Dovetail Dumps Latest Phase2

57
1. What is DSL..? Digital subscriber line 2. Why do we need firewall? used to enhance the security of computers 3. Can we set Windows firewall in Win XP o.s without SP2? NO 4. what is VPN while VPN is a private network that makes use of a public network (such as the Internet maintaining security and privacy through encryption and security procedures 5. Basic functions of VPN are? Tunneling and Encryption 6. Types of VPNs are: Intranet, Extranet, And Remote Access 7. What is Tunneling? Tunneling is a way in which data is transferred between two networks securely. 8.What is Encryption? Encryption is the act of turning a block of plain text or other raw data(such as binary computer files) into "ciphertext," encoded blocks of text. 9.What is DHCP? Protocol used to assign IP address Automatically 10.NAT means?network address translation 11. Does VPN offer Inbuilt virus protection?No 12.I’m running Windows 2000 and am getting disconnected when trying to log on to the VPN..What is most important step I need to perform..? Ensure that you have 128-bit encryption level installed 13.what is Cryptography?Cryptography is the science of information security 14.what is Private-Key Encryption Algorithms private-key encryption algorithm is one where the sender and the recipient share a common, or closely related, key 15.What is virus..? A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user 16.Can VPN be used over Intranet?Yes 17.What are different VPN components?Protocol, Security, Appliances 18.What are different parts of a VPN?VPN Server,VPN clientTunnel 19.Site-to-site VPNs connect the geographically dispersed sites of an organization?TRUE 20.Site-to-site VPNs are also occasionally referred to as LAN-to-LAN VPNs?TRUE 21.There are three main types of viruses?FALSE 22.The function of a switch on a network is to prevent collisions?TRUE 23.In what layer do Firewall's work they work? network layer or transport layer 24.How many classes of IP addresses are in use?No – Three class of IP was in use Class A,B & C 25.Abbreviate IMAP?Internet message access protocol 26.Which network topology provides multiple, redundant links?Mesh Topology 27.What is the default protocol used on the Internet?TCP/IP 28.Which network device has the capability of amplifying and regenerating network signals but has no capability of routing or segmenting?Transciever 29.You are upgrading from a peer-to-peer network running NetBEUI to a client-

description

Cognizant Hyderabad Dovetail dumps for ITIS helpdesk phase 2 examination latest may 2011 reliable upto 70%

Transcript of Dovetail Dumps Latest Phase2

Page 1: Dovetail Dumps Latest Phase2

1. What is DSL..? Digital subscriber line2. Why do we need firewall? used to enhance the security of computers3. Can we set Windows firewall in Win XP o.s without SP2? NO4. what is VPN while VPN is a private network that makes use of a public network (such as the Internet maintaining security and privacy through encryption and security procedures5. Basic functions of VPN are? Tunneling and Encryption6. Types of VPNs are: Intranet, Extranet, And Remote Access7. What is Tunneling? Tunneling is a way in which data is transferred between two networks securely.8.What is Encryption?Encryption is the act of turning a block of plain text or other raw data(such as binary computer files) into "ciphertext," encoded blocks of text.9.What is DHCP? Protocol used to assign IP address Automatically10.NAT means?network address translation11. Does VPN offer Inbuilt virus protection?No 12.I’m running Windows 2000 and am getting disconnected when trying to log on to the VPN..What is most important step I need to perform..?Ensure that you have 128-bit encryption level installed13.what is Cryptography?Cryptography is the science of information security14.what is Private-Key Encryption Algorithmsprivate-key encryption algorithm is one where the sender and the recipient share a common, or closely related, key15.What is virus..?A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user16.Can VPN be used over Intranet?Yes17.What are different VPN components?Protocol, Security, Appliances18.What are different parts of a VPN?VPN Server,VPN clientTunnel19.Site-to-site VPNs connect the geographically dispersed sites of an organization?TRUE20.Site-to-site VPNs are also occasionally referred to as LAN-to-LAN VPNs?TRUE21.There are three main types of viruses?FALSE22.The function of a switch on a network is to prevent collisions?TRUE

23.In what layer do Firewall's work they work? network layer or transport layer

24.How many classes of IP addresses are in use?No – Three class of IP was in use Class A,B & C25.Abbreviate IMAP?Internet message access protocol26.Which network topology provides multiple, redundant links?Mesh Topology27.What is the default protocol used on the Internet?TCP/IP28.Which network device has the capability of amplifying and regenerating network signals but has no capability of routing or segmenting?Transciever29.You are upgrading from a peer-to-peer network running NetBEUI to a client-server server network running TCP/IP.Remove NetBEUI from all stations 30.Which of the following is used pass the packets between networks?Bridges31.Digital signatures for email messages are encrypted hash values that digitally sign the email to verify the sender What is the signing part of the process?---Encrypting the message digest with someones private key32.What is the signing part of the process?By certifying the SSL while accessing the URL.33.Specify the characteristics (For example: speed, length, topology and cable type) of the following cable standards:1000BASE-SX and 1000BASE-LX34.Which of the following can be used to print % to the screen?printf("\\%")35.In an 802.11 wireless LAN, what term is used to describe the wireless network name?? SSID36.Which wireless technology supports both line-of-sight (LoS) and non-LoS connectivity?WiMAX37.The IEEE 802.16e standard supports frequencies in what range?2-11 GHz (3.5 GHz in Europe)38.What is the most effective technique of minimizing battery drain by a laptop's wireless Mini-PCI.?A. Remove the Mini-PCI card when you do not require network access

Page 2: Dovetail Dumps Latest Phase2

39.Which of the following describes the number of pins Associated with Dual Inline Memory Modules (DIMM)- Select Two---3 ( 168 and 184 pin )40.Which of the following could be used for connecting a mouse to a computer- (Select Any Three)PS/2, Serial port ( com port)41.Which of the following are the windows configuration files?INI Files & System Registry42.Which of the following is used to Automate IP configuration of Network hosts?DHCP43.Which of the following provides the name resolution on the Internet? DNS44.If you want to prevent users from using access points on your wireless network?WEP (Wired Equivalent Privacy)45.You suspect that someone is connected to your computer without authorization. Which utility may give an indication of what is going on? NETSTAT46.Which of the following devices is used to connect a T1 line? CSU/ DSU47.What is the default port number for Telnet connections? 2348.Which of the following allow NETBIOS to IP address resolution? LM-Hosts amd Wins49.Which of the following technologies is used to dynamically assign IP addresses to a client?DHCP50.Which of the following uses a public key to encrypt and a PKI51.Which will convert the hostname to the IP address??? –DNS52.When you give a document to print and remove the printer cable, will the printer still print?? Yes because the file will go the printer spool.53.Which of these will refresh at regular intervals??  DDRAM 54. How many bits does IPv6 address contain? 128 Bits55.Which of the following is the correct boot sequence?POST->MBR->……..->LSASS.EXE->WINLOGON.EXE56.Which of these profiles cannot change the desktop settings?Mandatory Profile    57.. What is 802.11 series standard representing?? Wi-Fi

58. What is the expansion of ZIF? Zero insertion force

59.If NTLDR corrupts, whether the boot sector will be corrupted or not? yes

60.Which user can login and shut down a client machine? Guest

61.You play a game and after it, your icons larger in size than before. What is the 1st step you will do to resolve it?change screen resolution

62.Which of the below options are used to open display properties? All

a.Control panel -> Display options               b. -type Desk.cpl in Run command

c.-Right Click on desktop properties         d.Control Desktop in runcommand

63. Number of tokens that a ring topology can have? one

64.How many transmission media r there? Depends on option

1. Guided Media/bounded ---Use cables

2. Unguided Media/unbounded---wireless(802.11)

65.Which command is used to install AD? Dcpromo

66.What are these devices called? (Monitor, keyboard, mouse) Hardware

Page 3: Dovetail Dumps Latest Phase2

67.The computer works on which instruction? Software

68.How a node accepts or reject data frame in a Hub?MAC ADDRESS

69.Which key is used to delete content without sending to recycle bin? shift+delete

70.What is the short cut key to go to Favorites in IE? –Ctrl+ i

71.What options do you find in Magnify?

