MCSE 70-215 Free Braindumps
|
If you want to
post your mcse braindumps - click here
Corrected and
verified mcse braindumps enriched with explanations are available to
download in the
members area.
Here you can download 70-215 braindumps for MCSE 2000. MCSE 2003 Free
Braindumps are also available.
Sign up to access the verified and corrected
mcse braindumps
USEFUL SUBMITTED DUMPS |
1.
You are the administrator of a Windows 2000 Server computer
named Paris. A user named Peter manages the local
nonadministrative user accounts on Paris. He also stops and
starts services that are not started by default. A former
employee configured Peter’s user account. You do not want Peter
to be able to change user rights assignments, install system
services, or modify operating system files. You want to ensure
that peter does not have more privileges than necessary to
perform his responsibilities on Paris What should you do? To
answer, click the Simulation button and then perform the
appropriate actions in the simulation of Computer Management.
A. 1 - Click Start > Programs > Administrative Tools > Computer
Management. 2 - Expand “Local Users and Groups” by clicking the
plus (+) sign. 3 - Click the Users folder. 4 - Double click the
Peter's user account. 5 - Click the ‘Member of’ tab. 6 - To
remove Peter from the Administrators group, select the
Administrators group then click the Remove button. 7 - Click the
Add button. 8 - Select the Power Users group, click the Add
button the click the OK button. 9 - Click the OK button and you
will be returned to the Computer Management console. 10 - Close
the Computer Management console by clicking the X in the top
right corner.
Answer: A
2. You are the network administrator for your company. The
network contains a Windows 2000 Server computer named Toronto,
which is configured as shown in the following table. Drive Label
Contents C System System files D Mgmt Manager’s home foldersE
Employ Employees’ home folderCompany policy does not allow you
to limit the amount of disk space that is available for managers
to use. At 9:00 A.M. on a business day, you discover that drive
D contains no free space. You need to increase the capacity of
drive D by at least 7 GB so that managers can continue to save
files to their existing home folders. You also need to ensure
that no data is lost and that user disruption is minimized. What
should you do to accomplish these goals? To answer, click the
Simulation button and then perform the appropriate actions in
the simulation of Windows 2000 Server.
A. 1 - Click Start > Programs > Administrative Tools > Computer
Management. 2 - Click the Disk Management icon to open Disk
Management. 3 - Right click on the D drive (Mgmt) and select
Extend Volume. 4 - Click Next. (In Extend Volume Wizard) 5 -
Select the dynamic disk containing the free space. 6 - Type in
the amount you want to extend the disk by. Here 7168 MB (=7GB).
7 - Click Next. 8 - Click Finish to complete the Wizard. 9 -
Close the Computer Management console by clicking the X in the
top right corner.
Answer: A
3. You are the administrator of a Windows 2000 Server computer
named Paris. A printer named PrinterColor is configured on
Paris. You want to allow only users in the Administrators group
and users in the Managers group to print to PrinterColor. You
also want to allow users in the Managers group to pause and
resume their print jobs, and you want to ensure that users in
the Administrators group have full control permission for
PrinterColor. What should you do? To answer, click the
Simulation button and then perform the appropriate actions in
the simulation of the Printers folder.
A. 1 - Click Start > Settings > Printers. 2 - Select the printer
and click the file menu. 3 - In the File menu, select
Properties. 4 - Click the Security tab. 5 - Select the Everyone
group and click the Remove button. 6 - Select the Power Users
group and click the Remove button. 7 - Click the Add button. 8 -
Select the Management group and click the Add button. 9. Then
click the OK button. Note: The default permission for the
Management group is ‘Print’, which is what we want. 10 - We can
select the CREATOR OWNER group and verify that it has the Manage
Documents permission. 11 - Click the OK button to close the
dialog box. 12 - Close the Printers folder.
Answer: A
4. You are the network administrator for your company. The
network contains a Windows 2000 Server computer named Server1.
You suspect that someone is unsuccessfully attempting to access
a confidential file in the folder D:\Maria on Server1. You
configure the local Group Policy for Server1 as shown in the
Local Security Settings exhibit.
<Exhibit 1 - Not Available>
You configure auditing on drive D to track Full Control access
for the Everyone group. This auditing change is propagated to
and inherited by child objects on Drive D. You open the Security
log and discover that it is filled with multiple entries of the
type shown in the Event Properties exhibit.
