrypted with end-to-end encryption.
VPN connection authentication must be at the computer level.
Credential information must not be transmitted over the Internet as part of the authentication process.
You need to configure security for VPN connection between the main office and the branch office. You
need to comply with the written security policy.
What should you do?
A.Use a PPTP connection with EAP-TLS authentication.
B.Use a PPTP connection with MS-CHAP v2 authentication.
C.Use an L2TP connection with EAP-TLS authentication.
D.Use an L2TP connection with MS-CHAP v2 authentication.
Answer:C

Microsoft   070-293認定証   070-293   070-293

NO.11 You are the network administrator for your company. The network consists of a single Active Directory
domain. The functional level of the domain is Windows Server 2003. The domain contains an
organizational unit (OU) named Servers that contains all of the company's Windows Server 2003
resource servers. The domain also contains an OU named Workstations that contains all of the
company's Windows XP Professional client computers. You configure a baseline security template for
resource servers named Server.inf and a baseline security template for client computers named
Workstation.inf. The Server.inf template contains hundreds of settings, including file and registry
permission settings that have inheritance propagation enabled. The Workstation.inf template contains 20
security settings, none of which contain file or registry permissions settings. The resource servers operate
at near capacity during business hours. You need to apply the baseline security templates so that the
settings will be periodically enforced. You need to accomplish this task by using the minimum amount of
administrative effort and while minimizing the performance impact on the resource servers. What should
you do.?
A. Create a Group Policy object (GPO) and link it to the domain. Import both the Server.inf and the
Workstation.inf templates into the GPO.
B. Import both the Server.inf and the Workstation.inf templates into the Default Domain Policy Group
Policy object (GPO).
C. On each resource server, create a weekly scheduled task to apply the Server.inf settings during
off-peak hours by using the secedit command. Create a Group Policy object (GPO) and link it to the
Workstations OU. Import the Workstation.inf template into the GPO.
D. On each resource server, create a weekly scheduled task to apply the Server.inf settings during
off-peak hours by using the secedit command. Import the Workstation.inf template into the Default
Domain Policy Group Policy object (GPO).
Answer: C

Microsoft認定資格   070-293   070-293   070-293問題集   070-293過去問

NO.12 You are a network administrator for your company. The network consists of a single Active Directory
forest that contains three domains. The functional level of the forest and of all three domains is Window
Server 2003. The company has a main office and 30 branch offices. Each branch office is connected to
the main office by a 56-Kbps WAN connection.
You configure the main office and each branch office as a separate Active Directory site. You deploy a
Windows Server 2003 domain controller at the main office and at each branch office. Each domain
controller is configured as a DNS server.
You can log on to the network from client computers in the branch offices at any time. However, users in
the branch offices report that they cannot log on to the network during peak hours.
You need to allow users to log on to the network from branch office computers. You do not want to affect
the performance of the branch office domain controllers. You need to minimize Active Directory replication
traffic across the WAN connections.
What should you do?
A.Use Active Directory Sites and Services to enable universal group membership caching for each branch
office site.
B.Use the DNS console to configure the branch office DNS servers to forward requests to a DNS server in
the main office.
C.Use Active Directory Sites and Services to configure each branch office domain controller as a global
catalog server.
D.Use the DNS console to configure the branch office DNS servers to use an Active Directory-integrated
zone.
Answer:A

Microsoft   070-293   070-293

NO.13 You are the network administrator for your company. The network consists of a single Active Directory
domain. All servers run Windows Server 2003.
The network contains servers that have Terminal Server enabled. The terminal servers host legacy
applications that currently require users to be members of the Power Users group.
A new requirement in the company's written security policy states that the Power Users group must be
empty on all resource servers.
You need to maintain the ability to run the legacy applications on the terminal servers when the new
security requirement is implemented.
What should you do?
A. Add the Domain Users global group to the Remote Desktop Users built-in group in the domain.
B. Add the Domain Users global group to the Remote Desktop Users local group on each terminal server.
C. Modify the Compatws.inf security template settings to allow members of the local Users group to run
the applications. Import the security template into the Default Domain Controllers Policy Group Policy
object (GPO).
D. Modify the Compatws.inf security template settings to allow members of the local Users group to run
the applications. Apply the modified template to each terminal server.
Answer: D

