Site hosted by Angelfire.com: Build your free website today!
Home Master Dumps Top Dumps New Dumps Forum Practice Exams Log In


      70-210 (950)
      70-214 (55)
      70-215 (1016)
      70-216 (1296)
      70-217 (651)
      70-218 (607)
      70-219 (526)
      70-220 (328)
      70-221 (333)
      70-222 (89)
      70-223 (53)
      70-224 (352)
      70-225 (36)
      70-226 (17)
      70-227 (111)
      70-228 (364)
      70-229 (400)
      70-230 (7)
      70-232 (4)
      70-234 (7)
      70-244 (61)
      70-270 (258)
      70-300 (212)
      70-305 (266)
      70-306 (193)
      70-310 (104)
      70-315 (75)
      70-316 (99)
      70-320 (51)
      070-210_Demo (4)
      70-015 (48)
      70-016 (29)
      70-019 (31)
      70-028 (80)
      70-029 (63)
      70-057 (2)
      70-080 (32)
      70-081 (58)
      70-085 (1)
      70-086 (33)
      70-088 (53)
      70-091 (1)
      70-098 (1)
      70-100 (98)
      70-152 (59)
      70-155 (1)
      70-156 (1)
      70-175 (105)
      70-176 (102)
Checkpoint
      156-210 (54)
      156-310 (14)
Cisco
      350-001 (5)
      640-025 (7)
      640-441 (22)
      640-604 (6)
      640-605 (4)
      640-606 (7)
      640-607 (97)
      640-861 (2)
      640-901 (21)
      9E0-423 (1)
      9E0-805 (1)
Citrix
       1Y0-218 (2)
      1Y0-118 (1)
      1Y0-218 (2)
      1Y0-220 (117)
      1Y0-911 (4)
      1Y0-930 (1)
      1Y0-951 (1)
      1Y0-961 (3)
CIW
      1D0-410 (24)
      1D0-420 (5)
      1D0-425 (4)
      1D0-450 (1)
      1D0-460 (1)
      1D0-470 (8)
      1D0-532 (1)
Compaq
      010-077 (3)
      010-407 (2)
      010-695 (3)
      010-724 (6)
Comptia
      220-221 (73)
      220-222 (32)
      CDIA+ (1)
      EK0-001 (1)
      IK0-002 (14)
      N10-002 (32)
      PK0-001 (1)
      SK0-001 (10)
      SY0-101 (11)
      TK0-001 (2)
      XK0-001 (5)
CWNA
      pwo-100 (8)
IBM
      AIX 5L (8)
      DB2 512 (2)
      DB2 513 (2)
ISC
Lotus
      190-520 (19)
LPI
      117-101 (2)
      117-102 (1)
      117-201 (7)
      117-202 (7)
Novell
      50-632 (7)
      50-634 (7)
      50-639 (57)
      50-640 (11)
      50-644 (5)
      50-653 (33)
      50-653 (33)
      50-654 (5)
      50-658 (1)
      50-659 (2)
Oracle
      1Z0-001 (40)
      1Z0-007 (52)
      1Z0-023 (13)
      1Z0-024 (8)
      1Z0-025 (8)
      1Z0-026 (5)
      1Z0-030 (7)
      1Z0-031 (36)
      1z0-032 (28)
      1z0-033 (39)
      1Z0-101 (6)
      1z0-131 (3)
      1z0-132 (5)
Sun
      310-011 (35)
      310-012 (17)
      310-014 (4)
      310-015 (4)
      310-025 (12)
      310-043 (6)
      310-044 (3)

Visit our MCSE BrainDumps FORUM! Top experts answering YOUR questions!

Daily updates!
View the latest NEW DUMPS all collected in one place!

Microsoft 70-215: 1000 out of 1000 from this

return to Microsoft 70-215 dump page

Microsoft 70-215 MASTER DUMP! - The only dump you will ever need!

What is a Master Dump? A comprehensive dump of questions with answers you VOTE on and explanations YOU submit! We just edit. It's all here. Check it out!


TestKing - We have the Questions you will see in your Exams
Real-exams.com - Real-Questions , Real Answers

actual-exams.com - Pass Certification Exams - First Try Guaranteed
Exactquestions.com - Get the Exact Questions and Answers



Title Size File Rating Date
1000 out of 1000 from this  441 Kb txt 10/10 (8 votes) Jul. 7, 2003

Paas with 1000 marks and all questions are included in this pool.


Passed with full marks.Thanks to smartcert .net for guiding me. This is the best ever and u can get 1000 out of 1000 from it.

1. You are the administrator of home.office.local.com domain. You want to create a shared printer for the company's executives so that they do not have to wait for their documents to print when default printer's queue contains a large number of documents. You configure a new high priority printer and want to set permissions on groups shown in the exhibit. The groups were:

Administrator Creator Owner Everyone Executives Print Operators Server Operators

You select the checkbox to allow Print permissions for Executives group. You want only Administrators, Print Operators, and Server Operators & Executives to be able to print. What should you do? (Select all that apply)

A. Remove the Everyone group. B. Select checkbox to Deny Print permission to Everyone C. Select checkbox to Deny Manage Documents. D. Select all Deny for the Everyone group E. Clear all allow checkboxes for the Everyone group

Answer: A, E

2. You are administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of your company client computer are connected to this server. A shared folder named DATA on server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.

TYPE OF PERMISSION ACCOUNT PERMISSION

DATA Share Permissions Users: Change DATA NTFS Permissions Users: Full Control

You discover that users are connected to the DATA folder. You have an immediate need to prevent 10 of the files in the DATA folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server. What TWO actions should you take?

A. Modify the NTFS permissions for the ten files. B. Modify the NTFS permissions for the DATA folder. C. Modify the shared permissions for the DATA folder. D. Log off the users from the network. E. Disconnect all Users from the DATA folder.

Answer: A, E

3. You are the administrator of the blue lines skys airlines. You install intranet and configure new windows 2000 computer named server1.department.blueline.com as an intranet server. The server hosts multiple departmental and???? Web to the n/w and data site. You also configure the finance virtual??? In the department web site as shown in the exhibit. During first morning that the new server is available. Users report that they can only see the information that they see in the browser is the list of HTM and ASP files. For security reasons the first action to take is to disable the users ability to view the files of all web sites in the form of list. What should u do?

A. Clear the directory-browsing check box for the server properties and then apply setting to the child web sites. B. Clear the directory-browsing check box for the ticketing web site and then apply setting to the child virtual directory. C. Clear the directory browsing check box for the departments web sites and then applies the setting for the child virtual directory. D. Clear the directory browsing check box for the financing web site.

Answer: A

4. Your company's network includes Windows 3.1 client computers, Windows 95 client computers and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32 bit application that collects information from the manufacturing processes so that workers on one shift can find out what was manufactured during the previous shift. The company wants to make the application available to all the client computers using terminal services on a Windows 2000 Server computer. The server will not run as a domain controller. You install terminal services. Users want to collect information on manufacturing processes from other shifts. The company wants users to shut down their computers at the end of their shifts and leave the applications running on the terminal server. What should you do?

A. Set the delete temporary folders on exit setting for the terminal server to NO. B. Set the remote desktop protocol on the server to overwrite user settings and set end disconnected setting to NEVER. C. At the terminal server grant the users the right to log on as a batch job. D. Do NOTHING, user programs are always terminated on disconnection.

Answer: B

5 Your Windows 2000 Server computer uses a SCSI adapter that is not included on the current Hardware Compatibility List (HCL). You install an updated driver for the SCSI adapter. When you start the computer, you receive the following STOP error: "INACCESSIBLE_BOOT_DEVICE." Which two procedures can you use to resolve the problem? (Choose two.)

A. Start the computer in safe mode. Reinstall the old driver for the SCSI adapter. B. Start the computer by using a Windows 2000 bootable floppy disk. Reinstall the old driver for the SCSI adapter. C. Start the computer by using the Windows 2000 Server CD-ROM. Perform an emergency repair. Reinstall the old driver for the SCSI adapter. D. Start the computer by using the Recovery Console. Run System File Checker. Restart the computer. Reinstall the old driver for the SCSI adapter. E. Start the computer by using the Recovery Console. Copy the old driver for the SCSI adapter to the system volume as C:\NTbootdd.sys. Restart the computer.

Answer: C,E

6. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible.

What should you do?

A. Restart the computer by using the last known good menu option. B. Perform an emergency repair and select fast repair, restart the computer. C. Restart the computer in the safe mode, remove the driver and restart the computer. D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver.

Ans:D

7. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

A. Add the APP1 and APP2 instances to the processor time counter for the process object. B. Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object. C. Add only the NTVDM instance for the percent processor time counter for the process object. D. Add the NTVDM1 and NTVDM #2 instances for processor time counter for the process object.

Answer: D

8. Every afternoon you run MS-EXCEL locally on Windows 2000 Server computer to update the performance spread sheet. Users report that during this time the server response to the file request appears to be slowed down. What should you do to resolve the problem?

A. Run the start/normal CSRSS command, before you start the EXCEL. B. Run the start/normal EXCEL.EXE command to start excel. C. Use task manager to set the priority for CSRSS.EXE process to above normal. D. Use task manager to set the priority for EXCEL.EXE process to low.

Answer: D

9. You are installing Windows 2000 Server on a new computer. The manufacturer has provided a customized hardware abstraction layer (HAL) to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

A. During the text mode portion of the Windows 2000 setup install the customized HAL. B. After installing Windows 2000 server,use the recovery console to copy the customized HAL to the system32 folder on the boot partition. C. After the installing windows 2000 setup, use the emergency repair process to install the customized HAL. D. After installing Windows 2000 server, use the device manager to scan for Hardware changes. When prompted, install the customized HAL.

Ans: A

10. You are the administrator of Windows 2000 Server network . On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?

A. Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume. B. Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume. C. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command. D. Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility.

Answer: A

11. You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full backups of each domain controller. You run a script to make changes to account information in Active Directory. As a result of errors in the script, the incorrect user accounts are modified. Active Directory replication then replicates the changes to the other two domain controllers. You want to revert Active Directory to the version that was backed up the previous day. What should you do?

A. On a single domain controller, use Windows Backup to restore the System State data. Shut down and restart the computer. B. Shut down and restart a single domain controller in directory services restore mode. Use Windows Backup to restore the System State data. Run the Ntdsutil utility. Restart the computer. C. Shut down and restart a single domain controller by using the Recovery Console. Use Windows Backup to restore the System State data. Exit the Recovery Console. Restart the computer. D. Shut down and restart each domain controller by using the Recovery Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery Console. Restart the computer.

Answer: B

12. You back up all of the system state date for each domain controller and place the date on a single tape.That tape is currently attached to the srv1.west.litware.com computer.To which server or servers can you restore the system state from srv1.west.litware.com(choose all apply)

A.srv1.west.litware.com B.srv2.west.litware.com C.srv3.west.litware.com D.srv4.west.litware.com E.srv5.west.litware.com F.srv6.west.litware.com

Answer: A

13. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first?

A. Replace the third disk and restart the server. Use Disk Management to repair the volume. B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk. C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume. D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition.

Answer: B

14. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

A. Replace Disk 1 and restart the computer. The mirror will automatically regenerate. B. Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1. C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer. D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror.

Answer: B

15. You configure a HP jet direct network printer device on your window 2000 domain srv2 on sales.juttogs.com. This is connected to the TCP/IP port to the print device. However, when you enter IP address of the device, you receive the dialog box in the printer port wizard. See diagram show:

srv2 ip: 10.1.10.35. gateway 10.1.10.100/16 HP printer jet direct Ip: 10.4.20.200/16 Router Ip: 10.5.20.100/16

Another diagram :

A. Select HP Jet Direct from standard drop-down list. B. Select the custom option button, click setting command button and than LPR printer. C. Change IP of the printer device to 10.5.20.200. D. Change subnet mask of the print device to 255.0.0.0 E. Change default gateway on Srv2.sales.jottom.com to 10.5.20.100.

Answer: C

16. Server1(IP1)<------------------------>(IP2)Router(IP3)<----------------------->(IP4) Server3 (IP5) | | | (IP6) Server2

Server1 wants to talk to Server2, Which IP address is default gateway for Server1, Click on the graphic to answer.

A. IP1 B. IP2 C. IP3 D. IP4 E. IP5 F. IP6

Answer: B

17. You install the boot volume D on your Windows 2000 Server computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1. One year later, during routine server maintenance, you open Disk Management and find that the status of volume D is Failed Redundancy. The status of Disk 1 is Online (Errors). A symbol with an exclamation point appears in the graphical view of the disk. You want to return the status of the boot volume to Healthy. What can you do? (Choose two.)

A. Break the mirror, delete the volume on Disk 1, and re-create the mirror. B. Replace Disk 1, copy the data from the boot volume to the new disk, and then use Disk Management to rescan the disks. C. Replace Disk 1, Ensure that the new disk is a basic disk, and repair the volume. D. Reactivate the mirror on Disk 1. E. Convert Disk 1 to a basic disk, and reconvert it to a dynamic disk.

Answer: A,D

18. Trey Research has a Windows 2000 Server computer named User_srv. This computer has a RAID-5 controller. The RAID array is configured as two partitions. Drive C is a 2-GB partition that holds the operating system and paging file. Drive D is a 30-GB partition that will hold the home folders for 200 users. Trey Research employs 10 scientists. The user accounts for scientists are members of a group named Scientists. The scientists use a data capture application that generates files that can be lager than 100 MB. Trey Research wants to use disk quotas. Ordinary users should be allowed to store a maximum of 75 MB of data is their home folder. The storage for users in the Scientists group should not be limited by quotas. What should you do to configure this disk quota scheme? (Choose two.)

A. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit Check box. Set the default quota limit to 75 MB. B. Create a Scientist template account. Create a new quota entry for this account. Select the Do not limit disk usage for this entry option button. C. Create new quota entries for the 10 scientists' user accounts. Select the Do not limit disk usage for this entry option button. D. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit check box. Select the Do not limit disk usage option button for the default quota limit. E. Create a Scientist template account. Create a quota entry for this account. Set the quota limit to 30 GB.

Answer: A, C

19. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?

A. Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone. B. Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone. C. Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone. D. Configure at least two servers with Active Directory integrated primary zones for the domain. E. Configure at least two servers with standard primary zones for the domain.

Answer: D

20. Your network is configured as shown in the exhibit. "Engineering1 and Sales1 have DHCP installed up them." All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Sales1 and Sales2. The engineering department uses another subnet and has servers named Engineering1 and Engineering2. Sales1 and Engineering1 are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Sales1 and Engineering1 to support client computers on each other's subnets. What should you do?

A. Set the router option in the DHCP Scopes to 192.168.2.1 for Engineering1 and 192.168.1.1 for Sales1. B. On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol. C. On Engineering2 and Sales2, install and configure the DHCP Relay Agent service. D. Configure Engineering2 and Sales2 as DHCP servers without any scopes.

Ans:C

21. You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

A. Enable the background refresh settings to use the default group policy refresh date. B. Enable the asynchronous group policy application settings. C. Enable and configure the group policy refresh interval for domain controller. D. Enable and configure the group policy refresh interval for computers.

Answer: D

22. Your network includes windows 98 computers and Windows 2000 Professional computers. You are adding a new computer to the network. You plan to install Windows 2000 Server computer on the new computer. The computer has one 20 GB hard disk with no partition defined. The Windows 2000 Server computer CD ROM is unavailable. You want to install windows 2000 server from the source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition. What should you do?

A. On another windows 2000 computer use makebt32.exe to create installation startup disks. Start the computer by using the first disk. B. On another Windows 2000 computer format a floppy disk. Copy NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by using the disk. C. Start the new computer by using the Windows 98 network boot disk. Connect to the server. Run dsclient.exe. Create and format 20GB FAT32 partition. D. Start the new computer by using the Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to network server. Run winnt.exe. E. Start the computer by using Windows 98 network boot disk. Create and format a single Fat 32 partition. Start the new computer by using the Windows 2000 emergency repair disk.

Answer: D

23. The company has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each employee has a network between 5-20 client computers. The office networks are not connected to any other networks. The company is buying 50 identical computers to run Windows 2000 server in these offices. These servers must be installed to company’s standard configuration. You create a setup information file (SIF) that specifies the company’s data configuration. You want to automate the installation process as much as possible in the least possible amount of time. What should you do?

A. Use the makebt32.exe to create 4 installation setup disks and add the SIF to the first disk. Instruct an employee at each office to start the installation by using these. B. Create MS-DOS boot disk that contain CD ROM driver and the SIF and that runs WinNT /S:D:\I386 command. Instruct an employee at each office to start the installation by using this disk. C. Create a floppy disk that contains only SIF. Instruct an employee at each office to start the installation by using the Windows 2000 server CD-ROM with the floppy disk inserted after startup. D. Create a Windows 2000 folder on the hard disk, copy the Windows 2000 Server CD-ROM to the folder, add the SIF to the folder. Copy the folder to the writable CD. Instruct an employee at each office to start the installation by using this CD.

Ans:C

24. You are the administrator of a network that includes windows nt server 4.0 computers, NT Workstation 4.0 computers and unix computers. The network consists of a single windows NT domain. You are upgrading a windows NT server computer named server1 to windows 2000 server. Server1 is a bdc in the domain. The existing DNS server is a unix computer that supports srv (services) records and is configured to accept dynamic updates. The existing WINS server is another windows NT server computer. You want to configure server1 as a domain controller in a new active directory forest. You want the existing windows NT domain accounts to be upgraded to active directory. You plan to upgrade the other domain controllers in the domain to windows 2000 after the upgrade of server 1 is complete. You want to perform the upgrade of server1 with the least possible impact on other computers on the network.what should you do?

A. Promote server1 to the pdc of the domain. Run windows 2000 setup on server1. B. Run windows 2000 setup on server1. At the end of setup.configure server1 as a dns server and a wins server. C. Add a static mapping for server1 on the WINS server. On the DNS server, create a srv record for the ldap service on server1. Run windows 2000 setup on server1. D. Install the ms dns service on an existing windows nt server. Apply SP 4 or later to the server. Run windows 2000 setup on server1.

Answer: A

25. Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers.

What should you do?

A. Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT. B. Install Microsoft Print Services for Unix on users' Computers. Create a network printer, and specify that the printer name is \\10.1.1.99\GIANT C. Create a network printer on PrintServ, and specify that the printer name is \\10.1.1.99\GIANT. Share this printer and connect to it from users' computers. D. Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers.

Ans:D

26. You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do?

A. Copy the Windows NT 4.0 Printer Drivers to the Netlogon shared folders on all Windows NT Server 4.0 computers still configured as BDCs. B. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folder on the PDC emulator C. Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000. D. Copy the Windows NT 4.0 printer drivers to the Winnt\System32\printers\drivers folder on the Windows 2000 print server.

Ans:C

27. Your company's network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out that was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Services. The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application. What should you do to enable the IP department to control users' sessions?

A. Configure the Terminal server to run in Remote Administration mode. B. Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server. C. Add the members of the IT department to the Power Users group on the Terminal server. D. Use third-party software to enable remote control of users' sessions.

Answer: B

28 You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do?

A. Grant the users the right to log on as a service. B. Grant the users the right to log on locally. C. Grant the users the right to log on over the network. D. Copy the users' profiles to the Terminal server. E. Copy the users' home folders to the Terminal server.

Answer: B

29. You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators. The share permissions and NTFS permissions are shown in the following table.

HR-Data Folder Share permissions HR-Data Folder NTFS permissions Everyone: Full Control Domain Admins: Read Katrin: Full Control

Katrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted. Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions of other files in the HR-Data folder. You want your actions to have the least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file. What should you do?

A. Grant yourself Full Control permission for only the HR-Data folder and not its files and subobjects. Delete the file. Then remove Full Control permission for the HR-Data folder. B. Take ownership of the HR-Data folder. When prompted, take ownership of existing files. Grant yourself Full Control permission for the file. Delete the file. C. Take ownership of the file. Grant yourself Modify permission for the file. Delete the file. D. Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.

Ans:C

30. You are the administrator of a Windows 2000 Server computer named Server1. You create a Distribute file system (Dfs) root named Public. You add a shared folder named Docs as a Dfs node under the root. The share permissions and NTFS permissions for Public and Docs are shown in the following table.

Folder Share permissions NTFS permissions -----------------------------------------------------------------------------------

Public Everyone: Read Everyone: Read Domain Admins: Full Control

Docs Users: Read Training: Full Control Domain Admins: Full Control Domain Admins: Full Control

A user named Maria is a member of the Users and Training user groups. When Maria attempts to save the file \\Server1\Public\Docs\memo.doc, she receives the following error message: "Access denied." You want Maria to be able to change and delete all files in the Docs folder. You do not want her to have more access than necessary. What should you do?

A. Add Maria to the Domain Admins group. B. Add Maria to the local Administrators group. C. Set the share permissions for the Public folder to grant Maria Full Control permission. D. Set the share permissions for the Docs folder to grant Maria Change permission. E. Set the NTFS permissions for the Public folder and is sub objects to grant Maria Modify permission. F. Set the NTFS permissions for the Docs folder and its sub objects to grant Maria Full Control permission.

Answer: D

31. The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

A. Configure a client computer to use only TCP/IP for the connections to the remote access server. B. Configure the client computer to use a defined IPX network address for the connection to the remote access servers. C. Configure the remote access server to allow IPX based remote access demand dial connections. D. Configure the remote access server to disable multi-link connection.

Answer: A

32. You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

A. Move the intranet server to the client segment of the network. B. Move the proxy server to the server segment of the network. C. Configure each client computer to bypass the proxy server for local addresses. D. Configure each client computer to use port 81 for the proxy server.

Ans:C

33. You are N/W administrator of a win2k server your n/w contain five win2k server computer and 100 win2k professional computers. You want to deploy an update for an application that is used to the win2k professional computer. You want the users to automatically install the update the driver when they logon the domain. What should u do? A. Create a DFS, place the application update and the root folder of the DFS B. Create an Ms windows installer package for the application update and configure the RIS to use the package. C. Create a MS windows installer package for the application update. Apply the package to the local computer policy on all the computers. D. Create a MS windows installer package for the package update. Apply the package to the group policy

Answer: D

34. You are the administrator of a Windows 2000 active directory network. The network consists of a single domain. The domain contains 20 Windows NT 4.0 client computers. All other client computers are Windows 2000 Professional client computers. You create an NT 4.0 default user policy on Windows 2000 Server computer that is configured as PDC emulator. The default policy denies access to the network neighborhood. You then install terminal services on one of the servers and terminal services client on two thousand Windows NT server client computers. You find that users of the terminal server can still browse the network when they open my network places. You want to prevent all default users from browsing the network. What should you do?

A. Modify the Windows NT policy template file so that you can restrict access to both the my network places and network neighborhood. Save the policy file on the terminal server. B. Copy the NT file to 20 Windows NT workstation computers. C. Create a windows 2000 group policy that denies access to my network places. D. Edit the local registry on Windows NT workstation computers to deny access to entire network in the entire neighborhood.

Ans:C

35. After you install a new video adapter, one of the users at a remote location reports that Routing and Remote Access does not accept calls. After you resolve the Routing and Remote Access problem, you need to configure the server to prevent users from installing any unsigned device drivers. What two actions should you take in the Driver Signing Option dialog box? (choose two)

A. Set File Signature Verification to Ignore B. Set File Signature Verification to Block C. Set File Signature Verification to Warn D. Select the Apply settings as system default check box

Answer : B, D

36. You configure your Windows 2000 Server as a print server. You install a second PnP Network adapter to improve the performance. The first adapter uses IRQ11, and the second adapter uses IRQ5. The server is now unable to print to print devices connected to a non-PnP LPT2 port adapter. You want to continue to use the print devices connected to your print server. What should you do?

A. Use device manager to change the IRQ for LPT1 to IRQ10. B. Use device manager to change the IRQ for LPT2 to IRQ7. C. Edit the CMOS setting of the servers BIOS to reserve IRQ7 for non-PnP devices. D. Edit the CMOS setting of the servers BIOS to reserve IRQ5 for non-PnP devices.

Answer: D

37. You install a second modem on win2000 server computer configure with routing and remote accesss.dial in user reports that they are unable to connect to the server using this modem. What should you do to help fix this problem?

A. Using the routing and remote access (snap in) to find that the input and output modems are operational. B. From command prompt run the "net config" server command C. From command prompt run the "net statistic" command d. se the regedt32 to view the error control value in the HKEY LOCAL MACHINE\system\current control set\services\remote Access key

Ans. A

38. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?

A. End the task named Application. B. End the Application.exe process. C. End the Application.exe process tree. D. End both the Explorer.exe process and the Application.exe process.

Ans:C

39. A Windows 2000 Server computer named Server1 is a file server on your network. Server1 runs numerous 16-bit applications. One of the applications, named App1, stops responding, causing all of the other 16-bit applications to stop responding. You want to isolate App1 for monitoring and troubleshooting purpose. What can you do? (Choose all that apply.)

A. Create a batch file that starts App1 by running the start command with the /separate switch. Use this batch file to start App1. B. Create a shortcut to App1, and select the Run in separate memory space option in the shortcut properties. Use this shortcut to start App1. C. In the properties for File and Printer Sharing for Microsoft Networks, select the Maximize data throughput for file sharing option button. D. In the properties for File and Printer Sharing for Microsoft Networks, select the Balance option button.

Answer: A,B

40. You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

A. Restart the computer in safe mode. Then restart the computer again. B. Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command. C. Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command. D. Restart the computer by using the last known good configuration.

Ans:D

41. You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server. What should you do?

A. Install the Windows 2000 Resource Kit. B. Install Windows critical update notification. C. Configure system file checker to notify the branch offices. D. Configure Windows file protection to notify the branch offices.

Answer: B

42. You upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The computer has two hard disks. The system and boot partitions are located on two primary partitions on Disk 0. Both partitions are mirrored on Disk 1. One month later, Disk 1 fails. You replace the disk with a disk taken from another Windows 2000 computer. When you try to repair the fault-tolerant volumes by using Disk Management, you find that the Repair Volume option is unavailable. You want to repair the mirror set. What can you do? (Choose two.)

A. Delete all volumes on Disk 1. Change Disk 1 back to a basic disk. Repair the fault-tolerant volumes on Disk 0. B. Create two new volumes on Disk 1. Copy all the data from the two disk partitions on Disk 0 to the two volumes on Disk 1. C. Break the mirror set. Convert Disk 0 to a dynamic disk. Create a mirror on Disk 1. D. Create a single volume on Disk 1. Copy all the data from Disk 0 to the single volume. Convert Disk 0 to a dynamic disk.

Answer: A, C

43. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?

A. Convert both to dynamic disks. B. Create an empty extended partition on new disk C. Create a single unformatted primary partition on new array. D. Format new disk array as a single NTFS primary partition. E. Format the new disk array as a single NTFS logical drive in an extended partition.

Answer: A

44. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

A. Convert the disk to dynamic disk shut down and restart the server. B. Backup the data on the stripe volume and delete the stripe volume. Create a raid5 volume on the four disks, restore the data to the new raid5 volume. C. Backup the data on the stripe volume and delete the stripe volume. Create to mirror volume, shut down and restart the server. Restore the data to new mirror volumes. D. Backup the data on the stripe volume and delete the stripe volume. Create a span volume for the first two disks, create a second span volume for the last two disk. Mount the root of the second span volume in the root of the first span volume. Restore the data to the first span volume.

Answer: B

45. You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

A. Extend the span volume to include the new disk, rescan the disk. B. Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data. C. Re scan the disk, format the span volume. Use windows back up to restore the data. D. Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data. E. Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data.

Answer: E

46. You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object. You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured. What should you do?

A. From the group policy options from the contoso.local domains set the option not override. B. From the group policy options from the Michigan and Florida OU, set the option not override. C. Block the group policy inheritance for the contoso.local domain. D. Block the group policy inheritance for Michigan and Florida OU.

Ans:A

47. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

A. Apply a less restrictive custom security template to DC1. B. Apply a less restrictive custom policy to Windows NT domain controller. C. Ensure the Windows 2000 domain is configured in the mixed mode D. Ensure the Windows 2000 domain is configured to run in the native mode.

Answer: A

48. You are the administrator for your company. Your Windows 2000 Server computer contains two 23GB hard disks. Each disk is configured as a basic disk and has a single 23GB NTFS partition. Both partitions are backup up to tape every night. The partition on Disk1 stores user data. Most users of your company encrypt their files. Disk1 fails. You replace it with a new disk. You need to recover the data as quick as possible while maintaining the security of the files. What should you do?

A. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Run the cipher /d /i command. B. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Instruct the users to verify the integrity of their files. C. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Logon to the server console as a recovery agent. Copy the files from the second file server to the new partition. D. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Instruct users to copy their files from the second file server to the new partition.

Answer: B

49. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved? (Choose all that apply.)

A. Compress the files in her home folder to save disk space. B. Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level. C. Move some of the files from her home folder to the IN_PROGRESS shared folder. D. Remove files from her home folder until the total uncompressed file size is less than 100 MB.

Ans: D

50. Your company has a main office and 50 branch offices. The main office has a private network with 1,000 computers. Each branch office has a private network with between 10 and 20 computers and a 56-Kbps connection to the Internet. The company plans to use the Network Address Translation (NAT) feature of Routing and Remote Access to provide each office with access to the Internet. When you test this configuration, you discover that connections cannot be made to sites by using fully qualified domain names. However, connections can be made to these sites by using their IP addresses. You want to be able to make connections by using fully qualified domain names. What should you do?

A. Configure the computers on each of the branch office networks with the address of a WINS server. B. Configure the computers on each of the branch office networks with the address of a DNS server on the Internet. C. Configure a filter on the NAT servers to pass DNS packets. D. Create a host file on each of the NAT servers.

Ans:B

51. You are the administrator of a routed Windows 2000 network. The network includes 25 Windows 2000 Server computers. You want to install a new Windows 2000 Server computer as the first computer on a new routed segment. You configure the existing DHCP server with a scope that is valid for the new routed segment. During the installation of the new Windows 2000 Server, you specify that the server should obtain its IP address from an existing DHCP server. After you complete the installation, you open My Network Places. You see the new server but no other computers. You run the ipconfig command and find that the new server's assigned IP address is 169.254.1.200, with a 16-bit subnet mask and no default gateway address. You want to resolve the problem so that you can see other computers on the routed network. What can you do? (Choose two.)

A. Configure all of the routers to route BOOTP broadcast frames. B. Configure the default gateway to the TCP/IP properties of the new server. C. Add the IP address for the default gateway to the TCP/IP properties of the new server. D. Add a DHCP Relay Agent computer to the new routed segment. E. Add a WINS server to the new routed segment.

Answer: A,D

************************************************************************************

Set-2

These questions I had collected from many dumps for practice. All the ans may not be true. So check it. I don't think that you will find any other questions out of this dump.

1. You plan to install Windows 2000 Server on 10 new computers on your company's network. These servers will provide file and print services to departments within the company. The computers have identical hardware and will use the same software configuration. You plan to use a centralized copy of the Windows 2000 installation files, which are stored on an existing Windows 2000 Server computer. Which three actions should you take to install Windows 2000 Server on the new computer? (Choose three.)

A. Create a set of installation boot disks by using Makeboot.exe. B. Create an MS-DOS network boot disk. C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers. D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers. E. Begin the installation process by running the Winnt command with the /S, /U, and /udf switches. F. Begin the installation process by running Winnt32 command with the /s, /unattend, and /udf switches.

Answer: B,C,E

2. You plan to install Windows 2000 Server on 10 new computers. These servers will provide file and print services in branch offices of your company. The company wants each branch office to purchase its own copy of Windows 2000 Server. The installation in each branch office should use the serial number associated with the branch office's own copy. You want to install, configure, and test Windows 2000 server on these computers at the main office before shipping the computers to the branch offices. You want users in the branch offices to enter the computer names and serial numbers when they receive the computers. What should you do?

A. Install Windows 2000 server on the computers by using an unattend.txt file, and then use the Registry Edition to remove the computer name and license details. B. Start the installation process from an MS-DOS boot disk. Install windows 2000 server on the computers from an existing server by running the winnt command with the /PreInst switch. C. Install Windows 2000 server on the computers and then use setup manager to create a sysprep.inf file for sysprep.exe. Place the sysprep.inf file on the computers and run the sysprep - nosidgen command. D. Create an unattend.txt file by using Setup Manager. Include the following line in the Unattend.txt file: oemPreinstall=Yes. Use the file to perform the installation.

Answer: C

3. You are the administrator of a Windows 2000 Server network at Blue Sky Airlines. You configure a server named print10.marketing.blueskyairlines.local as a print server at the Los Angeles site. You create and share a variety of printers on the server for use by employees in the marketing.blueskyairlines.local domain. You want to review the configured properties of all of the shared printers on the print10.marketing.blueskyairlines.local server. You want to perform this review from a Windows 2000 Professional computer at the London site of Blue Sky Airlines. What should you do?

A. Use your Web browser to connect to http://print10.marketing.blueskyairlines.local/printer. B. Use your Web browser to connect to http://print10.blueskyairlines.local/printer. C. Run the net view \\print10 command. D. Run the net view \\print10.blueskyairlines.com command.

Answer: A

4. You are a member of the Enterprise Admins group at Trey Research. You create and share a printer named HPColorL2 on a Windows 2000 Server computer named pserver.treyresearch.local. You grant Print permission only to the Domain Local group named CompanySales. Later, you add a new child domain named london.treyresearch.local. Clair Hector is a member of the global group named LondonSales in the london.treyresearch.local domain. Clair reports that she is unable to send a print job to the HPColorL2 printer. You want all members of the LondonSales group to be able to print to the HPColorL2 printer. What should you do?

A. Add the LondonSales group to the CompanySales group. B. Add the CompanySales group to the LondonSales group. C. Change the CompanySales group to a universal group. D. Change the LondonSales group to a universal group.

Answer: A

5. You are the administrator of home.office.local.com domain. You want to create a shared printer for the company's executives so that they do not have to wait for their documents to print when default printer's queue contains a large number of documents. You configure a new high priority printer and want to set permissions on groups shown in the exhibit. The groups were:

Administrator Creator Owner Everyone Executives Print Operators Server Operators

You select the checkbox to allow Print permissions for Executives group. You want only Administrators, Print Operators, and Server Operators & Executives to be able to print. What should you do? (Select all that apply)

A. Remove the Everyone group. B. Select checkbox to Deny Print permission to Everyone C. Select checkbox to Deny Manage Documents. D. Select all Deny for the Everyone group E. Clear all allow checkboxes for the Everyone group

Answer: A, E

6. You are administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of your company client computer are connected to this server. A shared folder named DATA on server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.

TYPE OF PERMISSION ACCOUNT PERMISSION

DATA Share Permissions Users: Change DATA NTFS Permissions Users: Full Control

You discover that users are connected to the DATA folder. You have an immediate need to prevent 10 of the files in the DATA folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server. What TWO actions should you take?

A. Modify the NTFS permissions for the ten files. B. Modify the NTFS permissions for the DATA folder. C. Modify the shared permissions for the DATA folder. D. Log off the users from the network. E. Disconnect all Users from the DATA folder.

Answer: A, E

7. You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

A. Enable Anonymous access for the intranet server. B. Enable Anonymous access for the Sales virtual directory. C. Remove Nate from the Intern group. D. Make Nate a member of the Security group.

Answer: D

8. You are the administrator of the blue lines skys airlines. You install intranet and configure new windows 2000 computer named server1.department.blueline.com as an intranet server. The server hosts multiple departmental and???? Web to the n/w and data site. You also configure the finance virtual??? In the department web site as shown in the exhibit. During first morning that the new server is available. Users report that they can only see the information that they see in the browser is the list of HTM and ASP files. For security reasons the first action to take is to disable the users ability to view the files of all web sites in the form of list. What should u do?

A. Clear the directory-browsing check box for the server properties and then apply setting to the child web sites. B. Clear the directory-browsing check box for the ticketing web site and then apply setting to the child virtual directory. C. Clear the directory browsing check box for the departments web sites and then applies the setting for the child virtual directory. D. Clear the directory browsing check box for the financing web site.

Answer: A

9. You use computers in two different offices. You have folders stored on a server named UserData01. You work with many files that are highly confidential. You keep the confidential files in a folder named Private in your home folder. You need to maximize the security of the private folder. You also want to be able to access the folder from computers in each office. What should you do? A. Obtain a signing and sealing certificate for a certification server, and install the certificate on the computers you use. B. Log on UserData01 as a domain admin, connect to your known folder and set the encryption attributes. C. Configure your account to use roaming user profile. Use the properties of the Private folder to set the encryption attributes. D. Add the cipher/e/s *.* to your computer's start up script.

