| Medium Active Directory Replication Issues | 2 mins Windows Administration | Solve |
You are an experienced Windows Server administrator tasked with resolving a complex Active Directory replication issue across multiple sites. Users have reported authentication problems and inconsistent Group Policy applications. Upon examining the Event Logs from various Domain Controllers (DCs), you gather the following key log entries:
Considering this information, what is the most appropriate first step in diagnosing and resolving this Active Directory replication issue?
A: Reinitialize the replication on DC01 to ensure it has the most current data.
B: Review and configure site link costs and schedules in Active Directory Sites and Services.
C: Perform a comprehensive network connectivity test between all sites.
D: Examine the DNS settings and records on each Domain Controller for inconsistencies.
E: Force a manual replication between DC01, DC02, and DC03 using repadmin.
F: Check firewall settings across sites for any rules that may block AD replication traffic.
|
| Medium Configuring Network Services | 2 mins Windows Administration | Solve |
You are administering a Windows Server that hosts a critical application accessible within the internal network. The server is configured to use a static IP address. Your task is to ensure the server can communicate with a specific range of IP addresses on the internal network (192.168.10.0/24) while blocking all other inbound and outbound network traffic. The server also needs to be accessible via Remote Desktop for maintenance purposes. Given these requirements, which of the following configurations would best achieve this goal?
A: Configure Windows Firewall to allow inbound RDP traffic and outbound traffic to 192.168.10.0/24; block all other traffic.
B: Set up a Network Security Group (NSG) to allow traffic from 192.168.10.0/24 and enable RDP access.
C: Implement an inbound firewall rule to allow RDP and an outbound rule to allow traffic to 192.168.10.0/24.
D: Create a VPN tunnel for the 192.168.10.0/24 subnet and configure RDP access through the VPN.
E: Enable RDP in the firewall settings and use a third-party firewall to restrict network traffic.
F: Disable the Windows Firewall and rely solely on router-based network security to manage traffic.
|
| Medium Remote access policy | 2 mins Windows Administration | Solve |
Michael Willis created a user in Active Directory Users And Computers, and added the user to the VPN Users security group, which has a Remote Access Policy. The network admin has set the Remote Access Policy for VPN Users for Monday to Friday from 7 AM to 6 PM. Now, Michael is showing the user how to set up the VPN client for PPTP tunneling over a video conference call, but the user is not able to connect. What could be the issue?
A. The user needs a certificate for his computer.
B. The user is in a different time zone.
C. Michael forgot to select the Allow Access radio button on the Dial-In tab for the user account
D. Michael needs to configure DNS on the client computer.
|
| Medium Security log file | 2 mins Windows Administration | Solve |
Harper is hired as the system admin for an e-commerce company, Dove. There is a Windows Server 2003 system which was installed by another administrator, just before they left. The admin seems to have finished the installation, but they did not set up any configuration after the installation. Harper checks the maximum log sizes in Event Viewer, and realizes that the maximum size of the Security log is 16 MB. What can we tell on the basis of this information?
|
| Medium Dynamic Function Invocation | 2 mins PowerShell | Solve |
You're tasked with dynamically invoking functions based on their names stored in an array. Additionally, you're required to filter out functions that have the term "Admin" in their name. Your colleague suggests the following approach:
Assuming no other functions are defined in the session, which of the following will $results contain after executing the script?
|
| Medium Error Handling with Try-Catch-Finally | 2 mins PowerShell | Solve |
You're analyzing a script designed to interact with a remote API. The script fetches data, processes it, and then ensures that all temporary files are deleted. You come across the following code block:
After a successful data fetch, the script occasionally throws the custom error. When this happens, what will be the output and state of the system?
A: The output will display "Network error
B: The output will display "General error
C: The script will exit without any output due to the custom error, but the temporary file will be deleted.
D: The output will display "General error
E: The script will terminate prematurely, not executing the finally block.
|
| Hard Execution Policy Bypass | 3 mins PowerShell | Solve |
A server you are working on has the PowerShell execution policy set to "Restricted", preventing scripts from running. You need to execute a script named "Deploy.ps1". You recall a technique to bypass the execution policy without changing it permanently. Which of the following methods would allow you to run "Deploy.ps1" without permanently altering the execution policy?
A: Set-ExecutionPolicy Unrestricted -Scope Process; .\Deploy.ps1
B: PowerShell -ExecutionPolicy Bypass -File .\Deploy.ps1
C: Invoke-Command -ScriptBlock { .\Deploy.ps1 }
D: Start-Process PowerShell -ArgumentList "-ExecutionPolicy Unrestricted", "-File .\Deploy.ps1"
E: Import-Module .\Deploy.ps1
|
| Medium Logging with Transcript | 2 mins PowerShell | Solve |
You're reviewing a script designed to automate server maintenance tasks. One requirement is to log every action and potential error for auditing purposes. The script utilizes Start-Transcript and Stop-Transcript cmdlets to capture the session. Here's a snippet:
After several successful runs, you notice that some logs are missing crucial information regarding errors. Which of the following could be a reason for the missing error details?