GENRAL-INVERT COLORS(CTRL+O) MAGNIFICATION INCREASE(CTRL+=)

MAGNIFICATION DECREASE(CTRL-)

OPTION- Minimize on start up

PRESENTATION-Presentation-Scale factor up to 16X, Invert colors,Docked

Tracking: Follw mouse cursor, follow keyboard focus, follow text editing

72.Which is not the options in narrator menu? See startrunnarrator

73.Which options do not you find in the Driver Digital Signing menu?Prompt  

74.Memory not lost when power off? - ROM

75.In which generation of computer you will use transistors and magnifiers?2nd Generation

1-Generation --vacuum tubes. 2-Generation —transistor 3- Generation. Integrated circuits 4- Generation. Micro processors

76.When you are accessing mails through OWA, what is the folder that you can’t access?Public Folder, PST

77.When you switch on the PC ,if you get 2 beep sounds what will be the fault?

Beep Code: Description of Problem:

No Beeps Short, No power, Bad CPU/MB, Loose Peripherals

One Beep Everything is normal and Computer POSTed fine

Two Beeps POST/CMOS Error

One Long Beep, One Short Beep Motherboard Problem

One Long Beep, Two Short Beeps Video Problem

One Long Beep, Three Short Beeps Video Problem

Three Long Beeps Keyboard Error

Repeated Long Beeps Memory Error

Page 4: Dovetail Dumps Latest Phase2

Continuous Hi-Lo BeepsCPU Overheating

78.How to enable task options?Tools->Options->Task options

79.In the transport layer what are the steps performed to transfer the packets.

Ans: Synchronize->Acknowledge->Data Transfer

80.How will you give permissions to the user?

Ans: In AD users and computers->user->properties->security->add

81.What are the Xchange clients?

Ans: outlook, web access

82.RJ 45—8 PINS

83.Uses of cross over cable—connect two networks without switches.

84.How will you provide security to WAN? Ans: Firewall

85.Add or remove programs shortcut key—ans :appwiz.cpl

86.Thickness of coaxial cable-

87.Select the Versions of outlook 97,98,2000.2002,2003,2007,2010

A) 97 b)98 c)2000 d)2003-------ALL

88.111.Access levels of lotus notes---7

A) 2 b)3 c)4 d)7

89.Where does RDC located in Win XP Professional.

Ans: My computer->properties>remote->enable remote connection

90..I/p device next to Joystick

A) wheeled mouse b)track ball c)optical LED

91.Is it possible to change the icon display in the home screen of BB? - Yes92.When the system restarts there is continuous beep sounds, in which module could be the fault? – Memory

93.Which of these profiles cannot change the desktop settings..? -Admin Profile -Local User -Mandatory Profile -Guest

94.Which will convert the hostname to the IP address??? -DHCP -DNS -TCP/IP

Page 5: Dovetail Dumps Latest Phase2

95.Outlook in windows XP is upgraded as windows mail in Vista! - True

96.Which of the following is software based? · Bridge · Switch · Router

97.Which is the most frequently used output device? · Inkjet printer · Monitor · Scanner · Dot matrix printer

98.What do you call a printed copy of data? · Hard copy · Soft copy · Document

99.Which of these is fastest accessable device? · Hard drive · Floppy Drive · Zip drive · Cassette tapes

100.What are the logical components of AD?· Tree · Domain · User

101.Which of the option is not available in narrator? – run narrator in taskbar.

102.How do you access the Remote Desktop Connection? Start->All programs->Accessories->Communication->Remote Desktop Connection.

103.How do you enable the Language bar in desktop?Start->Control Panel->Regional and language options->languages tab->details->preferences->language bar->show the language bar on desktop.

104.The gateway server for the home usage is ??

-Broadband Router -Switch -ISP

105.which of the below options are used to open display properties? -Control panel -> Display options-type Desk.cpl in Run command-Right Click on desktop -> properties-Control Desktop in runcommand- All the above

106.Which is the fastest, largest and the expensive one? • Mainframe computers • Super computers • Laptop • Personal Computer

107.Tools for creating GP objects (select the correct one) a. Active directory users & computer b. Active directory sites & services c. Active directory domain & trust d. Local security policy e. Gpedit.msc108.Microsoft exchange server uses a proprietary_____________ protocol• Rpc • All the above • http • Kerberos

109.Different types of modes to restore Active Directory

– Authoritative & Non authoritative.

Page 6: Dovetail Dumps Latest Phase2

110.Data base name of active directory...?• Ntfs.dit • Ntds.dit • Rid.dit • Schema

111.A small hand held device which is used to move the cursor on the screen? Mouse

112.Uses of “ Enforce Password History”?Enforce password history is used to prevent the usage of pwd that is used during last n (3/5/…) no of times. For eg., we wil not be able to use the pwd which we used we used in the last 5 resets..

113.Physical component of computer are called as ? Hardware

114.What is volatile memory?RAM

115.Most commonly used output device?Monitor

116.What are called as physical components? Computer Hardware

117.Where is " enable hibernation " option present in Display option? Screensaver

118.What is a digitally signed device? Tested and certified by Microsoft.

119.What are the 5 components of a computer system?

hard drive RAM CPU Mother board Power

120.What is the fastest, most expensive computer available? Mainframe/Supercomputer (not sure)

121.How to find the “computer name " tab?System properties->computer name122.What is the other name for Twisted pair cable? 10 Base T123.How many types of switched are present? 3

124.What is BSOD? Blue Screen Of Death125.What is POST? Power-On-Self-Test

126.What is known as a critical wireless device? WLAN/WEP (not sure)

127.Are groups automatically configured by Lotus Notes? NO

128.Advantage of LAN over WAN.

Ans should be cost

129.options under the presentation of magnifier settings.

Ans.Invert colors,Start minimized &Start magnifier

130.Default location of AD database

Ans %systemroot%\NTDS

131.What is the most advantage of fibre optic cable.

Ans should be speed and bandwidth

Page 7: Dovetail Dumps Latest Phase2

132 Fastest Wi-fi technology

Ans 802.11n

133.Ways to view computer name.

Windows key + pausebreak, My computer right click->properties and controlpanel->System

134.What is used to install programs in windows.

Ans windows installer (formerly said as Microsoft installer)

135.. Driver roll back could not be done if u try to replace a new driver to fix the issue. True/false

Ans true

136.Which file system did windows 98 use?

a. FAT 32    b.  FAT 16   c.  NTFS 4.0   d.   NTFS  5.0

137.Which has the high speed wireless connectivity  ?

a.IEEE 802.11a   b.  IEEE 802.11n    c.    IEEE 802.11c    d.   IEEE 802.11b

138..What is the general term used for keyboard , mouse , scanner etc?

Ans : Input

139.Which one is the most frequently used input?

Ans: keyboard

140.Which is the most frequently used output? Ans : monitor

141.Which one does not need a network card?

Laptop

a. Handheld device

b. Desktop

c. PDA

142. You get the error  “ hardware not found “ despite the fact that it is connected. What you will do?

a. Check the connection

b. Remove the hardware

c. Replace the hardware

d. Restart the computer

Page 8: Dovetail Dumps Latest Phase2

143.When you power off the computer which memory is not affected?

Ans: ROM

144.IP address is conflicted. What will you do?

a. Uniquely give the ip address

b. Connect to a client computer that will automatically assign the IP

c. Manually delete the IP assigned  etc.

145.Which of the following is true?

a. Windows XP can be connected to both domain & work group

b. Windows home edition can be connected only to workgroup and not to domain

c. Windows home edition is connected to both workgroup and domain

d. Etc

146..If you delete a mail from the mailbox of lotus notes. How long it will remain in the trash folder?

a. 24 hrs

b. 48 hrs

c. 2  min

d. It wont remain in trash folder it will get deleted automatically.

147.IP address consists of how many bits?

Ans: 32 bits

148..What is the short cut key to open a favourite tab?

a. Ctrl+O

b. Ctrl+A

c. Ctrl+F

d. Ctrl+M

e. Ctrl + I

149.What is BSOD?