Microsoft認定資格   070-293参考書   070-293認定証   070-293   070-293   070-293

NO.14 You are the network administrator for your company. The network consists of a single Active Directory
domain. The network contains two Windows Server 2003 domain controllers, two Windows 2000 Server
domain controllers, and two Windows NT Server 4.0 domain controllers.
All file servers for the finance department are located in an organizational unit (OU) named Finance
Servers. All file servers for the payroll department are located in an OU named Payroll Servers. The
Payroll Servers OU is a child OU of the Finance Servers OU.
The company's written security policy for the finance department states that departmental servers must
have security settings that are enhanced from the default settings. The written security policy for the
payroll department states that departmental servers must have enhanced security settings from the
default settings, and auditing must be enabled for file or folder deletion.
You need to plan the security policy settings for the finance and payroll departments.
What should you do?
A.Create a Group Policy object (GPO) to apply the Compatws.inf security template to computer objects,
and link it to the Finance Servers OU.
Create a second GPO to enable the Audit object access audit policy on computer objects, and link it to the
Payroll Servers OU.
B.Create a Group Policy object (GPO) to apply the Securews.inf security template to computer objects,
and link it to the Finance Servers OU.
Create a second GPO to enable the Audit object access audit policy on computer objects, and link it to the
Payroll Servers OU.
C.Create a Group Policy object (GPO) to apply the Compatws.inf security template to computer objects,
and link it to the Finance Servers OU.
Create a second GPO to apply the Hisecws.inf security template to computer objects, and link it to the
Payroll Servers OU.
D.Create a Group Policy object (GPO) to apply the Securews.inf security template to computer objects,
and link it to the Finance Servers and to the Payroll Servers OUs.
Create a second GPO to enable the Audit object access audit policy on computer objects, and link it to the
Payroll Servers OU.
Answer:B

Microsoft認定資格   070-293参考書   070-293認証試験

NO.15 You are the network administrator for your company. The network contains an application server
running Windows Server 2003.
Users report that the application server intermittently responds slowly. When the application server is
responding slowly, requests that normally take 1 second to complete take more than 30 seconds to
complete. You suspect that the slow server response is because of high broadcast traffic on the network.
You need to plan how to monitor the application server and to have a message generated when
broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic
is high.
What should you do?
A.Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when
the Datagrams/sec counter in the UDPv4 object is high.
B.Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.
C.Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.
D.Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when
the Datagrams/sec counter in the TCPv4 object is high.
Answer:A

Microsoft認定証   070-293   070-293

NO.16 You are a network administrator for a consulting company. You need to create a wireless network that
will be used by consultants from your company at a customer location. The wireless network will consist of
nine portable computers, three servers, and four wireless digital cameras. All computers and cameras can
use either static or dynamic IP addressing. The cameras do not support data encryption. Both the portable
computers and the servers must be able to initiate communication over the Internet to VPN servers in
your company's main data center. Only the wireless access point is connected to the customer's
corporate network.You need to plan the wireless IP network so that it minimizes the risk of unauthorized
use of the wireless network and prevents unsolicited communication from the Internet to the hosts on the
network.What should you do?To answer, drag the appropriate configuration settings to the Wireless
Network Configuration.
Answer:

NO.17 You are a network administrator for your company. The network consists of a single Active Directory
domain named treyresearch.com. All servers run Windows Server 2003. All client computers run
Windows XP Professional.
The company has two DNS servers named Server1 and Server2. Server1 hosts the primary DNS zone for
treyresearch.com. Server2 provides name resolution for the external Internet name of the company on the
Internet and is configured with root hints.
Client computers are configured to use Server1 as their only DNS server.
Users report that they cannot access Web sites on the Internet.
You need to ensure that the client computers can access Internet-based sites. You must accomplish this
task by using Server1's DNS console with the least amount of administrative effort. Your operation must
not affect other settings on Server1.
Answer.CP1 AND CP2
DNS console -> Server -> Properties -> Forwarders, 'All other DNS domains' to IP address for Server2.

NO.18 You are the network administrator for your company. The network consists of a single Active Directory
domain. The network contains 10 domain controllers and 50 servers in application server roles. All
servers run Windows Server 2003. The application servers are configured with custom security settings
that are specific to their roles as application servers. Application servers are required to audit account
logon events, object access events, and system events. Application servers are required to have
passwords that meet complexity requirements, to enforce password history, and to enforce password
aging. Application servers must also be protected against man-in-the-middle attacks during authentication.
You need to deploy and refresh the custom security settings on a routine basis. You also need to be able
to verify the custom security settings during audits. What should you do?
A. Create a custom security template and apply it by using Group Policy.
B. Create a custom IPSec policy and assign it by using Group Policy.
C. Create and apply a custom Administrative Template.
D. Create a custom application server image and deploy it by using RIS.
Answer: A

Microsoft過去問   070-293参考書   070-293過去問   070-293認証試験

NO.19 You are a network administrator for your company. All domain controllers run Windows Server 2003.
The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and
150 Windows XP Professional computers. According to the network design specification, the Kerberos
version 5 authentication protocol must be used for all client computers on the internal network. You need
to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.
What should you do?
A. On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure
channel traffic.
B. Replace all Windows 98 computers with new Windows XP Professional computers.
C. Install the Active Directory Client Extensions software on the Windows 98 computers.
D. Upgrade all Windows 98 computers to Windows NT Workstation 4.0.
Answer: B