<Exhibit 2 - Not Available>
You need to prevent these entries from re-appearing. What should
you do?
A. In the Audit account logon events local Group Policy, clear
the Failure check box.
B. In the Audit object access local Group Policy, clear the
Success check box.
C. In the Auditing Entry for Local Disk d:\ dialog box, replace
the Everyone group with the Administrators group.
D. In the Auditing Entry for Local Disk d:\ dialog box, replace
the Everyone group with the Authenticated Users group.
E. In the Audit privilege use local Group Policy, clear the
Success check box.
Answer: B
5. You are the network administrator of a
Windows 2000 Active Director domain. You have a Windows
2000 Server computer that contains a shred folder named
Personnel. Personnel contains a subfolder named
Evaluation. The Evaluation subfolder is configured not
to inherit NTFS permissions from its parent folder. The
share and NTFS permissions are shown in the following
table. Folder Share permissions NTFS permissions
Personnel Evaluation Not shared Managers: Read Managers:
Full Control HR: Full Control HR: Full Control Managers:
Full Control HR: Full Control You want to grant the
Managers group Full Control permission for the
Evaluation folder, and you want to grant the Human
Resources (HR) group Read permission for the Evaluation
folder. You do not want to change either group’s
effective permissions for the Personnel folder.
What should you do?
A. Change the share permissions for the Personnel folder
to Full Control for the Managers group. Share the
Evaluation folder as Evaluation, and grant the HR group
Read permission.
B. Change the share permissions for the Personnel folder
to Full Control for the Managers group. Change the NTFS
permissions for the Personnel folder to Read for the
Managers group. Change the NTFS permissions for the
Evaluation folder to Read for the HR group.
C. Change the Evaluation folder to inherit NTFS
permissions from its parent folder. Change the share
permissions for the Personnel folder to Full Control for
the Managers group. Change the NTFS permissions for the
Personnel folder to Read for the HR group.
D. Change the Evaluation folder to inherit NTFS
permissions from its parent folder. Change the share
permissions for the Personnel folder to Read for the HR
group. Change the NTFS permissions for the Personnel
folder to Read for the HR group.
Answer: B
6. You are the administrator for your company’s Windows
2000 Server network. Your Windows 2000 Active Directory
structure currently has an organizational unit (OU) for
each department in your company. You create a custom
security template to ensure the highest level of
security for the research and development (RD)
department. The RD department uses local accounts for
daily operations. You want to account policy settings to
be applied to all computers in the RD department’s OU.
What should you do?
A. Create a Group Policy object (GPO) for the domain and
import the template that was created by using the
Windows.adm file.
B. Create a Group Policy object (GPO) for the domain and
import the template that was created by using the
Common.adm file.
C. Create a Group Policy object (GPO) for the computers
in the RD department’s OU. Use POLEDIT to deploy the
policy to all computers.
D. Create an OU named RD Computers in the RD
department’s OU. Create a Group Policy object (GPO) in
the RD Computers OU and then import the policy.
Answer: D
7. You are the administrator of a Windows 2000 Server
computer named ServerA. ServerA runs an application that
is used by all of your company’s employees. Employees
report that the application on ServerA is responding
slowly. You discover that the built-in Plug and Play
network adapter on ServerA cannot accommodate the
traffic generated by the application. You purchase a
faster network adapter and install it in ServerA. You
need to turn off the built-in network adapter. However,
the BIOS settings do not allow you to do so. What should
you do on ServerA?
A. In Device Manager, delete the built-in network
adapter.
B. In Device Manager, disable the built-in network
adapter.
C. Uninstall the deice driver for the built-in network
adapter.
D. In the BIOS configuration, reserve an IRQ address for
the faster network adapter.
E. Overwrite the device driver for the built-in network
adapter with the device driver for the faster network
adapter.
Answer: B
8. You are planning to upgrade Windows NT Server 4.0
computers that have SCSI controllers to Windows 2000
Server. You want to perform the upgrades by means of a
distribution folder. You review the Hardware
Compatibility List (HCL) and discover that the drivers
for the SCSI controllers are not provided by Microsoft.
You learn that the manufacturer of the SCSI controllers
produces drivers that are compatible with Windows 2000
Server computers. You download the drivers from the
manufacturer’s Web site. You need to include these new
drivers in the distribution folder so that they are
automatically installed during the upgrade process. What
should you do?
A. Create a subfolder named $OEM$\$C\Drivers under the
i386 folder. Copy the drivers to that subfolder.