Ans : blue screen of death

150.Where is the heat sinker? On the processor

Page 9: Dovetail Dumps Latest Phase2

151.What type of twisted pair cable is used?

Ans: RJ- 45

152.To create an user account what rights u should have?

Ans: admin rights to the pc.

153.While installing/uninstalling Microsoft product, what will u use?

a. Microsoft wizard

b. Windows wizard

c. Windows install wizard  etc

154.Which layer is used for Error detection?

a) Network layerb) Sessionc) Data Link

155.The size of IP address?: 32 bits for ipv4 and 128 bits for ipv6

156.Which layer is used in MAC Address?Data link

157.What is called hard error?An error occurence in a computer system that is caused by the failure of a memory chip.

158.How to go to System restore?

Start------à All Programs---àAccessories----àSystem Tools---àSystem restore

159.If a particular driver is suspect you should roll back to the original driver before u try to install a new one.Is it True or False  ans: True

160.If u are a power user and u want to view the devices that are not connected to the computer what should u do?

Ans: My compuer-Right click-Properties-Advanced--Environment Variables--set the variable in System variable box

161.If the user should not want to change password, what option is selected?

Ans:  User cannot change password

162.How to set Out of Office in Lotus notes?

Ans: Actions-- Tools----Out of Office

163. What are the steps to rename user accounts in Windows Exchange Server 2003? – Go to ADRight click on user accountpropertiesaccount profile (change the name there)

164.What is the other name for Twisted pair cable? 10 base T

Page 10: Dovetail Dumps Latest Phase2

165.What is IEEE 802b? – Wi Fi standard

166.Logical component of Ad –Tree

167.Which contains the high memory :*(not sure que)

ans Hard disk

168.To read and write information on the disk what is used? Disk drive

169.thickness of Coaxible cable? 1mm

170.. Peer to peer network advantage?

171.how 2 Create a Language bar in desktop?

Start->Control Panel->Regional and language options->languages tab->details->preferences->language bar->show the language bar on desktop.

172..Which option narrator window having?

Announce events on screen

Read typed characters

Move Mouse pointer to the active item

Start Narrator minimized

173.Brain of the computer?CPU

174.What access can be given to modify the account in Exchange server 2003?

Reader access, Editor Access, Depositor, Write access

175.. How to go to System restore?

Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore

176. What is the primary function of DNS server? Primary source for Domain Name to IP Address resolution

177 The most basic tasks of DNS is to translate hostnames to IP address – True or False

178.Which layer in the Active directory is present according to the OSI reference model? Network layer

179 How to create a child domain? - DCPROMO.EXE

180 Can FAT 32 be converted to FAT 16?- Yes Using tools like Partition Magic (Again FAT32 – can have max disk size as 32 GB but FAT 16 Cant – You will loose disk space – Personal experience – I lost my Ipod shuffle because of

Page 11: Dovetail Dumps Latest Phase2

this)

181.What are the steps to convert FAT 32 to FAT 16? - Start > run > type "Format I: /FS:FAT" without quotes >I< for your drive :)

182.IRQ use how many address?a. 16 b. 64 c. 32 d. 8

183. Is the create password reset disk available in Win XP? Yes – But it can be used only on the computer it was created

184.Type of trust which allows the users to access resources in unidirectional way to create a forest root domain? - a one-way trust

185.Can printer be shared in Microsoft win SP2? - YES

186. Goal of ICF?- prevents non authorized connections

187.Which info contains in system state backup info stored in Public folder? AD, IIS Metabase, System Registry

188. Procedure to grant permission for creating a top-level public folder? – Exchange System Manager > Administrative Groups > Folders > Public Folders > Specific Folder> Rt. Click Properties > Permissions > Administrative Permissions (Note: 3 types of permissions – Client (view only), Directory Rights (add, modify, delete), Administrative Rights (Provide access to other etc...))

189.Packet filtering is needed in order to enhance security of VPN server – True

190 Which domain functional level support only win2003? – Windows 2003 Mode

191.How to delete a partition of a logical drive? – diskmgmt.msc

192.What is the logical structure of a AD forest?- Forest

193.Tracks of HDD are further divided into?-sectors

194.What kind of connectors does analog modem use?RJ11

195.What are the functions of DNS server? – Host Name – IP Address

196.In which hierarchy AD forest is built?a. Down top b. Top Down c.Forest

197.Which of the following in exchange server 2003 allows you to create a public folder?

a. AD users and computers

b. OWA

c. ESM

Page 12: Dovetail Dumps Latest Phase2

d. None

198.What are the ways to Implement and Configure DNS

a. Forward look up

b. Dummy DNS

c. Naming Schema

d. Reverse look up

199.Default domain functional & most functional interim of DC

a. Win 2003 interim

b. Win 2003 (All the options work only in this level)

c. Mixed mode

d. Native mode

200.If there is no boot in PC? First what will you check. – Power Supply

201.What command is used to configure ip address in win 95 OS. -

winipconf

202.Enable message tracking in exchange 2003.

Goto ESM right click on the server to b tracked properties

general Enable message tracking

203.How will u create Global Address List? – Create an Address list setting filter

rules - value to all Users, Contacts and groups (Note: By default only

it will be Exchange recipients)

204.Anti- malware is ? Virus Removal tool – Malware is a kind of virus.

205.DSL/Cable handle

a. Installation of anti virus

b. Installation of data filter

Page 13: Dovetail Dumps Latest Phase2

c. Installation of firewall

d. Installation of routers.

206.What cmd is used to find IP address along with MAC address?

a. Ipconfig/All

b. Ipconfig/ Show

c. IP config

d. none

207Advantages of NTFS. – Encryption, Sharing, Compression, File and

Folder permissions etc

208.IRQ# is assigned for interface card?

a) 10

b) 9

c) 2

d) 1

209. IP address used in Win OS? – IPV4 and IPV6

210.What work around for “Non-system error”

This error is because boot loader file is missing i.e. io.sys

211.How to enable printer pooling?

Add printer select printers check printer pooling option and

finish the wizard

212.Where is AD database stored?

a. Harddisk of DC

b. forest

Page 14: Dovetail Dumps Latest Phase2

c. tree

d. local system

213.What is reverse look up?

Used in dns for ip address to hostname resolution

214.Option to hide a mailbox from address book.

a. Hide all

b. Hide from exchange address

c. none

d. Hide me.

215.What are the 3 common types of virus? – Virus, Trojan Horse, Worm

216.What is the default backup tool used for back up exchange server data?

- NTBACKUP

217.RJ-45 connectors can maximum hours 12 pairs of wires? True / False (4

Pairs of wires)

218.Protocol used to resolve NETBIOS Name to IP?Windows Internet

Name Service (WINS), broadcasting, or the LMHOSTS file.

219.Normal size of hard drive sector? - A sector is the smallest physical

storage unit on a disk, and is almost always 512 bytes (0.5 kB) in

size.

220.For a user the system is not working for a particular days at specified

time. What could be the troubleshooting step? - Parental Control

Option is used in Windows Vista (Enabling and disabling work

time of the computer)

221. How to create Top level public folders?

To grant permissions to create top-level folder

Page 15: Dovetail Dumps Latest Phase2

Locate the Organization object or the administrative group that

contains your public folder tree

Add appropriate accounts, and then clear or select the Allow check

box for create top-level public folder permission

222. How to provide an access for public folders?

Gain Access to any public folder in the Exchange organization

223.What is Forest Retrospect?

Moving Existing domains to other locations in the domain hierarchy

224.The function of a switch on a network is to prevent collisions TRUE

225.You are upgrading from a peer-to-peer network running

NetBEUI to a client-server server network running TCP/IP.How

can you maximize network performance?

