Microsoft 70-215: 1000 out of 1000 from this
Microsoft
70-215 MASTER DUMP! - The only dump you will ever need!
What is a Master Dump? A comprehensive dump of questions
with answers you VOTE on and explanations YOU submit! We just edit.
It's all here. Check
it out!
TestKing
- We have the Questions you will see in your Exams Real-exams.com
- Real-Questions , Real Answers
actual-exams.com
- Pass Certification Exams - First Try Guaranteed Exactquestions.com
- Get the Exact Questions and Answers
Paas with 1000 marks and all questions are included in this pool.
Passed with full marks.Thanks to smartcert .net for guiding me.
This is the best ever and u can get 1000 out of 1000 from it.
1. You are the administrator of home.office.local.com domain. You
want to create a shared printer for the company's executives so that
they do not have to wait for their documents to print when default
printer's queue contains a large number of documents. You configure
a new high priority printer and want to set permissions on groups
shown in the exhibit. The groups were:
Administrator Creator Owner Everyone Executives Print Operators
Server Operators
You select the checkbox to allow Print permissions for Executives
group. You want only Administrators, Print Operators, and Server
Operators & Executives to be able to print. What should you do?
(Select all that apply)
A. Remove the Everyone group. B. Select checkbox to Deny Print
permission to Everyone C. Select checkbox to Deny Manage Documents.
D. Select all Deny for the Everyone group E. Clear all allow
checkboxes for the Everyone group
Answer: A, E
2. You are administrator of a Windows 2000 network. The network
includes a Windows 2000 Server computer that is used as a file
server. More than 800 of your company client computer are connected
to this server. A shared folder named DATA on server is on an NTFS
partition. The data folder contains more than 200 files. The
permissions for the data folder are shown in the following table.
TYPE OF PERMISSION ACCOUNT PERMISSION
DATA Share Permissions Users: Change DATA NTFS Permissions Users:
Full Control
You discover that users are connected to the DATA folder. You
have an immediate need to prevent 10 of the files in the DATA folder
from being modified. You want your actions to have the smallest
possible effects on the users who are using other files on the
server. What TWO actions should you take?
A. Modify the NTFS permissions for the ten files. B. Modify the
NTFS permissions for the DATA folder. C. Modify the shared
permissions for the DATA folder. D. Log off the users from the
network. E. Disconnect all Users from the DATA folder.
Answer: A, E
3. You are the administrator of the blue lines skys airlines. You
install intranet and configure new windows 2000 computer named
server1.department.blueline.com as an intranet server. The server
hosts multiple departmental and???? Web to the n/w and data site.
You also configure the finance virtual??? In the department web site
as shown in the exhibit. During first morning that the new server is
available. Users report that they can only see the information that
they see in the browser is the list of HTM and ASP files. For
security reasons the first action to take is to disable the users
ability to view the files of all web sites in the form of list. What
should u do?
A. Clear the directory-browsing check box for the server
properties and then apply setting to the child web sites. B. Clear
the directory-browsing check box for the ticketing web site and then
apply setting to the child virtual directory. C. Clear the directory
browsing check box for the departments web sites and then applies
the setting for the child virtual directory. D. Clear the directory
browsing check box for the financing web site.
Answer: A
4. Your company's network includes Windows 3.1 client computers,
Windows 95 client computers and Windows 2000 Professional client
computers. The company's manufacturing facilities run 24 hours per
day. The company has developed its own 32 bit application that
collects information from the manufacturing processes so that
workers on one shift can find out what was manufactured during the
previous shift. The company wants to make the application available
to all the client computers using terminal services on a Windows
2000 Server computer. The server will not run as a domain
controller. You install terminal services. Users want to collect
information on manufacturing processes from other shifts. The
company wants users to shut down their computers at the end of their
shifts and leave the applications running on the terminal server.
What should you do?
A. Set the delete temporary folders on exit setting for the
terminal server to NO. B. Set the remote desktop protocol on the
server to overwrite user settings and set end disconnected setting
to NEVER. C. At the terminal server grant the users the right to log
on as a batch job. D. Do NOTHING, user programs are always
terminated on disconnection.
Answer: B
5 Your Windows 2000 Server computer uses a SCSI adapter that is
not included on the current Hardware Compatibility List (HCL). You
install an updated driver for the SCSI adapter. When you start the
computer, you receive the following STOP error:
"INACCESSIBLE_BOOT_DEVICE." Which two procedures can you use to
resolve the problem? (Choose two.)
A. Start the computer in safe mode. Reinstall the old driver for
the SCSI adapter. B. Start the computer by using a Windows 2000
bootable floppy disk. Reinstall the old driver for the SCSI adapter.
C. Start the computer by using the Windows 2000 Server CD-ROM.
Perform an emergency repair. Reinstall the old driver for the SCSI
adapter. D. Start the computer by using the Recovery Console. Run
System File Checker. Restart the computer. Reinstall the old driver
for the SCSI adapter. E. Start the computer by using the Recovery
Console. Copy the old driver for the SCSI adapter to the system
volume as C:\NTbootdd.sys. Restart the computer.
Answer: C,E
6. Your Windows 2000 server computer contains data files that
users of client computers access throughout the day. You install a
driver for the new tape drive on the computer. After restarting the
computer you log on as an administrator, shortly after you log on
you receive the following stop error "irql_not_less_or_equal". You
need to bring the server back on line as quickly and reliably as
possible.
What should you do?
A. Restart the computer by using the last known good menu option.
B. Perform an emergency repair and select fast repair, restart the
computer. C. Restart the computer in the safe mode, remove the
driver and restart the computer. D. Restart the computer by using
the recovery console, disable the driver. Restart the computer,
remove the driver.
Ans:D
7. A Windows 2000 Server computer named server2 runs numerous
32bit applications and two 16bit applications. Users start the 16bit
applications by running APP1.EXE for one application and APP2.EXE
for another application. The 16bit applications are configured to
run in the separate memory space. You want to create a performance
base like chart in the system monitor for all the applications on
server2. You add all of 32bit applications and now you want to add
two 16bit applications. What should you do?
A. Add the APP1 and APP2 instances to the processor time counter
for the process object. B. Add the NTVDM, APP1 and APP2 instances
for the processor time counter for the process object. C. Add only
the NTVDM instance for the percent processor time counter for the
process object. D. Add the NTVDM1 and NTVDM #2 instances for
processor time counter for the process object.
Answer: D
8. Every afternoon you run MS-EXCEL locally on Windows 2000
Server computer to update the performance spread sheet. Users report
that during this time the server response to the file request
appears to be slowed down. What should you do to resolve the
problem?
A. Run the start/normal CSRSS command, before you start the
EXCEL. B. Run the start/normal EXCEL.EXE command to start excel. C.
Use task manager to set the priority for CSRSS.EXE process to above
normal. D. Use task manager to set the priority for EXCEL.EXE
process to low.
Answer: D
9. You are installing Windows 2000 Server on a new computer. The
manufacturer has provided a customized hardware abstraction layer
(HAL) to use with the computer. The HAL is on the floppy disk. You
want to install the customized HAL design for the computer. What
should you do?
A. During the text mode portion of the Windows 2000 setup install
the customized HAL. B. After installing Windows 2000 server,use the
recovery console to copy the customized HAL to the system32 folder
on the boot partition. C. After the installing windows 2000 setup,
use the emergency repair process to install the customized HAL. D.
After installing Windows 2000 server, use the device manager to scan
for Hardware changes. When prompted, install the customized HAL.
Ans: A
10. You are the administrator of Windows 2000 Server network . On
each server you format a separate system partition and a separate
boot partition as NTFS. Several months later you shut down one of
the computers for maintenance. When you try to restart the computer
you receive the following error message "NTLDR is missing, press any
key to restart". You want to install a new NTLDR file on the
computer but you do not want to loose any settings you made since
the installation. What should you do?
A. Start the computer by using Windows 2000 Server computer
CD-ROM and choose tools to repair the installation. Select recovery
console and copy the NTLDR file on the CD-ROM to the root of the
system volume. B. Start the computer by using the Windows 2000
server CD- ROM, choose to reinstall. When the installation is
complete copy the NTLDR to the root of the boot volume. C. Start the
computer by using the Windows 2000 bootable floppy disk. From a
command prompt run the sfc/scanboot command. D. Start the computer
by using Windows 2000 bootable floppy disk. Run the file signature
verification utility.
Answer: A
11. You are the administrator of a Windows 2000 domain that has
three domain controllers. Each day, you use Windows Backup to
perform full backups of each domain controller. You run a script to
make changes to account information in Active Directory. As a result
of errors in the script, the incorrect user accounts are modified.
Active Directory replication then replicates the changes to the
other two domain controllers. You want to revert Active Directory to
the version that was backed up the previous day. What should you do?
A. On a single domain controller, use Windows Backup to restore
the System State data. Shut down and restart the computer. B. Shut
down and restart a single domain controller in directory services
restore mode. Use Windows Backup to restore the System State data.
Run the Ntdsutil utility. Restart the computer. C. Shut down and
restart a single domain controller by using the Recovery Console.
Use Windows Backup to restore the System State data. Exit the
Recovery Console. Restart the computer. D. Shut down and restart
each domain controller by using the Recovery Console. Use Windows
Backup to restore the Sysvol folder. Exit the Recovery Console.
Restart the computer.
Answer: B
12. You back up all of the system state date for each domain
controller and place the date on a single tape.That tape is
currently attached to the srv1.west.litware.com computer.To which
server or servers can you restore the system state from
srv1.west.litware.com(choose all apply)
A.srv1.west.litware.com B.srv2.west.litware.com
C.srv3.west.litware.com D.srv4.west.litware.com
E.srv5.west.litware.com F.srv6.west.litware.com
Answer: A
13. Your Windows 2000 Server computer contains a stripe set with
parity on a four-disk array. You convert the stripe set with parity
to a dynamic RAID-5 volume. Six months later, users report that disk
access on the server is slower than it had been on the previous day.
You use Disk Management and discover that the status of the third
disk in the array is missing. You want to recover the failed RAID-5
volume. What should you do first?
A. Replace the third disk and restart the server. Use Disk
Management to repair the volume. B. Ensure that the third disk is
attached to the server and has power. Use Disk Management to
reactivate the disk. C. Ensure that the third disk is attached to
the server and has power. Use Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the
new disk. Restart the computer and allow Windows 2000 to
automatically repair the volume on the extended partition.
Answer: B
14. You install your boot volume on volume C on your Windows 2000
Server computer. You mirror volume C on dynamic Disk 1. Two years
later, during routine server maintenance, you open Disk Management
and find that the status of volume C is Failed Redundancy. The
status of Disk 1 is Missing. You attempt to reactivate Disk 1, but
the status of volume C does not return to Healthy. What should you
do next?
A. Replace Disk 1 and restart the computer. The mirror will
automatically regenerate. B. Remove the mirror on Disk 1, replace
the disk, and then add back the mirror to the new Disk 1. C. Replace
Disk 1 and copy all data from volume C to a new NTFS primary
partition on the new Disk 1. Restart the computer. D. Rescan the
disks, remove the mirror, and delete the data on Disk 1. Then
re-create the mirror.
Answer: B
15. You configure a HP jet direct network printer device on your
window 2000 domain srv2 on sales.juttogs.com. This is connected to
the TCP/IP port to the print device. However, when you enter IP
address of the device, you receive the dialog box in the printer
port wizard. See diagram show:
srv2 ip: 10.1.10.35. gateway 10.1.10.100/16 HP printer jet direct
Ip: 10.4.20.200/16 Router Ip: 10.5.20.100/16
Another diagram :
A. Select HP Jet Direct from standard drop-down list. B. Select
the custom option button, click setting command button and than LPR
printer. C. Change IP of the printer device to 10.5.20.200. D.
Change subnet mask of the print device to 255.0.0.0 E. Change
default gateway on Srv2.sales.jottom.com to 10.5.20.100.
Answer: C
16.
Server1(IP1)<------------------------>(IP2)Router(IP3)<----------------------->(IP4)
Server3 (IP5) | | | (IP6) Server2
Server1 wants to talk to Server2, Which IP address is default
gateway for Server1, Click on the graphic to answer.
A. IP1 B. IP2 C. IP3 D. IP4 E. IP5 F. IP6
Answer: B
17. You install the boot volume D on your Windows 2000 Server
computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1.
One year later, during routine server maintenance, you open Disk
Management and find that the status of volume D is Failed
Redundancy. The status of Disk 1 is Online (Errors). A symbol with
an exclamation point appears in the graphical view of the disk. You
want to return the status of the boot volume to Healthy. What can
you do? (Choose two.)
A. Break the mirror, delete the volume on Disk 1, and re-create
the mirror. B. Replace Disk 1, copy the data from the boot volume to
the new disk, and then use Disk Management to rescan the disks. C.
Replace Disk 1, Ensure that the new disk is a basic disk, and repair
the volume. D. Reactivate the mirror on Disk 1. E. Convert Disk 1 to
a basic disk, and reconvert it to a dynamic disk.
Answer: A,D
18. Trey Research has a Windows 2000 Server computer named
User_srv. This computer has a RAID-5 controller. The RAID array is
configured as two partitions. Drive C is a 2-GB partition that holds
the operating system and paging file. Drive D is a 30-GB partition
that will hold the home folders for 200 users. Trey Research employs
10 scientists. The user accounts for scientists are members of a
group named Scientists. The scientists use a data capture
application that generates files that can be lager than 100 MB. Trey
Research wants to use disk quotas. Ordinary users should be allowed
to store a maximum of 75 MB of data is their home folder. The
storage for users in the Scientists group should not be limited by
quotas. What should you do to configure this disk quota scheme?
(Choose two.)
A. Enable quota management on drive D. Select the Deny disk space
to users exceeding quota limit Check box. Set the default quota
limit to 75 MB. B. Create a Scientist template account. Create a new
quota entry for this account. Select the Do not limit disk usage for
this entry option button. C. Create new quota entries for the 10
scientists' user accounts. Select the Do not limit disk usage for
this entry option button. D. Enable quota management on drive D.
Select the Deny disk space to users exceeding quota limit check box.
Select the Do not limit disk usage option button for the default
quota limit. E. Create a Scientist template account. Create a quota
entry for this account. Set the quota limit to 30 GB.
Answer: A, C
19. Your network contains 10 domain controllers, 10 member
servers, and approximately 1,000 client computers. All the servers
run Windows 2000 Server, and all the client computers run Windows
2000 Professional. Two of the domain controllers act as DNS servers.
Users of client computers use file sharing to grant access to files
stored locally. The network has 10 subnets and uses TCP/IP as the
only network protocol. You want to configure the network so that all
computers can resolve the addresses of all other computers by using
DNS. Client computers must be able to register and resolve addresses
if a server fails. How should you configure the DNS servers?
A. Configure one server with a standard primary zone for the
domain, and configure at least one server with standard secondary
zone. B. Configure one server with a standard primary zone for the
domain, and configure at least one server with an Active Directory
integrated primary zone. C. Configure one server with an Active
directory integrated primary zone for the domain, and configure at
least one server with a standard secondary zone. D. Configure at
least two servers with Active Directory integrated primary zones for
the domain. E. Configure at least two servers with standard primary
zones for the domain.
Answer: D
20. Your network is configured as shown in the exhibit.
"Engineering1 and Sales1 have DHCP installed up them." All the
servers are Windows 2000 Server computers that use TCP/IP as the
only network protocol. The sales department uses one subnet and has
servers named Sales1 and Sales2. The engineering department uses
another subnet and has servers named Engineering1 and Engineering2.
Sales1 and Engineering1 are configured to act as DHCP servers. The
router that joins the two subnets is not RFC 1542 compliant and does
not support DHCP/BOOTP relay. You want to allow Sales1 and
Engineering1 to support client computers on each other's subnets.
What should you do?
A. Set the router option in the DHCP Scopes to 192.168.2.1 for
Engineering1 and 192.168.1.1 for Sales1. B. On Engineering2 and
Sales2, install Routing and Remote Access, and configure RIP as a
routing protocol. C. On Engineering2 and Sales2, install and
configure the DHCP Relay Agent service. D. Configure Engineering2
and Sales2 as DHCP servers without any scopes.
Ans:C
21. You are the administrator of your company's network. You are
configuring the security policy for a group of users in the finance
organizational unit (OU). You need to configure a group policy so
that future changes to group policy will be applied within 15
minutes to any computers that are log on to the network. What should
you do?
A. Enable the background refresh settings to use the default
group policy refresh date. B. Enable the asynchronous group policy
application settings. C. Enable and configure the group policy
refresh interval for domain controller. D. Enable and configure the
group policy refresh interval for computers.
Answer: D
22. Your network includes windows 98 computers and Windows 2000
Professional computers. You are adding a new computer to the
network. You plan to install Windows 2000 Server computer on the new
computer. The computer has one 20 GB hard disk with no partition
defined. The Windows 2000 Server computer CD ROM is unavailable. You
want to install windows 2000 server from the source files that are
located on a server on the network. You also want the entire hard
disk of the new computer to be used for the system partition. What
should you do?
A. On another windows 2000 computer use makebt32.exe to create
installation startup disks. Start the computer by using the first
disk. B. On another Windows 2000 computer format a floppy disk. Copy
NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the
computer by using the disk. C. Start the new computer by using the
Windows 98 network boot disk. Connect to the server. Run
dsclient.exe. Create and format 20GB FAT32 partition. D. Start the
new computer by using the Windows 98 network boot disk. Create and
format a single FAT32 partition. Connect to network server. Run
winnt.exe. E. Start the computer by using Windows 98 network boot
disk. Create and format a single Fat 32 partition. Start the new
computer by using the Windows 2000 emergency repair disk.
Answer: D
23. The company has 50 offices. The employees in these offices
have limited knowledge of Windows 2000. Each employee has a network
between 5-20 client computers. The office networks are not connected
to any other networks. The company is buying 50 identical computers
to run Windows 2000 server in these offices. These servers must be
installed to company’s standard configuration. You create a setup
information file (SIF) that specifies the company’s data
configuration. You want to automate the installation process as much
as possible in the least possible amount of time. What should you
do?
A. Use the makebt32.exe to create 4 installation setup disks and
add the SIF to the first disk. Instruct an employee at each office
to start the installation by using these. B. Create MS-DOS boot disk
that contain CD ROM driver and the SIF and that runs WinNT
/S:D:\I386 command. Instruct an employee at each office to start the
installation by using this disk. C. Create a floppy disk that
contains only SIF. Instruct an employee at each office to start the
installation by using the Windows 2000 server CD-ROM with the floppy
disk inserted after startup. D. Create a Windows 2000 folder on the
hard disk, copy the Windows 2000 Server CD-ROM to the folder, add
the SIF to the folder. Copy the folder to the writable CD. Instruct
an employee at each office to start the installation by using this
CD.
Ans:C
24. You are the administrator of a network that includes windows
nt server 4.0 computers, NT Workstation 4.0 computers and unix
computers. The network consists of a single windows NT domain. You
are upgrading a windows NT server computer named server1 to windows
2000 server. Server1 is a bdc in the domain. The existing DNS server
is a unix computer that supports srv (services) records and is
configured to accept dynamic updates. The existing WINS server is
another windows NT server computer. You want to configure server1 as
a domain controller in a new active directory forest. You want the
existing windows NT domain accounts to be upgraded to active
directory. You plan to upgrade the other domain controllers in the
domain to windows 2000 after the upgrade of server 1 is complete.
You want to perform the upgrade of server1 with the least possible
impact on other computers on the network.what should you do?
A. Promote server1 to the pdc of the domain. Run windows 2000
setup on server1. B. Run windows 2000 setup on server1. At the end
of setup.configure server1 as a dns server and a wins server. C. Add
a static mapping for server1 on the WINS server. On the DNS server,
create a srv record for the ldap service on server1. Run windows
2000 setup on server1. D. Install the ms dns service on an existing
windows nt server. Apply SP 4 or later to the server. Run windows
2000 setup on server1.
Answer: A
25. Your network uses TCP/IP as the only network protocol.
Devices on the network are configured to use IP address from the
private 10.0.0.0 range. All the client computers on the network runs
Windows 2000 Professional. The network includes Windows 2000 Server
computers and UNIX servers. User's print jobs are sent to shared
printers on a Windows 2000 Server computer named PrintServ that
directs the print jobs to print devices attached directly to the
network. You have a high-capacity print device that is attached to
one of the UNIX servers. The UNIX computer uses the LPR printing
protocol, and it's IP address is 10.1.1.99. The name of the printer
queue is GIANT. You want users to be able to connect to this printer
from their computers.
What should you do?
A. Install Microsoft Print Services for Unix on PrintServ. Create
a network printer on users' computers, and specify that the printer
URL is LPR://10.1.1.99/GIANT. B. Install Microsoft Print Services
for Unix on users' Computers. Create a network printer, and specify
that the printer name is \\10.1.1.99\GIANT C. Create a network
printer on PrintServ, and specify that the printer name is
\\10.1.1.99\GIANT. Share this printer and connect to it from users'
computers. D. Create a local printer on PrintServ. Create a new
TCP/IP port for an LPR server at address 10.1.1.99 with a queue name
of GIANT. Share this printer and connect to it from users'
computers.
Ans:D
26. You are the administrator of a Windows 2000 Server network
that runs in mixed mode. You install a new Windows 2000 Server
computer. You create and share a new HP LaserJet 4L printer. Your
Windows 2000 Professional client computers can print to the new
printer successfully. However, when users try to connect to the
printer from Windows NT Workstation 4.0 client computers, they
receive the dialog box shown in the exhibit. "The server on which
the printer resides does not have a suitable HP LaserJet printer
driver installed". You want the printer driver to be installed
automatically on the Windows NT Workstation computers. What should
you do?
A. Copy the Windows NT 4.0 Printer Drivers to the Netlogon shared
folders on all Windows NT Server 4.0 computers still configured as
BDCs. B. Copy the Windows NT 4.0 printer drivers to the Netlogon
shared folder on the PDC emulator C. Change the sharing options on
the printer to install additional drivers for Windows NT 4.0 or
Windows 2000. D. Copy the Windows NT 4.0 printer drivers to the
Winnt\System32\printers\drivers folder on the Windows 2000 print
server.
Ans:C
27. Your company's network includes Windows 3.1 client computers,
Windows 95 client computers, and Windows 2000 Professional client
computers. The company's manufacturing facilities run 24 hours per
day. The company has developed its own 32-bit application that
collects information from the manufacturing process so that workers
on one shift can find out that was manufactured during the previous
shift. The company wants to make the application available on all of
the client computers by using Terminal Service on a Windows 2000
Server computer. This server will not run as a domain controller.
You install Terminal Services. The information technology (IT)
department needs to be able to remote control users' sessions to
support and troubleshoot the application. What should you do to
enable the IP department to control users' sessions?
A. Configure the Terminal server to run in Remote Administration
mode. B. Grant the IT department Full Control permission to the
Remote Desktop Protocol (RDP) on the Terminal server. C. Add the
members of the IT department to the Power Users group on the
Terminal server. D. Use third-party software to enable remote
control of users' sessions.
Answer: B
28 You install Terminal Services on a Windows 2000 domain
controller. You install Terminal Services Client on users' client
computers. Users report that when they try to connect to the
Terminal server, they receive the following error message: "The
local policy of this system does not allow you to logon
interactively." When you attempt to log on to the Terminal server as
an administrator from a user's computer, you log on successfully.
You want users to be able to log on to the Terminal server. What
should you do?
A. Grant the users the right to log on as a service. B. Grant the
users the right to log on locally. C. Grant the users the right to
log on over the network. D. Copy the users' profiles to the Terminal
server. E. Copy the users' home folders to the Terminal server.
Answer: B
29. You are the administrator of a Windows 2000 Server computer.
A folder named HR-Data on the system partition of the server is
shared on the network as HR-Data. The owner of the HR-Data folder is
Administrators. The share permissions and NTFS permissions are shown
in the following table.
HR-Data Folder Share permissions HR-Data Folder NTFS permissions
Everyone: Full Control Domain Admins: Read Katrin: Full Control
Katrin creates a file in the HR-Data folder. She sets the NTFS
permissions for the file to list only herself on the access control
list, with Full Control permission. Katrin then leaves on vacation
and cannot be contacted. Later, you discover that the file contains
sensitive information and must be removed from the server as soon as
possible. You want to delete the file without modifying any of the
permissions of other files in the HR-Data folder. You want your
actions to have the least possible impact on users who may be using
other files in the HR-Data folder. You want to use the minimum
amount of authority necessary to delete the file. What should you
do?
A. Grant yourself Full Control permission for only the HR-Data
folder and not its files and subobjects. Delete the file. Then
remove Full Control permission for the HR-Data folder. B. Take
ownership of the HR-Data folder. When prompted, take ownership of
existing files. Grant yourself Full Control permission for the file.
Delete the file. C. Take ownership of the file. Grant yourself
Modify permission for the file. Delete the file. D. Grant yourself
Modify permission for the HR-Data folder and its subobjects. Delete
the file. Then remove Modify permission for the HR-Data folder.
Ans:C
30. You are the administrator of a Windows 2000 Server computer
named Server1. You create a Distribute file system (Dfs) root named
Public. You add a shared folder named Docs as a Dfs node under the
root. The share permissions and NTFS permissions for Public and Docs
are shown in the following table.
Folder Share permissions NTFS permissions
-----------------------------------------------------------------------------------
Public Everyone: Read Everyone: Read Domain Admins: Full Control
Docs Users: Read Training: Full Control Domain Admins: Full
Control Domain Admins: Full Control
A user named Maria is a member of the Users and Training user
groups. When Maria attempts to save the file
\\Server1\Public\Docs\memo.doc, she receives the following error
message: "Access denied." You want Maria to be able to change and
delete all files in the Docs folder. You do not want her to have
more access than necessary. What should you do?
A. Add Maria to the Domain Admins group. B. Add Maria to the
local Administrators group. C. Set the share permissions for the
Public folder to grant Maria Full Control permission. D. Set the
share permissions for the Docs folder to grant Maria Change
permission. E. Set the NTFS permissions for the Public folder and is
sub objects to grant Maria Modify permission. F. Set the NTFS
permissions for the Docs folder and its sub objects to grant Maria
Full Control permission.
Answer: D
31. The network uses TCP/IP as the only network protocol. You
configure the remote access server on the network. Some users report
that when they connect to the server they receive the following
message |" IPX SPX compatible computer deported error 733" The EPP
control network protocol for the network is not available. If the
users allow the connection to continue they are able to connect to
the services that use TCP/IP. You want to prevent this message from
being displayed. What should you do?
A. Configure a client computer to use only TCP/IP for the
connections to the remote access server. B. Configure the client
computer to use a defined IPX network address for the connection to
the remote access servers. C. Configure the remote access server to
allow IPX based remote access demand dial connections. D. Configure
the remote access server to disable multi-link connection.
Answer: A
32. You are the administrator of the Windows 2000 Server network
shown in the exhibit. Users in the Research group and the Executive
group have permission to access the Internet through a Windows 2000
Server computer running Microsoft Proxy Server. These users must
enter their proxy server user names and passwords to connect to the
proxy server, to the Internet, and to your local intranet server.
The users who do not access the Internet do not have user accounts
on the proxy server and, therefore, cannot connect to the intranet
server. You want all users to be able to connect to the intranet
server without entering a separate user name and password. What
should you do?
A. Move the intranet server to the client segment of the network.
B. Move the proxy server to the server segment of the network. C.
Configure each client computer to bypass the proxy server for local
addresses. D. Configure each client computer to use port 81 for the
proxy server.
Ans:C
33. You are N/W administrator of a win2k server your n/w contain
five win2k server computer and 100 win2k professional computers. You
want to deploy an update for an application that is used to the
win2k professional computer. You want the users to automatically
install the update the driver when they logon the domain. What
should u do? A. Create a DFS, place the application update and the
root folder of the DFS B. Create an Ms windows installer package for
the application update and configure the RIS to use the package. C.
Create a MS windows installer package for the application update.
Apply the package to the local computer policy on all the computers.
D. Create a MS windows installer package for the package update.
Apply the package to the group policy
Answer: D
34. You are the administrator of a Windows 2000 active directory
network. The network consists of a single domain. The domain
contains 20 Windows NT 4.0 client computers. All other client
computers are Windows 2000 Professional client computers. You create
an NT 4.0 default user policy on Windows 2000 Server computer that
is configured as PDC emulator. The default policy denies access to
the network neighborhood. You then install terminal services on one
of the servers and terminal services client on two thousand Windows
NT server client computers. You find that users of the terminal
server can still browse the network when they open my network
places. You want to prevent all default users from browsing the
network. What should you do?
A. Modify the Windows NT policy template file so that you can
restrict access to both the my network places and network
neighborhood. Save the policy file on the terminal server. B. Copy
the NT file to 20 Windows NT workstation computers. C. Create a
windows 2000 group policy that denies access to my network places.
D. Edit the local registry on Windows NT workstation computers to
deny access to entire network in the entire neighborhood.
Ans:C
35. After you install a new video adapter, one of the users at a
remote location reports that Routing and Remote Access does not
accept calls. After you resolve the Routing and Remote Access
problem, you need to configure the server to prevent users from
installing any unsigned device drivers. What two actions should you
take in the Driver Signing Option dialog box? (choose two)
A. Set File Signature Verification to Ignore B. Set File
Signature Verification to Block C. Set File Signature Verification
to Warn D. Select the Apply settings as system default check box
Answer : B, D
36. You configure your Windows 2000 Server as a print server. You
install a second PnP Network adapter to improve the performance. The
first adapter uses IRQ11, and the second adapter uses IRQ5. The
server is now unable to print to print devices connected to a
non-PnP LPT2 port adapter. You want to continue to use the print
devices connected to your print server. What should you do?
A. Use device manager to change the IRQ for LPT1 to IRQ10. B. Use
device manager to change the IRQ for LPT2 to IRQ7. C. Edit the CMOS
setting of the servers BIOS to reserve IRQ7 for non-PnP devices. D.
Edit the CMOS setting of the servers BIOS to reserve IRQ5 for
non-PnP devices.
Answer: D
37. You install a second modem on win2000 server computer
configure with routing and remote accesss.dial in user reports that
they are unable to connect to the server using this modem. What
should you do to help fix this problem?
A. Using the routing and remote access (snap in) to find that the
input and output modems are operational. B. From command prompt run
the "net config" server command C. From command prompt run the "net
statistic" command d. se the regedt32 to view the error control
value in the HKEY LOCAL MACHINE\system\current control
set\services\remote Access key
Ans. A
38. You install a new multiple-process database application named
Application on your Windows 2000 Server computer. Two days later,
users begin to report that the new application has suddenly stopped
responding to queries. You verify that the server is operation and
decide that you need to restart the application. What should you do
before you restart the application?
A. End the task named Application. B. End the Application.exe
process. C. End the Application.exe process tree. D. End both the
Explorer.exe process and the Application.exe process.
Ans:C
39. A Windows 2000 Server computer named Server1 is a file server
on your network. Server1 runs numerous 16-bit applications. One of
the applications, named App1, stops responding, causing all of the
other 16-bit applications to stop responding. You want to isolate
App1 for monitoring and troubleshooting purpose. What can you do?
(Choose all that apply.)
A. Create a batch file that starts App1 by running the start
command with the /separate switch. Use this batch file to start
App1. B. Create a shortcut to App1, and select the Run in separate
memory space option in the shortcut properties. Use this shortcut to
start App1. C. In the properties for File and Printer Sharing for
Microsoft Networks, select the Maximize data throughput for file
sharing option button. D. In the properties for File and Printer
Sharing for Microsoft Networks, select the Balance option button.
Answer: A,B
40. You want to improve the TCP transmission speed of a Windows
2000 Server computer. You also want to remove an unused registry
key. You use Regedit32 to edit the registry of the Windows 2000
Server. You insert a value in the registry named TCPWindowSize, and
you remove the unused key. You restart the computer, but the
computer stops responding before the logon screen appears. You want
to return the computer to its previous configuration. What should
you do?
A. Restart the computer in safe mode. Then restart the computer
again. B. Restart the computer by using the Recovery Console. Run
the Fixboot c: command, and then run the Exit command. C. Restart
the computer by using the Recovery Console. Run the enable winlogon
service_auto_start command, and then run the Exit command. D.
Restart the computer by using the last known good configuration.
Ans:D
41. You are a network administrator for your company. The company
is currently configuring its branch offices with a Windows 2000
Server computer at each office. Each branch office has a
technical-support department but not a network administrator. You
want to configure the remote Windows 2000 Server computers so that
whenever a new Microsoft driver becomes available, the branch
offices are notified automaticaly when the administrator logs onto
the server. What should you do?
A. Install the Windows 2000 Resource Kit. B. Install Windows
critical update notification. C. Configure system file checker to
notify the branch offices. D. Configure Windows file protection to
notify the branch offices.
Answer: B
42. You upgrade a Windows NT Server 4.0 computer to Windows 2000
Server. The computer has two hard disks. The system and boot
partitions are located on two primary partitions on Disk 0. Both
partitions are mirrored on Disk 1. One month later, Disk 1 fails.
You replace the disk with a disk taken from another Windows 2000
computer. When you try to repair the fault-tolerant volumes by using
Disk Management, you find that the Repair Volume option is
unavailable. You want to repair the mirror set. What can you do?
(Choose two.)
A. Delete all volumes on Disk 1. Change Disk 1 back to a basic
disk. Repair the fault-tolerant volumes on Disk 0. B. Create two new
volumes on Disk 1. Copy all the data from the two disk partitions on
Disk 0 to the two volumes on Disk 1. C. Break the mirror set.
Convert Disk 0 to a dynamic disk. Create a mirror on Disk 1. D.
Create a single volume on Disk 1. Copy all the data from Disk 0 to
the single volume. Convert Disk 0 to a dynamic disk.
Answer: A, C
43. You want to provide complete redundancy for all data stored
on your hardware RAID 5 array. You install second h/w Raid 5. You
want to create a mirror set of the original array. However when you
right click the free space on new array you see no option to create
a new volume or mirrrored volume. What should you do?
A. Convert both to dynamic disks. B. Create an empty extended
partition on new disk C. Create a single unformatted primary
partition on new array. D. Format new disk array as a single NTFS
primary partition. E. Format the new disk array as a single NTFS
logical drive in an extended partition.
Answer: A
44. You are the administrator of a Windows 2000 Server computer
that has FIVE hard disks. Four 100 GB hard disks on the server are
configured as a single stripe volume. You want to reconfigure the
fourth disk so that the volume is fault tolerant and has as much
space possible available for storing data. You want to use only
existing hardware. What should you do?
A. Convert the disk to dynamic disk shut down and restart the
server. B. Backup the data on the stripe volume and delete the
stripe volume. Create a raid5 volume on the four disks, restore the
data to the new raid5 volume. C. Backup the data on the stripe
volume and delete the stripe volume. Create to mirror volume, shut
down and restart the server. Restore the data to new mirror volumes.
D. Backup the data on the stripe volume and delete the stripe
volume. Create a span volume for the first two disks, create a
second span volume for the last two disk. Mount the root of the
second span volume in the root of the first span volume. Restore the
data to the first span volume.
Answer: B
45. You are the administrator of Windows 2000 Server computer.
Your computer has a span volume that consists of areas on three
physical hard disks on the server. The three disks support hot
swapping. You regularly backup the span volume by using windows
backup. One of the disk fail, you replace the disk with a new
un-partitioned disk. You want to recover the span volume and disk
data as soon as possible. What should you do?
A. Extend the span volume to include the new disk, rescan the
disk. B. Extend the span volume to include the new disk, shut down
and restart the server, use windows backup to restore the data. C.
Re scan the disk, format the span volume. Use windows back up to
restore the data. D. Re scan the disk, extend the span volume to
include the new disk. Shut down and restart the server, use windows
backup to restore the new data. E. Re scan the disk, remove the span
volume and create a new span volume that includes the new disk.
Format the span volume, use Windows back up to restore the data.
Answer: E
46. You are the administrator of contoso.local domain. You
organize the domain into organizational units as shown in the
EXHIBIT. You configure the local security options and other settings
for the default domain policy object. You delegate administration of
Michigan and Florida OU. You want to prevent those administrators
from creating any other group policy objects with settings that
conflict with those you configured. What should you do?
A. From the group policy options from the contoso.local domains
set the option not override. B. From the group policy options from
the Michigan and Florida OU, set the option not override. C. Block
the group policy inheritance for the contoso.local domain. D. Block
the group policy inheritance for Michigan and Florida OU.
Ans:A
47. You are the administrator of Windows 2000 domain and TWO
Windows NT domains. The Windows 2000 domains trust each of the
Windows NT domains. Each of Windows NT domains trust the Windows
2000 domain. A Windows 2000 domain controller named DC1 is
configured to use a highly secure domain controller template. Users
in the Windows NT domain report that they cannot access DC1. You
need to allow the users of computers in the Windows NT domain to
access resources on DC1. What should you do?
A. Apply a less restrictive custom security template to DC1. B.
Apply a less restrictive custom policy to Windows NT domain
controller. C. Ensure the Windows 2000 domain is configured in the
mixed mode D. Ensure the Windows 2000 domain is configured to run in
the native mode.
Answer: A
48. You are the administrator for your company. Your Windows 2000
Server computer contains two 23GB hard disks. Each disk is
configured as a basic disk and has a single 23GB NTFS partition.
Both partitions are backup up to tape every night. The partition on
Disk1 stores user data. Most users of your company encrypt their
files. Disk1 fails. You replace it with a new disk. You need to
recover the data as quick as possible while maintaining the security
of the files. What should you do?
A. Create a single NTFS partition. Restore the contents of Disk1
from the most recent tape backup. Run the cipher /d /i command. B.
Create a single NTFS partition. Restore the contents of Disk1 from
the most recent tape backup. Instruct the users to verify the
integrity of their files. C. Create a single NTFS partition. Restore
the contents of Disk1 to a second file server. Logon to the server
console as a recovery agent. Copy the files from the second file
server to the new partition. D. Create a single NTFS partition.
Restore the contents of Disk1 to a second file server. Instruct
users to copy their files from the second file server to the new
partition.
Answer: B
49. Five Lakes Publishing has a Windows 2000 network serving 200
users. A server named User_srv is used to hold users' files.
User_srv is configured with a single, large NTFS volume. Every user
has a home folder on User_srv. Users can also use a shared folder
named IN_PROGRESS to store files for books that are being prepared.
The network administrator at Five Lakes Publishing configured disk
quotas for the NTFS volume on User_srv. All users have a default
limit of 100 MB, and the option to deny space to users who exceed
their limit has been enabled. When a user named Amy Jones attempts
to save a chapter of a new book to her home folder on the server,
she receives the following error message: "The disk is full or too
many files are open." What should Amy do to allow this document to
be saved? (Choose all that apply.)
A. Compress the files in her home folder to save disk space. B.
Change the security setting of some of the files in her home folder
to grant Full Control permission to a user who has not reached the
quota level. C. Move some of the files from her home folder to the
IN_PROGRESS shared folder. D. Remove files from her home folder
until the total uncompressed file size is less than 100 MB.
Ans: D
50. Your company has a main office and 50 branch offices. The
main office has a private network with 1,000 computers. Each branch
office has a private network with between 10 and 20 computers and a
56-Kbps connection to the Internet. The company plans to use the
Network Address Translation (NAT) feature of Routing and Remote
Access to provide each office with access to the Internet. When you
test this configuration, you discover that connections cannot be
made to sites by using fully qualified domain names. However,
connections can be made to these sites by using their IP addresses.
You want to be able to make connections by using fully qualified
domain names. What should you do?
A. Configure the computers on each of the branch office networks
with the address of a WINS server. B. Configure the computers on
each of the branch office networks with the address of a DNS server
on the Internet. C. Configure a filter on the NAT servers to pass
DNS packets. D. Create a host file on each of the NAT servers.
Ans:B
51. You are the administrator of a routed Windows 2000 network.
The network includes 25 Windows 2000 Server computers. You want to
install a new Windows 2000 Server computer as the first computer on
a new routed segment. You configure the existing DHCP server with a
scope that is valid for the new routed segment. During the
installation of the new Windows 2000 Server, you specify that the
server should obtain its IP address from an existing DHCP server.
After you complete the installation, you open My Network Places. You
see the new server but no other computers. You run the ipconfig
command and find that the new server's assigned IP address is
169.254.1.200, with a 16-bit subnet mask and no default gateway
address. You want to resolve the problem so that you can see other
computers on the routed network. What can you do? (Choose two.)
A. Configure all of the routers to route BOOTP broadcast frames.
B. Configure the default gateway to the TCP/IP properties of the new
server. C. Add the IP address for the default gateway to the TCP/IP
properties of the new server. D. Add a DHCP Relay Agent computer to
the new routed segment. E. Add a WINS server to the new routed
segment.
Answer: A,D
************************************************************************************
Set-2
These questions I had collected from many dumps for practice. All
the ans may not be true. So check it. I don't think that you will
find any other questions out of this dump.
1. You plan to install Windows 2000 Server on 10 new computers on
your company's network. These servers will provide file and print
services to departments within the company. The computers have
identical hardware and will use the same software configuration. You
plan to use a centralized copy of the Windows 2000 installation
files, which are stored on an existing Windows 2000 Server computer.
Which three actions should you take to install Windows 2000 Server
on the new computer? (Choose three.)
A. Create a set of installation boot disks by using Makeboot.exe.
B. Create an MS-DOS network boot disk. C. Create an Unattend.txt
file by using Setup Manager. Create a UDF file that identifies the
names of the new computers. D. Create a UDF file by using setup
manager. Create an Unattend.txt file that identifies the names of
the new computers. E. Begin the installation process by running the
Winnt command with the /S, /U, and /udf switches. F. Begin the
installation process by running Winnt32 command with the /s,
/unattend, and /udf switches.
Answer: B,C,E
2. You plan to install Windows 2000 Server on 10 new computers.
These servers will provide file and print services in branch offices
of your company. The company wants each branch office to purchase
its own copy of Windows 2000 Server. The installation in each branch
office should use the serial number associated with the branch
office's own copy. You want to install, configure, and test Windows
2000 server on these computers at the main office before shipping
the computers to the branch offices. You want users in the branch
offices to enter the computer names and serial numbers when they
receive the computers. What should you do?
A. Install Windows 2000 server on the computers by using an
unattend.txt file, and then use the Registry Edition to remove the
computer name and license details. B. Start the installation process
from an MS-DOS boot disk. Install windows 2000 server on the
computers from an existing server by running the winnt command with
the /PreInst switch. C. Install Windows 2000 server on the computers
and then use setup manager to create a sysprep.inf file for
sysprep.exe. Place the sysprep.inf file on the computers and run the
sysprep - nosidgen command. D. Create an unattend.txt file by using
Setup Manager. Include the following line in the Unattend.txt file:
oemPreinstall=Yes. Use the file to perform the installation.
Answer: C
3. You are the administrator of a Windows 2000 Server network at
Blue Sky Airlines. You configure a server named
print10.marketing.blueskyairlines.local as a print server at the Los
Angeles site. You create and share a variety of printers on the
server for use by employees in the marketing.blueskyairlines.local
domain. You want to review the configured properties of all of the
shared printers on the print10.marketing.blueskyairlines.local
server. You want to perform this review from a Windows 2000
Professional computer at the London site of Blue Sky Airlines. What
should you do?
A. Use your Web browser to connect to
http://print10.marketing.blueskyairlines.local/printer. B. Use your
Web browser to connect to
http://print10.blueskyairlines.local/printer. C. Run the net view
\\print10 command. D. Run the net view \\print10.blueskyairlines.com
command.
Answer: A
4. You are a member of the Enterprise Admins group at Trey
Research. You create and share a printer named HPColorL2 on a
Windows 2000 Server computer named pserver.treyresearch.local. You
grant Print permission only to the Domain Local group named
CompanySales. Later, you add a new child domain named
london.treyresearch.local. Clair Hector is a member of the global
group named LondonSales in the london.treyresearch.local domain.
Clair reports that she is unable to send a print job to the
HPColorL2 printer. You want all members of the LondonSales group to
be able to print to the HPColorL2 printer. What should you do?
A. Add the LondonSales group to the CompanySales group. B. Add
the CompanySales group to the LondonSales group. C. Change the
CompanySales group to a universal group. D. Change the LondonSales
group to a universal group.