Answer: C

10. Your company's network includes Windows 3.1 client computers, Windows 95 client computers and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32 bit application that collects information from the manufacturing processes so that workers on one shift can find out what was manufactured during the previous shift. The company wants to make the application available to all the client computers using terminal services on a Windows 2000 Server computer. The server will not run as a domain controller. You install terminal services. Users want to collect information on manufacturing processes from other shifts. The company wants users to shut down their computers at the end of their shifts and leave the applications running on the terminal server. What should you do?

A. Set the delete temporary folders on exit setting for the terminal server to NO. B. Set the remote desktop protocol on the server to overwrite user settings and set end disconnected setting to NEVER. C. At the terminal server grant the users the right to log on as a batch job. D. Do NOTHING, user programs are always terminated on disconnection.

Answer: B

11. Your Windows 2000 Server computer uses a SCSI adapter that is not included on the current Hardware Compatibility List (HCL). You install an updated driver for the SCSI adapter. When you start the computer, you receive the following STOP error: "INACCESSIBLE_BOOT_DEVICE." Which two procedures can you use to resolve the problem? (Choose two.)

A. Start the computer in safe mode. Reinstall the old driver for the SCSI adapter. B. Start the computer by using a Windows 2000 bootable floppy disk. Reinstall the old driver for the SCSI adapter. C. Start the computer by using the Windows 2000 Server CD-ROM. Perform an emergency repair. Reinstall the old driver for the SCSI adapter. D. Start the computer by using the Recovery Console. Run System File Checker. Restart the computer. Reinstall the old driver for the SCSI adapter. E. Start the computer by using the Recovery Console. Copy the old driver for the SCSI adapter to the system volume as C:\NTbootdd.sys. Restart the computer.

Answer: C,E

12. You are a member of the Backup Operators Group in the arborshoes.com domain. You are not a member of any other group in the domain. You are logged on to a Windows 2000 Server. You try to configure the software from a tape backup device, but the configuration fails during backup. The documentation from the tape backup device indicates that the current tape driver is out of date and must be updated to support the configuration. What should you do?

A. Run the "runas" command, supply your user name and password to start device manager. Then click the update driver command button on the Driver tab for the tape backup device. B. Instruct a domain administrator to run the "runas" command, supplying the domain administrator user name and password to start device manager. Then click the update driver command button on the Driver tab for the tape backup device. C. Open the device manager, and then click the update driver command button on the driver tab for the tape backup device. D. Run the Add/Remove Hardware wizard, when prompted select the Add/Troubleshoot a device option.

Answer: B

13. You have a Windows 2000 Server and has 2 disk drives attached to the IDE controller. You want more space so you add a new SCSI Controller with 6 disks. The SCSI controller is not in the HCL. You restart the server but it's not dectected. What should you do? (Choose 2)

A. Use Device Manager to turn off IRQ steering in the Properties of the Standard PC. Restart B. Use Disk Management to restore the asic configuration. Restart C. Use Add/Remove Hardware wizard to add new SCSI and RAID controller. D. Use Disk Management to rescan disk E. Use Manufacturer's setup program to install the drivers for the SCSI disk controller.

Answer: A, E

14. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5. You want to resolve the problem. What should you do? A. Use Device Manager to change the IRQ for the original modem to IRQ 9. B. Use Device Manager to change the IRQ for the original modem to IRQ 10. C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices. D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices.

Answer: C

15. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible.

What should you do?

A. Restart the computer by using the last known good menu option. B. Perform an emergency repair and select fast repair, restart the computer. C. Restart the computer in the safe mode, remove the driver and restart the computer. D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver.

Ans:D

16. You are installing Windows 2000 Server on a new computer. The manufacturer has provided a customized hardware abstraction layer (HAL) to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

A. During the hardware confimation portion of the Windows 2000 setup install the customized HAL. B. After installing Windows 2000 server,use the recovery console to copy the customized HAL to the system32 folder on the boot partition. C. After the installing windows 2000 setup, use the emergency repair process to install the customized HAL. D. After installing Windows 2000 server, use the device manager to scan for Hardware changes. When prompted, install the customized HAL.

Ans: A

17. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

A. Add the APP1 and APP2 instances to the processor time counter for the process object. B. Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object. C. Add only the NTVDM instance for the percent processor time counter for the process object. D. Add the NTVDM1 and NTVDM #2 instances for processor time counter for the process object.

Answer: D

18. Every afternoon you run MS-EXCEL locally on Windows 2000 Server computer to update the performance spread sheet. Users report that during this time the server response to the file request appears to be slowed down. What should you do to resolve the problem?

A. Run the start/normal CSRSS command, before you start the EXCEL. B. Run the start/normal EXCEL.EXE command to start excel. C. Use task manager to set the priority for CSRSS.EXE process to above normal. D. Use task manager to set the priority for EXCEL.EXE process to low.

Answer: D

19. Running system monitor locally and ensuring it has least impact on other processes, how do you measure the physical disk performance counters on your win2000 server computer?

A. From the command prompt run the start/low perform command B. Use Task manager to set the priority off the MMC.EXE process to Low

Answer: A

20. You are the administrator of Windows 2000 Server network . On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?

A. Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume. B. Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume. C. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command. D. Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility.

Answer: A

21. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?

A. Restart the computer by using the last known good menu option. B. Perform an emergency repair and select fast repair, restart the computer. C. Restart the computer in the safe mode, remove the driver and restart the computer. D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver.

Answer: D

22. You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full backups of each domain controller. You run a script to make changes to account information in Active Directory. As a result of errors in the script, the incorrect user accounts are modified. Active Directory replication then replicates the changes to the other two domain controllers. You want to revert Active Directory to the version that was backed up the previous day. What should you do?

A. On a single domain controller, use Windows Backup to restore the System State data. Shut down and restart the computer. B. Shut down and restart a single domain controller in directory services restore mode. Use Windows Backup to restore the System State data. Run the Ntdsutil utility. Restart the computer. C. Shut down and restart a single domain controller by using the Recovery Console. Use Windows Backup to restore the System State data. Exit the Recovery Console. Restart the computer. D. Shut down and restart each domain controller by using the Recovery Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery Console. Restart the computer.

Answer: B

23. You back up all of the system state date for each domain controller and place the date on a single tape.That tape is currently attached to the srv1.west.litware.com computer.To which server or servers can you restore the system state from srv1.west.litware.com(choose all apply) A.srv1 B.srv2 C.srv3 D.srv4 E.srv5 F.srv6

Answer: A

24. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first?

A. Replace the third disk and restart the server. Use Disk Management to repair the volume. B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk. C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume. D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition.

Answer: B

25. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

A. Replace Disk 1 and restart the computer. The mirror will automatically regenerate. B. Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1. C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer. D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror.

Answer: B

26. You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

A. Extend the span volume to include the new disk, rescan the disk. B. Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data. C. Re scan the disk, format the span volume. Use windows back up to restore the data. D. Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data. E. Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data.

Answer: E

27. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?

A. Convert the disk that contains the shared folders to a dynamic disk. B. Convert the partition that contains the shared folders to NTFS. C. Defragmenter the disk that contains the shared folders. D. Move the paging file to the partition that contains the shared folders.

Answer: C

28. Your Windows 2000 Server contains two hard disks. Each disk is partitioned as a single primary partition. The first disk is formatted as FAT32, the second as NTFS. You compress shard folders on second disk. When users move compressed files from a Shared folder on the second disk to a shared folder on the first disk, the files lose their compression. What two actions should you take to ensure that all files moved from folders on the second disk to shared folders on the first disk remain compressed?

A. Convert the first disk to NTFS. B. Compress the shared folders on the first disk

Answer: A, B

29. You have two Windows 2000 servers, SRV1 and SRV2. SRV1 has a spanned volume over three physical disks. These disks support hot swapping. The drive letter that the spanned volume uses on SRV1 is not currently in use on SRV2. You want to move the three disks to SRV2, using the same drive letter as SRV1. You back up the spanned volume. What should you do next??

A. Move the disk from SRV1 to SRV2. B. on SRV1 rescans the disks. On SRV2, rescan the disks

Answer: A, B

30. You install the boot volume D on your Windows 2000 Server computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1. One year later, during routine server maintenance, you open Disk Management and find that the status of volume D is Failed Redundancy. The status of Disk 1 is Online (Errors). A symbol with an exclamation point appears in the graphical view of the disk. You want to return the status of the boot volume to Healthy. What can you do? (Choose two.)

A. Break the mirror, delete the volume on Disk 1, and re-create the mirror. B. Replace Disk 1, copy the data from the boot volume to the new disk, and then use Disk Management to rescan the disks. C. Replace Disk 1, Ensure that the new disk is a basic disk, and repair the volume. D. Reactivate the mirror on Disk 1. E. Convert Disk 1 to a basic disk, and reconvert it to a dynamic disk.

Answer: A,D

31. Your hard-drive configuration is as follows and one of your drives fails.

Controller label 1 Disk label EIDE Controller 0 EIDE Disk 0 and Disk 1

Controller label 2 Disk label SCSI Controller 1 SCSI Disk 0, 1, 2, 3, 4, 5, 6

The disk that fails is multi(1)disk(0)rdisk(1)partition(1). Place an "X" on the drive that has failed in the configuration below: ID Disk

A. EIDE 0 (disk 1) B. EIDE 1 (disk 2) C. SCSI 0 (disk 1) D. SCSI 1 (disk 2) E. SCSI 2 (disk 3) F. SCSI 3 (disk 4) G. SCSI 4 (disk 5) H. SCSI 5 (disk 6)

Answer: D

32. You share a folder on a Windows 2000 Server computer for users in your company's London office. You place several subfolders in the London folder as shown in the exhibit. The Marketing-2 folder is compressed. You want to move some files from the Research folder into Marketing-2, and you want to make sure that the files are compressed when you move them. However, you do not want to compress the remaining files in Research. What should you do?

A. Move each of the files from Research to Marketing-2. B. Copy the files from Research to Marketing-2, and then delete the original files. C. Compress Research, apply changes to the folder only, and then move the files from Research to Marketing-2. D. Encrypt Marketing-2, move the files from Research to Marketing-2, and then decrypt Marketing-2.

Ans:B

33. Trey Research has a Windows 2000 Server computer named User_srv. This computer has a RAID-5 controller. The RAID array is configured as two partitions. Drive C is a 2-GB partition that holds the operating system and paging file. Drive D is a 30-GB partition that will hold the home folders for 200 users. Trey Research employs 10 scientists. The user accounts for scientists are members of a group named Scientists. The scientists use a data capture application that generates files that can be lager than 100 MB. Trey Research wants to use disk quotas. Ordinary users should be allowed to store a maximum of 75 MB of data is their home folder. The storage for users in the Scientists group should not be limited by quotas. What should you do to configure this disk quota scheme? (Choose two.)

A. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit Check box. Set the default quota limit to 75 MB. B. Create a Scientist template account. Create a new quota entry for this account. Select the Do not limit disk usage for this entry option button. C. Create new quota entries for the 10 scientists' user accounts. Select the Do not limit disk usage for this entry option button. D. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit check box. Select the Do not limit disk usage option button for the default quota limit. E. Create a Scientist template account. Create a quota entry for this account. Set the quota limit to 30 GB.

Answer: A, C

34. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?

A. Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone. B. Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone. C. Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone. D. Configure at least two servers with Active Directory integrated primary zones for the domain. E. Configure at least two servers with standard primary zones for the domain.

Answer: D

35. Your network is configured as shown in the exhibit. "Engineering1 and Sales1 have DHCP installed up them." All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Sales1 and Sales2. The engineering department uses another subnet and has servers named Engineering1 and Engineering2. Sales1 and Engineering1 are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Sales1 and Engineering1 to support client computers on each other's subnets. What should you do?

A. Set the router option in the DHCP Scopes to 192.168.2.1 for Engineering1 and 192.168.1.1 for Sales1. B. On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol. C. On Engineering2 and Sales2, install and configure the DHCP Relay Agent service. D. Configure Engineering2 and Sales2 as DHCP servers without any scopes.

Ans:C

36. Your network contains NetWare 4.0 Servers. You have successfully installed Client Service for NetWare on Windows 2000 Professional computers, and Gateway Service for NetWare on Windows 2000 Server Computers. You recently added a new Windows 2000 Server computer to the network and installed Gateway Service for NetWare on it. However, the server is unable to connect to any NetWare servers. What should you do on the new Windows 2000 Server computer to resolve this problem?

A. Enable NWLink NetBIOS. B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use the correct Ethernet frame type. C. Install RIP routing for IPX. D. Install the SAP Agent.

Answer: B

37. Your network uses the TCP/IP protocol for its Windows 2000 prof and win2000 NT computers. You have ooneserver that acts as both a Wins server, and a DNS server. All the client computers are configured to use this server for DNS and WINS. Users of Windows NT Workstation cannot connect to file server, but Windows 2000 professional users can. This server has a static address off 192.168.1.11. What should you do to allow the Windows NT Workstation computer to connect to the file server??

A. Select the Enable NetBIOS over TCP/IP. B. Add the WINS address used by the Windows NT Workstation computers.

Answer: A, B

38. You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

A. Enable the background refresh settings to use the default group policy refresh date. B. Enable the asynchronous group policy application settings. C. Enable and configure the group policy refresh interval for domain controller. D. Enable and configure the group policy refresh interval for computers.

Answer: D

39. You have configured a Group Policy Object (GPO) for the marketing organization unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do?

A. Add the Managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy. B. Add the Managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the Group Policy. C. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Deny the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to deny the ability to run system Control Policy Panel. Give the original GPO a higher priority than the new GPO. D. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Disable the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the original GPO a higher priority than the new GPO.

Answer: D

40. You are the administrator of a Windows 2000 Active Directory Network. The network consists of a single domain named adatum.local that runs in native mode. The domain includes 500 member client computers, consisting of 200 Windows 2000 Professional computers and 300 Windows NT Workstation 4.0 computers. You create a Group Policy for the Research organizational unit (OU) and configure the Policy as shown in the exhibit. None of the users in the Research OU working at Windows 2000 Professional computers can change the wallpaper on their desktops or the resolution and colour depth of their displays. However, when users log on from any of the Windows NT Workstation computers in the OU, they can change all display settings. You want to restrict all users of Windows NT Workstation computers in the OU from changing their desktop wallpaper and from accessing the settings tab in Display in Control Panel.What should you do?

A. Add a new computer to the OU and select the "Allow Pre-Windows 2000 computers to use this account" check box. B. Change the Group Policy so that it also hides the Background tab. C. Create a seperate Group Policy for a nested OU that contains all Windows NT computers. D. Configure a Windows NT Policy file and place it in the winnt\sysvol\Adatum.local\scripts folder on the PDC emulator.

Answer: B

41. Your company has a Routing and Remote Access server at its main office. One of the company?¦s branch offices also runs Routing and Remote Access on a server that has one modem. This server is configured to use demand-dial routing to connect to the main office. This server is part of the company?¦s Active Directory domains. The domain runs in native mode. Some employees at this branch office use the branch office same to access their files from here. The manager of the branch office reports that sometimes none of the user in the office can connect to the main office. When you examine the event log on the branch office server to find that users have been connecting to the server during working hours. The manager wants users to be able to dail in to the server between 6:00p.m. and 8:00a.m. However, the manager still wants users to be able to log on at any time when connected directly to the LAN.

A. Change the logon hours for user’s accounts to deny between 8:00a.m. and 6:00p.m. B. Set the remote access policy to deny connection between 8:00a.m. and 6:00p.m. C. Create one batch file to start Remote Access Connections Manager server, and create another batch file to stop it. Schedule the stop batch file to run at 8:00a.m. every day and the start batch file to run at 6:00 p.m. every day. D. Create two user accounts for each user. Grant dail-in permission for an account and deny dail-in permission to second account. Change the login hour for the dail-in accounts to de logon between 8:00 a.m. and 6:00p.m.

Answer: B

1- Installing Windows 2000

1. You plan to install Windows 2000 Server on 10 new computers on your company's network. These servers will provide file and print services to departments within the company. The computers have identical hardware and will use the same software configuration. You plan to use a centralized copy of the Windows 2000 installation files, which are stored on an existing Windows 2000 Server computer. Which three actions should you take to install Windows 2000 Server on the new computer? (Choose three.)

A. Create a set of installation boot disks by using Makeboot.exe. B. Create an MS-DOS network boot disk. C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers. D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers. E. Begin the installation process by running the Winnt command with the /S, /U, and /udf switches. F. Begin the installation process by running Winnt32 command with the /s, /unattend, and /udf switches.

Answer: B,C,E

2. You plan to install Windows 2000 Server on 10 new computers. These servers will provide file and print services in branch offices of your company. The company wants each branch office to purchase its own copy of Windows 2000 Server. The installation in each branch office should use the serial number associated with the branch office's own copy. You want to install, configure, and test Windows 2000 server on these computers at the main office before shipping the computers to the branch offices. You want users in the branch offices to enter the computer names and serial numbers when they receive the computers. What should you do?

A. Install Windows 2000 server on the computers by using an unattend.txt file, and then use the Registry Edition to remove the computer name and license details. B. Start the installation process from an MS-DOS boot disk. Install windows 2000 server on the computers from an existing server by running the winnt command with the /PreInst switch. C. Install Windows 2000 server on the computers and then use setup manager to create a sysprep.inf file for sysprep.exe. Place the sysprep.inf file on the computers and run the sysprep - nosidgen command. D. Create an unattend.txt file by using Setup Manager. Include the following line in the Unattend.txt file: oemPreinstall=Yes. Use the file to perform the installation.

Answer: C

3. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

A. During the text mode portion of the Windows 2000 setup install the customized HAL. B. After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition. C. After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup. D. After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL.

Answer: A

4. You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?

A. Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive. B. Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen. C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers. D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers.

Answer: B

5. Your network includes windows 98 computers and Windows 2000 Professional computers. You are adding a new computer to the network. You plan to install Windows 2000 Server computer on the new computer. The computer has one 20 GB hard disk with no partition defined. The Windows 2000 Server computer CD ROM is unavailable. You want to install windows 2000 server from the source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition. What should you do?

A. On another windows 2000 computer use makebt32.exe to create installation startup disks. Start the computer by using the first disk. B. On another Windows 2000 computer format a floppy disk. Copy NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by using the disk. C. Start the new computer by using the Windows 98 network boot disk. Connect to the server. Run dsclient.exe. Create and format 20GB FAT32 partition. D. Start the new computer by using the Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to network server. Run winnt.exe. E. Start the computer by using Windows 98 network boot disk. Create and format a single Fat 32 partition. Start the new computer by using the Windows 2000 emergency repair disk.

Answer: D

6. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain. What should you do?

A. On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server. B. On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers. C. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows 2000 domain as the existing Windows NT domain. D. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart the Windows NT PDC on the network and demote it to a BDC.

Ans:A

7. The company has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each employee has a network between 5-20 client computers. The office networks are not connected to any other networks. The company is buying 50 identical computers to run Windows 2000 server in these offices. These servers must be installed to company’s standard configuration. You create a setup information file (SIF) that specifies the company’s data configuration. You want to automate the installation process as much as possible in the least possible amount of time. What should you do?

A. Use the makebt32.exe to create 4 installation setup disks and add the SIF to the first disk. Instruct an employee at each office to start the installation by using these. B. Create MS-DOS boot disk that contain CD ROM driver and the SIF and that runs WinNT /S:D:\I386 command. Instruct an employee at each office to start the installation by using this disk. C. Create a floppy disk that contains only SIF. Instruct an employee at each office to start the installation by using the Windows 2000 server CD-ROM with the floppy disk inserted after startup. D. Create a Windows 2000 folder on the hard disk, copy the Windows 2000 Server CD-ROM to the folder, add the SIF to the folder. Copy the folder to the writable CD. Instruct an employee at each office to start the installation by using this CD.

Ans:C

8. You want to upgrade a Windows NT Server 4.0 computer named Server34 to Windows 2000 Server. Server34 is a member server in a Windows 2000 domain named marketing.fabrikam.local. The domain runs in native mode. You want to change the role of Server 34 from a member server to a domain controller in the same domain. What should you do? (Choose two.)

A. Reinstall Windows NT Server 4.0 on Server 34 in the same WINNT folder, and make Server 34 a BDC in the marketing domain. B. Use Server Manager on Server34 and promote Server34 to a PDC for the marketing domain. C. Upgrade Server34 to Windows 2000 Server. D. Run the Active Directory Installation wizard to make Server34 a domain controller in the marketing.fabrikam.local domain. E. Run the Active Directory Installation wizard to convert Server34 to a domain controller in the fabrikam.local domain.

Answer: C,D

9. You have four different distribution shares on your network for Windows 2000 Server installations. A new service pack was just announced. What should you do to make the service pack available for future installations?

A. Copy the service pack's driver.cab to the distribution "share", as well as layout.inf, dosnet.inf and txtsetup.sif B. Use update /slip to apply the service pack to each "share". C. Copy the layout.inf, dosnet.inf and txtsetup.sif files to each distribution "share". D. Use sysdiff /diff to apply the service pack to each "share".

Answer: B

10. You are the administrator of the network with winnt4.0 and Unix computers the n/w consists of a single winNT4.0 domain you are upgrading winnt4 server named server1 to win2000 server which is the BDC of the domain. The existing DNS server is the Unix computer that supports SRV service records and is configured to accept dynamic updates the existing WINS server in another win-not server computer. You want to configure server-1 as DC in Active Directory forest you want the existing win-nt domain to upgraded to Active Directory. You plan to upgrade the other DC in the domain to win2k after the upgrade of server-1 is complete you want to upgrade

ANS. Change into PDC first

2- Managing and Troubleshooting Access to Resources

Printing

11. You are the administrator of a Windows 2000 Server network at Blue Sky Airlines. You configure a server named print10.marketing.blueskyairlines.local as a print server at the Los Angeles site. You create and share a variety of printers on the server for use by employees in the marketing.blueskyairlines.local domain. You want to review the configured properties of all of the shared printers on the print10.marketing.blueskyairlines.local server. You want to perform this review from a Windows 2000 Professional computer at the London site of Blue Sky Airlines. What should you do?

A. Use your Web browser to connect to http://print10.marketing.blueskyairlines.local/printer. B. Use your Web browser to connect to http://print10.blueskyairlines.local/printer. C. Run the net view \\print10 command. D. Run the net view \\print10.blueskyairlines.com command.

Answer: A

12. Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers.

What should you do?

A. Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT. B. Install Microsoft Print Services for Unix on users' Computers. Create a network printer, and specify that the printer name is \\10.1.1.99\GIANT C. Create a network printer on PrintServ, and specify that the printer name is \\10.1.1.99\GIANT. Share this printer and connect to it from users' computers. D. Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers.

Ans:D

13. You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do?

A. Copy the Windows NT 4.0 Printer Drivers to the Netlogon shared folders on all Windows NT Server 4.0 computers still configured as BDCs. B. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folder on the PDC emulator C. Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000. D. Copy the Windows NT 4.0 printer drivers to the Winnt\System32\printers\drivers folder on the Windows 2000 print server.

Ans:C

14. You are the administrator of a Windows 2000 network. You have installed two shared printers for a print device on a Windows 2000 Server. Both printers are available to all users. They are shared as Admin and Executive. Admin is configured with a priority of 90, Executive is configured with a priority of 50. Now, you are advised to prevent the printer Executive to be visible to all users. Only members of the Executive group should be able to print to Executive. What should you do?

A. Allow the Executive Group print permission only. Remove the sharename Executive and add the sharename Executive$. Reconnect all members of the Executive Group to the new sharename. B. Install a second printer driver for the print device. Set NTFS permissions to the new driver files so that only the Executive Group is allowed to access the files. C. Deny print permission to the Everyone Group. D. Change the priority of Executive to 99, so that ...........

Answer: A

Permissions

15. You are a member of the Enterprise Admins group at Trey Research. You create and share a printer named HPColorL2 on a Windows 2000 Server computer named pserver.treyresearch.local. You grant Print permission only to the Domain Local group named CompanySales. Later, you add a new child domain named london.treyresearch.local. Clair Hector is a member of the global group named LondonSales in the london.treyresearch.local domain. Clair reports that she is unable to send a print job to the HPColorL2 printer. You want all members of the LondonSales group to be able to print to the HPColorL2 printer. What should you do?

A. Add the LondonSales group to the CompanySales group. B. Add the CompanySales group to the LondonSales group. C. Change the CompanySales group to a universal group. D. Change the LondonSales group to a universal group.

Answer: A

16. Your company's network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out that was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Services. The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application. What should you do to enable the IP department to control users' sessions?

A. Configure the Terminal server to run in Remote Administration mode. B. Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server. C. Add the members of the IT department to the Power Users group on the Terminal server. D. Use third-party software to enable remote control of users' sessions.

Answer: B

17. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do?

A. Grant the users the right to log on as a service. B. Grant the users the right to log on locally. C. Grant the users the right to log on over the network. D. Copy the users' profiles to the Terminal server. E. Copy the users' home folders to the Terminal server.

Answer: B

18. You are the administrator of home.office.local.com domain. You want to create a shared printer for the company's executives so that they do not have to wait for their documents to print when default printer's queue contains a large number of documents. You configure a new high priority printer and want to set permissions on groups shown in the exhibit. The groups were:

Administrator Creator Owner Everyone Executives Print Operators Server Operators

You select the checkbox to allow Print permissions for Executives group. You want only Administrators, Print Operators, and Server Operators & Executives to be able to print. What should you do? (Select all that apply)

A. Remove the Everyone group. B. Select checkbox to Deny Print permission to Everyone C. Select checkbox to Deny Manage Documents. D. Select all Deny for the Everyone group E. Clear all allow checkboxes for the Everyone group

Answer: A, E

19. You are administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of your company client computer are connected to this server. A shared folder named DATA on server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.

TYPE OF PERMISSION ACCOUNT PERMISSION

DATA Share Permissions Users: Change DATA NTFS Permissions Users: Full Control

You discover that users are connected to the DATA folder. You have an immediate need to prevent 10 of the files in the DATA folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server. What TWO actions should you take?

A. Modify the NTFS permissions for the ten files. B. Modify the NTFS permissions for the DATA folder. C. Modify the shared permissions for the DATA folder. D. Log off the users from the network. E. Disconnect all Users from the DATA folder.

Answer: A, E

20. You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators. The share permissions and NTFS permissions are shown in the following table.

HR-Data Folder Share permissions HR-Data Folder NTFS permissions Everyone: Full Control Domain Admins: Read Katrin: Full Control

Katrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted. Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions of other files in the HR-Data folder. You want your actions to have the least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file. What should you do?

A. Grant yourself Full Control permission for only the HR-Data folder and not its files and subobjects. Delete the file. Then remove Full Control permission for the HR-Data folder. B. Take ownership of the HR-Data folder. When prompted, take ownership of existing files. Grant yourself Full Control permission for the file. Delete the file. C. Take ownership of the file. Grant yourself Modify permission for the file. Delete the file. D. Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.

Ans:C

21. Your Windows 2000 Server network has two single domains named Corp and Finance. The company president logs onto the Corp domain as Susan. The two vice-presidents and Susan are members of the Corp Managers global group in the Corp domain. Susan requires read permission for the salary directory in the Finance domain. The Account Managers local group in the Finance domain has change permission for the salary directory. No one else should have access to the salary directory. How should you plan you network to allow required access?

A. Configure the Finance domain to trust the Corp. domain. Make Susan a member of the Account Managers Group. B. Configure the Corp. domain to trust the Finance domain. Create a local group named account read in the Finance domain and assign it read permission for the salary directory. Make Susan a member of the account read group. C. Configure the Finance domain to trust the Corp. domain. Create a local group named execs in the Finance domain and assign it read permission for the salary directory. Make Susan a member of the exec group.

Ans:C

22. A computer named Station01 belongs to a domain called Sales. Jason wants to add another Windows NT computer named Station02 to the Sales domain. Jason disconnects Station01 from the network, and renames Station02 to Station01. However, the computer cannot participate in domain administration of the Sales domain. What is the most likely cause of the problem?

A. The Sales domain already has the maximum number of computer connected accounts. B. There is another computer named Station0l in a trusted domain. C. There is another computer named Station0l in a trusting domain. D. Simply renaming the computer does not make the computer join the Sales domain.

Ans:D

23. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do?

A. Configure the settings for Internet Connecting Sharing to allow POP3 access. B. Configure the settings for Internet Connecting Sharing to allow SMTP access. C. Give David's user account administrator privileges on the Windows 2000 Server computer. D. Instruct David to log on as a domain administrator on the Windows 2000 Server computer.

Ans:C

24. You are the administrator of a Windows 2000 Server computer named Server1. You create a Distribute file system (Dfs) root named Public. You add a shared folder named Docs as a Dfs node under the root. The share permissions and NTFS permissions for Public and Docs are shown in the following table.

Folder Share permissions NTFS permissions

Public Everyone: Read Domain Admins: Full Control Everyone: Read

Docs Users: Read Domain Admins: Full Control Training: Full Control Domain Admins: Full Control

A user named Maria is a member of the Users and Training user groups. When Maria attempts to save the file \\Server1\Public\Docs\memo.doc, she receives the following error message: "Access denied." You want Maria to be able to change and delete all files in the Docs folder. You do not want her to have more access than necessary. What should you do?

A. Add Maria to the Domain Admins group. B. Add Maria to the local Administrators group. C. Set the share permissions for the Public folder to grant Maria Full Control permission. D. Set the share permissions for the Docs folder to grant Maria Change permission. E. Set the NTFS permissions for the Public folder and is sub objects to grant Maria Modify permission. F. Set the NTFS permissions for the Docs folder and its sub objects to grant Maria Full Control permission.

Answer: D

25. Your company has a human resources (HR) manager named Sean Chai. He keeps your company's confidential HR files in a shared folder. To increase the security of the HR files, Sean set the folder to encrypt the files. Sean leaves the company without resetting the permissions and encryption settings for the HR files. The files must be made accessible to the new HR manager. Which two actions should you take to allow this access? (Choose two.)

A. Set the file permissions on the HR files to allow access to the new manager. B. Back up the shared folder to tape and restore the files to a different folder. C. Log on as an administrator and remove the encryption attribute from the HR files. D. Log on as the new manager, connect to the shared folder, and run the cipher /e /s . command. E. Configure the new manager's account to be an Encrypted Data Recovery Agent for Sean's account.

Answer: A, C

26. You are the network administrator at Humongous Insurance, a major insurance comapny that has 1,000 offices world wide. You are configuring the network so that only the sales staff can connect to it from home. Your Windows 2000 forest contains a member server named SV1 that has Routing and Remote Access for Windows 2000 enabled. You configure SV1 to use a modem bank to accepr incoming dial-up attempts. You configure SV1 to use Windows Authentication as the authentication Provider. The only supported authentic method is MS CHAP V2. You need to restrict access to SV1. What should you do?

A. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Client-Friendly-Name attribute of the default remote access policy. B. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Windows-Group attribute of the default remote access policy. C. Create a new remote access policy. Add the Everyone group to this policy by using the Windows-Group attribute in the properties of each sales staff user acounts. Control dial-in access through remote policy. D. Create a Windows 2000 global group. Populate this global group with the sales staff user accounts. Provide access to the global group by using Windows-Group attributes of the default remote access policy.

Answer: A

27. Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do?

A. Add the applications service accounts to the Domain Administrator Group. B. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy. C. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy. D. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy.

Answer: D

28. You are a member of the domain backup operators group in a remote office for a large company. You are responsible for manufacturing the system state of a new Windows 2000 member server named members. You installed recovery console onto the hard disk of member1. you have Windows 2000 backup to create a backup of the system state data. You store the backup files on the hard disk in a folder named systemstate. A member in the domain admins group changes the name of member 1 to CR45uu in order to adhere to a new naming standard. One of the applications on CR45uu no longer functions after the name change. You use the restore wizard to restore system state data. Then you restart the server but you cannot log on to the server afterward. You need to be able to log on to the server. What should you do?

A. Log on to the server by using the local administrator account. B. Log on to the server by using a domain administrator account. C. Use recovery console to restore the system state data. D. Use recovery console to perform a full restore from a recent backup.

Ans:B or ????

Internet

29. You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

A. Enable Anonymous access for the intranet server. B. Enable Anonymous access for the Sales virtual directory. C. Remove Nate from the Intern group. D. Make Nate a member of the Security group.

Answer: D

30. You are the administrator of an Internet Bluesky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines.com as an intranet server. The server hosts the multiple departmental and resource WEB links to the network and databases. You configure a ticketing WEB site. You also configure a finance virtual directory in the department's WEB site as shown in the Exhibit. "We see an exhibit (image) in which we see the dir browsing enabling and person can see all the three". During the first morning the new server is available and the user reports that the only information they are seeing in their browser is a list of HTM and ASP files. For security reasons what the first action you need to take to disable the user ability to all the WEB sites in the form of a list. What should you do?

A. Apply the settings to each child WEB sites. B. Clear the directory browsing settings for the ticketing WEB sites and then apply the settings to child virtual directories. C. Clear the directory browsing checkbox for the department's WEB sites Properties and then apply the settings to the child virtual directory. D. Clear the directory browsing checkbox for the financing virtual directory.

Answer: C

31. You are the administrator of the blue lines skys airlines. You install intranet and configure new windows 2000 computer named server1.department.blueline.com as an intranet server. The server hosts multiple departmental and???? Web to the n/w and data site. You also configure the finance virtual??? In the department web site as shown in the exhibit. During first morning that the new server is available. Users report that they can only see the information that they see in the browser is the list of HTM and ASP files. For security reasons the first action to take is to disable the users ability to view the files of all web sites in the form of list. What should u do?

A. Clear the directory-browsing check box for the server properties and then apply setting to the child web sites. B. Clear the directory-browsing check box for the ticketing web site and then apply setting to the child virtual directory. C. Clear the directory browsing check box for the departments web sites and then applies the setting for the child virtual directory. D. Clear the directory browsing check box for the financing web site.

ANS: A

32. You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

A. Move the intranet server to the client segment of the network. B. Move the proxy server to the server segment of the network. C. Configure each client computer to bypass the proxy server for local addresses. D. Configure each client computer to use port 81 for the proxy server.

Ans:C

33. You are the network administrator of the litware.com domain. LitWare, Inc., has its main office in Dallas and branch office in New York, Phoenix, and Seattle. A Windows 2000 Server computer named web1.litware.com is running Internet Information Service (IIS). This computer is located in the same office. Web developers in Dallas, New York, Phoenix, and Seattle need to update each of the Web sites and virtual directories located on web1.litware.com. Different updates will be occurring simultaneously. You want to ensure that each developer can use Microsoft FrontPage to update the sites successfully and to manage content changes. What should you do?

A. Run the fpremadm command to install the server extensions for IIS on web1.litware.com. Configure the server extensions for each web site. B. Run the fpsrvadm command to install the server extensions for IIS on web1.litware.com. Configure the server extensions for each Web site. C. Install the server extensions for IIS on web1.litware.com by selecting Upgrade Extensions from All Tasks menu in IIS. Configure the server extensions for each Web site. D. Configure the server extensions for each Web site by selecting Configure Server Extensions from the All Tasks menu in IIS. Configure the server extensions to allow each developer update access for each Web site.

Ans:D

34. You install Internet Information Services 5.0 on a computer running Windows 2000 Server. You create two new department web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales web site while a developer updates the contents of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive?

A. The user will be redirected to an alternate default page for the Sales site's home directory. B. The user will be redirected to the Default Web site home page. C. The user will receive a 403.2 - Read Access Forbidden error message. D. The user will receive a 404 - File Not Found error message

Ans:B

35. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web Site for your company. Company policy requires that only authenticated users have acces to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

A. Install Active Directory on the server. B. Select Basic Authentication check box. C. Clear the Allow Anonymous Connection check box. D. Disable the IUSE_inta user account on Intra. E. Clear the Allow IIS to Control Password check box.

Answer: C

36. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

A. Ensure that the log type is set to W3C. B. Change the log rollover property in the website's logging properties. C. Change the time zone setting in the time properties on the web server. D. Configure the time service on the web server to use local system account.

Answer: B

37. You are a recently hired network administrator at Awesome Computer. Awesome Computer has an office in New York and Toronto. Company network configured as:

Toronto Office: Windows 2000 Domain Controller Monitor1 with community name of AwesomeA WebServer with community name of AwesomeA

New York Office:Windows 2000 domain Controller Monitor2 with community name of AwesomeB ApplicationServer with community name of AwesomeB

These two offices are linked to two routers with Internet between the routers.You are responsible for monitoring all servers from Monitor1. Monitor1 and Monitor2 are configured with Management Console running third party network management software. ApplicationServer and WebServer are configured as SNMP agents. You discovered that you are unable to manage ApplicationServer from Monitor1. What should you do?