Remove NetBEUI from all stations

226.What is the logical component that lets you to link together multiple domain trees in a hierarchical arrangements Forest

227.what is the first domain in any enterprise and it shall be the most important domain to your forest structure Forest Root

228.what is the first domain created in a logical hierachyThe root of an AD forest

229.what option is selected to create a child domain is initially created through the wizard?child domain in an existing domain tree

230.what option has to be selectd to create a forest root domain?domain in a new forest

231.Steps to create application Data partition

open command prompt -> type NTDSUTIL -> at the prompt typre DOMAIN MANAGEMENT -> type CONNECTION -> type CONNECT TO SERVER < SERVER NAME > after confirmation type QUIT

Page 16: Dovetail Dumps Latest Phase2

232.how do we delete an application directory partition?Delete NC applicationdirectorypartion

233.what are the relevant levels of domain functionalities mark them all

Win server 2000 Native Win server 2003 Win server 2003 InterimWin server 2003

254.which is the default domain functional level and most flexible in terms of adding domain controllers Mixed mode

255.which domain function level allows the addition of Win2000 and win 2003 domain controllers? Windows 2000 native

256.The domain functional level supports only windows 2003 domain controllers

win server 2003

257.how do we change the domain functional level AD domains and trust right click on domain name click on domain functional level raise

258.how do we change the forest functional levelAD domains and trust right click on forest name click on forest functional level raise

259.what is used to establish a trust relationship between two domains in different forest od between 2 win2k domains and an external windows 2000 or NT4 domain realm trust

260.What type of trust provides users in the currect domain and users in the target domain can access resources in both domainsTwo way trust

261.what type of trust provides users in target domain will not be able to access any resources in this domain but users in the current domain will be able to access resources in the target domain one way trust

262.what way is the DNS server configured if it resolves Ipaddress from NetBios Name forward lookup zone

263.Full from of FRU? - Field Replaceable Unit

264.When the mouse does not work what is the first step you take to resolve the issue?

Page 17: Dovetail Dumps Latest Phase2

ANS: check the connectivity

265.When your server room suddenly warms up what will u check?

a) Power cord.

b) Air conditioning

c) UPS

D) CPU

266. Full form of RAID? – Reduntant Array of Inexpensive Disks.

267.Full form of APIPA? - Automatic Private IP Addressing

268.How will you create Printer pooling? Start->printers and faxes->double click on Add printer icon->Right click on the Icon for the newly defined printer and choose properties Select properties sheets ports Tab -> select enable printer pooling Check box

269.You use an Ethernet card which is not a plug and play device and you are not able to use it because of resource clash what will u reset in order that the card works ?

a) MAC address

B) Communication protocol

C) Memory

d) Mother board settings

270.What are the protocols supported by VPN? – PPTP, L2TP and IPSec

271.How will u create a mail store policy? - System manger > Admin Group > System Policies > Rt Click > New Mail store Policy

272.What is the goal of firewall? Provide baseline intrusion prevention mechanism in windows XP

273.What is the definition of service pack?

A service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package. Many companies, such as Microsoft or Autodesk, typically release a service pack when the number of individual patches to a given program reaches a certain (arbitrary) limit. Installing a service pack is easier and less error-prone than installing a high number of patches individually, even more so when updating multiple computers over a network.

274..How will u raise the domain functional levels? – Rt Click on the domain -> Raise Domain Functional level

Page 18: Dovetail Dumps Latest Phase2

275.What information will be stored in public folders? – Calendar, Contacts, General store etc.

276.What is the main function of FTP?Transferring files

277.16. In which type of back up will the logs be purged? (Select 2)

A) normal

b) Incremental

c) Differential

d) Copy

278.in which domain controller functional level can windows server 2000 and windows server 2003 work - Win server 2000 native

279.What are the steps to verify that Exchange server recognizes that an online back has been done? – Check the database tab and find when the last backup took place.

280.What are the steps to configure the ESM to display the administrative groups? – System Manager > Rt Click on Your exchange server > Properties > Display Administrative Groups.

281.What is the reverse look up process? – IP address to Hostname

282.What is the forward look up process? – Hostname to IP address

283.. File system that allows File and Folder level permission?

a. Fat 16

b. Fat 32

c. NTFS

d. Fat

284.What type of trust configured between 2 domains provides a one way access?

i) 2 way external

ii) Internal

iii) Simple

iv) One way incoming for external trust

285.Top level domain in http://www.mail.cognizant .com ANS: com

286.Expansion of ISDN? – Integrated Services Digital Network

Page 19: Dovetail Dumps Latest Phase2

287.In store how is the information stored?

A. database logs

B. transactions logs

288.26. What are the types of files in exchange server?

A. .mdb files

B. .edb files

c. .ist files

289.27. A normal CD –ROM stores ---------------- MB of data

A. 650

b. 1000

c.1024

d. 500

290.28. What is DSL..?Ans. Digital subscriber line

291.. Why do we need firewall?Ans. used to enhance the security of computers

292.Can we set Windows firewall in Win XP OS without SP2? Ans. No

293.I’m running Windows 2000 and am getting disconnected when trying to log on to the VPN. What is most important step I need to perform..?

Ans. Ensure that you have 128-bit encryption level installed.

Note: (Also check Port 1723 and 47 are open for PPTP (Pont to Pont tunneling protocol) Port 1701 is open for L2TP (Layer 2 Tunneling Protocol)).

294.In which layer do Firewall's work?

Ans. The lowest layer at which a firewall can work is layer three.

295.How many classes of IP addresses are in use?

Ans. Five (Class A - E)

296.51. Abbreviate IMAPAns. Internet Message Access Protocol

297.52. Which network topology provides multiple, redundant links?

Page 20: Dovetail Dumps Latest Phase2

Ans. Star

298. What is the default protocol used on the Internet?

Ans. TCP/IP

299. Which network device has the capability of amplifying and regenerating network signals but has no capability of routing or segmenting?

Ans. Repeaters

300.How can you maximize network performance?Tunning network card

301.Which of the following could be used for connecting a mouse? Ans. 6- Pin Mini DIMM Connector, DIMM-5 Connector plug or DB-9 to 25 Pin Adapter.

302.Which of the following provides the name resolution on the Internet? Ans. DNS

303.If you want to prevent users from using access points on your wireless network?

Ans. WEP (Wired Equivalent Privacy)

304. Which of the following devices is used to connect a T1 line? Ans. CSU/DSU

305.What is the default port number for Telnet connections?Ans. 23

306.Which of the following allow NETBIOS to IP address resolution?

Ans. LM Hosts and WINS.

307.What of the following file system for file and folder level permission? NTFS

308.Choose one of the following steps to resolve the Winsock error? - Netsh Winsock Reset command and Restart computer for changes to take effect.

309.VPN connections provide end – end security and doesn’t provide security between the client and VPN server – True or False - True

310.Exchange server 2003 routing groups can be connected to another.

a. Using cal connectors ( There is nothing like this)

b. Using SMTP ( if you want the routing groups to use only SMTP protocol)

c. Using routing groups

d. X.400 connections ( In case of slow link)

311.Domain function level s/p only win NT 4.0 & win 2003 server DC

a. Mixed mode

b. Win 2003

Page 21: Dovetail Dumps Latest Phase2

c. Win 2003 interim

312.Which is the correct step for 2000 perform AD restore operation?

a. Copy SYSVOL & NETLOGON to restore folders from CD

b. Open backup utility>advanced mode link

c. Open backup restore > start restore > ok

313.Domain function level allows addition of win 2000 and win 2003 DC’s

a. Win server 2003 interim

b. Windows 2000 mixed mode

c. Win server native mode

d. Win server 2003

314.How can an exchange be configured as a front end server?

a. POP 3,IMAP 2,HTTP 5

b. POP 3,IMAP 4,HTTP 1

c. POP 3, IMAP 4,STMP

d. POP 3,SMTP,IMAP 1-4

315.What will you do when you get an error message “Invalid media type”

a. Chkdsk

b. Command.com

c. Format

d. Diagnostic

316.What is the logical component used to link multiple domain trees?

a. Forests

b. Servers

c. Domain Controllers

d. WAN link

Page 22: Dovetail Dumps Latest Phase2

317.You are about to install second IPE which has only one adaptor. Your first hard drive will still be boot drive.

a. As a secondary

b. As a master

c. As a slave

d. As a primary

318.Tabs in service properties

a. General

b. Dependencies(Sorry not sure what’s the option)

c. Logon

d. Recovery

The entire above (General, Logon, Recovery, dependencies)