Answer: A
5. You are the administrator of home.office.local.com domain. You
want to create a shared printer for the company's executives so that
they do not have to wait for their documents to print when default
printer's queue contains a large number of documents. You configure
a new high priority printer and want to set permissions on groups
shown in the exhibit. The groups were:
Administrator Creator Owner Everyone Executives Print Operators
Server Operators
You select the checkbox to allow Print permissions for Executives
group. You want only Administrators, Print Operators, and Server
Operators & Executives to be able to print. What should you do?
(Select all that apply)
A. Remove the Everyone group. B. Select checkbox to Deny Print
permission to Everyone C. Select checkbox to Deny Manage Documents.
D. Select all Deny for the Everyone group E. Clear all allow
checkboxes for the Everyone group
Answer: A, E
6. You are administrator of a Windows 2000 network. The network
includes a Windows 2000 Server computer that is used as a file
server. More than 800 of your company client computer are connected
to this server. A shared folder named DATA on server is on an NTFS
partition. The data folder contains more than 200 files. The
permissions for the data folder are shown in the following table.
TYPE OF PERMISSION ACCOUNT PERMISSION
DATA Share Permissions Users: Change DATA NTFS Permissions Users:
Full Control
You discover that users are connected to the DATA folder. You
have an immediate need to prevent 10 of the files in the DATA folder
from being modified. You want your actions to have the smallest
possible effects on the users who are using other files on the
server. What TWO actions should you take?
A. Modify the NTFS permissions for the ten files. B. Modify the
NTFS permissions for the DATA folder. C. Modify the shared
permissions for the DATA folder. D. Log off the users from the
network. E. Disconnect all Users from the DATA folder.
Answer: A, E
7. You are the network administrator for your company. Mike Nash
is a member of the Administration group, and Nate Sun is a member of
the Intern group. Both groups are in the same domain. On the
intranet server, the Administration group is placed in the Security
group, and the Intern group is placed in the Nonsecurity group. The
Security group is then granted Full Control permission for the Sales
virtual directory. Nate needs to update new sales information that
is located on the Sales virtual directory. What should you do so
that Nate can perform this task?
A. Enable Anonymous access for the intranet server. B. Enable
Anonymous access for the Sales virtual directory. C. Remove Nate
from the Intern group. D. Make Nate a member of the Security group.
Answer: D
8. You are the administrator of the blue lines skys airlines. You
install intranet and configure new windows 2000 computer named
server1.department.blueline.com as an intranet server. The server
hosts multiple departmental and???? Web to the n/w and data site.
You also configure the finance virtual??? In the department web site
as shown in the exhibit. During first morning that the new server is
available. Users report that they can only see the information that
they see in the browser is the list of HTM and ASP files. For
security reasons the first action to take is to disable the users
ability to view the files of all web sites in the form of list. What
should u do?
A. Clear the directory-browsing check box for the server
properties and then apply setting to the child web sites. B. Clear
the directory-browsing check box for the ticketing web site and then
apply setting to the child virtual directory. C. Clear the directory
browsing check box for the departments web sites and then applies
the setting for the child virtual directory. D. Clear the directory
browsing check box for the financing web site.
Answer: A
9. You use computers in two different offices. You have folders
stored on a server named UserData01. You work with many files that
are highly confidential. You keep the confidential files in a folder
named Private in your home folder. You need to maximize the security
of the private folder. You also want to be able to access the folder
from computers in each office. What should you do? A. Obtain a
signing and sealing certificate for a certification server, and
install the certificate on the computers you use. B. Log on
UserData01 as a domain admin, connect to your known folder and set
the encryption attributes. C. Configure your account to use roaming
user profile. Use the properties of the Private folder to set the
encryption attributes. D. Add the cipher/e/s *.* to your computer's
start up script.
Answer: C
10. Your company's network includes Windows 3.1 client computers,
Windows 95 client computers and Windows 2000 Professional client
computers. The company's manufacturing facilities run 24 hours per
day. The company has developed its own 32 bit application that
collects information from the manufacturing processes so that
workers on one shift can find out what was manufactured during the
previous shift. The company wants to make the application available
to all the client computers using terminal services on a Windows
2000 Server computer. The server will not run as a domain
controller. You install terminal services. Users want to collect
information on manufacturing processes from other shifts. The
company wants users to shut down their computers at the end of their
shifts and leave the applications running on the terminal server.
What should you do?
A. Set the delete temporary folders on exit setting for the
terminal server to NO. B. Set the remote desktop protocol on the
server to overwrite user settings and set end disconnected setting
to NEVER. C. At the terminal server grant the users the right to log
on as a batch job. D. Do NOTHING, user programs are always
terminated on disconnection.
Answer: B
11. Your Windows 2000 Server computer uses a SCSI adapter that is
not included on the current Hardware Compatibility List (HCL). You
install an updated driver for the SCSI adapter. When you start the
computer, you receive the following STOP error:
"INACCESSIBLE_BOOT_DEVICE." Which two procedures can you use to
resolve the problem? (Choose two.)
A. Start the computer in safe mode. Reinstall the old driver for
the SCSI adapter. B. Start the computer by using a Windows 2000
bootable floppy disk. Reinstall the old driver for the SCSI adapter.
C. Start the computer by using the Windows 2000 Server CD-ROM.
Perform an emergency repair. Reinstall the old driver for the SCSI
adapter. D. Start the computer by using the Recovery Console. Run
System File Checker. Restart the computer. Reinstall the old driver
for the SCSI adapter. E. Start the computer by using the Recovery
Console. Copy the old driver for the SCSI adapter to the system
volume as C:\NTbootdd.sys. Restart the computer.
Answer: C,E
12. You are a member of the Backup Operators Group in the
arborshoes.com domain. You are not a member of any other group in
the domain. You are logged on to a Windows 2000 Server. You try to
configure the software from a tape backup device, but the
configuration fails during backup. The documentation from the tape
backup device indicates that the current tape driver is out of date
and must be updated to support the configuration. What should you
do?
A. Run the "runas" command, supply your user name and password to
start device manager. Then click the update driver command button on
the Driver tab for the tape backup device. B. Instruct a domain
administrator to run the "runas" command, supplying the domain
administrator user name and password to start device manager. Then
click the update driver command button on the Driver tab for the
tape backup device. C. Open the device manager, and then click the
update driver command button on the driver tab for the tape backup
device. D. Run the Add/Remove Hardware wizard, when prompted select
the Add/Troubleshoot a device option.
Answer: B
13. You have a Windows 2000 Server and has 2 disk drives attached
to the IDE controller. You want more space so you add a new SCSI
Controller with 6 disks. The SCSI controller is not in the HCL. You
restart the server but it's not dectected. What should you do?
(Choose 2)
A. Use Device Manager to turn off IRQ steering in the Properties
of the Standard PC. Restart B. Use Disk Management to restore the
asic configuration. Restart C. Use Add/Remove Hardware wizard to add
new SCSI and RAID controller. D. Use Disk Management to rescan disk
E. Use Manufacturer's setup program to install the drivers for the
SCSI disk controller.
Answer: A, E
14. Your Windows 2000 Server computer uses a non-Plug and Play
ISA modem configured to use IRQ 5. You add a PCI modem and restart
the computer. Device Manager reports an IRQ conflict between the two
modems. Both modem are trying to use IRQ 5. You want to resolve the
problem. What should you do? A. Use Device Manager to change the IRQ
for the original modem to IRQ 9. B. Use Device Manager to change the
IRQ for the original modem to IRQ 10. C. Edit the CMOS settings on
the computer to reserve IRQ 5 for non-Plug and Play devices. D. Edit
the CMOS settings on the computer to reserve IRQ 10 for non-Plug and
Play devices.
Answer: C
15. Your Windows 2000 server computer contains data files that
users of client computers access throughout the day. You install a
driver for the new tape drive on the computer. After restarting the
computer you log on as an administrator, shortly after you log on
you receive the following stop error "irql_not_less_or_equal". You
need to bring the server back on line as quickly and reliably as
possible.
What should you do?
A. Restart the computer by using the last known good menu option.
B. Perform an emergency repair and select fast repair, restart the
computer. C. Restart the computer in the safe mode, remove the
driver and restart the computer. D. Restart the computer by using
the recovery console, disable the driver. Restart the computer,
remove the driver.
Ans:D
16. You are installing Windows 2000 Server on a new computer. The
manufacturer has provided a customized hardware abstraction layer
(HAL) to use with the computer. The HAL is on the floppy disk. You
want to install the customized HAL design for the computer. What
should you do?
A. During the hardware confimation portion of the Windows 2000
setup install the customized HAL. B. After installing Windows 2000
server,use the recovery console to copy the customized HAL to the
system32 folder on the boot partition. C. After the installing
windows 2000 setup, use the emergency repair process to install the
customized HAL. D. After installing Windows 2000 server, use the
device manager to scan for Hardware changes. When prompted, install
the customized HAL.
Ans: A
17. A Windows 2000 Server computer named server2 runs numerous
32bit applications and two 16bit applications. Users start the 16bit
applications by running APP1.EXE for one application and APP2.EXE
for another application. The 16bit applications are configured to
run in the separate memory space. You want to create a performance
base like chart in the system monitor for all the applications on
server2. You add all of 32bit applications and now you want to add
two 16bit applications. What should you do?
A. Add the APP1 and APP2 instances to the processor time counter
for the process object. B. Add the NTVDM, APP1 and APP2 instances
for the processor time counter for the process object. C. Add only
the NTVDM instance for the percent processor time counter for the
process object. D. Add the NTVDM1 and NTVDM #2 instances for
processor time counter for the process object.
Answer: D
18. Every afternoon you run MS-EXCEL locally on Windows 2000
Server computer to update the performance spread sheet. Users report
that during this time the server response to the file request
appears to be slowed down. What should you do to resolve the
problem?
A. Run the start/normal CSRSS command, before you start the
EXCEL. B. Run the start/normal EXCEL.EXE command to start excel. C.
Use task manager to set the priority for CSRSS.EXE process to above
normal. D. Use task manager to set the priority for EXCEL.EXE
process to low.
Answer: D
19. Running system monitor locally and ensuring it has least
impact on other processes, how do you measure the physical disk
performance counters on your win2000 server computer?
A. From the command prompt run the start/low perform command B.
Use Task manager to set the priority off the MMC.EXE process to Low
Answer: A
20. You are the administrator of Windows 2000 Server network . On
each server you format a separate system partition and a separate
boot partition as NTFS. Several months later you shut down one of
the computers for maintenance. When you try to restart the computer
you receive the following error message "NTLDR is missing, press any
key to restart". You want to install a new NTLDR file on the
computer but you do not want to loose any settings you made since
the installation. What should you do?
A. Start the computer by using Windows 2000 Server computer
CD-ROM and choose tools to repair the installation. Select recovery
console and copy the NTLDR file on the CD-ROM to the root of the
system volume. B. Start the computer by using the Windows 2000
server CD- ROM, choose to reinstall. When the installation is
complete copy the NTLDR to the root of the boot volume. C. Start the
computer by using the Windows 2000 bootable floppy disk. From a
command prompt run the sfc/scanboot command. D. Start the computer
by using Windows 2000 bootable floppy disk. Run the file signature
verification utility.
Answer: A
21. Your Windows 2000 server computer contains data files that
users of client computers access throughout the day. You install a
driver for the new tape drive on the computer. After restarting the
computer you log on as an administrator, shortly after you log on
you receive the following stop error "irql_not_less_or_equal". You
need to bring the server back on line as quickly and reliably as
possible. What should you do?
A. Restart the computer by using the last known good menu option.
B. Perform an emergency repair and select fast repair, restart the
computer. C. Restart the computer in the safe mode, remove the
driver and restart the computer. D. Restart the computer by using
the recovery console, disable the driver. Restart the computer,
remove the driver.
Answer: D
22. You are the administrator of a Windows 2000 domain that has
three domain controllers. Each day, you use Windows Backup to
perform full backups of each domain controller. You run a script to
make changes to account information in Active Directory. As a result
of errors in the script, the incorrect user accounts are modified.
Active Directory replication then replicates the changes to the
other two domain controllers. You want to revert Active Directory to
the version that was backed up the previous day. What should you do?
A. On a single domain controller, use Windows Backup to restore
the System State data. Shut down and restart the computer. B. Shut
down and restart a single domain controller in directory services
restore mode. Use Windows Backup to restore the System State data.
Run the Ntdsutil utility. Restart the computer. C. Shut down and
restart a single domain controller by using the Recovery Console.
Use Windows Backup to restore the System State data. Exit the
Recovery Console. Restart the computer. D. Shut down and restart
each domain controller by using the Recovery Console. Use Windows
Backup to restore the Sysvol folder. Exit the Recovery Console.
Restart the computer.
Answer: B
23. You back up all of the system state date for each domain
controller and place the date on a single tape.That tape is
currently attached to the srv1.west.litware.com computer.To which
server or servers can you restore the system state from
srv1.west.litware.com(choose all apply) A.srv1 B.srv2 C.srv3 D.srv4
E.srv5 F.srv6
Answer: A
24. Your Windows 2000 Server computer contains a stripe set with
parity on a four-disk array. You convert the stripe set with parity
to a dynamic RAID-5 volume. Six months later, users report that disk
access on the server is slower than it had been on the previous day.
You use Disk Management and discover that the status of the third
disk in the array is missing. You want to recover the failed RAID-5
volume. What should you do first?
A. Replace the third disk and restart the server. Use Disk
Management to repair the volume. B. Ensure that the third disk is
attached to the server and has power. Use Disk Management to
reactivate the disk. C. Ensure that the third disk is attached to
the server and has power. Use Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the
new disk. Restart the computer and allow Windows 2000 to
automatically repair the volume on the extended partition.
Answer: B
25. You install your boot volume on volume C on your Windows 2000
Server computer. You mirror volume C on dynamic Disk 1. Two years
later, during routine server maintenance, you open Disk Management
and find that the status of volume C is Failed Redundancy. The
status of Disk 1 is Missing. You attempt to reactivate Disk 1, but
the status of volume C does not return to Healthy. What should you
do next?
A. Replace Disk 1 and restart the computer. The mirror will
automatically regenerate. B. Remove the mirror on Disk 1, replace
the disk, and then add back the mirror to the new Disk 1. C. Replace
Disk 1 and copy all data from volume C to a new NTFS primary
partition on the new Disk 1. Restart the computer. D. Rescan the
disks, remove the mirror, and delete the data on Disk 1. Then
re-create the mirror.
Answer: B
26. You are the administrator of Windows 2000 Server computer.
Your computer has a span volume that consists of areas on three
physical hard disks on the server. The three disks support hot
swapping. You regularly backup the span volume by using windows
backup. One of the disk fail, you replace the disk with a new
un-partitioned disk. You want to recover the span volume and disk
data as soon as possible. What should you do?
A. Extend the span volume to include the new disk, rescan the
disk. B. Extend the span volume to include the new disk, shut down
and restart the server, use windows backup to restore the data. C.
Re scan the disk, format the span volume. Use windows back up to
restore the data. D. Re scan the disk, extend the span volume to
include the new disk. Shut down and restart the server, use windows
backup to restore the new data. E. Re scan the disk, remove the span
volume and create a new span volume that includes the new disk.
Format the span volume, use Windows back up to restore the data.
Answer: E
27. You install a Windows 2000 Server computer on your network.
You place several shared folders on a 12-GB primary partition
formatted by FAT32. During nine months of continuous operation, the
number of users who access the server and their access frequency
remains constant. The average size of the files on the server
remains approximately constant. After the server runs continuous for
nine months, users report that the server does not retrieve files
from the shared folders as fast as when you first installed the
server. What should you do to resolve the problem?
A. Convert the disk that contains the shared folders to a dynamic
disk. B. Convert the partition that contains the shared folders to
NTFS. C. Defragmenter the disk that contains the shared folders. D.
Move the paging file to the partition that contains the shared
folders.
Answer: C
28. Your Windows 2000 Server contains two hard disks. Each disk
is partitioned as a single primary partition. The first disk is
formatted as FAT32, the second as NTFS. You compress shard folders
on second disk. When users move compressed files from a Shared
folder on the second disk to a shared folder on the first disk, the
files lose their compression. What two actions should you take to
ensure that all files moved from folders on the second disk to
shared folders on the first disk remain compressed?
A. Convert the first disk to NTFS. B. Compress the shared folders
on the first disk
Answer: A, B
29. You have two Windows 2000 servers, SRV1 and SRV2. SRV1 has a
spanned volume over three physical disks. These disks support hot
swapping. The drive letter that the spanned volume uses on SRV1 is
not currently in use on SRV2. You want to move the three disks to
SRV2, using the same drive letter as SRV1. You back up the spanned
volume. What should you do next??
A. Move the disk from SRV1 to SRV2. B. on SRV1 rescans the disks.
On SRV2, rescan the disks
Answer: A, B
30. You install the boot volume D on your Windows 2000 Server
computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1.
One year later, during routine server maintenance, you open Disk
Management and find that the status of volume D is Failed
Redundancy. The status of Disk 1 is Online (Errors). A symbol with
an exclamation point appears in the graphical view of the disk. You
want to return the status of the boot volume to Healthy. What can
you do? (Choose two.)
A. Break the mirror, delete the volume on Disk 1, and re-create
the mirror. B. Replace Disk 1, copy the data from the boot volume to
the new disk, and then use Disk Management to rescan the disks. C.
Replace Disk 1, Ensure that the new disk is a basic disk, and repair
the volume. D. Reactivate the mirror on Disk 1. E. Convert Disk 1 to
a basic disk, and reconvert it to a dynamic disk.
Answer: A,D
31. Your hard-drive configuration is as follows and one of your
drives fails.
Controller label 1 Disk label EIDE Controller 0 EIDE Disk 0 and
Disk 1
Controller label 2 Disk label SCSI Controller 1 SCSI Disk 0, 1,
2, 3, 4, 5, 6
The disk that fails is multi(1)disk(0)rdisk(1)partition(1). Place
an "X" on the drive that has failed in the configuration below: ID
Disk
A. EIDE 0 (disk 1) B. EIDE 1 (disk 2) C. SCSI 0 (disk 1) D. SCSI
1 (disk 2) E. SCSI 2 (disk 3) F. SCSI 3 (disk 4) G. SCSI 4 (disk 5)
H. SCSI 5 (disk 6)
Answer: D
32. You share a folder on a Windows 2000 Server computer for
users in your company's London office. You place several subfolders
in the London folder as shown in the exhibit. The Marketing-2 folder
is compressed. You want to move some files from the Research folder
into Marketing-2, and you want to make sure that the files are
compressed when you move them. However, you do not want to compress
the remaining files in Research. What should you do?
A. Move each of the files from Research to Marketing-2. B. Copy
the files from Research to Marketing-2, and then delete the original
files. C. Compress Research, apply changes to the folder only, and
then move the files from Research to Marketing-2. D. Encrypt
Marketing-2, move the files from Research to Marketing-2, and then
decrypt Marketing-2.
Ans:B
33. Trey Research has a Windows 2000 Server computer named
User_srv. This computer has a RAID-5 controller. The RAID array is
configured as two partitions. Drive C is a 2-GB partition that holds
the operating system and paging file. Drive D is a 30-GB partition
that will hold the home folders for 200 users. Trey Research employs
10 scientists. The user accounts for scientists are members of a
group named Scientists. The scientists use a data capture
application that generates files that can be lager than 100 MB. Trey
Research wants to use disk quotas. Ordinary users should be allowed
to store a maximum of 75 MB of data is their home folder. The
storage for users in the Scientists group should not be limited by
quotas. What should you do to configure this disk quota scheme?
(Choose two.)
A. Enable quota management on drive D. Select the Deny disk space
to users exceeding quota limit Check box. Set the default quota
limit to 75 MB. B. Create a Scientist template account. Create a new
quota entry for this account. Select the Do not limit disk usage for
this entry option button. C. Create new quota entries for the 10
scientists' user accounts. Select the Do not limit disk usage for
this entry option button. D. Enable quota management on drive D.
Select the Deny disk space to users exceeding quota limit check box.
Select the Do not limit disk usage option button for the default
quota limit. E. Create a Scientist template account. Create a quota
entry for this account. Set the quota limit to 30 GB.
Answer: A, C
34. Your network contains 10 domain controllers, 10 member
servers, and approximately 1,000 client computers. All the servers
run Windows 2000 Server, and all the client computers run Windows
2000 Professional. Two of the domain controllers act as DNS servers.
Users of client computers use file sharing to grant access to files
stored locally. The network has 10 subnets and uses TCP/IP as the
only network protocol. You want to configure the network so that all
computers can resolve the addresses of all other computers by using
DNS. Client computers must be able to register and resolve addresses
if a server fails. How should you configure the DNS servers?
A. Configure one server with a standard primary zone for the
domain, and configure at least one server with standard secondary
zone. B. Configure one server with a standard primary zone for the
domain, and configure at least one server with an Active Directory
integrated primary zone. C. Configure one server with an Active
directory integrated primary zone for the domain, and configure at
least one server with a standard secondary zone. D. Configure at
least two servers with Active Directory integrated primary zones for
the domain. E. Configure at least two servers with standard primary
zones for the domain.
Answer: D
35. Your network is configured as shown in the exhibit.
"Engineering1 and Sales1 have DHCP installed up them." All the
servers are Windows 2000 Server computers that use TCP/IP as the
only network protocol. The sales department uses one subnet and has
servers named Sales1 and Sales2. The engineering department uses
another subnet and has servers named Engineering1 and Engineering2.
Sales1 and Engineering1 are configured to act as DHCP servers. The
router that joins the two subnets is not RFC 1542 compliant and does
not support DHCP/BOOTP relay. You want to allow Sales1 and
Engineering1 to support client computers on each other's subnets.
What should you do?
A. Set the router option in the DHCP Scopes to 192.168.2.1 for
Engineering1 and 192.168.1.1 for Sales1. B. On Engineering2 and
Sales2, install Routing and Remote Access, and configure RIP as a
routing protocol. C. On Engineering2 and Sales2, install and
configure the DHCP Relay Agent service. D. Configure Engineering2
and Sales2 as DHCP servers without any scopes.
Ans:C
36. Your network contains NetWare 4.0 Servers. You have
successfully installed Client Service for NetWare on Windows 2000
Professional computers, and Gateway Service for NetWare on Windows
2000 Server Computers. You recently added a new Windows 2000 Server
computer to the network and installed Gateway Service for NetWare on
it. However, the server is unable to connect to any NetWare servers.
What should you do on the new Windows 2000 Server computer to
resolve this problem?
A. Enable NWLink NetBIOS. B. Configure the NWLink IPX/SPX/NetBIOS
Compatible Transport Protocol to use the correct Ethernet frame
type. C. Install RIP routing for IPX. D. Install the SAP Agent.
Answer: B
37. Your network uses the TCP/IP protocol for its Windows 2000
prof and win2000 NT computers. You have ooneserver that acts as both
a Wins server, and a DNS server. All the client computers are
configured to use this server for DNS and WINS. Users of Windows NT
Workstation cannot connect to file server, but Windows 2000
professional users can. This server has a static address off
192.168.1.11. What should you do to allow the Windows NT Workstation
computer to connect to the file server??
A. Select the Enable NetBIOS over TCP/IP. B. Add the WINS address
used by the Windows NT Workstation computers.
Answer: A, B
38. You are the administrator of your company's network. You are
configuring the security policy for a group of users in the finance
organizational unit (OU). You need to configure a group policy so
that future changes to group policy will be applied within 15
minutes to any computers that are log on to the network. What should
you do?
A. Enable the background refresh settings to use the default
group policy refresh date. B. Enable the asynchronous group policy
application settings. C. Enable and configure the group policy
refresh interval for domain controller. D. Enable and configure the
group policy refresh interval for computers.
Answer: D
39. You have configured a Group Policy Object (GPO) for the
marketing organization unit (OU) to prevent users from accessing My
Network Places and from running System in Control Panel. You want
the Managers Domain Local Group to be able to access My Network
Places, but you still want to prevent them from running System in
Control Panel. What should you do?
A. Add the Managers group to the access control list of the GPO.
Disable the permission of the managers group to read and apply the
Group Policy. B. Add the Managers group to the access control list
of the GPO. Deny the permission of the managers group to read and
apply the Group Policy. C. Create a second GPO in the OU. Add the
Managers group to the access control list. Allow the managers group
to apply the Group Policy. Deny the Authenticated Users group
permission to read and apply the Group Policy. Configure the new GPO
to deny the ability to run system Control Policy Panel. Give the
original GPO a higher priority than the new GPO. D. Create a second
GPO in the OU. Add the Managers group to the access control list.
Allow the managers group to apply the Group Policy. Disable the
Authenticated Users group permission to read and apply the Group
Policy. Configure the new GPO to allow access to My Network Places.
Give the original GPO a higher priority than the new GPO.
Answer: D
40. You are the administrator of a Windows 2000 Active Directory
Network. The network consists of a single domain named adatum.local
that runs in native mode. The domain includes 500 member client
computers, consisting of 200 Windows 2000 Professional computers and
300 Windows NT Workstation 4.0 computers. You create a Group Policy
for the Research organizational unit (OU) and configure the Policy
as shown in the exhibit. None of the users in the Research OU
working at Windows 2000 Professional computers can change the
wallpaper on their desktops or the resolution and colour depth of
their displays. However, when users log on from any of the Windows
NT Workstation computers in the OU, they can change all display
settings. You want to restrict all users of Windows NT Workstation
computers in the OU from changing their desktop wallpaper and from
accessing the settings tab in Display in Control Panel.What should
you do?
A. Add a new computer to the OU and select the "Allow Pre-Windows
2000 computers to use this account" check box. B. Change the Group
Policy so that it also hides the Background tab. C. Create a
seperate Group Policy for a nested OU that contains all Windows NT
computers. D. Configure a Windows NT Policy file and place it in the
winnt\sysvol\Adatum.local\scripts folder on the PDC emulator.
Answer: B
41. Your company has a Routing and Remote Access server at its
main office. One of the company?¦s branch offices also runs Routing
and Remote Access on a server that has one modem. This server is
configured to use demand-dial routing to connect to the main office.
This server is part of the company?¦s Active Directory domains. The
domain runs in native mode. Some employees at this branch office use
the branch office same to access their files from here. The manager
of the branch office reports that sometimes none of the user in the
office can connect to the main office. When you examine the event
log on the branch office server to find that users have been
connecting to the server during working hours. The manager wants
users to be able to dail in to the server between 6:00p.m. and
8:00a.m. However, the manager still wants users to be able to log on
at any time when connected directly to the LAN.
A. Change the logon hours for user’s accounts to deny between
8:00a.m. and 6:00p.m. B. Set the remote access policy to deny
connection between 8:00a.m. and 6:00p.m. C. Create one batch file to
start Remote Access Connections Manager server, and create another
batch file to stop it. Schedule the stop batch file to run at
8:00a.m. every day and the start batch file to run at 6:00 p.m.
every day. D. Create two user accounts for each user. Grant dail-in
permission for an account and deny dail-in permission to second
account. Change the login hour for the dail-in accounts to de logon
between 8:00 a.m. and 6:00p.m.
Answer: B
1- Installing Windows 2000
1. You plan to install Windows 2000 Server on 10 new computers on
your company's network. These servers will provide file and print
services to departments within the company. The computers have
identical hardware and will use the same software configuration. You
plan to use a centralized copy of the Windows 2000 installation
files, which are stored on an existing Windows 2000 Server computer.
Which three actions should you take to install Windows 2000 Server
on the new computer? (Choose three.)
A. Create a set of installation boot disks by using Makeboot.exe.
B. Create an MS-DOS network boot disk. C. Create an Unattend.txt
file by using Setup Manager. Create a UDF file that identifies the
names of the new computers. D. Create a UDF file by using setup
manager. Create an Unattend.txt file that identifies the names of
the new computers. E. Begin the installation process by running the
Winnt command with the /S, /U, and /udf switches. F. Begin the
installation process by running Winnt32 command with the /s,
/unattend, and /udf switches.
Answer: B,C,E
2. You plan to install Windows 2000 Server on 10 new computers.
These servers will provide file and print services in branch offices
of your company. The company wants each branch office to purchase
its own copy of Windows 2000 Server. The installation in each branch
office should use the serial number associated with the branch
office's own copy. You want to install, configure, and test Windows
2000 server on these computers at the main office before shipping
the computers to the branch offices. You want users in the branch
offices to enter the computer names and serial numbers when they
receive the computers. What should you do?
A. Install Windows 2000 server on the computers by using an
unattend.txt file, and then use the Registry Edition to remove the
computer name and license details. B. Start the installation process
from an MS-DOS boot disk. Install windows 2000 server on the
computers from an existing server by running the winnt command with
the /PreInst switch. C. Install Windows 2000 server on the computers
and then use setup manager to create a sysprep.inf file for
sysprep.exe. Place the sysprep.inf file on the computers and run the
sysprep - nosidgen command. D. Create an unattend.txt file by using
Setup Manager. Include the following line in the Unattend.txt file:
oemPreinstall=Yes. Use the file to perform the installation.
Answer: C
3. You are installing Windows 2000 Server on a multiprocessor
computer. The manufacturer has provided a customized HAL to use with
the computer. The HAL is on the floppy disk. You want to install the
customized HAL design for the computer. What should you do?
A. During the text mode portion of the Windows 2000 setup install
the customized HAL. B. After text mode portion of Windows 2000 setup
is complete use the recovery console to copy the customized HAL to
the system32 folder on the boot partition. C. After the text mode
portion your windows 2000 setup is complete use the emergency repair
process to replace the existing HAL with the customized HAL and then
continue the windows 2000 setup. D. After the Windows 2000 setup is
complete use the device manager to scan for Hardware changes when
prompted install the customized HAL.
Answer: A
4. You want to install Windows 2000 server on 15 new computers.
You want to install, configure and test all 2000 servers before
shipping them to your branch offices. You want the users at the
branch offices to enter the serial numbers and computer names once
they receive the computers. What should you do?
A. Install Windows 2000 server on the computers. Use Sysprep.exe
to create the Unattend.txt file, place file on the root of the
drive. B. Install Windows 2000 server on the computers. Use Setup
Manager to create a sysprep.inf file for use with sysprep.exe Place
the sysprep.inf on the computers and run sysprep -noidgen. C. Create
an Unattend.txt file by using Setup Manager. Create a UDF file that
identifies the names of the new computers. D. Create a UDF file by
using setup manager. Create an Unattend.txt file that identifies the
names of the new computers.
Answer: B
5. Your network includes windows 98 computers and Windows 2000
Professional computers. You are adding a new computer to the
network. You plan to install Windows 2000 Server computer on the new
computer. The computer has one 20 GB hard disk with no partition
defined. The Windows 2000 Server computer CD ROM is unavailable. You
want to install windows 2000 server from the source files that are
located on a server on the network. You also want the entire hard
disk of the new computer to be used for the system partition. What
should you do?
A. On another windows 2000 computer use makebt32.exe to create
installation startup disks. Start the computer by using the first
disk. B. On another Windows 2000 computer format a floppy disk. Copy
NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the
computer by using the disk. C. Start the new computer by using the
Windows 98 network boot disk. Connect to the server. Run
dsclient.exe. Create and format 20GB FAT32 partition. D. Start the
new computer by using the Windows 98 network boot disk. Create and
format a single FAT32 partition. Connect to network server. Run
winnt.exe. E. Start the computer by using Windows 98 network boot
disk. Create and format a single Fat 32 partition. Start the new
computer by using the Windows 2000 emergency repair disk.
Answer: D
6. You are the administrator of a network that consists of a
single Windows NT 4.0 domain. The network contains five Windows NT
Server domain controllers and 1,000 Windows NT Workstation client
computers. You want to install Windows 2000 Server on a new
computer. You want the new computer to act as a domain controller in
the existing domain. What should you do?
A. On the new computer, install Windows NT Server 4.0 and
designate the computer as a BDC in the existing domain. Promote the
computer to the PDC of the domain. Upgrade the computer to Windows
2000 Server. B. On the new computer, install Windows NT Server 4.0
and designate the computer as a PDC in a new domain that has the
same NetBIOS name as the existing Windows NT domain. Upgrade the
computer to Windows 2000 Server. Use Active Directory Sites and
Services to force synchronization of the domain controllers. C. Shut
down the PDC of the existing Windows NT domain from the network. On
the new computer, install Windows 2000 Server, and then run the
Active Directory Installation wizard to install Active Directory,
specifying the same NetBIOS name for the Windows 2000 domain as the
existing Windows NT domain. D. Shut down the PDC of the existing
Windows NT domain from the network. On the new computer, install
Windows 2000 Server, and then run the Active Directory Installation
wizard to install Active Directory as a replica in the existing
Windows NT domain. Promote the new computer to the PDC of the
domain. Restart the Windows NT PDC on the network and demote it to a
BDC.
Ans:A
7. The company has 50 offices. The employees in these offices
have limited knowledge of Windows 2000. Each employee has a network
between 5-20 client computers. The office networks are not connected
to any other networks. The company is buying 50 identical computers
to run Windows 2000 server in these offices. These servers must be
installed to company’s standard configuration. You create a setup
information file (SIF) that specifies the company’s data
configuration. You want to automate the installation process as much
as possible in the least possible amount of time. What should you
do?
A. Use the makebt32.exe to create 4 installation setup disks and
add the SIF to the first disk. Instruct an employee at each office
to start the installation by using these. B. Create MS-DOS boot disk
that contain CD ROM driver and the SIF and that runs WinNT
/S:D:\I386 command. Instruct an employee at each office to start the
installation by using this disk. C. Create a floppy disk that
contains only SIF. Instruct an employee at each office to start the
installation by using the Windows 2000 server CD-ROM with the floppy
disk inserted after startup. D. Create a Windows 2000 folder on the
hard disk, copy the Windows 2000 Server CD-ROM to the folder, add
the SIF to the folder. Copy the folder to the writable CD. Instruct
an employee at each office to start the installation by using this
CD.
Ans:C
8. You want to upgrade a Windows NT Server 4.0 computer named
Server34 to Windows 2000 Server. Server34 is a member server in a
Windows 2000 domain named marketing.fabrikam.local. The domain runs
in native mode. You want to change the role of Server 34 from a
member server to a domain controller in the same domain. What should
you do? (Choose two.)
A. Reinstall Windows NT Server 4.0 on Server 34 in the same WINNT
folder, and make Server 34 a BDC in the marketing domain. B. Use
Server Manager on Server34 and promote Server34 to a PDC for the
marketing domain. C. Upgrade Server34 to Windows 2000 Server. D. Run
the Active Directory Installation wizard to make Server34 a domain
controller in the marketing.fabrikam.local domain. E. Run the Active
Directory Installation wizard to convert Server34 to a domain
controller in the fabrikam.local domain.
Answer: C,D
9. You have four different distribution shares on your network
for Windows 2000 Server installations. A new service pack was just
announced. What should you do to make the service pack available for
future installations?
A. Copy the service pack's driver.cab to the distribution
"share", as well as layout.inf, dosnet.inf and txtsetup.sif B. Use
update /slip to apply the service pack to each "share". C. Copy the
layout.inf, dosnet.inf and txtsetup.sif files to each distribution
"share". D. Use sysdiff /diff to apply the service pack to each
"share".
Answer: B
10. You are the administrator of the network with winnt4.0 and
Unix computers the n/w consists of a single winNT4.0 domain you are
upgrading winnt4 server named server1 to win2000 server which is the
BDC of the domain. The existing DNS server is the Unix computer that
supports SRV service records and is configured to accept dynamic
updates the existing WINS server in another win-not server computer.
You want to configure server-1 as DC in Active Directory forest you
want the existing win-nt domain to upgraded to Active Directory. You
plan to upgrade the other DC in the domain to win2k after the
upgrade of server-1 is complete you want to upgrade
ANS. Change into PDC first
2- Managing and Troubleshooting Access to Resources
Printing
11. You are the administrator of a Windows 2000 Server network at
Blue Sky Airlines. You configure a server named
print10.marketing.blueskyairlines.local as a print server at the Los
Angeles site. You create and share a variety of printers on the
server for use by employees in the marketing.blueskyairlines.local
domain. You want to review the configured properties of all of the
shared printers on the print10.marketing.blueskyairlines.local
server. You want to perform this review from a Windows 2000
Professional computer at the London site of Blue Sky Airlines. What
should you do?
A. Use your Web browser to connect to
http://print10.marketing.blueskyairlines.local/printer. B. Use your
Web browser to connect to
http://print10.blueskyairlines.local/printer. C. Run the net view
\\print10 command. D. Run the net view \\print10.blueskyairlines.com
command.
Answer: A
12. Your network uses TCP/IP as the only network protocol.
Devices on the network are configured to use IP address from the
private 10.0.0.0 range. All the client computers on the network runs
Windows 2000 Professional. The network includes Windows 2000 Server
computers and UNIX servers. User's print jobs are sent to shared
printers on a Windows 2000 Server computer named PrintServ that
directs the print jobs to print devices attached directly to the
network. You have a high-capacity print device that is attached to
one of the UNIX servers. The UNIX computer uses the LPR printing
protocol, and it's IP address is 10.1.1.99. The name of the printer
queue is GIANT. You want users to be able to connect to this printer
from their computers.
What should you do?
A. Install Microsoft Print Services for Unix on PrintServ. Create
a network printer on users' computers, and specify that the printer
URL is LPR://10.1.1.99/GIANT. B. Install Microsoft Print Services
for Unix on users' Computers. Create a network printer, and specify
that the printer name is \\10.1.1.99\GIANT C. Create a network
printer on PrintServ, and specify that the printer name is
\\10.1.1.99\GIANT. Share this printer and connect to it from users'
computers. D. Create a local printer on PrintServ. Create a new
TCP/IP port for an LPR server at address 10.1.1.99 with a queue name
of GIANT. Share this printer and connect to it from users'
computers.
Ans:D
13. You are the administrator of a Windows 2000 Server network
that runs in mixed mode. You install a new Windows 2000 Server
computer. You create and share a new HP LaserJet 4L printer. Your
Windows 2000 Professional client computers can print to the new
printer successfully. However, when users try to connect to the
printer from Windows NT Workstation 4.0 client computers, they
receive the dialog box shown in the exhibit. "The server on which
the printer resides does not have a suitable HP LaserJet printer
driver installed". You want the printer driver to be installed
automatically on the Windows NT Workstation computers. What should
you do?
A. Copy the Windows NT 4.0 Printer Drivers to the Netlogon shared
folders on all Windows NT Server 4.0 computers still configured as
BDCs. B. Copy the Windows NT 4.0 printer drivers to the Netlogon
shared folder on the PDC emulator C. Change the sharing options on
the printer to install additional drivers for Windows NT 4.0 or
Windows 2000. D. Copy the Windows NT 4.0 printer drivers to the
Winnt\System32\printers\drivers folder on the Windows 2000 print
server.
Ans:C
14. You are the administrator of a Windows 2000 network. You have
installed two shared printers for a print device on a Windows 2000
Server. Both printers are available to all users. They are shared as
Admin and Executive. Admin is configured with a priority of 90,
Executive is configured with a priority of 50. Now, you are advised
to prevent the printer Executive to be visible to all users. Only
members of the Executive group should be able to print to Executive.
What should you do?
A. Allow the Executive Group print permission only. Remove the
sharename Executive and add the sharename Executive$. Reconnect all
members of the Executive Group to the new sharename. B. Install a
second printer driver for the print device. Set NTFS permissions to
the new driver files so that only the Executive Group is allowed to
access the files. C. Deny print permission to the Everyone Group. D.
Change the priority of Executive to 99, so that ...........
Answer: A
Permissions
15. You are a member of the Enterprise Admins group at Trey
Research. You create and share a printer named HPColorL2 on a
Windows 2000 Server computer named pserver.treyresearch.local. You
grant Print permission only to the Domain Local group named
CompanySales. Later, you add a new child domain named
london.treyresearch.local. Clair Hector is a member of the global
group named LondonSales in the london.treyresearch.local domain.
Clair reports that she is unable to send a print job to the
HPColorL2 printer. You want all members of the LondonSales group to
be able to print to the HPColorL2 printer. What should you do?
A. Add the LondonSales group to the CompanySales group. B. Add
the CompanySales group to the LondonSales group. C. Change the
CompanySales group to a universal group. D. Change the LondonSales
group to a universal group.
Answer: A
16. Your company's network includes Windows 3.1 client computers,
Windows 95 client computers, and Windows 2000 Professional client
computers. The company's manufacturing facilities run 24 hours per
day. The company has developed its own 32-bit application that
collects information from the manufacturing process so that workers
on one shift can find out that was manufactured during the previous
shift. The company wants to make the application available on all of
the client computers by using Terminal Service on a Windows 2000
Server computer. This server will not run as a domain controller.
You install Terminal Services. The information technology (IT)
department needs to be able to remote control users' sessions to
support and troubleshoot the application. What should you do to
enable the IP department to control users' sessions?
A. Configure the Terminal server to run in Remote Administration
mode. B. Grant the IT department Full Control permission to the
Remote Desktop Protocol (RDP) on the Terminal server. C. Add the
members of the IT department to the Power Users group on the
Terminal server. D. Use third-party software to enable remote
control of users' sessions.
Answer: B
17. You install Terminal Services on a Windows 2000 domain
controller. You install Terminal Services Client on users' client
computers. Users report that when they try to connect to the
Terminal server, they receive the following error message: "The
local policy of this system does not allow you to logon
interactively." When you attempt to log on to the Terminal server as
an administrator from a user's computer, you log on successfully.
You want users to be able to log on to the Terminal server. What
should you do?
A. Grant the users the right to log on as a service. B. Grant the
users the right to log on locally. C. Grant the users the right to
log on over the network. D. Copy the users' profiles to the Terminal
server. E. Copy the users' home folders to the Terminal server.
Answer: B
18. You are the administrator of home.office.local.com domain.
You want to create a shared printer for the company's executives so
that they do not have to wait for their documents to print when
default printer's queue contains a large number of documents. You
configure a new high priority printer and want to set permissions on
groups shown in the exhibit. The groups were:
Administrator Creator Owner Everyone Executives Print Operators
Server Operators
You select the checkbox to allow Print permissions for Executives
group. You want only Administrators, Print Operators, and Server
Operators & Executives to be able to print. What should you do?
(Select all that apply)
A. Remove the Everyone group. B. Select checkbox to Deny Print
permission to Everyone C. Select checkbox to Deny Manage Documents.
D. Select all Deny for the Everyone group E. Clear all allow
checkboxes for the Everyone group
Answer: A, E
19. You are administrator of a Windows 2000 network. The network
includes a Windows 2000 Server computer that is used as a file
server. More than 800 of your company client computer are connected
to this server. A shared folder named DATA on server is on an NTFS
partition. The data folder contains more than 200 files. The
permissions for the data folder are shown in the following table.
TYPE OF PERMISSION ACCOUNT PERMISSION
DATA Share Permissions Users: Change DATA NTFS Permissions Users:
Full Control
You discover that users are connected to the DATA folder. You
have an immediate need to prevent 10 of the files in the DATA folder
from being modified. You want your actions to have the smallest
possible effects on the users who are using other files on the
server. What TWO actions should you take?
A. Modify the NTFS permissions for the ten files. B. Modify the
NTFS permissions for the DATA folder. C. Modify the shared
permissions for the DATA folder. D. Log off the users from the
network. E. Disconnect all Users from the DATA folder.
Answer: A, E
20. You are the administrator of a Windows 2000 Server computer.
A folder named HR-Data on the system partition of the server is
shared on the network as HR-Data. The owner of the HR-Data folder is
Administrators. The share permissions and NTFS permissions are shown
in the following table.
HR-Data Folder Share permissions HR-Data Folder NTFS permissions
Everyone: Full Control Domain Admins: Read Katrin: Full Control
Katrin creates a file in the HR-Data folder. She sets the NTFS
permissions for the file to list only herself on the access control
list, with Full Control permission. Katrin then leaves on vacation
and cannot be contacted. Later, you discover that the file contains
sensitive information and must be removed from the server as soon as
possible. You want to delete the file without modifying any of the
permissions of other files in the HR-Data folder. You want your
actions to have the least possible impact on users who may be using
other files in the HR-Data folder. You want to use the minimum
amount of authority necessary to delete the file. What should you
do?