B. Create a second sharepoint named $OEM$. Copy the
drivers to that sharepoint.
C. Create a subfolder named $OEM$\Textmode under the
i386 folder. Copy the drivers to that subfolder.
D. Create a second sharepoint named Drivers. Copy the
drivers to that sharepoint.
Answer: C
9. You are a recently hired network
administrator at A. Datum Corporation. A. Datum
Corporation has an office in New York and an office in
Toronto. The company network is configured as shown in
the exhibit.
<Exhibit - Not Available>
You are responsible for monitoring all servers from
Monitor1. Monitor1 and Monitor2 are configured as
management consoles running third-party network
management software. Appserver and Webserver are
configured as SNMP agents. You discover that you cannot
manage Appserver from Monitor1. What should you do?
A. Relocate Appserver to the Toronto office.
B. Move the Appserver computer account to the
toronto.adatum.com domain.
C. Add ADatumA to the list of accepted community names
on Appserver.
D. Add Public to the list of accepted community named on
Appserver.
E. Remove all community names from Appserver.
F. Remove all community names from Monitor2.
Answer: C
10. You are the network administrator for your company.
The network contains a Windows 2000 Server computer
named ServerA and is connect to the Internet by means of
a 1.544-Mbps network connection. The network also
contains a firewall, which performs network address
translation (NAT)-. The firewall is located between
ServerA and the Internet. Your manager informs you that
company employees will be allowed to work from home.
Employees who work from home will need to connect to the
company network by using a virtual private network (VPN)
connection. You install and configure Routing and Remote
Access for Windows 2000 on ServerA and then configure
ServerA to accept PPTP connections. You also configure
the firewall to permit PPTP traffic. You attempt to open
a VPN connection to ServerA from your home, but you
cannot connect. You can open a VPN connection to ServerA
from other computers on your company’s network. You need
to ensure that employees can connect to ServerA by using
a VPN connection from their home adapters. Which two
actions should you take? (Each correct answer presents
part of the solution.)(Choose two)
A. Configure the firewall to perform call ID translation
for the General Routing Encapsulation (GRE) protocol.
B. Configure the firewall to permit General Routing
Encapsulation (GRE) traffic.
C. Configure ServerA to use EAP.
D. Configure ServerA to use MS-CHAP v2.
E. Configure ServerA and employees’ home computers to
use L2TP connections and IPSec encryption.
F. Configure employee’s home computers so that Internet
Connection Sharing is enabled.
Answer: A, B
11. You need to upgrade a computer from Windows NT
Server 4.0 to Windows 2000 Server. The server has dual
processors, 2 GB of RAM, a RAID controller with five
SCSI hard disks in an array, and a generic 10/100-Mb
network adapter. You begin the installation of the
Windows 2000 Server operating system. During the text
portion of the installation, you receive an error
message indicating that no hard disks can be found. You
need to ensure that you can upgrade the computer. What
should you do?
A. Specify an additional driver during the attended
installation process.
B. Replace the current RAID controller with a RAID
controller that is on the Hardware Compatibility List (HCL).
C. Verify that at least one of the SCSI hard disks is
set to a SCSI ID number of zero, and then verify that
this hard disk is terminated properly.
D. Before starting the installation, convert all disks
from Basic to Dynamic by using the Disk Management
console.
Answer: A
12. You are the administrator of a Windows 2000 Server
computer named Intra. Intra is a member of an Active
Directory domain and hosts an intranet Web site for you
company. Company policy requires that only authenticated
users have access to the intranet site. All company
users have user accounts in the Active Directory domain.
You configure directory security for the Web site to use
integrated security. However, you discover that users
can access the Web site without being authenticated. You
need to ensure that only authenticated users can access
the Web site. What should you do?
A. Install Active Directory on Intra.
B. Select the Basic authentication check box.
C. Clear the Anonymous access check box.
D. Disable the IUSR_Intra user account on Intra.
E. Clear the Allow IIS to control password check box.
Answer: C
13. You are the network administrator for your company.
A Windows NT Server 4.0 member server in your network
has a non-Plug and Play ISA modem. You need to update
this computer to Windows 2000 Server. You also need to
ensure that you maintain the current device
configuration during the upgrade. What should you do?
A. Disable the modem. Start the upgrade process. Enable
the modem.
B. Configure BIOS to reserve the IRQ currently in use by
the modem. Start the upgrade process.