319.Steps to delete existing storage groups?

a) In the console tree, expand Server Configuration, and then click Mailbox

b) In the result pane, select the server from which you want to remove the storage group.

c) In the work pane, select the storage group that you want to remove, and then click Remove

d) A warning appears asking, "Are you sure you want to remove <selected storage group>?" Click Yes

320.Internet connections firewall can be enabled in Internet connection sharing(ICS)

321.What hardware and software will support plug and play concept?- Peripheral motherboard device

322.LDAP search filters cant be modified in default recipient policy – True or False

323.Which of the following will connect cable modem to a wireless router

a. Wirelessly

b. Coaxial

c. Ring cable

Page 23: Dovetail Dumps Latest Phase2

d. Twisted pair

324.What is the command to give IP address detail in Win95 operating system? - Click Start

- Click Run - Type command.com and ENTER - Type winipcfg

325.How will you create partition in Win SP2? - Disk Management : diskmgmt.msc Disk Partition Manager : diskpart

326.Sensitive data security is undoubtedly a major issue in VPN – True or False

327.What is the primary function of DNS server? Primary source for Domain Name to IP Address resolution

POST error code Probable Cause1xx Main board related errors 200-299 Memory related errors.3xx Keyboard related errors151 Real-time clock failure161 BAD CMOS memory6xx Floppy Disk related errors1700-x Hard drive controller31xx Network Adapter related errors

328.Which wireless LAN standard specifies the use of Direct Sequence Spread Spectrum technolog? Ans.802.11b

329.The system shows less memory than actual memory. How to fix it? ADD RAM to it

330.IRQ use how many address?

a. 16

b. 64

c. 32

d. 8

331.What is the usage of chkdsk command? - In Windows XP you can perform error checking

on hard drives by using the chkdsk.exe command line utility.

332.Recommended method of restoring and backup AD database? - Authoritative and non

authoritative

Page 24: Dovetail Dumps Latest Phase2

333.Goal of ICF?- prevents non authorized connections

334.What happens when replication enabled option is selected? – Automatic replication of

Global Catalog Info.

335.Packet filtering is needed in order to enhance security of VPN server – True or False

336.1. How do you create a public folder?

a. None

b. At the time of the installation

c. You can create only through e mail client

d. Installation cd

337. How do you create a public folder?

a. None

b. At the time of the installation

c. You can create only through e mail client

d. Installation cd

338.Which of the following in exchange server 2003 allows you to create a public folder?

a. AD users and computers

b. OWA

c. ESM

d. None

339. If there is no boot in PC? First what will you check. – Power Supply

340. Option to hide a mailbox from address book.

a. Hide all

b. Hide from exchange address

c. none

Page 25: Dovetail Dumps Latest Phase2

d. Hide me.

341. 1. Option to set the age of items in folder

a. Deletion limit

b. Age ( But remember the age by default is 0 days unless you specify it in the

Information Store level)

c. Detail section

d. None

342.1. How to delete existing storage group? – Exchange System manager – Administrative

group – Servers - Rt Click on the Storage Group - Delete

343. Expansion – FSMO?

Flexible Single Master Operation

344. Normal size of hard drive sector? - A sector is the smallest physical storage unit on a

disk, and is almost always 512 bytes (0.5 kB) in size.

345. How to provide an access for public folders?

Gain Access to any public folder in the Exchange organization

346. Purpose of two fans inside the system case? Select 2

A. to recharge the battery b. air circulation c. lower the temp d. there can never be 2 case fans

Ans: B and C

347.42. Types of network cables? Select3

Ans: Select all three leaving token ring

348.Type of cable used in CD Rom? Ans: IDE

349 The possible reasons for Fan working inside the CPU, when system boots

b. to lower the temperature inside .

c. to recharge CMOS battery

350.How will u create a mail store policy?

Page 26: Dovetail Dumps Latest Phase2

Ans: System manger > Admin Group > System Policies > Rt Click > New Mail store Policy

351.What is the goal of firewall? Ans: Provide baseline intrusion prevention mechanism in windows XP

352.How will u raise the domain functional levels?

Ans: Right Click on the domain -> Raise Domain Functional level

353.What is the default back up available in Exchange server? Ans: ntbackup

354.What is the main function of FTP? Ans: Transferring files

355.In which type of back up will the logs be purged? (Select 2)

A) Normal b) Incremental c) Differential d) Copy

356.19. What are the steps to configure the ESM to display the administrative groups?

Ans: System Manager > Rt Click on Your exchange server > Properties > Display Administrative Groups

357.In store how is the information stored?

A. database logs B. transactions logs

358.Which wireless industry organization is described as, an association of companies working together to enable reliable, cost-effective, low-power, wirelessly networked, monitoring and control products based on an open global standard?

Ans. ZigBee Alliance

359.How can an exchange be configured as a front end server?

a. POP 3,IMAP 2,HTTP 5

b. POP 3,IMAP 4,HTTP 1

c. POP 3, IMAP 4,STMP

d. POP 3,SMTP,IMAP 1-4

To begin using the front-end server do one of the following:

Restart the computer.

Stop and restart the HTTP, POP3, and IMAP4 services.

The default Exchange virtual directories have now been configured for you. However, it is recommended that you also configure SSL. For detailed instructions on how to configure SSL for POP3, IMAP4, and SMTP, see "How to Configure SSL for POP3, IMAP4, and SMTP" in the Exchange Server 2003 and Exchange 2000 Server Front-End and Back-End Server Topology Guide. For detailed instructions about how to configure SSL for HTTP, see How to Configure SSL for HTTP in the Exchange Server 2003 and Exchange

Page 27: Dovetail Dumps Latest Phase2

2000 Server Front-End and Back-End Server Topology Guide.

360You are about to install second IPE which has only one adaptor. Your first hard drive will still be boot drive.

a. As a secondary

b. As a master

c. As a slave

d. As a primary

361. What hardware and software will support plug and play concept?- Peripheral motherboard device

362.What is the primary function of DNS server?

Ans: Primary source for Domain Name to IP Address resolution

363.1. Exchange server 2003 routing groups can be connected to another.

a. Using cal connectors

b. Using SMTP

c. Using routing groups

d. X.400 connections

364.1. Which is the correct step for 2000 perform AD restore operation?

a. Copy SYSVOL & NETLOGON to restore folders from CD

Open backup restore > start restore > ok

365.1. Which of the following are new facilities included in Win SP3 that are not included in SP2?

ANS :- In SP3 it contains Kernel Mode Cryptographics Module - A new kernel module that

"encapsulates several different cryptographic algorithms," according to Microsoft.

366.1. How will you start disk management service?

Page 28: Dovetail Dumps Latest Phase2

Dmadmin.exe

367.1. IRQ use how many address?

a. 16

b. 64

c. 32

368.1. What is the usage of chk-dsk command?

To clean the Bad sector of the disk and replace with new blocks and clear orphan files and

folder.

369.1. How to create users account in Win XP?In Computer Management (i.) Right Click the user and

groups(ii.) Create New user

370.1. In which hierarchy AD forest is built?

a. Down top

b. Top Down

c. Forest

d. Tree

371.1. Which of the following will connect a cable modem to a wireless router?

a. Coaxial

b. Wirelessly

c. Cat5 cable

d. Serial

372..1. What type of trust configured between 2 domains provides a one way access?

a. 2 way external

Page 29: Dovetail Dumps Latest Phase2

b. Internal

c. Simple

d. One way incoming for external trust

373.1. How do you create a public folder?

a. None

b. At the time of the installation

c. You can create only through e mail client

d. Installation cd

374.Default domain functional & most functional interim of DC

a. Win 2003 interim

b. win 2003

c. Mixed mode

d. Native mode.

375. What are all will be available in service pack?

Collection of Patches for Win OS

376. Mouse stops working even after restarting the machine. ? What will you check first?

Connection at rear side of the system for PS/2 and the driver will be updated

377.1. DSL/Cable handle

a. Installation of anti virus

b. Installation of data filter

c. Installation of firewall

d. Installation of routers.