A. Grant yourself Full Control permission for only the HR-Data
folder and not its files and subobjects. Delete the file. Then
remove Full Control permission for the HR-Data folder. B. Take
ownership of the HR-Data folder. When prompted, take ownership of
existing files. Grant yourself Full Control permission for the file.
Delete the file. C. Take ownership of the file. Grant yourself
Modify permission for the file. Delete the file. D. Grant yourself
Modify permission for the HR-Data folder and its subobjects. Delete
the file. Then remove Modify permission for the HR-Data folder.
Ans:C
21. Your Windows 2000 Server network has two single domains named
Corp and Finance. The company president logs onto the Corp domain as
Susan. The two vice-presidents and Susan are members of the Corp
Managers global group in the Corp domain. Susan requires read
permission for the salary directory in the Finance domain. The
Account Managers local group in the Finance domain has change
permission for the salary directory. No one else should have access
to the salary directory. How should you plan you network to allow
required access?
A. Configure the Finance domain to trust the Corp. domain. Make
Susan a member of the Account Managers Group. B. Configure the Corp.
domain to trust the Finance domain. Create a local group named
account read in the Finance domain and assign it read permission for
the salary directory. Make Susan a member of the account read group.
C. Configure the Finance domain to trust the Corp. domain. Create a
local group named execs in the Finance domain and assign it read
permission for the salary directory. Make Susan a member of the exec
group.
Ans:C
22. A computer named Station01 belongs to a domain called Sales.
Jason wants to add another Windows NT computer named Station02 to
the Sales domain. Jason disconnects Station01 from the network, and
renames Station02 to Station01. However, the computer cannot
participate in domain administration of the Sales domain. What is
the most likely cause of the problem?
A. The Sales domain already has the maximum number of computer
connected accounts. B. There is another computer named Station0l in
a trusted domain. C. There is another computer named Station0l in a
trusting domain. D. Simply renaming the computer does not make the
computer join the Sales domain.
Ans:D
23. You are the network administrator for your company. The
company has numerous branch offices, and each office uses Internet
Connecting Sharing to connect to the Internet. A new employee named
David Johnson is configuring a Windows 2000 Server computer as a
file server. When David uses Windows update for the first time and
select Product Update, he receives an error message stating that
access is denied. David needs to be able to update the file by using
his account. What should you do?
A. Configure the settings for Internet Connecting Sharing to
allow POP3 access. B. Configure the settings for Internet Connecting
Sharing to allow SMTP access. C. Give David's user account
administrator privileges on the Windows 2000 Server computer. D.
Instruct David to log on as a domain administrator on the Windows
2000 Server computer.
Ans:C
24. You are the administrator of a Windows 2000 Server computer
named Server1. You create a Distribute file system (Dfs) root named
Public. You add a shared folder named Docs as a Dfs node under the
root. The share permissions and NTFS permissions for Public and Docs
are shown in the following table.
Folder Share permissions NTFS permissions
Public Everyone: Read Domain Admins: Full Control Everyone: Read
Docs Users: Read Domain Admins: Full Control Training: Full
Control Domain Admins: Full Control
A user named Maria is a member of the Users and Training user
groups. When Maria attempts to save the file
\\Server1\Public\Docs\memo.doc, she receives the following error
message: "Access denied." You want Maria to be able to change and
delete all files in the Docs folder. You do not want her to have
more access than necessary. What should you do?
A. Add Maria to the Domain Admins group. B. Add Maria to the
local Administrators group. C. Set the share permissions for the
Public folder to grant Maria Full Control permission. D. Set the
share permissions for the Docs folder to grant Maria Change
permission. E. Set the NTFS permissions for the Public folder and is
sub objects to grant Maria Modify permission. F. Set the NTFS
permissions for the Docs folder and its sub objects to grant Maria
Full Control permission.
Answer: D
25. Your company has a human resources (HR) manager named Sean
Chai. He keeps your company's confidential HR files in a shared
folder. To increase the security of the HR files, Sean set the
folder to encrypt the files. Sean leaves the company without
resetting the permissions and encryption settings for the HR files.
The files must be made accessible to the new HR manager. Which two
actions should you take to allow this access? (Choose two.)
A. Set the file permissions on the HR files to allow access to
the new manager. B. Back up the shared folder to tape and restore
the files to a different folder. C. Log on as an administrator and
remove the encryption attribute from the HR files. D. Log on as the
new manager, connect to the shared folder, and run the cipher /e /s
. command. E. Configure the new manager's account to be an Encrypted
Data Recovery Agent for Sean's account.
Answer: A, C
26. You are the network administrator at Humongous Insurance, a
major insurance comapny that has 1,000 offices world wide. You are
configuring the network so that only the sales staff can connect to
it from home. Your Windows 2000 forest contains a member server
named SV1 that has Routing and Remote Access for Windows 2000
enabled. You configure SV1 to use a modem bank to accepr incoming
dial-up attempts. You configure SV1 to use Windows Authentication as
the authentication Provider. The only supported authentic method is
MS CHAP V2. You need to restrict access to SV1. What should you do?
A. Create an OU named SS. Populate SS with the sales staff user
accounts. Provide access to this OU by using the
Client-Friendly-Name attribute of the default remote access policy.
B. Create an OU named SS. Populate SS with the sales staff user
accounts. Provide access to this OU by using the Windows-Group
attribute of the default remote access policy. C. Create a new
remote access policy. Add the Everyone group to this policy by using
the Windows-Group attribute in the properties of each sales staff
user acounts. Control dial-in access through remote policy. D.
Create a Windows 2000 global group. Populate this global group with
the sales staff user accounts. Provide access to the global group by
using Windows-Group attributes of the default remote access policy.
Answer: A
27. Some applications on your company network use defined domain
user accounts as their service accounts. Each computer that runs one
of these applications should have the respective service account in
the Local Administrators Group. Currently, you individually place
these service accounts in the Local Administrators Group on the
appropriate Windows 2000 Professional computers. You need to
centralize this process. What should you do?
A. Add the applications service accounts to the Domain
Administrator Group. B. Add the applications service accounts to the
Local Administrator Group. Use the Restricted Groups option in each
computer's local group policy. C. Add the applications service
accounts to the Local Administrator Group. Use the Restricted Groups
option in an OU Group Policy. D. Add the applications service
accounts to the Local Administrator Group. Use the Restricted Groups
option in a Domain Group Policy.
Answer: D
28. You are a member of the domain backup operators group in a
remote office for a large company. You are responsible for
manufacturing the system state of a new Windows 2000 member server
named members. You installed recovery console onto the hard disk of
member1. you have Windows 2000 backup to create a backup of the
system state data. You store the backup files on the hard disk in a
folder named systemstate. A member in the domain admins group
changes the name of member 1 to CR45uu in order to adhere to a new
naming standard. One of the applications on CR45uu no longer
functions after the name change. You use the restore wizard to
restore system state data. Then you restart the server but you
cannot log on to the server afterward. You need to be able to log on
to the server. What should you do?
A. Log on to the server by using the local administrator account.
B. Log on to the server by using a domain administrator account. C.
Use recovery console to restore the system state data. D. Use
recovery console to perform a full restore from a recent backup.
Ans:B or ????
Internet
29. You are the network administrator for your company. Mike Nash
is a member of the Administration group, and Nate Sun is a member of
the Intern group. Both groups are in the same domain. On the
intranet server, the Administration group is placed in the Security
group, and the Intern group is placed in the Nonsecurity group. The
Security group is then granted Full Control permission for the Sales
virtual directory. Nate needs to update new sales information that
is located on the Sales virtual directory. What should you do so
that Nate can perform this task?
A. Enable Anonymous access for the intranet server. B. Enable
Anonymous access for the Sales virtual directory. C. Remove Nate
from the Intern group. D. Make Nate a member of the Security group.
Answer: D
30. You are the administrator of an Internet Bluesky Airlines.
You install and configure a new Windows 2000 Server computer named
server1.departments.blueskyairlines.com as an intranet server. The
server hosts the multiple departmental and resource WEB links to the
network and databases. You configure a ticketing WEB site. You also
configure a finance virtual directory in the department's WEB site
as shown in the Exhibit. "We see an exhibit (image) in which we see
the dir browsing enabling and person can see all the three". During
the first morning the new server is available and the user reports
that the only information they are seeing in their browser is a list
of HTM and ASP files. For security reasons what the first action you
need to take to disable the user ability to all the WEB sites in the
form of a list. What should you do?
A. Apply the settings to each child WEB sites. B. Clear the
directory browsing settings for the ticketing WEB sites and then
apply the settings to child virtual directories. C. Clear the
directory browsing checkbox for the department's WEB sites
Properties and then apply the settings to the child virtual
directory. D. Clear the directory browsing checkbox for the
financing virtual directory.
Answer: C
31. You are the administrator of the blue lines skys airlines.
You install intranet and configure new windows 2000 computer named
server1.department.blueline.com as an intranet server. The server
hosts multiple departmental and???? Web to the n/w and data site.
You also configure the finance virtual??? In the department web site
as shown in the exhibit. During first morning that the new server is
available. Users report that they can only see the information that
they see in the browser is the list of HTM and ASP files. For
security reasons the first action to take is to disable the users
ability to view the files of all web sites in the form of list. What
should u do?
A. Clear the directory-browsing check box for the server
properties and then apply setting to the child web sites. B. Clear
the directory-browsing check box for the ticketing web site and then
apply setting to the child virtual directory. C. Clear the directory
browsing check box for the departments web sites and then applies
the setting for the child virtual directory. D. Clear the directory
browsing check box for the financing web site.
ANS: A
32. You are the administrator of the Windows 2000 Server network
shown in the exhibit. Users in the Research group and the Executive
group have permission to access the Internet through a Windows 2000
Server computer running Microsoft Proxy Server. These users must
enter their proxy server user names and passwords to connect to the
proxy server, to the Internet, and to your local intranet server.
The users who do not access the Internet do not have user accounts
on the proxy server and, therefore, cannot connect to the intranet
server. You want all users to be able to connect to the intranet
server without entering a separate user name and password. What
should you do?
A. Move the intranet server to the client segment of the network.
B. Move the proxy server to the server segment of the network. C.
Configure each client computer to bypass the proxy server for local
addresses. D. Configure each client computer to use port 81 for the
proxy server.
Ans:C
33. You are the network administrator of the litware.com domain.
LitWare, Inc., has its main office in Dallas and branch office in
New York, Phoenix, and Seattle. A Windows 2000 Server computer named
web1.litware.com is running Internet Information Service (IIS). This
computer is located in the same office. Web developers in Dallas,
New York, Phoenix, and Seattle need to update each of the Web sites
and virtual directories located on web1.litware.com. Different
updates will be occurring simultaneously. You want to ensure that
each developer can use Microsoft FrontPage to update the sites
successfully and to manage content changes. What should you do?
A. Run the fpremadm command to install the server extensions for
IIS on web1.litware.com. Configure the server extensions for each
web site. B. Run the fpsrvadm command to install the server
extensions for IIS on web1.litware.com. Configure the server
extensions for each Web site. C. Install the server extensions for
IIS on web1.litware.com by selecting Upgrade Extensions from All
Tasks menu in IIS. Configure the server extensions for each Web
site. D. Configure the server extensions for each Web site by
selecting Configure Server Extensions from the All Tasks menu in
IIS. Configure the server extensions to allow each developer update
access for each Web site.
Ans:D
34. You install Internet Information Services 5.0 on a computer
running Windows 2000 Server. You create two new department web sites
for the Human Resources and Sales departments. You use host headers
to define these two new sites. You stop the Sales web site while a
developer updates the contents of the site. If a user attempts to
access the Sales site while it is stopped, what response will the
user receive?
A. The user will be redirected to an alternate default page for
the Sales site's home directory. B. The user will be redirected to
the Default Web site home page. C. The user will receive a 403.2 -
Read Access Forbidden error message. D. The user will receive a 404
- File Not Found error message
Ans:B
35. You are the administrator of a Windows 2000 Server computer
named Intra. Intra is a member of an Active Directory domain and
hosts an Intranet Web Site for your company. Company policy requires
that only authenticated users have acces to the intranet site. All
company users have a user account in the Active Directory domain.
You configure directory security for the Web Site to use integrated
security. However, you discover that users can access the Web Site
without authentication. You need to ensure that only authenticated
users can access the web site. What should you do?
A. Install Active Directory on the server. B. Select Basic
Authentication check box. C. Clear the Allow Anonymous Connection
check box. D. Disable the IUSE_inta user account on Intra. E. Clear
the Allow IIS to Control Password check box.
Answer: C
36. You are the administrator of a Windows 2000 Server computer.
The server hosts several web sites that have logging enabled. You
use a third-party reporting utility to analyze the log files
produced by the web sites. You notice that all data from 7:00pm to
midnight each night is included in the following day's logfile. You
want all data to be included in the correct day's log file. What
should you do?
A. Ensure that the log type is set to W3C. B. Change the log
rollover property in the website's logging properties. C. Change the
time zone setting in the time properties on the web server. D.
Configure the time service on the web server to use local system
account.
Answer: B
37. You are a recently hired network administrator at Awesome
Computer. Awesome Computer has an office in New York and Toronto.
Company network configured as:
Toronto Office: Windows 2000 Domain Controller Monitor1 with
community name of AwesomeA WebServer with community name of AwesomeA
New York Office:Windows 2000 domain Controller Monitor2 with
community name of AwesomeB ApplicationServer with community name of
AwesomeB
These two offices are linked to two routers with Internet between
the routers.You are responsible for monitoring all servers from
Monitor1. Monitor1 and Monitor2 are configured with Management
Console running third party network management software.
ApplicationServer and WebServer are configured as SNMP agents. You
discovered that you are unable to manage ApplicationServer from
Monitor1. What should you do?
A. Relocate the ApplicationServer to Toronto office. B. Move
ApplicationServer computer account to Toronto domain. C. Add
AwesomeA to the list of accepted community names on
ApplicationServer. D. Add public to the list of accepted community
names on ApplicationServer. E. Remove all community names from
ApplicationServer. F. Remove all community names from Monitor2.
Answer: C
Windows Installer
38. You are N/W administrator of a win2k server your n/w contain
five win2k server computer and 100 win2k professional computers. You
want to deploy an update for an application that is used to the
win2k professional computer. You want the users to automatically
install the update the driver when they logon the domain. What
should u do? (a) Create a DFS, place the application update and the
root folder of the DFS (b) Create an Ms windows installer package
for the application update and configure the RIS to use the package.
(c) Create a MS windows installer package for the application
update. Apply the package to the local computer policy on all the
computers. (d) Create a MS windows installer package for the package
update. Apply the package to the group policy
Answer: D
39. You are the administrator of a network that consists of
Windows 2000 Server computers and Windows 2000 Professional
computers. You want to configure the deployment of the most recent
Windows 2000 service pack so that users of the Windows 2000
Professional computers receive the service pack automatically when
they log on to the domain.
What should you do?
A. Create a Microsoft Windows installer package for the service
pack. Configure RIS to use the package. B. Create a Microsoft
Windows Installer package for the service pack. Configure the
package in a Group Policy. C. Create a Microsoft Windows Installer
package for the service pack. Configure the package in the Local
Computer Policy. D. Place the service pack in a Distributed file
system (Dfs).
Ans:B
User Profiles
40. Your company has a senior manager named Paul West. Paul uses
computers in two different offices. Paul's home folder is stored on
a server named UserServer. Paul works with many files that are
highly confidential. Paul keeps these files in a folder named
Confidential in his home folder. You need to maximize the security
of the Confidential folder. You also want Paul to be able to access
the folder from computers in each office. What should you do?
A. Obtain a signing and sealing certificate from a certificate
server for Paul's account, and install the certificate on the
computers that Paul uses. B. Log on at UserServer as the
administrator, connect to Paul's home folder, and set the encryption
attribute. C. Configure Paul's account to have a roaming user
profile, and instruct Paul to use folder properties to set the
encryption attribute for his folders. D. Add the cipher /e /s .
command to Paul's logon script.
Answer: C
41. You use computers in two different offices. You have folders
stored on a server named UserData01. You work with many files that
are highly confidential. You keep the confidential files in a folder
named Private in your home folder. You need to maximize the security
of the private folder. You also want to be able to access the folder
from computers in each office. What should you do? A. Obtain a
signing and sealing certificate for a certification server, and
install the certificate on the computers you use. B. Log on
UserData01 as a domain admin, connect to your known folder and set
the encryption attributes. C. Configure your account to use roaming
user profile. Use the properties of the Private folder to set the
encryption attributes. D. Add the cipher/e/s *.* to your computer's
start up script.
Answer: C
Terminal Services
42. Your company's network includes Windows 3.1 client computers,
Windows 95 client computers and Windows 2000 Professional client
computers. The company's manufacturing facilities run 24 hours per
day. The company has developed its own 32 bit application that
collects information from the manufacturing processes so that
workers on one shift can find out what was manufactured during the
previous shift. The company wants to make the application available
to all the client computers using terminal services on a Windows
2000 Server computer. The server will not run as a domain
controller. You install terminal services. Users want to collect
information on manufacturing processes from other shifts. The
company wants users to shut down their computers at the end of their
shifts and leave the applications running on the terminal server.
What should you do?
A. Set the delete temporary folders on exit setting for the
terminal server to NO. B. Set the remote desktop protocol on the
server to overwrite user settings and set end disconnected setting
to NEVER. C. At the terminal server grant the users the right to log
on as a batch job. D. Do NOTHING, user programs are always
terminated on disconnection.
Answer: B
43. Your company n/w includes Win3.x, win95 client computers and
win2000 prof. client computers the company manufacturing facilities
are 24 Hrs. a day .The company has developed its own 32bits
application that collects the information from the manufacturing
process so that workers from one shift can find out what was
manufactured in the previous shift .The company wants to make the
application available to all the client computers using terminal
services on the win 2000 server computer. This server is not
configured as DC .You install the terminal services. The IT
department needs to be control terminals services users session to
support and troubleshoot the application. What should you do to
enable the IT department to control users session
A. Configure the terminal server to run in remote administration
mode B. Grant the IT department full control to "RDP" on the
terminal server C. Add the members of the IT department to the power
users group to the terminal servers D. Use the third party software
to enable the control of the users section
Answer: B
44. You are the network administrator for your company. The
company has numerous branch offices, and each office uses Internet
Connecting Sharing to connect to the Internet. A new employee named
David Johnson is configuring a Windows 2000 Server computer as a
file server. When David uses Windows update for the first time and
select Product Update, he receives an error message stating that
access is denied. David needs to be able to update the file by using
his account. What should you do?
A. Configure the settings for Internet Connecting Sharing to
allow POP3 access. B. Configure the settings for Internet Connecting
Sharing to allow SMTP access. C. Give David's user account
administrator privileges on the Windows 2000 Server computer. D.
Instruct David to log on as a domain administrator on the Windows
2000 Server computer.
Answer: C
45. You are the network administrator for Island Hopper News. The
main office has a Windows 2000 workgroup that includes 5 Windows
2000 server computers and 10 windows 2000 Professional computers.
Currently no users at the main office have Internet access. Island
Hopper News has two remote offices, each with a Windows 2000
workgroup. None of the three offices is networked to another.
However, users at the remote office connect to the main office
individually to access network resources. A server named Member2 is
located at the main office. Member2 has two netowkr adapters.
Adapter1 and Adapter2. Adapter1 is connected to the LAN and Adapter2
is connected to a DSL modem which is connected to the Internet. To
provide users at the main office with internet access, you enable
internet connection sharing on Member2. Now some users at the main
office are still unable to access the Internet. You need to ensure
that local network resources are always accessible, and you need to
ensure that users at the main office have Internet access. What
should you do?
A. Configure Internet Connection Sharing (ICS) to be enabled on
Adapter1. B. Configure Internet Connection Sharing (ICS) to be
enabled on Adapter2. C. Configure Network Address Translation (NAT)
on Member2. D. Install a Proxy Server on the company's Network.
Answer: C
46. Your company has five branch offices, which are not
networked. On each side you have one Windows 2000 Server computer.
The offices WEST and EAST have servers named West1.Testsys.com and
East1.Testsys.com, which are configured with RRAS. You have to
connect these two branch offices through the internet via VPN. Users
from WEST should be able to connect to EAST and vice versa. (You see
a picture with five servers and the Internet between them) How
should you configure West1.Testsys.com and East1.Testsys.com?
A. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN
Server. B. West1.Testsys.com as VPN Server - East1.Testsys.com as
VPN Server. C. West1.Testsys.com as VPN Server - East1.Testsys.com
as VPN Client. D. West1.Testsys.com as VPN Client -
East1.Testsys.com as VPN Client.
Answer: D
3- Hardware devices and drivers
Hardware / Drivers / Settings
47. Your Windows 2000 Server computer uses a SCSI adapter that is
not included on the current Hardware Compatibility List (HCL). You
install an updated driver for the SCSI adapter. When you start the
computer, you receive the following STOP error:
"INACCESSIBLE_BOOT_DEVICE." Which two procedures can you use to
resolve the problem? (Choose two.)
A. Start the computer in safe mode. Reinstall the old driver for
the SCSI adapter. B. Start the computer by using a Windows 2000
bootable floppy disk. Reinstall the old driver for the SCSI adapter.
C. Start the computer by using the Windows 2000 Server CD-ROM.
Perform an emergency repair. Reinstall the old driver for the SCSI
adapter. D. Start the computer by using the Recovery Console. Run
System File Checker. Restart the computer. Reinstall the old driver
for the SCSI adapter. E. Start the computer by using the Recovery
Console. Copy the old driver for the SCSI adapter to the system
volume as C:\NTbootdd.sys. Restart the computer.
Answer: C,E
48. You are a member of the Backup Operators Group in the
arborshoes.com domain. You are not a member of any other group in
the domain. You are logged on to a Windows 2000 Server. You try to
configure the software from a tape backup device, but the
configuration fails during backup. The documentation from the tape
backup device indicates that the current tape driver is out of date
and must be updated to support the configuration. What should you
do?
A. Run the "runas" command, supply your user name and password to
start device manager. Then click the update driver command button on
the Driver tab for the tape backup device. B. Instruct a domain
administrator to run the "runas" command, supplying the domain
administrator user name and password to start device manager. Then
click the update driver command button on the Driver tab for the
tape backup device. C. Open the device manager, and then click the
update driver command button on the driver tab for the tape backup
device. D. Run the Add/Remove Hardware wizard, when prompted select
the Add/Troubleshoot a device option.
Answer: B
49. You have a Windows 2000 Server and has 2 disk drives attached
to the IDE controller. You want more space so you add a new SCSI
Controller with 6 disks. The SCSI controller is not in the HCL. You
restart the server but it's not dectected. What should you do?
(Choose 2)
A. Use Device Manager to turn off IRQ steering in the Properties
of the Standard PC. Restart B. Use Disk Management to restore the
asic configuration. Restart C. Use Add/Remove Hardware wizard to add
new SCSI and RAID controller. D. Use Disk Management to rescan disk
E. Use Manufacturer's setup program to install the drivers for the
SCSI disk controller.
Answer: C, E
50. Your Windows 2000 Server computer uses a non-Plug and Play
ISA modem configured to use IRQ 5. You add a PCI modem and restart
the computer. Device Manager reports an IRQ conflict between the two
modems. Both modem are trying to use IRQ 5. You want to resolve the
problem. What should you do? A. Use Device Manager to change the IRQ
for the original modem to IRQ 9. B. Use Device Manager to change the
IRQ for the original modem to IRQ 10. C. Edit the CMOS settings on
the computer to reserve IRQ 5 for non-Plug and Play devices. D. Edit
the CMOS settings on the computer to reserve IRQ 10 for non-Plug and
Play devices.
Answer: C
51. You have awin2000 Server wich uses a non plug and play EISA
modem that uses IRQ11. you add a second PCI network adapter and
restart the computer. You realise that both adapters are trying to
use IRQ11. What shoud you do ??
A. Edit the CMOS settings on the computer to reserve IRQ11 for
the non-plug and play Devices.
Answer : A
52. Your Windows 2000 server computer contains data files that
users of client computers access throughout the day. You install a
driver for the new tape drive on the computer. After restarting the
computer you log on as an administrator, shortly after you log on
you receive the following stop error "irql_not_less_or_equal". You
need to bring the server back on line as quickly and reliably as
possible.
What should you do?
A. Restart the computer by using the last known good menu option.
B. Perform an emergency repair and select fast repair, restart the
computer. C. Restart the computer in the safe mode, remove the
driver and restart the computer. D. Restart the computer by using
the recovery console, disable the driver. Restart the computer,
remove the driver.
Ans:D
53. You have just installed a new SCSI controller driver in
Windows NT, but now you cannot got the system to boot properly. No
other change has been made to the computer. What is the easiest way
to troubleshoot this problem so that the system can boot properly?
A. Boot Windows NT from the Emergency Repair Disk B. Boot to DOS
and run Dumpexam.exe from the command prompt C. Invoke the Last
Known Good configuration when prompted D. Run the emergency repair
process to restore the registry
Ans:C
54. You are installing Windows 2000 Server on a new computer. The
manufacturer has provided a customized hardware abstraction layer
(HAL) to use with the computer. The HAL is on the floppy disk. You
want to install the customized HAL design for the computer. What
should you do?
A. During the hardware confimation portion of the Windows 2000
setup install the customized HAL. B. After installing Windows 2000
server,use the recovery console to copy the customized HAL to the
system32 folder on the boot partition. C. After the installing
windows 2000 setup, use the emergency repair process to install the
customized HAL. D. After installing Windows 2000 server, use the
device manager to scan for Hardware changes. When prompted, install
the customized HAL.
Ans: A
55. Your Windows 2000 Server computer includes an integrated
10-MB Ethernet adapter. You are replacing the integrated adapter
with a new 100-MB Ethernet adapter. You install the new adapter in
an available PCI slot. When you restart the computer, you receive
error messages in the System log stating that the new adapter is
missing or is not working. What should you do to resolve the
problem?
A. Create a new hardware profile. B. Use Device Manager to remove
the integrated 10-MB Ethernet adapter. C. Use Device Manager to
disable the integrated 10-MB Ethernet adapter. D. Delete the device
driver for the integrated 10-MB Ethernet adapter from the
Systemroot\system32\Driver Cache folder.
Ans:C
56. You are installing Windows 2000 Server on a multiprocessor
computer. The manufacturer has provided a customized HAL to use with
the computer. The HAL is on the floppy disk. You want to install the
customized HAL design for the computer. What should you do?
A. During the text mode portion of the Windows 2000 setup install
the customized HAL. B. After text mode portion of Windows 2000 setup
is complete use the recovery console to copy the customized HAL to
the system32 folder on the boot partition. C. After the text mode
portion your windows 2000 setup is complete use the emergency repair
process to replace the existing HAL with the customized HAL and then
continue the windows 2000 setup. D. After the Windows 2000 setup is
complete use the device manager to scan for Hardware changes when
prompted install the customized HAL.
Ans:A
57. Your network consists of Windows 2000 file servers, Windows
2000 print servers, Windows 2000 professional computers, Windows
2000 file servers. You must prevent any unsigned drivers from being
installed on any computer in your Windows 2000 network. What should
you do?
A. Configure a Group policy for the Domain that blocks all
unsigned drivers. B. Configure a Group policy for the Default Domain
Controller to block all unsigned drivers. C. Configure the Windows
2000 file servers, Windows 2000 print servers, Windows 2000
professional computers and Windows 2000 file servers to block
unsigned drivers. D. Do nothing, this is the default setting.
Ans:A
58. You have just replaced the video card on your Windows NT
computer. When you restart Windows NT, the monitor displays flashing
lines. What is the fastest way to resolve the problem?
A. Invoke the Last Known Good configuration when prompted B.
Reinstall Windows NT and specify the correct display adapter during
setup C. Boot from the setup disks and modify the Display.Ini file
in the Winnt\System32 directory D. Select the VGA Mode option from
the startup menu to boot Windows NT, then choose the appropriate
video card in Display properties
Ans:D
59. You have two SCSI controllers, and two SCSI hard disk drives.
You have a fault tolerance that involves the boot and system
partition. Second SCSI controller is not BIOS enabled. Which file
would you need in order that you boot from the hard drive that is
connected to the second SCSI controller ?
A. NTBoot.com B. Scsiboot.com C. NTBootdd.sys D. NTBootdd.com
Ans:C
60. You install a second modem on a Windows 2000 Server computer
configured with Routing and Remote Access. Dial-in users report that
they are unable to connect to the server by using this new modem.
What can you do to help find out the cause of the problem? (Choose
Three.)
A. Use the Diagnostics tab in Phone and Modem Options in Control
Panel to query the modem. B. Use device Manager to identify any port
resource conflicts. C. Use the Routing and Remote Access snap-in to
find out whether the ports for both modems are operational. D. From
a command prompt, run the Net Config Server command. E. From a
command prompt, run the Net Statistics command. F. Use Regedit32 to
view the Error Control value in the
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess
Key.
Answer: A,B,C
61. After you install a new video adapter, one of the users at a
remote location reports that Routing and Remote Access does not
accept calls. After you resolve the Routing and Remote Access
problem, you need to configure the server to prevent users from
installing any unsigned device drivers. What two actions should you
take in the Driver Signing Option dialog box? (choose two)
A. Set File Signature Verification to Ignore B. Set File
Signature Verification to Block C. Set File Signature Verification
to Warn D. Select the Apply settings as system default check box
Answer : B, D
62. You configure your Windows 2000 Server as a print server. You
install a second PnP Network adapter to improve the performance. The
first adapter uses IRQ11, and the second adapter uses IRQ5. The
server is now unable to print to print devices connected to a
non-PnP LPT2 port adapter. You want to continue to use the print
devices connected to your print server. What should you do?
A. Use device manager to change the IRQ for LPT1 to IRQ10. B. Use
device manager to change the IRQ for LPT2 to IRQ7. C. Edit the CMOS
setting of the servers BIOS to reserve IRQ7 for non-PnP devices. D.
Edit the CMOS setting of the servers BIOS to reserve IRQ5 for
non-PnP devices.
Answer: D
63. You are configuring a Windows 2000 Server computer as a
Routing and Remote Access server for a Branch office. You discover
that an incorrect driver was installed during the installation of
the modem. You attempt to remove the modem by using Phone and Modem
Options in Control Panel. After each attempt to remove the modem by
using this method, the computer stops responding. You restart the
computer again. You must install the correct driver for the modem as
quickly as possible.
What should you do?
A. Use the Add/Remove Hardware wizard to uninstall the modem.
Restart the server. B. Shut down the server, remove the modem card,
and restart the server. Shut down the server again, insert the modem
card, and restart the server. C. Delete all references to modems in
the registry. D. Run the Modem troubleshooter and remove the modem
when prompted. Restart the server.
Answer: A
64. Frequently, a newly installed modem stops communicating with
your ISP. The only way to reactive the modem is to restart the
computer. You want to install a new driver for the modem. What
should you do??
A. In device manager, on the property sheet for the modem, click
the Update Driver command Button.
Answer : A
65. You install a second modem on win2000 server computer
configure with routing and remote accesss.dial in user reports that
they are unable to connect to the server using this modem. What
should you do to help fix this problem?
A. Using the routing and remote access (snap in) to find that the
input and output modems are operational. B. From command prompt run
the "net config" server command C. From command prompt run the "net
statistic" command d. se the regedt32 to view the error control
value in the HKEY LOCAL MACHINE\system\current control
set\services\remote Access key
Ans. A
4- System Performance, Reliability, and Availability
Performance
66. A Windows 2000 Server computer named server2 runs numerous
32bit applications and two 16bit applications. Users start the 16bit
applications by running APP1.EXE for one application and APP2.EXE
for another application. The 16bit applications are configured to
run in the separate memory space. You want to create a performance
base like chart in the system monitor for all the applications on
server2. You add all of 32bit applications and now you want to add
two 16bit applications. What should you do?
A. Add the APP1 and APP2 instances to the processor time counter
for the process object. B. Add the NTVDM, APP1 and APP2 instances
for the processor time counter for the process object. C. Add only
the NTVDM instance for the percent processor time counter for the
process object. D. Add the NTVDM1 and NTVDM #2 instances for
processor time counter for the process object.
Answer: D
67. Every afternoon you run MS-EXCEL locally on Windows 2000
Server computer to update the performance spread sheet. Users report
that during this time the server response to the file request
appears to be slowed down. What should you do to resolve the
problem?
A. Run the start/normal CSRSS command, before you start the
EXCEL. B. Run the start/normal EXCEL.EXE command to start excel. C.
Use task manager to set the priority for CSRSS.EXE process to above
normal. D. Use task manager to set the priority for EXCEL.EXE
process to low.
Answer: D
68. Running system monitor locally and ensuring it has least
impact on other processes, how do you measure the physical disk
performance counters on your win2000 server computer?
A. From the command prompt run the start/low perform command B.
Use Task manager to set the priority off the MMC.EXE process to Low
Answer: A
69. You install and run a third-party 32-bit application named
Application on your Windows 2000 Server computer. After several
days. the application stops responding. You open Task Manager and
find that the CPU usage is at 100 percent. The normal range of CPU
usage on the server is from 20 percent to 30 percent. You end the
application. However, you see that the CPU on the server is still at
100 percent. Task Manager shows no other applications running. You
then examine the Processes page in Task Manager and confirm that the
Application.exe process is no longer running. You want to return the
CPU usage to its normal range. What should you do?
A. Use Computer Management to stop and restart the Server
service. B. Use Computer Management to stop and restart the
Workstation service. C. Use Task Manager to end any related child
processes. D. Use Task Manager to end and automatically restart the
Explorer.exe process.
Ans:C
70. You install a new multiple-process database application named
Application on your Windows 2000 Server computer. Two days later,
users begin to report that the new application has suddenly stopped
responding to queries. You verify that the server is operation and
decide that you need to restart the application. What should you do
before you restart the application?
A. End the task named Application. B. End the Application.exe
process. C. End the Application.exe process tree. D. End both the
Explorer.exe process and the Application.exe process.
Ans:C
71. You have used the option of making a system memory dump. How
do you extract information from the memory dump file?
A. Debug.exe B. Dumpcheck.exe C. windbg.exe D. Dumpexam.exe
Ans: A
72. Your are experiencing system errors on your Windows 2000
Server computer. Microsoft enterprise technical support has
requested a dump of system memory to a file. You have configured a
system paging file on your boot partition that is larger than the
total amount of system RAM. How should you configure the Windows
2000 Server computer to generate the required dump file?
A. Configure the eventlog service to start automatically B.
Configure Dr. Watson for Win NT to create a crash dump file C.
Configure system recovery to write an event to the system log D.
Configure system recovery to write debugging information to %system
root%memory dump
Ans:D
73. How will you create a memory dump file to record the memory
contents in case of Stop errors?
A. Use Startup/Shutdown tab in System applet of Control panel B.
Use Dr. Watson C. Turn on auditing using User manager for Domains.
D. Edit the registry.
Ans:A
74. A Windows 2000 Server computer named Server1 is a file server
on your network. Server1 runs numerous 16-bit applications. One of
the applications, named App1, stops responding, causing all of the
other 16-bit applications to stop responding. You want to isolate
App1 for monitoring and troubleshooting purpose. What can you do?
(Choose all that apply.)
A. Create a batch file that starts App1 by running the start
command with the /separate switch. Use this batch file to start
App1. B. Create a shortcut to App1, and select the Run in separate
memory space option in the shortcut properties. Use this shortcut to
start App1. C. In the properties for File and Printer Sharing for
Microsoft Networks, select the Maximize data throughput for file
sharing option button. D. In the properties for File and Printer
Sharing for Microsoft Networks, select the Balance option button.
Answer: A,B
75. You install a new server application on your Windows 2000
Server computer. Response times fail to meet user specifications.
You want to use the Process page in Task Manager to find out whether
the response time of new application would improve by the addition
of one or more processors. Which two columns should you select to
view? (Choose two.) To answer, click the two appropriate check boxes
in the Select Columns dialog box. Display image
A. User Objects B. Virtual memory size C. Memory usage delta
D. CPU usage
E. Page faults
F. Thread count
G. Handle count
H. I/O write bytes
I. Base priority
Answer: D, F
76. How can you assign an application to one processor
exclusively?
A. Right click on application executable, select properties and
select assign processor. B. Right click on application process in
Task Manager, select Set Affinity, and select the appropriate
processor. C. Open Task Manager, chose options from task bar, select
processor and assign processes to appropriate processor. D. Open
Task Manager, chose Performance, chose view all processors, assign
processes to appropriate processor.
Answer: B
77. Your company network includes a PentiumII, 450Mhz database
server names Webdata1. Webdata1 supports a high-traffic e-commerce
web site on a server names Webserver1. Users access the e-commerce
website from their Internet browsers. Users report that when they
attempt to complete a purchase, they must wait five minutes for
confirmation that their order has been processed. You want to use
Task Manager to help you decide whether an additional processor is
needed. What should you do?
A. On the performance tab, select the option to monitor the
system cache. B. On the performance tab, select the option to
monitor the available physical memory. C. On the process tab, select
the option to monitor the memory usage column, Monitor this column.
D. On the proces tab, configure the view to include the thread count
column, Monitor this column. E. On the proces tab, configure the
view to include the page faults column, Monitor this column.
Answer: D
Recovery Console / Boot Problems
78. You are the administrator of Windows 2000 Server network . On
each server you format a separate system partition and a separate
boot partition as NTFS. Several months later you shut down one of
the computers for maintenance. When you try to restart the computer
you receive the following error message "NTLDR is missing, press any
key to restart". You want to install a new NTLDR file on the
computer but you do not want to loose any settings you made since
the installation. What should you do?
A. Start the computer by using Windows 2000 Server computer
CD-ROM and choose tools to repair the installation. Select recovery
console and copy the NTLDR file on the CD-ROM to the root of the
system volume. B. Start the computer by using the Windows 2000
server CD- ROM, choose to reinstall. When the installation is
complete copy the NTLDR to the root of the boot volume. C. Start the
computer by using the Windows 2000 bootable floppy disk. From a
command prompt run the sfc/scanboot command. D. Start the computer
by using Windows 2000 bootable floppy disk. Run the file signature
verification utility.
Answer: A
79. Your Windows 2000 server computer contains data files that
users of client computers access throughout the day. You install a
driver for the new tape drive on the computer. After restarting the
computer you log on as an administrator, shortly after you log on
you receive the following stop error "irql_not_less_or_equal". You
need to bring the server back on line as quickly and reliably as
possible. What should you do?
A. Restart the computer by using the last known good menu option.
B. Perform an emergency repair and select fast repair, restart the
computer. C. Restart the computer in the safe mode, remove the
driver and restart the computer. D. Restart the computer by using
the recovery console, disable the driver. Restart the computer,
remove the driver.
Answer: D
80. You are the administrator of a Windows 2000 Server computer.
The server has a single hard disk with a single NTFS partition. You
use a third-party tool to add a new partition to the disk. When you
restart the server, you received the following error message:
"Windows 2000 could not start because the following file is missing
or corrupt: \system32\ntoskrnl.exe. Please re-install a copy of the
above file." What should you do to resolve the problem?
A. Start the computer by using the Recovery Console. Run System
File Checker. B. Start the computer by using the Recovery Console.
Modify the Partition parameter in the operating system path in
C:\Boot.ini C. Start the emergency repair process. Choose the option
to repair system files. D. Start the computer in safe mode with
command prompt. Modify the Partition parameter in the operating
system path in C:\boot.ini.
Ans:B
81. A STOP error occurs every time you start your windows 2000
Server computer. You find that no dump file exists on the disk. What
must you do to enable creation of a dump file?
A. Create a new pagefile.sys in system root. B. Create a new
pagefile.sys on the root of drive C. C. Add /sos to the operating
system path in boot.ini. D. Add /crashdebug to the operating system
in boot.ini.
Ans:A
82. Your network includes windows 98 computers and Windows 2000
Professional computers. You are adding a new computer to the
network. You plan to install Windows 2000 Server computer on the new
computer. The computer has one 20 GB hard disk with no partition
defined. The Windows 2000 Server computer CD ROM is unavailable. You
want to install windows 2000 server from the source files that are
located on a server on the network. You also want the entire hard
disk of the new computer to be used for the system partition. What
should you do?
A. On another windows 2000 computer use makebt32.exe to create
installation startup disks. Start the computer by using the first
disk. B. On another Windows 2000 computer format a floppy disk. Copy
NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the
computer by using the disk. C. Start the new computer by using the
Windows 98 network boot disk. Connect to the server. Run
dsclient.exe. Create and format 20GB FAT32 partition. D. Start the
new computer by using the Windows 98 network boot disk. Create and
format a single FAT32 partition. Connect to network server. Run
winnt.exe. E. Start the computer by using Windows 98 network boot
disk. Create and format a single Fat 32 partition. Start the new
computer by using the Windows 2000 emergency repair disk.
Ans:D
83. You want to improve the TCP transmission speed of a Windows
2000 Server computer. You also want to remove an unused registry
key. You use Regedit32 to edit the registry of the Windows 2000
Server. You insert a value in the registry named TCPWindowSize, and
you remove the unused key. You restart the computer, but the
computer stops responding before the logon screen appears. You want
to return the computer to its previous configuration. What should
you do?
A. Restart the computer in safe mode. Then restart the computer
again. B. Restart the computer by using the Recovery Console. Run
the Fixboot c: command, and then run the Exit command. C. Restart
the computer by using the Recovery Console. Run the enable winlogon
service_auto_start command, and then run the Exit command. D.
Restart the computer by using the last known good configuration.
Ans:D
84. You are the network administrator for your company. As part
of your disaster recovery plan, you create an emergency repair disk
for each computer on your network. you also perform full daily
backups. You install a custom application on a server named member1.
you restart member 1 and receive the following error message
“Invalid Boot.ini file”. What should you do to restore the boot.ini
file?
A. Reboot member 1 by using the Windows 2000 Server CD. Lunch
recovery console. Run the fixboot command with the appropriate
parameters. B. Reboot member 1 by using the Windows 2000 Server CD.
Launch recovery console. Run the fixmbr command with the appropriate
parameters. C. Restart member 1 into safe mode. Launch Windows 2000
backup. D. Restart member 1 into safe mode. Run the Chkdsk command
with the appropriate parameters. E. Reboot member 1 try using the
Windows 2000 Server CD. Launch recovery console. Run the copy
command with the appropriate parameters
Ans:A
Others
85. You are an administrator of your company's network. You want
to perform routine upgrades on your Windows 2000 Server computer.
You use your non administrator user account in the domain to log on
to the server. You want to update all of the critical system files
on the server in the shortest possible time. What should you do?
A. Run Windows Update. B. Run System File Checker. C. Log on as
an Administrator and run Windows Update. D. Log on as an
Administrator and run System File Checker.
Answer: C
86. You are the network administrator for your company. The
company has numerous branch offices, and each office uses Internet
Connecting Sharing to connect to the Internet. A new employee named
David Johnson is configuring a Windows 2000 Server computer as a
file server. When David uses Windows update for the first time and
select Product Update, he receives an error message stating that
access is denied. David needs to be able to update the file by using
his account. What should you do?
A. Configure the settings for Internet Connecting Sharing to
allow POP3 access. B. Configure the settings for Internet Connecting
Sharing to allow SMTP access. C. Give David's user account
administrator privileges on the Windows 2000 Server computer. D.
Instruct David to log on as a domain administrator on the Windows
2000 Server computer.
Answer: C
87. You are a network administrator for your company. The company
is currently configuring its branch offices with a Windows 2000
Server computer at each office. Each branch office has a
technical-support department but not a network administrator. You
want to configure the remote Windows 2000 Server computers so that
whenever a new Microsoft driver becomes available, the branch
offices are notified automaticaly when the administrator logs onto
the server. What should you do?
A. Install the Windows 2000 Resource Kit. B. Install Windows
critical update notification. C. Configure system file checker to
notify the branch offices. D. Configure Windows file protection to
notify the branch offices.
Answer: B
88. When directly editing the registry with Regedt32.exe, what
can be done to ensure that unwanted changes aren't made
accidentally? Choose the best answer:
A. Nothing needs to be done. NT prompts for confirmation and
displays warning messages when changes are unsafe. B. Use Registry
Editor rather than Regedt32. C. Select read-only mode in the options
menu. D. Just don't make a mistake.