A. Relocate the ApplicationServer to Toronto office. B. Move ApplicationServer computer account to Toronto domain. C. Add AwesomeA to the list of accepted community names on ApplicationServer. D. Add public to the list of accepted community names on ApplicationServer. E. Remove all community names from ApplicationServer. F. Remove all community names from Monitor2.

Answer: C

Windows Installer

38. You are N/W administrator of a win2k server your n/w contain five win2k server computer and 100 win2k professional computers. You want to deploy an update for an application that is used to the win2k professional computer. You want the users to automatically install the update the driver when they logon the domain. What should u do? (a) Create a DFS, place the application update and the root folder of the DFS (b) Create an Ms windows installer package for the application update and configure the RIS to use the package. (c) Create a MS windows installer package for the application update. Apply the package to the local computer policy on all the computers. (d) Create a MS windows installer package for the package update. Apply the package to the group policy

Answer: D

39. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain.

What should you do?

A. Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package. B. Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy. C. Create a Microsoft Windows Installer package for the service pack. Configure the package in the Local Computer Policy. D. Place the service pack in a Distributed file system (Dfs).

Ans:B

User Profiles

40. Your company has a senior manager named Paul West. Paul uses computers in two different offices. Paul's home folder is stored on a server named UserServer. Paul works with many files that are highly confidential. Paul keeps these files in a folder named Confidential in his home folder. You need to maximize the security of the Confidential folder. You also want Paul to be able to access the folder from computers in each office. What should you do?

A. Obtain a signing and sealing certificate from a certificate server for Paul's account, and install the certificate on the computers that Paul uses. B. Log on at UserServer as the administrator, connect to Paul's home folder, and set the encryption attribute. C. Configure Paul's account to have a roaming user profile, and instruct Paul to use folder properties to set the encryption attribute for his folders. D. Add the cipher /e /s . command to Paul's logon script.

Answer: C

41. You use computers in two different offices. You have folders stored on a server named UserData01. You work with many files that are highly confidential. You keep the confidential files in a folder named Private in your home folder. You need to maximize the security of the private folder. You also want to be able to access the folder from computers in each office. What should you do? A. Obtain a signing and sealing certificate for a certification server, and install the certificate on the computers you use. B. Log on UserData01 as a domain admin, connect to your known folder and set the encryption attributes. C. Configure your account to use roaming user profile. Use the properties of the Private folder to set the encryption attributes. D. Add the cipher/e/s *.* to your computer's start up script.

Answer: C

Terminal Services

42. Your company's network includes Windows 3.1 client computers, Windows 95 client computers and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32 bit application that collects information from the manufacturing processes so that workers on one shift can find out what was manufactured during the previous shift. The company wants to make the application available to all the client computers using terminal services on a Windows 2000 Server computer. The server will not run as a domain controller. You install terminal services. Users want to collect information on manufacturing processes from other shifts. The company wants users to shut down their computers at the end of their shifts and leave the applications running on the terminal server. What should you do?

A. Set the delete temporary folders on exit setting for the terminal server to NO. B. Set the remote desktop protocol on the server to overwrite user settings and set end disconnected setting to NEVER. C. At the terminal server grant the users the right to log on as a batch job. D. Do NOTHING, user programs are always terminated on disconnection.

Answer: B

43. Your company n/w includes Win3.x, win95 client computers and win2000 prof. client computers the company manufacturing facilities are 24 Hrs. a day .The company has developed its own 32bits application that collects the information from the manufacturing process so that workers from one shift can find out what was manufactured in the previous shift .The company wants to make the application available to all the client computers using terminal services on the win 2000 server computer. This server is not configured as DC .You install the terminal services. The IT department needs to be control terminals services users session to support and troubleshoot the application. What should you do to enable the IT department to control users session

A. Configure the terminal server to run in remote administration mode B. Grant the IT department full control to "RDP" on the terminal server C. Add the members of the IT department to the power users group to the terminal servers D. Use the third party software to enable the control of the users section

Answer: B

44. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do?

A. Configure the settings for Internet Connecting Sharing to allow POP3 access. B. Configure the settings for Internet Connecting Sharing to allow SMTP access. C. Give David's user account administrator privileges on the Windows 2000 Server computer. D. Instruct David to log on as a domain administrator on the Windows 2000 Server computer.

Answer: C

45. You are the network administrator for Island Hopper News. The main office has a Windows 2000 workgroup that includes 5 Windows 2000 server computers and 10 windows 2000 Professional computers. Currently no users at the main office have Internet access. Island Hopper News has two remote offices, each with a Windows 2000 workgroup. None of the three offices is networked to another. However, users at the remote office connect to the main office individually to access network resources. A server named Member2 is located at the main office. Member2 has two netowkr adapters. Adapter1 and Adapter2. Adapter1 is connected to the LAN and Adapter2 is connected to a DSL modem which is connected to the Internet. To provide users at the main office with internet access, you enable internet connection sharing on Member2. Now some users at the main office are still unable to access the Internet. You need to ensure that local network resources are always accessible, and you need to ensure that users at the main office have Internet access. What should you do?

A. Configure Internet Connection Sharing (ICS) to be enabled on Adapter1. B. Configure Internet Connection Sharing (ICS) to be enabled on Adapter2. C. Configure Network Address Translation (NAT) on Member2. D. Install a Proxy Server on the company's Network.

Answer: C

46. Your company has five branch offices, which are not networked. On each side you have one Windows 2000 Server computer. The offices WEST and EAST have servers named West1.Testsys.com and East1.Testsys.com, which are configured with RRAS. You have to connect these two branch offices through the internet via VPN. Users from WEST should be able to connect to EAST and vice versa. (You see a picture with five servers and the Internet between them) How should you configure West1.Testsys.com and East1.Testsys.com?

A. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN Server. B. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN Server. C. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN Client. D. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN Client.

Answer: D

3- Hardware devices and drivers

Hardware / Drivers / Settings

47. Your Windows 2000 Server computer uses a SCSI adapter that is not included on the current Hardware Compatibility List (HCL). You install an updated driver for the SCSI adapter. When you start the computer, you receive the following STOP error: "INACCESSIBLE_BOOT_DEVICE." Which two procedures can you use to resolve the problem? (Choose two.)

A. Start the computer in safe mode. Reinstall the old driver for the SCSI adapter. B. Start the computer by using a Windows 2000 bootable floppy disk. Reinstall the old driver for the SCSI adapter. C. Start the computer by using the Windows 2000 Server CD-ROM. Perform an emergency repair. Reinstall the old driver for the SCSI adapter. D. Start the computer by using the Recovery Console. Run System File Checker. Restart the computer. Reinstall the old driver for the SCSI adapter. E. Start the computer by using the Recovery Console. Copy the old driver for the SCSI adapter to the system volume as C:\NTbootdd.sys. Restart the computer.

Answer: C,E

48. You are a member of the Backup Operators Group in the arborshoes.com domain. You are not a member of any other group in the domain. You are logged on to a Windows 2000 Server. You try to configure the software from a tape backup device, but the configuration fails during backup. The documentation from the tape backup device indicates that the current tape driver is out of date and must be updated to support the configuration. What should you do?

A. Run the "runas" command, supply your user name and password to start device manager. Then click the update driver command button on the Driver tab for the tape backup device. B. Instruct a domain administrator to run the "runas" command, supplying the domain administrator user name and password to start device manager. Then click the update driver command button on the Driver tab for the tape backup device. C. Open the device manager, and then click the update driver command button on the driver tab for the tape backup device. D. Run the Add/Remove Hardware wizard, when prompted select the Add/Troubleshoot a device option.

Answer: B

49. You have a Windows 2000 Server and has 2 disk drives attached to the IDE controller. You want more space so you add a new SCSI Controller with 6 disks. The SCSI controller is not in the HCL. You restart the server but it's not dectected. What should you do? (Choose 2)

A. Use Device Manager to turn off IRQ steering in the Properties of the Standard PC. Restart B. Use Disk Management to restore the asic configuration. Restart C. Use Add/Remove Hardware wizard to add new SCSI and RAID controller. D. Use Disk Management to rescan disk E. Use Manufacturer's setup program to install the drivers for the SCSI disk controller.

Answer: C, E

50. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5. You want to resolve the problem. What should you do? A. Use Device Manager to change the IRQ for the original modem to IRQ 9. B. Use Device Manager to change the IRQ for the original modem to IRQ 10. C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices. D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices.

Answer: C

51. You have awin2000 Server wich uses a non plug and play EISA modem that uses IRQ11. you add a second PCI network adapter and restart the computer. You realise that both adapters are trying to use IRQ11. What shoud you do ??

A. Edit the CMOS settings on the computer to reserve IRQ11 for the non-plug and play Devices.

Answer : A

52. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible.

What should you do?

A. Restart the computer by using the last known good menu option. B. Perform an emergency repair and select fast repair, restart the computer. C. Restart the computer in the safe mode, remove the driver and restart the computer. D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver.

Ans:D

53. You have just installed a new SCSI controller driver in Windows NT, but now you cannot got the system to boot properly. No other change has been made to the computer. What is the easiest way to troubleshoot this problem so that the system can boot properly?

A. Boot Windows NT from the Emergency Repair Disk B. Boot to DOS and run Dumpexam.exe from the command prompt C. Invoke the Last Known Good configuration when prompted D. Run the emergency repair process to restore the registry

Ans:C

54. You are installing Windows 2000 Server on a new computer. The manufacturer has provided a customized hardware abstraction layer (HAL) to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

A. During the hardware confimation portion of the Windows 2000 setup install the customized HAL. B. After installing Windows 2000 server,use the recovery console to copy the customized HAL to the system32 folder on the boot partition. C. After the installing windows 2000 setup, use the emergency repair process to install the customized HAL. D. After installing Windows 2000 server, use the device manager to scan for Hardware changes. When prompted, install the customized HAL.

Ans: A

55. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter is missing or is not working. What should you do to resolve the problem?

A. Create a new hardware profile. B. Use Device Manager to remove the integrated 10-MB Ethernet adapter. C. Use Device Manager to disable the integrated 10-MB Ethernet adapter. D. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder.

Ans:C

56. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

A. During the text mode portion of the Windows 2000 setup install the customized HAL. B. After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition. C. After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup. D. After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL.

Ans:A

57. Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do?

A. Configure a Group policy for the Domain that blocks all unsigned drivers. B. Configure a Group policy for the Default Domain Controller to block all unsigned drivers. C. Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers. D. Do nothing, this is the default setting.

Ans:A

58. You have just replaced the video card on your Windows NT computer. When you restart Windows NT, the monitor displays flashing lines. What is the fastest way to resolve the problem?

A. Invoke the Last Known Good configuration when prompted B. Reinstall Windows NT and specify the correct display adapter during setup C. Boot from the setup disks and modify the Display.Ini file in the Winnt\System32 directory D. Select the VGA Mode option from the startup menu to boot Windows NT, then choose the appropriate video card in Display properties

Ans:D

59. You have two SCSI controllers, and two SCSI hard disk drives. You have a fault tolerance that involves the boot and system partition. Second SCSI controller is not BIOS enabled. Which file would you need in order that you boot from the hard drive that is connected to the second SCSI controller ?

A. NTBoot.com B. Scsiboot.com C. NTBootdd.sys D. NTBootdd.com

Ans:C

60. You install a second modem on a Windows 2000 Server computer configured with Routing and Remote Access. Dial-in users report that they are unable to connect to the server by using this new modem. What can you do to help find out the cause of the problem? (Choose Three.)

A. Use the Diagnostics tab in Phone and Modem Options in Control Panel to query the modem. B. Use device Manager to identify any port resource conflicts. C. Use the Routing and Remote Access snap-in to find out whether the ports for both modems are operational. D. From a command prompt, run the Net Config Server command. E. From a command prompt, run the Net Statistics command. F. Use Regedit32 to view the Error Control value in the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess Key.

Answer: A,B,C

61. After you install a new video adapter, one of the users at a remote location reports that Routing and Remote Access does not accept calls. After you resolve the Routing and Remote Access problem, you need to configure the server to prevent users from installing any unsigned device drivers. What two actions should you take in the Driver Signing Option dialog box? (choose two)

A. Set File Signature Verification to Ignore B. Set File Signature Verification to Block C. Set File Signature Verification to Warn D. Select the Apply settings as system default check box

Answer : B, D

62. You configure your Windows 2000 Server as a print server. You install a second PnP Network adapter to improve the performance. The first adapter uses IRQ11, and the second adapter uses IRQ5. The server is now unable to print to print devices connected to a non-PnP LPT2 port adapter. You want to continue to use the print devices connected to your print server. What should you do?

A. Use device manager to change the IRQ for LPT1 to IRQ10. B. Use device manager to change the IRQ for LPT2 to IRQ7. C. Edit the CMOS setting of the servers BIOS to reserve IRQ7 for non-PnP devices. D. Edit the CMOS setting of the servers BIOS to reserve IRQ5 for non-PnP devices.

Answer: D

63. You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible.

What should you do?

A. Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server. B. Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server. C. Delete all references to modems in the registry. D. Run the Modem troubleshooter and remove the modem when prompted. Restart the server.

Answer: A

64. Frequently, a newly installed modem stops communicating with your ISP. The only way to reactive the modem is to restart the computer. You want to install a new driver for the modem. What should you do??

A. In device manager, on the property sheet for the modem, click the Update Driver command Button.

Answer : A

65. You install a second modem on win2000 server computer configure with routing and remote accesss.dial in user reports that they are unable to connect to the server using this modem. What should you do to help fix this problem?

A. Using the routing and remote access (snap in) to find that the input and output modems are operational. B. From command prompt run the "net config" server command C. From command prompt run the "net statistic" command d. se the regedt32 to view the error control value in the HKEY LOCAL MACHINE\system\current control set\services\remote Access key

Ans. A

4- System Performance, Reliability, and Availability

Performance

66. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

A. Add the APP1 and APP2 instances to the processor time counter for the process object. B. Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object. C. Add only the NTVDM instance for the percent processor time counter for the process object. D. Add the NTVDM1 and NTVDM #2 instances for processor time counter for the process object.

Answer: D

67. Every afternoon you run MS-EXCEL locally on Windows 2000 Server computer to update the performance spread sheet. Users report that during this time the server response to the file request appears to be slowed down. What should you do to resolve the problem?

A. Run the start/normal CSRSS command, before you start the EXCEL. B. Run the start/normal EXCEL.EXE command to start excel. C. Use task manager to set the priority for CSRSS.EXE process to above normal. D. Use task manager to set the priority for EXCEL.EXE process to low.

Answer: D

68. Running system monitor locally and ensuring it has least impact on other processes, how do you measure the physical disk performance counters on your win2000 server computer?

A. From the command prompt run the start/low perform command B. Use Task manager to set the priority off the MMC.EXE process to Low

Answer: A

69. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days. the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent. You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

A. Use Computer Management to stop and restart the Server service. B. Use Computer Management to stop and restart the Workstation service. C. Use Task Manager to end any related child processes. D. Use Task Manager to end and automatically restart the Explorer.exe process.

Ans:C

70. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?

A. End the task named Application. B. End the Application.exe process. C. End the Application.exe process tree. D. End both the Explorer.exe process and the Application.exe process.

Ans:C

71. You have used the option of making a system memory dump. How do you extract information from the memory dump file?

A. Debug.exe B. Dumpcheck.exe C. windbg.exe D. Dumpexam.exe

Ans: A

72. Your are experiencing system errors on your Windows 2000 Server computer. Microsoft enterprise technical support has requested a dump of system memory to a file. You have configured a system paging file on your boot partition that is larger than the total amount of system RAM. How should you configure the Windows 2000 Server computer to generate the required dump file?

A. Configure the eventlog service to start automatically B. Configure Dr. Watson for Win NT to create a crash dump file C. Configure system recovery to write an event to the system log D. Configure system recovery to write debugging information to %system root%memory dump

Ans:D

73. How will you create a memory dump file to record the memory contents in case of Stop errors?

A. Use Startup/Shutdown tab in System applet of Control panel B. Use Dr. Watson C. Turn on auditing using User manager for Domains. D. Edit the registry.

Ans:A

74. A Windows 2000 Server computer named Server1 is a file server on your network. Server1 runs numerous 16-bit applications. One of the applications, named App1, stops responding, causing all of the other 16-bit applications to stop responding. You want to isolate App1 for monitoring and troubleshooting purpose. What can you do? (Choose all that apply.)

A. Create a batch file that starts App1 by running the start command with the /separate switch. Use this batch file to start App1. B. Create a shortcut to App1, and select the Run in separate memory space option in the shortcut properties. Use this shortcut to start App1. C. In the properties for File and Printer Sharing for Microsoft Networks, select the Maximize data throughput for file sharing option button. D. In the properties for File and Printer Sharing for Microsoft Networks, select the Balance option button.

Answer: A,B

75. You install a new server application on your Windows 2000 Server computer. Response times fail to meet user specifications. You want to use the Process page in Task Manager to find out whether the response time of new application would improve by the addition of one or more processors. Which two columns should you select to view? (Choose two.) To answer, click the two appropriate check boxes in the Select Columns dialog box. Display image

A. User Objects B. Virtual memory size C. Memory usage delta

D. CPU usage

E. Page faults

F. Thread count

G. Handle count

H. I/O write bytes

I. Base priority

Answer: D, F

76. How can you assign an application to one processor exclusively?

A. Right click on application executable, select properties and select assign processor. B. Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor. C. Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor. D. Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor.

Answer: B

77. Your company network includes a PentiumII, 450Mhz database server names Webdata1. Webdata1 supports a high-traffic e-commerce web site on a server names Webserver1. Users access the e-commerce website from their Internet browsers. Users report that when they attempt to complete a purchase, they must wait five minutes for confirmation that their order has been processed. You want to use Task Manager to help you decide whether an additional processor is needed. What should you do?

A. On the performance tab, select the option to monitor the system cache. B. On the performance tab, select the option to monitor the available physical memory. C. On the process tab, select the option to monitor the memory usage column, Monitor this column. D. On the proces tab, configure the view to include the thread count column, Monitor this column. E. On the proces tab, configure the view to include the page faults column, Monitor this column.

Answer: D

Recovery Console / Boot Problems

78. You are the administrator of Windows 2000 Server network . On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?

A. Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume. B. Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume. C. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command. D. Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility.

Answer: A

79. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?

A. Restart the computer by using the last known good menu option. B. Perform an emergency repair and select fast repair, restart the computer. C. Restart the computer in the safe mode, remove the driver and restart the computer. D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver.

Answer: D

80. You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with a single NTFS partition. You use a third-party tool to add a new partition to the disk. When you restart the server, you received the following error message: "Windows 2000 could not start because the following file is missing or corrupt: \system32\ntoskrnl.exe. Please re-install a copy of the above file." What should you do to resolve the problem?

A. Start the computer by using the Recovery Console. Run System File Checker. B. Start the computer by using the Recovery Console. Modify the Partition parameter in the operating system path in C:\Boot.ini C. Start the emergency repair process. Choose the option to repair system files. D. Start the computer in safe mode with command prompt. Modify the Partition parameter in the operating system path in C:\boot.ini.

Ans:B

81. A STOP error occurs every time you start your windows 2000 Server computer. You find that no dump file exists on the disk. What must you do to enable creation of a dump file?

A. Create a new pagefile.sys in system root. B. Create a new pagefile.sys on the root of drive C. C. Add /sos to the operating system path in boot.ini. D. Add /crashdebug to the operating system in boot.ini.

Ans:A

82. Your network includes windows 98 computers and Windows 2000 Professional computers. You are adding a new computer to the network. You plan to install Windows 2000 Server computer on the new computer. The computer has one 20 GB hard disk with no partition defined. The Windows 2000 Server computer CD ROM is unavailable. You want to install windows 2000 server from the source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition. What should you do?

A. On another windows 2000 computer use makebt32.exe to create installation startup disks. Start the computer by using the first disk. B. On another Windows 2000 computer format a floppy disk. Copy NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by using the disk. C. Start the new computer by using the Windows 98 network boot disk. Connect to the server. Run dsclient.exe. Create and format 20GB FAT32 partition. D. Start the new computer by using the Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to network server. Run winnt.exe. E. Start the computer by using Windows 98 network boot disk. Create and format a single Fat 32 partition. Start the new computer by using the Windows 2000 emergency repair disk.

Ans:D

83. You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

A. Restart the computer in safe mode. Then restart the computer again. B. Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command. C. Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command. D. Restart the computer by using the last known good configuration.

Ans:D

84. You are the network administrator for your company. As part of your disaster recovery plan, you create an emergency repair disk for each computer on your network. you also perform full daily backups. You install a custom application on a server named member1. you restart member 1 and receive the following error message “Invalid Boot.ini file”. What should you do to restore the boot.ini file?

A. Reboot member 1 by using the Windows 2000 Server CD. Lunch recovery console. Run the fixboot command with the appropriate parameters. B. Reboot member 1 by using the Windows 2000 Server CD. Launch recovery console. Run the fixmbr command with the appropriate parameters. C. Restart member 1 into safe mode. Launch Windows 2000 backup. D. Restart member 1 into safe mode. Run the Chkdsk command with the appropriate parameters. E. Reboot member 1 try using the Windows 2000 Server CD. Launch recovery console. Run the copy command with the appropriate parameters

Ans:A

Others

85. You are an administrator of your company's network. You want to perform routine upgrades on your Windows 2000 Server computer. You use your non administrator user account in the domain to log on to the server. You want to update all of the critical system files on the server in the shortest possible time. What should you do?

A. Run Windows Update. B. Run System File Checker. C. Log on as an Administrator and run Windows Update. D. Log on as an Administrator and run System File Checker.

Answer: C

86. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do?

A. Configure the settings for Internet Connecting Sharing to allow POP3 access. B. Configure the settings for Internet Connecting Sharing to allow SMTP access. C. Give David's user account administrator privileges on the Windows 2000 Server computer. D. Instruct David to log on as a domain administrator on the Windows 2000 Server computer.

Answer: C

87. You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server. What should you do?

A. Install the Windows 2000 Resource Kit. B. Install Windows critical update notification. C. Configure system file checker to notify the branch offices. D. Configure Windows file protection to notify the branch offices.

Answer: B

88. When directly editing the registry with Regedt32.exe, what can be done to ensure that unwanted changes aren't made accidentally? Choose the best answer:

A. Nothing needs to be done. NT prompts for confirmation and displays warning messages when changes are unsafe. B. Use Registry Editor rather than Regedt32. C. Select read-only mode in the options menu. D. Just don't make a mistake.

Ans:C

89. You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full backups of each domain controller. You run a script to make changes to account information in Active Directory. As a result of errors in the script, the incorrect user accounts are modified. Active Directory replication then replicates the changes to the other two domain controllers. You want to revert Active Directory to the version that was backed up the previous day. What should you do?

A. On a single domain controller, use Windows Backup to restore the System State data. Shut down and restart the computer. B. Shut down and restart a single domain controller in directory services restore mode. Use Windows Backup to restore the System State data. Run the Ntdsutil utility. Restart the computer. C. Shut down and restart a single domain controller by using the Recovery Console. Use Windows Backup to restore the System State data. Exit the Recovery Console. Restart the computer. D. Shut down and restart each domain controller by using the Recovery Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery Console. Restart the computer.

Answer: B

90. The Litware.Inc.,nerwork has three main network segments and six domain controllers.

Server Server Server srv1.west.litware.com---| srv2.west.litware.com |--- srv3.west.litware.com Tape---------------| | | | Router-----------Router-------------------Router | | | srv4.west.litware.com---| srv5.west.litware.com |--- srv6.west.litware.com Server Server Server

You back up all of the system state date for each domain controller and place the date on a single tape.That tape is currently attached to the srv1.west.litware.com computer.To which server or servers can you restore the system state from srv1.west.litware.com(choose all apply) A.srv1 B.srv2 C.srv3 D.srv4 E.srv5 F.srv6

Answer: A

91. You have 6 domain controllers srv1, srv2, srv3, srv4, srv5, srv6, in three main segments. You back up all System State data of your network. The tape device is attached to srv1.

To which server can you restore the System State data.

A. Any server. B. Any server that is on the same segment of srv1. C. Any server on a different segment than srv1. D. Only to server srv1.

Ans:D

5- Managing, Configuring, and Troubleshooting Storage Use

Partitioning & Disk Failure

92. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first?

A. Replace the third disk and restart the server. Use Disk Management to repair the volume. B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk. C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume. D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition.

Answer: B

93. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

A. Replace Disk 1 and restart the computer. The mirror will automatically regenerate. B. Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1. C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer. D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror.

Answer: B

94. You upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The computer has two hard disks. The system and boot partitions are located on two primary partitions on Disk 0. Both partitions are mirrored on Disk 1. One month later, Disk 1 fails. You replace the disk with a disk taken from another Windows 2000 computer. When you try to repair the fault-tolerant volumes by using Disk Management, you find that the Repair Volume option is unavailable. You want to repair the mirror set. What can you do? (Choose two.)

A. Delete all volumes on Disk 1. Change Disk 1 back to a basic disk. Repair the fault-tolerant volumes on Disk 0. B. Create two new volumes on Disk 1. Copy all the data from the two disk partitions on Disk 0 to the two volumes on Disk 1. C. Break the mirror set. Convert Disk 0 to a dynamic disk. Create a mirror on Disk 1. D. Create a single volume on Disk 1. Copy all the data from Disk 0 to the single volume. Convert Disk 0 to a dynamic disk.

Answer: A, C

95. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?

A. Convert both to dynamic disks. B. Create an empty extended partition on new disk C. Create a single unformatted primary partition on new array. D. Format new disk array as a single NTFS primary partition. E. Format the new disk array as a single NTFS logical drive in an extended partition.

Answer: A

96. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

A. Convert the disk to dynamic disk shut down and restart the server. B. Backup the data on the stripe volume and delete the stripe volume. Create a raid5 volume on the four disks, restore the data to the new raid5 volume. C. Backup the data on the stripe volume and delete the stripe volume. Create to mirror volume, shut down and restart the server. Restore the data to new mirror volumes. D. Backup the data on the stripe volume and delete the stripe volume. Create a span volume for the first two disks, create a second span volume for the last two disk. Mount the root of the second span volume in the root of the first span volume. Restore the data to the first span volume.

Answer: B

97. You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

A. Extend the span volume to include the new disk, rescan the disk. B. Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data. C. Re scan the disk, format the span volume. Use windows back up to restore the data. D. Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data. E. Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data.

Answer: E

98. Your Windows 2000 Server is configured with 6 SCSI hard disks. One hard disk is the System disk and the other five are configured as a Stripe Set. After a power outage one of the hard disk in the Stripe Set fails. How can you replace the hard drive and recover from the Power outage?

A. Use disk administrator to regenerate the data on the new drive. B. Recreate with Stripe Set across the five disks and restore from backup. C. Copy the lost data from the tape backup to the new drives. D. Start the Emergency Repair Process.

Ans:B

99. You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks?

A. Convert all three disks to dynamic disks. Create a striped volume. B. Convert all three disks to dynamic disks. Create a RAID-5 volume. C. Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1. D. Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks.

Ans:A

100. You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific Client-Server application to run on, because the application gets very slow returning query data. You want to have the fastest possible access for the Client-Server App to the HDD’s. Which Raid should you apply?

A. RAID0 B. RAID1 C. RAID5 D. RAID2

Ans:A

101. Your computer has a mirrored volume and you wish to now install the Recovery Console for future troubleshooting. How do you do this?

A. Reinstall Windows, this can only be applied during the installation. B. Break the mirror, run X:\i386\winnt32.exe /cmdcons Reestablish the mirror. C. Run X:\i386\winnt32.exe /cmdcons. D. Run the add and remove programs and add the recovery console.

Ans:B

102. Your Windows 2000 Server computer has two SCSI hard disks. The hard disks are configured as SCSI ID 0 and SCSI ID 1 on a single SCSI host bus adapter. The hard disks are mirrored and each hard disk is formatted with a single NTFS partition. One of the hard disks has just failed. After replacing the failed hard disk with a new disk, what else should you do to recover from the hard disk failure?

A. Choose Establish Mirror in disk administrator B. Choose Break Mirror in disk administrator and then choose regenerate in Disk Administrator C. Choose Break mirror in disk administrator and then choose establish mirror in disk administrator D. Wait for Windows NT to regenerate the mirror

Ans:C

103. You replaced one SCSI hard disk after a mirror set up failure. What else would you do?

A. Break mirror and "establish mirror" in Disk manager option. B. Break mirror and "regenerate mirror" in Disk manager option. C. Wait for NT to restart.

Ans:A

104. You have a Windows 2000 Server with six SCSI disks. On one disk is the system partition, and the other five are in a stripe set. One disk failed and you replaced the disk. What must be done next in the disk administrator?

A. Choose regenerate in the fault tolerance menu B. Choose make stripe set with parity and restore from backup C. Choose make stripe set and restore from backup D. Choose restart in the fault tolerance menu

Ans:C

105. Your Windows 2000 Server is configured with 5 SCSI hard disks. The first hard disk contains the System and boot partitions. The other four drives are configured in a Stripe Set with Parity. The first hard drive fails after power outage. After replacing the hard drive what do you have to do to recover from the failure?

A. Reinstall the 2000 Server and restore registry from tape backup. B. Reinstall the 2000 Server and restore the registry using ERD created during installation. C. Reinstall the 2000 Server. Recreate the user and group accounts, and account policies. D. Use Disk administrator to regenerate the data on the new drive.

Ans:A

106. You Windows 2000 Server computer contain four hard disks of different sizes. Each hard disk is configured as a basic disk and has a single 5-GB partition. All four disks have the amount of unpartitioned space shown in the following table:

Disk Unpartitioned Space Disk 0 3-GB Disk 1 4-GB Disk 2 3-GB Disk 3 8-GB

On each hard disk, you create a second partition that uses the remaining unpartitioned space on the disk. You create an 18-GB stripe volume that includes all four of the new partitions. Six months later, disk 1 fails. You replace it with a new hard disk, and create the necessary partitions. As quickly as possible, you need to retrieve the data that was contained on disk 1. What should you do?

A. Restore the first partition on disk 1 from the most recent tape backup. Use disk management to repair and rebuild the stripe volume. B. Delete and re-create the stripe volume. Restore the contents of disk 1 from the most recent tape backup. C. Restore both partitions on disk1 from the most recent tape backup. D. Delete and re-create the stripe volume. Restore the first partition on disk 1 and then stripe volume from a recnt tape backup.

Ans:A

Disk Utilities

108. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?

A. Convert the disk that contains the shared folders to a dynamic disk. B. Convert the partition that contains the shared folders to NTFS. C. Defragmenter the disk that contains the shared folders. D. Move the paging file to the partition that contains the shared folders.

Answer: C

109. Your Windows 2000 Server contains two hard disks. Each disk is partitioned as a single primary partition. The first disk is formatted as FAT32, the second as NTFS. You compress shard folders on second disk. When users move compressed files from a Shared folder on the second disk to a shared folder on the first disk, the files lose their compression. What two actions should you take to ensure that all files moved from folders on the second disk to shared folders on the first disk remain compressed?

A. Convert the first disk to NTFS. B. Compress the shared folders on the first disk

Answer: A, B

110. You have two Windows 2000 servers, SRV1 and SRV2. SRV1 has a spanned volume over three physical disks. These disks support hot swapping. The drive letter that the spanned volume uses on SRV1 is not currently in use on SRV2. You want to move the three disks to SRV2, using the same drive letter as SRV1. You back up the spanned volume. What should you do next??

A. Move the disk from SRV1 to SRV2. B. on SRV1 rescans the disks. On SRV2, rescan the disks

Answer: A, B

111. You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the Systemroot\Temp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?

A. On the second partition, create a shared folder named Temp. B. In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk. C. Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new partition. D. Add a second hard disk. Delete the contents of the Systemroot\Temp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the Systemroot\Temp folder.

Ans:D

112. You are the administrator of a Windows 2000 Server computer. The server contains a RAID-5 array that is configured as a volume D and an 18-GB hard disk that is configured as volume C. Volume D is formatted as NTFS, contains 60GB of data, and has 2GB of free disk space. Volume C is formatted as FAT32 and has 16GB of free disk space. The server is used to store user home folders. Most of the data in the home folders has been encrypted with the encrypted with the encrypted file system. You estimate that the sever will need an additional 10-GB disk space to meet user needs. However, you will not be able to purchase additional hard disks for three months. You want to immediately free at least 10-GB of the disk space. You do not want to compromise the security of the user’s files. What should you do?

A. Instruct the users to move at least 10-GB of data to another file server that has EFS. B. Create additional shared folders on volume C. Move 10-GB of data to the new, shared folders. C. Copy at least 10-GB of data to a writeable CD-ROM. Delete these files from the server. D. Enable the compression attribute for the volume, and compress the users’ home folders. Ensure that EFS remains enabled on the home folders

Ans: A

113. You have 5 SCSI drives. You have created an ERD disk during installation. Now you have made some changes in the configuration of the SCSI drives. You want to save the changes for future use. What will you do?

A. Use RDISK.EXE to create a new ERD to take account of the new configuration change. B. Use SCSI applet in Control Panel C. Use NT Backup Program D. Use Disk Administrator

Ans: A

114. You are the administrator of Windows 2000 Server computer. Volume D is formatted as NTFS. Volume D contains folders that are shared by departments within your company. You want to limit the amount of disk space that the shared folders can store. a user named Richard has stored 10GB of files in the shared folders. Richard’s files are using more disk space on the shared folders than any other user’s files. You enable disk quotas on Volume D and create a default quota entry. You set the quota limit to 1.1 BG and select the Deny disk space to users exceeding quota limit check box. When Richard attempts to encrypt the files in his home folder be using the encrypted file system he receives the following error messages, ‘There is insufficient disk space to complete the operation’. You need to allow Richard to encrypted the files in his home folder. You also need to maintain Which three actions must you have? (Choose Three)

A. Create a quota entry for Richard, and select the Do not limit disk space check box. B. Instruct Richard to encrypt the files in his home folder. C. Run the Cipher.exe/d command D. Enable the compression attribute on Richard’s home folder. E. Set the Richard’s quota limit to equal the amount of disk space used by the files in his home directory. F. Set the default quota entry on volume D to 12GB, and clear the Deny disk space too users exceeding quota limit check box.

Ans: ABE

115. You install the boot volume D on your Windows 2000 Server computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1. One year later, during routine server maintenance, you open Disk Management and find that the status of volume D is Failed Redundancy. The status of Disk 1 is Online (Errors). A symbol with an exclamation point appears in the graphical view of the disk. You want to return the status of the boot volume to Healthy. What can you do? (Choose two.)

A. Break the mirror, delete the volume on Disk 1, and re-create the mirror. B. Replace Disk 1, copy the data from the boot volume to the new disk, and then use Disk Management to rescan the disks. C. Replace Disk 1, Ensure that the new disk is a basic disk, and repair the volume. D. Reactivate the mirror on Disk 1. E. Convert Disk 1 to a basic disk, and reconvert it to a dynamic disk.

Answer: A,D

116. Your hard-drive configuration is as follows and one of your drives fails.

Controller label 1 Disk label EIDE Controller 0 EIDE Disk 0 and Disk 1

Controller label 2 Disk label SCSI Controller 1 SCSI Disk 0, 1, 2, 3, 4, 5, 6

The disk that fails is multi(1)disk(0)rdisk(1)partition(1). Place an "X" on the drive that has failed in the configuration below: ID Disk

A. EIDE 0 (disk 1) B. EIDE 1 (disk 2) C. SCSI 0 (disk 1) D. SCSI 1 (disk 2) E. SCSI 2 (disk 3) F. SCSI 3 (disk 4) G. SCSI 4 (disk 5) H. SCSI 5 (disk 6)

Answer: D

117. Your Windows 2000 Server computer contains four 16GB hard disks. Disk0 is configured as a basic disk. Disk0 has a single 16GB partition that contains the boot and system files. Disk 1, 2 and 3 are configured as dynamic disks in a RAID5 volume. The entire server is backed up to a tape drive each night. During your daily review of the servers event logs, you discover that Disk1 has failed. You shut down the server and replace Disk1 with a new hard disk. When you restart the server Windows 2000 starts normally, but the data on the RAID5 volume is inaccessible. Disk Management indicates that Disk2 has failed too. You replace Disk2 with a new hard disk. Now you need to recover the data on the RAID5 volume as quickly as possible. What should you do?

