Certbus > Juniper > Juniper Certifications > JPR-961 > JPR-961 Online Practice Questions and Answers

JPR-961 Online Practice Questions and Answers

Questions 4

Mark works as a Network Administrator for ABC.com. The company has a Windows domainbased network. The domain contains four Windows servers and 500 Windows Professional client computers.

The company's Marketing department uses a member server named Fserv that stores confidential files. The files are stored in a folder named DATA. The Marketing department users are members of a group named Market. The NTFS

permissions on the DATA folder and files in that folder allow access only to the Administrators group and the Market group.

The NTFS permissions are configured to allow full control on the DATA folder. The share permissions are the default permissions. Mark wants to track users who attempt to gain access to files in the DATA folder on Fserv. For this purpose,

he configures auditing on the DATA folder and files in that folder. He configures auditing on the Failed attempts for each access type on the Everyone group. When he checks the auditing configuration by attempting to access the files with a

domain user account that does not have access permissions to the files, he receives an "Access Denied" message. However, this Failed attempt does not appear in the security log on Fserv. What will Mark do to resolve the issue?

A. Grant the Generate security audits privilege to the Fserv computer account.

B. Enable the Audit object access policy for Failed and Successful attempts in a new Group Policy object (GPO) that applies only to Fserv.

C. Configure the auditing entries to apply to the Administrators group and the Market group, instead of the Everyone group.

D. Enable the Audit object access policy for Failed attempts in a new Group Policy object (GPO) that applies only to Fserv.

Browse 65 Q&As
Questions 5

Your firm is designing a new software driver that will employ a proprietary method of flow control for data being sent across a network medium. On which layer of the OSI model would be this flow control likely be implemented?

A. Application

B. Data Link

C. Transport

D. Media Access Control

Browse 65 Q&As
Questions 6

As the network administrator, Kristy decides to implement the ability for clients to dial-in to the network to allow them the option to work from home if they want to, by installing and configuring an RRAS server. Kristy's internal network consists

of a Windows 2000 domain, a single DNS and WINS server, multiple segmented broadcast domains, and a single DHCP server, configured to distribute the following information via four different IP address scopes:

DNS Server (local option)

Router (local option)

WINS Server (local option)

Node Type (global option)

Domain Name (global option)

ARP Timeout (local)

Kristy installs her RRAS server and configures the DHCP Relay Agent to point to the only internal DHCP server. She then configures a fifth DHCP scope to accommodate the DMZ network into which she has installed her RRAS server. Kristy

hopes to be able to offer both internal Web mail and resource access to her NT 4.0 file server in the same way she is able to successfully offer it now to only internal users. Kristy composes an e-mail with detailed instructions on how to set up

her Windows ME laptop users with the correct VPN settings to dial-in the company RRAS server. With the e-mail, Kristy asks for feedback as to ease of installation, setup, connectivity, speed, resource access, and so on. A few days later,

Kristy receives e-mails from most of the users she sent the e-mail to. All of them said that they were able to access e-mail just fine and that the speeds were great. They also said they were able to browse the Internet without a problem, but

none of them could access any of the file server resources that they needed to do their work. What is the easiest thing Kristy can do to facilitate this need?

A. Change the DNS server to a global option in DHCP

B. Change the WINS server to a global option in DHCP

C. Change the node type to a local option for each scope in DHCP

D. Add another WINS server to facilitate the dial-in users

Browse 65 Q&As
Questions 7

Your company's corporate security policy is very strict. No username or password information may be passed over the Internet without using the strongest encryption available. Your company does not yet have a certificate infrastructure in place. Which of these methods would be the best choice for VPN authentication to ensure that you are within your company's corporate security policy requirements?

A. MS-CHAP v2

B. PAP

C. CHAP

D. SPAP

Browse 65 Q&As
Questions 8

The ABC.com network consists of a single Active Directory domain named ABC.com. All servers are configured with Windows Server and all client computers with Windows XP Professional.

At present there are 100 servers in an organizational unit named Terminal Servers, configured to run Terminal Services.

The Terminal Servers host in-house applications. Only ABC.com users with Power Users group membership can run these in-house applications.