Ans:C
89. You are the administrator of a Windows 2000 domain that has
three domain controllers. Each day, you use Windows Backup to
perform full backups of each domain controller. You run a script to
make changes to account information in Active Directory. As a result
of errors in the script, the incorrect user accounts are modified.
Active Directory replication then replicates the changes to the
other two domain controllers. You want to revert Active Directory to
the version that was backed up the previous day. What should you do?
A. On a single domain controller, use Windows Backup to restore
the System State data. Shut down and restart the computer. B. Shut
down and restart a single domain controller in directory services
restore mode. Use Windows Backup to restore the System State data.
Run the Ntdsutil utility. Restart the computer. C. Shut down and
restart a single domain controller by using the Recovery Console.
Use Windows Backup to restore the System State data. Exit the
Recovery Console. Restart the computer. D. Shut down and restart
each domain controller by using the Recovery Console. Use Windows
Backup to restore the Sysvol folder. Exit the Recovery Console.
Restart the computer.
Answer: B
90. The Litware.Inc.,nerwork has three main network segments and
six domain controllers.
Server Server Server srv1.west.litware.com---|
srv2.west.litware.com |--- srv3.west.litware.com
Tape---------------| | | |
Router-----------Router-------------------Router | | |
srv4.west.litware.com---| srv5.west.litware.com |---
srv6.west.litware.com Server Server Server
You back up all of the system state date for each domain
controller and place the date on a single tape.That tape is
currently attached to the srv1.west.litware.com computer.To which
server or servers can you restore the system state from
srv1.west.litware.com(choose all apply) A.srv1 B.srv2 C.srv3 D.srv4
E.srv5 F.srv6
Answer: A
91. You have 6 domain controllers srv1, srv2, srv3, srv4, srv5,
srv6, in three main segments. You back up all System State data of
your network. The tape device is attached to srv1.
To which server can you restore the System State data.
A. Any server. B. Any server that is on the same segment of srv1.
C. Any server on a different segment than srv1. D. Only to server
srv1.
Ans:D
5- Managing, Configuring, and Troubleshooting Storage Use
Partitioning & Disk Failure
92. Your Windows 2000 Server computer contains a stripe set with
parity on a four-disk array. You convert the stripe set with parity
to a dynamic RAID-5 volume. Six months later, users report that disk
access on the server is slower than it had been on the previous day.
You use Disk Management and discover that the status of the third
disk in the array is missing. You want to recover the failed RAID-5
volume. What should you do first?
A. Replace the third disk and restart the server. Use Disk
Management to repair the volume. B. Ensure that the third disk is
attached to the server and has power. Use Disk Management to
reactivate the disk. C. Ensure that the third disk is attached to
the server and has power. Use Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the
new disk. Restart the computer and allow Windows 2000 to
automatically repair the volume on the extended partition.
Answer: B
93. You install your boot volume on volume C on your Windows 2000
Server computer. You mirror volume C on dynamic Disk 1. Two years
later, during routine server maintenance, you open Disk Management
and find that the status of volume C is Failed Redundancy. The
status of Disk 1 is Missing. You attempt to reactivate Disk 1, but
the status of volume C does not return to Healthy. What should you
do next?
A. Replace Disk 1 and restart the computer. The mirror will
automatically regenerate. B. Remove the mirror on Disk 1, replace
the disk, and then add back the mirror to the new Disk 1. C. Replace
Disk 1 and copy all data from volume C to a new NTFS primary
partition on the new Disk 1. Restart the computer. D. Rescan the
disks, remove the mirror, and delete the data on Disk 1. Then
re-create the mirror.
Answer: B
94. You upgrade a Windows NT Server 4.0 computer to Windows 2000
Server. The computer has two hard disks. The system and boot
partitions are located on two primary partitions on Disk 0. Both
partitions are mirrored on Disk 1. One month later, Disk 1 fails.
You replace the disk with a disk taken from another Windows 2000
computer. When you try to repair the fault-tolerant volumes by using
Disk Management, you find that the Repair Volume option is
unavailable. You want to repair the mirror set. What can you do?
(Choose two.)
A. Delete all volumes on Disk 1. Change Disk 1 back to a basic
disk. Repair the fault-tolerant volumes on Disk 0. B. Create two new
volumes on Disk 1. Copy all the data from the two disk partitions on
Disk 0 to the two volumes on Disk 1. C. Break the mirror set.
Convert Disk 0 to a dynamic disk. Create a mirror on Disk 1. D.
Create a single volume on Disk 1. Copy all the data from Disk 0 to
the single volume. Convert Disk 0 to a dynamic disk.
Answer: A, C
95. You want to provide complete redundancy for all data stored
on your hardware RAID 5 array. You install second h/w Raid 5. You
want to create a mirror set of the original array. However when you
right click the free space on new array you see no option to create
a new volume or mirrrored volume. What should you do?
A. Convert both to dynamic disks. B. Create an empty extended
partition on new disk C. Create a single unformatted primary
partition on new array. D. Format new disk array as a single NTFS
primary partition. E. Format the new disk array as a single NTFS
logical drive in an extended partition.
Answer: A
96. You are the administrator of a Windows 2000 Server computer
that has FIVE hard disks. Four 100 GB hard disks on the server are
configured as a single stripe volume. You want to reconfigure the
fourth disk so that the volume is fault tolerant and has as much
space possible available for storing data. You want to use only
existing hardware. What should you do?
A. Convert the disk to dynamic disk shut down and restart the
server. B. Backup the data on the stripe volume and delete the
stripe volume. Create a raid5 volume on the four disks, restore the
data to the new raid5 volume. C. Backup the data on the stripe
volume and delete the stripe volume. Create to mirror volume, shut
down and restart the server. Restore the data to new mirror volumes.
D. Backup the data on the stripe volume and delete the stripe
volume. Create a span volume for the first two disks, create a
second span volume for the last two disk. Mount the root of the
second span volume in the root of the first span volume. Restore the
data to the first span volume.
Answer: B
97. You are the administrator of Windows 2000 Server computer.
Your computer has a span volume that consists of areas on three
physical hard disks on the server. The three disks support hot
swapping. You regularly backup the span volume by using windows
backup. One of the disk fail, you replace the disk with a new
un-partitioned disk. You want to recover the span volume and disk
data as soon as possible. What should you do?
A. Extend the span volume to include the new disk, rescan the
disk. B. Extend the span volume to include the new disk, shut down
and restart the server, use windows backup to restore the data. C.
Re scan the disk, format the span volume. Use windows back up to
restore the data. D. Re scan the disk, extend the span volume to
include the new disk. Shut down and restart the server, use windows
backup to restore the new data. E. Re scan the disk, remove the span
volume and create a new span volume that includes the new disk.
Format the span volume, use Windows back up to restore the data.
Answer: E
98. Your Windows 2000 Server is configured with 6 SCSI hard
disks. One hard disk is the System disk and the other five are
configured as a Stripe Set. After a power outage one of the hard
disk in the Stripe Set fails. How can you replace the hard drive and
recover from the Power outage?
A. Use disk administrator to regenerate the data on the new
drive. B. Recreate with Stripe Set across the five disks and restore
from backup. C. Copy the lost data from the tape backup to the new
drives. D. Start the Emergency Repair Process.
Ans:B
99. You are the administrator of a Windows 2000 Server computer
that has one hard disk. This computer runs a custom application that
writes a large number of small temporary files in a single directory
to support request from client computers. To improve performance of
the application, you add three new 100-GB SCSI disks to the server
to hold these temporary files. You want to ensure that the
application can use all 300 GB of space with a single drive letter.
You also want to ensure the fastest possible performance when
writing the temporary files. How should you configure the three
disks?
A. Convert all three disks to dynamic disks. Create a striped
volume. B. Convert all three disks to dynamic disks. Create a RAID-5
volume. C. Create a single volume on each of the three disks. Format
each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the
root folder of Disk 1. D. Create a single volume on Disk 1. Format
the volume as NTFS. Extend the volume to create a spanned volume
that includes the space on all three disks.
Ans:A
100. You have a machine with two hard disk and you add an extra
100 GB hard disk for a specific Client-Server application to run on,
because the application gets very slow returning query data. You
want to have the fastest possible access for the Client-Server App
to the HDD’s. Which Raid should you apply?
A. RAID0 B. RAID1 C. RAID5 D. RAID2
Ans:A
101. Your computer has a mirrored volume and you wish to now
install the Recovery Console for future troubleshooting. How do you
do this?
A. Reinstall Windows, this can only be applied during the
installation. B. Break the mirror, run X:\i386\winnt32.exe /cmdcons
Reestablish the mirror. C. Run X:\i386\winnt32.exe /cmdcons. D. Run
the add and remove programs and add the recovery console.
Ans:B
102. Your Windows 2000 Server computer has two SCSI hard disks.
The hard disks are configured as SCSI ID 0 and SCSI ID 1 on a single
SCSI host bus adapter. The hard disks are mirrored and each hard
disk is formatted with a single NTFS partition. One of the hard
disks has just failed. After replacing the failed hard disk with a
new disk, what else should you do to recover from the hard disk
failure?
A. Choose Establish Mirror in disk administrator B. Choose Break
Mirror in disk administrator and then choose regenerate in Disk
Administrator C. Choose Break mirror in disk administrator and then
choose establish mirror in disk administrator D. Wait for Windows NT
to regenerate the mirror
Ans:C
103. You replaced one SCSI hard disk after a mirror set up
failure. What else would you do?
A. Break mirror and "establish mirror" in Disk manager option. B.
Break mirror and "regenerate mirror" in Disk manager option. C. Wait
for NT to restart.
Ans:A
104. You have a Windows 2000 Server with six SCSI disks. On one
disk is the system partition, and the other five are in a stripe
set. One disk failed and you replaced the disk. What must be done
next in the disk administrator?
A. Choose regenerate in the fault tolerance menu B. Choose make
stripe set with parity and restore from backup C. Choose make stripe
set and restore from backup D. Choose restart in the fault tolerance
menu
Ans:C
105. Your Windows 2000 Server is configured with 5 SCSI hard
disks. The first hard disk contains the System and boot partitions.
The other four drives are configured in a Stripe Set with Parity.
The first hard drive fails after power outage. After replacing the
hard drive what do you have to do to recover from the failure?
A. Reinstall the 2000 Server and restore registry from tape
backup. B. Reinstall the 2000 Server and restore the registry using
ERD created during installation. C. Reinstall the 2000 Server.
Recreate the user and group accounts, and account policies. D. Use
Disk administrator to regenerate the data on the new drive.
Ans:A
106. You Windows 2000 Server computer contain four hard disks of
different sizes. Each hard disk is configured as a basic disk and
has a single 5-GB partition. All four disks have the amount of
unpartitioned space shown in the following table:
Disk Unpartitioned Space Disk 0 3-GB Disk 1 4-GB Disk 2 3-GB Disk
3 8-GB
On each hard disk, you create a second partition that uses the
remaining unpartitioned space on the disk. You create an 18-GB
stripe volume that includes all four of the new partitions. Six
months later, disk 1 fails. You replace it with a new hard disk, and
create the necessary partitions. As quickly as possible, you need to
retrieve the data that was contained on disk 1. What should you do?
A. Restore the first partition on disk 1 from the most recent
tape backup. Use disk management to repair and rebuild the stripe
volume. B. Delete and re-create the stripe volume. Restore the
contents of disk 1 from the most recent tape backup. C. Restore both
partitions on disk1 from the most recent tape backup. D. Delete and
re-create the stripe volume. Restore the first partition on disk 1
and then stripe volume from a recnt tape backup.
Ans:A
Disk Utilities
108. You install a Windows 2000 Server computer on your network.
You place several shared folders on a 12-GB primary partition
formatted by FAT32. During nine months of continuous operation, the
number of users who access the server and their access frequency
remains constant. The average size of the files on the server
remains approximately constant. After the server runs continuous for
nine months, users report that the server does not retrieve files
from the shared folders as fast as when you first installed the
server. What should you do to resolve the problem?
A. Convert the disk that contains the shared folders to a dynamic
disk. B. Convert the partition that contains the shared folders to
NTFS. C. Defragmenter the disk that contains the shared folders. D.
Move the paging file to the partition that contains the shared
folders.
Answer: C
109. Your Windows 2000 Server contains two hard disks. Each disk
is partitioned as a single primary partition. The first disk is
formatted as FAT32, the second as NTFS. You compress shard folders
on second disk. When users move compressed files from a Shared
folder on the second disk to a shared folder on the first disk, the
files lose their compression. What two actions should you take to
ensure that all files moved from folders on the second disk to
shared folders on the first disk remain compressed?
A. Convert the first disk to NTFS. B. Compress the shared folders
on the first disk
Answer: A, B
110. You have two Windows 2000 servers, SRV1 and SRV2. SRV1 has a
spanned volume over three physical disks. These disks support hot
swapping. The drive letter that the spanned volume uses on SRV1 is
not currently in use on SRV2. You want to move the three disks to
SRV2, using the same drive letter as SRV1. You back up the spanned
volume. What should you do next??
A. Move the disk from SRV1 to SRV2. B. on SRV1 rescans the disks.
On SRV2, rescan the disks
Answer: A, B
111. You are the administrator of a Windows 2000 server computer.
The server has a single hard disk with two partitions. An
application that runs on your server creates a very large log file
in the Systemroot\Temp folder. There is not enough free space on the
system partition to accommodate the log file. The application does
not provide a way to change the path to the log file. You want to
run the application on your server. What should you do?
A. On the second partition, create a shared folder named Temp. B.
In the systemroot folder, create a shortcut named Temp that points
to the second partition on the disk. C. Add a second hard disk.
Create and format a partition from the free space on the second hard
disk. Create a Temp folder on the new partition. Mount the system
partition as the Temp folder on the new partition. D. Add a second
hard disk. Delete the contents of the Systemroot\Temp folder. Create
and format a partition from the free space on the second hard disk.
Mount the partition as the Systemroot\Temp folder.
Ans:D
112. You are the administrator of a Windows 2000 Server computer.
The server contains a RAID-5 array that is configured as a volume D
and an 18-GB hard disk that is configured as volume C. Volume D is
formatted as NTFS, contains 60GB of data, and has 2GB of free disk
space. Volume C is formatted as FAT32 and has 16GB of free disk
space. The server is used to store user home folders. Most of the
data in the home folders has been encrypted with the encrypted with
the encrypted file system. You estimate that the sever will need an
additional 10-GB disk space to meet user needs. However, you will
not be able to purchase additional hard disks for three months. You
want to immediately free at least 10-GB of the disk space. You do
not want to compromise the security of the user’s files. What should
you do?
A. Instruct the users to move at least 10-GB of data to another
file server that has EFS. B. Create additional shared folders on
volume C. Move 10-GB of data to the new, shared folders. C. Copy at
least 10-GB of data to a writeable CD-ROM. Delete these files from
the server. D. Enable the compression attribute for the volume, and
compress the users’ home folders. Ensure that EFS remains enabled on
the home folders
Ans: A
113. You have 5 SCSI drives. You have created an ERD disk during
installation. Now you have made some changes in the configuration of
the SCSI drives. You want to save the changes for future use. What
will you do?
A. Use RDISK.EXE to create a new ERD to take account of the new
configuration change. B. Use SCSI applet in Control Panel C. Use NT
Backup Program D. Use Disk Administrator
Ans: A
114. You are the administrator of Windows 2000 Server computer.
Volume D is formatted as NTFS. Volume D contains folders that are
shared by departments within your company. You want to limit the
amount of disk space that the shared folders can store. a user named
Richard has stored 10GB of files in the shared folders. Richard’s
files are using more disk space on the shared folders than any other
user’s files. You enable disk quotas on Volume D and create a
default quota entry. You set the quota limit to 1.1 BG and select
the Deny disk space to users exceeding quota limit check box. When
Richard attempts to encrypt the files in his home folder be using
the encrypted file system he receives the following error messages,
‘There is insufficient disk space to complete the operation’. You
need to allow Richard to encrypted the files in his home folder. You
also need to maintain Which three actions must you have? (Choose
Three)
A. Create a quota entry for Richard, and select the Do not limit
disk space check box. B. Instruct Richard to encrypt the files in
his home folder. C. Run the Cipher.exe/d command D. Enable the
compression attribute on Richard’s home folder. E. Set the Richard’s
quota limit to equal the amount of disk space used by the files in
his home directory. F. Set the default quota entry on volume D to
12GB, and clear the Deny disk space too users exceeding quota limit
check box.
Ans: ABE
115. You install the boot volume D on your Windows 2000 Server
computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1.
One year later, during routine server maintenance, you open Disk
Management and find that the status of volume D is Failed
Redundancy. The status of Disk 1 is Online (Errors). A symbol with
an exclamation point appears in the graphical view of the disk. You
want to return the status of the boot volume to Healthy. What can
you do? (Choose two.)
A. Break the mirror, delete the volume on Disk 1, and re-create
the mirror. B. Replace Disk 1, copy the data from the boot volume to
the new disk, and then use Disk Management to rescan the disks. C.
Replace Disk 1, Ensure that the new disk is a basic disk, and repair
the volume. D. Reactivate the mirror on Disk 1. E. Convert Disk 1 to
a basic disk, and reconvert it to a dynamic disk.
Answer: A,D
116. Your hard-drive configuration is as follows and one of your
drives fails.
Controller label 1 Disk label EIDE Controller 0 EIDE Disk 0 and
Disk 1
Controller label 2 Disk label SCSI Controller 1 SCSI Disk 0, 1,
2, 3, 4, 5, 6
The disk that fails is multi(1)disk(0)rdisk(1)partition(1). Place
an "X" on the drive that has failed in the configuration below: ID
Disk
A. EIDE 0 (disk 1) B. EIDE 1 (disk 2) C. SCSI 0 (disk 1) D. SCSI
1 (disk 2) E. SCSI 2 (disk 3) F. SCSI 3 (disk 4) G. SCSI 4 (disk 5)
H. SCSI 5 (disk 6)
Answer: D
117. Your Windows 2000 Server computer contains four 16GB hard
disks. Disk0 is configured as a basic disk. Disk0 has a single 16GB
partition that contains the boot and system files. Disk 1, 2 and 3
are configured as dynamic disks in a RAID5 volume. The entire server
is backed up to a tape drive each night. During your daily review of
the servers event logs, you discover that Disk1 has failed. You shut
down the server and replace Disk1 with a new hard disk. When you
restart the server Windows 2000 starts normally, but the data on the
RAID5 volume is inaccessible. Disk Management indicates that Disk2
has failed too. You replace Disk2 with a new hard disk. Now you need
to recover the data on the RAID5 volume as quickly as possible. What
should you do?
A. Use Disk Manager to rebuild RAID5 partition. B. Delete and
recreate the RAID5 partition. Restore the contents of RAID5
partition from the most recent tape backup. C. Use Windows 2000
backup to restore the contents of Disk2. Use Disk Manager to rebuild
the RAID5 partition on Disk1. D. Delete and recreate the RAID5
partition. Restart the server by using Windows 2000 Setup CD, and
select repair option.
Answer: B
118. You are the administrator for your company. Your Windows
2000 Server computer contains two 23GB hard disks. Each disk is
configured as a basic disk and has a single 23GB NTFS partition.
Both partitions are backup up to tape every night. The partition on
Disk1 stores user data. Most users of your company encrypt their
files. Disk1 fails. You replace it with a new disk. You need to
recover the data as quick as possible while maintaining the security
of the files. What should you do?
A. Create a single NTFS partition. Restore the contents of Disk1
from the most recent tape backup. Run the cipher /d /i command. B.
Create a single NTFS partition. Restore the contents of Disk1 from
the most recent tape backup. Instruct the users to verify the
integrity of their files. C. Create a single NTFS partition. Restore
the contents of Disk1 to a second file server. Logon to the server
console as a recovery agent. Copy the files from the second file
server to the new partition. D. Create a single NTFS partition.
Restore the contents of Disk1 to a second file server. Instruct
users to copy their files from the second file server to the new
partition.
Answer: B
Compression & Encryption
119. Five Lakes Publishing has a Windows 2000 network serving 200
users. A server named User_srv is used to hold users' files.
User_srv is configured with a single, large NTFS volume. Every user
has a home folder on User_srv. Users can also use a shared folder
named IN_PROGRESS to store files for books that are being prepared.
The network administrator at Five Lakes Publishing configured disk
quotas for the NTFS volume on User_srv. All users have a default
limit of 100 MB, and the option to deny space to users who exceed
their limit has been enabled. When a user named Amy Jones attempts
to save a chapter of a new book to her home folder on the server,
she receives the following error message: "The disk is full or too
many files are open." What should Amy do to allow this document to
be saved? (Choose all that apply.)
A. Compress the files in her home folder to save disk space. B.
Change the security setting of some of the files in her home folder
to grant Full Control permission to a user who has not reached the
quota level. C. Move some of the files from her home folder to the
IN_PROGRESS shared folder. D. Remove files from her home folder
until the total uncompressed file size is less than 100 MB.
Ans: D
120. You share a folder on a Windows 2000 Server computer for
users in your company's London office. You place several subfolders
in the London folder as shown in the exhibit. The Marketing-2 folder
is compressed. You want to move some files from the Research folder
into Marketing-2, and you want to make sure that the files are
compressed when you move them. However, you do not want to compress
the remaining files in Research. What should you do?
A. Move each of the files from Research to Marketing-2. B. Copy
the files from Research to Marketing-2, and then delete the original
files. C. Compress Research, apply changes to the folder only, and
then move the files from Research to Marketing-2. D. Encrypt
Marketing-2, move the files from Research to Marketing-2, and then
decrypt Marketing-2.
Ans:B
Quota
121. Trey Research has a Windows 2000 Server computer named
User_srv. This computer has a RAID-5 controller. The RAID array is
configured as two partitions. Drive C is a 2-GB partition that holds
the operating system and paging file. Drive D is a 30-GB partition
that will hold the home folders for 200 users. Trey Research employs
10 scientists. The user accounts for scientists are members of a
group named Scientists. The scientists use a data capture
application that generates files that can be lager than 100 MB. Trey
Research wants to use disk quotas. Ordinary users should be allowed
to store a maximum of 75 MB of data is their home folder. The
storage for users in the Scientists group should not be limited by
quotas. What should you do to configure this disk quota scheme?
(Choose two.)
A. Enable quota management on drive D. Select the Deny disk space
to users exceeding quota limit Check box. Set the default quota
limit to 75 MB. B. Create a Scientist template account. Create a new
quota entry for this account. Select the Do not limit disk usage for
this entry option button. C. Create new quota entries for the 10
scientists' user accounts. Select the Do not limit disk usage for
this entry option button. D. Enable quota management on drive D.
Select the Deny disk space to users exceeding quota limit check box.
Select the Do not limit disk usage option button for the default
quota limit. E. Create a Scientist template account. Create a quota
entry for this account. Set the quota limit to 30 GB.
Answer: A, C
6- Windows 2000 Network Connections
DNS
122. Your network contains 10 domain controllers, 10 member
servers, and approximately 1,000 client computers. All the servers
run Windows 2000 Server, and all the client computers run Windows
2000 Professional. Two of the domain controllers act as DNS servers.
Users of client computers use file sharing to grant access to files
stored locally. The network has 10 subnets and uses TCP/IP as the
only network protocol. You want to configure the network so that all
computers can resolve the addresses of all other computers by using
DNS. Client computers must be able to register and resolve addresses
if a server fails. How should you configure the DNS servers?
A. Configure one server with a standard primary zone for the
domain, and configure at least one server with standard secondary
zone. B. Configure one server with a standard primary zone for the
domain, and configure at least one server with an Active Directory
integrated primary zone. C. Configure one server with an Active
directory integrated primary zone for the domain, and configure at
least one server with a standard secondary zone. D. Configure at
least two servers with Active Directory integrated primary zones for
the domain. E. Configure at least two servers with standard primary
zones for the domain.
Answer: D
123. Your company has a main office and 50 branch offices. The
main office has a private network with 1,000 computers. Each branch
office has a private network with between 10 and 20 computers and a
56-Kbps connection to the Internet. The company plans to use the
Network Address Translation (NAT) feature of Routing and Remote
Access to provide each office with access to the Internet. When you
test this configuration, you discover that connections cannot be
made to sites by using fully qualified domain names. However,
connections can be made to these sites by using their IP addresses.
You want to be able to make connections by using fully qualified
domain names. What should you do?
A. Configure the computers on each of the branch office networks
with the address of a WINS server. B. Configure the computers on
each of the branch office networks with the address of a DNS server
on the Internet. C. Configure a filter on the NAT servers to pass
DNS packets. D. Create a host file on each of the NAT servers.
Ans:B
124. How can you recreate the PTR record in your Windows 2000 DNS
server from you Windows 2000 client?
A. Run ipconfig /registerdns from the client. B. Run ipconfig all
/registerdns from the DNS server. C. Start the DNS Dynamic service
on your client computer. D. Create a host file with the #DYNAMIC
command on the client computer.
Ans:A
125. You have installed routing and remote access for Windows
2000 on a server named Srv004. Your internal DNS, WINS, and DHCP
services are running properly in the environment. You want this
server to provide internet access for users on that network segment
by using network address translation over a demand dial interface to
your internet service provider. You have installed the NAT protocol
and configured the correct public and private interfaces. All client
computers have their default gateway set to the private address of
Srv004, and can successfully ping the gateway . users can’t connect
to internal network computers correctly, but network traffic does
not reach the ISP. You need to ensure that all users can access the
internet. What should you do?
A. Configure the DNS as a forwarder to your ISP’s DNS. B.
Configure your ISP’s DNS as a secondary to your DNS. C. Install the
RIP version 2 protocol in routing and remote access for Windows 2000
on Srv004. D. Add a static route of 0.0.0.0.0.0.0.0 in routing and
remote access for Windows 2000 on Srv004. E. Add a static route of
0.0.0.0.0.0.0.0 by using the route-p add command Srv004.
Ans:A
126. Your Windows 2000 server provides DNS for you network. You
are not able to ping a Unix server called Unix1. You add a record to
your server DNS for the Unix server, but you still are unable to
ping the server. What should you do? (pick two)
A. Restart DNS on the Windows 2000 server. B. Windows 2000 server
does not support Unix server entries. C. Run ipconfig /registerdns
on the unix server. D. Stop the DNS client service and restart it.
E. Run the ipconfig /flushdns command.
Answer: D,E
DHCP
127. Your network is configured as shown in the exhibit.
"Engineering1 and Sales1 have DHCP installed up them." All the
servers are Windows 2000 Server computers that use TCP/IP as the
only network protocol. The sales department uses one subnet and has
servers named Sales1 and Sales2. The engineering department uses
another subnet and has servers named Engineering1 and Engineering2.
Sales1 and Engineering1 are configured to act as DHCP servers. The
router that joins the two subnets is not RFC 1542 compliant and does
not support DHCP/BOOTP relay. You want to allow Sales1 and
Engineering1 to support client computers on each other's subnets.
What should you do?
A. Set the router option in the DHCP Scopes to 192.168.2.1 for
Engineering1 and 192.168.1.1 for Sales1. B. On Engineering2 and
Sales2, install Routing and Remote Access, and configure RIP as a
routing protocol. C. On Engineering2 and Sales2, install and
configure the DHCP Relay Agent service. D. Configure Engineering2
and Sales2 as DHCP servers without any scopes.
Ans:C
Networking
128. Your network contains NetWare 4.0 Servers. You have
successfully installed Client Service for NetWare on Windows 2000
Professional computers, and Gateway Service for NetWare on Windows
2000 Server Computers. You recently added a new Windows 2000 Server
computer to the network and installed Gateway Service for NetWare on
it. However, the server is unable to connect to any NetWare servers.
What should you do on the new Windows 2000 Server computer to
resolve this problem?
A. Enable NWLink NetBIOS. B. Configure the NWLink IPX/SPX/NetBIOS
Compatible Transport Protocol to use the correct Ethernet frame
type. C. Install RIP routing for IPX. D. Install the SAP Agent.
Answer: B
129. Your network uses the TCP/IP protocol for its Windows 2000
prof and win2000 NT computers. You have ooneserver that acts as both
a Wins server, and a DNS server. All the client computers are
configured to use this server for DNS and WINS. Users of Windows NT
Workstation cannot connect to file server, but Windows 2000
professional users can. This server has a static address off
192.168.1.11. What should you do to allow the Windows NT Workstation
computer to connect to the file server??
A. Select the Enable NetBIOS over TCP/IP. B. Add the WINS address
used by the Windows NT Workstation computers.
Answer: A, B
130. Router problem, what should you use to identify it?
A. Network Monitor B. NBTSTAT C. IPCONFIG D. TRACERT
Ans: D
131. You have an 2000 Server that has two network interface cards
that are installed on the same network segment. Both cards are bound
to TCP/IP and NetBEUI. When you restart the server, you get an error
message about having duplicate server names on the network. What
should you do to fix this?
A. Unbind NetBEUI from one NIC B. Unbind TCP/IP from one NIC C.
Create a MH entry in LMHOSTS D. Create a static entry on the WINS
server
Ans:A
132. You are the administrator of a routed Windows 2000 network.
The network includes 25 Windows 2000 Server computers. You want to
install a new Windows 2000 Server computer as the first computer on
a new routed segment. You configure the existing DHCP server with a
scope that is valid for the new routed segment. During the
installation of the new Windows 2000 Server, you specify that the
server should obtain its IP address from an existing DHCP server.
After you complete the installation, you open My Network Places. You
see the new server but no other computers. You run the ipconfig
command and find that the new server's assigned IP address is
169.254.1.200, with a 16-bit subnet mask and no default gateway
address. You want to resolve the problem so that you can see other
computers on the routed network. What can you do? (Choose two.)
A. Configure all of the routers to route BOOTP broadcast frames.
B. Configure the default gateway to the TCP/IP properties of the new
server. C. Add the IP address for the default gateway to the TCP/IP
properties of the new server. D. Add a DHCP Relay Agent computer to
the new routed segment. E. Add a WINS server to the new routed
segment.
Answer: A,D
133. You are installing a new computer named Svr2.justtogs.com on
your Windows 2000 network. Part of the network is shown in the
exhibit. Svr2.justtogs.com
IP(10.1.2.100/16--------------------router IP(10.1.2.1 submask
255.255.0.0) You want to enter the appropriate TCP/IP addresses for
the subnet mask and the default gateway for Svr2.justtogs.com. Which
subnet mask and default gateway should you use? To answer, drag the
appropriate addresses to the appropriate boxes in the Internet
Protocol (TCP/IP) Properties dialog box.
A. What is the answer?
Answer: A The first router on your computer subnet will be your
default gateway and subnet. The IP scheme and subnet will match
yours, the router will be configured to route the request out to the
network you are looking for. Example Svr2 has an IP of
192.168.201.8/24 the router will have more than one address assigned
but yours will be something like 192.168.201.1/24
134. Server1(IP1)<------------------------>(IP2)
Router(IP3)<----------------------->(IP4) Server3 |(IP5) | |
(IP6) Server2
Server1 wants to talk to Server2, Which IP address is default
gateway for Server1, Click on the graphic to answer.
A. IP1 B. IP2 C. IP3 D. IP4 E. IP5 F. IP6
Answer: B
135. The network uses TCP/IP as the only network protocol. You
configure the remote access server on the network. Some users report
that when they connect to the server they receive the following
message |" IPX SPX compatible computer deported error 733" The EPP
control network protocol for the network is not available. If the
users allow the connection to continue they are able to connect to
the services that use TCP/IP. You want to prevent this message from
being displayed. What should you do?
A. Configure a client computer to use only TCP/IP for the
connections to the remote access server. B. Configure the client
computer to use a defined IPX network address for the connection to
the remote access servers. C. Configure the remote access server to
allow IPX based remote access demand dial connections. D. Configure
the remote access server to disable multi-link connection.
Answer: A
136. You have just configured two Windows NT Servers, Monitor 1
and Monitor 2 with no other software installed. You have an
application server that needs to be monitored for performance to
figure out what it's problem is, or to get some kind of baseline.
You install Network Monitor on Monitor 2. (See the exhibit of the
network layout). What would you do to monitor Application server?
(Choose two)
A. Install Network Monitor on Monitor 1 B. Install Network
Monitor on Application Server C. Configure the network monitor ECP
port comething for TCP D. Configure the network monitor EDP port
something for UDP E. Configure Monitor 2 and Application server as
monitoring partners (or something) to monitor the performance
Answer:
137. You are a network administrator at Contoso, Ltd. You work at
the main office in Seattle. The branch office in Denver is a call
center. The network consists of a Windows 2000 domain only. The
network is configured as shown in the exhibit. Denver is a Token
Ring network. Seattle is an Ethernet network. None of you network
adapters at Contoso, Ltd. support promiscuous mode. The brouter does
not support multicast traffic. Wks1.contoso.com and mem1.contoso.com
are available for use as network monitor clients. You want to be
able to detect and identify rogue installations of network monitor
on your network by using the fewest possible computers. What should
you do? (check all that apply)
A. Install network monitor tools on wks1.contoso.com by using the
Windows Components wizard. B. Install the SNMP protocol on
wks1.contoso.com by using the Windows Components wizard. C. Install
network monitor tools on mem1.contoso.com by using the Windows
Components wizard. D. Install the SNMP protocol on mem1.contoso.com
by using the Windows Components wizard. E. Install a network adapter
on wks1.contoso.com that supports promiscuous mode. F. Install a
network adapter on mem1.contoso.com that supports promiscuous mode.
Answer: A,C
138. You are the administrator of a Windows 2000 Server computer.
The server contains one network adapter and is a file and print
server for critical company resources. You install a second network
adpater in the server and connect it to the same network subnet as
the first adapter. You want to ensure that the first adapter is used
for all netowkr traffic and the second adapter is used only if the
first adapter fails or is disconnected from the network. You also
want to ensure that the server always has network connectivity even
if one network adapter fails. What should you do?
A. Set the second adapters status to disable. B. Configure the
first adapter to use a TCP/IP metric of 100. C. Configure the second
adapter to use a TCP/IP metric of 25. D. Configure the binding order
on the second adapter to bind TCP/IP last.
Answer: C
139. Your network consists of a Windows 2000 Server computer and
10 Windows 2000 Professional computers. The Windows 2000
Professional computers use a modem and a dial-up connection each to
connect to the Internet. Now, you rent a single DSL-Line which will
be configured on your Windows 2000 Server computer. You install
Internet Connection Sharing (ICS) on the server. All Windows 2000
Professional computers have to use ICS. How should you configure all
Windows 2000 Professional computers to connect to the internet
without changing or removing the existing dial-up connection?
(Choose all that apply)
A. In Internet Options select "Never dial a connection". B. In
Local Area Network Settins set "Use automatic configuration script".
C. In Local Area Network Settins set "Automatically detect
settings". D. In Local Area Network Settins set "Use a Proxy
Server". E. In Local Area Network Settins set "Bypass Proxy Server
for local addresses".
Answer: A, C
140. You are the administrator of a Windows 2000 network. You
have installed the SNMP agent on one of your Windows 2000 Server
computers. You want to collect routing information on a second
Windows 2000 Server computer running a third party Network
Management Console. How should you configure the SNMP agent? (Click
to put a crosshair in the appropriate checkbox)
A. Physical B. Applications C. Datalink and subnetwork D.
Internet E. End-to-end
Answer: C
141. You install the Routing and Remote Access service on a
Windows 2000 Server computer in your network. Your network is not
directly connected to the Internet and uses the private IP address
range 192.168.0.0. When you use Routing and Remote Access to dial in
to the server, your computer connects successfully, but you are
unable to access any resources. When you try to ping servers by
using their IP addresses, you receive the following message:
"Request timed out." When you run the ipconfig command, it shows
that your dial-up connection has been given the IP address
169.254.75.182. What should you do to resolve the problem?
A. Configure the remote access server with the address of a DHCP
server. B. Authorize the remote access server to receive multiple
addresses from a DHCP server. C. Configure the remote access server
to act as a DHCP Relay Agent. D. Ensure that the remote access
server is able to connect to a DHCP server that has a scope for its
subnet.
Ans:D
142. You install Terminal Services on a Windows 2000 domain
controller. You install Terminal Services Client on users' client
computers. Users report that when they try to connect to the
Terminal server, they receive the following error message: "The
local policy of this system does not allow you to logon
interactively." When you attempt to log on to the Terminal server as
an administrator from a user's computer, you log on successfully.
You want users to be able to log on to the Terminal server. What
should you do?
A. Grant the users the right to log on as a service. B. Grant the
users the right to log on locally. C. Grant the users the right to
log on over the network. D. Copy the users' profiles to the Terminal
server. E. Copy the users' home folders to the Terminal server.
Ans:B
143. The network uses TCP/IP as the only network protocol. You
configure the remote access server on the network. Some users report
that when they connect to the server they receive the following
message |" IPX SPX compatible computer deported error 733" The EPP
control network protocol for the network is not available. If the
users allow the connection to continue they are able to connect to
the services that use TCP/IP. You want to prevent this message from
being displayed. What should you do?
A. Configure a client computer to use only TCP/IP for the
connections to the remote access server. B. Configure the client
computer to use a defined IPX network address for the connection to
the remote access servers. C. Configure the remote access server to
allow IPX based remote access demand dial connections. D. Configure
the remote access server to disable multi-link connection.
Ans:A
144. You want to provide Internet access for the clients on your
network. You decide to use Network Address Translation (NAT). You
have a Windows 2000 computer you try to establish a secure Virtual
Private Networking session with. You try connecting to the Remote
Windows 2000 computer using L2TP. You are unable to establish a
connection with the remote node using L2TP. You are able to make a
connection with another computer in your same office. Why are you
unable to make a connection to the remote location?
A. NAT does not allow for remote networking. B. L2TP does not
work with Windows 2000 computers. C. You can not establish a L2TP
connection behind a computer running NAT. The L2TP session fails
because the IP Security packets become corrupted. D. You have not
configured the NAT server to translate the IP Security packets.
Ans:C
145. You install a new application on a computer running Terminal
Services in Application Server mode. Users of this application must
have access to files stored on a computer running Netware 4.11.
TCP/IP is not installed on the computer running Netware. What steps
should you take to enable Terminal Services clients to access the
computer running NetWare?
A. Add NWLink to the Local Area Connection of the Terminal
Services server. Configure NWLink with frame type 802.2. B. Add
NWLink to the Local Area Connection of the Terminal Services server
and to the Local Area Connection of the Terminal Services clients.
Configure NWLink with frame type 802.3. C. Add NWLink to the Local
Area Connection of the Terminal Services server. Configure NWLink
with frame type 802.3. D. Add NWLink to the Local Area Connection of
the Terminal Services server and to the Local Area Connection of the
Terminal Services clients. Configure NWLink with frame type 802.3.
Answer: A
7- Installing, Monitoring, and Troubleshooting Security
Group Plicy / GPO
146. You are the administrator of a Windows 2000 Server network.
You configure two sites: one for your New York office and one for
your Paris office. You configure two organization units (OUs) named
New York and Paris. In each of these OUs, you create subordinate OUs
named Sales, Marketing, and Research. You place user accounts,
stand-alone member servers, and Windows 2000 Professional computers
in their appropriate subordinate OUs. You suspect that someone is
trying to log on to your domain by guessing user account names and
passwords. You want to fine out which computers are being used for
these logon attempts. What should you do?
A. Edit the Default Domain Controllers Policy object to audit
directory services access failures. B. Edit the Default Domain
Policy object to audit account logon failures. C. Edit the New York
OU and Paris OU Group Policy objects (GPOs) to audit logon failures.
D. Edit the Group Policy object (GPO) of each subordinate OU to
audit directory service access failures.
Answer: B
147. You are the administrator of your company's network. You are
configuring the security policy for a group of users in the finance
organizational unit (OU). You need to configure a group policy so
that future changes to group policy will be applied within 15
minutes to any computers that are log on to the network. What should
you do?
A. Enable the background refresh settings to use the default
group policy refresh date. B. Enable the asynchronous group policy
application settings. C. Enable and configure the group policy
refresh interval for domain controller. D. Enable and configure the
group policy refresh interval for computers.
Answer: D
148. You have configured a Group Policy Object (GPO) for the
marketing organization unit (OU) to prevent users from accessing My
Network Places and from running System in Control Panel. You want
the Managers Domain Local Group to be able to access My Network
Places, but you still want to prevent them from running System in
Control Panel. What should you do?
A. Add the Managers group to the access control list of the GPO.
Disable the permission of the managers group to read and apply the
Group Policy. B. Add the Managers group to the access control list
of the GPO. Deny the permission of the managers group to read and
apply the Group Policy. C. Create a second GPO in the OU. Add the
Managers group to the access control list. Allow the managers group
to apply the Group Policy. Deny the Authenticated Users group
permission to read and apply the Group Policy. Configure the new GPO
to deny the ability to run system Control Policy Panel. Give the
original GPO a higher priority than the new GPO. D. Create a second
GPO in the OU. Add the Managers group to the access control list.
Allow the managers group to apply the Group Policy. Disable the
Authenticated Users group permission to read and apply the Group
Policy. Configure the new GPO to allow access to My Network Places.
Give the original GPO a higher priority than the new GPO.
Answer: D
149. You are the administrator of a Windows 2000 Active Directory
Network. The network consists of a single domain named adatum.local
that runs in native mode. The domain includes 500 member client
computers, consisting of 200 Windows 2000 Professional computers and
300 Windows NT Workstation 4.0 computers. You create a Group Policy
for the Research organizational unit (OU) and configure the Policy
as shown in the exhibit. None of the users in the Research OU
working at Windows 2000 Professional computers can change the
wallpaper on their desktops or the resolution and colour depth of
their displays. However, when users log on from any of the Windows
NT Workstation computers in the OU, they can change all display
settings. You want to restrict all users of Windows NT Workstation
computers in the OU from changing their desktop wallpaper and from
accessing the settings tab in Display in Control Panel.What should
you do?
A. Add a new computer to the OU and select the "Allow Pre-Windows
2000 computers to use this account" check box. B. Change the Group
Policy so that it also hides the Background tab. C. Create a
seperate Group Policy for a nested OU that contains all Windows NT
computers. D. Configure a Windows NT Policy file and place it in the
winnt\sysvol\Adatum.local\scripts folder on the PDC emulator.
Answer: B
150. You are the administrator of a Windows 2000 active directory
network. The network consists of a single domain. The domain
contains 20 Windows NT 4.0 client computers. All other client
computers are Windows 2000 Professional client computers. You create
an NT 4.0 default user policy on Windows 2000 Server computer that
is configured as PDC emulator. The default policy denies access to
the network neighborhood. You then install terminal services on one
of the servers and terminal services client on two thousand Windows
NT server client computers. You find that users of the terminal
server can still browse the network when they open my network
places. You want to prevent all default users from browsing the
network. What should you do?
A. Modify the Windows NT policy template file so that you can
restrict access to both the my network places and network
neighborhood. Save the policy file on the terminal server. B. Copy
the NT file to 20 Windows NT workstation computers. C. Create a
windows 2000 group policy that denies access to my network places.
D. Edit the local registry on Windows NT workstation computers to
deny access to entire network in the entire neighborhood.
Ans:C
151. You are the administrator of the contoso.local domain. You
organize the domain into organization units (OUs) as shown in the
exhibit. You configure the Local Security Options and other setting
for the Default Domain Policy object. You enable a local security
option policy to display a logon message each time a user attempts
to log on. Suzan Fine, the administrator of the Florida OU, wants to
configure a different logon message for the Orlando OU without
changing the other Local Security Options. What should Suzan do?
A. Create a new Group Policy object (GPO) in the Orlando OU with
the appropriate logon message. Block policy inheritance for the new
GPO. B. Create a new Group Policy object (GPO) in the Florida OU
with the appropriate logon message. Set the option not to override
for the new GPO. C. Create a new Group Policy object (GPO) in the
Orlando OU with the appropriate logon message. Enable policy
inheritance for the new GPO. D. Create two new Group Policy objects
(GPOs) in the Miami and Orlando OUs. Configure the GPO for the
Orlando OU with the appropriate logon message for the Orlando OU.
Place the GPO for the Orlando OU at the top of the priority list.