Microsoft問題集   070-293認定証   070-293   070-293認証試験

NO.20 You are the network administrator for your company. The network contains Windows Server 2003
computers and Windows XP Professional computers.
The company deploys two DNS servers. Both DNS servers run Windows Server 2003. One DNS server is
inside of the corporate firewall, and the other DNS server is outside of the firewall. The external DNS
server provides name resolution for the external Internet name of the company on the Internet, and it is
configured with root hints. The internal DNS server hosts the DNS zones related to the internal network
configuration, and it is not configured with root hints.
You want to limit the exposure of the client computers to DNS-related attacks from the Internet, without
limiting their access to Internet-based sites.
Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A.Configure the client computers to use only the internal DNS server.
B.Configure the client computers to use both DNS servers. List the internal DNS server first.
C.Configure the firewall to allow only network traffic on the DNS ports.
D.On the internal DNS server, disable recursion.
E.On the internal DNS server, configure the external DNS server as forwarder.
F.On the internal DNS server, add the external DNS server as the only root hint.
Answer:A , E

Microsoft認定証   070-293   070-293認定試験   070-293認定資格   070-293認定試験

2014年3月22日星期六

注目のMicrosoft 070-297認定試験の資格を取得しよう

現状に自己満足して、自分の小さな持ち場を守って少ない給料をもらって解雇されるのを待っている人がいないです。こんな生活はとてもつまらないですから。あなたの人生をよりカラフルにしたいのですか。ここで成功へのショートカットを教えてあげます。即ちMicrosoftの070-297認定試験に受かることです。この認証を持っていたら、あなたは、高レベルのホワイトカラーの生活を送ることができます。実力を持っている人になって、他の人に尊敬されることもできます。Pass4TestはMicrosoftの070-297試験トレーニング資料を提供できます。Pass4Testを利用したら、あなたは美しい夢を実現することができます。さあ、ためらわずにPass4TestのMicrosoftの070-297試験トレーニング資料をショッピングカートに入れましょう。

Pass4Testは受験者に向かって試験について問題を解決する受験資源を提供するサービスのサイトで、さまざまな受験生によって別のトレーニングコースを提供いたします。受験者はPass4Testを通って順調に試験に合格する人がとても多くなのでPass4TestがIT業界の中で高い名声を得ました。

Microsoftの070-297認定試験と言ったら、人々は迷っています。異なる考えがありますが、要約は試験が大変難しいことです。Microsoftの070-297認定試験は確かに難しい試験ですが、Pass4Test を選んだら、これは大丈夫です。Pass4TestのMicrosoftの070-297試験トレーニング資料は受験生としてのあなたが欠くことができない資料です。それは受験生のために特別に作成したものですから、100パーセントの合格率を保証します。信じないになら、Pass4Testのサイトをクリックしてください。購入する人々が大変多いですから、あなたもミスしないで速くショッピングカートに入れましょう。

ずっと自分自身を向上させたいあなたは、070-297認定試験を受験する予定があるのですか。もし受験したいなら、試験の準備をどのようにするつもりですか。もしかして、自分に相応しい試験参考書を見つけたのでしょうか。では、どんな参考書は選べる価値を持っていますか。あなたが選んだのは、Pass4Testの070-297問題集ですか。もしそうだったら、もう試験に合格できないなどのことを心配する必要がないのです。

今の競争の激しいのIT業界の中にMicrosoft 070-297認定試験に合格して、自分の社会地位を高めることができます。弊社のIT業で経験豊富な専門家たちが正確で、合理的なMicrosoft 070-297認証問題集を作り上げました。 弊社の勉強の商品を選んで、多くの時間とエネルギーを節約こともできます。

Pass4TestのMicrosoftの070-297試験資料を買いたかったら、弊社は最も良いサービスと最も高品質な製品を提供します。弊社の認証試験のソフトウェアはもうベンダーとサードパーティーの認可を取り、大量なIT技術専門家たちがいますから、お客さんのニーズを答えるためにアウトラインに基づいてシリーズの製品を開発して、お客様の大量の要求を満たすことを保障します。Microsoftの070-297試験資料は最高の専門技術の内容を持っていますから、関連する知識の専門家と学者は研究する材料として利用することができます。弊社が提供した製品は一部の無料試用資料がありますから、購入する前にあなたのテストの質と適用性を保証します。

試験番号:070-297問題集
試験科目:Microsoft 「Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure」
一年間無料で問題集をアップデートするサービスを提供いたします
最近更新時間:2014-03-21
問題と解答:全142問

Pass4TestのMicrosoftの070-297試験トレーニング資料が受験生の皆様の評判を取ったのはもう最近のことではないです。これはPass4TestのMicrosoftの070-297試験トレーニング資料は確かに信頼できて、受験生の皆様が首尾よく試験に合格することに助けを差し上げられることが証明されました。 Pass4TestのMicrosoftの070-297試験トレーニング資料がベストセラーになって、他のサイトをずっと先んじて皆様の認可を取りましたから、好評は言うまでもないです。 Microsoftの070-297認定試験を受けたら、速くPass4Testというサイトをクリックしてください。あなたがずっとほしいものを手に入れることができますから。最もプロな人々が注目しているIT専門家になりたかったら、後悔しないように速くショッピングカートを入れましょう。