A. Use Disk Manager to rebuild RAID5 partition. B. Delete and recreate the RAID5 partition. Restore the contents of RAID5 partition from the most recent tape backup. C. Use Windows 2000 backup to restore the contents of Disk2. Use Disk Manager to rebuild the RAID5 partition on Disk1. D. Delete and recreate the RAID5 partition. Restart the server by using Windows 2000 Setup CD, and select repair option.

Answer: B

118. You are the administrator for your company. Your Windows 2000 Server computer contains two 23GB hard disks. Each disk is configured as a basic disk and has a single 23GB NTFS partition. Both partitions are backup up to tape every night. The partition on Disk1 stores user data. Most users of your company encrypt their files. Disk1 fails. You replace it with a new disk. You need to recover the data as quick as possible while maintaining the security of the files. What should you do?

A. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Run the cipher /d /i command. B. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Instruct the users to verify the integrity of their files. C. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Logon to the server console as a recovery agent. Copy the files from the second file server to the new partition. D. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Instruct users to copy their files from the second file server to the new partition.

Answer: B

Compression & Encryption

119. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved? (Choose all that apply.)

A. Compress the files in her home folder to save disk space. B. Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level. C. Move some of the files from her home folder to the IN_PROGRESS shared folder. D. Remove files from her home folder until the total uncompressed file size is less than 100 MB.

Ans: D

120. You share a folder on a Windows 2000 Server computer for users in your company's London office. You place several subfolders in the London folder as shown in the exhibit. The Marketing-2 folder is compressed. You want to move some files from the Research folder into Marketing-2, and you want to make sure that the files are compressed when you move them. However, you do not want to compress the remaining files in Research. What should you do?

A. Move each of the files from Research to Marketing-2. B. Copy the files from Research to Marketing-2, and then delete the original files. C. Compress Research, apply changes to the folder only, and then move the files from Research to Marketing-2. D. Encrypt Marketing-2, move the files from Research to Marketing-2, and then decrypt Marketing-2.

Ans:B

Quota

121. Trey Research has a Windows 2000 Server computer named User_srv. This computer has a RAID-5 controller. The RAID array is configured as two partitions. Drive C is a 2-GB partition that holds the operating system and paging file. Drive D is a 30-GB partition that will hold the home folders for 200 users. Trey Research employs 10 scientists. The user accounts for scientists are members of a group named Scientists. The scientists use a data capture application that generates files that can be lager than 100 MB. Trey Research wants to use disk quotas. Ordinary users should be allowed to store a maximum of 75 MB of data is their home folder. The storage for users in the Scientists group should not be limited by quotas. What should you do to configure this disk quota scheme? (Choose two.)

A. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit Check box. Set the default quota limit to 75 MB. B. Create a Scientist template account. Create a new quota entry for this account. Select the Do not limit disk usage for this entry option button. C. Create new quota entries for the 10 scientists' user accounts. Select the Do not limit disk usage for this entry option button. D. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit check box. Select the Do not limit disk usage option button for the default quota limit. E. Create a Scientist template account. Create a quota entry for this account. Set the quota limit to 30 GB.

Answer: A, C

6- Windows 2000 Network Connections

DNS

122. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?

A. Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone. B. Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone. C. Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone. D. Configure at least two servers with Active Directory integrated primary zones for the domain. E. Configure at least two servers with standard primary zones for the domain.

Answer: D

123. Your company has a main office and 50 branch offices. The main office has a private network with 1,000 computers. Each branch office has a private network with between 10 and 20 computers and a 56-Kbps connection to the Internet. The company plans to use the Network Address Translation (NAT) feature of Routing and Remote Access to provide each office with access to the Internet. When you test this configuration, you discover that connections cannot be made to sites by using fully qualified domain names. However, connections can be made to these sites by using their IP addresses. You want to be able to make connections by using fully qualified domain names. What should you do?

A. Configure the computers on each of the branch office networks with the address of a WINS server. B. Configure the computers on each of the branch office networks with the address of a DNS server on the Internet. C. Configure a filter on the NAT servers to pass DNS packets. D. Create a host file on each of the NAT servers.

Ans:B

124. How can you recreate the PTR record in your Windows 2000 DNS server from you Windows 2000 client?

A. Run ipconfig /registerdns from the client. B. Run ipconfig all /registerdns from the DNS server. C. Start the DNS Dynamic service on your client computer. D. Create a host file with the #DYNAMIC command on the client computer.

Ans:A

125. You have installed routing and remote access for Windows 2000 on a server named Srv004. Your internal DNS, WINS, and DHCP services are running properly in the environment. You want this server to provide internet access for users on that network segment by using network address translation over a demand dial interface to your internet service provider. You have installed the NAT protocol and configured the correct public and private interfaces. All client computers have their default gateway set to the private address of Srv004, and can successfully ping the gateway . users can’t connect to internal network computers correctly, but network traffic does not reach the ISP. You need to ensure that all users can access the internet. What should you do?

A. Configure the DNS as a forwarder to your ISP’s DNS. B. Configure your ISP’s DNS as a secondary to your DNS. C. Install the RIP version 2 protocol in routing and remote access for Windows 2000 on Srv004. D. Add a static route of 0.0.0.0.0.0.0.0 in routing and remote access for Windows 2000 on Srv004. E. Add a static route of 0.0.0.0.0.0.0.0 by using the route-p add command Srv004.

Ans:A

126. Your Windows 2000 server provides DNS for you network. You are not able to ping a Unix server called Unix1. You add a record to your server DNS for the Unix server, but you still are unable to ping the server. What should you do? (pick two)

A. Restart DNS on the Windows 2000 server. B. Windows 2000 server does not support Unix server entries. C. Run ipconfig /registerdns on the unix server. D. Stop the DNS client service and restart it. E. Run the ipconfig /flushdns command.

Answer: D,E

DHCP

127. Your network is configured as shown in the exhibit. "Engineering1 and Sales1 have DHCP installed up them." All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Sales1 and Sales2. The engineering department uses another subnet and has servers named Engineering1 and Engineering2. Sales1 and Engineering1 are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Sales1 and Engineering1 to support client computers on each other's subnets. What should you do?

A. Set the router option in the DHCP Scopes to 192.168.2.1 for Engineering1 and 192.168.1.1 for Sales1. B. On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol. C. On Engineering2 and Sales2, install and configure the DHCP Relay Agent service. D. Configure Engineering2 and Sales2 as DHCP servers without any scopes.

Ans:C

Networking

128. Your network contains NetWare 4.0 Servers. You have successfully installed Client Service for NetWare on Windows 2000 Professional computers, and Gateway Service for NetWare on Windows 2000 Server Computers. You recently added a new Windows 2000 Server computer to the network and installed Gateway Service for NetWare on it. However, the server is unable to connect to any NetWare servers. What should you do on the new Windows 2000 Server computer to resolve this problem?

A. Enable NWLink NetBIOS. B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use the correct Ethernet frame type. C. Install RIP routing for IPX. D. Install the SAP Agent.

Answer: B

129. Your network uses the TCP/IP protocol for its Windows 2000 prof and win2000 NT computers. You have ooneserver that acts as both a Wins server, and a DNS server. All the client computers are configured to use this server for DNS and WINS. Users of Windows NT Workstation cannot connect to file server, but Windows 2000 professional users can. This server has a static address off 192.168.1.11. What should you do to allow the Windows NT Workstation computer to connect to the file server??

A. Select the Enable NetBIOS over TCP/IP. B. Add the WINS address used by the Windows NT Workstation computers.

Answer: A, B

130. Router problem, what should you use to identify it?

A. Network Monitor B. NBTSTAT C. IPCONFIG D. TRACERT

Ans: D

131. You have an 2000 Server that has two network interface cards that are installed on the same network segment. Both cards are bound to TCP/IP and NetBEUI. When you restart the server, you get an error message about having duplicate server names on the network. What should you do to fix this?

A. Unbind NetBEUI from one NIC B. Unbind TCP/IP from one NIC C. Create a MH entry in LMHOSTS D. Create a static entry on the WINS server

Ans:A

132. You are the administrator of a routed Windows 2000 network. The network includes 25 Windows 2000 Server computers. You want to install a new Windows 2000 Server computer as the first computer on a new routed segment. You configure the existing DHCP server with a scope that is valid for the new routed segment. During the installation of the new Windows 2000 Server, you specify that the server should obtain its IP address from an existing DHCP server. After you complete the installation, you open My Network Places. You see the new server but no other computers. You run the ipconfig command and find that the new server's assigned IP address is 169.254.1.200, with a 16-bit subnet mask and no default gateway address. You want to resolve the problem so that you can see other computers on the routed network. What can you do? (Choose two.)

A. Configure all of the routers to route BOOTP broadcast frames. B. Configure the default gateway to the TCP/IP properties of the new server. C. Add the IP address for the default gateway to the TCP/IP properties of the new server. D. Add a DHCP Relay Agent computer to the new routed segment. E. Add a WINS server to the new routed segment.

Answer: A,D

133. You are installing a new computer named Svr2.justtogs.com on your Windows 2000 network. Part of the network is shown in the exhibit. Svr2.justtogs.com IP(10.1.2.100/16--------------------router IP(10.1.2.1 submask 255.255.0.0) You want to enter the appropriate TCP/IP addresses for the subnet mask and the default gateway for Svr2.justtogs.com. Which subnet mask and default gateway should you use? To answer, drag the appropriate addresses to the appropriate boxes in the Internet Protocol (TCP/IP) Properties dialog box.

A. What is the answer?

Answer: A The first router on your computer subnet will be your default gateway and subnet. The IP scheme and subnet will match yours, the router will be configured to route the request out to the network you are looking for. Example Svr2 has an IP of 192.168.201.8/24 the router will have more than one address assigned but yours will be something like 192.168.201.1/24

134. Server1(IP1)<------------------------>(IP2) Router(IP3)<----------------------->(IP4) Server3 |(IP5) | | (IP6) Server2

Server1 wants to talk to Server2, Which IP address is default gateway for Server1, Click on the graphic to answer.

A. IP1 B. IP2 C. IP3 D. IP4 E. IP5 F. IP6

Answer: B

135. The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

A. Configure a client computer to use only TCP/IP for the connections to the remote access server. B. Configure the client computer to use a defined IPX network address for the connection to the remote access servers. C. Configure the remote access server to allow IPX based remote access demand dial connections. D. Configure the remote access server to disable multi-link connection.

Answer: A

136. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. (See the exhibit of the network layout). What would you do to monitor Application server? (Choose two)

A. Install Network Monitor on Monitor 1 B. Install Network Monitor on Application Server C. Configure the network monitor ECP port comething for TCP D. Configure the network monitor EDP port something for UDP E. Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance

Answer:

137. You are a network administrator at Contoso, Ltd. You work at the main office in Seattle. The branch office in Denver is a call center. The network consists of a Windows 2000 domain only. The network is configured as shown in the exhibit. Denver is a Token Ring network. Seattle is an Ethernet network. None of you network adapters at Contoso, Ltd. support promiscuous mode. The brouter does not support multicast traffic. Wks1.contoso.com and mem1.contoso.com are available for use as network monitor clients. You want to be able to detect and identify rogue installations of network monitor on your network by using the fewest possible computers. What should you do? (check all that apply)

A. Install network monitor tools on wks1.contoso.com by using the Windows Components wizard. B. Install the SNMP protocol on wks1.contoso.com by using the Windows Components wizard. C. Install network monitor tools on mem1.contoso.com by using the Windows Components wizard. D. Install the SNMP protocol on mem1.contoso.com by using the Windows Components wizard. E. Install a network adapter on wks1.contoso.com that supports promiscuous mode. F. Install a network adapter on mem1.contoso.com that supports promiscuous mode.

Answer: A,C

138. You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all netowkr traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

A. Set the second adapters status to disable. B. Configure the first adapter to use a TCP/IP metric of 100. C. Configure the second adapter to use a TCP/IP metric of 25. D. Configure the binding order on the second adapter to bind TCP/IP last.

Answer: C

139. Your network consists of a Windows 2000 Server computer and 10 Windows 2000 Professional computers. The Windows 2000 Professional computers use a modem and a dial-up connection each to connect to the Internet. Now, you rent a single DSL-Line which will be configured on your Windows 2000 Server computer. You install Internet Connection Sharing (ICS) on the server. All Windows 2000 Professional computers have to use ICS. How should you configure all Windows 2000 Professional computers to connect to the internet without changing or removing the existing dial-up connection? (Choose all that apply)

A. In Internet Options select "Never dial a connection". B. In Local Area Network Settins set "Use automatic configuration script". C. In Local Area Network Settins set "Automatically detect settings". D. In Local Area Network Settins set "Use a Proxy Server". E. In Local Area Network Settins set "Bypass Proxy Server for local addresses".

Answer: A, C

140. You are the administrator of a Windows 2000 network. You have installed the SNMP agent on one of your Windows 2000 Server computers. You want to collect routing information on a second Windows 2000 Server computer running a third party Network Management Console. How should you configure the SNMP agent? (Click to put a crosshair in the appropriate checkbox)

A. Physical B. Applications C. Datalink and subnetwork D. Internet E. End-to-end

Answer: C

141. You install the Routing and Remote Access service on a Windows 2000 Server computer in your network. Your network is not directly connected to the Internet and uses the private IP address range 192.168.0.0. When you use Routing and Remote Access to dial in to the server, your computer connects successfully, but you are unable to access any resources. When you try to ping servers by using their IP addresses, you receive the following message: "Request timed out." When you run the ipconfig command, it shows that your dial-up connection has been given the IP address 169.254.75.182. What should you do to resolve the problem?

A. Configure the remote access server with the address of a DHCP server. B. Authorize the remote access server to receive multiple addresses from a DHCP server. C. Configure the remote access server to act as a DHCP Relay Agent. D. Ensure that the remote access server is able to connect to a DHCP server that has a scope for its subnet.

Ans:D

142. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do?

A. Grant the users the right to log on as a service. B. Grant the users the right to log on locally. C. Grant the users the right to log on over the network. D. Copy the users' profiles to the Terminal server. E. Copy the users' home folders to the Terminal server.

Ans:B

143. The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

A. Configure a client computer to use only TCP/IP for the connections to the remote access server. B. Configure the client computer to use a defined IPX network address for the connection to the remote access servers. C. Configure the remote access server to allow IPX based remote access demand dial connections. D. Configure the remote access server to disable multi-link connection.

Ans:A

144. You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection to the remote location?

A. NAT does not allow for remote networking. B. L2TP does not work with Windows 2000 computers. C. You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted. D. You have not configured the NAT server to translate the IP Security packets.

Ans:C

145. You install a new application on a computer running Terminal Services in Application Server mode. Users of this application must have access to files stored on a computer running Netware 4.11. TCP/IP is not installed on the computer running Netware. What steps should you take to enable Terminal Services clients to access the computer running NetWare?

A. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.2. B. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3. C. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.3. D. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3.

Answer: A

7- Installing, Monitoring, and Troubleshooting Security

Group Plicy / GPO

146. You are the administrator of a Windows 2000 Server network. You configure two sites: one for your New York office and one for your Paris office. You configure two organization units (OUs) named New York and Paris. In each of these OUs, you create subordinate OUs named Sales, Marketing, and Research. You place user accounts, stand-alone member servers, and Windows 2000 Professional computers in their appropriate subordinate OUs. You suspect that someone is trying to log on to your domain by guessing user account names and passwords. You want to fine out which computers are being used for these logon attempts. What should you do?

A. Edit the Default Domain Controllers Policy object to audit directory services access failures. B. Edit the Default Domain Policy object to audit account logon failures. C. Edit the New York OU and Paris OU Group Policy objects (GPOs) to audit logon failures. D. Edit the Group Policy object (GPO) of each subordinate OU to audit directory service access failures.

Answer: B

147. You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

A. Enable the background refresh settings to use the default group policy refresh date. B. Enable the asynchronous group policy application settings. C. Enable and configure the group policy refresh interval for domain controller. D. Enable and configure the group policy refresh interval for computers.

Answer: D

148. You have configured a Group Policy Object (GPO) for the marketing organization unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do?

A. Add the Managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy. B. Add the Managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the Group Policy. C. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Deny the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to deny the ability to run system Control Policy Panel. Give the original GPO a higher priority than the new GPO. D. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Disable the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the original GPO a higher priority than the new GPO.

Answer: D

149. You are the administrator of a Windows 2000 Active Directory Network. The network consists of a single domain named adatum.local that runs in native mode. The domain includes 500 member client computers, consisting of 200 Windows 2000 Professional computers and 300 Windows NT Workstation 4.0 computers. You create a Group Policy for the Research organizational unit (OU) and configure the Policy as shown in the exhibit. None of the users in the Research OU working at Windows 2000 Professional computers can change the wallpaper on their desktops or the resolution and colour depth of their displays. However, when users log on from any of the Windows NT Workstation computers in the OU, they can change all display settings. You want to restrict all users of Windows NT Workstation computers in the OU from changing their desktop wallpaper and from accessing the settings tab in Display in Control Panel.What should you do?

A. Add a new computer to the OU and select the "Allow Pre-Windows 2000 computers to use this account" check box. B. Change the Group Policy so that it also hides the Background tab. C. Create a seperate Group Policy for a nested OU that contains all Windows NT computers. D. Configure a Windows NT Policy file and place it in the winnt\sysvol\Adatum.local\scripts folder on the PDC emulator.

Answer: B

150. You are the administrator of a Windows 2000 active directory network. The network consists of a single domain. The domain contains 20 Windows NT 4.0 client computers. All other client computers are Windows 2000 Professional client computers. You create an NT 4.0 default user policy on Windows 2000 Server computer that is configured as PDC emulator. The default policy denies access to the network neighborhood. You then install terminal services on one of the servers and terminal services client on two thousand Windows NT server client computers. You find that users of the terminal server can still browse the network when they open my network places. You want to prevent all default users from browsing the network. What should you do?

A. Modify the Windows NT policy template file so that you can restrict access to both the my network places and network neighborhood. Save the policy file on the terminal server. B. Copy the NT file to 20 Windows NT workstation computers. C. Create a windows 2000 group policy that denies access to my network places. D. Edit the local registry on Windows NT workstation computers to deny access to entire network in the entire neighborhood.

Ans:C

151. You are the administrator of the contoso.local domain. You organize the domain into organization units (OUs) as shown in the exhibit. You configure the Local Security Options and other setting for the Default Domain Policy object. You enable a local security option policy to display a logon message each time a user attempts to log on. Suzan Fine, the administrator of the Florida OU, wants to configure a different logon message for the Orlando OU without changing the other Local Security Options. What should Suzan do?

A. Create a new Group Policy object (GPO) in the Orlando OU with the appropriate logon message. Block policy inheritance for the new GPO. B. Create a new Group Policy object (GPO) in the Florida OU with the appropriate logon message. Set the option not to override for the new GPO. C. Create a new Group Policy object (GPO) in the Orlando OU with the appropriate logon message. Enable policy inheritance for the new GPO. D. Create two new Group Policy objects (GPOs) in the Miami and Orlando OUs. Configure the GPO for the Orlando OU with the appropriate logon message for the Orlando OU. Place the GPO for the Orlando OU at the top of the priority list.

Ans: A

152. Your network consists of numerous domain within a LAN, plus remote location that is configured as another domain within the tree. Each domain contains several organizational units (OUs). The remote domain is connected to the main office network by a 56-Kbps connection, as shown in the exhibit. The remote location is running a previous service pack for Windows 2000, and the LAN is running the most recent service pack. You want to configure a Group Policy for the remote location so that users can repair a problem with a service pack system file. You also want to reduce the traffic on the LAN and ease administration of the Group Policies. You want to retain the domain administrator's access to the Group Policy configuration. NOTE: west.litware is on the 56-Kbps remotely What should you do?

A. Configure a Group Policy for each OU in the west.litware.com domain. Configure a service pack software package for each Group Policy. B. Configure a Group Policy for each OU in the litware.com domain. Configure a service pack software package for each Group Policy. C. Configure a Group Policy for the west.litware.com domain. Configure a service pack software package for the Group Policy. D. Configure a Group Policy for the litware.com domain. Configure a service pack software package for the Group Policy.

Ans: C

153. You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort. What should you do?

A. Configure an ADM template and add the template to the GPO. B. Configure an INF policy and add the policy to the GPO. C. Configure a Microsoft Windows Installer package and add the package to the GPO. D. Configure RIS to include the registry entry.

Ans:A

154. You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object. You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured. What should you do?

A. From the group policy options from the contoso.local domains set the option not override. B. From the group policy options from the Michigan and Florida OU, set the option not override. C. Block the group policy inheritance for the contoso.local domain. D. Block the group policy inheritance for Michigan and Florida OU.

Ans:A

155. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

A. Apply a less restrictive custom security template to DC1. B. Apply a less restrictive custom policy to Windows NT domain controller. C. Ensure the Windows 2000 domain is configured in the mixed mode D. Ensure the Windows 2000 domain is configured to run in the native mode.

Answer: A

156. You configure several Group Policies to restrict user's desktop settings. You want them to be applied immediately. What should you do?

A. Run secedit /refreshpolicy MACHINE_POLICY B. Run secedit /refreshpolicy USER_POLICY C. Run net config /refreshpolicy DOMAIN_POLICY D. Run refresh /DOMAIN_POLICY

Answer: B

157. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed). An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

A. Set the CrashonAuditFail registry key to 0. B. Set the Security Log to overwrite events as needed. C. Delete the Liscense Trial registry key. D. Increase the size of the security log. E. Save the security log to a file, and clear it every morning.

Answer: A

158. Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only. What should you do?

A. Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy. B. Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy. C. Set a Group Policy on all OUs containing computer accounts to enable the passwords must meet complexity requirements policy. D. Set a Group Policy on all OUs containing user accounts to enable the passwords must meet complexity requirements policy.

Answer: A

159. You wish to setup a domain policy to have passwords expire in 30 days. You wish to setup a local computer policy to have passwords expire in 90 days. Choose two:

A. Set Domain Policy for password expiration in 30 days. B. Set Domain Policy for password expiration in 90 days. C. Set OU for password expiration in 30 days. D. Set OU for password expiration in 90 days. E. Set Local Computer Policy for password expiration in 30 days. F. Set Local Computer Policy for password expiration in 90 days.

Answer: A, F

160. You are the administrator of 20 Windows 2000 Professional computers and 2 Windows 2000 Server computers for your domain. You want to set an account policy that locks any user account after 3 failed logon attempts. You also want to ensure that only administrators will be able to unlock the account. What should you do? (Choose 2)

A. Set the account lockout duration to 0. B. Set the account lockout duration to 3. C. Set the account lockout threshold to 0. D. Set the account lockout threshold to 3. E. Set the reset account lockout after to 0. F. Set the reset account lockout after 3.

Answer: A, D

161. You are the administrator of a high security network. Many files stored on your Windows 2000 file servers and Windows 2000 Professional computers are highly confidential. You want to implement identical security configurations on all Windows 2000 file servers and Windows 2000 Professional computers. What should you do? (Choose all that apply)

A. Configure Group Policies to apply the security configuration to all Windows 2000 file servers and Windows 2000 Professional computers. B. Use the Security Configuration Management Console to import security information from a file server as a template. C. Use the Security Configuration Management Console to import security information from a Windows 2000 Professional Computer as a template. D. Use Secedit to export the security configuration to all file servers. E. Use Secedit to export the security configuration to all Windows 2000 Professional computers.

Answer: A, B, C

EFS

162. Your company has a human resources (HR) manager named Sean Chai. He keeps your company's confidential HR files in a shared folder. To increase the security of the HR files, Sean set the folder to encrypt the files. Sean leaves the company without reset the permissions and encryption settings for the HR files. The files must be made accessible to the new HR manager. Which two actions should you take to allow this access? (Choose two.)

A. Set the file permissions on the HR files to allow access to the new manager. B. Back up the shared folder to tape and restore the files to a different folder. C. Log on as an administrator and remove the encryption attribute from the HR files. D. Log on as the new manager, connect to the shared folder, and run the cipher /e /s . command. E. Configure the new manager's account to be an Encrypted Data Recovery Agent for Sean's account.

Answer: A, C Others

163. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1.

What should you do?

A. Apply a less restrictive custom security template to DC1. B. Apply a less restrictive custom policy to Windows NT domain controller. C. Ensure the Windows 2000 domain is configured in the mixed mode D. Ensure the Windows 2000 domain is configured to run in the native mode.

Ans:A

Remote Access

164. Your company has a Routing and Remote Access server at its main office. One of the company?¦s branch offices also runs Routing and Remote Access on a server that has one modem. This server is configured to use demand-dial routing to connect to the main office. This server is part of the company?¦s Active Directory domains. The domain runs in native mode. Some employees at this branch office use the branch office same to access their files from here. The manager of the branch office reports that sometimes none of the user in the office can connect to the main office. When you examine the event log on the branch office server to find that users have been connecting to the server during working hours. The manager wants users to be able to dail in to the server between 6:00p.m. and 8:00a.m. However, the manager still wants users to be able to log on at any time when connected directly to the LAN.

A. Change the logon hours for user’s accounts to deny between 8:00a.m. and 6:00p.m. B. Set the remote access policy to deny connection between 8:00a.m. and 6:00p.m. C. Create one batch file to start Remote Access Connections Manager server, and create another batch file to stop it. Schedule the stop batch file to run at 8:00a.m. every day and the start batch file to run at 6:00 p.m. every day. D. Create two user accounts for each user. Grant dail-in permission for an account and deny dail-in permission to second account. Change the login hour for the dail-in accounts to de logon between 8:00 a.m. and 6:00p.m.

Answer: B

165. Both of your domains are Active Directory domains that run in native mode. How can you see a list that shows which users are allowed to use remote access to your network ??

A. Create a group named RAS_USERS. Add users who are permitted to dial in to the network. Create a remote access policy that allows this group to use the remote access server Display the members of the group

B. Create a group named RAS_USERS.

Add users who are allowed to dial into the network.

Set the remote access permissions for this group to allow access.

To show who has access to the remote access server display the members of the

group.

C. Write a script for the windows scripting host in the script through the members of the users container.

Display the name of any user who has the remote access permission set to allow access.

D. Use the default remote access policy to users and groups who have been granted remote access permissions.

Answer: A

166. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

A. CHAP B. MS-CHAP v2 C. PAP D. SPAP

Ans:B

167. You are the network administrator at Island Hopper News. The domain and network configuration is a single-site Windows 2000 domain that is configured as shown in the exhibit. You must provide Terminal Services to the Pentium MMX client computers. You also need to be able to manage user liscenses and enable users to access term1.islandhoppernews.com. First you install Terminal Services in Application server mode on term1.islandhoppernews.com. What should you do next?

A. Install Terminal Services liscensing on term1.islandhoppernews.com. Select the Enterprise liscense server option. B. Install Terminal Services liscensing on term1.islandhoppernews.com. Select the Domain liscense server option. C. Install Terminal Services liscensing on file1.islandhoppernews.com. Select the Enterprise liscense server option. D. Install Terminal Services liscensing on file1.islandhoppernews.com. Select the Domain liscense server option. E. Install Terminal Services liscensing on uu2.islandhoppernews.com. Select the Enterprise liscense server option. F. Install Terminal Services liscensing on uu2.islandhoppernews.com. Select the Domain liscense server option.

Answer: B

168. Your Routing and Remote Access for Windows 2000 is configured with the policies shown in the exhibit:

Remote Access Policy .............. 1 Remote Access Policy .............. 2 Remote Access Policy Logon Required 3

The current configuration allows users to connect remotely after logging on. You want to limit remote connections to logon connections only. What should you do?

A. Delete the required L2TP policy. B. Configure the logon required policy to grant access. C. Move the logon required policy to number one in the policy order. D. Change the "Allow access if dial-in permission is enabled" policy to include the logong required policy.

Answer: C

Review

Important Review Problem Special Extraordinary

1.You have 20 identical new pc ,except for network & vga card,all pc in the same HCL you need to Install windows 2k server in easy way? (take 2)

A. use setp manager to creat Answer File B. copy the folder I386 to every local hard disk C. use SYSPREP with -NOSIDGEN D. use SYSDIFF to creat image file E. Create UDF file

ANSWER IS: A & B

2.You have a HP printer using JetDirect driver on your network, the user will print the package label with this Printer. It is configured to use HPCL. Later, your user complained about the slowness in printing the package labels. what should you do then

A. HPCL -> RAW B. HPCL -> Postscript C. Add another HP printer, blah, blah D. Add another 3 HP printer, blah, blah

ANSWER= B

8. You are the administrator of a Windows 2000 Network. You want to upgrade 50 NT Server machines to W2K 2000 and place them in a single domain. The domain includes 300 member client computers consisting of 200 Windows Professional computers and 100 NT workstation computers. You implement GPO's for each OU. However, you want to restrict users of the W2K Professional computers from accessing registry editing tools. What should you do?

A) Create an OU that contains all win nt users and computers Create a GPO in the OU that restricts users from accessing registry editing tools

B) Create a NT system policy file on the W2K domain controller Configure the policy so that it restricts default users from accessing registry editor tools

C) Create a mandatory user profile for the win nt users that removes any shortcuts or registry editor and system policy editor from each users desktop

D) Create a NT System policy file that restricts default users from accessing registry editing tools. Save the system policy to each users home folder.

ANSWER= D

11)You have a new modem on a W2K server. When you restart the computer W2k detects the modem and installs the default drivers. Occasionally the modem stops communicating with your ISP and you have to restart. You download an updated driver for the modem and save it to your winnt folder. What do you do next?

A) In the property sheet for the modem device you click on the UPDATE DRIVER command button B) Use device manager to search for hardware changes C) use device manager to delete the modem, the restart the pc D) move new driver to the winnt\drivercache folder, restart your pc

ANSWER= A

12) A W2K server has 2 disks attached to an EIDE. You need additional space. You add a new scsi disk controller that has 6 new disks attached. the new controller is not included on the current HCL. When you restart you computer, W2K does not detect the new controller.What do you do? Choose 2:

A) Use device manager to turn of the IRQ steering in the properties of the standard pc B) Use the disk manager to restore the basic configuration. Restart the pc. C) Use the add/remove hardware wizard to add a new scsi and raid controller supplied by the manufacturer D) Use disk management to rescan the disks E )Use the manufacturer’s setup program to install the driver for the scsi disk controller

ANSWER= A & E

5.Your Win2000 Srv computer contain four hard disks of different sizes.Each hard disk is configured as a basic disk and has a single 5-GB partition. All 4 disks have the amount of unpartitioned space shown in the following table: Disk Unpartitioned Space Disk 0 3-GB Disk 1 4-GB Disk 2 3-GB Disk 3 8-GB

On each hard disk, you create a second partition that uses the remaining unpartitioned space on the disk. You create an 18-GB stripe volume that includes all four of the new partitions.Six months later, disk 1 fails. You replace it with a new hard disk, and create the necessary partitions. Asquickly as possible, you need to retrieve the data that was contained on disk 1. What should you do?

A. Restore the first partition on disk 1 from the most recent tape backup. Use disk management to repair and rebuild the stripe volume.

B. Delete and re-create the stripe volume. Restore the contents of disk 1 from the most recent tape backup.

C. Restore both partitions on disk1 from the most recent tape backup. Delete and re-create the stripe volume. Restore the first partition on disk 1 and then stripe volume from a recnt tape backup.

A: A

6.Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of theses applications should have the respective service account inthe local administrators group.Currently, you individually place these service accounts in the local administrators group on the appropriate Win2000 Pro computers.You need to centralize this process.What should you do?

A. Add the applications service accounts to the domain admins group.

B. Add the applications service accounts to the local administrator group. Use the restricted group option in each computers local group policy.

C. Add the applications service accounts to the local administrators group by using the restricted groups option in an OU group policy.

D. Add the applications service accounts to the local administrators group by using the restricted groups option in a domain group policy.

Answer= D

107. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

A. Ensure that the log type is set to W3C.

B. Change the log rollover property in the website's logging properties.

C. Change the time zone setting in the time properties on the web server.

D. Configure the time service on the web server to use local system account.

Answer: B

108. Your Windows 2000 Server computer contains four 16GB hard disks. Disk0 is configured as a basic disk. Disk0 has a single 16GB partition that contains the boot and system files. Disk 1, 2 and 3 are configured as dynamic disks in a RAID5 volume. The entire server is backed up to a tape drive each night. During your daily review of the servers event logs, you discover that Disk1 has failed. You shut down the server and replace Disk1 with a new hard disk. When you restart the server Windows 2000 starts normally, but the data on the RAID5 volume is inaccessible. Disk Management indicates that Disk2 has failed too. You replace Disk2 with a new hard disk. Now you need to recover the data on the RAID5 volume as quickly as possible. What should you do?

A. Use Disk Manager to rebuild RAID5 partition.

B. Delete and recreate the RAID5 partition. Restore the contents of RAID5 partition from the most recent tape backup.

C. Use Windows 2000 backup to restore the contents of Disk2. Use Disk Manager to rebuild the RAID5 partition on Disk1.

D. Delete and recreate the RAID5 partition. Restart the server by using Windows 2000 Setup CD, and select repair option.

Answer: B

114.You configure a local group called Accounting and create a mandatory profile for the group. The profile include a logo saved with 16 bit colour and 1024 x 768. Some pcs in Accounting have a standard VGA adapter while others have a SVGA adapter. 4 users say the bitmap is distorted and display the wrong colour depth. You want these users to view it correctly. What to do?

A. Configure a roaming profile. B. Configure a seperate profile for each user. C. Change to 16 bit 640 x 840 and reconfigure. D. Reinstall appropriate WDM compliant drivers for pcs that do not display the bitmap correctly

Answer: C

116. Your network contains two routed subnets: Subnet A and Subnet B. Subnet B contains a Windows 2000 server configured as a DHCP server. This server has scopes created for both Subnet A and Subnet B. Subnet A does not contain a DHCP server.

The clients on Subnet A are not receiving IP addresses from the DHCP server. What can you do to enable clients in Subnet A to receive dynamically assigned IP addresses? Choose all that apply.

A. Configure an RFC 1542-compliant router to forward BOOTP messaging between subnets. B. Configure an RFC 1560-compliant router to pass all UDP traffic on ports 2151, 2152, 2153 and 2154. C. Install and configure a DHCP server on Subnet A. D. Configure the clients on Subnet A to use H-node NetBIOS name resolution. E. Configure a DHCP relay agent on Subnet A to forward DHCP messages to Subnet B F. Create a superscope on the DHCP server in Subnet B which contains both the scope for Subnet A and the scope for Subnet B.

Answer: A, B, E

68. Running system monitor locally and ensuring it has least impact on other processes, how do you measure the physical disk performance counters on your win2000 server computer?

A. From the command prompt run the start/low perform command B. Use Task manager to set the priority off the MMC.EXE process to Low

Answer: A

165. Both of your domains are Active Directory domains that run in native mode. How can you see a list that shows which users are allowed to use remote access to your network ??

A. Create a group named RAS_USERS. Add users who are permitted to dial in to the network. Create a remote access policy that allows this group to use the remote access server Display the members of the group

B. Create a group named RAS_USERS.

Add users who are allowed to dial into the network.

Set the remote access permissions for this group to allow access.

To show who has access to the remote access server display the members of the

group.

C. Write a script for the windows scripting host in the script through the members of the users container.

Display the name of any user who has the remote access permission set to allow access.

D. Use the default remote access policy to users and groups who have been granted remote access permissions.

Answer: A

8. there the exhibit showed an warning message, guess it had something to do with an appplication running which I had to close. Maybe it had to do with the process window in task manager. I don’t remember this Q correctly

I had choices like these: A Close My Computer window B Choose yes to proceed C some kinda command???? C some kinda command????

Answer: A

89. You have configured a Gourp Policy Object (GPO) for the marketing oranization unit OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do?

A. Add the Managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy.

B. Add the Managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the Group Policy.

C. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Deny the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to deny the ability to run system Control Policy Panel. Give the original GPO a higher priority than the new GPO.

D. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Disable the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the original GPO a higher priority than the new GPO.

Answer: D

94. You are the network administrator at Humongous Insurance, a major insurance comapny that has 1,000 offices world wide. You are configuring the network so that only the sales staff can connect to it from home. Your Windows 2000 forest contains a member server named SV1 that has Routing and Remote Access for Windows 2000 enabled. You configure SV1 to use a modem bank to accepr incoming dial-up attempts. You configure SV1 to use Windows Authentication as the authentication Provider. The only supported authentic method is MS CHAP V2. You need to restrict access to SV1. What should you do?

A. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Client-Friendly-Name attribute of the default remote access policy.

B. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Windows-Group attribute of the default remote access policy.

C. Create a new remote access policy. Add the Everyone group to this policy by using the Windows-Group attribute in the properties of each sales staff user acounts. Control dial-in access through remote policy.

D. Create a Windows 2000 glocal group. Populate this global group with the sales staff user accounts. Provide access to the global group by using Windows-Group attributes of the default remote access policy.

Answer: A

97.You are a network administrator at Contoso, Ltd. You work at the main office in Seattle.The branch office in Denver is a call center. The network consists of a Windows 2000 domain only. The network is configured as shown in the exhibit. Denver is a Token Ring network. Seattle is an Ethernet network. None of you network adapters at Contoso, Ltd. support promiscuous mode. The brouter does not support multicast traffic. Wks1.contoso.com and mem1.contoso.com are available for use as network monitor clients. You want to be able to detect and identify rogue installation s of network monitor on your network by using the fewest possible computers. What should you do? (check all that apply)

A. Install network monitor tools on wks1.contoso.com by using the Windows Components wizard.

B. Install the SNMP protocol on wks1.contoso.com by using the Windows Components wizard.

C. Install network monitor tools on mem1.contoso.com by using the Windows Components wizard.

D. Install the SNMP protocol on mem1.contoso.com by using the Windows Components wizard.

E. Install a network adapter on wks1.contoso.com that supports promiscuous mode.

F. Install a network adapter on mem1.contoso.com that supports promiscuous mode.

Answer: A,C

99. You configure your Windows 2000 Server as a print server. You install a second PnP Network adapter to improve the performance. The first adapter uses IRQ11, and the second adapter uses IRQ5. The server is now unable to print to print devices connected to a non-PnP LPT2 port adapter .You want to continue to use the print devices connected to your print server. What should you do?

A. Use device manager to change the IRQ for LPT1 to IRQ10.

B. Use device manager to change the IRQ for LPT2 to IRQ7.

C. Edit the CMOS setting of the servers BIOS to reserve IRQ7 for non-PnP devices.

D. Edit the CMOS setting of the servers BIOS to reserve IRQ5 for non-PnP devices.

Answer: D

100. Your company network includes a PentiumII, 450Mhz database server names Webdata1. Webdata1 supports a high-traffic e-commerce web site on a server names Webserver1. Users access the e-commerce website from their Internet browsers. Users report that when they attempt to complete a purchase, they must wait five minutes for confirmation that their order has been processed.You want to use Task Manager to help you decide whether an additional processor is needed. What should you do?

A. On the performance tab, select the option to monitor the system cache.

B. On the performance tab, select the option to monitor the available physical memory.

C. On the process tab, select the option to monitor the memory usage column, Monitor this column.

D. On the proces tab, configure the view to include the thread count column, Monitor this column. E. On the proces tab, configure the view to include the page faults column, Monitor this column.

Answer: D

102. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web Site for your company. Company policy requires that only authenticated users have acces to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

A. Install Active Directory on the server.

B. Select Basic Authentication check box.

C. Clear the Allow Anonymous Connection check box.

D. Disable the IUSE_inta user account on Intra.

E. Clear the Allow IIS to Control Password check box.

Answer: C

131. Your nettwork uses the Encryption File System (EFS) to encript data. You are installing a new Server that has a 6 GB NTFS partition. You want to move numerous EFS folders to a new server . these folders must maintain their encription. What should you do ?

A. Backup the foldrer using the backup utility in Windows 2000

Answer : A

132. Your Windows 2000 domain operates in native mode. The Server uses the default remote accsess policy. You want the remote access permissions for new user accounts to automaticcally allow access. What should you do ??

A. Change the setting from Control Access trhrough Remote Access Policy to allow Access.

Answer : A

134. Your Windows 2000 network is configured with Active Directory and Group Policies. You create a Group Policy Object linked to Organisational Unit. You do not want the GPO to user any policies from the domain. What should you do ??

A. CHECK " Block Inhheritance" Box in the main screen of the OU's GROUP POLICY EDITOR.

Answer : A

136. You have an Active Directory-enabled Windows 2000 Server. You createan Organisational Unit with a child OU named Disigners.The child objectmust have explicit right assigned to it, but the OU's permission must propagate to the OU and all its other child objects. What should you do ? (choose all that applay)

A. Configure permission inherance on the OU B. From the secutity tab, clear the Allow Inheritable Permission From Pasrent to propagate To this OBJECT on the Designer's Object.

Answer: A, B

139. You want to install Windows 2000 Server on a computerwith a 9.1 GB SCSI hard disk with ID-09.You begin instsllation and after the text mode you install SCSI RAID controller for 3 disks, 15 GB each. The ID of the controller is 0.you restart the computer and receive a message NTDLR is mising or corrupt. What to do ?

A. Make sure that the SCSI ID are not the same value.

Answer: A

140. There is a compagnie with RAID 5 NTFS volume D, it has 2GB free space (of a total 80 GB) And a hard drive volume C with 16 GB free space . you anticipate you will need 10 GB more Space in the next month , but your compagnie cannot afford it. What can you do ?

A. Move Data to volume C, thus freeing space on volume D

Answer: A

141. You are the administrator of a Windows 2000 workgroup at Awesome computer. Users currently do not have access to the internet.you want to all users to be able to access the Internet by using MEM3. Which three is right ?

A. Configure the appropriate DHCP scope options on MEM2 B. Anable ICS on MEM3 C. Install and configure Windows 2000DNS server on MEM2

Answer: A, B, C

144. You use Setup Manager to create an answer file for an unattend installation of Windows 2000 Server. Which components can you specifiy using Setup Manager. (Choose all that applay)

A. Create a subfolder in distribution folder Define user name options such as creating a Uniqueness Database File to access a File of valid computer names.

Answer: A

146. You have Windows 2000 clients that use only TCP/IP. You also have Win 3.1 clients that use NetBEUI. You install a new Windows 2000 server and configure it for TCP/IP and NetBEUI. The Win3.1 clients can connect, but the Win 2000 clients cannot. What would you check ?

A. Ensure that NetBIOS over TCP/IP is enabled in the Advenced TCP/IP setting

Answer: A

147. You have Windows 2000clients that use only TCP/IP .You also have win3.1 clients that use NetBEUI. You install a new Windows 2000 Server and configure it for TCP/IP and NetBEUI. All clients are able to connect. However, when you check network ressources on the server, you notice a delay before the server list is returned. What would you do?

A. Disable NetBEUI from Client for Microsoft Networks setting in the Advenced settings on The adapter

Answer: A

148. Your compagnie adds a new application to the nettwork that reads and writes large image file to a server for 100 of your users. When they all use the application simultaneously, the application has a slow response time. There are more than 12,000 users in the domain where The imaging server resides, but none of them are reporting any problems. How could you use System Monitor to discover the cause of this problem ?

A. log the Avg.Disk Queue length counter for the Physical Disk Object.

Answer: A

149. Your nettwork includes Win2000,Win NT 4.0,Win 95 and UNIX clients. You have a Windows 2000 print Server called PRINT1. If your UNIX clients support the LPR printing protocol, How would you make PRINT1 availble to them?

A. Install Microsoft Print Services for UNIX on PRINT 1.

Answer: A

150. You have both Windows 2000 Server and NetWare Server on your network. the netware clients all use the IPX/SPX protocol only.you install a DATAbase server on a Windows 2000 machine called DB1. this computer has NWLINK and uses the 802.2 frame type and a network number of 77. The NetWare clients on the same subnet can accsess DB1. However, NetWare clients on other subnets cannot. What should you do ?

A. Configure the other NetWare clients to use network number 77.

Answer: A

151. You are installing a VPN. the VPN server is located inside a firewall wich is configured to pass ICMP, TCP port 25 for SMTP, port 119 for NNTP, and port 80 for HTTP only. The VPN fails when you try to connect over the internet.However, you can ping the VPN Server What do you need to do the firewall to achieve a succssfull connection ?

A. Enable port 135 for the RPC port mapper service. enable ports 137, 138, and 139 for NetBIOS.

Answer: A

152. You need to measure physical disk performance counters on your Windows 2000 Server computer. You want to run System Monitor locally on the server. You also want to ensure that System Monitor has the least impact on other processes currently running. What can you do? (Choose two.)

A. From a command prompt, run the Start /low perfmon command. B. From a command prompt, run the Start /normal perfmon command. C.From a command prompt, run the Start /min perfmon command D. Open System Monitor, and then use Task Manager to set the priority of the Mmc.exe process to Low. E.Open System Monitor, and then use Task Manager to set the priority of the Mmc.exe process to Normal.

Answer: AD

39. You have an 2000 Server that has two network interface cards that are installed on the same network segment. Both cards are bound to TCP/IP and NetBEUI. When you restart the server, you get an error message about having duplicate server names on the network. What should you do to fix this?

A. Unbind NetBEUI from one NIC.***** B. Unbind TCP/IP from one NIC C. Create a MH entry in LMHOSTS D. Create a static entry on the WINS server.

40. You have installed routing and remote access for Windows 2000 on a server named Srv004. Your internal DNS, WINS, and DHCP services are running properly in the environment. You want this server to provide internet access for users on that network segment by using network address translation over a demand dial interface to your internet service provider. You have installed the NAT protocol and configured the correct public and private interfaces. All client computers have their default gateway set to the private address of Srv004, and can successfully ping the gateway . users can’t connect to internal network computers correctly, but network traffic does not reach the ISP. You need to ensure that all users can access the internet. What should you do?

A. Configure the DNS as a forwarder to your ISP’s DNS.**** (100% correct) B. Configure your ISP’s DNS as a secondary to your DNS. C. Install the RIP version 2 protocol in routing and remote access for Windows 2000 on Srv004. D. Add a static route of 0.0.0.0.0.0.0.0 in routing and remote access for Windows 2000 on Srv004. E. Add a static route of 0.0.0.0.0.0.0.0 by using the route-p add command Srv004.

47. Your organization is using a single domain split between two cities: Nashville and Memphis. Communication between the cities is facilitated by a WAN link. The PDC of the domain resides in Nashville. Users in Memphis are complaining that their logon process is along. What action should you perform to speed up logon authentication for the Memphis office?

A. Increase the value of the Pulse setting in the registry on the PDC in Nashville B. Increase the value of the PulseConcurrency setting in the registry on the PDC in Nashville C. Increase the value of the PulseMaximum setting in the registry on the PDC in Nashville D. Add an additional BDC to the network in Memphis.*****

48. Your Windows 2000 Server computer has two SCSI hard disks. The hard disks are configured as SCSI ID 0 and SCSI ID 1 on a single SCSI host bus adapter. The hard disks are mirrored and each hard disk is formatted with a single NTFS partition. One of the hard disks has just failed. After replacing the failed hard disk with a new disk, what else should you do to recover from the hard disk failure?

A. Choose Establish Mirror in disk administrator B. Choose Break Mirror in disk administrator and then choose regenerate in Disk Administrator C. Choose Break mirror in disk administrator and then choose establish mirror in disk administrator.***** D. Wait for Windows NT to regenerate the mirror

51. You configure a HP jet direct network printer device on your window 2000 domain srv2 on sales.juttogs.com. This is connected to the TCP/IP port to the print device. However, when you enter IP address of the device, you receive the dialog box in the printer port wizard. See diagram show:

srv2 ip: 10.1.10.35. gateway 10.1.10.100/16 HP printer jet direct Ip: 10.4.20.200/16 Router Ip: 10.5.20.100/16

Another diagram :

A. Select HP Jet Direct from standard drop-down list. B. Select the custom option button, click setting command button and than LPR printer. C. Change IP of the printer device to 10.5.20.200.***** D. Change subnet mask of the print device to 255.0.0.0 E. Change default gateway on Srv2.sales.jottom.com to 10.5.20.100.

1. You are planning the installation of windows 2000 server on a new computer that has four 50-GB hard disk drives installed. You want windows 2000 setup to create a single partition on disk 0 of the largest possible size and to install the operating system on the partition. After windows 20000 has been installed you also want to configure the remaining three disks in such a way that the maximum amount of space on all four disks can be accessed from a single drive letter.

Which of the following methods should you use to achieve your objectives?

A. On disk0 create a 4 GB fat16 partition during setup. Use disk management to covert all four disks to dynamic disks and combine unallocated space on all four disks into a single spanned volume.

B. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to create a single 50 GB ntfs partition on each of the remaining disks and then mount each partition to a separate empty folder on disk 0.

C. On disk 0 create a 32 FB fat32 partition during setup. Use disk management to convert all four disks.

D. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to convert all four disks to dynamic disks and then extend the simple volume on disk 0 to include all of the remaining disks into a single striped volume.

Ans: B

2. You have an application server named App1. On this server you have many custom built programs. All of these programs are launched as a service on startup. You have one program that is called Finance. This application is critical to your Accounting department. You find that the Finance program is making App1 unstable due to errors in the program code. You want to have App1 run stable until the code errors are fixed.

What should you do? (Not exactly word for word, but you get the idea. It was worded bad on the exam too)

A. Open Task Manager and run the Finance application as /BelowNormal

B. Open Task Manager and run the Finance application as /Low

C. Don't remember - It was wrong

D. Open Services and change the startup type from Automatic to Manual

ANS: D

3. You have the following exhibit:

(garbled litware.com, contoso.com, is.litware.com, finance.litware.com, is.contoso.com, support.is.litware.com, support.contoso.com & development.contoso.com)

You need to deploy and service pack to the support.is.litware.com domain and the support.contoso.com.

How should you deploy?

A. Assign to litware.com and contoso.com domains

B. ??

C. Create 2 sites, 1 tree in each site. Create a GPO in each site

D. Create 1 site that contains 2 trees. Creat a GPO for the site

ANS: D

4. You are a regional admin who is performing location-specific tests for an enterprise migration. Test server computers and test client computers have been deployed at your location. Your location plans to have a site Group Policy applied after the actual migration is complete. You need to provide the lead admin the security settings for the appropriate computers in your location. Which item should you provide?

A. a policy template file that is exported from the Security Configuration and Analysis utility.

B. An administrative template file from Group policy.

C. A template list that is exported from the Security Configuration and Analysis utility.

D. A Group Policy Object.

ANS: D

5. You create some folder in a root G and you don`t want users from network to create folders in root but they can create subfolders in the folder you have created.

What do you do?

A. create folder in G:,configure block permission inheritance

B. create folder in G:,configure permission allow user create subfolder. block permission inheritance

C. create folder in G:,confige block permission inheritance prevent create folder in the root.

D. create prevent create folder in the root create folder in G:, configure block permission inheritance

ANS: B

You install a new EIDE DVD, after the installation the computer stops with an error IRQ_NOT_EQUAL.

What should you do to resolv the problem?

A. Start with recovery console (or ERD disk). Copy the driver in the directory c:winntsystem32

B. Start the computer with the last know good configuration, uninstall the driver and schedulle the installation for the next maintenance period.

C. Start the computer in safe mode, uninstall the driver and schedulle the installation for the next maintenance period.

D. Connect the DVD in another EIDE bus.

ANS: D

Q55 You are the administrator for a small company and have decided to use Terminal Services to provide access to certain applications for the clients. You currently have the following client operating systems on your network:

-30 computers running Windows 2000 Professional

-25 computers running Windows NT 4.0 Workstation

-15 computers running Windows 98

-30 computers running Windows 95

-10 computers running Windows for Workgroups

You install Terminal Services in Application Server mode on a computer running Windows 2000 Server. However, there are two things that you are unsure of. First, can Windows 2000 Terminal Services support all of the client operating systems listed above without the use of any third-party software (such as Citrix Metaframe)? Second, how many Terminal Services Client Access Licenses will you need for the client operating systems that are supported?

A. Yes, Windows 2000 Terminal Services will support all of the client operating systems listed above. You will need 110 Terminal Services Client Access Licenses.

B. Yes, Windows 2000 Terminal Services will support all of the client operating systems listed above. You will need 80 Terminal Services Client Access Licenses.

C. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 100 Terminal Services Client Access Licenses for the supported client operating systems.

D. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 70 Terminal Services Client Access Licenses for the supported client operating systems.

E. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 55 Terminal Services Client Access Licenses for the supported client operating systems.

ANS: B

Q56. You are administrator. You enable security auditing. A week later, the server stops response. You logon and see error "Auditing failed". You want to continue the auditing and do not want this error happens again .

What to do ?

A. Set "Autocrach" Key to 0

B. Increase the logfile size in EventViewer.

C. Save the logfile and clear the Eventviwer every morning.

D. ?

ANS: B

Q58 What is the purpose of the Ntdis.dit file?

A. Contains the SAM

B. Contains the Active Directory Store

C. A log file created when installing Active Directory services

D. Contains locale user profiles

E. A management utility for Active Directory

Ans: B

Q10 You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. The computer is a member of a Windows 2000 domain running in native mode. You configure this computer as a RAS server. You want to configure RAS so that only members of the domain local group RAS-Access can establish a dial-up connection to the RAS server.

What step or steps should you take to limit access to only this group? Select all that apply.

A. Configure the incoming connections on the RAS server for MS-CHAP authentication only. Configure the client computers to use MS-CHAP for the outgoing connections.

B. In Active Directory Users and Computers configure the Dial-in settings of the group RAS-Access to allow remote access

C. Delete the default remote access policy on the RAS server. Create a new remote access policy. Create a condition in the policy that grants remote access permission only to the group RAS-Access

D. Delete the default remote access policy on the RAS server. Create a new

remote access policy. Define the remote access profile settings to grant

remote access permission only to the group RAS-Acces

ANS: A, C

Q43 You are the Administrator of windows 2000 server computer. The computer is configured to have a single 18 GB drive which contains the operating systems (OS) files. This drive also contain a share folder where 5 network users store there MS excel files. You want to prevent each network user from using more than 1 GB of space in the shared folder.

Which action or actions should you take to achieve this goal? (Choose all that apply)

A. Create a quota entry for everyone account. Set the quota limit to 1 GB.

B. Enable disk quotas on the volume.

C. Set default quota limit to 1 GB.

D. Select the deny disk space to users exceeding quota limit check box.

E. Upgrade the disk to a dynamic disk.

Ans: B,C, D.

Q53 You are the admin of Win NT4.0 Terminal Server Edition computer. The server has one hard disk, which is divided into two partitions. The first partition contains the Win NT4.0 system files and is formatted as FAT. The second partition contains application data and user data. This second partition is formatted as NTFS. The server currently has SP3 installed. You need to upgrade the server to Win2000 server. You want to ensure that no application data or user data is lost during the upgrade. You also want to perform the minimum number of steps necessary to complete the upgrade.

What should you do? (choose all that apply)

A. Convert the system partition to NTFS.

B. Install SP4 or later on the server.

C. Use a Win2000 server CD to start the server. In Setup, select the option to Upgrade.

D. Replace the Terminal Server installation with a standard WinNT server 4.0 installation.

ANS: A, B

Q54 Your company network consists of a Windows 2000 domain and 300 Windows 2000 professional computers. A member server named APPLIC1 has Terminal server installed in Remote Admin mode. You need to make Terminal Server on APPLIC1 available on all client computers.

Which two actions should you take? (choose two)

A. Install Terminal Server licensing on APPLIC1.

B. Install Windows 2000 Advanced server On APPLIC1.

C. Install Terminal Server licensing On a domain controller.

D. Install Terminal Server licensing On each client computers.

E. Remove Terminal Server from APPLIC1.

F. Reconfigure Terminal server to operate in application server mode.

Answer: C, F

89. You are a regional admin who is performing location-specific tests for an enterprise migration. Test server computers and test client computers have been deployed at your location. Your location plans to have a site Group Policy applied after the actual migration is complete.

You need to provide the lead admin the security settings for the appropriate computers in your location. Which item should you provide?

A. a policy template file that is exported from the Security Configuration and Analysis utility.

B. An administrative template file from Group policy.

C. A template list that is exported from the Security Configuration and Analysis utility.

D. A Group Policy Object.

Answer: C (not shure)

90.You are the admin of Win NT4.0 Terminal Server Edition computer. The server has one hard disk, which is divided into two partitions.

The first partition contains the Win NT4.0 system files and is formatted as FAT. The second partition contains application data and user data. This second partition is formatted as NTFS. The server currently has SP3 installed.

You need to upgrade the server to Win2000 server. You want to ensure that no application data or user data is lost during the upgrade. You also want to perform the minimum number of steps necessary to complete the upgrade.

What should you do? (choose all that apply)

A. Convert the system partition to NTFS.

B. Install SP4 or later on the server.

C. Use a Win2000 server CD to start the server. In Setup, select the option to Upgrade.

D. Replace the Terminal Server installation with a standard WinNT server 4.0 installation.

Answer: B,D (not sure)

92.Brian, an administrator for the nwtraders.msft domain, wishes to perform an administrative task from another employee's computer. Brian has two accounts that he uses. The first account ("brianadm") is a dedicated account that has administrative privileges. The second account ("bwilkins") does not have administrative privileges.

Brian wants to create several new user accounts in the domain. He is concerned that after he logs off from the employee's computer, sensitive data specific to the user profile for his administrative account might be left behind on the computer. Which of the following actions could Brian take to achieve his objective and still maintain a high degree of security?

A. Log on the computer using a local account and create the accounts through Computer Management.

B. Log on to the computer using the "bwilkins" account. Create new user accounts through Computer Management.

C. Log on to the computer using the "bwilkins" account. At a command prompt, type "runas /user:nwtraders rianadm "mmc %windir%system32dsa.msc" and enter the appropriate password for the "brianadm" account. Create the new user accounts.

D. Log on to the computer using the "bwilkins" account. At a command prompt, type "runas /user:nwtraders rianadm "mmc %windir%system32compmgmt.msc" and enter the appropriate password for the "brianadm" account. Create the new user accounts.

Answer: C

93. You currently have a Windows 2000 Server that is configured to run Terminal Services in Application Mode. Many of the users who connect to the Terminal Server will use applications for only a few minutes and then stop. You are concerned that these users are consuming too many resources on the Terminal Server when they are not actively using an application. Which of the following actions should you take to optimize resource usage on your Terminal Server? Choose all that apply.

A. Set time limits on idle sessions.

B. Disconnect inactive sessions automatically when processor utilization falls below a certain threshold.

C. Set a maximum time that a disconnected session can remain active.

D. Set the Encryption Level on the Terminal Services to High (United States or Canada only).

E. Turn off bitmap caching.

Answer: A

94. Disk quotas track and control disk space usage and allow system administrators to prevent further disk space use. They can also be used to log an event when a user exceeds a specified disk space limit and/or log an event when a user exceeds a specified disk space warning level. Which of the following is true of disk quotas in Windows 2000?

A. You can set a quota on a volume that has been formatted with the FAT32 file system.

B. You can set a quota for a group so that all members of the group will automatically be restricted to a certain amount of space on a given volume.

C. You can enable quotas on local volumes. You can also enable quotas on network volumes but only on those volumes that are shared from the volume's root directory and are formatted with the NTFS file system.

D. You must be a member of the Administrators, the Server Operators or the Power Users group on the computer where the drive resides in order to administer quotas on a volume.

Answer: C

95. Which of the following are differences between installing Terminal Services in Remote Administration mode and installing it in Application Server mode? Choose all that apply.

A. In Remote Administration mode, the encryption level is set to High by default.

B. In Remote Administration mode, a maximum of two remote connections may be established to the Terminal Server.

C. In Remote Administration mode, the only users that can connect to server are members of the Enterprise Administrators group.

D. Installing Terminal Services in Remote Administration Mode does not modify Memory and CPU Utilization settings like installing it in Application Server mode does

Answer: B,D

96. Using Remote Installation Services, you can set up new client computers remotely without the need to physically visit each client machine. Specifically, you can install operating systems on remote boot-enabled client computers by connecting the computer to the network, starting the client computer, and logging on with a valid user account.

Which of the following are requirements for a Remote Installation Services server? Choose all that apply.

A. At least 128 MB of RAM

B. Pentium 166 or faster processor

C. An NTFS-formatted volume

D. Distributed File System

E. PXE DHCP-based boot ROM version .99c or greater

Answer: B,C

97. To deploy Windows 2000 Professional to several hundred computers in your company you plan to use third-party disk imaging software to automate the process. You may want to ensure that the computers receiving images will not receive duplicate Security Identifiers (SIDs). In addition, you would like to specify unique information for each computer (such as computer name) through the use of an answer file.

Which two Microsoft-supported tools can be used to accomplish these objectives?

A. Recovery Console

B. RiPrep

C. Sysprep

D. Sysdiff

E. Windiff

F. Setup Manager

Answer: C,F

98. You currently have two Terminal Servers in your company named TServer1 and TServer2. Both of the servers are running Terminal Services in application server mode. You would like to configure the Terminal Servers so that all Authenticated Users have access to TServer1 but only members of the Finance group have access to TServer2. What could you do to allow only members of the Finance group to access TServer2 while still allowing other users to access TServer1?

A. From the Terminal Service Configuration utility, choose the connection for TServer2 and configure the permissions so that only the Finance group has the ability to access the server.

B. In the Terminal Services Profile tab in a user's properties, disable the option for "Allow logon to Terminal Services" for all users that are not members of the Finance group.

C. Enable Terminal Services in remote administration mode on TServer2.

D. Change the configuration for TServer2 so that all users other than members of the Finance group have only guest access.

Answer: A

101. On one of the network servers in your company, there are several confidential files that only the President of the company, Mary Miller, has access to. The NTFS permissions for these files are configured as follows:

mmiller - Allow Full Control

The files are located in a folder called HighSec. There are other files in the HighSec folder that are configured with different NTFS permissions so that other members of the Executives group (of which Mary is also a member of) can gain access to them. The HighSec folder is shared with the following permissions:

mmiller - Allow Full Control

Executives - Allow Change

Domain Admins - Allow Full Control

Mary has decided to leave the company to pursue another opportunity. The decision has been made that Mary's user account must no longer have access to any of the files within the HighSec folder. In addition, the files that were only accessible by Mary should be immediately deleted. All other permissions should remain intact so that the levels of access given to the other members of the Executives group and Domain Admins group are unchanged.

You perform the following actions:

(1) You log on as a member of the Domain Admins group and take ownership of all of the files for which only Mary had access at the machine containing the HighSec folder.

(2) After taking ownership of those files, you change the NTFS permissions to Allow Delete for the Administrators group.

(3) You delete the files in the HighSec folder for which only Mary had access to.

(4) You remove the shared folder permission of Allow Full Control for the mmiller account.

Which of the following objectives have you successfully completed? Choose all that apply.

A. Mary cannot access any files within the HighSec folder.

B. The files within the HighSec folder that only Mary could access have been deleted.

C. The level of access that the other members of the Executives group have to files within the HighSec folder has not been affected.

D. The level of access that the other members of the Domain Admins group have to files within the HighSec folder has not been affected.

Answer: B,C,D

Problem

Important Review Problem Special Extraordinary

27. Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do?

A. Add the applications service accounts to the Domain Administrator Group. B. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy. C. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy. D. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy.

Answer: D

28. You are a member of the domain backup operators group in a remote office for a large company. You are responsible for manufacturing the system state of a new Windows 2000 member server named members. You installed recovery console onto the hard disk of member1. you have Windows 2000 backup to create a backup of the system state data. You store the backup files on the hard disk in a folder named systemstate. A member in the domain admins group changes the name of member 1 to CR45uu in order to adhere to a new naming standard. One of the applications on CR45uu no longer functions after the name change. You use the restore wizard to restore system state data. Then you restart the server but you cannot log on to the server afterward. You need to be able to log on to the server. What should you do?

A. Log on to the server by using the local administrator account. B. Log on to the server by using a domain administrator account. C. Use recovery console to restore the system state data. D. Use recovery console to perform a full restore from a recent backup.

Ans:B

98. Your Windows 2000 Server is configured with 6 SCSI hard disks. One hard disk is the System disk and the other five are configured as a Stripe Set. After a power outage one of the hard disk in the Stripe Set fails. How can you replace the hard drive and recover from the Power outage?

A. Use disk administrator to regenerate the data on the new drive. B. Recreate with Stripe Set across the five disks and restore from backup. C. Copy the lost data from the tape backup to the new drives. D. Start the Emergency Repair Process.

Ans:B

106. You Windows 2000 Server computer contain four hard disks of different sizes. Each hard disk is configured as a basic disk and has a single 5-GB partition. All four disks have the amount of unpartitioned space shown in the following table:

Disk Unpartitioned Space Disk 0 3-GB Disk 1 4-GB Disk 2 3-GB Disk 3 8-GB

On each hard disk, you create a second partition that uses the remaining unpartitioned space on the disk. You create an 18-GB stripe volume that includes all four of the new partitions. Six months later, disk 1 fails. You replace it with a new hard disk, and create the necessary partitions. As quickly as possible, you need to retrieve the data that was contained on disk 1. What should you do?

A. Restore the first partition on disk 1 from the most recent tape backup. Use disk management to repair and rebuild the stripe volume. B. Delete and re-create the stripe volume. Restore the contents of disk 1 from the most recent tape backup. C. Restore both partitions on disk1 from the most recent tape backup. D. Delete and re-create the stripe volume. Restore the first partition on disk 1 and then stripe volume from a recnt tape backup.

Ans:A

161. You are the administrator of a high security network. Many files stored on your Windows 2000 file servers and Windows 2000 Professional computers are highly confidential. You want to implement identical security configurations on all Windows 2000 file servers and Windows 2000 Professional computers. What should you do? (Choose all that apply)

A. Configure Group Policies to apply the security configuration to all Windows 2000 file servers and Windows 2000 Professional computers. B. Use the Security Configuration Management Console to import security information from a file server as a template. C. Use the Security Configuration Management Console to import security information from a Windows 2000 Professional Computer as a template. D. Use Secedit to export the security configuration to all file servers. E. Use Secedit to export the security configuration to all Windows 2000 Professional computers.

Answer: A, B, C

43. You are configuring Internet access for a remote site of your company. The remote site has 12 computers on a private network with a 56Kbps connection to the Internet. Network address translation (NAT) and the AT feature of routing and remote access will be used. You test the configuration and find that web sites can only be reached by their IP address and not their fully qualified domain name. What must you do to fix this problem? (Choose two)

a. Configure each of the computers in the remote site with the address of a WINS server.

b. Configure each of the computers in the remote site with the address of a DNS server on the Internet.

c. Configure a filter on the NAT Server to pass DNS packets.

d. Create a host file on each of the NAT Servers.

ANS: B,C

153. When you install a W2K server, you receive the following error: Cannot contact domain controller

What should you do (choose all that apply)?

Swap out the drive for a supported drive or try a network install instead. Verify that network cable is properly connected. Make sure your network settings are correct. Try using a different CD Try the affected CD in a different machine. Verify that server(s) running DNS and a domain controller are on-line Answer: BCF

154. Which of the following are conditions required for installing W2K over the network (choose 2)?

1 GB minimum plus 200 MB free drive space to hold temporary files Create a distribution server which has a file share containing the contents of the /winnt directory from the Windows 2000 CD-ROM. 500 MB minimum plus 200 MB free drive space to hold temporary files Create a distribution server which has a file share containing the contents of the /i386 directory from the Windows 2000 CD-ROM. Answer: AD

190 You need to reinstall Windows 2000 Server on a domain controller, because the operating system is damaged. How can you get the Active Directory to automatically copy domain information to this new installation?

A. Remove all existing references to the old domain controller using ntdsutil.exe. Reinstall Windows 2000 server, and do an authoritative restore of the state data.

B. Remove all existing references to the old domain controller using Sites and Services snap-in. Reinstall Windows 2000 server, reinstall Active Directory with thewizard to promote the server to a domain controller.

C. Remove all existing references to the old domain controller using Sites and Services snap-in. After the reinstalling Windows 2000 server and Active Directory, do a nonauthorative restore of \%SystemRoot%RepairRegback from tape

D. Remove all existing references to the old domain controller using ntdsutil.exe. Reinstall Windows 2000 server, reinstall Active Directory with the wizard, and promote the server to a domain controller.

Answer: A

194. You configure a Virtual Private Network (VPN) using point-to-Point Tunneling Protocol (PPTP) on a Remote Access Server (RAS) computer running Windows 2000 Server. You configure the remote access server to use a computer running Windows 2000 Internet Authentication Service (IAS) for RADIUS authentication. Users who connect to the corporate network using RAS also access an application server. All of the servers belong to a Windows 2000 domain. You want to enable the account lockout feature to thwart dictionary attacks over the Internet. How should you enable account lockout?

A. Edit the registry of the remote access server

B. Edit the Default Domain Policy group policy object

C. Edit the registry of the IAS server

D. Edit the default remote access policy

Ans: B

83. Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network.

What should you do?

A. Configure a Group policy for the Domain that blocks all unsigned drivers.

B. Configure a Group policy for the Default Domain Controller to block all unsigned drivers.

C. Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers. ****

D. Do nothing, this is the default setting.

Answer: C

26. You are the network administrator at Humongous Insurance, a major insurance comapny that has 1,000 offices world wide. You are configuring the network so that only the sales staff can connect to it from home. Your Windows 2000 forest contains a member server named SV1 that has Routing and Remote Access for Windows 2000 enabled. You configure SV1 to use a modem bank to accepr incoming dial-up attempts. You configure SV1 to use Windows Authentication as the authentication Provider. The only supported authentic method is MS CHAP V2. You need to restrict access to SV1. What should you do?

A. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Client-Friendly-Name attribute of the default remote access policy. B. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Windows-Group attribute of the default remote access policy. C. Create a new remote access policy. Add the Everyone group to this policy by using the Windows-Group attribute in the properties of each sales staff user acounts. Control dial-in access through remote policy. D. Create a Windows 2000 global group. Populate this global group with the sales staff user accounts. Provide access to the global group by using Windows-Group attributes of the default remote access policy.

Answer: A

92. You are a network administrator at Contoso, Ltd. You work at the main office in Seattle. The branch office in Denver is a call center. The network consists of a Windows 2000 domain only. The network is configured as shown in the exhibit. Denver is a Token Ring network. Seattle is an Ethernet network. None of you network adapters at Contoso, Ltd. support promiscuous mode. The brouter does not support multicast traffic. Wks1.contoso.com and mem1.contoso.com are available for use as network monitor clients. You want to be able to detect and identify rogue installations of network monitor on your network by using the fewest possible computers. What should you do? (check all that apply)

A. Install network monitor tools on wks1.contoso.com by using the Windows Components wizard.

B. Install the SNMP protocol on wks1.contoso.com by using the Windows Components wizard.

C. Install network monitor tools on mem1.contoso.com by using the Windows Components wizard.

D. Install the SNMP protocol on mem1.contoso.com by using the Windows Components wizard.

E. Install a network adapter on wks1.contoso.com that supports promiscuous mode.

F. Install a network adapter on mem1.contoso.com that supports promiscuous mode.

Answer: A, C

106. You configure a HP jet direct network printer device on your window

2000 domain srv2 on sales.juttogs.com. This is connected to the TCP/IP

port to the print device. However, when you enter IP address of the

device, you receive the dialog box in the printer port wizard. See diagram

show:

srv2 ip: 10.1.10.35. gateway 10.1.10.100/16

HP printer jet direct Ip: 10.4.20.200/16

Router Ip: 10.5.20.100/16

Another diagram :

A. Select HP Jet Direct from standard drop-down list.

B. Select the custom option button, click setting command button and than

LPR printer.

C. Change IP of the printer device to 10.5.20.200

D. Change subnet mask of the print device to 255.0.0.0

E. Change default gateway on Srv2.sales.jottom.com to 10.5.20.100.

Answer: C

109. You are the administrator of a network that includes windows nt server

4.0 computers, NT Workstation 4.0 computers and unix computers. The

network consists of a single windows NT domain. You are upgrading a

windows NT server computer named server1 to windows 2000 server. Server1

is a bdc in the domain. The existing DNS server is a unix computer that

supports srv (services) records and is configured to accept dynamic

updates. The existing WINS server is another windows NT server computer.

You want to configure server1 as a domain controller in a new active

directory forest. You want the existing windows NT domain accounts to be

upgraded to active directory. You plan to upgrade the other domain

controllers in the domain to windows 2000 after the upgrade of server 1 is

complete. You want to perform the upgrade of server1 with the least

possible impact on other computers on the network.what should you do?

A. Promote server1 to the pdc of the domain. Run windows 2000 setup on

server1.

B. Run windows 2000 setup on server1. At the end of setup.configure

server1 as a dns server and a wins server.

C. Add a static mapping for server1 on the WINS server. On the DNS server,

create a srv record for the ldap service on server1. Run windows 2000

setup on server1.