Ans: A
152. Your network consists of numerous domain within a LAN, plus
remote location that is configured as another domain within the
tree. Each domain contains several organizational units (OUs). The
remote domain is connected to the main office network by a 56-Kbps
connection, as shown in the exhibit. The remote location is running
a previous service pack for Windows 2000, and the LAN is running the
most recent service pack. You want to configure a Group Policy for
the remote location so that users can repair a problem with a
service pack system file. You also want to reduce the traffic on the
LAN and ease administration of the Group Policies. You want to
retain the domain administrator's access to the Group Policy
configuration. NOTE: west.litware is on the 56-Kbps remotely What
should you do?
A. Configure a Group Policy for each OU in the west.litware.com
domain. Configure a service pack software package for each Group
Policy. B. Configure a Group Policy for each OU in the litware.com
domain. Configure a service pack software package for each Group
Policy. C. Configure a Group Policy for the west.litware.com domain.
Configure a service pack software package for the Group Policy. D.
Configure a Group Policy for the litware.com domain. Configure a
service pack software package for the Group Policy.
Ans: C
153. You are the administrator responsible for security and user
desktop settings on your network. You need to configure a custom
registry entry for all users. You want to add the custom registry
entry into a Group Policy object (GPO) with the least amount of
administrative effort. What should you do?
A. Configure an ADM template and add the template to the GPO. B.
Configure an INF policy and add the policy to the GPO. C. Configure
a Microsoft Windows Installer package and add the package to the
GPO. D. Configure RIS to include the registry entry.
Ans:A
154. You are the administrator of contoso.local domain. You
organize the domain into organizational units as shown in the
EXHIBIT. You configure the local security options and other settings
for the default domain policy object. You delegate administration of
Michigan and Florida OU. You want to prevent those administrators
from creating any other group policy objects with settings that
conflict with those you configured. What should you do?
A. From the group policy options from the contoso.local domains
set the option not override. B. From the group policy options from
the Michigan and Florida OU, set the option not override. C. Block
the group policy inheritance for the contoso.local domain. D. Block
the group policy inheritance for Michigan and Florida OU.
Ans:A
155. You are the administrator of Windows 2000 domain and TWO
Windows NT domains. The Windows 2000 domains trust each of the
Windows NT domains. Each of Windows NT domains trust the Windows
2000 domain. A Windows 2000 domain controller named DC1 is
configured to use a highly secure domain controller template. Users
in the Windows NT domain report that they cannot access DC1. You
need to allow the users of computers in the Windows NT domain to
access resources on DC1. What should you do?
A. Apply a less restrictive custom security template to DC1. B.
Apply a less restrictive custom policy to Windows NT domain
controller. C. Ensure the Windows 2000 domain is configured in the
mixed mode D. Ensure the Windows 2000 domain is configured to run in
the native mode.
Answer: A
156. You configure several Group Policies to restrict user's
desktop settings. You want them to be applied immediately. What
should you do?
A. Run secedit /refreshpolicy MACHINE_POLICY B. Run secedit
/refreshpolicy USER_POLICY C. Run net config /refreshpolicy
DOMAIN_POLICY D. Run refresh /DOMAIN_POLICY
Answer: B
157. You are the administrator of a Windows 2000 Server computer.
You configure the server to audit all access to files that are
places in shared folders. One week after you configured the server,
users report that the server has stopped responding. You investigate
the problem and discover a stop error with the error message: Stop
C0000244 (Audit Failed). An attempt to generate a security audit
failed. You restart the computer. You need to ensure that you can
keep a record of all files access on the server. You also need to
ensure that the stop error will not occur again.
A. Set the CrashonAuditFail registry key to 0. B. Set the
Security Log to overwrite events as needed. C. Delete the Liscense
Trial registry key. D. Increase the size of the security log. E.
Save the security log to a file, and clear it every morning.
Answer: A
158. Computer accounts and user accounts in your domain have been
seperated into OUs for administrative purpose. You want to require
strong passwords for the local user accounts only. What should you
do?
A. Set a Group Policy on each local computer to enable the
passwords must meet complexity requirements policy. B. Set a Group
Policy on the domain to enable the passwords must meet complexity
requirements policy. C. Set a Group Policy on all OUs containing
computer accounts to enable the passwords must meet complexity
requirements policy. D. Set a Group Policy on all OUs containing
user accounts to enable the passwords must meet complexity
requirements policy.
Answer: A
159. You wish to setup a domain policy to have passwords expire
in 30 days. You wish to setup a local computer policy to have
passwords expire in 90 days. Choose two:
A. Set Domain Policy for password expiration in 30 days. B. Set
Domain Policy for password expiration in 90 days. C. Set OU for
password expiration in 30 days. D. Set OU for password expiration in
90 days. E. Set Local Computer Policy for password expiration in 30
days. F. Set Local Computer Policy for password expiration in 90
days.
Answer: A, F
160. You are the administrator of 20 Windows 2000 Professional
computers and 2 Windows 2000 Server computers for your domain. You
want to set an account policy that locks any user account after 3
failed logon attempts. You also want to ensure that only
administrators will be able to unlock the account. What should you
do? (Choose 2)
A. Set the account lockout duration to 0. B. Set the account
lockout duration to 3. C. Set the account lockout threshold to 0. D.
Set the account lockout threshold to 3. E. Set the reset account
lockout after to 0. F. Set the reset account lockout after 3.
Answer: A, D
161. You are the administrator of a high security network. Many
files stored on your Windows 2000 file servers and Windows 2000
Professional computers are highly confidential. You want to
implement identical security configurations on all Windows 2000 file
servers and Windows 2000 Professional computers. What should you do?
(Choose all that apply)
A. Configure Group Policies to apply the security configuration
to all Windows 2000 file servers and Windows 2000 Professional
computers. B. Use the Security Configuration Management Console to
import security information from a file server as a template. C. Use
the Security Configuration Management Console to import security
information from a Windows 2000 Professional Computer as a template.
D. Use Secedit to export the security configuration to all file
servers. E. Use Secedit to export the security configuration to all
Windows 2000 Professional computers.
Answer: A, B, C
EFS
162. Your company has a human resources (HR) manager named Sean
Chai. He keeps your company's confidential HR files in a shared
folder. To increase the security of the HR files, Sean set the
folder to encrypt the files. Sean leaves the company without reset
the permissions and encryption settings for the HR files. The files
must be made accessible to the new HR manager. Which two actions
should you take to allow this access? (Choose two.)
A. Set the file permissions on the HR files to allow access to
the new manager. B. Back up the shared folder to tape and restore
the files to a different folder. C. Log on as an administrator and
remove the encryption attribute from the HR files. D. Log on as the
new manager, connect to the shared folder, and run the cipher /e /s
. command. E. Configure the new manager's account to be an Encrypted
Data Recovery Agent for Sean's account.
Answer: A, C Others
163. You are the administrator of Windows 2000 domain and TWO
Windows NT domains. The Windows 2000 domains trust each of the
Windows NT domains. Each of Windows NT domains trust the Windows
2000 domain. A Windows 2000 domain controller named DC1 is
configured to use a highly secure domain controller template. Users
in the Windows NT domain report that they cannot access DC1. You
need to allow the users of computers in the Windows NT domain to
access resources on DC1.
What should you do?
A. Apply a less restrictive custom security template to DC1. B.
Apply a less restrictive custom policy to Windows NT domain
controller. C. Ensure the Windows 2000 domain is configured in the
mixed mode D. Ensure the Windows 2000 domain is configured to run in
the native mode.
Ans:A
Remote Access
164. Your company has a Routing and Remote Access server at its
main office. One of the company?¦s branch offices also runs Routing
and Remote Access on a server that has one modem. This server is
configured to use demand-dial routing to connect to the main office.
This server is part of the company?¦s Active Directory domains. The
domain runs in native mode. Some employees at this branch office use
the branch office same to access their files from here. The manager
of the branch office reports that sometimes none of the user in the
office can connect to the main office. When you examine the event
log on the branch office server to find that users have been
connecting to the server during working hours. The manager wants
users to be able to dail in to the server between 6:00p.m. and
8:00a.m. However, the manager still wants users to be able to log on
at any time when connected directly to the LAN.
A. Change the logon hours for user’s accounts to deny between
8:00a.m. and 6:00p.m. B. Set the remote access policy to deny
connection between 8:00a.m. and 6:00p.m. C. Create one batch file to
start Remote Access Connections Manager server, and create another
batch file to stop it. Schedule the stop batch file to run at
8:00a.m. every day and the start batch file to run at 6:00 p.m.
every day. D. Create two user accounts for each user. Grant dail-in
permission for an account and deny dail-in permission to second
account. Change the login hour for the dail-in accounts to de logon
between 8:00 a.m. and 6:00p.m.
Answer: B
165. Both of your domains are Active Directory domains that run
in native mode. How can you see a list that shows which users are
allowed to use remote access to your network ??
A. Create a group named RAS_USERS. Add users who are permitted to
dial in to the network. Create a remote access policy that allows
this group to use the remote access server Display the members of
the group
B. Create a group named RAS_USERS.
Add users who are allowed to dial into the network.
Set the remote access permissions for this group to allow access.
To show who has access to the remote access server display the
members of the
group.
C. Write a script for the windows scripting host in the script
through the members of the users container.
Display the name of any user who has the remote access permission
set to allow access.
D. Use the default remote access policy to users and groups who
have been granted remote access permissions.
Answer: A
166. You enable the Routing and Remote Access Service (RRAS) on a
computer running Windows 2000 Server. You configure the computer as
a RAS server. You want to provide mutual authentication between the
RAS server and RAS clients. You also want to ensure that data
passing between the RAS server and RAS clients is encrypted. Which
authentication method should you use for your incoming connections
to support mutual authentication and data encryption?
A. CHAP B. MS-CHAP v2 C. PAP D. SPAP
Ans:B
167. You are the network administrator at Island Hopper News. The
domain and network configuration is a single-site Windows 2000
domain that is configured as shown in the exhibit. You must provide
Terminal Services to the Pentium MMX client computers. You also need
to be able to manage user liscenses and enable users to access
term1.islandhoppernews.com. First you install Terminal Services in
Application server mode on term1.islandhoppernews.com. What should
you do next?
A. Install Terminal Services liscensing on
term1.islandhoppernews.com. Select the Enterprise liscense server
option. B. Install Terminal Services liscensing on
term1.islandhoppernews.com. Select the Domain liscense server
option. C. Install Terminal Services liscensing on
file1.islandhoppernews.com. Select the Enterprise liscense server
option. D. Install Terminal Services liscensing on
file1.islandhoppernews.com. Select the Domain liscense server
option. E. Install Terminal Services liscensing on
uu2.islandhoppernews.com. Select the Enterprise liscense server
option. F. Install Terminal Services liscensing on
uu2.islandhoppernews.com. Select the Domain liscense server option.
Answer: B
168. Your Routing and Remote Access for Windows 2000 is
configured with the policies shown in the exhibit:
Remote Access Policy .............. 1 Remote Access Policy
.............. 2 Remote Access Policy Logon Required 3
The current configuration allows users to connect remotely after
logging on. You want to limit remote connections to logon
connections only. What should you do?
A. Delete the required L2TP policy. B. Configure the logon
required policy to grant access. C. Move the logon required policy
to number one in the policy order. D. Change the "Allow access if
dial-in permission is enabled" policy to include the logong required
policy.
Answer: C
Review
Important Review Problem Special Extraordinary
1.You have 20 identical new pc ,except for network & vga
card,all pc in the same HCL you need to Install windows 2k server in
easy way? (take 2)
A. use setp manager to creat Answer File B. copy the folder I386
to every local hard disk C. use SYSPREP with -NOSIDGEN D. use
SYSDIFF to creat image file E. Create UDF file
ANSWER IS: A & B
2.You have a HP printer using JetDirect driver on your network,
the user will print the package label with this Printer. It is
configured to use HPCL. Later, your user complained about the
slowness in printing the package labels. what should you do then
A. HPCL -> RAW B. HPCL -> Postscript C. Add another HP
printer, blah, blah D. Add another 3 HP printer, blah, blah
ANSWER= B
8. You are the administrator of a Windows 2000 Network. You want
to upgrade 50 NT Server machines to W2K 2000 and place them in a
single domain. The domain includes 300 member client computers
consisting of 200 Windows Professional computers and 100 NT
workstation computers. You implement GPO's for each OU. However, you
want to restrict users of the W2K Professional computers from
accessing registry editing tools. What should you do?
A) Create an OU that contains all win nt users and computers
Create a GPO in the OU that restricts users from accessing registry
editing tools
B) Create a NT system policy file on the W2K domain controller
Configure the policy so that it restricts default users from
accessing registry editor tools
C) Create a mandatory user profile for the win nt users that
removes any shortcuts or registry editor and system policy editor
from each users desktop
D) Create a NT System policy file that restricts default users
from accessing registry editing tools. Save the system policy to
each users home folder.
ANSWER= D
11)You have a new modem on a W2K server. When you restart the
computer W2k detects the modem and installs the default drivers.
Occasionally the modem stops communicating with your ISP and you
have to restart. You download an updated driver for the modem and
save it to your winnt folder. What do you do next?
A) In the property sheet for the modem device you click on the
UPDATE DRIVER command button B) Use device manager to search for
hardware changes C) use device manager to delete the modem, the
restart the pc D) move new driver to the winnt\drivercache folder,
restart your pc
ANSWER= A
12) A W2K server has 2 disks attached to an EIDE. You need
additional space. You add a new scsi disk controller that has 6 new
disks attached. the new controller is not included on the current
HCL. When you restart you computer, W2K does not detect the new
controller.What do you do? Choose 2:
A) Use device manager to turn of the IRQ steering in the
properties of the standard pc B) Use the disk manager to restore the
basic configuration. Restart the pc. C) Use the add/remove hardware
wizard to add a new scsi and raid controller supplied by the
manufacturer D) Use disk management to rescan the disks E )Use the
manufacturer’s setup program to install the driver for the scsi disk
controller
ANSWER= A & E
5.Your Win2000 Srv computer contain four hard disks of different
sizes.Each hard disk is configured as a basic disk and has a single
5-GB partition. All 4 disks have the amount of unpartitioned space
shown in the following table: Disk Unpartitioned Space Disk 0 3-GB
Disk 1 4-GB Disk 2 3-GB Disk 3 8-GB
On each hard disk, you create a second partition that uses the
remaining unpartitioned space on the disk. You create an 18-GB
stripe volume that includes all four of the new partitions.Six
months later, disk 1 fails. You replace it with a new hard disk, and
create the necessary partitions. Asquickly as possible, you need to
retrieve the data that was contained on disk 1. What should you do?
A. Restore the first partition on disk 1 from the most recent
tape backup. Use disk management to repair and rebuild the stripe
volume.
B. Delete and re-create the stripe volume. Restore the contents
of disk 1 from the most recent tape backup.
C. Restore both partitions on disk1 from the most recent tape
backup. Delete and re-create the stripe volume. Restore the first
partition on disk 1 and then stripe volume from a recnt tape backup.
A: A
6.Some applications on your company network use defined domain
user accounts as their service accounts. Each computer that runs one
of theses applications should have the respective service account
inthe local administrators group.Currently, you individually place
these service accounts in the local administrators group on the
appropriate Win2000 Pro computers.You need to centralize this
process.What should you do?
A. Add the applications service accounts to the domain admins
group.
B. Add the applications service accounts to the local
administrator group. Use the restricted group option in each
computers local group policy.
C. Add the applications service accounts to the local
administrators group by using the restricted groups option in an OU
group policy.
D. Add the applications service accounts to the local
administrators group by using the restricted groups option in a
domain group policy.
Answer= D
107. You are the administrator of a Windows 2000 Server computer.
The server hosts several web sites that have logging enabled. You
use a third-party reporting utility to analyze the log files
produced by the web sites. You notice that all data from 7:00pm to
midnight each night is included in the following day's logfile. You
want all data to be included in the correct day's log file. What
should you do?
A. Ensure that the log type is set to W3C.
B. Change the log rollover property in the website's logging
properties.
C. Change the time zone setting in the time properties on the web
server.
D. Configure the time service on the web server to use local
system account.
Answer: B
108. Your Windows 2000 Server computer contains four 16GB hard
disks. Disk0 is configured as a basic disk. Disk0 has a single 16GB
partition that contains the boot and system files. Disk 1, 2 and 3
are configured as dynamic disks in a RAID5 volume. The entire server
is backed up to a tape drive each night. During your daily review of
the servers event logs, you discover that Disk1 has failed. You shut
down the server and replace Disk1 with a new hard disk. When you
restart the server Windows 2000 starts normally, but the data on the
RAID5 volume is inaccessible. Disk Management indicates that Disk2
has failed too. You replace Disk2 with a new hard disk. Now you need
to recover the data on the RAID5 volume as quickly as possible. What
should you do?
A. Use Disk Manager to rebuild RAID5 partition.
B. Delete and recreate the RAID5 partition. Restore the contents
of RAID5 partition from the most recent tape backup.
C. Use Windows 2000 backup to restore the contents of Disk2. Use
Disk Manager to rebuild the RAID5 partition on Disk1.
D. Delete and recreate the RAID5 partition. Restart the server by
using Windows 2000 Setup CD, and select repair option.
Answer: B
114.You configure a local group called Accounting and create a
mandatory profile for the group. The profile include a logo saved
with 16 bit colour and 1024 x 768. Some pcs in Accounting have a
standard VGA adapter while others have a SVGA adapter. 4 users say
the bitmap is distorted and display the wrong colour depth. You want
these users to view it correctly. What to do?
A. Configure a roaming profile. B. Configure a seperate profile
for each user. C. Change to 16 bit 640 x 840 and reconfigure. D.
Reinstall appropriate WDM compliant drivers for pcs that do not
display the bitmap correctly
Answer: C
116. Your network contains two routed subnets: Subnet A and
Subnet B. Subnet B contains a Windows 2000 server configured as a
DHCP server. This server has scopes created for both Subnet A and
Subnet B. Subnet A does not contain a DHCP server.
The clients on Subnet A are not receiving IP addresses from the
DHCP server. What can you do to enable clients in Subnet A to
receive dynamically assigned IP addresses? Choose all that apply.
A. Configure an RFC 1542-compliant router to forward BOOTP
messaging between subnets. B. Configure an RFC 1560-compliant router
to pass all UDP traffic on ports 2151, 2152, 2153 and 2154. C.
Install and configure a DHCP server on Subnet A. D. Configure the
clients on Subnet A to use H-node NetBIOS name resolution. E.
Configure a DHCP relay agent on Subnet A to forward DHCP messages to
Subnet B F. Create a superscope on the DHCP server in Subnet B which
contains both the scope for Subnet A and the scope for Subnet B.
Answer: A, B, E
68. Running system monitor locally and ensuring it has least
impact on other processes, how do you measure the physical disk
performance counters on your win2000 server computer?
A. From the command prompt run the start/low perform command B.
Use Task manager to set the priority off the MMC.EXE process to Low
Answer: A
165. Both of your domains are Active Directory domains that run
in native mode. How can you see a list that shows which users are
allowed to use remote access to your network ??
A. Create a group named RAS_USERS. Add users who are permitted to
dial in to the network. Create a remote access policy that allows
this group to use the remote access server Display the members of
the group
B. Create a group named RAS_USERS.
Add users who are allowed to dial into the network.
Set the remote access permissions for this group to allow access.
To show who has access to the remote access server display the
members of the
group.
C. Write a script for the windows scripting host in the script
through the members of the users container.
Display the name of any user who has the remote access permission
set to allow access.
D. Use the default remote access policy to users and groups who
have been granted remote access permissions.
Answer: A
8. there the exhibit showed an warning message, guess it had
something to do with an appplication running which I had to close.
Maybe it had to do with the process window in task manager. I don’t
remember this Q correctly
I had choices like these: A Close My Computer window B Choose yes
to proceed C some kinda command???? C some kinda command????
Answer: A
89. You have configured a Gourp Policy Object (GPO) for the
marketing oranization unit OU) to prevent users from accessing My
Network Places and from running System in Control Panel. You want
the Managers Domain Local Group to be able to access My Network
Places, but you still want to prevent them from running System in
Control Panel. What should you do?
A. Add the Managers group to the access control list of the GPO.
Disable the permission of the managers group to read and apply the
Group Policy.
B. Add the Managers group to the access control list of the GPO.
Deny the permission of the managers group to read and apply the
Group Policy.
C. Create a second GPO in the OU. Add the Managers group to the
access control list. Allow the managers group to apply the Group
Policy. Deny the Authenticated Users group permission to read and
apply the Group Policy. Configure the new GPO to deny the ability to
run system Control Policy Panel. Give the original GPO a higher
priority than the new GPO.
D. Create a second GPO in the OU. Add the Managers group to the
access control list. Allow the managers group to apply the Group
Policy. Disable the Authenticated Users group permission to read and
apply the Group Policy. Configure the new GPO to allow access to My
Network Places. Give the original GPO a higher priority than the new
GPO.
Answer: D
94. You are the network administrator at Humongous Insurance, a
major insurance comapny that has 1,000 offices world wide. You are
configuring the network so that only the sales staff can connect to
it from home. Your Windows 2000 forest contains a member server
named SV1 that has Routing and Remote Access for Windows 2000
enabled. You configure SV1 to use a modem bank to accepr incoming
dial-up attempts. You configure SV1 to use Windows Authentication as
the authentication Provider. The only supported authentic method is
MS CHAP V2. You need to restrict access to SV1. What should you do?
A. Create an OU named SS. Populate SS with the sales staff user
accounts. Provide access to this OU by using the
Client-Friendly-Name attribute of the default remote access policy.
B. Create an OU named SS. Populate SS with the sales staff user
accounts. Provide access to this OU by using the Windows-Group
attribute of the default remote access policy.
C. Create a new remote access policy. Add the Everyone group to
this policy by using the Windows-Group attribute in the properties
of each sales staff user acounts. Control dial-in access through
remote policy.
D. Create a Windows 2000 glocal group. Populate this global group
with the sales staff user accounts. Provide access to the global
group by using Windows-Group attributes of the default remote access
policy.
Answer: A
97.You are a network administrator at Contoso, Ltd. You work at
the main office in Seattle.The branch office in Denver is a call
center. The network consists of a Windows 2000 domain only. The
network is configured as shown in the exhibit. Denver is a Token
Ring network. Seattle is an Ethernet network. None of you network
adapters at Contoso, Ltd. support promiscuous mode. The brouter does
not support multicast traffic. Wks1.contoso.com and mem1.contoso.com
are available for use as network monitor clients. You want to be
able to detect and identify rogue installation s of network monitor
on your network by using the fewest possible computers. What should
you do? (check all that apply)
A. Install network monitor tools on wks1.contoso.com by using the
Windows Components wizard.
B. Install the SNMP protocol on wks1.contoso.com by using the
Windows Components wizard.
C. Install network monitor tools on mem1.contoso.com by using the
Windows Components wizard.
D. Install the SNMP protocol on mem1.contoso.com by using the
Windows Components wizard.
E. Install a network adapter on wks1.contoso.com that supports
promiscuous mode.
F. Install a network adapter on mem1.contoso.com that supports
promiscuous mode.
Answer: A,C
99. You configure your Windows 2000 Server as a print server. You
install a second PnP Network adapter to improve the performance. The
first adapter uses IRQ11, and the second adapter uses IRQ5. The
server is now unable to print to print devices connected to a
non-PnP LPT2 port adapter .You want to continue to use the print
devices connected to your print server. What should you do?
A. Use device manager to change the IRQ for LPT1 to IRQ10.
B. Use device manager to change the IRQ for LPT2 to IRQ7.
C. Edit the CMOS setting of the servers BIOS to reserve IRQ7 for
non-PnP devices.
D. Edit the CMOS setting of the servers BIOS to reserve IRQ5 for
non-PnP devices.
Answer: D
100. Your company network includes a PentiumII, 450Mhz database
server names Webdata1. Webdata1 supports a high-traffic e-commerce
web site on a server names Webserver1. Users access the e-commerce
website from their Internet browsers. Users report that when they
attempt to complete a purchase, they must wait five minutes for
confirmation that their order has been processed.You want to use
Task Manager to help you decide whether an additional processor is
needed. What should you do?
A. On the performance tab, select the option to monitor the
system cache.
B. On the performance tab, select the option to monitor the
available physical memory.
C. On the process tab, select the option to monitor the memory
usage column, Monitor this column.
D. On the proces tab, configure the view to include the thread
count column, Monitor this column. E. On the proces tab, configure
the view to include the page faults column, Monitor this column.
Answer: D
102. You are the administrator of a Windows 2000 Server computer
named Intra. Intra is a member of an Active Directory domain and
hosts an Intranet Web Site for your company. Company policy requires
that only authenticated users have acces to the intranet site. All
company users have a user account in the Active Directory domain.
You configure directory security for the Web Site to use integrated
security. However, you discover that users can access the Web Site
without authentication. You need to ensure that only authenticated
users can access the web site. What should you do?
A. Install Active Directory on the server.
B. Select Basic Authentication check box.
C. Clear the Allow Anonymous Connection check box.
D. Disable the IUSE_inta user account on Intra.
E. Clear the Allow IIS to Control Password check box.
Answer: C
131. Your nettwork uses the Encryption File System (EFS) to
encript data. You are installing a new Server that has a 6 GB NTFS
partition. You want to move numerous EFS folders to a new server .
these folders must maintain their encription. What should you do ?
A. Backup the foldrer using the backup utility in Windows 2000
Answer : A
132. Your Windows 2000 domain operates in native mode. The Server
uses the default remote accsess policy. You want the remote access
permissions for new user accounts to automaticcally allow access.
What should you do ??
A. Change the setting from Control Access trhrough Remote Access
Policy to allow Access.
Answer : A
134. Your Windows 2000 network is configured with Active
Directory and Group Policies. You create a Group Policy Object
linked to Organisational Unit. You do not want the GPO to user any
policies from the domain. What should you do ??
A. CHECK " Block Inhheritance" Box in the main screen of the OU's
GROUP POLICY EDITOR.
Answer : A
136. You have an Active Directory-enabled Windows 2000 Server.
You createan Organisational Unit with a child OU named Disigners.The
child objectmust have explicit right assigned to it, but the OU's
permission must propagate to the OU and all its other child objects.
What should you do ? (choose all that applay)
A. Configure permission inherance on the OU B. From the secutity
tab, clear the Allow Inheritable Permission From Pasrent to
propagate To this OBJECT on the Designer's Object.
Answer: A, B
139. You want to install Windows 2000 Server on a computerwith a
9.1 GB SCSI hard disk with ID-09.You begin instsllation and after
the text mode you install SCSI RAID controller for 3 disks, 15 GB
each. The ID of the controller is 0.you restart the computer and
receive a message NTDLR is mising or corrupt. What to do ?
A. Make sure that the SCSI ID are not the same value.
Answer: A
140. There is a compagnie with RAID 5 NTFS volume D, it has 2GB
free space (of a total 80 GB) And a hard drive volume C with 16 GB
free space . you anticipate you will need 10 GB more Space in the
next month , but your compagnie cannot afford it. What can you do ?
A. Move Data to volume C, thus freeing space on volume D
Answer: A
141. You are the administrator of a Windows 2000 workgroup at
Awesome computer. Users currently do not have access to the
internet.you want to all users to be able to access the Internet by
using MEM3. Which three is right ?
A. Configure the appropriate DHCP scope options on MEM2 B. Anable
ICS on MEM3 C. Install and configure Windows 2000DNS server on MEM2
Answer: A, B, C
144. You use Setup Manager to create an answer file for an
unattend installation of Windows 2000 Server. Which components can
you specifiy using Setup Manager. (Choose all that applay)
A. Create a subfolder in distribution folder Define user name
options such as creating a Uniqueness Database File to access a File
of valid computer names.
Answer: A
146. You have Windows 2000 clients that use only TCP/IP. You also
have Win 3.1 clients that use NetBEUI. You install a new Windows
2000 server and configure it for TCP/IP and NetBEUI. The Win3.1
clients can connect, but the Win 2000 clients cannot. What would you
check ?
A. Ensure that NetBIOS over TCP/IP is enabled in the Advenced
TCP/IP setting
Answer: A
147. You have Windows 2000clients that use only TCP/IP .You also
have win3.1 clients that use NetBEUI. You install a new Windows 2000
Server and configure it for TCP/IP and NetBEUI. All clients are able
to connect. However, when you check network ressources on the
server, you notice a delay before the server list is returned. What
would you do?
A. Disable NetBEUI from Client for Microsoft Networks setting in
the Advenced settings on The adapter
Answer: A
148. Your compagnie adds a new application to the nettwork that
reads and writes large image file to a server for 100 of your users.
When they all use the application simultaneously, the application
has a slow response time. There are more than 12,000 users in the
domain where The imaging server resides, but none of them are
reporting any problems. How could you use System Monitor to discover
the cause of this problem ?
A. log the Avg.Disk Queue length counter for the Physical Disk
Object.
Answer: A
149. Your nettwork includes Win2000,Win NT 4.0,Win 95 and UNIX
clients. You have a Windows 2000 print Server called PRINT1. If your
UNIX clients support the LPR printing protocol, How would you make
PRINT1 availble to them?
A. Install Microsoft Print Services for UNIX on PRINT 1.
Answer: A
150. You have both Windows 2000 Server and NetWare Server on your
network. the netware clients all use the IPX/SPX protocol only.you
install a DATAbase server on a Windows 2000 machine called DB1. this
computer has NWLINK and uses the 802.2 frame type and a network
number of 77. The NetWare clients on the same subnet can accsess
DB1. However, NetWare clients on other subnets cannot. What should
you do ?
A. Configure the other NetWare clients to use network number 77.
Answer: A
151. You are installing a VPN. the VPN server is located inside a
firewall wich is configured to pass ICMP, TCP port 25 for SMTP, port
119 for NNTP, and port 80 for HTTP only. The VPN fails when you try
to connect over the internet.However, you can ping the VPN Server
What do you need to do the firewall to achieve a succssfull
connection ?
A. Enable port 135 for the RPC port mapper service. enable ports
137, 138, and 139 for NetBIOS.
Answer: A
152. You need to measure physical disk performance counters on
your Windows 2000 Server computer. You want to run System Monitor
locally on the server. You also want to ensure that System Monitor
has the least impact on other processes currently running. What can
you do? (Choose two.)
A. From a command prompt, run the Start /low perfmon command. B.
From a command prompt, run the Start /normal perfmon command. C.From
a command prompt, run the Start /min perfmon command D. Open System
Monitor, and then use Task Manager to set the priority of the
Mmc.exe process to Low. E.Open System Monitor, and then use Task
Manager to set the priority of the Mmc.exe process to Normal.
Answer: AD
39. You have an 2000 Server that has two network interface cards
that are installed on the same network segment. Both cards are bound
to TCP/IP and NetBEUI. When you restart the server, you get an error
message about having duplicate server names on the network. What
should you do to fix this?
A. Unbind NetBEUI from one NIC.***** B. Unbind TCP/IP from one
NIC C. Create a MH entry in LMHOSTS D. Create a static entry on the
WINS server.
40. You have installed routing and remote access for Windows 2000
on a server named Srv004. Your internal DNS, WINS, and DHCP services
are running properly in the environment. You want this server to
provide internet access for users on that network segment by using
network address translation over a demand dial interface to your
internet service provider. You have installed the NAT protocol and
configured the correct public and private interfaces. All client
computers have their default gateway set to the private address of
Srv004, and can successfully ping the gateway . users can’t connect
to internal network computers correctly, but network traffic does
not reach the ISP. You need to ensure that all users can access the
internet. What should you do?
A. Configure the DNS as a forwarder to your ISP’s DNS.**** (100%
correct) B. Configure your ISP’s DNS as a secondary to your DNS. C.
Install the RIP version 2 protocol in routing and remote access for
Windows 2000 on Srv004. D. Add a static route of 0.0.0.0.0.0.0.0 in
routing and remote access for Windows 2000 on Srv004. E. Add a
static route of 0.0.0.0.0.0.0.0 by using the route-p add command
Srv004.
47. Your organization is using a single domain split between two
cities: Nashville and Memphis. Communication between the cities is
facilitated by a WAN link. The PDC of the domain resides in
Nashville. Users in Memphis are complaining that their logon process
is along. What action should you perform to speed up logon
authentication for the Memphis office?
A. Increase the value of the Pulse setting in the registry on the
PDC in Nashville B. Increase the value of the PulseConcurrency
setting in the registry on the PDC in Nashville C. Increase the
value of the PulseMaximum setting in the registry on the PDC in
Nashville D. Add an additional BDC to the network in Memphis.*****
48. Your Windows 2000 Server computer has two SCSI hard disks.
The hard disks are configured as SCSI ID 0 and SCSI ID 1 on a single
SCSI host bus adapter. The hard disks are mirrored and each hard
disk is formatted with a single NTFS partition. One of the hard
disks has just failed. After replacing the failed hard disk with a
new disk, what else should you do to recover from the hard disk
failure?
A. Choose Establish Mirror in disk administrator B. Choose Break
Mirror in disk administrator and then choose regenerate in Disk
Administrator C. Choose Break mirror in disk administrator and then
choose establish mirror in disk administrator.***** D. Wait for
Windows NT to regenerate the mirror
51. You configure a HP jet direct network printer device on your
window 2000 domain srv2 on sales.juttogs.com. This is connected to
the TCP/IP port to the print device. However, when you enter IP
address of the device, you receive the dialog box in the printer
port wizard. See diagram show:
srv2 ip: 10.1.10.35. gateway 10.1.10.100/16 HP printer jet direct
Ip: 10.4.20.200/16 Router Ip: 10.5.20.100/16
Another diagram :
A. Select HP Jet Direct from standard drop-down list. B. Select
the custom option button, click setting command button and than LPR
printer. C. Change IP of the printer device to 10.5.20.200.***** D.
Change subnet mask of the print device to 255.0.0.0 E. Change
default gateway on Srv2.sales.jottom.com to 10.5.20.100.
1. You are planning the installation of windows 2000 server on a
new computer that has four 50-GB hard disk drives installed. You
want windows 2000 setup to create a single partition on disk 0 of
the largest possible size and to install the operating system on the
partition. After windows 20000 has been installed you also want to
configure the remaining three disks in such a way that the maximum
amount of space on all four disks can be accessed from a single
drive letter.
Which of the following methods should you use to achieve your
objectives?
A. On disk0 create a 4 GB fat16 partition during setup. Use disk
management to covert all four disks to dynamic disks and combine
unallocated space on all four disks into a single spanned volume.
B. On disk 0 create a single 50 GB ntfs partition during setup.
Use disk management to create a single 50 GB ntfs partition on each
of the remaining disks and then mount each partition to a separate
empty folder on disk 0.
C. On disk 0 create a 32 FB fat32 partition during setup. Use
disk management to convert all four disks.
D. On disk 0 create a single 50 GB ntfs partition during setup.
Use disk management to convert all four disks to dynamic disks and
then extend the simple volume on disk 0 to include all of the
remaining disks into a single striped volume.
Ans: B
2. You have an application server named App1. On this server you
have many custom built programs. All of these programs are launched
as a service on startup. You have one program that is called
Finance. This application is critical to your Accounting department.
You find that the Finance program is making App1 unstable due to
errors in the program code. You want to have App1 run stable until
the code errors are fixed.
What should you do? (Not exactly word for word, but you get the
idea. It was worded bad on the exam too)
A. Open Task Manager and run the Finance application as
/BelowNormal
B. Open Task Manager and run the Finance application as /Low
C. Don't remember - It was wrong
D. Open Services and change the startup type from Automatic to
Manual
ANS: D
3. You have the following exhibit:
(garbled litware.com, contoso.com, is.litware.com,
finance.litware.com, is.contoso.com, support.is.litware.com,
support.contoso.com & development.contoso.com)
You need to deploy and service pack to the support.is.litware.com
domain and the support.contoso.com.
How should you deploy?
A. Assign to litware.com and contoso.com domains
B. ??
C. Create 2 sites, 1 tree in each site. Create a GPO in each site
D. Create 1 site that contains 2 trees. Creat a GPO for the site
ANS: D
4. You are a regional admin who is performing location-specific
tests for an enterprise migration. Test server computers and test
client computers have been deployed at your location. Your location
plans to have a site Group Policy applied after the actual migration
is complete. You need to provide the lead admin the security
settings for the appropriate computers in your location. Which item
should you provide?
A. a policy template file that is exported from the Security
Configuration and Analysis utility.
B. An administrative template file from Group policy.
C. A template list that is exported from the Security
Configuration and Analysis utility.
D. A Group Policy Object.
ANS: D
5. You create some folder in a root G and you don`t want users
from network to create folders in root but they can create
subfolders in the folder you have created.
What do you do?
A. create folder in G:,configure block permission inheritance
B. create folder in G:,configure permission allow user create
subfolder. block permission inheritance
C. create folder in G:,confige block permission inheritance
prevent create folder in the root.
D. create prevent create folder in the root create folder in G:,
configure block permission inheritance
ANS: B
You install a new EIDE DVD, after the installation the computer
stops with an error IRQ_NOT_EQUAL.
What should you do to resolv the problem?
A. Start with recovery console (or ERD disk). Copy the driver in
the directory c:winntsystem32
B. Start the computer with the last know good configuration,
uninstall the driver and schedulle the installation for the next
maintenance period.
C. Start the computer in safe mode, uninstall the driver and
schedulle the installation for the next maintenance period.
D. Connect the DVD in another EIDE bus.
ANS: D
Q55 You are the administrator for a small company and have
decided to use Terminal Services to provide access to certain
applications for the clients. You currently have the following
client operating systems on your network:
-30 computers running Windows 2000 Professional
-25 computers running Windows NT 4.0 Workstation
-15 computers running Windows 98
-30 computers running Windows 95
-10 computers running Windows for Workgroups
You install Terminal Services in Application Server mode on a
computer running Windows 2000 Server. However, there are two things
that you are unsure of. First, can Windows 2000 Terminal Services
support all of the client operating systems listed above without the
use of any third-party software (such as Citrix Metaframe)? Second,
how many Terminal Services Client Access Licenses will you need for
the client operating systems that are supported?
A. Yes, Windows 2000 Terminal Services will support all of the
client operating systems listed above. You will need 110 Terminal
Services Client Access Licenses.
B. Yes, Windows 2000 Terminal Services will support all of the
client operating systems listed above. You will need 80 Terminal
Services Client Access Licenses.
C. No, Windows 2000 Terminal Services will not support all of the
client operating systems listed above without the use of third-party
software. You will need 100 Terminal Services Client Access Licenses
for the supported client operating systems.
D. No, Windows 2000 Terminal Services will not support all of the
client operating systems listed above without the use of third-party
software. You will need 70 Terminal Services Client Access Licenses
for the supported client operating systems.
E. No, Windows 2000 Terminal Services will not support all of the
client operating systems listed above without the use of third-party
software. You will need 55 Terminal Services Client Access Licenses
for the supported client operating systems.
ANS: B
Q56. You are administrator. You enable security auditing. A week
later, the server stops response. You logon and see error "Auditing
failed". You want to continue the auditing and do not want this
error happens again .
What to do ?
A. Set "Autocrach" Key to 0
B. Increase the logfile size in EventViewer.
C. Save the logfile and clear the Eventviwer every morning.
D. ?
ANS: B
Q58 What is the purpose of the Ntdis.dit file?
A. Contains the SAM
B. Contains the Active Directory Store
C. A log file created when installing Active Directory services
D. Contains locale user profiles
E. A management utility for Active Directory
Ans: B
Q10 You enable the Routing and Remote Access Service (RRAS) on a
computer running Windows 2000 Server. The computer is a member of a
Windows 2000 domain running in native mode. You configure this
computer as a RAS server. You want to configure RAS so that only
members of the domain local group RAS-Access can establish a dial-up
connection to the RAS server.
What step or steps should you take to limit access to only this
group? Select all that apply.
A. Configure the incoming connections on the RAS server for
MS-CHAP authentication only. Configure the client computers to use
MS-CHAP for the outgoing connections.
B. In Active Directory Users and Computers configure the Dial-in
settings of the group RAS-Access to allow remote access
C. Delete the default remote access policy on the RAS server.
Create a new remote access policy. Create a condition in the policy
that grants remote access permission only to the group RAS-Access
D. Delete the default remote access policy on the RAS server.
Create a new
remote access policy. Define the remote access profile settings
to grant
remote access permission only to the group RAS-Acces
ANS: A, C
Q43 You are the Administrator of windows 2000 server computer.
The computer is configured to have a single 18 GB drive which
contains the operating systems (OS) files. This drive also contain a
share folder where 5 network users store there MS excel files. You
want to prevent each network user from using more than 1 GB of space
in the shared folder.
Which action or actions should you take to achieve this goal?
(Choose all that apply)
A. Create a quota entry for everyone account. Set the quota limit
to 1 GB.
B. Enable disk quotas on the volume.
C. Set default quota limit to 1 GB.
D. Select the deny disk space to users exceeding quota limit
check box.
E. Upgrade the disk to a dynamic disk.
Ans: B,C, D.
Q53 You are the admin of Win NT4.0 Terminal Server Edition
computer. The server has one hard disk, which is divided into two
partitions. The first partition contains the Win NT4.0 system files
and is formatted as FAT. The second partition contains application
data and user data. This second partition is formatted as NTFS. The
server currently has SP3 installed. You need to upgrade the server
to Win2000 server. You want to ensure that no application data or
user data is lost during the upgrade. You also want to perform the
minimum number of steps necessary to complete the upgrade.
What should you do? (choose all that apply)
A. Convert the system partition to NTFS.
B. Install SP4 or later on the server.
C. Use a Win2000 server CD to start the server. In Setup, select
the option to Upgrade.
D. Replace the Terminal Server installation with a standard WinNT
server 4.0 installation.
ANS: A, B
Q54 Your company network consists of a Windows 2000 domain and
300 Windows 2000 professional computers. A member server named
APPLIC1 has Terminal server installed in Remote Admin mode. You need
to make Terminal Server on APPLIC1 available on all client
computers.
Which two actions should you take? (choose two)
A. Install Terminal Server licensing on APPLIC1.
B. Install Windows 2000 Advanced server On APPLIC1.
C. Install Terminal Server licensing On a domain controller.
D. Install Terminal Server licensing On each client computers.
E. Remove Terminal Server from APPLIC1.
F. Reconfigure Terminal server to operate in application server
mode.
Answer: C, F
89. You are a regional admin who is performing location-specific
tests for an enterprise migration. Test server computers and test
client computers have been deployed at your location. Your location
plans to have a site Group Policy applied after the actual migration
is complete.
You need to provide the lead admin the security settings for the
appropriate computers in your location. Which item should you
provide?
A. a policy template file that is exported from the Security
Configuration and Analysis utility.
B. An administrative template file from Group policy.
C. A template list that is exported from the Security
Configuration and Analysis utility.
D. A Group Policy Object.
Answer: C (not shure)
90.You are the admin of Win NT4.0 Terminal Server Edition
computer. The server has one hard disk, which is divided into two
partitions.
The first partition contains the Win NT4.0 system files and is
formatted as FAT. The second partition contains application data and
user data. This second partition is formatted as NTFS. The server
currently has SP3 installed.
You need to upgrade the server to Win2000 server. You want to
ensure that no application data or user data is lost during the
upgrade. You also want to perform the minimum number of steps
necessary to complete the upgrade.
What should you do? (choose all that apply)
A. Convert the system partition to NTFS.
B. Install SP4 or later on the server.
C. Use a Win2000 server CD to start the server. In Setup, select
the option to Upgrade.
D. Replace the Terminal Server installation with a standard WinNT
server 4.0 installation.
Answer: B,D (not sure)
92.Brian, an administrator for the nwtraders.msft domain, wishes
to perform an administrative task from another employee's computer.
Brian has two accounts that he uses. The first account ("brianadm")
is a dedicated account that has administrative privileges. The
second account ("bwilkins") does not have administrative privileges.
Brian wants to create several new user accounts in the domain. He
is concerned that after he logs off from the employee's computer,
sensitive data specific to the user profile for his administrative
account might be left behind on the computer. Which of the following
actions could Brian take to achieve his objective and still maintain
a high degree of security?
A. Log on the computer using a local account and create the
accounts through Computer Management.
B. Log on to the computer using the "bwilkins" account. Create
new user accounts through Computer Management.
C. Log on to the computer using the "bwilkins" account. At a
command prompt, type "runas /user:nwtraders rianadm "mmc
%windir%system32dsa.msc" and enter the appropriate password for the
"brianadm" account. Create the new user accounts.