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.pass4test.jp/070-297.html

NO.1 Exhibit, Existing Domain Model
Overview
Graphic Design Institute is a graphical design company that creates animated graphics for several
advertising companies and move theaters.
The hours of operation are 8:00 A.M. to 5:00 P.M., Monday through Friday.
Physical Locations
The company??s main office is located in Los Angeles. The company has five branch offices in the
following locations:
? Atlanta
? Dallas
? Denver
? New York
? San Francisco
The number of users in each office is shown in the following table.
Office Number of users
Los Angeles 550
Atlanta 300
Dallas 30
Denver 210
Planned Changes
To meet new security and customer requirements, the company wants to implement a Windows Server
2003 Active Directory environment.
Existing Environment
Business Processes
Graphic Design Institute consists of the following primary departments:
? Human Resources (HR)
? Finance
? Information Technology (IT)
? Advertising
? Movies
? Animation
The IT department is responsible for all network management.
Users often work on multiple projects at the same time. A strong administrative structure based on each
user??s office location and department is being used
Infrastructure
Directory Services
The existing domains and trust relationships are shown in the Existing Domain Model exhibit.
The company has one Windows 2000 domain located in the Los Angeles office. The name of the domain
is
graphicdesigninstitute.com. The domain is a Windows 20000 mixed-mode domain that contains Windows
2000 Server computers configured as domain controllers, Windows NT Server 4.0 computers configured
as BDCs, and Windows 2000 Server computers configured as member servers.
Currently, this domain is the only Active Directory domain. The domain consists of the following three
top-level OUs:
? Movies
? Animation
? Advertising
The default site configuration has been implemented in the existing Active Directory environment.
Problem statements
The following business problems must be considered:
? There is currently no enforcement of frequent password changes and logon hours.
? The ISP can only supply a single subnet, which consists of 32 IP addresses, for the Internet link.
? It is very difficult to manage users and groups and their necessary permissions.
? The finance and HR department cannot agree on a mutual security policy to implement.
? NetBIOS name resolution is saturating the WAN links.
Interviews
Chief Execute Offices
Graphic Design Institute has lost a number of contracts due to deadlines that have not been met.
Decreasing the amount of time we spend administering the network, along with increasing the amount of
time we spend on customers, is my primary reason for requesting the upgrade of the entire network.
Funds are available for critical hardware requirements. I do not want any downtime for users. I also
want strict business hours enforced. Employees should not be at the office or work from home outside
normal business hours.
Chief Information Officer
Currently, we have problems as a result of all the merges and acquisitions. I want all the servers to be
installed with Windows Server 2003 to resolve these problems. I also want all client computers upgraded
to Windows XP Professional over the next two years.
The current IT response level is leading to a lot of lost production hours. Each office will continue to
manage its own users and computers, with the exception of the finance and HR departments, which have
their own requirements. We need to ensure that no production time is lost as a result of an interruption
in the network connectivity.
Network Administrator
We are currently expected to resolve issues within 24 hours, although this sometimes is not achieved.
Because most high-level administrative work can only be done when users are not in the office, network
administrators often work after hours or on weekends.
Domain administrators are responsible for managing the private IP addresses of every computer that
belongs to their respective domains.
Help desk staff exists in each branch office to assist users with software-related problems, as well as with
basic network problems. Each domain has its own help desk staff with personnel located in each office. In
the future, the help desk staff will be responsible for resetting passwords if users forget them.
Office Worker
Only selected users have Internet access. This prevents us from remaining competitive because we
cannot
perform the necessary research about new technologies or software available.
Business Requirements
Business Drivers
The following business requirements must be considered:
? A single internal namespace is required to minimize administrative effort.
? A Web site exists outside the firewall to provide company contact information.
Organizational Goals
The following organizational requirements must be considered:
? The new design must accommodate the finance and HR departments, which have requirements
not addressed by the company??s planned password policy.
? All computers must have the latest service packs and hot fixes installed. In addition, computers in
the advertising department must be updated to have the latest versions of graphics and audio
drivers installed.
Security
The following security requirements must be considered:
? Specific security groups must be set up to address security requirements.
? Security must be based on departments and groups of individuals within the departments.
? Users in the finance department need access to payroll information on a server named Payroll,
which is located in the HR department.
Customer Requirements
The following customer requirements must be considered:
? A new service-level agreement that requires a response from the IT department to users within
one hour must go into effect.
? Personal information about employees must remain secure.
? All client computers, regardless of office location, must be able to access all other computers.
Technical Requirements
Active Directory
The following Active Directory requirements must be considered:
? The company requires a new Active Directory environment that enables the security requirements
of various departments to be met. This must be accomplished by installing a Windows Server 2003
on all domain controllers.
? A completely decentralized administrative approach will be used. Each group of administrators
will be responsible for its own departmental environment.
? Only one operations master role will be allowed per domain controller. This is required for fault
tolerance.
? DNS replication of the forest root domain must be limited to forest domain controllers only.
Network Infrastructure
The following infrastructure requirements must be considered:
? A new Routing and Remote Access solution must be installed:
? A DHCP solution that is fault tolerant within each office must be implemented
? All WAN links must be fault tolerant
? Name resolution must be localized on the local network
Answer:
11. You are designing an Active Directory forest structure to meet the business and technical
requirements. What should you do?
A.Create a single forest that has one domain. Use organizational units (OUs) to separate the
departments.
B.Create a single forest that has multiple domains to represent every department.
C.Create a single forest that has three domains: one for finance, one for HR, and one for the remaining
departments.
D.Create multiple forests that has a single domain in each forest to represent the departments.
Answer: C