Page 30: Dovetail Dumps Latest Phase2

378.1. Where is AD data stored?

a. Hardware of DC

b. forest

c. tree

d. local system

379.1. Option to set the age of items in folder

a. Deletion limit

b. Age

c. Detail section

d. None

380.1. CD- ROMS are read only by ? Laser Diodes

Page 31: Dovetail Dumps Latest Phase2

EXPLANATIONS:1. Types of restores in AD?

Authoritative restore – Running NTDSUTIL after the restore updates the USN (Updated Sequence Numbers) to be greater than any other member domain controller to which the machine formerly replicated. This will cause the restored domain controller to replicate its Active Directory information to all other domain controllers.

Non-Authoritative restore – A restore overwriting the System State to the point at which it was backed up. A Non-Authoritative System State restore is usually done when there are other domain controllers on the network responsible for replicating the Active Directory changes to systems with older Updated Sequence Numbers.

Primary restore – A Primary restore is performed when no other domain controllers are present on the network. This type of restore can also be used when the machine is the only functioning server in a replicated data set

Virus is a small computer program which infects the computer A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network)

URL spoofing and phishingAnother kind of spoofing is "webpage spoofing," also known as phishing. In this attack, a legitimate web page such as a bank's site is reproduced in "look and feel" on another server under control of the attacker. The intent is to fool the users into thinking that they are connected to a trusted site, for instance to harvest user names and passwords.This attack is often performed with the aid of URL spoofing, which exploits web browser bugs in order to display incorrect URLs in the browsers location bar; or with DNS cache poisoning in order to direct the user away from the legitimate site and to the fake one. Once the user puts in their password, the attack-code reports a password error, then redirects the user back to the legitimate site.

How to create a user account in AD?

1. Open Active Directory Users and Computers.2. In the console tree, right-click the folder in which you want to add a user

Page 32: Dovetail Dumps Latest Phase2

account.Where?• Active Directory Users and Computers/domain node/folder

3. Point to New, and then click User.4. In First name, type the user's first name.5. In Initials, type the user's initials.6. In Last name, type the user's last name. 7. Modify Full name to add initials or reverse order of first and last names.8. In User logon name, type the user logon name, click the UPN suffix in the

drop-down list, and then click Next.If the user will use a different name to log on to computers running Windows 95, Windows 98, or Windows NT, then you can change the user logon name as it appears in User logon name (pre-Windows 2000) to the different name.

9. In Password and Confirm password, type the user's password, and then select the appropriate password options.

How will you schedule a meeting and invite members (outlook)?

Step1: Open the File menu and select New, then Meeting Request. Step2: Click the Attendee Availability tab. Step3: Click the Invite Others button to select participants and resources. Step4: For each person or resource you pick, designate required, optional, or resource. Step5: Select a date and time that fits all or most schedules, or click the AutoPick button to have Outlook find the next available time for a variety of scenarios (everyone that's invited, only the required attendees, and so on). Step6: Click the Appointment tab. Step7: Type in the meeting topic in the Subject box. Step8: Enter the meeting location in the next box. Step9: Enter related information in the large box - this will appear in the body of the e-mail invitation message sent to your invitees. (For example, "Hey gang, let's get together to talk about the holiday party.") Step10: Attach documents if desired. Step11: Click the Send button to invite participants you added to the attendees list. The meeting appears on your calendar.

How will you add a contact in Lotus notes?

1. Open your address book and choose Actions - New - Contact.

2. In the First and Last fields, specify the person's name.

3. (Optional) Specify the person's Middle name, Title, or Suffix.

4. Enter the person's mail address in the Email field.

5. (Optional) Click the button to the right of "Email" to specify details of the person's mail software, such as Fax or Internet Mail. Click the X to delete an entry you don't want to keep.

Page 33: Dovetail Dumps Latest Phase2

6. (Optional) On the Business and Personal tabs, specify any other information about the person you want to save, such as company (business) name, multiple phone numbers, birthday, anniversary, or alternate mail addresses.

Tip You can customize the labels describing the information.

Tip You can set a reminder in your Calendar for a birthday or anniversary.

For more information, see Creating a Calendar entry.7. (Optional) Click the Briefcase tab and paste any attachments or rich text you want to associate with the person. Tip For example, you could save a resume for a job candidate, driving directions for a client, or review information for an employee.

What all should you check when you install Exchange Server?

Make sure all domain controllers in the forest are Global Catalog servers and are running current service packs and patches.

Before beginning installation or migration make sure there are no existing Exchange organizations or ADC CAs have been created. The easiest way to check this is by installing Windows 2000/3 Support Tools and looking at the properties of the Administrators of the domain using the ADSIEdit tool. If one of them has the property "proxy addresses" then ADC or Exchange setup has been run before.

How To clear a replication history1. Make sure you have Manager Access in the database ACL. 2. Open the database. 3. Choose File - Replication - History. o To clear one entry, select it, click clear, and then click yes. o To clear the entire replication history, click Clear All, and then click yes. 4. Click Done.

IP spoofing?A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating

Page 34: Dovetail Dumps Latest Phase2

that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.

What is the expansion of ZIF? -zero insertion force

Adam Tech PCA Series Flexible Printed Circuit (FPC) and Flexible Flat Cable (FFC) connectors are ZIF (zero insertion force) designed to be a fast easy method to make a reliable connection of flexible printed circuits to a PCB

User of forwarder in DNS?

..>>>A forwarder is a Domain Name System (DNS) server on a

network used to forward DNS queries for external DNS names to

DNS servers outside of that network. You can also forward queries

according to specific domain names using conditional forwarders.

.......>>>Use Exchange System Manager to configure additional

public folder settings

1) In Exchange System manager, locate the public folder you

want to modify

2) Use the folder’s properties dialog box to access client

permissions

3) Add the users and assign the appropriate permissions

(To verify that Exchange recognizes that an online backup was performed follow these steps:

1. In Exchange System Manager, browse to Administrative Groups\First Administrative Group\Servers\servername\First Storage Group\Mailbox Store (servername) (as always, use your own path...)

2. In the console tree, right-click either the Mailbox Store or the Public Store, and then click Properties.

3. In the store properties dialog box, click the Database tab.

4. On the Database tab, in the Time of last full backup box, verify that the time of the backup you just performed is recorded, and then click OK.)

1. Difference between Window SP and SP1 (Service Pack 1)? In SP1 – USB 2.0, .NET

framework, default programs and access rights etc

Microsoft occasionally releases service packs for its windows OS to fix problems and

Page 35: Dovetail Dumps Latest Phase2

add features. Each service pack is a superset of all previous service packs and patches

so that only the latest service pack needs to be installed, and also include new revisions.

Older patches need not be removed before application of the most recent one

A service pack is an update to a software application that provides fixes and

enhancements to the product. Service packs can either be downloaded or ordered

directly from the company.

Windows XP Service Pack 2 provides tools to easily view, understand, and control the security aspects of the computer. It includes changes in the operating system related to computer and network security

BLACKBERRY1.How to soft reset a black berry?? -– ALT + CAP + DEL.

2.How will you synchronize wireless in blackberry?? -Thru Configure PIM

3.Is it possible to move an icon in Black Berry?? Yes    4.  Alt+0 in Blackberry? Sent Items5.Does BlackBerry support .tif files? Yes6.What is the shortcut key used to show weekly calendar in blackberry?

a. D

b. W                       etc

7.Unread Old messages in Black berry ?U

8.Blackberry is a?Wireless handheld Device.

9.Which Primary tool is used to access alternative characters and functionality in the BlackBerry keyboard? Alt

10.Begin Call and End call keys are available only in 7100 Series

11.Which are the five main components that can appear in a BlackBerry application?Menu,List,Button,Choice,Edit.

12.What are three ways to accomplish the redirection of messages?BlackBerry Enterprise Server (BES),BlackBerry Web Client,BlackBerry Desktop Redirector.