D. Log on to the computer using the "bwilkins" account. At a
command prompt, type "runas /user:nwtraders rianadm "mmc
%windir%system32compmgmt.msc" and enter the appropriate password for
the "brianadm" account. Create the new user accounts.
Answer: C
93. You currently have a Windows 2000 Server that is configured
to run Terminal Services in Application Mode. Many of the users who
connect to the Terminal Server will use applications for only a few
minutes and then stop. You are concerned that these users are
consuming too many resources on the Terminal Server when they are
not actively using an application. Which of the following actions
should you take to optimize resource usage on your Terminal Server?
Choose all that apply.
A. Set time limits on idle sessions.
B. Disconnect inactive sessions automatically when processor
utilization falls below a certain threshold.
C. Set a maximum time that a disconnected session can remain
active.
D. Set the Encryption Level on the Terminal Services to High
(United States or Canada only).
E. Turn off bitmap caching.
Answer: A
94. Disk quotas track and control disk space usage and allow
system administrators to prevent further disk space use. They can
also be used to log an event when a user exceeds a specified disk
space limit and/or log an event when a user exceeds a specified disk
space warning level. Which of the following is true of disk quotas
in Windows 2000?
A. You can set a quota on a volume that has been formatted with
the FAT32 file system.
B. You can set a quota for a group so that all members of the
group will automatically be restricted to a certain amount of space
on a given volume.
C. You can enable quotas on local volumes. You can also enable
quotas on network volumes but only on those volumes that are shared
from the volume's root directory and are formatted with the NTFS
file system.
D. You must be a member of the Administrators, the Server
Operators or the Power Users group on the computer where the drive
resides in order to administer quotas on a volume.
Answer: C
95. Which of the following are differences between installing
Terminal Services in Remote Administration mode and installing it in
Application Server mode? Choose all that apply.
A. In Remote Administration mode, the encryption level is set to
High by default.
B. In Remote Administration mode, a maximum of two remote
connections may be established to the Terminal Server.
C. In Remote Administration mode, the only users that can connect
to server are members of the Enterprise Administrators group.
D. Installing Terminal Services in Remote Administration Mode
does not modify Memory and CPU Utilization settings like installing
it in Application Server mode does
Answer: B,D
96. Using Remote Installation Services, you can set up new client
computers remotely without the need to physically visit each client
machine. Specifically, you can install operating systems on remote
boot-enabled client computers by connecting the computer to the
network, starting the client computer, and logging on with a valid
user account.
Which of the following are requirements for a Remote Installation
Services server? Choose all that apply.
A. At least 128 MB of RAM
B. Pentium 166 or faster processor
C. An NTFS-formatted volume
D. Distributed File System
E. PXE DHCP-based boot ROM version .99c or greater
Answer: B,C
97. To deploy Windows 2000 Professional to several hundred
computers in your company you plan to use third-party disk imaging
software to automate the process. You may want to ensure that the
computers receiving images will not receive duplicate Security
Identifiers (SIDs). In addition, you would like to specify unique
information for each computer (such as computer name) through the
use of an answer file.
Which two Microsoft-supported tools can be used to accomplish
these objectives?
A. Recovery Console
B. RiPrep
C. Sysprep
D. Sysdiff
E. Windiff
F. Setup Manager
Answer: C,F
98. You currently have two Terminal Servers in your company named
TServer1 and TServer2. Both of the servers are running Terminal
Services in application server mode. You would like to configure the
Terminal Servers so that all Authenticated Users have access to
TServer1 but only members of the Finance group have access to
TServer2. What could you do to allow only members of the Finance
group to access TServer2 while still allowing other users to access
TServer1?
A. From the Terminal Service Configuration utility, choose the
connection for TServer2 and configure the permissions so that only
the Finance group has the ability to access the server.
B. In the Terminal Services Profile tab in a user's properties,
disable the option for "Allow logon to Terminal Services" for all
users that are not members of the Finance group.
C. Enable Terminal Services in remote administration mode on
TServer2.
D. Change the configuration for TServer2 so that all users other
than members of the Finance group have only guest access.
Answer: A
101. On one of the network servers in your company, there are
several confidential files that only the President of the company,
Mary Miller, has access to. The NTFS permissions for these files are
configured as follows:
mmiller - Allow Full Control
The files are located in a folder called HighSec. There are other
files in the HighSec folder that are configured with different NTFS
permissions so that other members of the Executives group (of which
Mary is also a member of) can gain access to them. The HighSec
folder is shared with the following permissions:
mmiller - Allow Full Control
Executives - Allow Change
Domain Admins - Allow Full Control
Mary has decided to leave the company to pursue another
opportunity. The decision has been made that Mary's user account
must no longer have access to any of the files within the HighSec
folder. In addition, the files that were only accessible by Mary
should be immediately deleted. All other permissions should remain
intact so that the levels of access given to the other members of
the Executives group and Domain Admins group are unchanged.
You perform the following actions:
(1) You log on as a member of the Domain Admins group and take
ownership of all of the files for which only Mary had access at the
machine containing the HighSec folder.
(2) After taking ownership of those files, you change the NTFS
permissions to Allow Delete for the Administrators group.
(3) You delete the files in the HighSec folder for which only
Mary had access to.
(4) You remove the shared folder permission of Allow Full Control
for the mmiller account.
Which of the following objectives have you successfully
completed? Choose all that apply.
A. Mary cannot access any files within the HighSec folder.
B. The files within the HighSec folder that only Mary could
access have been deleted.
C. The level of access that the other members of the Executives
group have to files within the HighSec folder has not been affected.
D. The level of access that the other members of the Domain
Admins group have to files within the HighSec folder has not been
affected.
Answer: B,C,D
Problem
Important Review Problem Special Extraordinary
27. Some applications on your company network use defined domain
user accounts as their service accounts. Each computer that runs one
of these applications should have the respective service account in
the Local Administrators Group. Currently, you individually place
these service accounts in the Local Administrators Group on the
appropriate Windows 2000 Professional computers. You need to
centralize this process. What should you do?
A. Add the applications service accounts to the Domain
Administrator Group. B. Add the applications service accounts to the
Local Administrator Group. Use the Restricted Groups option in each
computer's local group policy. C. Add the applications service
accounts to the Local Administrator Group. Use the Restricted Groups
option in an OU Group Policy. D. Add the applications service
accounts to the Local Administrator Group. Use the Restricted Groups
option in a Domain Group Policy.
Answer: D
28. You are a member of the domain backup operators group in a
remote office for a large company. You are responsible for
manufacturing the system state of a new Windows 2000 member server
named members. You installed recovery console onto the hard disk of
member1. you have Windows 2000 backup to create a backup of the
system state data. You store the backup files on the hard disk in a
folder named systemstate. A member in the domain admins group
changes the name of member 1 to CR45uu in order to adhere to a new
naming standard. One of the applications on CR45uu no longer
functions after the name change. You use the restore wizard to
restore system state data. Then you restart the server but you
cannot log on to the server afterward. You need to be able to log on
to the server. What should you do?
A. Log on to the server by using the local administrator account.
B. Log on to the server by using a domain administrator account. C.
Use recovery console to restore the system state data. D. Use
recovery console to perform a full restore from a recent backup.
Ans:B
98. Your Windows 2000 Server is configured with 6 SCSI hard
disks. One hard disk is the System disk and the other five are
configured as a Stripe Set. After a power outage one of the hard
disk in the Stripe Set fails. How can you replace the hard drive and
recover from the Power outage?
A. Use disk administrator to regenerate the data on the new
drive. B. Recreate with Stripe Set across the five disks and restore
from backup. C. Copy the lost data from the tape backup to the new
drives. D. Start the Emergency Repair Process.
Ans:B
106. You Windows 2000 Server computer contain four hard disks of
different sizes. Each hard disk is configured as a basic disk and
has a single 5-GB partition. All four disks have the amount of
unpartitioned space shown in the following table:
Disk Unpartitioned Space Disk 0 3-GB Disk 1 4-GB Disk 2 3-GB Disk
3 8-GB
On each hard disk, you create a second partition that uses the
remaining unpartitioned space on the disk. You create an 18-GB
stripe volume that includes all four of the new partitions. Six
months later, disk 1 fails. You replace it with a new hard disk, and
create the necessary partitions. As quickly as possible, you need to
retrieve the data that was contained on disk 1. What should you do?
A. Restore the first partition on disk 1 from the most recent
tape backup. Use disk management to repair and rebuild the stripe
volume. B. Delete and re-create the stripe volume. Restore the
contents of disk 1 from the most recent tape backup. C. Restore both
partitions on disk1 from the most recent tape backup. D. Delete and
re-create the stripe volume. Restore the first partition on disk 1
and then stripe volume from a recnt tape backup.
Ans:A
161. You are the administrator of a high security network. Many
files stored on your Windows 2000 file servers and Windows 2000
Professional computers are highly confidential. You want to
implement identical security configurations on all Windows 2000 file
servers and Windows 2000 Professional computers. What should you do?
(Choose all that apply)
A. Configure Group Policies to apply the security configuration
to all Windows 2000 file servers and Windows 2000 Professional
computers. B. Use the Security Configuration Management Console to
import security information from a file server as a template. C. Use
the Security Configuration Management Console to import security
information from a Windows 2000 Professional Computer as a template.
D. Use Secedit to export the security configuration to all file
servers. E. Use Secedit to export the security configuration to all
Windows 2000 Professional computers.
Answer: A, B, C
43. You are configuring Internet access for a remote site of your
company. The remote site has 12 computers on a private network with
a 56Kbps connection to the Internet. Network address translation
(NAT) and the AT feature of routing and remote access will be used.
You test the configuration and find that web sites can only be
reached by their IP address and not their fully qualified domain
name. What must you do to fix this problem? (Choose two)
a. Configure each of the computers in the remote site with the
address of a WINS server.
b. Configure each of the computers in the remote site with the
address of a DNS server on the Internet.
c. Configure a filter on the NAT Server to pass DNS packets.
d. Create a host file on each of the NAT Servers.
ANS: B,C
153. When you install a W2K server, you receive the following
error: Cannot contact domain controller
What should you do (choose all that apply)?
Swap out the drive for a supported drive or try a network install
instead. Verify that network cable is properly connected. Make sure
your network settings are correct. Try using a different CD Try the
affected CD in a different machine. Verify that server(s) running
DNS and a domain controller are on-line Answer: BCF
154. Which of the following are conditions required for
installing W2K over the network (choose 2)?
1 GB minimum plus 200 MB free drive space to hold temporary files
Create a distribution server which has a file share containing the
contents of the /winnt directory from the Windows 2000 CD-ROM. 500
MB minimum plus 200 MB free drive space to hold temporary files
Create a distribution server which has a file share containing the
contents of the /i386 directory from the Windows 2000 CD-ROM.
Answer: AD
190 You need to reinstall Windows 2000 Server on a domain
controller, because the operating system is damaged. How can you get
the Active Directory to automatically copy domain information to
this new installation?
A. Remove all existing references to the old domain controller
using ntdsutil.exe. Reinstall Windows 2000 server, and do an
authoritative restore of the state data.
B. Remove all existing references to the old domain controller
using Sites and Services snap-in. Reinstall Windows 2000 server,
reinstall Active Directory with thewizard to promote the server to a
domain controller.
C. Remove all existing references to the old domain controller
using Sites and Services snap-in. After the reinstalling Windows
2000 server and Active Directory, do a nonauthorative restore of
\%SystemRoot%RepairRegback from tape
D. Remove all existing references to the old domain controller
using ntdsutil.exe. Reinstall Windows 2000 server, reinstall Active
Directory with the wizard, and promote the server to a domain
controller.
Answer: A
194. You configure a Virtual Private Network (VPN) using
point-to-Point Tunneling Protocol (PPTP) on a Remote Access Server
(RAS) computer running Windows 2000 Server. You configure the remote
access server to use a computer running Windows 2000 Internet
Authentication Service (IAS) for RADIUS authentication. Users who
connect to the corporate network using RAS also access an
application server. All of the servers belong to a Windows 2000
domain. You want to enable the account lockout feature to thwart
dictionary attacks over the Internet. How should you enable account
lockout?
A. Edit the registry of the remote access server
B. Edit the Default Domain Policy group policy object
C. Edit the registry of the IAS server
D. Edit the default remote access policy
Ans: B
83. Your network consists of Windows 2000 file servers, Windows
2000 print servers, Windows 2000 professional computers, Windows
2000 file servers. You must prevent any unsigned drivers from being
installed on any computer in your Windows 2000 network.
What should you do?
A. Configure a Group policy for the Domain that blocks all
unsigned drivers.
B. Configure a Group policy for the Default Domain Controller to
block all unsigned drivers.
C. Configure the Windows 2000 file servers, Windows 2000 print
servers, Windows 2000 professional computers and Windows 2000 file
servers to block unsigned drivers. ****
D. Do nothing, this is the default setting.
Answer: C
26. You are the network administrator at Humongous Insurance, a
major insurance comapny that has 1,000 offices world wide. You are
configuring the network so that only the sales staff can connect to
it from home. Your Windows 2000 forest contains a member server
named SV1 that has Routing and Remote Access for Windows 2000
enabled. You configure SV1 to use a modem bank to accepr incoming
dial-up attempts. You configure SV1 to use Windows Authentication as
the authentication Provider. The only supported authentic method is
MS CHAP V2. You need to restrict access to SV1. What should you do?
A. Create an OU named SS. Populate SS with the sales staff user
accounts. Provide access to this OU by using the
Client-Friendly-Name attribute of the default remote access policy.
B. Create an OU named SS. Populate SS with the sales staff user
accounts. Provide access to this OU by using the Windows-Group
attribute of the default remote access policy. C. Create a new
remote access policy. Add the Everyone group to this policy by using
the Windows-Group attribute in the properties of each sales staff
user acounts. Control dial-in access through remote policy. D.
Create a Windows 2000 global group. Populate this global group with
the sales staff user accounts. Provide access to the global group by
using Windows-Group attributes of the default remote access policy.
Answer: A
92. You are a network administrator at Contoso, Ltd. You work at
the main office in Seattle. The branch office in Denver is a call
center. The network consists of a Windows 2000 domain only. The
network is configured as shown in the exhibit. Denver is a Token
Ring network. Seattle is an Ethernet network. None of you network
adapters at Contoso, Ltd. support promiscuous mode. The brouter does
not support multicast traffic. Wks1.contoso.com and mem1.contoso.com
are available for use as network monitor clients. You want to be
able to detect and identify rogue installations of network monitor
on your network by using the fewest possible computers. What should
you do? (check all that apply)
A. Install network monitor tools on wks1.contoso.com by using the
Windows Components wizard.
B. Install the SNMP protocol on wks1.contoso.com by using the
Windows Components wizard.
C. Install network monitor tools on mem1.contoso.com by using the
Windows Components wizard.
D. Install the SNMP protocol on mem1.contoso.com by using the
Windows Components wizard.
E. Install a network adapter on wks1.contoso.com that supports
promiscuous mode.
F. Install a network adapter on mem1.contoso.com that supports
promiscuous mode.
Answer: A, C
106. You configure a HP jet direct network printer device on your
window
2000 domain srv2 on sales.juttogs.com. This is connected to the
TCP/IP
port to the print device. However, when you enter IP address of
the
device, you receive the dialog box in the printer port wizard.
See diagram
show:
srv2 ip: 10.1.10.35. gateway 10.1.10.100/16
HP printer jet direct Ip: 10.4.20.200/16
Router Ip: 10.5.20.100/16
Another diagram :
A. Select HP Jet Direct from standard drop-down list.
B. Select the custom option button, click setting command button
and than
LPR printer.
C. Change IP of the printer device to 10.5.20.200
D. Change subnet mask of the print device to 255.0.0.0
E. Change default gateway on Srv2.sales.jottom.com to
10.5.20.100.
Answer: C
109. You are the administrator of a network that includes windows
nt server
4.0 computers, NT Workstation 4.0 computers and unix computers.
The
network consists of a single windows NT domain. You are upgrading
a
windows NT server computer named server1 to windows 2000 server.
Server1
is a bdc in the domain. The existing DNS server is a unix
computer that
supports srv (services) records and is configured to accept
dynamic
updates. The existing WINS server is another windows NT server
computer.
You want to configure server1 as a domain controller in a new
active
directory forest. You want the existing windows NT domain
accounts to be
upgraded to active directory. You plan to upgrade the other
domain
controllers in the domain to windows 2000 after the upgrade of
server 1 is
complete. You want to perform the upgrade of server1 with the
least
possible impact on other computers on the network.what should you
do?
A. Promote server1 to the pdc of the domain. Run windows 2000
setup on
server1.
B. Run windows 2000 setup on server1. At the end of
setup.configure
server1 as a dns server and a wins server.
C. Add a static mapping for server1 on the WINS server. On the
DNS server,
create a srv record for the ldap service on server1. Run windows
2000
setup on server1.
D. Install the ms dns service on an existing windows nt server.
Apply SP 4
or later to the server. Run windows 2000 setup on server1.
Answer: A
111. Your existing TCP/IP network has an address of
194.194.194.0. The network consists of 3 subnets with 15 nodes on
one segment, 10 nodes on another segment, and 14 nodes on the other
segment. Which subnet should you use to properly segment the network
assuming a 100% growth rate over the next year?
A. 194.194.194.0/26
B. 194.194.194.0/27
C. 194.194.194.0/28
D. 194.194.194.0/29
Answer: B
116. Your network contains two routed subnets: Subnet A and
Subnet B. Subnet B contains a Windows 2000 server configured as a
DHCP server. This server has scopes created for both Subnet A and
Subnet B. Subnet A does not contain a DHCP server.
The clients on Subnet A are not receiving IP addresses from the
DHCP server. What can you do to enable clients in Subnet A to
receive dynamically assigned IP addresses? Choose all that apply.
A. Configure an RFC 1542-compliant router to forward BOOTP
messaging between subnets.
B. Configure an RFC 1560-compliant router to pass all UDP traffic
on ports 2151, 2152, 2153 and 2154.
C. Install and configure a DHCP server on Subnet A.
D. Configure the clients on Subnet A to use H-node NetBIOS name
resolution.
E. Configure a DHCP relay agent on Subnet A to forward DHCP
messages to Subnet B
F. Create a superscope on the DHCP server in Subnet B which
contains both the scope for Subnet A and the scope for Subnet B.
Answer: A, B, E
136. You have an Active Directory-enabled Windows 2000 Server.
You createan Organisational Unit with a child OU named Disigners.The
child objectmust have explicit right assigned to it, but the OU's
permission must propagate to the OU and all its other child objects.
What should you do ? (choose all that applay)
A. Configure permission inherance on the OU
B. From the secutity tab, clear the Allow Inheritable Permission
From Pasrent to propagate To this OBJECT on the Designer's Object.
Answer: A, B
139. You want to install Windows 2000 Server on a computerwith a
9.1 GB SCSI hard disk with ID-09.You begin instsllation and after
the text mode you install SCSI RAID controller for 3 disks, 15 GB
each. The ID of the controller is 0.you restart the computer and
receive a message NTDLR is mising or corrupt. What to do ?
A. Make sure that the SCSI ID are not the same value.
144. You use Setup Manager to create an answer file for an
unattend installation of Windows 2000 Server. Which components can
you specifiy using Setup Manager.
(Choose all that applay)
A. Create a subfolder in distribution folder
Define user name options such as creating a Uniqueness Database
File to access a
File of valid computer names.
Answer: A
146. You have Windows 2000 clients that use only TCP/IP. You also
have Win 3.1 clients that use NetBEUI. You install a new Windows
2000 server and configure it for TCP/IP and NetBEUI.
The Win3.1 clients can connect, but the Win 2000 clients cannot.
What would you check ?
A. Ensure that NetBIOS over TCP/IP is enabled in the Advenced
TCP/IP setting
Answer: A
147. You have Windows 2000clients that use only TCP/IP .You also
have win3.1 clients that use NetBEUI. You install a new Windows 2000
Server and configure it for TCP/IP and NetBEUI.
All clients are able to connect. However, when you check network
ressources on the server, you notice a delay before the server list
is returned.
What would you do?
A. In the advance settings for the network adapter disable net
BEUI from client for Microsoft network.
B. In the advance settings for the network adapter disable net
BEUI from file and printer sharing for Microsoft network.
C. In the properties of the network adapter disable client for
Microsoft networks.
D. In the advance settings for TCP/IP enable net BIOS over
TCP/IP.
Answer: A
148. Your compagnie adds a new application to the nettwork that
reads and writes large image file to a server for 100 of your users.
When they all use the application simultaneously, the application
has a slow response time. There are more than 12,000 users in the
domain where
The imaging server resides, but none of them are reporting any
problems.
How could you use System Monitor to discover the cause of this
problem ?
A. Log the processor queue length counter for the system object.
B. Log the AVG.disk queue length counter fro the physical disk
object.
C. Chart the demand 0 fault/sec counter for the memory object.
D. Chart the pages/sec for the memory object.
Answer: B
149. Your nettwork includes Win2000,Win NT 4.0,Win 95 and UNIX
clients. You have a Windows 2000
print Server called PRINT1. If your UNIX clients support the LPR
printing protocol, How would
you make PRINT1 availble to them?
A. Install Microsoft Print Services for UNIX on PRINT 1.
Answer: A
150. You have both Windows 2000 Server and NetWare Server on your
network. the netware clients all use the IPX/SPX protocol only.you
install a DATAbase server on a Windows 2000 machine called DB1. this
computer has NWLINK and uses the 802.2 frame type and a network
number of 77.
The NetWare clients on the same subnet can accsess DB1. However,
NetWare clients on other subnets cannot. What should you do ?
A. Configure the other NetWare clients to use network number 77.
Answer: A
151. You are installing a VPN. the VPN server is located inside a
firewall wich is configured to pass ICMP, TCP port 25 for SMTP, port
119 for NNTP, and port 80 for HTTP only.
The VPN fails when you try to connect over the internet.However,
you can ping the VPN Server
What do you need to do the firewall to achieve a succssfull
connection ?
A. Enable port 135 for the RPC port mapper service.
enable ports 137, 138, and 139 for NetBIOS.
Answer: A
3. Your Windows 2000 Server is currently configured with two IDE
hard drives that are attached to an EIDE disk controller. Your
server is beginning to run low on disk space. You install a new SCSI
disk controller with six hard drives attached to it. This new SCSI
controller is not listed on the Hardware Compatibility List (HCL).
When you attempt to install the new controller, Windows 2000 does
not detect it correctly. What should you do to install the
controller?
a. Use Disk Management to rescan your hard disks
b. Use Device Manager to turn off IRQ steering. Reboot.
c. Use the hardware wizard to add a new SCSI and RAID controller
using the drivers supplied by the manufacturer of the SCSI
controller
d. Use the SCSI controller’s setup program to install it’s driver
e. Use Device Manager to disable the EIDE controller
Answer: B, D
9. Your network has over 200 Windows 2000 Server computers. They
are all members of the same domain. You have made all of the members
part of the Servers Organizational Unit (OU). You have configured
each Windows 2000 Server computer to audit local security events.
The servers are used for different purposes, thus you have
configured different servers to audit different local security
events. You would now like to institute a policy that makes all of
the Windows 2000 Servers have identical local security auditing
policies. You must also ensure that auditing remains standardized
even if the audit policy changes. How should you do this?
a. Configure a local auditing policy on each domain controller
b. Configure a local auditing policy on each computer
c. Configure a local group policy object on each server in the
Servers OU
d. Configure a domain group policy object and apply it to the
Servers OU
Answer: D
you need to measure physical disk performance counters on your
Windows 2000 Server computer. you want to run system monitor locally
on the server, you also want to ensure that system monitor has the
least impact on other processes currently running. What can you do?
(CHOOSE TWO)
A. From a command prompt run the start/low perfmon command.
B. From a command prompt run the start/normal perfmon command.
C. From the command prompt run the startmin perfmon command.
D. Open system monitor and then use task manager to set the
priority of the mmc.exe process to low.
E. Open system monitor and then use task manager to set the
priority of mmc.exe process to normal.
Ans: A, D
25) Your network is configured with the NWLink protocol only. You
have NetWare servers and windows clients. You add a w2k server and
configure NWLink. You copy the Netware files to the w2k server, and
then share them. You verify that the clients can connect to the new
shares. You then remove the NetWare servers, and now the clients
can't connect to the shares.
What can you do?
A. On the w2k server, change the frame type to 802.5
B. On the clients, configure TCP/IP
C. On the w2k server, add it to the network 18283838.
D. On the w2k server, add NWLink.
E. On the w2k server, add GSNW.
ANS: E
27) You start win2k. You have create ERD. Receive a "boot.ini is
missing".
What can you do?
A. Start with win2K CD.start recovery console, run FIXBOOT
B. Start with win2K CD.start recovery console, run FIXMBR
C. ......
D. Start with win2K CD. Start recovery console. Copy appropriate
parameter
ANS: D
28) John, an employee in your company has used windows 2000
encrypting file system on his windows 2000 computer to encrypt a
file that contains sensitive information. John's computer belongs to
the domain that you administer. When john left the company Greg was
hired for the position. You must enable greg to access the contents
of the encrypted file.
Which of the following should you do?
A. Log on to john's computer by using the local administrator
account and decrypt the file.
B. Back up the encrypted file restore the backup on your computer
and decrypt the file.
C. Assign greg the take ownership permission for the file and let
him take ownership.
D. Copy the encrypted file to a fat volume.
ANS: A
30) You are the administrator of a Windows 2000 server computer
named Intra. This server hosts an intranet web site for your
company. The marketing department stores marketing files in a shared
folder on a separate file server. The NTFS permissions on the folder
are shown on this exhibit:
- Exhibit 1: Marketing users have full control
- Exhibit 2: Virtual Directory with Read, Log Visit, and Index
this resource boxes checked and Write and Directory Browsing boxes
unchecked
The marketing director wants to make the marketing files
available to the rest of the company via internet. She wants company
users to be able to read but no modify all the files. You create a
new virtual directory named marketing under the intranet web site
folder on Intra. You configure the virtual directory as shown some
users report that they cannot access the marketing files from their
web browsers. However, all users in the marketing department are
able to access the files. You need to provide need acess to all
company users.
What should you do?
A. Select directory browsing check box on virtual directory tab.
B. Copy files form their location on the file server to the Intra
Marketing.
C. Modify NTFS permission on the file server to remove the entry
for Marketing.
D. Modify NTFS permission on the file server to include an entry
for Everyone: Read
ANS: D
32) Your win2000 server computer contains four 16-gb hard disks.
Disk 0 is configured as a basic disk. Disk 0 has a single 16-gb
partition that contains the os files. Disk 1,2, and 3 are configured
as dynamic disk in a raid-5 volume. The entire server is backed up
to a tape drive each night. During your daily review of the server's
event logs, you discover that disk 1 has failed. You shut down the
server and replace disk 1 with a new hard disk. When you restart the
server win2000 starts normally but the data on the raid-5 volumn is
inaccessible. Disk management indicates that disk 2 has failed also.
You replace disk 2 with a new hard disk. Now you need to recover the
data on the raid-5 volume as quickly as possible.
What should you do ?
A. use disk manager to rebuild raid-5 partition
B. delete and recreate the raid-5 partition.redtore the contents
of raid-5 partition from the most recent tape back-up
C. use win2000 backup to restore the contents of disk2. Use disk
manager to rebuild the raid-5 partition on disk 1
D. delete and recrate the raid-5 partition . setart the server by
using win2000 setup cd, and select the repair option
ANS: B
33) You need to ensure that only authorized remote connections
are posible on your W2K network. You create a policy named Required
L2TP on the RRAS, the settings for this policy and the policy order
are shown in the exhibit. You test the VPN connections and discover
that for the SueJ user the connection is made through a lower
security PPTP tunnel rather L2TP.
Sue's dial-in properties are shown in SueJ properties exhibit.
All other port, policy and server settings are the default settings
for a VPN server. You want to ensure that the server will deny all
PPTP conections.
Which two actions should you take?
A. Change the required L2TP policy properties to deny remote
access permission.
B. Change the dial-in properties of the SueJ user account to
control access through remote access policy.
C. Remove all PPTP ports from the server.
D. Remove the allow access if dial-in permissions enabled policy
from the server.
E. Remove all but one PPTP port from the server and deny both
inbound and outbound connections on that port.
ANS: B & "remove Allow authenticated connection policy in
RAS"
34) You share a printer name Telesales on win2000 server. The
printer will be used to print packing Labels for order processed by
300 sales person. The printer is HP laser 5000N that have HP Jet
direct device on board. The packing labels are printed by using PCL.
User said printer is too slow. You want maximize the number of
packing label printed in a specified time.
What 's you do?
A. modify property of Telesales printer. Set default data type
for sales set RAW.
B. change packing label to use the post script page description
language instead of PCL.
C. use second HP printer to network. Let Telesales to print in
both printer.
D. attach 3 post script laser printer device to network.
ANS: B
35 You configure a HP jet direct network printer device on your
window 2000 domain srv2 on sales.juttogs.com. This is connected to
the TCP/IP port to the print device. However, when you enter IP
address of the device, you receive the dialog box in the printer
port wizard. See diagram show:
srv2 ip: 10.1.10.35. gateway 10.1.10.100/16
HP printer jet direct Ip: 10.4.20.200/16
Router Ip: 10.5.20.100/16
Another diagram :
A. Select HP Jet Direct from standard drop-down list.
B. Select the custom option button, click setting command button
and than LPR printer.
C. Change IP of the printer device to 10.5.20.200
D. Change subnet mask of the print device to 255.0.0.0
E. Change default gateway on Srv2.sales.jottom.com to
10.5.20.100.
ANS: C
41) You are the head administrator for your company. Your company
has numerous offices across the world. Each of your office has a
single T1 circuit used to connect to the internet. Your Windows 2000
Servers are configured to use internet connection sharing. You have
hired a new administrator named Jim. Jim is configuring a newly
installed Windows 2000 Server computer as a file server. Jim runs
the Windows update on the Windows 2000 Server computer for the first
time and chooses to run the Product Update. Jim receives an error
message stating that access is denied. You need to give David the
ability to update the files using his user account. What should you
do?
a. Configure the settings for Internet Connection Sharing to
allow PPP access
b. Configure the settings for Internet Connection Sharing to
allow PPTP access
c. Configure the settings for Internet Connection Sharing to
allow VPN access
d. Make David’s account a member of the local Administrators
group on the Windows 2000 Server computer
Answer: D
49) Your Windows 2000 Server computer has disk-mirroring
implemented. You open disk management and find that Disk 1 has
failed. Disk 1 is a mirror of Disk 0. There is a yellow exclamation
mark over Disk 1 in disk management. How do you return Disk 1 to
health? (choose two)
a. Break the mirror. Delete all volumes from Disk 1. Re-establish
the mirror.
b. Re-establish the mirror on Disk 1.
c. Replace Disk 1. Use Disk Management to rescan the disk.
d. Convert Disk 1 to an extended volume.
Answer: A, C
2,3. You have decided to use a vendor-supplied hardware driver
that is not
digitally signed. You are preparing for unattended server
installations. How
do you prepare for using non-signed drivers in an unattended
session to
avoid interactive warnings?
A. On the installation source server, on the System Properties
Hardware tab,
click the Driver Signing button and choose the Ignore radio
button, After
the unattended installations are complete, return the setting to
default.
B. In the [Unattended] section of the answer file,
add DriverSigningPolicy =Ignore
C. Flag this specific driver in the Txtsetup.oem specified in the
[OEMBootFiles] section of the answer file.
D. In the driver subdirectory of the distribution folder, modify
this
vendor-supplied driver's .inf file where it references the
catalog file.
Answer: B
2,7. You replace the network adapter card on a computer running
Windows 2000
Server that you manage. The new card uses a different driver than
the
original network adapter card. What utility should you use to
insure that
the device driver for the original card is removed from your hard
disk?
A. Add/Remove Programs
B. Device Manager
C. Network and Dial-Up Connections
D. Add/Remove Hardware wizard
Answer: D
2,8. You are creating an unattended answer file with Setup
Manager. You type
the name of your downlevel domain, Contoso, in the Workgroup
option box,
rather than selecting the domain name option. You will use this
answer file
to install Windows 2000 Server on ten computers. How will this
impact your
rollout when these servers join the upgraded domain, Contoso.com?
A. The workgroup computers must join the new Active Directory as
member
servers before being promoted with dcpromo.
B. The computers of this unattended installation can join the
domain from
their current workgroup status with the identical name.
C. The workgroup computers can become application servers and can
continue
to authenticate as workgroup members with the advantage of
quicker browsing,
since the name is identical.
D. The computers installed with this unattended answer file
cannot be
promoted to domain controllers.
Answer: C
2,9. You create two primary partitions and one extended partition
on a basic
disk of a computer running Windows 2000 Server. The disk has 10Mb
of
unallocated space. You create 3 logical drives in the extended
partition.
You format one of the logical drives (drive G) as NTFS, and use
it for the
home directory of users. You determine that you need additional
space
allocated to this logical drive. You have 3Gb of unallocated
space available
on a second disk drive on that computer.
What can you do to increase the amount of storage available in
that logical
drive?
A. Convert both disks to dynamic disks. Extend the simple volume
that was
the original logical drive by using that volume and unallocated
space from
the second disk drive.
B. Create a new partition or volume on the second disk drive.
Create a new
folder on G. Mount the new partition or volume to that folder.
C. Extend drive G by creating a volume set using the logical
drive and
unallocated space from the second disk drive.
D. Create a new partition or volume on the second disk drive and
mount it to
the folder in which home directories reside.
Answer: B
2,23. Your system partition appears to have a bad boot sector
because the
error message reads "Invalid partition table." What recovery
process should
you choose for this situation?
A. Use a DOS diskette to boot your system and the fdisk command
to set the
active partition. Then start the Recovery Console and use the
fixboot
command to make a new boot sector.
B. Use the Windows 2000 Setup disks, choose the repair option,
and the
Recovery Console. Use the fixboot command to make a new boot
sector.
C. Use the Emergency Repair Disk (ERD) to restore the ntldr, then
use
Recovery Console's fixboot command to make a new boot sector.
D. Use the Windows 2000 startup floppy disk to boot your system
and run the
fdisk /mbr command. Then start the Recovery Console and fixboot
command to
make a new boot sector.
Answer: B
2,24. You are having problems starting one of your Windows 2000
domain
controllers, so you want to start the system using the Advanced
Startup
options. Which two options will be unavailable when you choose
Advanced
Startup Options? (Choose two)
A. Safe Mode
B. Debugging Mode
C. Safe Mode with Networking
D. Last Known Good Configuration.
E. Safe Mode with Command Prompt.
Answer: B, C
2,32. Three groups and a user have been granted permissions to an
NTFS folder
on a Windows 2000 Server.
NTFS folder permissions:.
"h Sales (RWX).
"h Team1 (RWXD).
"h FolderAdmins(RWXDPO).
"h Mike (RW).
These groups have also been granted share permissions to the
folder shared
over the network.
"h Share folder permissions:.
"h Sales Read.
"h Team1 Change.
"h FolderAdmins Change.
"h Mike Change.
Mike is a member of the Sales, Tem1 and FolderAdmins group.
If Mike accesses the folder across the network, what are Mike's
effective
permissions to the folder?
A. Read
B. Full Control
C. Deny
D. Change
Answer: D
2,49. You create a domain-based Distributed File System (Dfs)
root. The root
is hosted on a domain controller in your Windows 2000 domain. You
then add
two links to the root. The links refer to shares on computers
running
Windows 2000 Server that are members of the domain. You want to
enable
replication of one of the links by using the Distributed File
System
Snap-In, but the Replication Policy choice on the context menu of
the link
is disabled.
What step will enable you to create a replication policy for the
link?
A. Start the File Replication Service on the computer that is
hosting the
share for the link.
B. Use the Distributed File System Snap-In to create a replica of
the link.
C. Start the File Replication Service on the domain controller.
D. Use the Distributed File System Snap-In to create a replica of
the root.
Answer: B
2) . You create and share a folder on a computer running Windows
2000 Server. The folder will be used to store documents that define
corporate standards. Most employees use these files frequently. You
set the shared folder permissions to allow Read access for
Authenticated Users. You set the read-only attribute of each file in
this folder. How should you configure the offline folder setting for
this shared folder to minimize network traffic? A. Clear the setting
Allow Caching of files in this shared folder B. Manual Caching for
Documents C. Automatic Caching for Programs D. Automatic Caching for
Documents
Answer: my answ B
1. You wish to audit the activity of the accounting department's
share folder for file and subfolder deletion. The share folder is on
a Windows 2000 server. What steps will you take to activate this
security measure? A. Enable auditing of the Directory Service Access
event in Local Policies node of the Computer Configuration. Enable
auditing of the Delete Subfolders and Files for each folder you wish
to audit. B. Enable auditing of the Delete Subfolders and Files in
the Security tab of the domain object's property sheet. C. Enable
Audit Object Access event in Local Policies node of the Computer
Configuration. Enable auditing of the Delete Subfolders and Files
for each folder you wish to audit. D. Enable auditing of the Delete
Subfolders and Files in the property sheet of the share in Explorer.
Answer: C, D
2. You install a new application on a computer running Terminal
Services in Application Server Mode. Users of this application must
have access to files stored on a computer running Netware 4.11.
TCP/IP is not installed on the computer running NetWare. What steps
should you take to enable Terminal Services clients to access the
computer running NetWare? A. Add NWLink to the Local Area Connection
of the Terminal Services server. Configure NWLink with frame type
802.2 B. Add NWLink to the Local Area Connection of the Terminal
Services server, and to the Local Area Connection of the Terminal
Services clients. Configure NWLink with frame type 802.2 C. Add
NWLink to the Local Area Connection of the Terminal Services server.
Configure NWLink with frame type 802.3 D. Add NWLink to the Local
Area Connection of the Terminal Services server, and to the Local
Area Connection of the Terminal Services clients. Configure NWLink
with frame type 802.3
Answer: A
3. You have decided to use a vendor-supplied hardware driver that
is not digitally signed. You are preparing for unattended server
installations. How do you prepare for using non-signed drivers in an
unattended session to avoid interactive warnings? A. On the
installation source server, on the System Properties Hardware tab,
click the Driver Signing button and choose the Ignore radio button,
After the unattended installations are complete, return the setting
to default. B. In the [Unattended] section of the answer file, add
DriverSigningPolicy =Ignore C. Flag this specific driver in the
Txtsetup.oem specified in the [OEMBootFiles] section of the answer
file. D. In the driver subdirectory of the distribution folder,
modify this vendor-supplied driver's .inf file where it references
the catalog file.
Answer: B
4. Your enterprise has clients running Windows 95, Windows 98,
and NT Workstation 4.0. You need to manage their System Policy from
your Windows 2000 network until they are each upgraded. How will you
set up their existing policies on the new Windows 2000 domain
controller? A. Leave the .pol files on a downlevel server, and
manually configure it to replicate the System Policy files to the
Windows 2000 network servers. B. Place the .pol files of each type
of workstation in the Netlogon share of a Windows 2000 domain
controller C. Include in each workstation's logon script a mapping
to Netlogon share of the domain controller where the .pol files of
each type of workstation reside. D. Get the Adminpak.msi installed
onto each type of workstation, and create new .pol files. Place the
3 new .pol files in the scripts subdirectory of the domain
controller.
Answer: B, C
5. You enable the Routing and Remote Access Service (RRAS) on a
computer running Windows 2000 Server. You configure the computer as
a RAS server. You want to provide mutual authentication between the
RAS server and RAS clients. You also want to ensure that data
passing between the RAS server and RAS clients is encrypted. Which
authentication method should you use for your incoming connections
to support mutual authentication and data encryption? A. CHAP B.
MS-CHAP v2 C. PAP D. SPAP
Answer: B
6. You need to reinstall Windows 2000 Server on a domain
controller, because the operating system is damaged. How can you get
the Active Directory to automatically copy domain information to
this new installation? A. Remove all existing references to the old
domain controller using ntdsutil.exe. Reinstall Windows 2000 server,
and do an authoritative restore of the state data. B. Remove all
existing references to the old domain controller using Sites and
Services snap-in. Reinstall Windows 2000 server, reinstall Active
Directory with the wizard to promote the server to a domain
controller. C. Remove all existing references to the old domain
controller using Sites and Services snap-in. After the reinstalling
Windows 2000 server and Active Directory, do a nonauthorative
restore of \%SystemRoot%\Repair\Regback from tape D. Remove all
existing references to the old domain controller using ntdsutil.exe.
Reinstall Windows 2000 server, reinstall Active Directory with the
wizard, and promote the server to a domain controller.
Answer: A
7. You replace the network adapter card on a computer running
Windows 2000 Server that you manage. The new card uses a different
driver than the original network adapter card. What utility should
you use to insure that the device driver for the original card is
removed from your hard disk? A. Add/Remove Programs B. Device
Manager C. Network and Dial-Up Connections D. Add/Remove Hardware
wizard
Answer: D
8. You are creating an unattended answer file with Setup Manager.
You type the name of your downlevel domain, Contoso, in the
Workgroup option box, rather than selecting the domain name option.
You will use this answer file to install Windows 2000 Server on ten
computers. How will this impact your rollout when these servers join
the upgraded domain, Contoso.com? A. The workgroup computers must
join the new Active Directory as member servers before being
promoted with dcpromo. B. The computers of this unattended
installation can join the domain from their current workgroup status
with the identical name. C. The workgroup computers can become
application servers and can continue to authenticate as workgroup
members with the advantage of quicker browsing, since the name is
identical. D. The computers installed with this unattended answer
file cannot be promoted to domain controllers.
Answer: C
9. You create two primary partitions and one extended partition
on a basic disk of a computer running Windows 2000 Server. The disk
has 10Mb of unallocated space. You create 3 logical drives in the
extended partition. You format one of the logical drives (drive G)
as NTFS, and use it for the home directory of users. You determine
that you need additional space allocated to this logical drive. You
have 3Gb of unallocated space available on a second disk drive on
that computer. What can you do to increase the amount of storage
available in that logical drive? A. Convert both disks to dynamic
disks. Extend the simple volume that was the original logical drive
by using that volume and unallocated space from the second disk
drive. B. Create a new partition or volume on the second disk drive.
Create a new folder on G. Mount the new partition or volume to that
folder. C. Extend drive G by creating a volume set using the logical
drive and unallocated space from the second disk drive. D. Create a
new partition or volume on the second disk drive and mount it to the
folder in which home directories reside.
Answer: B
10. You have been editing the registry with Regedt32, and now you
are unable to get the server to boot up. What should you try for a
quick system restoration? A. Power on the computer and hit the F8
key to access Safe Mode. B. Power on the computer, hit the F8 key,
and select Last Known Good configuration. C. Use your Emergency
Repair Disk (ERD) to boot and restore core system files. D. Use your
Emergency Recovery Disk (ERD) to boot and restore core system files.
E. In Recovery Console, set the path to the floppy drive where you
have a backup of the core system files. Use the copy command to
restore the files to the hard drive.
Answer: B
11. You are attempting to install a Plug and Play modem in a
server. The modem appears to be working when you install it, but
later it fails. You attempt several more times to reinstall the
modem, but it continues to fail. What should you do? A. Use the
Add/Remove Hardware program to troubleshoot a device. You will
select the modem from the list, and the Hardware Troubleshooter will
start. B. Install the modem in another computer to see if it has the
same failure. If not, reinstall it in the first computer, and use
the manufacturer's most current driver when Windows 2000 prompts for
file location. C. Start the computer in safe mode and remove the
device driver for the modem. Restart the computer in normal mode,
and let Windows 2000 find a device driver of it's own choice, even
if it isn't exactly a match. D. Use the Add/Remove Hardware program
to remove the modem driver. Power down the computer. Let Windows
2000 find a device driver of it's own choice.
Answer: D
12. You create a new DFS root on ServerHR, a computer running
Windows 2000 Server, that is a member of DomCorp, a Windows 2000
domain. You add three DFS links to the new DFS root. You select the
DFS root, and click on the Action Menu to add a replica of the root.
The menu option New Root Replica is disabled. What is the most
likely reason that this option is disabled? A. Directory Replication
is not available. B. The DFS root is a Stand-Alone DFS root C. The
DFS root is not on a volume formatted as NTFS D. A new root replica
cannot be created after DFS links are added to a DFS root.