D. Install the ms dns service on an existing windows nt server. Apply SP 4

or later to the server. Run windows 2000 setup on server1.

Answer: A

111. Your existing TCP/IP network has an address of 194.194.194.0. The network consists of 3 subnets with 15 nodes on one segment, 10 nodes on another segment, and 14 nodes on the other segment. Which subnet should you use to properly segment the network assuming a 100% growth rate over the next year?

A. 194.194.194.0/26

B. 194.194.194.0/27

C. 194.194.194.0/28

D. 194.194.194.0/29

Answer: B

116. Your network contains two routed subnets: Subnet A and Subnet B. Subnet B contains a Windows 2000 server configured as a DHCP server. This server has scopes created for both Subnet A and Subnet B. Subnet A does not contain a DHCP server.

The clients on Subnet A are not receiving IP addresses from the DHCP server. What can you do to enable clients in Subnet A to receive dynamically assigned IP addresses? Choose all that apply.

A. Configure an RFC 1542-compliant router to forward BOOTP messaging between subnets.

B. Configure an RFC 1560-compliant router to pass all UDP traffic on ports 2151, 2152, 2153 and 2154.

C. Install and configure a DHCP server on Subnet A.

D. Configure the clients on Subnet A to use H-node NetBIOS name resolution.

E. Configure a DHCP relay agent on Subnet A to forward DHCP messages to Subnet B

F. Create a superscope on the DHCP server in Subnet B which contains both the scope for Subnet A and the scope for Subnet B.

Answer: A, B, E

136. You have an Active Directory-enabled Windows 2000 Server. You createan Organisational Unit with a child OU named Disigners.The child objectmust have explicit right assigned to it, but the OU's permission must propagate to the OU and all its other child objects.

What should you do ? (choose all that applay)

A. Configure permission inherance on the OU

B. From the secutity tab, clear the Allow Inheritable Permission From Pasrent to propagate To this OBJECT on the Designer's Object.

Answer: A, B

139. You want to install Windows 2000 Server on a computerwith a 9.1 GB SCSI hard disk with ID-09.You begin instsllation and after the text mode you install SCSI RAID controller for 3 disks, 15 GB each. The ID of the controller is 0.you restart the computer and receive a message NTDLR is mising or corrupt. What to do ?

A. Make sure that the SCSI ID are not the same value.

144. You use Setup Manager to create an answer file for an unattend installation of Windows 2000 Server. Which components can you specifiy using Setup Manager.

(Choose all that applay)

A. Create a subfolder in distribution folder

Define user name options such as creating a Uniqueness Database File to access a

File of valid computer names.

Answer: A

146. You have Windows 2000 clients that use only TCP/IP. You also have Win 3.1 clients that use NetBEUI. You install a new Windows 2000 server and configure it for TCP/IP and NetBEUI.

The Win3.1 clients can connect, but the Win 2000 clients cannot. What would you check ?

A. Ensure that NetBIOS over TCP/IP is enabled in the Advenced TCP/IP setting

Answer: A

147. You have Windows 2000clients that use only TCP/IP .You also have win3.1 clients that use NetBEUI. You install a new Windows 2000 Server and configure it for TCP/IP and NetBEUI.

All clients are able to connect. However, when you check network ressources on the server, you notice a delay before the server list is returned.

What would you do?

A. In the advance settings for the network adapter disable net BEUI from client for Microsoft network.

B. In the advance settings for the network adapter disable net BEUI from file and printer sharing for Microsoft network.

C. In the properties of the network adapter disable client for Microsoft networks.

D. In the advance settings for TCP/IP enable net BIOS over TCP/IP.

Answer: A

148. Your compagnie adds a new application to the nettwork that reads and writes large image file to a server for 100 of your users. When they all use the application simultaneously, the application has a slow response time. There are more than 12,000 users in the domain where

The imaging server resides, but none of them are reporting any problems.

How could you use System Monitor to discover the cause of this problem ?

A. Log the processor queue length counter for the system object.

B. Log the AVG.disk queue length counter fro the physical disk object.

C. Chart the demand 0 fault/sec counter for the memory object.

D. Chart the pages/sec for the memory object.

Answer: B

149. Your nettwork includes Win2000,Win NT 4.0,Win 95 and UNIX clients. You have a Windows 2000

print Server called PRINT1. If your UNIX clients support the LPR printing protocol, How would

you make PRINT1 availble to them?

A. Install Microsoft Print Services for UNIX on PRINT 1.

Answer: A

150. You have both Windows 2000 Server and NetWare Server on your network. the netware clients all use the IPX/SPX protocol only.you install a DATAbase server on a Windows 2000 machine called DB1. this computer has NWLINK and uses the 802.2 frame type and a network number of 77.

The NetWare clients on the same subnet can accsess DB1. However, NetWare clients on other subnets cannot. What should you do ?

A. Configure the other NetWare clients to use network number 77.

Answer: A

151. You are installing a VPN. the VPN server is located inside a firewall wich is configured to pass ICMP, TCP port 25 for SMTP, port 119 for NNTP, and port 80 for HTTP only.

The VPN fails when you try to connect over the internet.However, you can ping the VPN Server

What do you need to do the firewall to achieve a succssfull connection ?

A. Enable port 135 for the RPC port mapper service.

enable ports 137, 138, and 139 for NetBIOS.

Answer: A

3. Your Windows 2000 Server is currently configured with two IDE hard drives that are attached to an EIDE disk controller. Your server is beginning to run low on disk space. You install a new SCSI disk controller with six hard drives attached to it. This new SCSI controller is not listed on the Hardware Compatibility List (HCL). When you attempt to install the new controller, Windows 2000 does not detect it correctly. What should you do to install the controller?

a. Use Disk Management to rescan your hard disks

b. Use Device Manager to turn off IRQ steering. Reboot.

c. Use the hardware wizard to add a new SCSI and RAID controller using the drivers supplied by the manufacturer of the SCSI controller

d. Use the SCSI controller’s setup program to install it’s driver

e. Use Device Manager to disable the EIDE controller

Answer: B, D

9. Your network has over 200 Windows 2000 Server computers. They are all members of the same domain. You have made all of the members part of the Servers Organizational Unit (OU). You have configured each Windows 2000 Server computer to audit local security events. The servers are used for different purposes, thus you have configured different servers to audit different local security events. You would now like to institute a policy that makes all of the Windows 2000 Servers have identical local security auditing policies. You must also ensure that auditing remains standardized even if the audit policy changes. How should you do this?

a. Configure a local auditing policy on each domain controller

b. Configure a local auditing policy on each computer

c. Configure a local group policy object on each server in the Servers OU

d. Configure a domain group policy object and apply it to the Servers OU

Answer: D

you need to measure physical disk performance counters on your Windows 2000 Server computer. you want to run system monitor locally on the server, you also want to ensure that system monitor has the least impact on other processes currently running. What can you do? (CHOOSE TWO)

A. From a command prompt run the start/low perfmon command.

B. From a command prompt run the start/normal perfmon command.

C. From the command prompt run the startmin perfmon command.

D. Open system monitor and then use task manager to set the priority of the mmc.exe process to low.

E. Open system monitor and then use task manager to set the priority of mmc.exe process to normal.

Ans: A, D

25) Your network is configured with the NWLink protocol only. You have NetWare servers and windows clients. You add a w2k server and configure NWLink. You copy the Netware files to the w2k server, and then share them. You verify that the clients can connect to the new shares. You then remove the NetWare servers, and now the clients can't connect to the shares.

What can you do?

A. On the w2k server, change the frame type to 802.5

B. On the clients, configure TCP/IP

C. On the w2k server, add it to the network 18283838.

D. On the w2k server, add NWLink.

E. On the w2k server, add GSNW.

ANS: E

27) You start win2k. You have create ERD. Receive a "boot.ini is missing".

What can you do?

A. Start with win2K CD.start recovery console, run FIXBOOT

B. Start with win2K CD.start recovery console, run FIXMBR

C. ......

D. Start with win2K CD. Start recovery console. Copy appropriate parameter

ANS: D

28) John, an employee in your company has used windows 2000 encrypting file system on his windows 2000 computer to encrypt a file that contains sensitive information. John's computer belongs to the domain that you administer. When john left the company Greg was hired for the position. You must enable greg to access the contents of the encrypted file.

Which of the following should you do?

A. Log on to john's computer by using the local administrator account and decrypt the file.

B. Back up the encrypted file restore the backup on your computer and decrypt the file.

C. Assign greg the take ownership permission for the file and let him take ownership.

D. Copy the encrypted file to a fat volume.

ANS: A

30) You are the administrator of a Windows 2000 server computer named Intra. This server hosts an intranet web site for your company. The marketing department stores marketing files in a shared folder on a separate file server. The NTFS permissions on the folder are shown on this exhibit:

- Exhibit 1: Marketing users have full control

- Exhibit 2: Virtual Directory with Read, Log Visit, and Index this resource boxes checked and Write and Directory Browsing boxes unchecked

The marketing director wants to make the marketing files available to the rest of the company via internet. She wants company users to be able to read but no modify all the files. You create a new virtual directory named marketing under the intranet web site folder on Intra. You configure the virtual directory as shown some users report that they cannot access the marketing files from their web browsers. However, all users in the marketing department are able to access the files. You need to provide need acess to all company users.

What should you do?

A. Select directory browsing check box on virtual directory tab.

B. Copy files form their location on the file server to the Intra Marketing.

C. Modify NTFS permission on the file server to remove the entry for Marketing.

D. Modify NTFS permission on the file server to include an entry for Everyone: Read

ANS: D

32) Your win2000 server computer contains four 16-gb hard disks. Disk 0 is configured as a basic disk. Disk 0 has a single 16-gb partition that contains the os files. Disk 1,2, and 3 are configured as dynamic disk in a raid-5 volume. The entire server is backed up to a tape drive each night. During your daily review of the server's event logs, you discover that disk 1 has failed. You shut down the server and replace disk 1 with a new hard disk. When you restart the server win2000 starts normally but the data on the raid-5 volumn is inaccessible. Disk management indicates that disk 2 has failed also. You replace disk 2 with a new hard disk. Now you need to recover the data on the raid-5 volume as quickly as possible.

What should you do ?

A. use disk manager to rebuild raid-5 partition

B. delete and recreate the raid-5 partition.redtore the contents of raid-5 partition from the most recent tape back-up

C. use win2000 backup to restore the contents of disk2. Use disk manager to rebuild the raid-5 partition on disk 1

D. delete and recrate the raid-5 partition . setart the server by using win2000 setup cd, and select the repair option

ANS: B

33) You need to ensure that only authorized remote connections are posible on your W2K network. You create a policy named Required L2TP on the RRAS, the settings for this policy and the policy order are shown in the exhibit. You test the VPN connections and discover that for the SueJ user the connection is made through a lower security PPTP tunnel rather L2TP.

Sue's dial-in properties are shown in SueJ properties exhibit. All other port, policy and server settings are the default settings for a VPN server. You want to ensure that the server will deny all PPTP conections.

Which two actions should you take?

A. Change the required L2TP policy properties to deny remote access permission.

B. Change the dial-in properties of the SueJ user account to control access through remote access policy.

C. Remove all PPTP ports from the server.

D. Remove the allow access if dial-in permissions enabled policy from the server.

E. Remove all but one PPTP port from the server and deny both inbound and outbound connections on that port.

ANS: B & "remove Allow authenticated connection policy in RAS"

34) You share a printer name Telesales on win2000 server. The printer will be used to print packing Labels for order processed by 300 sales person. The printer is HP laser 5000N that have HP Jet direct device on board. The packing labels are printed by using PCL. User said printer is too slow. You want maximize the number of packing label printed in a specified time.

What 's you do?

A. modify property of Telesales printer. Set default data type for sales set RAW.

B. change packing label to use the post script page description language instead of PCL.

C. use second HP printer to network. Let Telesales to print in both printer.

D. attach 3 post script laser printer device to network.

ANS: B

35 You configure a HP jet direct network printer device on your window 2000 domain srv2 on sales.juttogs.com. This is connected to the TCP/IP port to the print device. However, when you enter IP address of the device, you receive the dialog box in the printer port wizard. See diagram show:

srv2 ip: 10.1.10.35. gateway 10.1.10.100/16

HP printer jet direct Ip: 10.4.20.200/16

Router Ip: 10.5.20.100/16

Another diagram :

A. Select HP Jet Direct from standard drop-down list.

B. Select the custom option button, click setting command button and than LPR printer.

C. Change IP of the printer device to 10.5.20.200

D. Change subnet mask of the print device to 255.0.0.0

E. Change default gateway on Srv2.sales.jottom.com to 10.5.20.100.

ANS: C

41) You are the head administrator for your company. Your company has numerous offices across the world. Each of your office has a single T1 circuit used to connect to the internet. Your Windows 2000 Servers are configured to use internet connection sharing. You have hired a new administrator named Jim. Jim is configuring a newly installed Windows 2000 Server computer as a file server. Jim runs the Windows update on the Windows 2000 Server computer for the first time and chooses to run the Product Update. Jim receives an error message stating that access is denied. You need to give David the ability to update the files using his user account. What should you do?

a. Configure the settings for Internet Connection Sharing to allow PPP access

b. Configure the settings for Internet Connection Sharing to allow PPTP access

c. Configure the settings for Internet Connection Sharing to allow VPN access

d. Make David’s account a member of the local Administrators group on the Windows 2000 Server computer

Answer: D

49) Your Windows 2000 Server computer has disk-mirroring implemented. You open disk management and find that Disk 1 has failed. Disk 1 is a mirror of Disk 0. There is a yellow exclamation mark over Disk 1 in disk management. How do you return Disk 1 to health? (choose two)

a. Break the mirror. Delete all volumes from Disk 1. Re-establish the mirror.

b. Re-establish the mirror on Disk 1.

c. Replace Disk 1. Use Disk Management to rescan the disk.

d. Convert Disk 1 to an extended volume.

Answer: A, C

2,3. You have decided to use a vendor-supplied hardware driver that is not

digitally signed. You are preparing for unattended server installations. How

do you prepare for using non-signed drivers in an unattended session to

avoid interactive warnings?

A. On the installation source server, on the System Properties Hardware tab,

click the Driver Signing button and choose the Ignore radio button, After

the unattended installations are complete, return the setting to default.

B. In the [Unattended] section of the answer file,

add DriverSigningPolicy =Ignore

C. Flag this specific driver in the Txtsetup.oem specified in the

[OEMBootFiles] section of the answer file.

D. In the driver subdirectory of the distribution folder, modify this

vendor-supplied driver's .inf file where it references the catalog file.

Answer: B

2,7. You replace the network adapter card on a computer running Windows 2000

Server that you manage. The new card uses a different driver than the

original network adapter card. What utility should you use to insure that

the device driver for the original card is removed from your hard disk?

A. Add/Remove Programs

B. Device Manager

C. Network and Dial-Up Connections

D. Add/Remove Hardware wizard

Answer: D

2,8. You are creating an unattended answer file with Setup Manager. You type

the name of your downlevel domain, Contoso, in the Workgroup option box,

rather than selecting the domain name option. You will use this answer file

to install Windows 2000 Server on ten computers. How will this impact your

rollout when these servers join the upgraded domain, Contoso.com?

A. The workgroup computers must join the new Active Directory as member

servers before being promoted with dcpromo.

B. The computers of this unattended installation can join the domain from

their current workgroup status with the identical name.

C. The workgroup computers can become application servers and can continue

to authenticate as workgroup members with the advantage of quicker browsing,

since the name is identical.

D. The computers installed with this unattended answer file cannot be

promoted to domain controllers.

Answer: C

2,9. You create two primary partitions and one extended partition on a basic

disk of a computer running Windows 2000 Server. The disk has 10Mb of

unallocated space. You create 3 logical drives in the extended partition.

You format one of the logical drives (drive G) as NTFS, and use it for the

home directory of users. You determine that you need additional space

allocated to this logical drive. You have 3Gb of unallocated space available

on a second disk drive on that computer.

What can you do to increase the amount of storage available in that logical

drive?

A. Convert both disks to dynamic disks. Extend the simple volume that was

the original logical drive by using that volume and unallocated space from

the second disk drive.

B. Create a new partition or volume on the second disk drive. Create a new

folder on G. Mount the new partition or volume to that folder.

C. Extend drive G by creating a volume set using the logical drive and

unallocated space from the second disk drive.

D. Create a new partition or volume on the second disk drive and mount it to

the folder in which home directories reside.

Answer: B

2,23. Your system partition appears to have a bad boot sector because the

error message reads "Invalid partition table." What recovery process should

you choose for this situation?

A. Use a DOS diskette to boot your system and the fdisk command to set the

active partition. Then start the Recovery Console and use the fixboot

command to make a new boot sector.

B. Use the Windows 2000 Setup disks, choose the repair option, and the

Recovery Console. Use the fixboot command to make a new boot sector.

C. Use the Emergency Repair Disk (ERD) to restore the ntldr, then use

Recovery Console's fixboot command to make a new boot sector.

D. Use the Windows 2000 startup floppy disk to boot your system and run the

fdisk /mbr command. Then start the Recovery Console and fixboot command to

make a new boot sector.

Answer: B

2,24. You are having problems starting one of your Windows 2000 domain

controllers, so you want to start the system using the Advanced Startup

options. Which two options will be unavailable when you choose Advanced

Startup Options? (Choose two)

A. Safe Mode

B. Debugging Mode

C. Safe Mode with Networking

D. Last Known Good Configuration.

E. Safe Mode with Command Prompt.

Answer: B, C

2,32. Three groups and a user have been granted permissions to an NTFS folder

on a Windows 2000 Server.

NTFS folder permissions:.

"h Sales (RWX).

"h Team1 (RWXD).

"h FolderAdmins(RWXDPO).

"h Mike (RW).

These groups have also been granted share permissions to the folder shared

over the network.

"h Share folder permissions:.

"h Sales Read.

"h Team1 Change.

"h FolderAdmins Change.

"h Mike Change.

Mike is a member of the Sales, Tem1 and FolderAdmins group.

If Mike accesses the folder across the network, what are Mike's effective

permissions to the folder?

A. Read

B. Full Control

C. Deny

D. Change

Answer: D

2,49. You create a domain-based Distributed File System (Dfs) root. The root

is hosted on a domain controller in your Windows 2000 domain. You then add

two links to the root. The links refer to shares on computers running

Windows 2000 Server that are members of the domain. You want to enable

replication of one of the links by using the Distributed File System

Snap-In, but the Replication Policy choice on the context menu of the link

is disabled.

What step will enable you to create a replication policy for the link?

A. Start the File Replication Service on the computer that is hosting the

share for the link.

B. Use the Distributed File System Snap-In to create a replica of the link.

C. Start the File Replication Service on the domain controller.

D. Use the Distributed File System Snap-In to create a replica of the root.

Answer: B

2) . You create and share a folder on a computer running Windows 2000 Server. The folder will be used to store documents that define corporate standards. Most employees use these files frequently. You set the shared folder permissions to allow Read access for Authenticated Users. You set the read-only attribute of each file in this folder. How should you configure the offline folder setting for this shared folder to minimize network traffic? A. Clear the setting Allow Caching of files in this shared folder B. Manual Caching for Documents C. Automatic Caching for Programs D. Automatic Caching for Documents

Answer: my answ B

1. You wish to audit the activity of the accounting department's share folder for file and subfolder deletion. The share folder is on a Windows 2000 server. What steps will you take to activate this security measure? A. Enable auditing of the Directory Service Access event in Local Policies node of the Computer Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit. B. Enable auditing of the Delete Subfolders and Files in the Security tab of the domain object's property sheet. C. Enable Audit Object Access event in Local Policies node of the Computer Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit. D. Enable auditing of the Delete Subfolders and Files in the property sheet of the share in Explorer.

Answer: C, D

2. You install a new application on a computer running Terminal Services in Application Server Mode. Users of this application must have access to files stored on a computer running Netware 4.11. TCP/IP is not installed on the computer running NetWare. What steps should you take to enable Terminal Services clients to access the computer running NetWare? A. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.2 B. Add NWLink to the Local Area Connection of the Terminal Services server, and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.2 C. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.3 D. Add NWLink to the Local Area Connection of the Terminal Services server, and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3

Answer: A

3. You have decided to use a vendor-supplied hardware driver that is not digitally signed. You are preparing for unattended server installations. How do you prepare for using non-signed drivers in an unattended session to avoid interactive warnings? A. On the installation source server, on the System Properties Hardware tab, click the Driver Signing button and choose the Ignore radio button, After the unattended installations are complete, return the setting to default. B. In the [Unattended] section of the answer file, add DriverSigningPolicy =Ignore C. Flag this specific driver in the Txtsetup.oem specified in the [OEMBootFiles] section of the answer file. D. In the driver subdirectory of the distribution folder, modify this vendor-supplied driver's .inf file where it references the catalog file.

Answer: B

4. Your enterprise has clients running Windows 95, Windows 98, and NT Workstation 4.0. You need to manage their System Policy from your Windows 2000 network until they are each upgraded. How will you set up their existing policies on the new Windows 2000 domain controller? A. Leave the .pol files on a downlevel server, and manually configure it to replicate the System Policy files to the Windows 2000 network servers. B. Place the .pol files of each type of workstation in the Netlogon share of a Windows 2000 domain controller C. Include in each workstation's logon script a mapping to Netlogon share of the domain controller where the .pol files of each type of workstation reside. D. Get the Adminpak.msi installed onto each type of workstation, and create new .pol files. Place the 3 new .pol files in the scripts subdirectory of the domain controller.

Answer: B, C

5. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption? A. CHAP B. MS-CHAP v2 C. PAP D. SPAP

Answer: B

6. You need to reinstall Windows 2000 Server on a domain controller, because the operating system is damaged. How can you get the Active Directory to automatically copy domain information to this new installation? A. Remove all existing references to the old domain controller using ntdsutil.exe. Reinstall Windows 2000 server, and do an authoritative restore of the state data. B. Remove all existing references to the old domain controller using Sites and Services snap-in. Reinstall Windows 2000 server, reinstall Active Directory with the wizard to promote the server to a domain controller. C. Remove all existing references to the old domain controller using Sites and Services snap-in. After the reinstalling Windows 2000 server and Active Directory, do a nonauthorative restore of \%SystemRoot%\Repair\Regback from tape D. Remove all existing references to the old domain controller using ntdsutil.exe. Reinstall Windows 2000 server, reinstall Active Directory with the wizard, and promote the server to a domain controller.

Answer: A

7. You replace the network adapter card on a computer running Windows 2000 Server that you manage. The new card uses a different driver than the original network adapter card. What utility should you use to insure that the device driver for the original card is removed from your hard disk? A. Add/Remove Programs B. Device Manager C. Network and Dial-Up Connections D. Add/Remove Hardware wizard

Answer: D

8. You are creating an unattended answer file with Setup Manager. You type the name of your downlevel domain, Contoso, in the Workgroup option box, rather than selecting the domain name option. You will use this answer file to install Windows 2000 Server on ten computers. How will this impact your rollout when these servers join the upgraded domain, Contoso.com? A. The workgroup computers must join the new Active Directory as member servers before being promoted with dcpromo. B. The computers of this unattended installation can join the domain from their current workgroup status with the identical name. C. The workgroup computers can become application servers and can continue to authenticate as workgroup members with the advantage of quicker browsing, since the name is identical. D. The computers installed with this unattended answer file cannot be promoted to domain controllers.

Answer: C

9. You create two primary partitions and one extended partition on a basic disk of a computer running Windows 2000 Server. The disk has 10Mb of unallocated space. You create 3 logical drives in the extended partition. You format one of the logical drives (drive G) as NTFS, and use it for the home directory of users. You determine that you need additional space allocated to this logical drive. You have 3Gb of unallocated space available on a second disk drive on that computer. What can you do to increase the amount of storage available in that logical drive? A. Convert both disks to dynamic disks. Extend the simple volume that was the original logical drive by using that volume and unallocated space from the second disk drive. B. Create a new partition or volume on the second disk drive. Create a new folder on G. Mount the new partition or volume to that folder. C. Extend drive G by creating a volume set using the logical drive and unallocated space from the second disk drive. D. Create a new partition or volume on the second disk drive and mount it to the folder in which home directories reside.

Answer: B

10. You have been editing the registry with Regedt32, and now you are unable to get the server to boot up. What should you try for a quick system restoration? A. Power on the computer and hit the F8 key to access Safe Mode. B. Power on the computer, hit the F8 key, and select Last Known Good configuration. C. Use your Emergency Repair Disk (ERD) to boot and restore core system files. D. Use your Emergency Recovery Disk (ERD) to boot and restore core system files. E. In Recovery Console, set the path to the floppy drive where you have a backup of the core system files. Use the copy command to restore the files to the hard drive.

Answer: B

11. You are attempting to install a Plug and Play modem in a server. The modem appears to be working when you install it, but later it fails. You attempt several more times to reinstall the modem, but it continues to fail. What should you do? A. Use the Add/Remove Hardware program to troubleshoot a device. You will select the modem from the list, and the Hardware Troubleshooter will start. B. Install the modem in another computer to see if it has the same failure. If not, reinstall it in the first computer, and use the manufacturer's most current driver when Windows 2000 prompts for file location. C. Start the computer in safe mode and remove the device driver for the modem. Restart the computer in normal mode, and let Windows 2000 find a device driver of it's own choice, even if it isn't exactly a match. D. Use the Add/Remove Hardware program to remove the modem driver. Power down the computer. Let Windows 2000 find a device driver of it's own choice.

Answer: D

12. You create a new DFS root on ServerHR, a computer running Windows 2000 Server, that is a member of DomCorp, a Windows 2000 domain. You add three DFS links to the new DFS root. You select the DFS root, and click on the Action Menu to add a replica of the root. The menu option New Root Replica is disabled. What is the most likely reason that this option is disabled? A. Directory Replication is not available. B. The DFS root is a Stand-Alone DFS root C. The DFS root is not on a volume formatted as NTFS D. A new root replica cannot be created after DFS links are added to a DFS root.

Answer: B

13. You want to delete a quota entry defined for a user's account on a drive D of a computer running Windows 2000 Server. What utility should you use to locate the files owned by the user and move the files to a shared folder on another server? A. Windows Explorer B. Disk Management C. DirUse D. Active Directory Users and Computers

Answer: A

14. Your enterprise has purchased 100 new computers to be installed as additional servers running Windows 2000 Server. All machines have the same basic hardware configuration, except those which will additionally need modems. Which automated process will perform the installations in the shortest amount of time? A. Use the bootable CD-ROM feature of these new servers to deploy a clean installation. Create a Winnt.sif file on floppy disk for your specific configuration requirements. B. Create an answer file with Setup Manager; create a distribution folder, and add the OEM drivers for each type mode; run winnt32 with the Syspart switch on each target computer. C. Use the bootable CD-ROM feature of these new servers to deploy a clean installation. Create an unattend.udf file on floppy disk for your specific configuration requirements. D. Create a master computer including applications; run the sysprep tool; create an image of the master; deploy the image to new computers.

Answer: D

15. You install Internet Information Services 5.0 on a computer running Windows 2000 Server. You create two new department web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales web site while a developer updates the contents of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive? A. The user will be redirected to an alternate default page for the Sales site's home directory. B. The user will be redirected to the Default Web site home page. C. The user will receive a 403.2 - Read Access Forbidden error message. D. The user will receive a 404 - File Not Found error message

Answer: B

16. You want to install Windows 2000 Server using NTFS on a new computer that currently has Windows 98 on a single 2Gb hard drive with a single partition. The partition is the size of the hard drive, and formatted as FAT32. Which one of the following options for hard drive preparation is valid for this computer? A. Install Windows 2000 over Windows 98, and run the Convert utility to create a second partition for NTFS. Use secedit commands to apply the default NTFS permissions to this converted file system. B. Use the existing partition as the system partition for the Windows 2000 operating system, and create a second partition using the Disk Management Tool for NTFS after installation is complete. C. Start the installation of Windows 2000 using the option to select the system partition during the installation. Run the Convert utility to create a second partition for NTFS, and apply the default NTFS permissions with secedit. D. Repartition the hard drive, creating a partition size required for your Windows 2000 installation. Format it as NTFS, FAT32 or FAT16 during installation. Leave the remaining hard disk space to be formatted by the Disk Management Tool after installation.

Answer: D

17. You have already created an unattended answer file using Setup Manager with 10 computers named. Before you begin the installations, you are asked if you can include three more computers. What will be required for you to include more computers in the unattended installation over the network? A. Edit the unattend.txt file with Notepad B. Edit the unattend.udf file with Notepad C. Edit the winnt.sif file with Notepad D. Edit the unattend.bat file with Notepad

Answer: A

18. You have four different distribution shares on your network for Windows 2000 Server installations. A new service pack was just announced. What should you do to make the service pack available for future installations? A. Copy the service pack's driver.cab to the distribution share, as well as layout.inf, dosnet.inf and txtsetup.sif B. Use update /slip to apply the service pack to each share. C. Copy the layout.inf, dosnet.inf and txtsetup.sif files to each distribution share. D. Use sysdiff /diff to apply the service pack to each share.

Answer: B

19. Your unattended setup is failing over a device that you provided a Windows 2000 compatible driver and .inf file for in the \$oem$\$1\Drivers subdirectory of the distribution folder. What did you overlook when you were preparing for the unattended installation? A. The driver was not installed on the source computer using Sysdiff B. The Cmdlines.txt file does not include a Rundll32.exe command C. The [Unattended] section of the answer file must set the key OemPreinstall=Yes D. The dosnet.inf file does not refer the incompatibility in the ServicesToDisable section

Answer: C

20. You work on a computer running Windows NT Workstation 4.0 that is a member of a Windows 2000 domain running in mixed-mode. You want to manage the printers defined on a print server that is a member of the same domain. The print server is also configured as a Web Server and DHCP server. You need to have access to real-time information about the print devices managed by the print server. What application can you install on your Windows NT workstation to manage the printers on the print server, as well as view the real-time print device information?

A. Adminpak.msi B. Windows 2000 Device Manager C. Internet Explorer 5.0 D. Directory Services Client

Answer: C

21. You manage a computer running Windows 2000 Server. You create a file in a folder on an NTFS partition of the computer. You configure the following NTFS permissions for the file: "h Authenticated Users Read & Execute, Read "h Accounting Full Control "h Jack Deny Write Accounting is a local group, Jack is a member of the group Accounting What is Jack's effective permission(s) for the file? A. Cannot be determined - it depends on the parent folder permissions B. Read and Execute, Read C. No access D. Full control

Answer: B

22. You are looking for a new driver for an application server monitor hoping to improve its resolution. However, a warning is issued when you select a driver from the Microsoft list. What procedure should you follow when selecting a monitor driver? A. Download the latest driver for your monitor from the Microsoft site to ensure compatibility with your hardware and other Plug and Play devices on your system. B. Download a current driver from the manufacturer for the make and model of your monitor, and install it to avoid damage to the monitor. C. Choose to manually select the driver from the Microsoft list to assure hardware compatibility with your operating system. D. Let the Microsoft wizard find the proper Plug and Play driver so the settings will work with other devices on the system.

Answer: A

23. Your system partition appears to have a bad boot sector because the error message reads "Invalid partition table." What recovery process should you choose for this situation? A. Use a DOS diskette to boot your system and the fdisk command to set the active partition. Then start the Recovery Console and use the fixboot command to make a new boot sector. B. Use the Windows 2000 Setup disks, choose the repair option, and the Recovery Console. Use the fixboot command to make a new boot sector. C. Use the Emergency Repair Disk (ERD) to restore the ntldr, then use Recovery Console's fixboot command to make a new boot sector. D. Use the Windows 2000 startup floppy disk to boot your system and run the fdisk /mbr command. Then start the Recovery Console and fixboot command to make a new boot sector.

Answer: B

24. You are having problems starting one of your Windows 2000 domain controllers, so you want to start the system using the Advanced Startup options. Which two options will be unavailable when you choose Advanced Startup Options? (Choose two) A. Safe Mode B. Debugging Mode C. Safe Mode with Networking D. Last Known Good Configuration. E. Safe Mode with Command Prompt.

Answer: B, C

25. You manage a computer running Windows 2000 Server. You create a folder named DATA on a volume that is formatted as FAT32. You set these share permissions: "h The user account Tom is assigned the Read permission "h The local group DataUpdate is assigned the Change permission "h The local group DataManage is assigned the Full Control permission "h The local group DataLimited is denied the Full Control permission The user account Tom is assigned to the global group Acct. Acct is a member of DataUpdate and DataManage. The user account Tom is also assigned to the global group Clerks. Clerks is a member of DataLimited. What is Tom's effective permission for the folder DATA when he accesses it from his computer running Windows 2000 Professional?

A. No access B. Change C. Full control D. Read

Answer: A

26. You configure a Virtual Private Network (VPN) using point-to-Point Tunneling Protocol (PPTP) on a Remote Access Server (RAS) computer running Windows 2000 Server. You configure the remote access server to use a computer running Windows 2000 Internet Authentication Service (IAS) for RADIUS authentication. Users who connect to the corporate network using RAS also access an application server. All of the servers belong to a Windows 2000 domain. You want to enable the account lockout feature to thwart dictionary attacks over the Internet. How should you enable account lockout? A. Edit the registry of the remote access server B. Edit the Default Domain Policy group policy object C. Edit the registry of the IAS server D. Edit the default remote access policy

Answer: B

27. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. The computer is a member of a Windows 2000 domain running in native mode. You configure this computer as a RAS server. You want to configure RAS so that only members of the domain local group RAS-Access can establish a dial-up connection to the RAS server. What step or steps should you take to limit access to only this group? A. Configure the incoming connections on the RAS server for MS-CHAP authentication only. Configure the client computers to use MS-CHAP for the outgoing connections. B. In Active Directory Users and Computers configure the Dial-in settings of the group RAS-Access to allow remote access C. Delete the default remote access policy on the RAS server. Create a new remote access policy. Create a condition in the policy that grants remote access permission only to the group RAS-Access D. Delete the default remote access policy on the RAS server. Create a new remote access policy. Define the remote access profile settings to grant remote access permission only to the group RAS-Access

Answer: A, B, C

28. You enable Terminal Services in Application Server Mode on a computer running Windows 2000 Server. You select the option Permissions compatible with Terminal Server 4.0 users. Later you decide to switch the permissions for application compatibility to ensure a more secure environment. Which utility should you use to switch the permissions? A. Add/Remove Programs B. Client Connection Manager C. Terminal Services Configuration D. Terminal Services Manager

Answer: C

29. You enable Terminal Services in Application Server Mode on a computer running Windows 2000 Server. You install and configure three applications on the server. Five users who will run these applications using the Terminal Services client have print devices connected to USB ports on their computers. Those computers run Windows 98, and each user has local printers defined for the device connected to his or her computer. What step should you take to allow the users to print to their local devices when running an application from the Terminal Services client? A. Define a script to run when each user starts a Terminal Services session. Use the net use command in this script to redirect print output to the local port. B. Log on interactively at the Terminal Services server. Run the Add Printer wizard to define a printer for each of the print devices. C. Install the print drivers for the devices on the Terminal Services server. D. Instruct each user to run the Add Printer wizard from a Terminal Services session to define a local printer.