13.How you can Edit the Address Book in Blackberry?Desktop Manager

Page 36: Dovetail Dumps Latest Phase2

14.How do you make a phone call?1.By SendButton Phone 2. Icon on Home screen (BY USING 1 and 2)

15.is Attachement Type .tiffiles is supported by Blackberry?Yes

16.Alt + O is the shortcut key for?To Sent Messages

17.What is the shortcut key to read oldest unread message?U

18.How many Browser Icons are on blackberry device by default? ONE

19.How do yor Perform a Soft Reset?Alt+Cap+Delete

20.Is it possible to change Icon position on Blackberry Home screen?Yes

21.What should we do if Blackberry has a Frozen screen?1.Try a Soft Reset 2.Try a Hard Reset (1 and 2)

22.How do you Sync Calendar wirelessely?By Blackberry Desktop Manager

23.What is the shortcut key to View week calendar? W

24.Personal Information Management(PIM) handles?Addressbook, Calendar, Tasks,Notes

ACTIVE DIRECTORY QUIESTION:

1.what is the logical component that lets you to link togeather multiple domain trees in a heirachial arrangements Forest.

2.what is the first domain in any enterprise and it shall be the most important domain to your forest structureForest Root.

3.what hierachy does the Active directory Forest is built TOP DOWN

4.what is the first domain created in a logical hierachyThe root of an AD forest

5.what option is selected to create a child domain is initially created theough the wizardChild domain in an existing domain tree

6.what option has to be selectd to create a forest root domain domain in a new forest

7.Steps to create application Data partitionopen command prompt -> type NTDSUTIL -> at the prompt typre DOMAIN MANAGEMENT -> type CONNECTION -> type CONNECT TO SERVER < SERVER NAME > after confirmation type QUIT

8.how do we delete an application directory partitionDelete NC applicationdirectorypartion

9.what are the relevant levels of domain functionalities mark them all

1. Win server 2000 Native 2.Win server 2003 3.Win server 2003 4.Interim Win server 2003

10.which is the default domain functional level and most flexible in terms of adding domain controllers.Windows 2000 mixed mode

11.which domain function level allows the addition of Win2000 and win 2003 domain controllers Win server 2000 Native

Page 37: Dovetail Dumps Latest Phase2

12.which domain function level supports only win NT 4.0 and win 2003 server domain controllers Win server 2003 Interim

13.the domain functional level supports only windows 2003 domain controllers?Win server 2003

14.how do we change the domain functional level Admin tools-> open AD domain trust MMC-> select the domain in your forest for which you have to raise functionality -> right click select raise doamin functionality -> and click Raise

15.how do we change the forest functional level?admin tools -> open active directory domain and trust -> rightclick the root level active directory domain and trust node and chose raise forest functional level from the context menu .

16.what is used to establish a trust relationship between two domains in different forest od between 2 win2k domains and an external windows 2000 or NT4 domain?two ways for an External trust two way trust

17.What type of trust provides users in the currect domain and users in the target domain can access resources in both domains? Two way external trust

18.what type of trust provides users in target domain will not be able to access any resources in this domain but users in the current domain will be able to access resources in the target domain?oneway incoming for external trust

19.what type of users in the current domain will not be able to access any resources in the specified domain but the taret domain will be able to access resources in the current domain?oneway outgoing to trust uses from other domains

20.Steps to install DNS?Start-> Control panel -> Add remove programs -> add components -> select n/w series -> select DNS -> complete the wizard

21.what way is the DNS server configured if it resolves Ipaddress from NetBios Name Forward Lookup

22.where is the Active directory database stored?Harddisk of a domain controller

23.what does the Active directory consists select all that is applicable?Domain Data Cofiguration Data Schema Data Applicable Data

24.what are the ways you can posibly implement & configure DNS select them all Forward Lookup Reverse Lookup

25.what way is the DNS server configured if it resolves NetBios Name from Ipaddress Reverse Lookup

26.What s recommended method of restoring and backing up Active directory Data base?System State Data

27.steps to perform Active Directory restore operation ?Open backup utility -> advance mode link on the backup restore -> start restore button- > click OK

28.What are the types of restores in Active Directory

Normal Non authoratitative authoratitative

Page 38: Dovetail Dumps Latest Phase2

NORMAL

MS WINDOWS 2003 ACTIVE DIRECTORY

1. What is the name of the File used to store Active directory data on the hard disk?

A. NTDS.DIT B. NTDS.DII C. ADS.DLL D. NTDS.SYS

2. What is the file system used on which active directory can be installed?

A. HPFS B. FAT32 C. NTFS D. FAT16

3. What is the protocol used for communication between clients and directory services?

A. DDNS B. LDAP C. SMTP D. TCP/IP

4. Which is the naming scheme that is not supported by active directory

A. UFO B. DNS C. UPN D. UNC

Page 39: Dovetail Dumps Latest Phase2

5. What is the command line to install Active Directory on a standalone Server

A. START AD B. DCPROMO C. DSMOD D. DEPLOY DD

6. What are the 2 shared folders that are created automatically after the installation of Active Directory

A. SYSVOL & NETLOGON B. SYSVOL & SYSSHARE C. NETLOGON &SHARE AD D. ADS & AD SHARE

7. Which of the following component of Active Directory is not shared by all domain in an Active Directory Enterprise

A. Schema B. Global Catalog C. Parent Domain D. Configuration

8. Which are the logical components of Active Directory ( choose all that applies )

A. Domain B. Tree C. Forest D. Organizational Unit (ALL)

9. Which is not the way to uninstall Active Directory from Domain Controller

A. Dcpromo B. Launching AD Installation Wizard C. Formating the System D. Detecting Net logon and System volume Folders

10. Which of the full group can administer any and all domain in a forest enterprise

A. Domain B. Universal Admin C. Enterprise Admin D. Enterprise server operator

11. You want to implement a (GPO) Group Policy Object that will distribute the latest service pack you are thinking about distributing the GPO to an active directory object what are your choices ( Choose all that applies )

A. A Tree B. A Site C. An Organizational Unit D. A Domain

12. You have several branch office connected by slow WAN links what should you do to reduce the Actrive Directory Replication traffic between sites.

A. Place the domain controller in every site

B. Configure separate child domain for every branch office

C. place only one domain controller at the main office so that there will be no replication traffic

D. place 2 domain controller in each site so that replication trafic is always local

13. To combact random password hacking you decide to implement a GPO that will be used to set an Account Lockout Policy to lockout access after 5 successful attempts on which active Directory Object will you link this policy

A. The site it holds the domain controller

B. The OU it holds all the user accounts

Page 40: Dovetail Dumps Latest Phase2

C. The Domain where logons are submitted to the domain

D. The forest no matter how many domain every logon to active directory access in the context to the forest

14. What is Schema

A. A database that is used to define Objects and their attributes.

B. A service that runs on the Domain controller

C. A service that runs on the server

D. Part of active directory services.

15. The components making up Active Directory can be Broken in to 2 what are they

A. Physical and Logical Components

B. Forest & Tree

C. Trees & OU

D. Active Directory & Domain Controller

16. What are the uses of Physical componects used in Active Directory

A. To design a directory structure that reflects the physical layout or Topology

B. To support the Logical components in AD

C. To work hand in hand with Logical components

D. To mirror the Logical components in AD

17. What are the uses of NTDSUTIL command in AD

A. Provides General purpose command line tool can perform variety of functions form managing Active Directory.

B. command that can stop active directory features

C. command used to link schema and OU

D. command used to link schema modify Schema

18. What are the two types of user accounts

A. Local & Domain B. Local & Server C. Administrator & Power D. Guest & Back Up

19. A user account is used to

A. Identify an individual to a computer or a network

Page 41: Dovetail Dumps Latest Phase2

B. Identify oneself to the organisation

C. human identify

20. An User account shouold have a minimum information of

A. User name & Password B. Firstname lastname password C. first name & password

21. What kind of rights you need to create a local user account

A. Admin rights for the local machine B. Backup operator C. power users D. guest

22. Steps to create user accounts

A. Rightclick the user folder -> Select new user -> Account name and password verify all the details

B. rightclick on the group and add new user account name verify details

C. Goto server and create the user D. All the 3

23. Which of the following is not a default group

A. Administrator B. BTP Admin C. Help services group D. performance log users

24. Which group users will have complete control over the computer

A. Administrator B. Backup operator C. owner group D. guest group

25. Which group users can access the server from the network log on locally and shutdown the system

A. Backup Operators B. Guest C. performance monitor users D. power users

26. Which group members can make changes to TCP/IP and can release renew ip address

A. N/w configuration operator B. Help services group C. guest D. power user

27. Steps to create local group

A. Start-> all programs->Administrator tools ->computer management -> expand the system tools node and select local users & groups -> rightclick group folder & create new group