Answer: B
13. You want to delete a quota entry defined for a user's account
on a drive D of a computer running Windows 2000 Server. What utility
should you use to locate the files owned by the user and move the
files to a shared folder on another server? A. Windows Explorer B.
Disk Management C. DirUse D. Active Directory Users and Computers
Answer: A
14. Your enterprise has purchased 100 new computers to be
installed as additional servers running Windows 2000 Server. All
machines have the same basic hardware configuration, except those
which will additionally need modems. Which automated process will
perform the installations in the shortest amount of time? A. Use the
bootable CD-ROM feature of these new servers to deploy a clean
installation. Create a Winnt.sif file on floppy disk for your
specific configuration requirements. B. Create an answer file with
Setup Manager; create a distribution folder, and add the OEM drivers
for each type mode; run winnt32 with the Syspart switch on each
target computer. C. Use the bootable CD-ROM feature of these new
servers to deploy a clean installation. Create an unattend.udf file
on floppy disk for your specific configuration requirements. D.
Create a master computer including applications; run the sysprep
tool; create an image of the master; deploy the image to new
computers.
Answer: D
15. You install Internet Information Services 5.0 on a computer
running Windows 2000 Server. You create two new department web sites
for the Human Resources and Sales departments. You use host headers
to define these two new sites. You stop the Sales web site while a
developer updates the contents of the site. If a user attempts to
access the Sales site while it is stopped, what response will the
user receive? A. The user will be redirected to an alternate default
page for the Sales site's home directory. B. The user will be
redirected to the Default Web site home page. C. The user will
receive a 403.2 - Read Access Forbidden error message. D. The user
will receive a 404 - File Not Found error message
Answer: B
16. You want to install Windows 2000 Server using NTFS on a new
computer that currently has Windows 98 on a single 2Gb hard drive
with a single partition. The partition is the size of the hard
drive, and formatted as FAT32. Which one of the following options
for hard drive preparation is valid for this computer? A. Install
Windows 2000 over Windows 98, and run the Convert utility to create
a second partition for NTFS. Use secedit commands to apply the
default NTFS permissions to this converted file system. B. Use the
existing partition as the system partition for the Windows 2000
operating system, and create a second partition using the Disk
Management Tool for NTFS after installation is complete. C. Start
the installation of Windows 2000 using the option to select the
system partition during the installation. Run the Convert utility to
create a second partition for NTFS, and apply the default NTFS
permissions with secedit. D. Repartition the hard drive, creating a
partition size required for your Windows 2000 installation. Format
it as NTFS, FAT32 or FAT16 during installation. Leave the remaining
hard disk space to be formatted by the Disk Management Tool after
installation.
Answer: D
17. You have already created an unattended answer file using
Setup Manager with 10 computers named. Before you begin the
installations, you are asked if you can include three more
computers. What will be required for you to include more computers
in the unattended installation over the network? A. Edit the
unattend.txt file with Notepad B. Edit the unattend.udf file with
Notepad C. Edit the winnt.sif file with Notepad D. Edit the
unattend.bat file with Notepad
Answer: A
18. You have four different distribution shares on your network
for Windows 2000 Server installations. A new service pack was just
announced. What should you do to make the service pack available for
future installations? A. Copy the service pack's driver.cab to the
distribution share, as well as layout.inf, dosnet.inf and
txtsetup.sif B. Use update /slip to apply the service pack to each
share. C. Copy the layout.inf, dosnet.inf and txtsetup.sif files to
each distribution share. D. Use sysdiff /diff to apply the service
pack to each share.
Answer: B
19. Your unattended setup is failing over a device that you
provided a Windows 2000 compatible driver and .inf file for in the
\$oem$\$1\Drivers subdirectory of the distribution folder. What did
you overlook when you were preparing for the unattended
installation? A. The driver was not installed on the source computer
using Sysdiff B. The Cmdlines.txt file does not include a
Rundll32.exe command C. The [Unattended] section of the answer file
must set the key OemPreinstall=Yes D. The dosnet.inf file does not
refer the incompatibility in the ServicesToDisable section
Answer: C
20. You work on a computer running Windows NT Workstation 4.0
that is a member of a Windows 2000 domain running in mixed-mode. You
want to manage the printers defined on a print server that is a
member of the same domain. The print server is also configured as a
Web Server and DHCP server. You need to have access to real-time
information about the print devices managed by the print server.
What application can you install on your Windows NT workstation to
manage the printers on the print server, as well as view the
real-time print device information?
A. Adminpak.msi B. Windows 2000 Device Manager C. Internet
Explorer 5.0 D. Directory Services Client
Answer: C
21. You manage a computer running Windows 2000 Server. You create
a file in a folder on an NTFS partition of the computer. You
configure the following NTFS permissions for the file: "h
Authenticated Users Read & Execute, Read "h Accounting Full
Control "h Jack Deny Write Accounting is a local group, Jack is a
member of the group Accounting What is Jack's effective
permission(s) for the file? A. Cannot be determined - it depends on
the parent folder permissions B. Read and Execute, Read C. No access
D. Full control
Answer: B
22. You are looking for a new driver for an application server
monitor hoping to improve its resolution. However, a warning is
issued when you select a driver from the Microsoft list. What
procedure should you follow when selecting a monitor driver? A.
Download the latest driver for your monitor from the Microsoft site
to ensure compatibility with your hardware and other Plug and Play
devices on your system. B. Download a current driver from the
manufacturer for the make and model of your monitor, and install it
to avoid damage to the monitor. C. Choose to manually select the
driver from the Microsoft list to assure hardware compatibility with
your operating system. D. Let the Microsoft wizard find the proper
Plug and Play driver so the settings will work with other devices on
the system.
Answer: A
23. Your system partition appears to have a bad boot sector
because the error message reads "Invalid partition table." What
recovery process should you choose for this situation? A. Use a DOS
diskette to boot your system and the fdisk command to set the active
partition. Then start the Recovery Console and use the fixboot
command to make a new boot sector. B. Use the Windows 2000 Setup
disks, choose the repair option, and the Recovery Console. Use the
fixboot command to make a new boot sector. C. Use the Emergency
Repair Disk (ERD) to restore the ntldr, then use Recovery Console's
fixboot command to make a new boot sector. D. Use the Windows 2000
startup floppy disk to boot your system and run the fdisk /mbr
command. Then start the Recovery Console and fixboot command to make
a new boot sector.
Answer: B
24. You are having problems starting one of your Windows 2000
domain controllers, so you want to start the system using the
Advanced Startup options. Which two options will be unavailable when
you choose Advanced Startup Options? (Choose two) A. Safe Mode B.
Debugging Mode C. Safe Mode with Networking D. Last Known Good
Configuration. E. Safe Mode with Command Prompt.
Answer: B, C
25. You manage a computer running Windows 2000 Server. You create
a folder named DATA on a volume that is formatted as FAT32. You set
these share permissions: "h The user account Tom is assigned the
Read permission "h The local group DataUpdate is assigned the Change
permission "h The local group DataManage is assigned the Full
Control permission "h The local group DataLimited is denied the Full
Control permission The user account Tom is assigned to the global
group Acct. Acct is a member of DataUpdate and DataManage. The user
account Tom is also assigned to the global group Clerks. Clerks is a
member of DataLimited. What is Tom's effective permission for the
folder DATA when he accesses it from his computer running Windows
2000 Professional?
A. No access B. Change C. Full control D. Read
Answer: A
26. You configure a Virtual Private Network (VPN) using
point-to-Point Tunneling Protocol (PPTP) on a Remote Access Server
(RAS) computer running Windows 2000 Server. You configure the remote
access server to use a computer running Windows 2000 Internet
Authentication Service (IAS) for RADIUS authentication. Users who
connect to the corporate network using RAS also access an
application server. All of the servers belong to a Windows 2000
domain. You want to enable the account lockout feature to thwart
dictionary attacks over the Internet. How should you enable account
lockout? A. Edit the registry of the remote access server B. Edit
the Default Domain Policy group policy object C. Edit the registry
of the IAS server D. Edit the default remote access policy
Answer: B
27. You enable the Routing and Remote Access Service (RRAS) on a
computer running Windows 2000 Server. The computer is a member of a
Windows 2000 domain running in native mode. You configure this
computer as a RAS server. You want to configure RAS so that only
members of the domain local group RAS-Access can establish a dial-up
connection to the RAS server. What step or steps should you take to
limit access to only this group? A. Configure the incoming
connections on the RAS server for MS-CHAP authentication only.
Configure the client computers to use MS-CHAP for the outgoing
connections. B. In Active Directory Users and Computers configure
the Dial-in settings of the group RAS-Access to allow remote access
C. Delete the default remote access policy on the RAS server. Create
a new remote access policy. Create a condition in the policy that
grants remote access permission only to the group RAS-Access D.
Delete the default remote access policy on the RAS server. Create a
new remote access policy. Define the remote access profile settings
to grant remote access permission only to the group RAS-Access
Answer: A, B, C
28. You enable Terminal Services in Application Server Mode on a
computer running Windows 2000 Server. You select the option
Permissions compatible with Terminal Server 4.0 users. Later you
decide to switch the permissions for application compatibility to
ensure a more secure environment. Which utility should you use to
switch the permissions? A. Add/Remove Programs B. Client Connection
Manager C. Terminal Services Configuration D. Terminal Services
Manager
Answer: C
29. You enable Terminal Services in Application Server Mode on a
computer running Windows 2000 Server. You install and configure
three applications on the server. Five users who will run these
applications using the Terminal Services client have print devices
connected to USB ports on their computers. Those computers run
Windows 98, and each user has local printers defined for the device
connected to his or her computer. What step should you take to allow
the users to print to their local devices when running an
application from the Terminal Services client? A. Define a script to
run when each user starts a Terminal Services session. Use the net
use command in this script to redirect print output to the local
port. B. Log on interactively at the Terminal Services server. Run
the Add Printer wizard to define a printer for each of the print
devices. C. Install the print drivers for the devices on the
Terminal Services server. D. Instruct each user to run the Add
Printer wizard from a Terminal Services session to define a local
printer.
Answer: C
30. You create a printer on a computer running Windows 2000
Server. A user reports that she has been trying to print to the
network printer from an MS-DOS based application. She has been
unsuccessful. What should you do to solve this printing problem? A.
Run the application in MS-DOS Exclusive mode. B. Increase the amount
of memory given to this MS-DOS application. C. Use the MS-DOS LPRINT
command. D. Map a physical port to the network printer at a command
prompt
Answer: D
31. You create a stand-alone Dfs root on a computer running
Windows 2000 Server. You want to attach links to the Dfs root. What
share-level permission must you have for each shared folder that you
use to define a Dfs link? A. Change B. Full Control C. Read D. No
permission is needed
Answer: D
32. Three groups and a user have been granted permissions to an
NTFS folder on a Windows 2000 Server. NTFS folder permissions: "h
Sales (RWX) "h Team1 (RWXD) "h FolderAdmins(RWXDPO) "h Mike (RW)
These groups have also been granted share permissions to the folder
shared over the network. "h Share folder permissions: "h Sales Read
"h Team1 Change "h FolderAdmins Change "h Mike Change Mike is a
member of the Sales, Tem1 and FolderAdmins group. If Mike accesses
the folder across the network, what are Mike's effective permissions
to the folder? A. Read B. Full Control C. Deny D. Change
Answer: D
33. You have six physical disks, disks 0-5, attached to a
computer running Windows 2000 Server. Disk 0 contains drive C:,
which has the Windows 2000 system files Disk 1 contains Drive D:,
which has the Windows 2000 boot files Disks 2-5 comprise a stripe
set with parity For best performance, where should you place the
page file? A. Place the page file on Drive D B. Place the page file
on the stripe set with parity C. Create a page file on both the
stripe set with parity and on drive C D. Place the page file on
drive C
Answer: D
34. Gary is creating a stripe set with parity using four physical
disk drives on a computer running Windows 2000 Server. Each disk has
free space available, and the least amount of free space on any disk
is 250Mb. What will be the data storage capacity of this stripe set
with parity? A. 250Mb B. 750Mb C. 500Mb D. 1000Mb
Answer: B
35. You create and share a folder on a computer running Windows
2000 Server. The folder will be used to store documents that define
corporate standards. Most employees use these files frequently. You
set the shared folder permissions to allow Read access for
Authenticated Users. You set the read-only attribute of each file in
this folder. How should you configure the offline folder setting for
this shared folder to minimize network traffic? A. Clear the setting
Allow Caching of files in this shared folder B. Manual Caching for
Documents C. Automatic Caching for Programs D. Automatic Caching for
Documents
Answer: B
36. Gerry has several types of computers with a variety of
adapter cards on his Windows 2000 based network. The Windows-based
computers are configured to use NWLink, and the non-Windows
computers are configured to use IPX/SPX. The drivers on each machine
are compatible with the protocols in use on that machine, but one of
the computers cannot connect to the network. You have checked the
cabling and connectors on the computer, and they appear to be good.
What is the most likely cause of the problem? A. IRQ conflicts B.
Protocol mismatch C. Data speed mismatch D. Frame type mismatch
Answer: D
37. You manage a Help Desk for your company. You decide to
install Terminal Services on one of your company's computers running
Windows 2000 Server (SrvRC) to allow your help desk personnel to
assist users via remote control. The users and the help desk
personnel work on computers running Windows 98. In addition to
installing the Terminal Services client on the user's computers,
what steps should you take to provide the remote control capability?
A. Install Terminal Services on SrvRC and configure it to use the
Application Server mode. Have the Help Desk personnel manage client
computers from the terminal server's console. B. Install Terminal
Services on SrvRC and configure it to use the Remote Administration
mode. Install the Terminal Services client on the computers used by
the Help Desk personnel. C. Install Terminal Services on SrvRC and
configure it to use the Application Server mode. Install the
Terminal Services client on the computers used by the Help Desk
personnel. D. Install Terminal Services on SrvRC and configure it to
use the Remote Administration mode. Have the Help Desk personnel
manage client computers from the terminal server's console.
Answer: C
38. Your department has a custom application that your manager
wants you to install on a computer running Terminal Services. What
steps should you take when you configure this application to run on
the Terminal Services server? A. Enable the RDP connection while you
set up the application. After installing the application, run the
command "change user / install", and edit the necessary settings in
the User Interface of the application. B. Enable the RDP connection
while you set up the application. After installing the application,
run the command "change user / execute", and edit the necessary
settings in the User Interface of the application. C. Disable the
RDP connection while you set up the application. After installing
the application, run the command "change user / install", and edit
the necessary settings in the User Interface of the application. D.
Disable the RDP connection while you set up the application. After
installing the application, run the command "change user / execute",
and edit the necessary settings in the User Interface of the
application.
Answer: D
39. You create a new folder named CorpInfo on a computer running
Windows 2000 Server. You share the folder. You assign the following
share permissions to the folder: "h CorpDataAdmin Full Control "h
CorpDataEntry Change "h Joe Read Joe belongs to the global group
Support. Support is a member of the domain local groups
CorpDataAdmin, CorpDataEntry and CorpUpdate. What is Joe's effective
permission to the shared folder CorpInfo? A. Access is denied B.
Change C. Full Control D. Read
Answer: C
40. The X.25 link between your office and a branch office of your
company is inaccessible. Both offices also have T1 lines to local
Internet Service Providers (ISPs). You need to update configuration
parameters for the default web site on a computer running Internet
Information Services (IIS) at the branch office. What parameter must
you include in the Uniform Resource List (URL) in order to
administer the site using your web browser? A. The host header of
the administration web site B. The port number of the administration
web site C. The home page of the administration web site D. Port 433
Answer: B
41. You are testing a custom application on a computer running
Windows 2000 Server. The application (AppA) starts 4 child processes
(Proc1, Proc2, Proc3 and Proc4). Proc2 starts 2 child processes
(Proc2a and Proc2b). You also have 3 other applications running on
the server. You notice that the processor queue has grown to 4, and
you want to eliminate the custom application. What steps should you
take to eliminate the application as quickly as possible? A. On the
Application tab in Task Manager, select the custom application. From
the context menu of the application, select Go To Process From the
context menu of that process, set the priority to AboveNormal B. On
the Processes tab in Task Manager, select each process of the
application that has a child process (AppA and Proc2). From the
context menu of AppA and Proc2, select End Process C. On the
Application tab in Task Manager, select the custom application. From
the context menu of the application, select Go To Process From the
context menu of that process, select End Process D. On the
Application tab in Task Manager, select the custom application. From
the context menu of the application, select Go To Process From the
context menu of that process, select End Process Tree
Answer: D
42. You enable RRAS on a computer running Windows 2000 Server.
You want to configure a Virtual Private Network (VPN) using only
Layer 2 Tunneling Protocol (L2TP), and disable the Point-to-Point
Tunneling Protocol (PPTP). What 3 steps should you take (Choose
three) A. In the appropriate properties dialog box of the Ports
node, set the Remote Access Connection (Inbound Only) check box for
PPTP B. In the properties dialog box of the Ports node, clear the
Demand Dial Routing Connections (Inbound and Outbound) check box for
PPTP C. In the properties dialog box of the Ports node, set the
Demand Dial Routing Connections (Inbound and Outbound) check box for
PPTP D. Set the number of PPTP ports to 1 E. In the properties
dialog box of the Ports node, clear the Remote Access Connection
(Inbound Only) check box for PPTP F. Set the number of PPTP ports to
0
Answer: B, D, E
43. You enable Routing and Remote Access (RRAS) on six computers
running Windows 2000 Server in your enterprise. These computers
belong to a Windows 2000 domain. You also configure one computer
running Windows 2000 Server as an Internet Authentication Service
(IAS) server to centralize the authentication of remote access users
for the domain. You plan to govern the use of remote access by
implementing remote access policies. How should you create these
policies? A. Use the Group Policy editor to create the policies in
the default domain policy. B. Use the Group Policy editor to create
the policies in a Group Policy object linked to an organizational
unit (OU) that contains the computer objects for the remote access
and IAS servers. C. Use the Routing and Remote Access snap-in to
create policies on the IAS server. D. Use the Routing and Remote
Access snap-in to create policies on each remote access server.
Answer: C
44. You enable Routing and Remote Access (RRAS) on a computer
running Windows 2000 Server. You plan to use IP packet filters to
manage the protocols available to remote access clients. What
component of the Routing and Remote Access snap-in can you use to
implement the IP packet filters? A. The profile of a remote access
policy. B. The Properties dialog box of the remote access server. C.
The conditions of a remote access policy. D. The Properties dialog
box of the remote access ports.
Answer: A
45. You want a user to manage a computer running Windows 2000
Server on which Terminal Services are enabled in Remote
Administration mode. The computer is a member of a Windows 2000
domain. You do not want this user to be a member of the Domain
Admins group. What should you do to enable the user to perform basic
tasks using Terminal Services? A. Add the user to the Server
Operators group. B. Use Terminal Services Configuration to modify
the permissions of the RDP-TCP connection object. C. Use Local
Security Policy to assign rights for that computer to the user. D.
Use Terminal Services Configuration to modify the Permission
Capability setting for the server.
Answer: C
46. You manage a computer running Windows 2000 Server and
Exchange Server 5.5. You want to optimize the performance of the
server. Which setting should you enable for the File and Print
Sharing for Microsoft Networks in the properties of the local area
connection of the computer? A. Maximize data throughput for network
applications. B. Minimize memory used. C. Balance. D. Maximize data
throughput for file sharing.
Answer: A
47. You implement Internet Printing on a computer running Windows
2000 Server. When a user attempts to connect to a printer using
Internet Explorer 4.0, what protocol will the client computer use
first? A. Remote Procedure Call (RPC) B. Server Message Block (SMB)
C. Internet Printing Protocol (IPP) D. Hypertext Transport Protocol
(HTTP)
Answer: C
48. You create a stand-alone Distributed File System (Dfs) root
on Srv1, a computer running Windows 2000 Server. You then add two
links to the root. The links refer to shares on computers running
Windows 2000 Server that are members of the same workgroup as Srv1.
The servers hosting the links are named SrvA and SrvB. You want to
replicate the content of the Dfs link on SrvA to SrvB. What step or
steps should you take? A. You should create the link replica on SrvB
and manually copy the contents of the share on SrvA to replica. B.
You should enable the File Replication Service on Srv1, SrvA, and
SrvB C. You should enable the File Replication Service on SrvA and
SrvB D. You should create a replica of the Dfs root on SrvB
Answer: A
49. You create a domain-based Distributed File System (Dfs) root.
The root is hosted on a domain controller in your Windows 2000
domain. You then add two links to the root. The links refer to
shares on computers running Windows 2000 Server that are members of
the domain. You want to enable replication of one of the links by
using the Distributed File System Snap-In, but the Replication
Policy choice on the context menu of the link is disabled. What step
will enable you to create a replication policy for the link? A.
Start the File Replication Service on the computer that is hosting
the share for the link. B. Use the Distributed File System Snap-In
to create a replica of the link. C. Start the File Replication
Service on the domain controller. D. Use the Distributed File System
Snap-In to create a replica of the root.
Answer: B
50. A user named Kathy belongs to four global groups in Corp, a
Windows 2000 domain that you manage. The global groups are GGApps,
GGData, GGMgr and GGDB. The group GGApps is a member of the domain
local group Apps. The group GGData is a member of the domain local
group Data-Access. The group GGDB is a member of the domain local
group DB-Access. You create and share a folder on a member server of
the domain. You allow the share permission Full Control for the
group DB-Access, the share permission Read for the group Apps, and
the share permission Change for the group Data-Access. Kathy uses a
computer running Windows 2000 Professional that is a member of Corp.
What is the effective permission for Kathy when she connects to the
shared folder from her computer? A. Access is denied B. Read C.
Change D. Full Control
Answer: D
4. You have a W2K server named SR8, you enable compression on the
whole D: volume. You enable a quote limit of 500 MB and set the
option to deny space for users who exceed the quota limit. This
volume is set up for user's home folders. A user works on a W2K
server named SR7; he has a compressed folder with a file (files)
that occupied 498 MB. He wants to save the file(s) to his home
folder on SR8. Halfway through the process he received an error
message saying he ran out of space. You want to allow him to save
the file(s) on SR8 and at the same time you want him to have a quota
limit. What to do?
A. Wrong answer B. Uncompress the file(s) on SR7 check the
uncompress size, set a quota entry for the user on SR8 to match this
new size. *** C. Create a quota entry on SR8 for the user and set
the "Do not limit disk usage" option. D. Wrong answer.
1.You install win2000 on new computer with SCSI controller with
HD connected to it that have zero for its id bus, after the text
based phase of the installation, you installed another SCSI -RAID
controller which have 3 HDs with id bus of zero, you start the
computer, the system display an boot error, cannot boot the system,
how to solve the problem and the
system detect the 2 controllers, what you do?
Answer: Make sure the both SCSI controller have different id bus
no.
2.you have workgroup as shown:
********** *********** ************* ***********
* Client1 ************************* Server1 ********** 56k Modem
****** INTERNET *
********** *********** ************* ***********
*******
* Hub *******************************
*******
*
*********** *********** ***********
* Client2 *********************** Server2 Client3 *
*********** *********** ***********
Server2 has static ip,but there is no application on it that
require static ip, the
other clients and server1 get their ip automatically, when
server1 connected to
Modem to the Internet, you configured Internet connection sharing
on it and it
gets own ip from the ISP, after that, server1 cannot connect to
other clients and
Server2, how can you make all coputers see each other?
Answer: Configure Server2 to get its ip automatically and restart
all computers except server2.
Special
Important Review Problem Special Extraordinary
1. You are a network administrator at Contoso,Ltd. You work at
the main office in Seattle. The branch office in Denver is a call
center. The network consists of a Windows 2000 domain only. The
network is configured as shown in the exhibit:
Denver is a token ring network and Seattle is an ethernet
network. None of your network adapters at Contosa,Ltd support
promiscuous mode. The router does not support multicase traffic.
Wks1.contoso.com and mem1.contoso.com are available for use as
network monitor clients. You want to be able to detect and identify
any roque installations of network monitor on your network by using
the fewest possible computers. What should you do? (Choose all that
apply)
A. Install network montitor tools on wks1.contoso.com by using
the Windows components wizard.
B. Install the SNMP protocol on wks1.contoso.com by using the
Windows components wizard.
C. Install network montitor tools on mem1.contoso.com by using
the Windows components wizard.
D. Install SNMP protocol on mem1.contoso.com by using the Windows
components wizard.
E. Install a network adapter on wks1.contoso.com that supports
promiscuous mode.
F. Install a network adapter on mem1.contoso.com that supports
promiscuous mode.
ANS: A, C (I had this on the exam and scored 1000)
Reasoning: (1) Avoid promiscuous mode (30% overhead increase vs
NDIS); (2) Network Monitor auto detects other Network Monitor
installs; (3) Needs multicast to cross routers; (4) Supports
TokenRing; (5) Network Monitor: only packets sent to/from local
computer; (6) SMS Network Monitor: packets to/from any computer; (7)
See http://www.microsoft.com/TechNet/winnt/Winntas/manuals/concept/
xcp10.asp.
2. You are the administrator of a Windows 2000 network. You have
installed the SNMP agent on one of your Windows 2000 Server
computers. You want to collect routing information on a second
Windows 2000 Server computer running a third party Network
Management Console. How should you configure the SNMP agent? (Click
to put a crosshair in the appropriate checkbox)
A. Physical
B. Applications
C. Datalink and subnetwork
D. Internet
E. End-to-end
Answer: C
3. You are a recently hired network administrator at Awesome
Computer. Awesome Computer has an office in New York and Toronto.
Company network configured as:
Toronto Office:
Windows 2000 Domain Controller
Monitor1 with community name of AwesomeA
WebServer with community name of AwesomeA
New York Office:Windows 2000 domain Controller
Monitor2 with community name of AwesomeB
ApplicationServer with community name of AwesomeB
These two offices are linked to two routers with Internet between
the routers.You are responsible for monitoring all servers from
Monitor1. Monitor1 and Monitor2 are configured with Management
Console running third party network management software.
ApplicationServer and WebServer are configured as SNMP agents. You
discovered that you are unable to manage ApplicationServer from
Monitor1. What should you do?
A. Relocate the ApplicationServer to Toronto office.
B. Move ApplicationServer computer account to Toronto domain.
C. Add AwesomeA to the list of accepted community names on
ApplicationServer.
D. Add public to the list of accepted community names on
ApplicationServer.
E. Remove all community names from ApplicationServer.
F. Remove all community names from Monitor2.
Answer: C
4. Mon1 server running 3rd party network software:
a) Install SNMP in TCP/IP installation tab on ALL CLIENTS except
Mon1
b) Install SNMP in TCP/IP installation tab on Mon1
ANS: B (refer MS press 70-216(pg 95))
PRINTING
5. You share a printer name Telesales on win2000 server. The
printer will be used to print packing Labels for order processed by
300 sales person. The printer is HP laser 5000N that have HP Jet
direct device on board. The packing labels are printed by using PCL.
User said printer is too slow. You want maximize the number of
packing label printed in a specified time. What ‘s you do?
A: modify property of Telesales printer. Set default data type
for sales set RAW.
B: change packing label to use the post script page description
language instead of PCL.
C: use second HP printer to network. Let Telesales to print in
both printer.
D: attach 3 post script laser printer device to network.
ANS: B
6. You have a HP printer with DLC protocol. After you removed the
printer to another segment, users can not get print job done. What
to do ?
A. Set up DHCP server for the printer
B. Change to LDR protocol
C. Delete and recreate the printer with DLC connection
D. ???
ANS: C. Since the printer’s static IP address is changed, you
should recreate a DLC printer with the new IP address and same
protocol DLC.
7. You configure a HP jet direct network printer device on your
window 2000 domain srv2 on sales.juttogs.com. This is connected to
the TCP/IP port to the print device. However, when you enter IP
address of the device, you receive the dialog box in the printer
port wizard. See diagram show:
srv2 ip: 10.1.10.35. gateway 10.1.10.100/16
HP printer jet direct Ip: 10.4.20.200/16
Router Ip: 10.5.20.100/16
Another diagram :
A: Select HP Jet Direct from standard drop-down list.
B: Select the custom option button, click setting command button
and than LPR printer.
C: Change IP of the printer device to 10.5.20.200
D: Change subnet mask of the print device to 255.0.0.0
E: Change default gateway on Srv2.sales.jottom.com to
10.5.20.100.
ANS: C (I had this on exam; scored 1000)
8. You are the administrator of a Windows 2000 network. You have
installed two shared printers for a print device on a Windows 2000
Server. Both printers are available to all users. They are shared as
Admin and Executive. Admin is configured with a priority of 90,
Executive is configured with a priority of 50. Now, you are advised
to prevent the printer Executive to be visible to all users. Only
members of the Executive group should be able to print to Executive.
What should you do?
A. Allow the Executive Group print permission only. Remove the
sharename Executive and add the sharename Executive$. Reconnect all
members of the Executive Group to the new sharename.
B. Install a second printer driver for the print device. Set NTFS
permissions to the new driver files so that only the Executive Group
is allowed to access the files.
C. Deny print permission to the Everyone Group.
D. Change the priority of Executive to 99, so that ...........
ANS: A
RAS
9. You configured a RAS server, you want to accept only connect
which speed is faster than 64kbps, and you want to use mutual
authentication.
(select 3)
A. RADIUS provider
B. Windows Authentication provider
C. to allow IDSL media
D. to allow Async media
E. EAP
F. MS CHAP
G. MS CHAP v2
ANS: B, C & G
10. You enable the Routing and Remote Access Service (RRAS) on a
computer
running Windows 2000 Server. The computer is a member of a
Windows 2000
domain running in native mode. You configure this computer as a
RAS
server. You want to configure RAS so that only members of the
domain local group RAS-Access can establish a dial-up connection to
the RAS server.
What step or steps should you take to limit access to only this
group? Select all that apply.
A. Configure the incoming connections on the RAS server for
MS-CHAP
authentication only. Configure the client computers to use
MS-CHAP for the
outgoing connections.
B. In Active Directory Users and Computers configure the Dial-in
settings
of the group RAS-Access to allow remote access
C. Delete the default remote access policy on the RAS server.
Create a new
remote access policy. Create a condition in the policy that
grants remote
access permission only to the group RAS-Access
D. Delete the default remote access policy on the RAS server.
Create a new
remote access policy. Define the remote access profile settings
to grant
remote access permission only to the group RAS-Access
ANS: A, C Reason: I try to do it on server. B is worng, because
there are not dail-in settings tab on Group.
11. You enable Routing and Remote Access (RRAS) on six computers
running Windows 2000 Server in your enterprise. These computers
belong to a Windows 2000 domain. You also configure one computer
running Windows 2000 Server as an Internet Authentication Service
(IAS) server to centralize the
authentication of remote access users for the domain. You plan to
govern the use of remote access by implementing remote access
policies. How should you create these policies?
A. Use the Group Policy editor to create the policies in the
default domain policy.
B. Use the Group Policy editor to create the policies in a Group
Policy object linked to an organizational unit (OU) that contains
the computer objects for the remote access and IAS servers.
C. Use the Routing and Remote Access snap-in to create policies
on the IAS server.
D. Use the Routing and Remote Access snap-in to create policies
on each remote access server.
Answer: C
12. Your Routing and Remote Access for Windows 2000 is configured
with the policies shown in the exhibit:
Remote Access Policy .............. 1
Remote Access Policy .............. 2
Remote Access Policy Logon Required 3
The current configuration allows users to connect remotely after
logging on. You want to limit remote connections to logon
connections only.
What should you do?
A. Delete the required L2TP policy.
B. Configure the logon required policy to grant access.
C. Move the logon required policy to number one in the policy
order.
D. Change the "Allow access if dial-in permission is enabled"
policy to include the logon required policy.
Answer: C
13. You are the network administrator at Humongous Insurance, a
major insurance company that has 1,000 offices worldwide. You are
configuring the network so that only the sales staff can connect to
it from home.
Your Windows 2000 forest contains a member server named Server1
that has Routing and Remote Access for Windows 2000 enabled. You
configure Server1 to use a modem bank to accept incoming dial-up
attempts. You configure Server1 to use Windows Authentication as the
authentication provider. The only supported authentication method is
MS-CHAP version 2. You need to restrict access to Server1. What
should you do?
a. Create an organizational unit (OU) named "Sales_Staff.
Populate Sales_Staff with the sale staff user accounts. Provide
access to this OU by using the Client-Friendly-Name attribute of the
default remote access policy.
b. Create an organizational unit (OU) named "Sales_Staff.
Populate Sales_Staff with the sale staff user accounts. Provide
access to this OU by using the Windows-Groups.
ANS: A (I had this on exam; scored 1000)
VPN
14. You will be shown a network exhibition configured with 5
sites connected to internet. Each configured with VPN. You want two
sites, Miami and Chicago to be able to connect to each other. What
should you do?
A. Configure Miami VPN client
Configure Chicago VPN server
B. Configure Miami VPN server
Configure Chicago VPN client
C. Configure Miami VPN client, server
Configure Chicago VPN client, server
D. Configure Miami VPN server
Configure Chicago VPN server
ANS: A, B (each must be VPN server & client)
15. You need to ensure that only authorized remote connections
are posible on your W2K network. You create a policy named Required
L2TP on the RRAS, the settings for this policy and the policy order
are shown in the exhibit. You test the VPN connections and discover
that for the SueJ user the connection is made through a lower
security PPTP tunnel rather L2TP. Sue's dial-in properties are shown
in SueJ properties exhibit. All other port, policy and server
settings are the default settings for a VPN server. You want to
ensure that the server will deny all PPTP conections. Which two
actions should you take?
A. Change the required L2TP policy properties to deny remote
access permission.
B. Change the dial-in properties of the SueJ user account to
control access through remote access policy.
C. Remove all PPTP ports from the server.
D. Remove the allow access if dial-in permissions enabled policy
from the server.
E. Remove all but one PPTP port from the server and deny both
inbound and outbound connections on that port.
F. Remove Allow authenticated connection policy in RAS
ANS: B
(I had a similar question with different options that made sense;
answer was clear)
16. Your company has five branch offices, which are not
networked. On each side you have one Windows 2000 Server computer.
The offices WEST and EAST have servers named West1.Testsys.com and
East1.Testsys.com, which are configured with RRAS. You have to
connect these two branch offices through the internet via VPN. Users
from WEST should be able to connect to EAST and vice versa. (You see
a picture with five servers and the Internet between them) How
should you configure West1.Testsys.com and East1.Testsys.com?
A. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN
Server.
B. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN
Server.
C. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN
Client.
D. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN
Client.
Answer: D
However, here's somethings new to know TCP and UDP Ports, IP
ports which once used port 47 and protocol number 1723 and
configuration using VPN and PPTP for connectivity thru a firewall.
The scenario shows picture of Two fire walls and Two VPN
servers,each of the VPN servers is behind the firewall, located at
Boston and NY respectively and connected together thru the internet.
You try to connect using one of the VPN servers. You get the error
"can't connect". What to do on the firewall walls to allow the VPN
servers to communicate. I have no idea.
USB
17. You installed a new USB mouse and after restarting your
computer your mouse does not work. You confirm the correct drivers
are installed and other USB devices work fine.
a. enable mouse port in BIOS
b. enable mouse in your hardware profile
c. unplug mouse, restart, and plug in mouse
d. Install the mouse using Add/Remove Hardware wizard.
e. don¡¯t remember
ANS: D
ICS
18. Your network consists of a Windows 2000 Server computer and
10 Windows 2000 Professional computers. The Windows 2000
Professional computers use a modem and a dial-up connection each to
connect to the Internet. Now, you rent a single DSL-Line which will
be configured on your Windows 2000 Server computer. You install
Internet Connection Sharing (ICS) on the server. All Windows 2000
Professional computers have to use ICS. How should you configure all
Windows 2000 Professional computers to connect to the internet
without changing or removing the existing dial-up connection?
(Choose all that apply)
A. In Internet Options select "Never dial a connection".
B. In Local Area Network Settins set "Use automatic configuration
script".
C. In Local Area Network Settins set "Automatically detect
settings".
D. In Local Area Network Settins set "Use a Proxy Server".
E. In Local Area Network Settins set "Bypass Proxy Server for
local addresses".
Answer: A, C
19. You have a local Win 2000 network setup as a Workgroup. There
are several Win 2000 remote sites also setup as a Workgroup. The
remote sites connect to local resources by direct dial modems.
Member1 is a server on the local network, it has two adapters,
adapter1 is an NIC to the local network and Adapter2 is an NIC
connected to a DSL modem which is connected to the Internet. You
install ICS on Member1 to allow local network to have Internet
access. After install, remote sites are unable to view local
resources and local users are still not able to connect to the
Internet. Choose one to correct problem:
A. Install ICS on Adapter1.
B. Install ICS on Adapter2.
C. Install NAT
D. Install Proxy Server on local network.
ANS:C
20. Your workgroup consists of two Win2K server and 10 Win2k Pro.
Each Win2K Pro dials up to Internet separately and has own dialup
settings. You purchase a DSL line. You install ICS on a Windows 2000
server and disconnect all win2kPro connections. The Win2Kpro users
can not connect to Internet when they dial up. You should not change
(many) dialup settings on Win2K Pro. What should you do on each
Win2K Pro?
A. In Internet options, select Never dial a connection
B. In LAN settings: select automatically detect settings
C. In LAN settings: select automatic configuration script.
D. In LAN settings, select use a Proxy server.
ANS: A (I think B too).
HARD DISKS
21. Your win2000 server computer contains four 16-gb hard disks.
Disk 0 is configured as a basic disk. Disk 0 has a single 16-gb
partition that contains the os files. Disk 1,2, and 3 are configured
as dynamic disk in a raid-5 volume. The entire server is backed up
to a tape drive each night. During your daily review of the server’s
event logs, you discover that disk 1 has failed. You shut down the
server and replace disk 1 with a new hard disk. When you restart the
server win2000 starts normally but the data on the raid-5 volumn is
inaccessible. Disk management indicates that disk 2 has failed also.
You replace disk 2 with a new hard disk. Now you need to recover the
data on the raid-5 volume as quickly as possible. What should you do
?
A. use disk manager to rebuild raid-5 partition
B. delete and recreate the raid-5 partition.redtore the contents
of raid-5 partition from the most recent tape back-up
C. use win2000 backup to restore the contents of disk2. Use disk
manager to rebuild the raid-5 partition on disk 1
D. delete and recrate the raid-5 partition . setart the server by
using win2000 setup cd, and select the repair option
ANS: B
22. You have a Windows 2000 Server and has 2 disk drives attached
to the IDE controller. You want more space so you add a new SCSI
Controller with 6 disks. The SCSI controller is not in the HCL. You
restart the server but it's not dectected. What should you do?
(Choose 2)
A. Use Device Manager to turn off IRQ steering in the Properties
of the Standard PC. Restart
B. Use Disk Management to restore the asic configuration. Restart
C. Use Add/Remove Hardware wizard to add new SCSI & RAID
controller from the disk of the manufacturer.
D. Use Disk Management to rescan disk
E. Use Manufacturer's setup program to install the drivers for
the SCSI disk controller.
ANS: A,E
23. You are installing Windows 2000 Server on a new computer that
has a single 10-gb scsi disk. The disk controller is not included on
the current Hardware Compatibility List (HCL). You start the
computer by using the Windows 2000 Server CD-Rom. Then the computer
restarts. At the end of the text mode portion of Windows 2000 Setup,
you receive the following STOP error: "INACCESSIBLE_BOOT-DEVICE."
Which two actions should you take to eliminate the STOP error?
(Choose two)
a.Restart Windows 2000 Setup by using the Windows 2000 Server
CD-ROM.
b.Select Safe Mode from the windows 2000 boot menu.
c. remove the windows 2000 server CD-ROM from the CD-ROM drive.
d.Install a driver for the SCSI controller from a floppy disk.
e.Use Device Mananger to update the driver for the SCSI
controller.
ANS: A, D (I had this on exam; scored 1000)
24. You are planning the installation of windows 2000 server on a
new computer that has four 50-GB hard disk drives installed. You
want windows 2000 setup to create a single partition on disk 0 of
the largest possible size and to install the operating system on the
partition. After windows 20000 has been installed you also want to
configure the remaining three disks in such a way that the maximum
amount of space on all four disks can be accessed from a single
drive letter.
Which of the following methods should you use to achieve your
objectives?
a. On disk0 create a 4 GB fat16 partition during setup. Use disk
management to covert all four disks to dynamic disks and combine
unallocated space on all four disks into a single spanned volume.
b. On disk 0 create a single 50 GB ntfs partition during setup.
Use disk management to create a single 50 GB ntfs partition on each
of the remaining disks and then mount each partition to a separate
empty folder on disk 0.
c. On disk 0 create a 32 FB fat32 partition during setup. Use
disk management to convert all four disks.
d. On disk 0 create a single 50 GB ntfs partition during setup.
Use disk management to convert all four disks to dynamic disks and
then extend the simple volume on disk 0 to include all of the
remaining disks into a single striped volume.
AND: B
Choice b is correct. During windows 2000 setup, you can create a
FAT16 partition of up to 2 GB, a FAT32 partition of up to 32 GB or
an ntfs partition of almost any practically reasonable size.
Currently, 2 tb should be considered a practical limit on a single
ntfs volume. To meet the first requirement of this scenario that the
partition on disk 0 be of the largest possible size, you should
create a single 50 GB ntfs partition. To meet the second requirement
you should create single 50 GB partition on each of the remaining
disks and then mount each partition to a separate empty ntfs folder
on disk 0. Then, all 200 GB of the available space will be
accessible through a single drive letter C. You cannot extend a
simple volume that was created from a partition of a basic disk;
only simple volumes that were created from unallocated space on a
dynamic volume can e extended. Additionally, you cannot create a
striped volume by extending a simple volume. To create a striped
volume, you must specify unallocated space, not an existing volume.
INSTALL
25. You plan to install windows 2000 server on 10 new computers,
these servers will provide file and print servers in branch offices
of your company, the company wants each branch office to purchase
its own copy of window 2000 server, and the installation in each
branch office should use the serial number associated with the
branch office’s own copy. You want to install, configure, and test
windows 2000 server on these computers at the main office before
shipping the computers to the branch offices, you want users in the
branch offices to enter the computer named and serial numbers when
they receive the computers. What should you do?
A.Install windows 2000 server on the computers by using an
unattend.txt file, and then use the Registry Edition to remove the
computer name and license details.
B. Start the installation process from an MS-DOS boot disk.
Install windows 2000 server on the computers from an existing server
by running the winnt command with the /Prelnst switch.
C. Install windows 2000 server on the computers and then use
setup manager to create a sysprep.inf file for sysprep.exe. Pleace
the sysprep.inf file on the computers and run the sysprep-nosidgen
command.
D. Create an unattend.txt file by using Setup Manager. Include
the following line in the Unattend.txt file: oenPreinstall=Yes. Use
the file to perform the installation.
ANS:C
26. You are the administrator of a network that includes windows
nt server 4.0 computers, NT Workstation 4.0 computers and unix
computers. The network consists of a single windows NT domain. You
are upgrading a windows NT server computer named server1 to windows
2000 server. Server1 is a bdc in the domain. The existing DNS server
is a unix computer that supports srv (services) records and is
configured to accept dynamic updates. The existing WINS server is
another windows NT server computer. You want to configure server1 as
a domain controller in a new active directory forest. You want the
existing windows NT domain accounts to be upgraded to active
directory. You plan to upgrade the other domain controllers in the
domain to windows 2000 after the upgrade of server 1 is complete.
You want to perform the upgrade of server1 with the least possible
impact on other computers on the network.what should you do?
A. Promote server1 to the pdc of the domain. Run windows 2000
setup on server1.
B. Run windows 2000 setup on server1. At the end of
setup.configure server1 as a dns server and a wins server.
c. Add a static mapping for server1 on the WINS server. On the
DNS server, create a srv record for the ldap service on server1. Run
windows 2000 setup on server1.
D. Install the ms dns service on an existing windows nt server.
Apply SP 4 or later to the server. Run windows 2000 setup on
server1.