Answer: C

30. You create a printer on a computer running Windows 2000 Server. A user reports that she has been trying to print to the network printer from an MS-DOS based application. She has been unsuccessful. What should you do to solve this printing problem? A. Run the application in MS-DOS Exclusive mode. B. Increase the amount of memory given to this MS-DOS application. C. Use the MS-DOS LPRINT command. D. Map a physical port to the network printer at a command prompt

Answer: D

31. You create a stand-alone Dfs root on a computer running Windows 2000 Server. You want to attach links to the Dfs root. What share-level permission must you have for each shared folder that you use to define a Dfs link? A. Change B. Full Control C. Read D. No permission is needed

Answer: D

32. Three groups and a user have been granted permissions to an NTFS folder on a Windows 2000 Server. NTFS folder permissions: "h Sales (RWX) "h Team1 (RWXD) "h FolderAdmins(RWXDPO) "h Mike (RW) These groups have also been granted share permissions to the folder shared over the network. "h Share folder permissions: "h Sales Read "h Team1 Change "h FolderAdmins Change "h Mike Change Mike is a member of the Sales, Tem1 and FolderAdmins group. If Mike accesses the folder across the network, what are Mike's effective permissions to the folder? A. Read B. Full Control C. Deny D. Change

Answer: D

33. You have six physical disks, disks 0-5, attached to a computer running Windows 2000 Server. Disk 0 contains drive C:, which has the Windows 2000 system files Disk 1 contains Drive D:, which has the Windows 2000 boot files Disks 2-5 comprise a stripe set with parity For best performance, where should you place the page file? A. Place the page file on Drive D B. Place the page file on the stripe set with parity C. Create a page file on both the stripe set with parity and on drive C D. Place the page file on drive C

Answer: D

34. Gary is creating a stripe set with parity using four physical disk drives on a computer running Windows 2000 Server. Each disk has free space available, and the least amount of free space on any disk is 250Mb. What will be the data storage capacity of this stripe set with parity? A. 250Mb B. 750Mb C. 500Mb D. 1000Mb

Answer: B

35. You create and share a folder on a computer running Windows 2000 Server. The folder will be used to store documents that define corporate standards. Most employees use these files frequently. You set the shared folder permissions to allow Read access for Authenticated Users. You set the read-only attribute of each file in this folder. How should you configure the offline folder setting for this shared folder to minimize network traffic? A. Clear the setting Allow Caching of files in this shared folder B. Manual Caching for Documents C. Automatic Caching for Programs D. Automatic Caching for Documents

Answer: B

36. Gerry has several types of computers with a variety of adapter cards on his Windows 2000 based network. The Windows-based computers are configured to use NWLink, and the non-Windows computers are configured to use IPX/SPX. The drivers on each machine are compatible with the protocols in use on that machine, but one of the computers cannot connect to the network. You have checked the cabling and connectors on the computer, and they appear to be good. What is the most likely cause of the problem? A. IRQ conflicts B. Protocol mismatch C. Data speed mismatch D. Frame type mismatch

Answer: D

37. You manage a Help Desk for your company. You decide to install Terminal Services on one of your company's computers running Windows 2000 Server (SrvRC) to allow your help desk personnel to assist users via remote control. The users and the help desk personnel work on computers running Windows 98. In addition to installing the Terminal Services client on the user's computers, what steps should you take to provide the remote control capability?

A. Install Terminal Services on SrvRC and configure it to use the Application Server mode. Have the Help Desk personnel manage client computers from the terminal server's console. B. Install Terminal Services on SrvRC and configure it to use the Remote Administration mode. Install the Terminal Services client on the computers used by the Help Desk personnel. C. Install Terminal Services on SrvRC and configure it to use the Application Server mode. Install the Terminal Services client on the computers used by the Help Desk personnel. D. Install Terminal Services on SrvRC and configure it to use the Remote Administration mode. Have the Help Desk personnel manage client computers from the terminal server's console.

Answer: C

38. Your department has a custom application that your manager wants you to install on a computer running Terminal Services. What steps should you take when you configure this application to run on the Terminal Services server? A. Enable the RDP connection while you set up the application. After installing the application, run the command "change user / install", and edit the necessary settings in the User Interface of the application. B. Enable the RDP connection while you set up the application. After installing the application, run the command "change user / execute", and edit the necessary settings in the User Interface of the application. C. Disable the RDP connection while you set up the application. After installing the application, run the command "change user / install", and edit the necessary settings in the User Interface of the application. D. Disable the RDP connection while you set up the application. After installing the application, run the command "change user / execute", and edit the necessary settings in the User Interface of the application.

Answer: D

39. You create a new folder named CorpInfo on a computer running Windows 2000 Server. You share the folder. You assign the following share permissions to the folder: "h CorpDataAdmin Full Control "h CorpDataEntry Change "h Joe Read Joe belongs to the global group Support. Support is a member of the domain local groups CorpDataAdmin, CorpDataEntry and CorpUpdate. What is Joe's effective permission to the shared folder CorpInfo? A. Access is denied B. Change C. Full Control D. Read

Answer: C

40. The X.25 link between your office and a branch office of your company is inaccessible. Both offices also have T1 lines to local Internet Service Providers (ISPs). You need to update configuration parameters for the default web site on a computer running Internet Information Services (IIS) at the branch office. What parameter must you include in the Uniform Resource List (URL) in order to administer the site using your web browser? A. The host header of the administration web site B. The port number of the administration web site C. The home page of the administration web site D. Port 433

Answer: B

41. You are testing a custom application on a computer running Windows 2000 Server. The application (AppA) starts 4 child processes (Proc1, Proc2, Proc3 and Proc4). Proc2 starts 2 child processes (Proc2a and Proc2b). You also have 3 other applications running on the server. You notice that the processor queue has grown to 4, and you want to eliminate the custom application. What steps should you take to eliminate the application as quickly as possible? A. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, set the priority to AboveNormal B. On the Processes tab in Task Manager, select each process of the application that has a child process (AppA and Proc2). From the context menu of AppA and Proc2, select End Process C. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, select End Process D. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, select End Process Tree

Answer: D

42. You enable RRAS on a computer running Windows 2000 Server. You want to configure a Virtual Private Network (VPN) using only Layer 2 Tunneling Protocol (L2TP), and disable the Point-to-Point Tunneling Protocol (PPTP). What 3 steps should you take (Choose three) A. In the appropriate properties dialog box of the Ports node, set the Remote Access Connection (Inbound Only) check box for PPTP B. In the properties dialog box of the Ports node, clear the Demand Dial Routing Connections (Inbound and Outbound) check box for PPTP C. In the properties dialog box of the Ports node, set the Demand Dial Routing Connections (Inbound and Outbound) check box for PPTP D. Set the number of PPTP ports to 1 E. In the properties dialog box of the Ports node, clear the Remote Access Connection (Inbound Only) check box for PPTP F. Set the number of PPTP ports to 0

Answer: B, D, E

43. You enable Routing and Remote Access (RRAS) on six computers running Windows 2000 Server in your enterprise. These computers belong to a Windows 2000 domain. You also configure one computer running Windows 2000 Server as an Internet Authentication Service (IAS) server to centralize the authentication of remote access users for the domain. You plan to govern the use of remote access by implementing remote access policies. How should you create these policies? A. Use the Group Policy editor to create the policies in the default domain policy. B. Use the Group Policy editor to create the policies in a Group Policy object linked to an organizational unit (OU) that contains the computer objects for the remote access and IAS servers. C. Use the Routing and Remote Access snap-in to create policies on the IAS server. D. Use the Routing and Remote Access snap-in to create policies on each remote access server.

Answer: C

44. You enable Routing and Remote Access (RRAS) on a computer running Windows 2000 Server. You plan to use IP packet filters to manage the protocols available to remote access clients. What component of the Routing and Remote Access snap-in can you use to implement the IP packet filters? A. The profile of a remote access policy. B. The Properties dialog box of the remote access server. C. The conditions of a remote access policy. D. The Properties dialog box of the remote access ports.

Answer: A

45. You want a user to manage a computer running Windows 2000 Server on which Terminal Services are enabled in Remote Administration mode. The computer is a member of a Windows 2000 domain. You do not want this user to be a member of the Domain Admins group. What should you do to enable the user to perform basic tasks using Terminal Services? A. Add the user to the Server Operators group. B. Use Terminal Services Configuration to modify the permissions of the RDP-TCP connection object. C. Use Local Security Policy to assign rights for that computer to the user. D. Use Terminal Services Configuration to modify the Permission Capability setting for the server.

Answer: C

46. You manage a computer running Windows 2000 Server and Exchange Server 5.5. You want to optimize the performance of the server. Which setting should you enable for the File and Print Sharing for Microsoft Networks in the properties of the local area connection of the computer? A. Maximize data throughput for network applications. B. Minimize memory used. C. Balance. D. Maximize data throughput for file sharing.

Answer: A

47. You implement Internet Printing on a computer running Windows 2000 Server. When a user attempts to connect to a printer using Internet Explorer 4.0, what protocol will the client computer use first? A. Remote Procedure Call (RPC) B. Server Message Block (SMB) C. Internet Printing Protocol (IPP) D. Hypertext Transport Protocol (HTTP)

Answer: C

48. You create a stand-alone Distributed File System (Dfs) root on Srv1, a computer running Windows 2000 Server. You then add two links to the root. The links refer to shares on computers running Windows 2000 Server that are members of the same workgroup as Srv1. The servers hosting the links are named SrvA and SrvB. You want to replicate the content of the Dfs link on SrvA to SrvB. What step or steps should you take? A. You should create the link replica on SrvB and manually copy the contents of the share on SrvA to replica. B. You should enable the File Replication Service on Srv1, SrvA, and SrvB C. You should enable the File Replication Service on SrvA and SrvB D. You should create a replica of the Dfs root on SrvB

Answer: A

49. You create a domain-based Distributed File System (Dfs) root. The root is hosted on a domain controller in your Windows 2000 domain. You then add two links to the root. The links refer to shares on computers running Windows 2000 Server that are members of the domain. You want to enable replication of one of the links by using the Distributed File System Snap-In, but the Replication Policy choice on the context menu of the link is disabled. What step will enable you to create a replication policy for the link? A. Start the File Replication Service on the computer that is hosting the share for the link. B. Use the Distributed File System Snap-In to create a replica of the link. C. Start the File Replication Service on the domain controller. D. Use the Distributed File System Snap-In to create a replica of the root.

Answer: B

50. A user named Kathy belongs to four global groups in Corp, a Windows 2000 domain that you manage. The global groups are GGApps, GGData, GGMgr and GGDB. The group GGApps is a member of the domain local group Apps. The group GGData is a member of the domain local group Data-Access. The group GGDB is a member of the domain local group DB-Access. You create and share a folder on a member server of the domain. You allow the share permission Full Control for the group DB-Access, the share permission Read for the group Apps, and the share permission Change for the group Data-Access. Kathy uses a computer running Windows 2000 Professional that is a member of Corp. What is the effective permission for Kathy when she connects to the shared folder from her computer? A. Access is denied B. Read C. Change D. Full Control

Answer: D

4. You have a W2K server named SR8, you enable compression on the whole D: volume. You enable a quote limit of 500 MB and set the option to deny space for users who exceed the quota limit. This volume is set up for user's home folders. A user works on a W2K server named SR7; he has a compressed folder with a file (files) that occupied 498 MB. He wants to save the file(s) to his home folder on SR8. Halfway through the process he received an error message saying he ran out of space. You want to allow him to save the file(s) on SR8 and at the same time you want him to have a quota limit. What to do?

A. Wrong answer B. Uncompress the file(s) on SR7 check the uncompress size, set a quota entry for the user on SR8 to match this new size. *** C. Create a quota entry on SR8 for the user and set the "Do not limit disk usage" option. D. Wrong answer.

1.You install win2000 on new computer with SCSI controller with HD connected to it that have zero for its id bus, after the text based phase of the installation, you installed another SCSI -RAID controller which have 3 HDs with id bus of zero, you start the computer, the system display an boot error, cannot boot the system, how to solve the problem and the

system detect the 2 controllers, what you do?

Answer: Make sure the both SCSI controller have different id bus no.

2.you have workgroup as shown:

********** *********** ************* ***********

* Client1 ************************* Server1 ********** 56k Modem ****** INTERNET *

********** *********** ************* ***********

*******

* Hub *******************************

*******

*

*********** *********** ***********

* Client2 *********************** Server2 Client3 *

*********** *********** ***********

Server2 has static ip,but there is no application on it that require static ip, the

other clients and server1 get their ip automatically, when server1 connected to

Modem to the Internet, you configured Internet connection sharing on it and it

gets own ip from the ISP, after that, server1 cannot connect to other clients and

Server2, how can you make all coputers see each other?

Answer: Configure Server2 to get its ip automatically and restart all computers except server2.

Special

Important Review Problem Special Extraordinary

1. You are a network administrator at Contoso,Ltd. You work at the main office in Seattle. The branch office in Denver is a call center. The network consists of a Windows 2000 domain only. The network is configured as shown in the exhibit:

Denver is a token ring network and Seattle is an ethernet network. None of your network adapters at Contosa,Ltd support promiscuous mode. The router does not support multicase traffic. Wks1.contoso.com and mem1.contoso.com are available for use as network monitor clients. You want to be able to detect and identify any roque installations of network monitor on your network by using the fewest possible computers. What should you do? (Choose all that apply)

A. Install network montitor tools on wks1.contoso.com by using the Windows components wizard.

B. Install the SNMP protocol on wks1.contoso.com by using the Windows components wizard.

C. Install network montitor tools on mem1.contoso.com by using the Windows components wizard.

D. Install SNMP protocol on mem1.contoso.com by using the Windows components wizard.

E. Install a network adapter on wks1.contoso.com that supports promiscuous mode.

F. Install a network adapter on mem1.contoso.com that supports promiscuous mode.

ANS: A, C (I had this on the exam and scored 1000)

Reasoning: (1) Avoid promiscuous mode (30% overhead increase vs NDIS); (2) Network Monitor auto detects other Network Monitor installs; (3) Needs multicast to cross routers; (4) Supports TokenRing; (5) Network Monitor: only packets sent to/from local computer; (6) SMS Network Monitor: packets to/from any computer; (7) See http://www.microsoft.com/TechNet/winnt/Winntas/manuals/concept/ xcp10.asp.

2. You are the administrator of a Windows 2000 network. You have installed the SNMP agent on one of your Windows 2000 Server computers. You want to collect routing information on a second Windows 2000 Server computer running a third party Network Management Console. How should you configure the SNMP agent? (Click to put a crosshair in the appropriate checkbox)

A. Physical

B. Applications

C. Datalink and subnetwork

D. Internet

E. End-to-end

Answer: C

3. You are a recently hired network administrator at Awesome Computer. Awesome Computer has an office in New York and Toronto. Company network configured as:

Toronto Office:

Windows 2000 Domain Controller

Monitor1 with community name of AwesomeA

WebServer with community name of AwesomeA

New York Office:Windows 2000 domain Controller

Monitor2 with community name of AwesomeB

ApplicationServer with community name of AwesomeB

These two offices are linked to two routers with Internet between the routers.You are responsible for monitoring all servers from Monitor1. Monitor1 and Monitor2 are configured with Management Console running third party network management software. ApplicationServer and WebServer are configured as SNMP agents. You discovered that you are unable to manage ApplicationServer from Monitor1. What should you do?

A. Relocate the ApplicationServer to Toronto office.

B. Move ApplicationServer computer account to Toronto domain.

C. Add AwesomeA to the list of accepted community names on ApplicationServer.

D. Add public to the list of accepted community names on ApplicationServer.

E. Remove all community names from ApplicationServer.

F. Remove all community names from Monitor2.

Answer: C

4. Mon1 server running 3rd party network software:

a) Install SNMP in TCP/IP installation tab on ALL CLIENTS except Mon1

b) Install SNMP in TCP/IP installation tab on Mon1

ANS: B (refer MS press 70-216(pg 95))

PRINTING

5. You share a printer name Telesales on win2000 server. The printer will be used to print packing Labels for order processed by 300 sales person. The printer is HP laser 5000N that have HP Jet direct device on board. The packing labels are printed by using PCL. User said printer is too slow. You want maximize the number of packing label printed in a specified time. What ‘s you do?

A: modify property of Telesales printer. Set default data type for sales set RAW.

B: change packing label to use the post script page description language instead of PCL.

C: use second HP printer to network. Let Telesales to print in both printer.

D: attach 3 post script laser printer device to network.

ANS: B

6. You have a HP printer with DLC protocol. After you removed the printer to another segment, users can not get print job done. What to do ?

A. Set up DHCP server for the printer

B. Change to LDR protocol

C. Delete and recreate the printer with DLC connection

D. ???

ANS: C. Since the printer’s static IP address is changed, you should recreate a DLC printer with the new IP address and same protocol DLC.

7. You configure a HP jet direct network printer device on your window 2000 domain srv2 on sales.juttogs.com. This is connected to the TCP/IP port to the print device. However, when you enter IP address of the device, you receive the dialog box in the printer port wizard. See diagram show:

srv2 ip: 10.1.10.35. gateway 10.1.10.100/16

HP printer jet direct Ip: 10.4.20.200/16

Router Ip: 10.5.20.100/16

Another diagram :

A: Select HP Jet Direct from standard drop-down list.

B: Select the custom option button, click setting command button and than LPR printer.

C: Change IP of the printer device to 10.5.20.200

D: Change subnet mask of the print device to 255.0.0.0

E: Change default gateway on Srv2.sales.jottom.com to 10.5.20.100.

ANS: C (I had this on exam; scored 1000)

8. You are the administrator of a Windows 2000 network. You have installed two shared printers for a print device on a Windows 2000 Server. Both printers are available to all users. They are shared as Admin and Executive. Admin is configured with a priority of 90, Executive is configured with a priority of 50. Now, you are advised to prevent the printer Executive to be visible to all users. Only members of the Executive group should be able to print to Executive. What should you do?

A. Allow the Executive Group print permission only. Remove the sharename Executive and add the sharename Executive$. Reconnect all members of the Executive Group to the new sharename.

B. Install a second printer driver for the print device. Set NTFS permissions to the new driver files so that only the Executive Group is allowed to access the files.

C. Deny print permission to the Everyone Group.

D. Change the priority of Executive to 99, so that ...........

ANS: A

RAS

9. You configured a RAS server, you want to accept only connect which speed is faster than 64kbps, and you want to use mutual authentication.

(select 3)

A. RADIUS provider

B. Windows Authentication provider

C. to allow IDSL media

D. to allow Async media

E. EAP

F. MS CHAP

G. MS CHAP v2

ANS: B, C & G

10. You enable the Routing and Remote Access Service (RRAS) on a computer

running Windows 2000 Server. The computer is a member of a Windows 2000

domain running in native mode. You configure this computer as a RAS

server. You want to configure RAS so that only members of the domain local group RAS-Access can establish a dial-up connection to the RAS server.

What step or steps should you take to limit access to only this group? Select all that apply.

A. Configure the incoming connections on the RAS server for MS-CHAP

authentication only. Configure the client computers to use MS-CHAP for the

outgoing connections.

B. In Active Directory Users and Computers configure the Dial-in settings

of the group RAS-Access to allow remote access

C. Delete the default remote access policy on the RAS server. Create a new

remote access policy. Create a condition in the policy that grants remote

access permission only to the group RAS-Access

D. Delete the default remote access policy on the RAS server. Create a new

remote access policy. Define the remote access profile settings to grant

remote access permission only to the group RAS-Access

ANS: A, C Reason: I try to do it on server. B is worng, because there are not dail-in settings tab on Group.

11. You enable Routing and Remote Access (RRAS) on six computers running Windows 2000 Server in your enterprise. These computers belong to a Windows 2000 domain. You also configure one computer running Windows 2000 Server as an Internet Authentication Service (IAS) server to centralize the

authentication of remote access users for the domain. You plan to govern the use of remote access by implementing remote access policies. How should you create these policies?

A. Use the Group Policy editor to create the policies in the default domain policy.

B. Use the Group Policy editor to create the policies in a Group Policy object linked to an organizational unit (OU) that contains the computer objects for the remote access and IAS servers.

C. Use the Routing and Remote Access snap-in to create policies on the IAS server.

D. Use the Routing and Remote Access snap-in to create policies on each remote access server.

Answer: C

12. Your Routing and Remote Access for Windows 2000 is configured with the policies shown in the exhibit:

Remote Access Policy .............. 1

Remote Access Policy .............. 2

Remote Access Policy Logon Required 3

The current configuration allows users to connect remotely after

logging on. You want to limit remote connections to logon connections only.

What should you do?

A. Delete the required L2TP policy.

B. Configure the logon required policy to grant access.

C. Move the logon required policy to number one in the policy order.

D. Change the "Allow access if dial-in permission is enabled" policy to include the logon required policy.

Answer: C

13. You are the network administrator at Humongous Insurance, a major insurance company that has 1,000 offices worldwide. You are configuring the network so that only the sales staff can connect to it from home.

Your Windows 2000 forest contains a member server named Server1 that has Routing and Remote Access for Windows 2000 enabled. You configure Server1 to use a modem bank to accept incoming dial-up attempts. You configure Server1 to use Windows Authentication as the authentication provider. The only supported authentication method is MS-CHAP version 2. You need to restrict access to Server1. What should you do?

a. Create an organizational unit (OU) named "Sales_Staff. Populate Sales_Staff with the sale staff user accounts. Provide access to this OU by using the Client-Friendly-Name attribute of the default remote access policy.

b. Create an organizational unit (OU) named "Sales_Staff. Populate Sales_Staff with the sale staff user accounts. Provide access to this OU by using the Windows-Groups.

ANS: A (I had this on exam; scored 1000)

VPN

14. You will be shown a network exhibition configured with 5 sites connected to internet. Each configured with VPN. You want two sites, Miami and Chicago to be able to connect to each other. What should you do?

A. Configure Miami VPN client

Configure Chicago VPN server

B. Configure Miami VPN server

Configure Chicago VPN client

C. Configure Miami VPN client, server

Configure Chicago VPN client, server

D. Configure Miami VPN server

Configure Chicago VPN server

ANS: A, B (each must be VPN server & client)

15. You need to ensure that only authorized remote connections are posible on your W2K network. You create a policy named Required L2TP on the RRAS, the settings for this policy and the policy order are shown in the exhibit. You test the VPN connections and discover that for the SueJ user the connection is made through a lower security PPTP tunnel rather L2TP. Sue's dial-in properties are shown in SueJ properties exhibit. All other port, policy and server settings are the default settings for a VPN server. You want to ensure that the server will deny all PPTP conections. Which two actions should you take?

A. Change the required L2TP policy properties to deny remote access permission.

B. Change the dial-in properties of the SueJ user account to control access through remote access policy.

C. Remove all PPTP ports from the server.

D. Remove the allow access if dial-in permissions enabled policy from the server.

E. Remove all but one PPTP port from the server and deny both inbound and outbound connections on that port.

F. Remove Allow authenticated connection policy in RAS

ANS: B

(I had a similar question with different options that made sense; answer was clear)

16. Your company has five branch offices, which are not networked. On each side you have one Windows 2000 Server computer. The offices WEST and EAST have servers named West1.Testsys.com and East1.Testsys.com, which are configured with RRAS. You have to connect these two branch offices through the internet via VPN. Users from WEST should be able to connect to EAST and vice versa. (You see a picture with five servers and the Internet between them) How should you configure West1.Testsys.com and East1.Testsys.com?

A. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN Server.

B. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN Server.

C. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN Client.

D. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN Client.

Answer: D

However, here's somethings new to know TCP and UDP Ports, IP ports which once used port 47 and protocol number 1723 and configuration using VPN and PPTP for connectivity thru a firewall. The scenario shows picture of Two fire walls and Two VPN servers,each of the VPN servers is behind the firewall, located at Boston and NY respectively and connected together thru the internet. You try to connect using one of the VPN servers. You get the error "can't connect". What to do on the firewall walls to allow the VPN servers to communicate. I have no idea.

USB

17. You installed a new USB mouse and after restarting your computer your mouse does not work. You confirm the correct drivers are installed and other USB devices work fine.

a. enable mouse port in BIOS

b. enable mouse in your hardware profile

c. unplug mouse, restart, and plug in mouse

d. Install the mouse using Add/Remove Hardware wizard.

e. don¡¯t remember

ANS: D

ICS

18. Your network consists of a Windows 2000 Server computer and 10 Windows 2000 Professional computers. The Windows 2000 Professional computers use a modem and a dial-up connection each to connect to the Internet. Now, you rent a single DSL-Line which will be configured on your Windows 2000 Server computer. You install Internet Connection Sharing (ICS) on the server. All Windows 2000 Professional computers have to use ICS. How should you configure all Windows 2000 Professional computers to connect to the internet without changing or removing the existing dial-up connection? (Choose all that apply)

A. In Internet Options select "Never dial a connection".

B. In Local Area Network Settins set "Use automatic configuration script".

C. In Local Area Network Settins set "Automatically detect settings".

D. In Local Area Network Settins set "Use a Proxy Server".

E. In Local Area Network Settins set "Bypass Proxy Server for local addresses".

Answer: A, C

19. You have a local Win 2000 network setup as a Workgroup. There are several Win 2000 remote sites also setup as a Workgroup. The remote sites connect to local resources by direct dial modems. Member1 is a server on the local network, it has two adapters, adapter1 is an NIC to the local network and Adapter2 is an NIC connected to a DSL modem which is connected to the Internet. You install ICS on Member1 to allow local network to have Internet access. After install, remote sites are unable to view local resources and local users are still not able to connect to the Internet. Choose one to correct problem:

A. Install ICS on Adapter1.

B. Install ICS on Adapter2.

C. Install NAT

D. Install Proxy Server on local network.

ANS:C

20. Your workgroup consists of two Win2K server and 10 Win2k Pro. Each Win2K Pro dials up to Internet separately and has own dialup settings. You purchase a DSL line. You install ICS on a Windows 2000 server and disconnect all win2kPro connections. The Win2Kpro users can not connect to Internet when they dial up. You should not change (many) dialup settings on Win2K Pro. What should you do on each Win2K Pro?

A. In Internet options, select Never dial a connection

B. In LAN settings: select automatically detect settings

C. In LAN settings: select automatic configuration script.

D. In LAN settings, select use a Proxy server.

ANS: A (I think B too).

HARD DISKS

21. Your win2000 server computer contains four 16-gb hard disks. Disk 0 is configured as a basic disk. Disk 0 has a single 16-gb partition that contains the os files. Disk 1,2, and 3 are configured as dynamic disk in a raid-5 volume. The entire server is backed up to a tape drive each night. During your daily review of the server’s event logs, you discover that disk 1 has failed. You shut down the server and replace disk 1 with a new hard disk. When you restart the server win2000 starts normally but the data on the raid-5 volumn is inaccessible. Disk management indicates that disk 2 has failed also. You replace disk 2 with a new hard disk. Now you need to recover the data on the raid-5 volume as quickly as possible. What should you do ?

A. use disk manager to rebuild raid-5 partition

B. delete and recreate the raid-5 partition.redtore the contents of raid-5 partition from the most recent tape back-up

C. use win2000 backup to restore the contents of disk2. Use disk manager to rebuild the raid-5 partition on disk 1

D. delete and recrate the raid-5 partition . setart the server by using win2000 setup cd, and select the repair option

ANS: B

22. You have a Windows 2000 Server and has 2 disk drives attached to the IDE controller. You want more space so you add a new SCSI Controller with 6 disks. The SCSI controller is not in the HCL. You restart the server but it's not dectected. What should you do? (Choose 2)

A. Use Device Manager to turn off IRQ steering in the Properties of the Standard PC. Restart

B. Use Disk Management to restore the asic configuration. Restart

C. Use Add/Remove Hardware wizard to add new SCSI & RAID controller from the disk of the manufacturer.

D. Use Disk Management to rescan disk

E. Use Manufacturer's setup program to install the drivers for the SCSI disk controller.

ANS: A,E

23. You are installing Windows 2000 Server on a new computer that has a single 10-gb scsi disk. The disk controller is not included on the current Hardware Compatibility List (HCL). You start the computer by using the Windows 2000 Server CD-Rom. Then the computer restarts. At the end of the text mode portion of Windows 2000 Setup, you receive the following STOP error: "INACCESSIBLE_BOOT-DEVICE." Which two actions should you take to eliminate the STOP error? (Choose two)

a.Restart Windows 2000 Setup by using the Windows 2000 Server CD-ROM.

b.Select Safe Mode from the windows 2000 boot menu.

c. remove the windows 2000 server CD-ROM from the CD-ROM drive.

d.Install a driver for the SCSI controller from a floppy disk.

e.Use Device Mananger to update the driver for the SCSI controller.

ANS: A, D (I had this on exam; scored 1000)

24. You are planning the installation of windows 2000 server on a new computer that has four 50-GB hard disk drives installed. You want windows 2000 setup to create a single partition on disk 0 of the largest possible size and to install the operating system on the partition. After windows 20000 has been installed you also want to configure the remaining three disks in such a way that the maximum amount of space on all four disks can be accessed from a single drive letter.

Which of the following methods should you use to achieve your objectives?

a. On disk0 create a 4 GB fat16 partition during setup. Use disk management to covert all four disks to dynamic disks and combine unallocated space on all four disks into a single spanned volume.

b. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to create a single 50 GB ntfs partition on each of the remaining disks and then mount each partition to a separate empty folder on disk 0.

c. On disk 0 create a 32 FB fat32 partition during setup. Use disk management to convert all four disks.

d. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to convert all four disks to dynamic disks and then extend the simple volume on disk 0 to include all of the remaining disks into a single striped volume.

AND: B

Choice b is correct. During windows 2000 setup, you can create a FAT16 partition of up to 2 GB, a FAT32 partition of up to 32 GB or an ntfs partition of almost any practically reasonable size. Currently, 2 tb should be considered a practical limit on a single ntfs volume. To meet the first requirement of this scenario that the partition on disk 0 be of the largest possible size, you should create a single 50 GB ntfs partition. To meet the second requirement you should create single 50 GB partition on each of the remaining disks and then mount each partition to a separate empty ntfs folder on disk 0. Then, all 200 GB of the available space will be accessible through a single drive letter C. You cannot extend a simple volume that was created from a partition of a basic disk; only simple volumes that were created from unallocated space on a dynamic volume can e extended. Additionally, you cannot create a striped volume by extending a simple volume. To create a striped volume, you must specify unallocated space, not an existing volume.

INSTALL

25. You plan to install windows 2000 server on 10 new computers, these servers will provide file and print servers in branch offices of your company, the company wants each branch office to purchase its own copy of window 2000 server, and the installation in each branch office should use the serial number associated with the branch office’s own copy. You want to install, configure, and test windows 2000 server on these computers at the main office before shipping the computers to the branch offices, you want users in the branch offices to enter the computer named and serial numbers when they receive the computers. What should you do?

A.Install windows 2000 server on the computers by using an unattend.txt file, and then use the Registry Edition to remove the computer name and license details.

B. Start the installation process from an MS-DOS boot disk. Install windows 2000 server on the computers from an existing server by running the winnt command with the /Prelnst switch.

C. Install windows 2000 server on the computers and then use setup manager to create a sysprep.inf file for sysprep.exe. Pleace the sysprep.inf file on the computers and run the sysprep-nosidgen command.

D. Create an unattend.txt file by using Setup Manager. Include the following line in the Unattend.txt file: oenPreinstall=Yes. Use the file to perform the installation.

ANS:C

26. You are the administrator of a network that includes windows nt server 4.0 computers, NT Workstation 4.0 computers and unix computers. The network consists of a single windows NT domain. You are upgrading a windows NT server computer named server1 to windows 2000 server. Server1 is a bdc in the domain. The existing DNS server is a unix computer that supports srv (services) records and is configured to accept dynamic updates. The existing WINS server is another windows NT server computer. You want to configure server1 as a domain controller in a new active directory forest. You want the existing windows NT domain accounts to be upgraded to active directory. You plan to upgrade the other domain controllers in the domain to windows 2000 after the upgrade of server 1 is complete. You want to perform the upgrade of server1 with the least possible impact on other computers on the network.what should you do?

A. Promote server1 to the pdc of the domain. Run windows 2000 setup on server1.

B. Run windows 2000 setup on server1. At the end of setup.configure server1 as a dns server and a wins server.

c. Add a static mapping for server1 on the WINS server. On the DNS server, create a srv record for the ldap service on server1. Run windows 2000 setup on server1.

D. Install the ms dns service on an existing windows nt server. Apply SP 4 or later to the server. Run windows 2000 setup on server1.

ANS: A (I had this on exam; scored 1000)

27. Which of the following sections in unattend.txt contains the ComputerName?

a) Unattended

b) UserData

c) Networking

d) Identification

e) Data

ANS: B

28. What should you use for installing multiple Windows 2000 servers with dissimilar hardware?

a) SMS

b) Sysprep

c) Syspart

d) RIS

ANS: C

29. What service is responsible for answering client computer network service requests during the OS installation using RIS?

a) TFTPD

b) BINLSVC

c) RIS service

d) DHCP

e) Active Directory

ANS: B

RUNAS

30. You are a member of the backup operators group in arborshoes.com domain. You are not a a member of an other groups in this domain. You are logged on to a W2K server computer named bcksrvr3.arborshoes.com. You try to configure the software for a tape backup device, but the configuration fails during the backup. The documents for the current tape backups device indicates that the current tape driver is out of date and must be updated to support configuration. What should you do?

A) run the runas command. supply your user name and password to start device manager. then click the update driver command button on the driver tab for the tape backup device

B) instruct the domain administrator to run the runas command, supply the domain administrator with your user name and password to start device manager. click update driver tab for the tape backup device

C)open device manager, then click update driver command button on the driver tab for the tape backup device

D)Run the add/remove hardware wizard. when prompted select add/troubleshot a device

ANS: B

STARTUP & TASK MANAGER

31. You have an application server named App1. On this server you have many custom built programs. All of these programs are launched as a service on startup. You have one program that is called Finance. This application is critical to your Accounting department.

You find that the Finance program is making App1 unstable due to errors in the program code. You want to have App1 run stable until the code errors are fixed. What should you do? (Not exactly word for word, but you get the idea. It was worded bad on the exam too)

A. Open Task Manager and run the Finance application as /BelowNormal

B. Open Task Manager and run the Finance application as /Low

C. Don't remember - It was wrong

D. Open Services and change the startup type from Automatic to Manaul

ANS: D

32. Your company includes a PentiumII, 450-MHZ database server named webdata1. webdata1 supportts a high-traffic, e-commerce web site on a server named webserver1. Users access the e-commerce web site from their Internet browsers. Users report that when they attempt to complete a purchase, they must wait five minutes for confirmation that their order has been processed.

You want to use Task Manager to help you decide whether an additional processor is needed, what can you do ?

A: on the performance tab, select the option to monitor the system cache

B: on the performance tab, select the option to monitor the available physical memory

C on the process tab, select the option to monitor the memory usage column, Monitor this column

D: on the process tab, configure the view to include the thread count column, Monitor this column

E: on the process tab, configure the view to include the page faults column, Monitor this column

ANS: D

GPO

33. You have the following exhibit:

(garbled litware.com, contoso.com, is.litware.com, finance.litware.com, is.contoso.com, support.is.litware.com, support.contoso.com & development.contoso.com)

You need to deploy and service pack to the support.is.litware.com domain and the support.contoso.com. How should you deploy?

A. Assign to litware.com and contoso.com domains

B. ??

C. Create 2 sites, 1 tree in each site. Create a GPO in each site

D. Create 1 site that contains 2 trees. Creat a GPO for the site

ANS: D

34. You are a regional admin who is performing location-specific tests for an enterprise migration. Test server computers and test client computers have been deployed at your location. Your location plans to have a site Group Policy applied after the actual migration is complete. You need to provide the lead admin the security settings for the appropriate computers in your location. Which item should you provide?

A. a policy template file that is exported from the Security Configuration and Analysis utility.

B. An administrative template file from Group policy.

C. A template list that is exported from the Security Configuration and Analysis utility.

D. A Group Policy Object.

ANS: D

35. You are the administrator of a high security network. Many files stored on your Windows 2000 file servers and Windows 2000 Professional computers are highly confidential. You want to implement identical security configurations on all Windows 2000 file servers and Windows 2000 Professional computers. What should you do? (Choose all that apply)

A. Configure Group Policies to apply the security configuration to all Windows 2000 file servers and Windows 2000 Professional computers.

B. Use the Security Configuration Management Console to import security information from a file server as a template.

C. Use the Security Configuration Management Console to import security information from a Windows 2000 Professional Computer as a template.

D. Use Secedit to export the security configuration to all file servers.

E. Use Secedit to export the security configuration to all Windows 2000 Professional computers.

Answer: A, B, C

FOLDER PERMISSIONS

36. You create some folder in a root G and you don`t want users from network to create folders in root but they can create subfolders in the folder you have created. What do you do?

a.create folder in G:,configure block permission inherihance

b.create folder in G:,configure permission allow user create subfolder.block permission inherihance

c.create folder in G:,confige block permission inherihance

prevent create folder in the root.

d.create prevent create folder in the root

create folder in G:, confige block permission inherihance

ANS: B

37. You are the administrator of a Windows 2000 server computer named Intra. This server hosts an intranet web site for your company. The marketing department stores marketing files in a shared folder on a separate file server. The NTFS permissions on the folder are shown on this exhibit:

Exhibit 1: Marketing users have full control

Exhibit 2: Virtual Directory with Read, Log Visit, and Index this resource boxes checked and Write and Directory Browsing boxes unchecked

The marketing director wants to make the marketing files available to the rest of the company via internet. She wants company users to be able to read but no modify all the files. You create a new virtual directory named marketing under the intranet web site folder on Intra. You configure the virtual directory as shown some users report that they cannot access the marketing files from their web browsers. However, all users in the marketing department are able to access the files. You need to provide need acess to all company users. What should you do?

a) Select directory browsing check box on virtual directory tab.

b) Copy files form their location on the file server to the Intra Marketing.

c) Modify NTFS permission on the file server to remove the entry for Marketing.

d) Modify NTFS permission on the file server to include an entry for Everyone: Read

ANS: D (I had this on the exam; scored 1000)

IIS

38. You are the administrator of windows 2000 server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web Site for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However . You discover that users can access the Web Site without Authenticated. You need to ensure that only authenticated users can Access the web site.