Microsoft問題集   070-297認証試験   070-297   070-297問題集

NO.2 You are designing a strategy to provide the required security for the Payroll server.You need to identify
the actions that you should perform to achieve this goal.What should you do?
To answer,move the appropriate actions from the list of actions to the answer area,and arrange them in
the appropriate order.(Use only actions that apply.)

NO.3 You are designing a security group strategy to meet the business and technical requirements. What
should you do?
A.Create one global group named G_Executives. Make all executive user accounts members of that
group.
B.Create two global groups named G_Executives and one universal group named U_Executives. Make
the two global groups members of U_Executives. Make the executive user accounts members of the
appropriate global group.
C.Create three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make
G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts
members of the appropriate global group.
D.Create one domain local group named DL_Executives. Make all executive user accounts members of
that group.
Answer: B

Microsoft練習問題   070-297   070-297   070-297   070-297   070-297

NO.4 You are designing the DNS infrastructure to meet the business and technical requirements. What
should you do?
A.Create an Active Directory-integrated zone on DC4. Set the replication scope to all DNS servers in the
domain.
B.Create an Active Directory-integrated zone on DC5. Set the replication scope to all DNS servers in the
forest.
C.Create an Active Directory-integrated zone on any domain controller in the forest root domain. Set the
replication scope to all domain controllers in the domain.
D.Create a standard primary zone on DC4.
E.Create a standard primary zone on any domain controller in the forest root domain
Answer: B

Microsoft認定試験   070-297認定試験   070-297   070-297問題集

NO.5 You are de
you do?
A.Create a Group Policy object (GPO) and link it to the Denver site.
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
C.Create a Group
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
advertising dep
Answer: B

Microsoft   070-297   070-297   070-297   070-297

NO.6 You are designing an Active Directory implementation strategy to present to executives from your
company and from Contoso, Ltd. Which implementation strategy should you use?
A.Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.
B.Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing
further.
C.Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine
forest for Contoso, Ltd.
D.Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a new
child domain for Contoso, Ltd.
Answer: C

Microsoft   070-297問題集   070-297   070-297

NO.7 You are designing a WAN implementation strategy to meet the business and technical requirements.
What should you do?
A.Configure a demand-dial router.
B.Create multiple Active Directory site links.
C.Configure a VPN connection between each branch office.
D.Install an Internet Authentication Service (IAS) server in each branch office.
Answer: A

Microsoft認定試験   070-297練習問題   070-297

NO.8 You are designing a NetBIOS name resolution strategy to meet the business and technical
requirements. What should you do?
14You are designing a pass
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
B.Delegate
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
Answer: B D

Microsoft過去問   070-297   070-297認定資格   070-297認定証
15.You are de
you do?
A.Create a Group Policy object (GPO) and link it to the Denver site.
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
C.Create a Group
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
advertising dep
Answer: B

Microsoft   070-297認定試験   070-297   070-297
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
requirements. What should you do?
14You are designing a pass
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
B.Delegate the password management controls to the Domain Users group.
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
Answer: B D