B. Right click mycomputer -> hardware ->computer management -> expand the system tools node and select local users & groups -> rightclick group folder & create new group

C. Start-> all programs->Administrator tools ->Active directory wizard and follow the instructions

28. How do you add users accounts to the group

A. Right click on the group and select add user B. write a script in pearl C. it is done automatically

29. How do you modify membership of a group after it has been created

Page 42: Dovetail Dumps Latest Phase2

A. open group folder -> right click group -> select add to group -> click add button below the member section and select users to the group and click OK

B. membership cannot be modified C. script has to be written D. none of these

30. What option you select to force the user to change his pasword the next time they log on

A. User muct change password at next logon B. Tell the user verbally

C. send him a official mail D. Tell him in the induction

31. What option you select to not allow the users to change their password

A. User cannot change password B. Tell the user verbally C. send him a official mail

D. tell him in the induction

32. What option do you select to enable or disable users account? ANS Account is Disabled

33. When "Password never expires " is selected what is the option that is automatically enabled

A. Smartcard is required for interactive logonB. No options are enabled C. password expiry date

34. If the user access more than one computers on the network what profile should be created

A. Roaming profile B. Mandatory Profile C. Admin profile D. Nss profile

35. If the user sees their personal desktop settings any where he logs on to the network what kind of profile does he have

A. Roaming profile B. Mandatory Profile C. Admin profile D. Nss profile

36. What profile will be created when the user is not allowed to save any setting on the desktop?

A. Mandatory profile B. local user C. Admin profile D. guest user

37. Steps to create a roaming profile

A. Start -> all programs -> admin tools -> active directory users and computers -> user folder to display the user in AD -> right click user -> select properties -> open properties dialog box -> click on profile tab and enter c:\profiles %username% in the profile path-> click apply and close -> restart

B. Roaming profiles are created at the time of installation

C. Start-> all programs->Administrator tools ->computer management -> expand the system tools node and select local users & groups -> right click user and type change

D. 1 & 3

38. Steps to create a mandatory profile

A. Navigate to the user subdirectory of the documents fna settings and rightclick on the NTUSER.DAT file and rename the file to NTUSER.MAN

Page 43: Dovetail Dumps Latest Phase2

B. write a script in pearl C. MMC snapins D. cannot be created

39. Users are able to do the changes to their desktops settings and preferences but the changes are lost when the user logs off from the machine what kind of profile does the use have

A. Mandatory profile B. local user C. Admin profile D. guest user

40. How do you set mandatory profile to a group of users so that they would get the same settings

A. Apply mandatory profile to the group B. write a script in pearl C. cannot be done D. change all user profile individually

41. Steps to rename a user account

A. right click user name in AD users and Computers -> Select Rename

B. right click user name in AD users and Computers -> delete and recreate

C. right click user name in AD users and Computers and move the existing user to thrash before renaming and rename D. all the 3

42. What does "Enforce password history " mean

A. Settings for password history B. user cannot change password C. password never expires

43. What does "Maximum password Age” mean ANS : Defines how long a user can use certain password untill needs a change

44. How are computers identified in the domain controller ANS : Computer accounts

45. Select all who can create computer accounts

A. Administrator B. Domain Administrator C. Enterprise Admin D. none of these

46. Steps to create a computer account on the domain controller

A. Right click on the computer folder -> select new computer -> enter name of the computer -> finish

B. write a script in pearl C. Follow the server maintenance wizard D. should be done at the time of AD installation

47. The tool utility that is used to perform a wide range of admin tasks mostly related to managing computer accounts

A. NETDOM B. FORMAT C. NTDSUTIL D. NETUTIL

48. How to move user accounts within a single AD domain

A. launch AD users and computer -> select user u wish to move -> right click on account and choose move from the context menu -> choose folder or OU that will be the new resident and click Ok

Page 44: Dovetail Dumps Latest Phase2

B. Rightclick on the computer folder -> select new location for computer -> enter name of the computer -> finish

C. use NTDSUTIL D. none of these

49. What tool Is used to move objects between domains

A. MOVETREE B. NETDOM C. NTDSUTIL D. COPY PASTE

50. which of the following are the logical component of AD mark them all

A. Domain B. Tree C. Forest D. Organizational Unit

51. What is called the logical collection of users and computers in AD

A. Domain B. Tree C. Forest D. Organizational Unit

52. What naming conventions do domain names follow?

A. DNS Naming conventions B. AD Naming conventions C. Tree Naming Convention

D. Numerology

53. Which of the following objects are stored in a domain mark them all

A. Users account B. Computers accounts C. shared folders D. group policies

54. What is the logical component that lets you to link togeather multiple domain trees in a heirachial arrangements

A. Forest B. domain controller C. servers D. WAN links

55. What is the first domain in any enterprise and it shall be the most important domain to your forest structure

A. Forest Root B. domain controller C. servers D. WAN links

56. What hierarchy does the Active directory Forest is built

A. TOP DOWN B. Down Top C. Tree D. Forest

57. What is the first domain created in a logical hierarchy

A. The root of an AD forest B. domain controller C. servers D. WAN links

58. What option is selected to create a child domain is initially created through the wizard

A. Child domain in an existing domain tree

B. new child domain

C. child domain in forest

Page 45: Dovetail Dumps Latest Phase2

D. none of these

59. What option has to be selected to create a forest root domain

A. domain in a new forest B. new forest C. install AD on server D. none of these

60. Steps to create application Data partition

A. open command prompt -> type NTDSUTIL -> at the prompt type DOMAIN MANAGEMENT -> type CONNECTION -> type CONNECT TO SERVER < SERVER NAME > after confirmation type QUIT

B. has to be done through the application wizard

C. Create Nc application directory partition <APLICATION> domain controller

D. writes script in pearl

61. How do we delete an application directory partition

A. Delete NC application directory partition

B. right click delete

C. use Shift + Delete

D. writes script in pearl

62. What are the relevant levels of domain functionalities mark them all

A. Win server 2000 Native

B. Win server 2003

C. Win server 2003 Interminal

D. Win server 2003

63. Which is the default domain functional level and most flexible in terms of adding domain controllers.

A. Windows 2000 mixed mode

B. Win server 2000 Native

C. Win server 2003

D. Win server 2003 Interim

Page 46: Dovetail Dumps Latest Phase2

64. Which domain function level allows the addition of Win2000 and win 2003 domain controllers

A. Win server 2000 Native

B. Windows 2000 mixed mode

C. Win server 2003

D. Win server 2003 Interim

65. Which domain function level supports only win NT 4.0 and win 2003 server domain controllers

A. Win server 2003 Interim

B. Windows 2000 mixed mode

C. Win server 2003

D. Win server 2000 Native

66. The domain functional level supports only windows 2003 domain controllers

A. Win server 2003

B. Windows 2000 mixed mode

C. Win server 2003 Interim

D. Win server 2000 Native

67. How do we change the domain functional level?

A. Admin tools-> open AD domain trust MMC-> select the domain in your forest for which you have to raise functionality -> right click select raise domain functionality -> and click Raise

B. cannot be done

C. has to be done at the time of installation

D. copy and paste to the desired level

68. How do we change the forest functional level?

A. admin tools -> open active directory domain and trust -> right click the root level active directory domain and trust node and chose raise forest functional level from the context menu.

B. cannot be done

Page 47: Dovetail Dumps Latest Phase2

C. has to be done at the time of installation

D. copy and paste to the desired level

69. What is used to establish a trust relationship between two domains in different forest od between 2 win2k domains and an external windows 2000 or NT4 domain

A. External trust

B. Simple Trust

C. Internal Trust

D. Do not Trust