A: The -Append parameter is causing overwritten logs.
B: Not all errors are displayed in the console, hence not captured by the transcript.
C: The Stop-Transcript cmdlet needs to be invoked with an -ErrorAction Continue parameter.
D: Transcription only captures standard output, not error streams.
E: The log file path should be specified again in Stop-Transcript.
|
| Medium Nested Runspaces | 3 mins PowerShell | Solve |
You're optimizing a script for performance by leveraging runspaces to execute tasks concurrently. Each runspace is supposed to increment a shared counter object. Here's your setup:
You expect the $global:counter to be 5 after all runspaces complete. However, it's not consistently reaching that value. What's the most probable reason for this behavior?
A: Runspaces can't access global variables.
B: The counter increment operation is not thread-safe, leading to race conditions.
C: The runspace pool size is limiting the number of concurrent operations.
D: The $global:counter initialization should be inside the script block.
E: The runspace pool's Close and Dispose methods are prematurely terminating the runspaces.
|
| Medium Mac address and IP on router hop | 2 mins Computer Networks | Solve |
Refer to the following exhibit:
Host A is sending a packet to Host B.
1. What is the source and destination MAC address at point PA?
2. What is the source and destination IP address at point PB?
// Option A
PA: source MAC - Mac-A
PA: destination MAC - Mac-B
PB: source IP - 192.168.1.1
PB: destination IP - 192.168.3.1
// Option B
PA: source MAC - Mac-A
PA: destination MAC - Mac-RA
PB: source IP - 192.168.3.3
PB: destination IP - 192.168.3.1
// Option C
PA: source MAC - Mac-A
PA: destination MAC - Mac-B
PB: source IP - 192.168.3.3
PB: destination IP - 192.168.3.1
// Option D
PA: source MAC - Mac-A
PA: destination MAC - Mac-RA
PB: source IP - 192.168.1.1
PB: destination IP - 192.168.3.1
|
| Easy MX Record, DMARC and Email Authentication | 2 mins Computer Networks | Solve |
You work as a network administrator for a company, "example.com", that recently started experiencing issues with email spoofing. To mitigate the problem, you decide to implement DMARC (Domain-based Message Authentication, Reporting & Conformance) in addition to existing SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) records.
Your current DNS records for example.com include the following:
- MX 10 mail.example.com (IP address 203.0.113.10)
- TXT "v=spf1 ip4:203.0.113.10 -all"
- TXT "v=DKIM1; k=rsa; p=public-key-here"
You add the following DMARC record:
- TXT "_dmarc.example.com" "v=DMARC1; p=quarantine; pct=100; rua=mailto:report@example.com"
After implementing the DMARC record, an external mail server sends an email to your domain. The email passes the SPF and DKIM checks but fails the DMARC check.
What will likely happen to the email?
A: The email will be accepted and delivered to the recipient's inbox.
B: The email will be rejected and returned to the sender as undeliverable.
C: The email might be delivered to the recipient's spam or junk folder.
D: The email will be accepted, but a report will be sent to the sender.
E: The email will be silently discarded, and the sender will not be notified.
|
| Medium Remote network resources | 3 mins Computer Networks | Solve |
Review the following exhibit:
Angelina noticed that the computers on 192.168.10.0/24 network can ping their default gateway. But they found that these computers cannot connect to any remote network resources. Which of the following is the most likely reason for this?
|
| Medium SSL Certificate Expiry | 2 mins Computer Networks | Solve |
You are a network administrator for an e-commerce company. The company's online store allows customers to browse products and make purchases securely over the internet. The online store uses SSL/TLS for secure communication. You receive reports that some customers are seeing a security warning in their web browsers when trying to access the online store. Upon investigation, you discover the following information:
- The SSL certificate used by the online store's web server is valid for one year and is due to expire in two days.
- The web server is configured to automatically redirect HTTP traffic to HTTPS.
- The SSL certificate was issued by a trusted certificate authority (CA), and all major web browsers have the CA's root certificate in their trusted certificate stores.
- The SSL certificate includes the correct domain name for the online store.
Given the above information, which of the following steps should be taken to resolve the issue and prevent customers from seeing the security warning?
A: Extend the validity of the current SSL certificate by one year.
B: Obtain a new SSL certificate from the same CA and install it on the web server before the current certificate expires.
C: Remove the automatic redirect from HTTP to HTTPS on the web server.
D: Ask customers to ignore the security warning and proceed to the online store.
E: Replace the SSL certificate with a self-signed certificate.
|