Microsoft問題集   070-297参考書   070-297   070-297
15.You are designing a strategy to address the requirements of the advertising department. What should
A.Create a Group Policy object (GPO) and link it to the Denver site.
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
C.Create a Group Policy object (GPO) and link it to the graphicdesigninstitute.com domain.
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
advertising department.
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
requirements. What should you do?
14You are designing a password management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
the password management controls to the Domain Users group.
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
signing a strategy to address the requirements of the advertising department. What should
A.Create a Group Policy object (GPO) and link it to the Denver site.
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
Policy object (GPO) and link it to the graphicdesigninstitute.com domain.
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
artment.
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
requirements. What should you do?
word management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
the password management controls to the Domain Users group.
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
signing a strategy to address the requirements of the advertising department. What should
A.Create a Group Policy object (GPO) and link it to the Denver site.
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
Policy object (GPO) and link it to the graphicdesigninstitute.com domain.
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
requirements. What should you do?
The safer , easier way to help you pass any IT exams.
14 / 16
word management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
the password management controls to the Domain Users group.
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
signing a strategy to address the requirements of the advertising department. What should
A.Create a Group Policy object (GPO) and link it to the Denver site.
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
Policy object (GPO) and link it to the graphicdesigninstitute.com domain.
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
The safer , easier way to help you pass any IT exams.
word management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
the password management controls to the Domain Users group.
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
signing a strategy to address the requirements of the advertising department. What should
A.Create a Group Policy object (GPO) and link it to the Denver site.
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
Policy object (GPO) and link it to the graphicdesigninstitute.com domain.
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
The safer , easier way to help you pass any IT exams.
word management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
the password management controls to the Domain Users group.
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
signing a strategy to address the requirements of the advertising department. What should
B.Create a Group Policy object (GPO) and link it to the Advertising OU.
Policy object (GPO) and link it to the graphicdesigninstitute.com domain.
D.Configure the Default Domain Policy to have the No Override option.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
The safer , easier way to help you pass any IT exams.
word management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
signing a strategy to address the requirements of the advertising department. What should
Policy object (GPO) and link it to the graphicdesigninstitute.com domain.
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
The safer , easier way to help you pass any IT exams.
word management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
signing a strategy to address the requirements of the advertising department. What should
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
word management solution to meet the business and technical requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
signing a strategy to address the requirements of the advertising department. What should
E.Use block inheritance to prevent the Group Policy object (GPO) from applying to members of the
16.You are designing a NetBIOS name resolution strategy to meet the business and technical
A.Install one WINS server in each branch office. Configure the WINS servers to use push/pull replication
with the WINS server in Los Angeles. Configure all computers to have the IP address of the local WINS
server.
B.Install two additional WINS servers in Los Angeles. Configure the WINS servers to use push/pull
replication. Configure all computers to have the IP addresses of the WINS servers.
C.Install the DNS Server service on one domain controller in each branch office. Configure the DNS
servers to forward all unanswered queries to the WINS server. Configure all computers to have the IP
addresses of the DNS servers.
D.Configure the DNS servers in each branch office to forward all unanswered queries to a local WINS
server. Configure all computers to have the IP addresses of the DNS server in the
graphicdesigninstitute.com forest root.
Answer: A