ANS: A (I had this on exam; scored 1000)
27. Which of the following sections in unattend.txt contains the
ComputerName?
a) Unattended
b) UserData
c) Networking
d) Identification
e) Data
ANS: B
28. What should you use for installing multiple Windows 2000
servers with dissimilar hardware?
a) SMS
b) Sysprep
c) Syspart
d) RIS
ANS: C
29. What service is responsible for answering client computer
network service requests during the OS installation using RIS?
a) TFTPD
b) BINLSVC
c) RIS service
d) DHCP
e) Active Directory
ANS: B
RUNAS
30. You are a member of the backup operators group in
arborshoes.com domain. You are not a a member of an other groups in
this domain. You are logged on to a W2K server computer named
bcksrvr3.arborshoes.com. You try to configure the software for a
tape backup device, but the configuration fails during the backup.
The documents for the current tape backups device indicates that the
current tape driver is out of date and must be updated to support
configuration. What should you do?
A) run the runas command. supply your user name and password to
start device manager. then click the update driver command button on
the driver tab for the tape backup device
B) instruct the domain administrator to run the runas command,
supply the domain administrator with your user name and password to
start device manager. click update driver tab for the tape backup
device
C)open device manager, then click update driver command button on
the driver tab for the tape backup device
D)Run the add/remove hardware wizard. when prompted select
add/troubleshot a device
ANS: B
STARTUP & TASK MANAGER
31. You have an application server named App1. On this server you
have many custom built programs. All of these programs are launched
as a service on startup. You have one program that is called
Finance. This application is critical to your Accounting department.
You find that the Finance program is making App1 unstable due to
errors in the program code. You want to have App1 run stable until
the code errors are fixed. What should you do? (Not exactly word for
word, but you get the idea. It was worded bad on the exam too)
A. Open Task Manager and run the Finance application as
/BelowNormal
B. Open Task Manager and run the Finance application as /Low
C. Don't remember - It was wrong
D. Open Services and change the startup type from Automatic to
Manaul
ANS: D
32. Your company includes a PentiumII, 450-MHZ database server
named webdata1. webdata1 supportts a high-traffic, e-commerce web
site on a server named webserver1. Users access the e-commerce web
site from their Internet browsers. Users report that when they
attempt to complete a purchase, they must wait five minutes for
confirmation that their order has been processed.
You want to use Task Manager to help you decide whether an
additional processor is needed, what can you do ?
A: on the performance tab, select the option to monitor the
system cache
B: on the performance tab, select the option to monitor the
available physical memory
C on the process tab, select the option to monitor the memory
usage column, Monitor this column
D: on the process tab, configure the view to include the thread
count column, Monitor this column
E: on the process tab, configure the view to include the page
faults column, Monitor this column
ANS: D
GPO
33. You have the following exhibit:
(garbled litware.com, contoso.com, is.litware.com,
finance.litware.com, is.contoso.com, support.is.litware.com,
support.contoso.com & development.contoso.com)
You need to deploy and service pack to the support.is.litware.com
domain and the support.contoso.com. How should you deploy?
A. Assign to litware.com and contoso.com domains
B. ??
C. Create 2 sites, 1 tree in each site. Create a GPO in each site
D. Create 1 site that contains 2 trees. Creat a GPO for the site
ANS: D
34. You are a regional admin who is performing location-specific
tests for an enterprise migration. Test server computers and test
client computers have been deployed at your location. Your location
plans to have a site Group Policy applied after the actual migration
is complete. You need to provide the lead admin the security
settings for the appropriate computers in your location. Which item
should you provide?
A. a policy template file that is exported from the Security
Configuration and Analysis utility.
B. An administrative template file from Group policy.
C. A template list that is exported from the Security
Configuration and Analysis utility.
D. A Group Policy Object.
ANS: D
35. You are the administrator of a high security network. Many
files stored on your Windows 2000 file servers and Windows 2000
Professional computers are highly confidential. You want to
implement identical security configurations on all Windows 2000 file
servers and Windows 2000 Professional computers. What should you do?
(Choose all that apply)
A. Configure Group Policies to apply the security configuration
to all Windows 2000 file servers and Windows 2000 Professional
computers.
B. Use the Security Configuration Management Console to import
security information from a file server as a template.
C. Use the Security Configuration Management Console to import
security information from a Windows 2000 Professional Computer as a
template.
D. Use Secedit to export the security configuration to all file
servers.
E. Use Secedit to export the security configuration to all
Windows 2000 Professional computers.
Answer: A, B, C
FOLDER PERMISSIONS
36. You create some folder in a root G and you don`t want users
from network to create folders in root but they can create
subfolders in the folder you have created. What do you do?
a.create folder in G:,configure block permission inherihance
b.create folder in G:,configure permission allow user create
subfolder.block permission inherihance
c.create folder in G:,confige block permission inherihance
prevent create folder in the root.
d.create prevent create folder in the root
create folder in G:, confige block permission inherihance
ANS: B
37. You are the administrator of a Windows 2000 server computer
named Intra. This server hosts an intranet web site for your
company. The marketing department stores marketing files in a shared
folder on a separate file server. The NTFS permissions on the folder
are shown on this exhibit:
Exhibit 1: Marketing users have full control
Exhibit 2: Virtual Directory with Read, Log Visit, and Index this
resource boxes checked and Write and Directory Browsing boxes
unchecked
The marketing director wants to make the marketing files
available to the rest of the company via internet. She wants company
users to be able to read but no modify all the files. You create a
new virtual directory named marketing under the intranet web site
folder on Intra. You configure the virtual directory as shown some
users report that they cannot access the marketing files from their
web browsers. However, all users in the marketing department are
able to access the files. You need to provide need acess to all
company users. What should you do?
a) Select directory browsing check box on virtual directory tab.
b) Copy files form their location on the file server to the Intra
Marketing.
c) Modify NTFS permission on the file server to remove the entry
for Marketing.
d) Modify NTFS permission on the file server to include an entry
for Everyone: Read
ANS: D (I had this on the exam; scored 1000)
IIS
38. You are the administrator of windows 2000 server computer
named Intra. Intra is a member of an Active Directory domain and
hosts an Intranet Web Site for your company. Company policy requires
that only authenticated users have access to the intranet site. All
company users have user account in the Active Directory domain. You
configure directory security for the Web Site to use integrated
security. However . You discover that users can access the Web Site
without Authenticated. You need to ensure that only authenticated
users can Access the web site.
What should you do ?
A. Install Active Directory on the server.
B. Select Basic Authentication Check Box.
C. Clear the Allow anonymous connection check Box.
D. Disable the IUSE_intra user account on Intra.
E. Clear the Allow IIS to control password check Box.
ANS: C
39. You are the administrator of a Windows 2000 Server computer.
The server hosts several web sites that have logging enabled. You
use a third-party reporting utility to analyze the log files
produced by the web sites. You notice that all data from 7:00pm to
midnight each night is included in the following day's logfile. You
want all data to be included in the correct day's log file. What
should you do?
A. Ensure that the log type is set to W3C.
B. Change the log rollover property in the website's logging
properties.
C. Change the time zone setting in the time properties on the web
server.
D. Configure the time service on the web server to use local
system account.
Answer: B
40. You are the administrator of an Internet Bluesky Airlines.
You install and configure a new Windows 2000 Server computer named
server1.departments.blueskyairlines.com as an intranet server. The
server
hosts the multiple departmental and resource WEB links to the
network and databases. You configure a ticketing WEB site. You also
configure a finance virtual directory in the department’s WEB site
as shown in the Exhibit. "We see an exhibit in which we see the dir
browsing enabling and person can see all the three". During the
first morning the new server is available and the user reports that
the only information they are seeing in their browser is a list of
HTM and ASP files. For security reasons what the first action you
need to take to disable the user ability to all the WEB sites in the
form of a list. What should you do?
A. Clear the directory browing on the server properties, and
apply to child WEB sites.
B. Clear the directory browsing settings for the ticketing WEB
sites and
then apply the settings to child virtual directories.
C. Clear the directory browsing checkbox for the department’s WEB
sites and
then apply the settings to the child virtual directory
D. Clear the directory browsing checkbox for the financing
virtual
directory.
Answer: A (I had this on exam; scored 1000. Correction to
Clonepony.)
QUOTAS
41. You are administrator. A user David has 10 GB on his home
folder on drive D. You set up disk quota with default setting. Limit
size to 11 GB and enable deny if exceeding the limit. David tries to
encrypt his files and gets error “ insufficient space”. What can you
do ? Select three answers:
A. Set no limit to David
B. Instruct David encrypt files.
C. Compress the files
D. Use Cipher.exe./d
E. Set default limitation to 12 GB for all users, clear deny when
exceeding the limitation.
F. Allow David’s home folder equal the size limitation (on
drive?), something like that.
ANS: A, B, F (wording of F not clear, but B, C & D are
clearly wrong)
42. You have a W2K server named SR8. You enable compression on
the whole D volume. You enable a quote limit of 500 MB and set the
option to deny space for users who exceed the quota limit. This
volume is set up for user’s home folders. A user works on a W2K
server named SR7; he has a compressed folder with a file (files)
that occupy 498 MB. He wants to save the file(s) to his home folder
on SR8. Halfway through the process he received an error message
saying he ran out of space. You want to allow him to save the
file(s) on SR8 and at the same time you want him to have a quota
limit. What to do?
A. Wrong answer
B. Uncompress the file(s) on SR7 check the uncompress size, set a
quota entry for the user on SR8 to match this new size.
C. Create a quota entry on SR8 for the user and set the “Do not
limit disk usage” option.
D. Wrong answer.
ANS: B
43. You are the Administrator of windows 2000 server computer.
The computer is configured to have a single 18 GB drive which
contains the operating systems (OS) files. This drive also contain a
share folder where 5 network users store there MS excel files. You
want to prevent each network user from using more than 1 GB of space
in the shared folder. Which action or actions should you take to
achieve this goal? (Choose all that apply)
A. Create a quota entry for everyone account. Set the quota limit
to 1 GB.
B. Enable disk quotas on the volume.
C. Set default quota limit to 1 GB.
D. Select the deny disk space to users exceeding quota limit
check box.
E. Upgrade the disk to a dynamic disk.
Ans: B, C, D.
ENCRYPTION
44. You are the administrator for your company. Your Windows 2000
Server computer contains two 23GB hard disks. Each disk is
configured as a basic disk and has a single 23GB NTFS partition.
Both partitions are backup up to tape every night. The partition on
Disk1 stores user data. Most users of your company encrypt their
files. Disk1 fails. You replace it with a new disk. You need to
recover the data as quick as possible while maintaining the security
of the files. What should you do?
A. Create a single NTFS partition. Restore the contents of Disk1
from the most recent tape backup. Run the cipher /d /i command.
B. Create a single NTFS partition. Restore the contents of Disk1
from the most recent tape backup. Instruct the users to verify the
integrity of their files.
C. Create a single NTFS partition. Restore the contents of Disk1
to a second file server. Logon to the server console as a recovery
agent. Copy the files from the second file server to the new
partition.
D. Create a single NTFS partition. Restore the contents of Disk1
to a second file server. Instruct users to copy their files from the
second file server to the new partition.
ANS: B
45. John, an employee in your company has used windows 2000
encrypting file system on his windows 2000 computer to encrypt a
file that contains sensitive information. John’s computer belongs to
the domain that you administer. When john left the company Greg was
hired for the position. You must enable greg to access the contents
of the encrypted file.
Which of the following should you do?
a. Log on to john’s computer by using the local administrator
account and decrypt the file.
b. Back up the encrypted file restore the backup on your computer
and decrypt the file.
c. Assign greg the take ownership permission for the file and let
him take ownership.
d. Copy the encrypted file to a fat volume.
ANS: A
46. You are the network administrator for your company. Your
Windows 2000 Server Computer contains two 23 GB hard disks. Each
disk is configured as a basic disk and has a single 23 GB NTFS
partition. Both partitions are backed up to a tape each night. The
parititon on Disk-1 stores user data. Most users at your company
encrypt their files. Disk-1 fails. You replace it with a new hard
disk. You need to recover the data as quickly as possible while
mantaining the security of the Disk-1 files. What should you do?
A) Create a single NTFS partition,
Restore the contents of Disk-1 from the most recent tape backup
Run the cipher /d /i command
B) Create a single NTFS partition,
Restore the contents of Disk-1 from the most recent tape backup
Instruct the users to verify the integrity of their files.
C) Create a single NTFS partition,
Restore the contents of Disk-1 to a second file server
Logon to the server console as a recovery agent
Copy the files from the second file server to the new partition
D) Create a single NTFS partition,
Restore the contents of Disk-1 to a second file server
Instruct users to copy their files from the second file server to
the new partition
ANS: B (others say C; verify for yourself)
RECOVERY
47. You start win2k. You have create ERD. Receive a "boot.ini is
missing". What can you do?
a. Start with win2K CD.start recovery console, run FIXBOOT
b. Start with win2K CD.start recovery console, run FIXMBR
c ......
d. Start with win2K CD. Start recovery console. Copy appropriate
parameter
ANS: D
From Technet:
Recreating Boot.ini Using the Recovery Console
You can use the Emergency Repair Process to replace a missing or
corrupted Boot.ini file. Alternatively, you can use the map command
to determine the location of the disks. With this information, you
can create a Boot.ini file on another computer, and then use a
floppy disk to transfer the Boot.ini file to the original computer.
Fixboot Writes a new boot sector onto the system partition
Fixmbr Repairs the master boot code of the boot partition
48. After you installed a application on a Win2K server and
rebooted it, you get a error” Invalid boot.ini file” What to do ?
A. Boot from Windows 2000 CD and select repair in o Recovery
Console and use COPY command.
B. ?
C. ?
D. ?
My answer : A
49. You install a new EIDE DVD, after the installation the
computer stops with an error IRQ_NOT_EQUAL. What should you do to
resolv the problem?
a) Start with recovery console (or ERD disk). Copy the driver in
the directory c:winntsystem32
b) Start the computer with the last know good configuration,
uninstall the driver and schedulle the installation for the
next maintenance period.
c) Start the computer in safe mode, uninstall the driver and
schedulle the installation for the next maintenance period.
d) Connect the DVD in another EIDE bus.
ANS: D
50. You are having problems starting one of your Windows 2000
domain
controllers, so you want to start the system using the Advanced
Startup
options. Which two options will be unavailable when you choose
Advanced
Startup Options? (Choose two)
A. Safe Mode
B. Debugging Mode
C. Safe Mode with Networking
D. Last Known Good Configuration.
E. Safe Mode with Command Prompt .
ANS: A, E Reason: Server is DC, so can not use safe mode and safe
mode with command prompt.
SERVICE ACCOUNT
51. Some Application on your company network uses defined domain
user accounts as their service accounts. Each computer that runs one
of these apps should have the respective service account in the
local Administrators Group.
Currently, you individually place these service accounts in the
local Administrators group on the appropiate Win2000 professional
computers. You need to centralize this process. What should you do?
a) Add the applications service accounts to the Domain
Administrator group.
b) Add the applications service accounts to the local
administrator group. Use the restricted Groups option in each
computers local Group Policy.
c) Add the applications service accounts to the local
administrator group using the restricted Groups option in an OU
Group policy.
d) Add the applications service accounts to the local
administrator group. Use the restricted Groups option in a domain
Group Policy.
ANS: D
Because the question said "place these service accounts in the
local Administrators group on the appropiate Win2000 professional
computers",so a) is uncorrect. "You need to centralize this
process",so b) is wrong. The question doesn't talk about OU, so I
won't select c). d) is correct.
USER ACCOUNTS
52. You are administrator of 20 Windows 2000 professional
Computer and 2 Windows 2000 Server Computer for your domain. You
want to set an account policy that locks any user’s account after 3
consecutive failed logon attempts. You also want to ensure that only
administrator will be able to unlock the account. Which two actions
should you take? (Choose two)
A) Set the account lockout duration to 0
B) Set the account lockout duration to 3
C) Set the account lockout threshold to 0
D) Set the account lockout threshold to 3
E) Set the reset account lockout after to 0
F) Set the reset account lockout after to 3
Answer: A & D
Reason: The Account Lockout threshold allows you to define the
number of incorrect password attempts that will cause the account to
be unavailable to the user. This number can be set from 0 to 999,
where 0 represents an infinite number of attempts. The higher the
security you want in your organization, the smaller this number
should be(greater than 0 of course).
Account lockout duration allows you to define the length of time
an account will remain locked before it is released. This number can
be set from 0 to 99999minutes, where 0 represents an infinite time,
which would require an administrator to manually unlock the account.
TERMINAL SERVICES
53. You are the admin of Win NT4.0 Terminal Server Edition
computer. The server has one hard disk, which is divided into two
partitions. The first partition contains the Win NT4.0 system files
and is formatted as FAT. The second partition contains application
data and user data. This second partition is formatted as NTFS. The
server currently has SP3 installed. You need to upgrade the server
to Win2000 server. You want to ensure that no application data or
user data is lost during the upgrade. You also want to perform the
minimum number of steps necessary to complete the upgrade.
What should you do? (choose all that apply)
A. Convert the system partition to NTFS.
B. Install SP4 or later on the server.
C. Use a Win2000 server CD to start the server. In Setup, select
the option to Upgrade.
D. Replace the Terminal Server installation with a standard WinNT
server 4.0 installation.
ANS: A, B
Resonse: The upgrade from NT4.0 Terminal Server Edition is
automatic so, I don't think D pertains. The easiest way to upgrade
to WIN2000 is to insert the WIN2000 CD into the CD-ROM and keyin
Winnt32.exe or Autorun. That means C would not be the correct
answer, as you would not be booting from the CD but running it from
within NT. B would would definitely have to happen due to the
conversion of the different NTFS versions. I don't think you would
have to convert the system partition to NTFS for the upgrade but, it
would make the transition smoother. So I say it should be A & B.
54. Your company network consists of a Windows 2000 domain and
300 Windows 2000 professional computers. A member server named
APPLIC1 has Terminal server installed in Remote Admin mode. You need
to make Terminal Server on APPLIC1 available on all client
computers. Which two actions should you take? (choose two)
A. Install Terminal Server licensing on APPLIC1.
B. Install Windows 2000 Advanced server On APPLIC1.
C. Install Terminal Server licensing On a domain controller.
D. Install Terminal Server licensing On each client computers.
E. Remove Terminal Server from APPLIC1.
F. Reconfigure Terminal server to operate in application server
mode.
Answer: C, F
55. You are the administrator for a small company and have
decided to use Terminal Services to provide access to certain
applications for the clients. You currently have the following
client operating systems on your network:
-30 computers running Windows 2000 Professional
-25 computers running Windows NT 4.0 Workstation
-15 computers running Windows 98
-30 computers running Windows 95
-10 computers running Windows for Workgroups
You install Terminal Services in Application Server mode on a
computer running Windows 2000 Server. However, there are two things
that you are unsure of. First, can Windows 2000 Terminal Services
support all of the client operating systems listed above without the
use of any third-party software (such as Citrix Metaframe)? Second,
how many Terminal Services Client Access Licenses will you need for
the client operating systems that are supported?
A. Yes, Windows 2000 Terminal Services will support all of the
client operating systems listed above. You will need 110 Terminal
Services Client Access Licenses.
B. Yes, Windows 2000 Terminal Services will support all of the
client operating systems listed above. You will need 80 Terminal
Services Client Access Licenses.
C. No, Windows 2000 Terminal Services will not support all of the
client operating systems listed above without the use of third-party
software. You will need 100 Terminal Services Client Access Licenses
for the supported client operating systems.
D. No, Windows 2000 Terminal Services will not support all of the
client operating systems listed above without the use of third-party
software. You will need 70 Terminal Services Client Access Licenses
for the supported client operating systems.
E. No, Windows 2000 Terminal Services will not support all of the
client operating systems listed above without the use of third-party
software. You will need 55 Terminal Services Client Access Licenses
for the supported client operating systems.
ANS: A
Other clients (such as Macintosh clients) require the use of
third-party software such as Citrix Metaframe. Windows 2000
Professional clients do not require a Terminal Services Client
Access License. All of the other client operating systems listed in
the scenario above will require a Terminal Services CAL.
I don't know why win2kpro don't need cal to access Terminal, as i
know, all the clinet must have cal to access terminal, So, I think
the ans is A.
LOGGING
56. You are administrator. You enable security auditing. A week
later, the server stops response. You logon and see error ”Auditing
failed”. You want to continue the auditing and do not want this
error happens again . What to do ?
A. Set “Autocrach” Key to 0
B. Increase the logfile size in EventViewer.
C. Save the logfile and clear the Eventviwer every morning.
D. ?
ANS: B
From Server Help:
If the registry was previously configured with CrashOnAuditFail =
1 and the security log becomes full, Windows 2000 will stop
responding and will display the message "Audit Failed" If that
happened, use the procedure above. So if Autocrach means
CrashOnAuditFail the correct answer should be A
NICs
57. You are administrator of a Windows 2000 Server computer. The
Server contains one n/w (network) adapter and is a file and print
server for critical company resources. You install a second n/w
adapter in the server and connect it to the same n/w subnet as the
first adapter. You want to ensure that first adapter is used for all
n/w that the second adapter is used only if the first adapter fails
or is disconnected from the n/w. You also want to ensure that the
server always has n/w connectivity even if one n/w adapter fails.
What should you do?
A) Set the second adapter’s status disabled
B) Configure the first adapter to use TCP/IP metric of 100
C) Configure the second adapter to use TCP/IP metric of 25
D) Configure the binding order on the second adapter to bind
TCP/IP last
ANS: C (I had this on the exam; scored 1000)
Explanation:
http://support.microsoft.com/support/kb/articles/Q258/4/87.ASP
MISCELLANEOUS
58. What is the purpose of the Ntdis.dit file?
a) Contains the SAM
b) Contains the Active Directory Store
c) A log file created when installing Active Directory services
d) Contains locale user profiles
e) A management utility for Active Directory
ANS: B? (ntds.dit is the Active Directory file)
59. You administrate a server named server1 in you network. You
perform the fully backup daily . One day your domain administrator
change the Server name Server1 to SSU43 according to Company new
criterion. After several days you find an application failure due to
the name change. You restore the server use your daily backup data.
You restart the computer and find you can not logon.what should you
do to resolve ?
A.Restart the computer and logon with your adminstrator name and
password.
B..Restart the computer and logon with your domain adminstrator
name and password.
C.?
D?
E?
ANS: B
60. You create and share a folder on a computer running Windows
2000 Server. The folder will be used to store documents that define
corporate standards. Most employees use these files frequently. You
set the shared folder permissions to allow Read access for
Authenticated Users. You set the read-only attribute of each file in
this folder. How should you configure the offline folder setting for
this shared folder to minimize network traffic?
A. Clear the setting Allow Caching of files in this shared folder
B. Manual Caching for Documents
C. Automatic Caching for Programs
D. Automatic Caching for Documents
Answer: C
Reason: "You set the read-only attribute of each file in this
folder."
See MS Press Book about offline file.
61. You have Apple computers on your network that can’t connect
to your w2k servers. What can you do?
ANS: SAP (I had this on exam; scored 1000)
62. Your network is configured with the NWLink protocol only. You
have NetWare servers and windows clients. You add a w2k server and
configure NWLink. You copy the Netware files to the w2k server, and
then share them. You verify that the clients can connect to the new
shares. You then remove the NetWare servers, and now the clients
can’t connect to the shares. What can you do?
A. On the w2k server, change the frame type to 802.5
B. On the clients, configure TCP/IP
C. On the w2k server, add it to the network 18283838.
D. On the w2k server, add NWLink.
E. On the w2k server, add GSNW.
ANS: E (I had this on the exam; scored 1000)
Extraordinary
Important Review Problem Special Extraordinary
56. Your Windows 2000 Server network has two single domains named
Corp and Finance. The company president logs onto the Corp domain as
Susan. The two vice-presidents and Susan are members of the Corp
Managers global group in the Corp domain. Susan requires read
permission for the salary directory in the Finance domain. The
Account Managers local group in the Finance domain has change
permission for the salary directory. No one else should have access
to the salary directory. How should you plan you network to allow
required access?
A. Configure the Finance domain to trust the Corp. domain. Make
Susan a member of the Account Managers Group.
B. Configure the Corp. domain to trust the Finance domain. Create
a local group named account read in the Finance domain and assign it
read permission for the salary directory. Make Susan a member of the
account read group.
C. Configure the Finance domain to trust the Corp. domain. Create
a local group named execs in the Finance domain and assign it read
permission for the salary directory. Make Susan a member of the exec
group.
Answer. C
57. A computer named Station01 belongs to a domain called Sales.
Jason wants to add another Windows NT computer named Station02 to
the Sales domain. Jason disconnects Station01 from the network, and
renames Station02 to Station01. However, the computer cannot
participate in domain administration of the Sales domain. What is
the most likely cause of the problem?
A. The Sales domain already has the maximum number of computer
connected accounts.
B. There is another computer named Station0l in a trusted domain.
C. There is another computer named Station0l in a trusting
domain.
D. Simply renaming the computer does not make the computer join
the Sales domain.
Answer. D
70. You want to configure a directory service architecture so
that the administrator in each business unit can manage only the
user account and resource permission for that unit. You do not want
to allow administration of one business unit to have administrative
rights in another business unit. You want to allow an administrator
from one business unit to permit a user from a different business
unit to have access to local resources. Which directory service
should you choose?
A. Single domain model
B. Single master domain model
C. Multiple master domain model
D. Complete trust domain model
Answer. C
71. Your company is in a single location . You have six 2000
Servers and 200 users. Your company wants to centralize management
and wants users to be able to access resources from other
departments. Which of the following options is the best solution?
A. Create a single domain and install one Server as a PDC and
another Server as a BDC. Then set-up the remaining servers as part
of the domain.
B. Use the master domain model. In the master domain install one
server as PDC and another server as a BDC. Put each department in
its own resource domain and install their departme2000 Server as PDC
C. Create a single domain that has a PDC and a BDC, and install
the departmental servers as member servers in their own Workgroup
Answer. A
72. You log on from a computer in the MKTG domain to one in the
CORP domain. The MKTG domain trusts the Corp Domain. Which resources
can you access?
A. in MKTG, MKTG/DOMUSERS access
B. in CORP, CORP/DOMUSERS access
C. in CORP, CORP/DOMGUESTS access
D. in CORP, MKTG/DOMGUESTS access
Answer. A
73. You log on from a computer in the MKTG single domain to one
in the CORP domain. The MKTG domain trusts the Corp Domain. Which
resources can you access?
A. in MKTG, MKTG/DOMUSERS access
B. in CORP, CORP/DOMUSERS access
C. in CORP, CORP/DOMGUESTS access
D. in CORP, MKTG/DOMGUESTS access
Answer. D
74. You log on from a computer in the MKTG single master domain
to one in the CORP domain. The MKTG domain trusts the Corp Domain.
Which resources can you access?
A. in MKTG, MKTG/DOMUSERS access
B. in CORP, CORP/DOMUSERS access
C. in CORP, CORP/DOMGUESTS access
D. in CORP, MKTG/DOMGUESTS access
Answer. B
75. Your Windows 2000 Server computer has two domains, Marketing
and Tech. The Marketing domain trusts the Tech domain. You move the
Post script printer from the Marketing domain to the Tech domain.
The marketing/post users local group requires access to the printer.
You create a Tech/post users local group to access the printer. How
should you set up the printer to allow the original marketing
group/post users group to access the post script printer? (choose
all which apply.)
A. Create a one way trust in which Tech trusts Marketing.
B. Create a one way trust in which Marketing trusts Tech.
C. Create a new Global group mktg/postuser and assign it to the
Local Group Tech/postusers.
Answer. A,C
76. Maria is a user in the Test domain. You want to provide her
with access to and change permission for a shared directory on a
Server in the Product domain. The guest account is disabled in both
domains. How should you provide access for Maria?
A. Establish a trust relationship so that the Test domain trusts
the Product domain. Create a local group in the Product domain that
has change permission for the directory. Make Maria a member of this
group.
B. Establish a trust relationship so that the Test domain trusts
the Product domain. Create a global group in the Product domain that
has change permission for the directory. Make Maria a member of this
group
C. Establish a trust relationship so that the Product domain
trusts the Test domain. Create a local group in the Product domain
that has change permission for the directory. Make Maria a member of
this group.
D. Establish a trust relationship so that the Product domain
trusts the Test domain. Create a global group in the Product domain
that has change permission for the directory. Make Maria a member of
this group.
Answer. C
77. A user named Michael needs access to files on a shared
directory on a Windows 2000 Server computer in the Sales domain.
Michael's computer is in the Finance domain and is a member of the
Managers Global group. The Sales domain trusts the Finance domain.
The guest account is disabled in both domains. What should you do to
enable Michael and all of the members of the manager's group to
access the files?
A. Create a global group named Sales Rep in the Sales domain with
access permissions for the directory and its files. Make Michael a
member of the sales Rep group.
B. Create a global group named Sales Rep in the Sales domain with
access permissions for the directory and its files. Make managers a
member of the sales Rep group
C. Create a local group names Sales Rep in the Sales domain with
access permissions for the directory and its files. Make Michael a
member of the sales Rep group.
D. Create a local group named Sales Rep in the Sales domain with
access permissions for the directory and its files. Make managers a
member of the sales Rep group.
Answer. D
78. Tracy logs onto Corporate domain from a Windows NT
workstation computer in the Marketing domain. The Marketing domain
trusts the Corporate domain. Which resources can she access?
A. Resources in the Marketing domain to which users in the
marketing domain have access.
B. Resources in the Corporate domain to which users in the
corporate domain have access.
C. Resources in the Corporate domain to which guests in the
corporate domain have access.
D. Resources in the Corporate domain to which the marketing
domain guest group have access.
Answer. B
79. You want to design a network with centralized account
administration for 500 users. You want department administrators to
have control of resources, but not of user accounts. Which directory
services architecture should you use?
A. Single domain
B. Single Master domain
C. Multiple Master domain
D. Complete Trust
Answer. B
80. Your network has three domains names Sales, Marketing and
Admin. User accounts are divided up into the three domains. All
users need access to specific files on a Windows 2000 Server
computer in the Sales domain. How should you configure the trust
relationships.
A. Establish two one-way trust relationships in which Marketing
trusts Sales and Admin trusts Sales.
B. Establish two one-way trust relationships in which Marketing
trusts Sales and Admin trusts Marketing.
C. Establish two one-way trust relationships in which Marketing
trusts Admin and Sales trusts Admin.
D. Establish two one way trust relationship in which Sales trusts
Marketing and Sales trust Admin.
Answer. D
81. Your network consists of three domains . The Corp domain
contains all user accounts. The East and West domain trust the Corp
domain. All users use Windows NT workstation computers. You want to
configure the network so that any user installing a new Windows NT
workstation computer can join any domain without any configuration
needed from an administrator. How should you do this?
A. Modify the user rights in all 3 domains so that the
Corp/Domain users global group can add computers to any of the
domains.
B. Modify the user rights in all 3 domains so that the
Corp/Domain users local group in each domain can add computers in
any of the domains.
C. Modify the user rights in the Corp domain so that the users
local group can add computers to the CORP domain.
D. Modify the user rights in the Corp domain so that the domain
users global group from each domain can add computers to the CORP
domain.
Answer. A
82. Your windows 2000 Server and network consists of two domains.
The Sales domain trusts the Corp domain. All user accounts are
contained in the Corp domain only. You want to allow users to backup
home directories that are on an NTFS partition on a member Server in
the Sales domain. How can you do this?
A. Create a local group named all backup in Sales. Add the user
account from Corp to all backup. On the member server add the all
backup group to the backup operators group.
B. Create a local group named all backup in Corp. Add the user
account from Corp to all backup. On the member server add the all
backup group to the backup operators group
C. Create a global group named all backup in Corp. Add the user
account from Corp to all backup. On the member server add the all
backup group to the backup operators group
D. Create a local group named all backup on a member server in
Sales. Add the user account from Corp to all backup. On the member
server add the all backup group to the backup operators group.
Answer. C
83. Susan is an administrator of a windows NT workstation
computer. Susan wants her computer to join with the domain. She does
not have a domain account. Which method can be used to join Susan
computer to a domain. (Choose two.)
A. The domain administrator can add Susan's computer to the
domain. Then Susan can join the domain by using the network option
from the control panel in her computer
B. Susan can join the domain by using the server manager from her
computer, supplying her workstation administrator account and
password.
C. Susan can join the domain by using the network option in the
control panel. From her computer, supply her workstation
administrator account and password
D. The domain administrator can use network option in the control
panel. From Susan's computer supply the domain administrator's
account and password.
E. The domain administrator can use the network option in the
control panel from the PDC.
Answer. A,D
84. You are the administrator of a multiple domain Windows 2000
Server network. The domains are named Sales and Support. There is
currently no trust relationship between the domains. You want to
allow Mary, a user in the Sales domain to print to a laser jet
shared printer connected to a Server in the Support domain. You
create a group, assign rights as shown in the network configuration
exhibit. What changes must you make in the printer permissions
dialog box to make Mary to be able to print to the laser jet?
(choose 2)
A. Configure the Sales domain to trust the Support domain.
B. Configure the Support domain to trust the Sales domain.
C. Place the support/sup laser local group in the sales/laser jet
global group.
D. Place the sales/laser jet global group in the support/sup
laser local group.
Answer. B,D
85. You want to allow a user that logs on from NT workstation
that is not a member of any domain to access resources on Servers in
the Sales domain. How can you accomplish this? (Choose two.)
A. Enable the guest account in the Sales domain.
B. Create a duplicate user account in Sales domain for each NT
workstation user account that requires access to resources in the
Sales domain.
C. Make user accounts on the NT workstation computer members of
the appropriate group in the Sales domain.
D. Create a duplicate group account for each group on the Windows
NT workstation computer.
Answer. A,B
86. Your organization has 5 domains. Each domain user in your
domain organization has a single account that resides in his home
domain. Password security is strictly enforced. The Sales domain in
your organization trusts Corp domain. Mary, a domain user in Sales
domain, logs on to the Corp domain. What folders will she be able to
view?
A. All folders in the Corp domain for which the Corp/Domain users
global group has been granted Read access.
B. All folders in the Corp domain for which the Sales/Domain
users global group has been granted Read access.
C. All folders in the Corp domain for which the Corp/Domain
guests global group has been granted Read access.
D. All folders in the Corp domain for which the Sales/Domain
guests global group has been granted Read access. E. All folders in
either the Corp or the Sales domain for which the Sales/Domain
guests global group granted Read access.
Answer. C
87. Your company has two domains, CORP and EAST. CORP trusts
EAST. Your user account exists in the CORP domain, and you log on to
the CORP domain from a machine that is a member of the EAST domain.
To what resources do you have access?
A. Resources in CORP for which CORPDomain Users have been granted
access
B. Resources in EAST for which EASTDomain Users have been granted
access
C. Resources in EAST for which EASTDomain Guests have been
granted access
D. Resources in EAST for which CORPDOmain guests have been
granted access
Answer. A
88. Your company use a single Master domain model with 5 domains.
Each domain is in a different city as shown on the following
diagram. New York - Master domain with sub-domains in Chicago,
Dallas, Houston and Boston. Each domain has a 56 kbps link to and
from the master domain. Users often experience delays in login on
from computers that are located in a resource domain because of
congestion on the 56 kbps frame relay link. What should you do to
speed up the log on time for remote users?
A. Add BDCs at the Master domain location.
B. Reduce the value of the replication governor registry entry on
the BDCs
C. Place a BDC from the Master domain at each resource domain
location.
D. Modify the setting so that each client computer logs on to the
local domain. Synchronize the directory databases from the master
domain to each local resource domain.
Answer. C
89. University of 75,000 users located in multiple building in a
campus. You want to have centralised control of all accounts. Also
you want to allow each department to manage its own user access to
information. Which directory service architecture will you use?
A. Single domain
B. Single master domain
C. Multiple master domain
D. Complete trust
Answer. C
90. During regular business hours the PDC for your domain goes
down and you promote one of your two backup domain controllers to
the role of PDC. One of your users comes to you saying that some of
the resources he has recently been given access to are now
restricted to him. Why? Choose the best answer:
A. Backup domain controllers contain limited account information
and therefore won't allow access to any resources not located on the
local machine.
B. He must log off and log on again in order for his account to
correct itself.
C. The accounts database from the PDC must be restored from
backup to the BDC.
D. The changes that were made to this users account were not yet
replicated when the PDC went down.
Answer. D
91. You have 3 domains: ACCT, SALES and RESEARCH. You have to
manage the trusts between these domains. The requirements are the
following: users on the ACCT domain needs access to resources on the
ACCT domain, users on the ACCT domain need access to resources on
the SALES and RESEARCH domain, users on the SALES and RESEARCH
domain need access to each others resources What is the most
efficient way to make the trust relationships:
A. Let ACCT trust SALES and RESEARCH, make a full trust between
SALES and RESEARCH
B. Let SALES and RESEARCH trust ACCT, make a full trust between
SALES and RESEARCH
C. Let ACCT be on it's own, make a full trust between the SALES
and RESEARCH domain
D. Implement a full trust
Answer. B
92. You are installing Windows 2000 Server 2000 on a machine. You
want the machine to be able to provide file and print resources to
members in a domain called Corp, but you do not want it to
authenticate user logons. How would you configure the computer?
A. As the PDC in the Corp domain
B. As a BDC in the Corp domain
C. As a member server in the Corp domain
D. As a member server in a workgroup
Answer. C
93. Your organization is using a single domain split between two
cities: Nashville and Memphis. Communication between the cities is
facilitated by a WAN link. The PDC of the domain resides in
Nashville. Users in Memphis are complaining that their logon process
is along. What action should you perform to speed up logon
authentication for the Memphis office?
A. Increase the value of the Pulse setting in the registry on the
PDC in Nashville
B. Increase the value of the PulseConcurrency setting in the
registry on the PDC in Nashville
C. Increase the value of the PulseMaximum setting in the registry
on the PDC in Nashville
D. Add an additional BDC to the network in Memphis
Answer. D
94. A domain must contain two computers running 2000 Server - one
configured as a primary domain controller and the other as a backup
domain controller.
A. True
B. False
Answer. B
95. You are installing a network that has four Windows 2000
Server computers and 60 Windows NT workstation computers. Users in
your company's three departments require access to all of the
resources on all of the servers. You must centralize user accounts
and management administration. How should you configure your windows
NT directory services?
A. As a single workgroup with one server handling all user login
attempts
B. As a single domain with a PDC
C. As a single domain with complete trust relationships
D. As a Master domain with three resource domains
Answer. B
96. There are three domains in your company: Corp, Tech and
Sales. The Corp domain is the master domain in a single master
domain model. What is the easiest way to grant the right to back up
any member server in any of the three domains to all users in all
domains?
A. Modify the user rights of the CorpDomain Users group in the
Corp domain to include the right to back up files and directories.
B. Modify the user rights of the CorpDomain Users group in all
three domains to include the right to back up files and directories
on each domain's PDC or BDC.
C. Add the CorpDomain Users group to the Backup Operators group
on every member server in all three domains.
D. Create a local group called BkupCorp, BkupTech or BkupSales on
all member servers in the Corp, Tech and Sales domains respectively.
Include the Domain Users group from each of the three domains into
each of these local groups. On every member server in each domain,
grant the user right to back up files and directories for each
domain's respective local group.
E. Create two two-way trust relationships between the Corp domain
and the other domains. Create a local group called BkupCorp,
BkupTech or BkupSales on all member servers in the Corp, Tech and
Sales domains respectively. Include the Domain Users group from each
of the three domains into each of these local groups. On every
member server in each domain, grant the user right to back up files
and directories for each domain 'e respective local group.
Answer. C
97. In the multiple master domain model, there are at least two
master domains.
Which of the following best states the trust relationships
required in a multiple master domain model?
A. Every master domain is connected to every resource domain with
a two-way trust.
B. Every master domain is connected to all other master domains
by two-way trusts, and every resource domain trusts all master
domains with one-way trusts.
C. Every master domain trusts all resource domains with one-way
trusts, and every resource domain is connected to all other resource
domains by two-way trusts.
D. Every master domain is connected to all other master domains
by two-way trusts, and every resource domain is connected to all
other resource domains by two-way trusts.
Answer. B
98. The recommended Windows NT domain database size is 40 MB.
Performance is likely to suffer if the domain database grows beyond
this limit. Your company plans to have 50,000 user accounts, 40,000
computer accounts and 500 group accounts on the company-wide
network. What is the minimum required number of domain databases?
A. Two
B. Three
C. Four
D. Five
E. One
Answer. A
99. What is an advantage of using a single master domain model
over a single domain model?
A. centralized account administration
B. support for over 2,000 users
C. decentralized resource management
D. a central user account database
Answer. C
100. (Similar Question seen 5 times, last seen on 9/3/2001 You
have used the option of making a system memory dump. How do you
extract information from the memory dump file?
A. Debug.exe
B. Dumpcheck.exe
C. windbg.exe
D. Dumpexam.exe
Answer. A
101. A STOP error occurs every time you start your windows 2000
Server computer. You find that no dump file exists on the disk. What
must you do to enable creation of a dump file ?
A. Create a new pagefile.sys in system root.
B. Create a new pagefile.sys on the root of drive C.
C. Add /sos to the operating system path in boot.ini.
D. Add /crashdebug to the operating system in boot.ini.
Answer. A
102. Your Windows 2000 Server is configured with 6 SCSI hard
disks. One hard disk is the System disk and the other five are
configured as a Stripe Set. After a power outage one of the hard
disk in the Stripe Set fails. How can you replace the hard drive and
recover from the Power outage?
A. Use disk administrator to regenerate the data on the new
drive.
B. Recreate with Stripe Set across the five disks and restore
from backup.
C. Copy the lost data from the tape backup to the new drives.
D. Start the Emergency Repair Process.
Answer. B
103. You have just installed a new SCSI controller driver in
Windows NT, but now you cannot got the system to boot properly. No
other change has been made to the computer. What is the easiest way
to troubleshoot this problem so that the system can boot properly?
A. Boot Windows NT from the Emergency Repair Disk
B. Boot to DOS and run Dumpexam.exe from the command prompt
C. Invoke the Last Known Good configuration when prompted
D. Run the emergency repair process to restore the registry
Answer. C
104. You are installing Windows 2000 Server on a new computer.
The manufacturer has provided a customized hardware abstraction
layer (HAL) to use with the computer. The HAL is on the floppy disk.
You want to install the customized HAL design for the computer what
should you do?
A. During the hardware confimation portion of the Windows 2000
setup install the customized HAL.
B. After installing Windows 2000 server,use the recovery console
to copy the customized HAL to the system32 folder on the boot
partition.
C. After the installing windows 2000 setup, use the emergency
repair process to install the customized HAL.
D. After installing Windows 2000 server, use the device manager
to scan for Hardware changes. When prompted, install the customized
HAL.
Answer. A
105. You are the administrator of a Windows 2000 Server computer.
The server contains a RAID-5 array that is configured as a volume D
and an 18-GB hard disk that is configured as volume C. Volume D is
formatted as NTFS, contains 60GB of data, and has 2GB of free disk
space. Volume C is formatted as FAT32 and has 16GB of free disk
space. The server is used to store user home folders. Most of the
data in the home folders has been encrypted with the encrypted with
the encrypted file system. You estimate that the sever will need an
additional 10-GB disk space to meet user needs. However, you will
not be able to purchase additional hard disks for three months. You
want to immediately free at least 10-GB of the disk space. You do
not want to compromise the security of the user’s files. What should
you do?
A. Instruct the users to move at least 10-GB of data to another
file server that has EFS.
B. Create additional shared folders on volume
C. Move 10-GB of data to the new, shared folders.
D. Copy at least 10-GB of data to a writeable CD-ROM. Delete
these files from the server.
E. Enable the compression attribute for the volume, and compress
the users’ home folders. Ensure that EFS remains enabled on the home
folders
Answer. A
106. Your are experiencing system errors on your Windows 2000
Server computer. Microsoft enterprise technical support has
requested a dump of system memory to a file. You have configured a
system paging file on your boot partition that is larger than the
total amount of system RAM. How should you configure the Windows
2000 Server computer to generate the required dump file?
A. Configure the eventlog service to start automatically
B. Configure Dr. Watson for Win NT to create a crash dump file
C. Configure system recovery to write an event to the system log
D. Configure system recovery to write debugging information to
%system root%memory dump
Answer. D
Add
a Microsoft 70-215 dump
CertYourself.com -Free
Practice Exams, Free Study Guides For MCSE, CCNA, A+, MCSD, N+ and
much much more SmartCertify.com
- Take FREE IT Courses and Register to WIN a Dell PC! Click Here!
|