What should you do ?

A. Install Active Directory on the server.

B. Select Basic Authentication Check Box.

C. Clear the Allow anonymous connection check Box.

D. Disable the IUSE_intra user account on Intra.

E. Clear the Allow IIS to control password check Box.

ANS: C

39. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

A. Ensure that the log type is set to W3C.

B. Change the log rollover property in the website's logging properties.

C. Change the time zone setting in the time properties on the web server.

D. Configure the time service on the web server to use local system account.

Answer: B

40. You are the administrator of an Internet Bluesky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines.com as an intranet server. The server

hosts the multiple departmental and resource WEB links to the network and databases. You configure a ticketing WEB site. You also configure a finance virtual directory in the department’s WEB site as shown in the Exhibit. "We see an exhibit in which we see the dir browsing enabling and person can see all the three". During the first morning the new server is available and the user reports that the only information they are seeing in their browser is a list of HTM and ASP files. For security reasons what the first action you need to take to disable the user ability to all the WEB sites in the form of a list. What should you do?

A. Clear the directory browing on the server properties, and apply to child WEB sites.

B. Clear the directory browsing settings for the ticketing WEB sites and

then apply the settings to child virtual directories.

C. Clear the directory browsing checkbox for the department’s WEB sites and

then apply the settings to the child virtual directory

D. Clear the directory browsing checkbox for the financing virtual

directory.

Answer: A (I had this on exam; scored 1000. Correction to Clonepony.)

QUOTAS

41. You are administrator. A user David has 10 GB on his home folder on drive D. You set up disk quota with default setting. Limit size to 11 GB and enable deny if exceeding the limit. David tries to encrypt his files and gets error “ insufficient space”. What can you do ? Select three answers:

A. Set no limit to David

B. Instruct David encrypt files.

C. Compress the files

D. Use Cipher.exe./d

E. Set default limitation to 12 GB for all users, clear deny when exceeding the limitation.

F. Allow David’s home folder equal the size limitation (on drive?), something like that.

ANS: A, B, F (wording of F not clear, but B, C & D are clearly wrong)

42. You have a W2K server named SR8. You enable compression on the whole D volume. You enable a quote limit of 500 MB and set the option to deny space for users who exceed the quota limit. This volume is set up for user’s home folders. A user works on a W2K server named SR7; he has a compressed folder with a file (files) that occupy 498 MB. He wants to save the file(s) to his home folder on SR8. Halfway through the process he received an error message saying he ran out of space. You want to allow him to save the file(s) on SR8 and at the same time you want him to have a quota limit. What to do?

A. Wrong answer

B. Uncompress the file(s) on SR7 check the uncompress size, set a quota entry for the user on SR8 to match this new size.

C. Create a quota entry on SR8 for the user and set the “Do not limit disk usage” option.

D. Wrong answer.

ANS: B

43. You are the Administrator of windows 2000 server computer. The computer is configured to have a single 18 GB drive which contains the operating systems (OS) files. This drive also contain a share folder where 5 network users store there MS excel files. You want to prevent each network user from using more than 1 GB of space in the shared folder. Which action or actions should you take to achieve this goal? (Choose all that apply)

A. Create a quota entry for everyone account. Set the quota limit to 1 GB.

B. Enable disk quotas on the volume.

C. Set default quota limit to 1 GB.

D. Select the deny disk space to users exceeding quota limit check box.

E. Upgrade the disk to a dynamic disk.

Ans: B, C, D.

ENCRYPTION

44. You are the administrator for your company. Your Windows 2000 Server computer contains two 23GB hard disks. Each disk is configured as a basic disk and has a single 23GB NTFS partition. Both partitions are backup up to tape every night. The partition on Disk1 stores user data. Most users of your company encrypt their files. Disk1 fails. You replace it with a new disk. You need to recover the data as quick as possible while maintaining the security of the files. What should you do?

A. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Run the cipher /d /i command.

B. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Instruct the users to verify the integrity of their files.

C. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Logon to the server console as a recovery agent. Copy the files from the second file server to the new partition.

D. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Instruct users to copy their files from the second file server to the new partition.

ANS: B

45. John, an employee in your company has used windows 2000 encrypting file system on his windows 2000 computer to encrypt a file that contains sensitive information. John’s computer belongs to the domain that you administer. When john left the company Greg was hired for the position. You must enable greg to access the contents of the encrypted file.

Which of the following should you do?

a. Log on to john’s computer by using the local administrator account and decrypt the file.

b. Back up the encrypted file restore the backup on your computer and decrypt the file.

c. Assign greg the take ownership permission for the file and let him take ownership.

d. Copy the encrypted file to a fat volume.

ANS: A

46. You are the network administrator for your company. Your Windows 2000 Server Computer contains two 23 GB hard disks. Each disk is configured as a basic disk and has a single 23 GB NTFS partition. Both partitions are backed up to a tape each night. The parititon on Disk-1 stores user data. Most users at your company encrypt their files. Disk-1 fails. You replace it with a new hard disk. You need to recover the data as quickly as possible while mantaining the security of the Disk-1 files. What should you do?

A) Create a single NTFS partition,

Restore the contents of Disk-1 from the most recent tape backup

Run the cipher /d /i command

B) Create a single NTFS partition,

Restore the contents of Disk-1 from the most recent tape backup

Instruct the users to verify the integrity of their files.

C) Create a single NTFS partition,

Restore the contents of Disk-1 to a second file server

Logon to the server console as a recovery agent

Copy the files from the second file server to the new partition

D) Create a single NTFS partition,

Restore the contents of Disk-1 to a second file server

Instruct users to copy their files from the second file server to the new partition

ANS: B (others say C; verify for yourself)

RECOVERY

47. You start win2k. You have create ERD. Receive a "boot.ini is missing". What can you do?

a. Start with win2K CD.start recovery console, run FIXBOOT

b. Start with win2K CD.start recovery console, run FIXMBR

c ......

d. Start with win2K CD. Start recovery console. Copy appropriate parameter

ANS: D

From Technet:

Recreating Boot.ini Using the Recovery Console

You can use the Emergency Repair Process to replace a missing or corrupted Boot.ini file. Alternatively, you can use the map command to determine the location of the disks. With this information, you can create a Boot.ini file on another computer, and then use a floppy disk to transfer the Boot.ini file to the original computer.

Fixboot Writes a new boot sector onto the system partition

Fixmbr Repairs the master boot code of the boot partition

48. After you installed a application on a Win2K server and rebooted it, you get a error” Invalid boot.ini file” What to do ?

A. Boot from Windows 2000 CD and select repair in o Recovery Console and use COPY command.

B. ?

C. ?

D. ?

My answer : A

49. You install a new EIDE DVD, after the installation the computer stops with an error IRQ_NOT_EQUAL. What should you do to resolv the problem?

a) Start with recovery console (or ERD disk). Copy the driver in the directory c:winntsystem32

b) Start the computer with the last know good configuration, uninstall the driver and schedulle the installation for the

next maintenance period.

c) Start the computer in safe mode, uninstall the driver and schedulle the installation for the next maintenance period.

d) Connect the DVD in another EIDE bus.

ANS: D

50. You are having problems starting one of your Windows 2000 domain

controllers, so you want to start the system using the Advanced Startup

options. Which two options will be unavailable when you choose Advanced

Startup Options? (Choose two)

A. Safe Mode

B. Debugging Mode

C. Safe Mode with Networking

D. Last Known Good Configuration.

E. Safe Mode with Command Prompt .

ANS: A, E Reason: Server is DC, so can not use safe mode and safe mode with command prompt.

SERVICE ACCOUNT

51. Some Application on your company network uses defined domain user accounts as their service accounts. Each computer that runs one of these apps should have the respective service account in the local Administrators Group.

Currently, you individually place these service accounts in the local Administrators group on the appropiate Win2000 professional computers. You need to centralize this process. What should you do?

a) Add the applications service accounts to the Domain Administrator group.

b) Add the applications service accounts to the local administrator group. Use the restricted Groups option in each computers local Group Policy.

c) Add the applications service accounts to the local administrator group using the restricted Groups option in an OU Group policy.

d) Add the applications service accounts to the local administrator group. Use the restricted Groups option in a domain Group Policy.

ANS: D

Because the question said "place these service accounts in the local Administrators group on the appropiate Win2000 professional computers",so a) is uncorrect. "You need to centralize this process",so b) is wrong. The question doesn't talk about OU, so I won't select c). d) is correct.

USER ACCOUNTS

52. You are administrator of 20 Windows 2000 professional Computer and 2 Windows 2000 Server Computer for your domain. You want to set an account policy that locks any user’s account after 3 consecutive failed logon attempts. You also want to ensure that only administrator will be able to unlock the account. Which two actions should you take? (Choose two)

A) Set the account lockout duration to 0

B) Set the account lockout duration to 3

C) Set the account lockout threshold to 0

D) Set the account lockout threshold to 3

E) Set the reset account lockout after to 0

F) Set the reset account lockout after to 3

Answer: A & D

Reason: The Account Lockout threshold allows you to define the number of incorrect password attempts that will cause the account to be unavailable to the user. This number can be set from 0 to 999, where 0 represents an infinite number of attempts. The higher the security you want in your organization, the smaller this number should be(greater than 0 of course).

Account lockout duration allows you to define the length of time an account will remain locked before it is released. This number can be set from 0 to 99999minutes, where 0 represents an infinite time, which would require an administrator to manually unlock the account.

TERMINAL SERVICES

53. You are the admin of Win NT4.0 Terminal Server Edition computer. The server has one hard disk, which is divided into two partitions. The first partition contains the Win NT4.0 system files and is formatted as FAT. The second partition contains application data and user data. This second partition is formatted as NTFS. The server currently has SP3 installed. You need to upgrade the server to Win2000 server. You want to ensure that no application data or user data is lost during the upgrade. You also want to perform the minimum number of steps necessary to complete the upgrade.

What should you do? (choose all that apply)

A. Convert the system partition to NTFS.

B. Install SP4 or later on the server.

C. Use a Win2000 server CD to start the server. In Setup, select the option to Upgrade.

D. Replace the Terminal Server installation with a standard WinNT server 4.0 installation.

ANS: A, B

Resonse: The upgrade from NT4.0 Terminal Server Edition is automatic so, I don't think D pertains. The easiest way to upgrade to WIN2000 is to insert the WIN2000 CD into the CD-ROM and keyin Winnt32.exe or Autorun. That means C would not be the correct answer, as you would not be booting from the CD but running it from within NT. B would would definitely have to happen due to the conversion of the different NTFS versions. I don't think you would have to convert the system partition to NTFS for the upgrade but, it would make the transition smoother. So I say it should be A & B.

54. Your company network consists of a Windows 2000 domain and 300 Windows 2000 professional computers. A member server named APPLIC1 has Terminal server installed in Remote Admin mode. You need to make Terminal Server on APPLIC1 available on all client computers. Which two actions should you take? (choose two)

A. Install Terminal Server licensing on APPLIC1.

B. Install Windows 2000 Advanced server On APPLIC1.

C. Install Terminal Server licensing On a domain controller.

D. Install Terminal Server licensing On each client computers.

E. Remove Terminal Server from APPLIC1.

F. Reconfigure Terminal server to operate in application server mode.

Answer: C, F

55. You are the administrator for a small company and have decided to use Terminal Services to provide access to certain applications for the clients. You currently have the following client operating systems on your network:

-30 computers running Windows 2000 Professional

-25 computers running Windows NT 4.0 Workstation

-15 computers running Windows 98

-30 computers running Windows 95

-10 computers running Windows for Workgroups

You install Terminal Services in Application Server mode on a computer running Windows 2000 Server. However, there are two things that you are unsure of. First, can Windows 2000 Terminal Services support all of the client operating systems listed above without the use of any third-party software (such as Citrix Metaframe)? Second, how many Terminal Services Client Access Licenses will you need for the client operating systems that are supported?

A. Yes, Windows 2000 Terminal Services will support all of the client operating systems listed above. You will need 110 Terminal Services Client Access Licenses.

B. Yes, Windows 2000 Terminal Services will support all of the client operating systems listed above. You will need 80 Terminal Services Client Access Licenses.

C. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 100 Terminal Services Client Access Licenses for the supported client operating systems.

D. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 70 Terminal Services Client Access Licenses for the supported client operating systems.

E. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 55 Terminal Services Client Access Licenses for the supported client operating systems.

ANS: A

Other clients (such as Macintosh clients) require the use of third-party software such as Citrix Metaframe. Windows 2000 Professional clients do not require a Terminal Services Client Access License. All of the other client operating systems listed in the scenario above will require a Terminal Services CAL.

I don't know why win2kpro don't need cal to access Terminal, as i know, all the clinet must have cal to access terminal, So, I think the ans is A.

LOGGING

56. You are administrator. You enable security auditing. A week later, the server stops response. You logon and see error ”Auditing failed”. You want to continue the auditing and do not want this error happens again . What to do ?

A. Set “Autocrach” Key to 0

B. Increase the logfile size in EventViewer.

C. Save the logfile and clear the Eventviwer every morning.

D. ?

ANS: B

From Server Help:

If the registry was previously configured with CrashOnAuditFail = 1 and the security log becomes full, Windows 2000 will stop responding and will display the message "Audit Failed" If that happened, use the procedure above. So if Autocrach means CrashOnAuditFail the correct answer should be A

NICs

57. You are administrator of a Windows 2000 Server computer. The Server contains one n/w (network) adapter and is a file and print server for critical company resources. You install a second n/w adapter in the server and connect it to the same n/w subnet as the first adapter. You want to ensure that first adapter is used for all n/w that the second adapter is used only if the first adapter fails or is disconnected from the n/w. You also want to ensure that the server always has n/w connectivity even if one n/w adapter fails. What should you do?

A) Set the second adapter’s status disabled

B) Configure the first adapter to use TCP/IP metric of 100

C) Configure the second adapter to use TCP/IP metric of 25

D) Configure the binding order on the second adapter to bind TCP/IP last

ANS: C (I had this on the exam; scored 1000)

Explanation:

http://support.microsoft.com/support/kb/articles/Q258/4/87.ASP

MISCELLANEOUS

58. What is the purpose of the Ntdis.dit file?

a) Contains the SAM

b) Contains the Active Directory Store

c) A log file created when installing Active Directory services

d) Contains locale user profiles

e) A management utility for Active Directory

ANS: B? (ntds.dit is the Active Directory file)

59. You administrate a server named server1 in you network. You perform the fully backup daily . One day your domain administrator change the Server name Server1 to SSU43 according to Company new criterion. After several days you find an application failure due to the name change. You restore the server use your daily backup data. You restart the computer and find you can not logon.what should you do to resolve ?

A.Restart the computer and logon with your adminstrator name and password.

B..Restart the computer and logon with your domain adminstrator name and password.

C.?

D?

E?

ANS: B

60. You create and share a folder on a computer running Windows 2000 Server. The folder will be used to store documents that define corporate standards. Most employees use these files frequently. You set the shared folder permissions to allow Read access for Authenticated Users. You set the read-only attribute of each file in this folder. How should you configure the offline folder setting for this shared folder to minimize network traffic?

A. Clear the setting Allow Caching of files in this shared folder

B. Manual Caching for Documents

C. Automatic Caching for Programs

D. Automatic Caching for Documents

Answer: C

Reason: "You set the read-only attribute of each file in this folder."

See MS Press Book about offline file.

61. You have Apple computers on your network that can’t connect to your w2k servers. What can you do?

ANS: SAP (I had this on exam; scored 1000)

62. Your network is configured with the NWLink protocol only. You have NetWare servers and windows clients. You add a w2k server and configure NWLink. You copy the Netware files to the w2k server, and then share them. You verify that the clients can connect to the new shares. You then remove the NetWare servers, and now the clients can’t connect to the shares. What can you do?

A. On the w2k server, change the frame type to 802.5

B. On the clients, configure TCP/IP

C. On the w2k server, add it to the network 18283838.

D. On the w2k server, add NWLink.

E. On the w2k server, add GSNW.

ANS: E (I had this on the exam; scored 1000)

Extraordinary

Important Review Problem Special Extraordinary

56. Your Windows 2000 Server network has two single domains named Corp and Finance. The company president logs onto the Corp domain as Susan. The two vice-presidents and Susan are members of the Corp Managers global group in the Corp domain. Susan requires read permission for the salary directory in the Finance domain. The Account Managers local group in the Finance domain has change permission for the salary directory. No one else should have access to the salary directory. How should you plan you network to allow required access?

A. Configure the Finance domain to trust the Corp. domain. Make Susan a member of the Account Managers Group.

B. Configure the Corp. domain to trust the Finance domain. Create a local group named account read in the Finance domain and assign it read permission for the salary directory. Make Susan a member of the account read group.

C. Configure the Finance domain to trust the Corp. domain. Create a local group named execs in the Finance domain and assign it read permission for the salary directory. Make Susan a member of the exec group.

Answer. C

57. A computer named Station01 belongs to a domain called Sales. Jason wants to add another Windows NT computer named Station02 to the Sales domain. Jason disconnects Station01 from the network, and renames Station02 to Station01. However, the computer cannot participate in domain administration of the Sales domain. What is the most likely cause of the problem?

A. The Sales domain already has the maximum number of computer connected accounts.

B. There is another computer named Station0l in a trusted domain.

C. There is another computer named Station0l in a trusting domain.

D. Simply renaming the computer does not make the computer join the Sales domain.

Answer. D

70. You want to configure a directory service architecture so that the administrator in each business unit can manage only the user account and resource permission for that unit. You do not want to allow administration of one business unit to have administrative rights in another business unit. You want to allow an administrator from one business unit to permit a user from a different business unit to have access to local resources. Which directory service should you choose?

A. Single domain model

B. Single master domain model

C. Multiple master domain model

D. Complete trust domain model

Answer. C

71. Your company is in a single location . You have six 2000 Servers and 200 users. Your company wants to centralize management and wants users to be able to access resources from other departments. Which of the following options is the best solution?

A. Create a single domain and install one Server as a PDC and another Server as a BDC. Then set-up the remaining servers as part of the domain.

B. Use the master domain model. In the master domain install one server as PDC and another server as a BDC. Put each department in its own resource domain and install their departme2000 Server as PDC

C. Create a single domain that has a PDC and a BDC, and install the departmental servers as member servers in their own Workgroup

Answer. A

72. You log on from a computer in the MKTG domain to one in the CORP domain. The MKTG domain trusts the Corp Domain. Which resources can you access?

A. in MKTG, MKTG/DOMUSERS access

B. in CORP, CORP/DOMUSERS access

C. in CORP, CORP/DOMGUESTS access

D. in CORP, MKTG/DOMGUESTS access

Answer. A

73. You log on from a computer in the MKTG single domain to one in the CORP domain. The MKTG domain trusts the Corp Domain. Which resources can you access?

A. in MKTG, MKTG/DOMUSERS access

B. in CORP, CORP/DOMUSERS access

C. in CORP, CORP/DOMGUESTS access

D. in CORP, MKTG/DOMGUESTS access

Answer. D

74. You log on from a computer in the MKTG single master domain to one in the CORP domain. The MKTG domain trusts the Corp Domain. Which resources can you access?

A. in MKTG, MKTG/DOMUSERS access

B. in CORP, CORP/DOMUSERS access

C. in CORP, CORP/DOMGUESTS access

D. in CORP, MKTG/DOMGUESTS access

Answer. B

75. Your Windows 2000 Server computer has two domains, Marketing and Tech. The Marketing domain trusts the Tech domain. You move the Post script printer from the Marketing domain to the Tech domain. The marketing/post users local group requires access to the printer. You create a Tech/post users local group to access the printer. How should you set up the printer to allow the original marketing group/post users group to access the post script printer? (choose all which apply.)

A. Create a one way trust in which Tech trusts Marketing.

B. Create a one way trust in which Marketing trusts Tech.

C. Create a new Global group mktg/postuser and assign it to the Local Group Tech/postusers.

Answer. A,C

76. Maria is a user in the Test domain. You want to provide her with access to and change permission for a shared directory on a Server in the Product domain. The guest account is disabled in both domains. How should you provide access for Maria?

A. Establish a trust relationship so that the Test domain trusts the Product domain. Create a local group in the Product domain that has change permission for the directory. Make Maria a member of this group.

B. Establish a trust relationship so that the Test domain trusts the Product domain. Create a global group in the Product domain that has change permission for the directory. Make Maria a member of this group

C. Establish a trust relationship so that the Product domain trusts the Test domain. Create a local group in the Product domain that has change permission for the directory. Make Maria a member of this group.

D. Establish a trust relationship so that the Product domain trusts the Test domain. Create a global group in the Product domain that has change permission for the directory. Make Maria a member of this group.

Answer. C

77. A user named Michael needs access to files on a shared directory on a Windows 2000 Server computer in the Sales domain. Michael's computer is in the Finance domain and is a member of the Managers Global group. The Sales domain trusts the Finance domain. The guest account is disabled in both domains. What should you do to enable Michael and all of the members of the manager's group to access the files?

A. Create a global group named Sales Rep in the Sales domain with access permissions for the directory and its files. Make Michael a member of the sales Rep group.

B. Create a global group named Sales Rep in the Sales domain with access permissions for the directory and its files. Make managers a member of the sales Rep group

C. Create a local group names Sales Rep in the Sales domain with access permissions for the directory and its files. Make Michael a member of the sales Rep group.

D. Create a local group named Sales Rep in the Sales domain with access permissions for the directory and its files. Make managers a member of the sales Rep group.

Answer. D

78. Tracy logs onto Corporate domain from a Windows NT workstation computer in the Marketing domain. The Marketing domain trusts the Corporate domain. Which resources can she access?

A. Resources in the Marketing domain to which users in the marketing domain have access.

B. Resources in the Corporate domain to which users in the corporate domain have access.

C. Resources in the Corporate domain to which guests in the corporate domain have access.

D. Resources in the Corporate domain to which the marketing domain guest group have access.

Answer. B

79. You want to design a network with centralized account administration for 500 users. You want department administrators to have control of resources, but not of user accounts. Which directory services architecture should you use?

A. Single domain

B. Single Master domain

C. Multiple Master domain

D. Complete Trust

Answer. B

80. Your network has three domains names Sales, Marketing and Admin. User accounts are divided up into the three domains. All users need access to specific files on a Windows 2000 Server computer in the Sales domain. How should you configure the trust relationships.

A. Establish two one-way trust relationships in which Marketing trusts Sales and Admin trusts Sales.

B. Establish two one-way trust relationships in which Marketing trusts Sales and Admin trusts Marketing.

C. Establish two one-way trust relationships in which Marketing trusts Admin and Sales trusts Admin.

D. Establish two one way trust relationship in which Sales trusts Marketing and Sales trust Admin.

Answer. D

81. Your network consists of three domains . The Corp domain contains all user accounts. The East and West domain trust the Corp domain. All users use Windows NT workstation computers. You want to configure the network so that any user installing a new Windows NT workstation computer can join any domain without any configuration needed from an administrator. How should you do this?

A. Modify the user rights in all 3 domains so that the Corp/Domain users global group can add computers to any of the domains.

B. Modify the user rights in all 3 domains so that the Corp/Domain users local group in each domain can add computers in any of the domains.

C. Modify the user rights in the Corp domain so that the users local group can add computers to the CORP domain.

D. Modify the user rights in the Corp domain so that the domain users global group from each domain can add computers to the CORP domain.

Answer. A

82. Your windows 2000 Server and network consists of two domains. The Sales domain trusts the Corp domain. All user accounts are contained in the Corp domain only. You want to allow users to backup home directories that are on an NTFS partition on a member Server in the Sales domain. How can you do this?

A. Create a local group named all backup in Sales. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group.

B. Create a local group named all backup in Corp. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group

C. Create a global group named all backup in Corp. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group

D. Create a local group named all backup on a member server in Sales. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group.

Answer. C

83. Susan is an administrator of a windows NT workstation computer. Susan wants her computer to join with the domain. She does not have a domain account. Which method can be used to join Susan computer to a domain. (Choose two.)

A. The domain administrator can add Susan's computer to the domain. Then Susan can join the domain by using the network option from the control panel in her computer

B. Susan can join the domain by using the server manager from her computer, supplying her workstation administrator account and password.

C. Susan can join the domain by using the network option in the control panel. From her computer, supply her workstation administrator account and password

D. The domain administrator can use network option in the control panel. From Susan's computer supply the domain administrator's account and password.

E. The domain administrator can use the network option in the control panel from the PDC.

Answer. A,D

84. You are the administrator of a multiple domain Windows 2000 Server network. The domains are named Sales and Support. There is currently no trust relationship between the domains. You want to allow Mary, a user in the Sales domain to print to a laser jet shared printer connected to a Server in the Support domain. You create a group, assign rights as shown in the network configuration exhibit. What changes must you make in the printer permissions dialog box to make Mary to be able to print to the laser jet? (choose 2)

A. Configure the Sales domain to trust the Support domain.

B. Configure the Support domain to trust the Sales domain.

C. Place the support/sup laser local group in the sales/laser jet global group.

D. Place the sales/laser jet global group in the support/sup laser local group.

Answer. B,D

85. You want to allow a user that logs on from NT workstation that is not a member of any domain to access resources on Servers in the Sales domain. How can you accomplish this? (Choose two.)

A. Enable the guest account in the Sales domain.

B. Create a duplicate user account in Sales domain for each NT workstation user account that requires access to resources in the Sales domain.

C. Make user accounts on the NT workstation computer members of the appropriate group in the Sales domain.

D. Create a duplicate group account for each group on the Windows NT workstation computer.

Answer. A,B

86. Your organization has 5 domains. Each domain user in your domain organization has a single account that resides in his home domain. Password security is strictly enforced. The Sales domain in your organization trusts Corp domain. Mary, a domain user in Sales domain, logs on to the Corp domain. What folders will she be able to view?

A. All folders in the Corp domain for which the Corp/Domain users global group has been granted Read access.

B. All folders in the Corp domain for which the Sales/Domain users global group has been granted Read access.

C. All folders in the Corp domain for which the Corp/Domain guests global group has been granted Read access.

D. All folders in the Corp domain for which the Sales/Domain guests global group has been granted Read access. E. All folders in either the Corp or the Sales domain for which the Sales/Domain guests global group granted Read access.

Answer. C

87. Your company has two domains, CORP and EAST. CORP trusts EAST. Your user account exists in the CORP domain, and you log on to the CORP domain from a machine that is a member of the EAST domain. To what resources do you have access?

A. Resources in CORP for which CORPDomain Users have been granted access

B. Resources in EAST for which EASTDomain Users have been granted access

C. Resources in EAST for which EASTDomain Guests have been granted access

D. Resources in EAST for which CORPDOmain guests have been granted access

Answer. A

88. Your company use a single Master domain model with 5 domains. Each domain is in a different city as shown on the following diagram. New York - Master domain with sub-domains in Chicago, Dallas, Houston and Boston. Each domain has a 56 kbps link to and from the master domain. Users often experience delays in login on from computers that are located in a resource domain because of congestion on the 56 kbps frame relay link. What should you do to speed up the log on time for remote users?

A. Add BDCs at the Master domain location.

B. Reduce the value of the replication governor registry entry on the BDCs

C. Place a BDC from the Master domain at each resource domain location.

D. Modify the setting so that each client computer logs on to the local domain. Synchronize the directory databases from the master domain to each local resource domain.

Answer. C

89. University of 75,000 users located in multiple building in a campus. You want to have centralised control of all accounts. Also you want to allow each department to manage its own user access to information. Which directory service architecture will you use?

A. Single domain

B. Single master domain

C. Multiple master domain

D. Complete trust

Answer. C

90. During regular business hours the PDC for your domain goes down and you promote one of your two backup domain controllers to the role of PDC. One of your users comes to you saying that some of the resources he has recently been given access to are now restricted to him. Why? Choose the best answer:

A. Backup domain controllers contain limited account information and therefore won't allow access to any resources not located on the local machine.

B. He must log off and log on again in order for his account to correct itself.

C. The accounts database from the PDC must be restored from backup to the BDC.

D. The changes that were made to this users account were not yet replicated when the PDC went down.

Answer. D

91. You have 3 domains: ACCT, SALES and RESEARCH. You have to manage the trusts between these domains. The requirements are the following: users on the ACCT domain needs access to resources on the ACCT domain, users on the ACCT domain need access to resources on the SALES and RESEARCH domain, users on the SALES and RESEARCH domain need access to each others resources What is the most efficient way to make the trust relationships:

A. Let ACCT trust SALES and RESEARCH, make a full trust between SALES and RESEARCH

B. Let SALES and RESEARCH trust ACCT, make a full trust between SALES and RESEARCH

C. Let ACCT be on it's own, make a full trust between the SALES and RESEARCH domain

D. Implement a full trust

Answer. B

92. You are installing Windows 2000 Server 2000 on a machine. You want the machine to be able to provide file and print resources to members in a domain called Corp, but you do not want it to authenticate user logons. How would you configure the computer?

A. As the PDC in the Corp domain

B. As a BDC in the Corp domain

C. As a member server in the Corp domain

D. As a member server in a workgroup

Answer. C

93. Your organization is using a single domain split between two cities: Nashville and Memphis. Communication between the cities is facilitated by a WAN link. The PDC of the domain resides in Nashville. Users in Memphis are complaining that their logon process is along. What action should you perform to speed up logon authentication for the Memphis office?

A. Increase the value of the Pulse setting in the registry on the PDC in Nashville

B. Increase the value of the PulseConcurrency setting in the registry on the PDC in Nashville

C. Increase the value of the PulseMaximum setting in the registry on the PDC in Nashville

D. Add an additional BDC to the network in Memphis

Answer. D

94. A domain must contain two computers running 2000 Server - one configured as a primary domain controller and the other as a backup domain controller.

A. True

B. False

Answer. B

95. You are installing a network that has four Windows 2000 Server computers and 60 Windows NT workstation computers. Users in your company's three departments require access to all of the resources on all of the servers. You must centralize user accounts and management administration. How should you configure your windows NT directory services?

A. As a single workgroup with one server handling all user login attempts

B. As a single domain with a PDC

C. As a single domain with complete trust relationships

D. As a Master domain with three resource domains

Answer. B

96. There are three domains in your company: Corp, Tech and Sales. The Corp domain is the master domain in a single master domain model. What is the easiest way to grant the right to back up any member server in any of the three domains to all users in all domains?

A. Modify the user rights of the CorpDomain Users group in the Corp domain to include the right to back up files and directories.

B. Modify the user rights of the CorpDomain Users group in all three domains to include the right to back up files and directories on each domain's PDC or BDC.

C. Add the CorpDomain Users group to the Backup Operators group on every member server in all three domains.

D. Create a local group called BkupCorp, BkupTech or BkupSales on all member servers in the Corp, Tech and Sales domains respectively. Include the Domain Users group from each of the three domains into each of these local groups. On every member server in each domain, grant the user right to back up files and directories for each domain's respective local group.

E. Create two two-way trust relationships between the Corp domain and the other domains. Create a local group called BkupCorp, BkupTech or BkupSales on all member servers in the Corp, Tech and Sales domains respectively. Include the Domain Users group from each of the three domains into each of these local groups. On every member server in each domain, grant the user right to back up files and directories for each domain 'e respective local group.

Answer. C

97. In the multiple master domain model, there are at least two master domains.

Which of the following best states the trust relationships required in a multiple master domain model?

A. Every master domain is connected to every resource domain with a two-way trust.

B. Every master domain is connected to all other master domains by two-way trusts, and every resource domain trusts all master domains with one-way trusts.

C. Every master domain trusts all resource domains with one-way trusts, and every resource domain is connected to all other resource domains by two-way trusts.

D. Every master domain is connected to all other master domains by two-way trusts, and every resource domain is connected to all other resource domains by two-way trusts.

Answer. B

98. The recommended Windows NT domain database size is 40 MB. Performance is likely to suffer if the domain database grows beyond this limit. Your company plans to have 50,000 user accounts, 40,000 computer accounts and 500 group accounts on the company-wide network. What is the minimum required number of domain databases?

A. Two

B. Three

C. Four

D. Five

E. One

Answer. A

99. What is an advantage of using a single master domain model over a single domain model?

A. centralized account administration

B. support for over 2,000 users

C. decentralized resource management

D. a central user account database

Answer. C

100. (Similar Question seen 5 times, last seen on 9/3/2001 You have used the option of making a system memory dump. How do you extract information from the memory dump file?

A. Debug.exe

B. Dumpcheck.exe

C. windbg.exe

D. Dumpexam.exe

Answer. A

101. A STOP error occurs every time you start your windows 2000 Server computer. You find that no dump file exists on the disk. What must you do to enable creation of a dump file ?

A. Create a new pagefile.sys in system root.

B. Create a new pagefile.sys on the root of drive C.

C. Add /sos to the operating system path in boot.ini.

D. Add /crashdebug to the operating system in boot.ini.

Answer. A

102. Your Windows 2000 Server is configured with 6 SCSI hard disks. One hard disk is the System disk and the other five are configured as a Stripe Set. After a power outage one of the hard disk in the Stripe Set fails. How can you replace the hard drive and recover from the Power outage?

A. Use disk administrator to regenerate the data on the new drive.

B. Recreate with Stripe Set across the five disks and restore from backup.

C. Copy the lost data from the tape backup to the new drives.

D. Start the Emergency Repair Process.

Answer. B

103. You have just installed a new SCSI controller driver in Windows NT, but now you cannot got the system to boot properly. No other change has been made to the computer. What is the easiest way to troubleshoot this problem so that the system can boot properly?

A. Boot Windows NT from the Emergency Repair Disk

B. Boot to DOS and run Dumpexam.exe from the command prompt

C. Invoke the Last Known Good configuration when prompted

D. Run the emergency repair process to restore the registry

Answer. C

104. You are installing Windows 2000 Server on a new computer. The manufacturer has provided a customized hardware abstraction layer (HAL) to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer what should you do?

A. During the hardware confimation portion of the Windows 2000 setup install the customized HAL.

B. After installing Windows 2000 server,use the recovery console to copy the customized HAL to the system32 folder on the boot partition.

C. After the installing windows 2000 setup, use the emergency repair process to install the customized HAL.

D. After installing Windows 2000 server, use the device manager to scan for Hardware changes. When prompted, install the customized HAL.

Answer. A

105. You are the administrator of a Windows 2000 Server computer. The server contains a RAID-5 array that is configured as a volume D and an 18-GB hard disk that is configured as volume C. Volume D is formatted as NTFS, contains 60GB of data, and has 2GB of free disk space. Volume C is formatted as FAT32 and has 16GB of free disk space. The server is used to store user home folders. Most of the data in the home folders has been encrypted with the encrypted with the encrypted file system. You estimate that the sever will need an additional 10-GB disk space to meet user needs. However, you will not be able to purchase additional hard disks for three months. You want to immediately free at least 10-GB of the disk space. You do not want to compromise the security of the user’s files. What should you do?

A. Instruct the users to move at least 10-GB of data to another file server that has EFS.

B. Create additional shared folders on volume

C. Move 10-GB of data to the new, shared folders.

D. Copy at least 10-GB of data to a writeable CD-ROM. Delete these files from the server.

E. Enable the compression attribute for the volume, and compress the users’ home folders. Ensure that EFS remains enabled on the home folders

Answer. A

106. Your are experiencing system errors on your Windows 2000 Server computer. Microsoft enterprise technical support has requested a dump of system memory to a file. You have configured a system paging file on your boot partition that is larger than the total amount of system RAM. How should you configure the Windows 2000 Server computer to generate the required dump file?

A. Configure the eventlog service to start automatically

B. Configure Dr. Watson for Win NT to create a crash dump file

C. Configure system recovery to write an event to the system log

D. Configure system recovery to write debugging information to %system root%memory dump

Answer. D



Add a Microsoft 70-215 dump

CertYourself.com -Free Practice Exams, Free Study Guides For MCSE, CCNA, A+, MCSD, N+ and much much more
SmartCertify.com - Take FREE IT Courses and Register to WIN a Dell PC! Click Here!


Tell your friends about this braindump!
Your email address:
Your friends' email addresses (separate with comma):
Add a personal note:

Sign up for our newsletter:
Your email address:



MCSE 70-210 exams

Comments: Email

© 2003 mcsebraindumps.com

Cisco CCNA