Microsoft   070-297   070-297   070-297練習問題   070-297

NO.9 Overview
Litware, Inc., is a corporate management company that manages the internal operations for its business
customers.
Internal operations include sales, accounting, and payroll.
Physical Locations
Litware, Inc., has two main offices in the following locations:
? New York
? Chicago
Each office has approximately 300 users.
The New York office has a branch office in Boston. The Boston office has approximately 100 users.
Staff in the Boston exclusively office work on projects for customers in the New York office. The Boston
office has no customers of its own.
Planned Changes
As part of its initiative to streamline the IT environment and increase network security, the company has
decided to implement a Windows Server 2003 Active Directory environment.
The New York office is currently in negotiations to secure Contoso, Ltd., as a new customer.
Business Processes
Litware, Inc., manages the business operations for eight business customers. For each customer,
Litware,
Inc. has a dedicated staff that works exclusively with that customer.
Users require access only to project data for the customers to which they have been directly assigned.
The
New York and Chicago offices are responsible for their own customers and maintain them separately.
Each individual customer project is listed in the following table.
Customers name Managed by
Alpine Ski House New York
Baldwin Museum of Science Chicago
Coho Vineyard New York
Fabrikam, Inc. New York
Humongous Insurance Chicago
Lucerne Publishing New York
Wingtip Toys Chicago
Woodgrove Bank Chicago
The chief information officer is the only person who is authorized to implement any changes that will
impact the entire company. Roles and responsibilities in the IT department are shown in the following
table.
Directory Services
Currently, Litware, Inc., has two Windows NT 4.0 domains configured a shown in the Existing Domain
Model exhibit.
The New York domain contains user and computer accounts for both the New York and Boston offices.
The Chicago domain contains user and computer accounts for the Chicago office.
Litware, Inc., users require access only to project data for the customers to which they have been directly
assigned. They also require access to internal company resources, such as a time-building application
that is hosted in the New York office.
Accounting auditors and executives require access to data from all customer projects to perform
quarterly reports, account reviews, and billing verifications. Account auditors and executives are located
in both New York and Chicago offices, and frequently travel between offices.
Network Infrastructure
The existing network infrastructure is shown in the Existing Network Infrastructure exhibit.
All Internet access is provided through a proxy server located in the New York office. The proxy server
provides Internet name resolution on behalf of the client computers.
Currently, all servers run Windows NT Server 4.0 with the latest service pack installed. A time-billing
application is installed on a Microsoft SQL Server computer named SQL1. SQL1 is managed by the
network administrators in the New York office, and is accessed by all Litware, Inc., users.
The company??s servers, including their domain membership, physical locations, and network functions,
are shown in the following table.
Server name Domain Office Functions
DC1 New York New York PDC, DHCP server
DC2 New York New York BDC, WINS server
DC3 New York Boston BDC, DHCP server,
WINS
server
Member
server
Fileserver1 New York New York ,DHCP server, file
server
Fileserver2 New York New York Member server,
WINS server,
file
server
Fileserver3 Chicago Chicago Member server
DHCP server,
file
server
Fileserver4 Chicago Chicago Member server,
WINS server,
file
server
SQL1 New York New York Member server,
SQL Server
computer,
timebilling
application
server
Most required network resources are available locally.
All client computers in the company run Windows 2000 Professional.
Problem Statements
The following business problems must be considered:
? Contoso, Ltd., requires that the new Active Directory infrastructure is completely in place prior to
obtaining the contract.
? Administrative authority for network administrators in the New York and Chicago offices must
remain equal.
Chief Executive Officer
The addition of Contoso, Ltd., as a customer will likely increase annual revenue by 50 percent.
Additional funds and resources have been allocated to secure this contract. All efforts should be made to
demonstrate to the Contoso, Ltd., representatives that we will address all of their security concerns. This
will be done on part though a migration to the Windows Server 2003 Active Directory environment.
Any short-term costs associated with a technology deployment are acceptable if they allow for growth
and flexibility in the future.
Chief Information Officer
A Web-based interface for the time-billing application will be implemented in the near future. The
current network administrators in the New York and Chicago offices perform their jobs well.
To reduce the burden on IT staff, trusted individuals within the organization should be identified to help
reduce the IT administrative burden.
Office Worker
We want to be able to access the internal network from our home computers.
Business Drivers
The following business requirements must be considered:
? The company wants access to the network to remain easy and intuitive. A company policy now
states that user logon names and e-mail addresses should be identical. Currently, each user has an
e-mail address made up of that user??s first initial and last name, and an additional domain name
indicating the region that manages that user??s account. For example, the user Nicole Caron from
the New York office has the e-mail address of ncaron@ny.litwareinc.com. The user Luis Bonifaz
from Chicago has the e-mail address of lbonifaz@chi.litwareinc.com.
? The domain name litwareinc.com has been registered.
? To ensure reliability in the event of a single WAN link failure, users should continue to
authenticate on the network. Additionally, all domains should be fault tolerant in the event of a
single domain controller failure.
? VPN access will be provided to enable user access to customer data outside of regular business
hours. VPN connections will be assigned through the New York office.
Organizational Goals
The following organizational requirements must be considered:
? As part of the negotiations between Contoso, Ltd., and the New York office, Litware, Inc., has
agreed to ensure that all users who require access to Contoso, Ltd., data must have complex
passwords that are a minimum of 10 characters in length.
? The company has also agreed that management of Contoso, Ltd., data must be completely isolated
from all other Litware, Inc., data. This included the ability to manage security of Contoso, Ltd.,
resources. There will be no exceptions.
? Planning for other aspects of how Contoso, Ltd., will integrate with the Litware, Inc., environment
is premature at this point. However, a quick migration solution for the existing environment must
be identified to allow for this anticipated growth.
? Litware, Inc., account auditors and executives from the New York and Chicago offices will require
limited access to Contoso, Ltd., data.
Security
The following security requirements must be considered:
? A new Web-based interface will be implemented for the time-billing application running on SQL1.
This application will use IIS, and will require the use of IP filtering that uses computer host names
for security purposes.
? Only authorized computers within the internal Litware, Inc., network will be given access to the
time-billing application.
Active Directory
The following Active Directory requirements must be considered:
? The network administrators in the Chicago and New York offices will retain their current
responsibilities, such as the management of user accounts, servers, and domain controllers for
their regions. There should be no overlap between their administrative authority.
? There is a need to allow trusted individuals responsible for each customer project to manage user
account information. Responsibilities will include the ability to reset passwords and define
personal user information on user accounts, such as phone numbers and addresses. The trusted
individuals will be allowed to manage only user accounts within the customer project to which
they have been assigned.
Network Infrastructure
The following infrastructure requirements must be considered:
? Users in the Chicago office access Internet-based resources frequently. This Internet-related
traffic accounts for most of the bandwidth used between the Chicago and New York offices.
Bandwidth utilization between these two offices is currently a cause for concern. Network traffic
between the Chicago and New York offices must be minimized whenever possible.
? Because of the Boston office??s data access requirements, a high level of availability and reduced
latency between the New York and Boston offices is required. Bandwidth utilization between the
Boston and New York offices is minimal and is not a concern in the foreseeable future.
? A Windows Server 2003 computer will provide VPN access to the network by using both L2TP
and PPTP. Usage statistics will be gathered over time to identify which users establish VPN
connections to the network, and the duration of their connections. These usage statistics will help
the company track trends and plan for future growth.
? The network administrator in Chicago has extensive knowledge of DNS, and will manage the
implementation of the DNS infrastructure for the Litware. Inc., network.
? The DNS structure must be secured against any unauthorized modifications, but also must be easy
to maintain and manage.
Answer:

NO.10 You are designing the top-level organizational unit (OU) structure to meet the administrative
requirements. What should you do?
A.Create a top-level OU named New York. Place all user and computer accounts from New York in the
New York OU.
B.Create a top-level OU named Chicago. Place all user and computer accounts from Chicago in the
Chicago OU.
C.Create a top-level OU named Coho. Place all user and computer accounts that are assigned to the
Coho Vineyard customer project in the Coho OU.
D.Create a top-level OU named Sales. Place all user and computer accounts from the sales department
in the Sales OU.
Answer: C

Microsoft   070-297認定試験   070-297練習問題

NO.11 You are designing a strategy to provide Internet access to all users. What should you do?
A.Configure Internet Connection Sharing on all client computers.
B.Configure Automatic Private IP Addressing (APIPA) on all client computers.
C.Configure one server as a Routing and Remote Access VPN server.
D.Configure one server as a Routing and Remote Access NAT router.
Answer: D

Microsoft認証試験   070-297   070-297認定試験   070-297参考書   070-297   070-297過去問

NO.12 ou are designing a pass
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Delegate the password management controls to the help desk staff.
B.Delegate
C.Configure the Default Domain Policy to enforce password expiration settings.
D.Configure the Default Domain Controller Policy to enforce password expiration settings.
Answer: B D

Microsoft   070-297   070-297練習問題   070-297認定資格   070-297過去問   070-297過去問

NO.13 You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in
place. Who can authorize the DHCP servers? (Choose all that apply.)
A.chief information officer
B.IT support staff in Boston
C.IT support staff in New York
D.network administrator in Chicago
E.network administrator in New York
Answer: A

Microsoft認証試験   070-297認定証   070-297認定証   070-297

NO.14 You are designing the placement of the global catalog servers. You want to use the minimum number of
global catalog servers that are required. Which design should you use?
A.one global catalog server in New York
B.two global catalog servers in New York
C.one global catalog server in Chicago and one global catalog server in New York
D.two global catalog servers in Chicago and two global catalog servers in New York
E.one global catalog server in Chicago, one global catalog server in New York, and one global catalog
server in Boston
Answer: E

Microsoft   070-297認証試験   070-297認定証   070-297   070-297練習問題   070-297過去問

NO.15 ou are designing a DHCP strategy to meet the business and technical requirements. What should you
do?
A.Install one DHCP server in each branch office and one DHCP server in Los Angeles.
B.Install one DHCP server in each branch office and two DHCP servers in Los Angeles.
C.Install two DHCP servers in each branch office and one DHCP server in Los Angeles.
D.Install two DHCP servers in each branch office and two DHCP servers in Los Angeles.
Answer: D

Microsoft   070-297過去問   070-297   070-297過去問   070-297練習問題

NO.16 You are designing a DNS strategy to meet the business and technical requirements. What should you
do?
A.Install the DNS Server service on all domain controllers. Create Active Directory-integrated zones.
Replicate the zones to all DNS servers in the forest.
B.Install the DNS Server service on all domain controllers. Create Active Directory-integrated zones.
Replicate the zones to all DNS servers in the domain.
C.Install the DNS Server service on all domain controllers. Create primary zones and secondary zones.
D.Create application partitions for the different zones on one domain controller. Configure replication to
occur on all DNS servers.
Answer: B

Microsoft   070-297問題集   070-297

NO.17 You need to identify the number of servers that will be used specifically for operations master roles.
How many servers should you recommend?
A.5
B.11
C.14
D.17
E.20
Answer: B

Microsoft   070-297練習問題   070-297認定資格   070-297

NO.18 You are designing a DNS implementation strategy for the network. Which two zone types should you
use? (Each correct answer presents part of the solution. Choose two.)
A.reverse lookup zones
B.standard primary zones
C.standard secondary zones
D.Active Directory-integrated zones
Answer: A D

Microsoft   070-297   070-297認定証   070-297問題集

NO.19 You are designing an IP addressing strategy for your VPN solution. How many public IP addresses
should you use?
A.1
B.25
C.50
D.255
Answer: A

Microsoft認定証   070-297   070-297   070-297問題集

NO.20 You are designing a forest and domain structure to address the concerns of Contoso, Ltd., and to meet
the business and technical requirements. You want to use the minimum number of domains and forests
that are required. Which domain structure should you use?
A.one forest and two domains
B.one forest and three domains
C.one forest and four domains
D.two forests and three domains
E.two forests and four domains
Answer: E

Microsoft   070-297認定証   070-297練習問題

Pass4Testは最新のVDCD510試験問題集と高品質のLOT-407認定試験の問題と回答を提供します。Pass4TestのC_HANAIMP_1 VCEテストエンジンとHP2-N42試験ガイドはあなたが一回で試験に合格するのを助けることができます。高品質の648-238トレーニング教材は、あなたがより迅速かつ簡単に試験に合格することを100%保証します。試験に合格して認証資格を取るのはそのような簡単なことです。

記事のリンク:http://www.pass4test.jp/070-297.html