Free JPR-934 Exam Braindumps (page: 2)

Page 1 of 16

You work as a network administrator for ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. There are currently 120 Web servers running Windows Server and are contained in an Organizational Unit (OU) named ABC_WebServers
ABC.com management took a decision to uABCrade all Web servers to Windows Server. You disable all services on the Web servers that are not required. After running the IIS Lockdown Wizard on a recently deployed web server, you discover that services such as NNTP that are not required are still enabled on the Web server.

How can you ensure that the services that are not required are forever disabled on the Web servers without affecting the other servers on the network? (Choose two.)

  1. Set up a GPO that will change the startup type for the services to Automatic.
  2. By linking the GPO to the ABC_WebServers OU.
  3. Set up a GPO with the Hisecws.inf security template imported into the GPO.
  4. By linking the GPO to the domain.
  5. Set up a GPO in order to set the startup type of the redundant services to Disabled.
  6. By linking the GPO to the Domain Controllers OU.
  7. Set up a GPO in order to apply a startup script to stop the redundant services.

Answer(s): B,E



You are working as the administrator at ABC.com. Part of you job description includes the deployment of applications on the ABC.com network. To this end you operate by testing new application deployment in a test environment prior to deployment on the production network.

The new application that should be tested requires 2 processors and 3 GB of RAM to run successfully. Further requirements of this application also include shared folders and installation of software on client computers. You install the application on a Windows Server Web Edition computer and install the application on 30 test client computers.

During routine monitoring you discover that only a small amount of client computers are able to connect and run the application. You decide to turn off the computers that are able to make a connection and discover that the computers that failed to open the application can now run the application.

How would you ensure that all client computers can connect to the server and run the application?

  1. By running a second instance of the application on the server.
  2. By increasing the Request Queue Limit on the Default Application Pool.
  3. By modifying the test server operating system to Window Server Standard Edition.
  4. By increasing the amount of RAM in the server to 4GB.

Answer(s): C



The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server.

ABC.com contains a Development department. ABC.com contains a domain controller named ABC-SR24 which is also configured as a DNS Server. A ABC.com employee named Clive Wilson works in the Development department. One morning Clive Wilson complains that he cannot connect to another network server.

During investigation, you notice that nslookup queries sometimes take a long time and sometimes fail altogether. You suspect that there is a problem with ABC-SR24.

How would you configure monitoring on ABC-SR24 so that you can review individual name resolution queries?

  1. Use System Monitor to monitor host resolution queries on ABC-SR24.
  2. Use Event Viewer to view the DNS event log on ABC-SR24.
  3. Select the Log packets for debugging option on the Debug Logging tab in the DNS server properties on ABC-SR24.
  4. Use Network Monitor to capture DNS query packets on ABC-SR24.

Answer(s): C



You are working as the administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a DMZ that contains a two-node Network Load Balancing cluster, which is located in a data centre that is physically impenetrable to unauthorized persons.

The cluster servers run Windows Server Web Edition and host an e-commerce website. The NLB cluster uses a virtual IP address that can be accessed from the Internet. What can you do to mitigate the cluster’s most obvious security vulnerability?

  1. Configure the cluster to require IPSec.
  2. Configure the network cards to use packet filtering on all inbound traffic to the cluster.
  3. Use EFS on the server hard disks.
  4. Configure intrusion detection the servers on the DMZ.
  5. Configure Mac addressing on the servers in the DMZ.

Answer(s): B






Post your Comments and Discuss Juniper JPR-934 exam with other Community members:

JPR-934 Discussions & Posts