C. Remove the modem. Start the upgrade process.
Reinstall the modem.
D. Install the latest driver for the modem. Start the
upgrade process.
Answer: B
14. You create two shared printers on a Windows 2000
Server computer in your company. One printer is shared
as Admin, and the other printer is shared as Executive.
Both printers are connected to the same print device.
You set the priority of the Admin printer to 90 and the
priority of the Executive printer to 50. You want all
users in your company network to be able to send print
jobs to either printer. However, you do not want the
Executive printer to appear in the browse list when
employees other than executives and administrative
assistants create a new printer connection on their
client computers. What should you do?
A. Change the priority of the Executive printer to 99
Change the priority of the Admin printer to 10.
B. Change the share name of the Executive printer to
Executive$. Manually reconfigure client computers that
are already connected to the Executive printer.
C. Deny the Everyone group permission to access the
Executive printer. Allow access to the users who are
allowed to include the printer in their browse lists.
D. Install separate device drivers for the Executive
printer. Configure NTFS permissions on the device driver
files to allow access only to the System account and to
users who are allowed to include the printer in their
browse lists.
Answer: B
15. You are the administrator of a network that contains
a sever cluster named App1. App1 runs the Windows 2000
Cluster Service. It also runs a custom financial
application that does not have a remote administration
tool set. You install Terminal Services in Remote
Administration mode on App1. You want to be able to
administer your company’s custom application on App1
from your Windows 98 computer at your home office. What
should you do?
A. Uninstall Terminal Services and reinstall Terminal
Services in Application Server mode on App1.
B. Install Terminal Services Licensing on App1.
C. Install the Management and Monitoring Tools on the
Windows 98 client computer.
D. Install the Terminal Services client on the Windows
98 client computer.
Answer: D
16. You are the administrator of a Windows 2000 Server
computer named ServerA. Server A. ServerA runts two
applications that are used by all users in the company.
Users report that ServerA is responding slowly. Each
week, users report that the performance on ServerA is
slow that it was the previous week. You run System
Monitor on ServerA and document performance data as
shown in the following table. Object Counter Average
value System Processor Queue Length 1 Processor %
Processor Time 70 Processor Interrupts/sec 290 Physical
disk Disk queue length Physical disk Disk bytes/sec
Memory Available bytes 4 25 KB 128 MB Memory Pages/sec
11 You need to correct the condition that is reducing
the performance on ServerA. What should you do?
A. Upgrade to a faster hard disk.
B. Upgrade to a faster processor.
C. Increase the size of the paging file.
D. Increase the amount of RAM.
Answer: A
17. You are a network administrator of a Windows 2000
Active Directory domain. The company has multiple branch
offices and multiple Windows 2000 Server computers at
each office. A junior administrator is located at each
office. This junior administrator is responsible for
local server configurations. One junior administrator
has applied a new security template to the local file
server. Local users running Windows 95 on their computer
can no longer communicate with the server. You need to
verify that the security settings on the Windows 2000
Server computer at the branch office will allow client
computers to connect. What should you do?
A. Use MMC and load the Local Computer Policy snap-in.
Examine the Administrative templates in the User and
Computer section. Compare the templates against the
template settings currently in place on the server.
B. Use MMC and load the Security Configuration and
Analysis snap-in. Create and open a database. Then
choose Import file and specify the basicsv template.
C. Use MMC and load the Computer Management snap-in.
Specify the appropriate template file to compare
against, and then select the Analyze option.
D. Run the secedit /validate command to display the
appropriate template file.
Answer: A
18. You are the administrator of a Windows 2000 Network
for Contoso, Ltd. The network includes four Web servers
named WWW1, WWW2, WWW3, and WWW4. Your network also
includes a Windows 2000 Server computer that uses DNS.
Each Web server contains exactly the same content, and
users accessing www.contoso.com can be directed to any
one of them. You add records to your DNS server, as
shown in the following table. Record type Name IP
address CNAME www 192.168.10.5 CNAME www 192.168.10.6
CNAME www 192.168.10.7 CNAME www 192.168.10.8 When you
examine the logs for the Web servers, you discover that
all incoming traffic is being directed to 192.168.10.5,
which is the IP address for WWW1. You want the incoming
traffic to be balanced across the four Web servers. What
should you do?
A. Select the Disable recursion check box in the
properties of the DNS server.
B. Enable round-robin in the properties of the DNS
server.