A new ABC.com security policy states that the Power Users Group must be empty on all servers.

How would you ensure that the in-house applications will be available to users on the servers when the new security requirement is enabled? (Choose two.)

A. Set up a GPO in link it to the Terminal Servers OU.

B. Set up the Compatws.inf security template to allow the Local Users group to run the legacy applications. C. Import the Compatws.inf template into the GPO.

C. Change the legacy application executable file permissions to allow the Local Users group Full Control permission.

D. Place the Domain Users group on the Local Administrators group on the Terminal Servers.

E. Set up the Terminal Servers to run in Application Mode.

F. Set up the Terminal Servers to run in Remote Administration Mode.

Browse 65 Q&As
Questions 9

You are working as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com which contains Windows Server servers Windows XP Professional client computers.

You want to improve network security and need to pinpoint all computers that have the known vulnerabilities.

What should you do to automate the process of collecting information on existing vulnerabilities for each computer, on a nightly basis?

A. By scheduling secedit to compare the security settings with a baseline and run on a nightly basis.

B. By installing Anti-Virus software on the computers and configuring the software to update on a nightly basis.

C. By configuring a scheduled task to run the mbsacli utility on a nightly basis.

D. By having Microsoft Baseline Security Analyzer (MBSA) installed on a server on the network.

E. By configuring Automatic Updates to use a local SUS server and run on a nightly basis.

F. You configuring Automatic Updates to run on a nightly basis and use the Microsoft Updates servers.

Browse 65 Q&As
Questions 10

The ABC.com network consists of a single Active Directory domain named ABC.com. All the servers on the network run Windows Server servers and all the client computers run Windows XP.

The network contains a two node server cluster for file sharing that has been created using two Windows Server Enterprise Edition servers named ABC-SR01 and ABC-SR02. Both servers contain a single hard disk containing the system

volume. Both servers connect to a shared storage array which hosts the shared folders.

ABC-SR01 is configured as the preferred owner of the file sharing resources. To prepare your network for any disaster recovery, you decide to take regular backups using the Backup or Restore Wizard.

A Full backup of the shared folders is taken every night.

A Full backup of ABC-SR01 and ABC-SR02 is taken every Saturday night.

Incremental backups of ABC-SR01 and ABC-SR02 are taken every night. System State Data backups and Automated System Recovery (ASR) of both servers are taken every night.

During a routine monitoring check on Friday you discover that ABC-SR02 has gone offline.

How can you recover the cluster as soon as possible? (Choose all that apply.)

A. Evict ABC-SR02 from the cluster.

B. Restore the last full backup then restore the last incremental backup.

C. Restore the last full backup then restore the last incremental backup and the last System State backup.

D. Perform an ASR restore on ABC-SR02.

E. Add ABC-SR02 back into the cluster.

Browse 65 Q&As
Questions 11

The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server and all client computers run Windows XP Professional.

A server named ABC-SR12 contains two volumes named Drive D and Drive E and has been designated to function as an application server.

The application on ABC-SR12 is a custom application that is currently used by the ABC.com Sales Department. The application has been installed on the ABC-SR12 Drive D. You configure the application database on Drive D, and you

configure the application to store its database transaction log files on the ABC-SR12 Drive E.

After a few days, Sales users report that the application has failed. You investigate the cause of the failure and discover that the ABC-SR12 Drive E is almost completely filled with the application's transaction log files.

You back up the database and delete the log files and the application runs successfully.

You want to design a solution that keeps the application running. The log files should not be deleted unless the database has been backed up.

What should you do to keep the application running? (Choose two.)

A. Enable file compression on the E: drive.

B. Have a script created that will back up the database then delete the log files.

C. Configure an alert on ABC-SR12 to run the script when there is less then 25 percent of free space on the E-drive.

D. Configure a script to delete the log files.

E. Create a scheduled task to run the script every week.

Browse 65 Q&As
Exam Code: JPR-961
Exam Name: Service Provider Routing and Switching, Expert (JNCIE-SP)
Last Update: Mar 16, 2025
Questions: 65 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99