C. Enable W3C logging in the properties of the Web
servers.
D. Install and configure Network Load Balancing on WWW1.
Answer: B
19. You are the network administrator for a domain that
contains 10 Windows 2000 Server computers. The computers
are configured as domain controllers. You company’s
information technology director asks you to create a
schedule to automatically back up all of the servers
registry files and Windows 2000 Active Directory
Services databases. You use the Windows 2000 Server
backup application to ensure that all files are backed
up to removable media on a nightly basis. The backup
process needs to run without affecting availability and
production during normal hours of operation. You need a
backup configuration that requires the least amount of
time to implement. What should you do?
A. Configure one domain controller to back up the System
State data for all 10 domain controllers to removable
media at 12:00 midnight.
B. Configure the scheduler service to run Rdisk /s on
all domain controllers at 12:00 midnight. Configure one
domain controller to back up the C:\Winnt\Repair folder
for all domain controllers to removable media at 1:00
A.M.
C. Configure all domain controllers to back up their own
System State data at 12:00 midnight to a local shared
folder. Configure one domain controller to back up that
shared folder to removable media at 1:00 A.M.
D. Configure all domain controllers to back up their own
security and registry files at 12:00 midnight to a
shared folder. Configure one domain controller to back
up that shared folder to removable media at 1:00 A.M.
Answer: C
20. You are the network administrator for your company.
The network consists of a Windows 2000 Active Directory
domain. The network includes a Windows 2000 Server
computer named ServerA, which is a member of the domain.
ServerA runs Routing and Remote Access for Windows 2000
and is connected to a modem bank. An existing company
policy allows all domain users to dial in to ServerA.
Your company hires 10 inters. Each intern has a domain
user account. All inters are permitted to access all
resources on the company network. One intern is
permitted to dial in to ServerA for remote access. The
other nine interns are no t permitted to dial in to
ServerA for remote access. You need to ensure that the
nine interns cannot establish a dial-up connection to
ServerA. What should you do?
A. Modify the default remote access policy to Deny
permissions.
B. Configure the nine interns’ domain user accounts so
that ServerA is not listed on the Logon Workstations
list.
C. Place the nine interns’ user accounts into a domain
global grouped named NoRemoteAccess. On ServerA,
configure a remote access policy that denies access to
the NoRemoteAccess group.
D. On ServerA, place the nine interns’ domain user
accounts into a local group named NoRemoteAccess. Then
configure a remote access policy that denies access to
the NoRemoteAccess group.
Answer: C
21. You are the network administrator for your company.
You are configuring a new Windows 2000 Server computer.
The server contains five physical disks. You plan to
implement a Windows 2000 software RAID. You need to
ensure that all disk volumes are fault tolerant. You
want to minimize disk access time and maximize available
storage. What should you do?
A. Configure the system volume as a simple volume and
the other volumes as striped volumes.
B. Configure the system volume as a simple volume and
the other volumes as RAID-5 volumes.
C. Configure the system volume as a mirrored volume and
the other volumes as mirrored volumes.
D. Configure the system volume as a mirrored volume and
the other volumes as RAID-5 volumes.
Answer: D
22. You are the administrator of a Windows 2000 Server
computer named ServerA. ServerA is used in your
company’s research department and does not belong to a
domain. Employees in the research department use the
local Guests user account to access ServerA. However,
new company security guidelines state that employees
must not use the local Guest user account to log on to
company computers. You disable the Guest account on
Server A. You also create local user accounts for each
employee in the research department. Three weeks later,
you discover that the Guest account has been used to
access ServerA. You disable the account again. You need
to ensure that the Guest account cannot be used to log
on to ServerA. What should you do?
A. Rename the Guest account to Guest$.
B. Remove all user accounts except your own from the
local Administrators group on ServerA.
C. Set the Audit account logon events audit policy to
audit successful and failed attempts.
D. Modify the Local Security Policy on ServerA so that
the Accounts: Guest account status policy is set to
Disabled.
Answer: B
23. You are the network administrator of a small Windows
2000 Active Directory domain. The network uses TCP/IP as
its only network protocol. The network has two subnets,
A and B. The subnets are connected by a router. All
servers in the network have static IP addresses. You
install a DHCP server on subnet A for the client
computers. You also configure the DHCP server with two
class C scopes, one for subnet A and one for subnet B.
When users on subnet B attempt to connect to servers on
subnet A, they receive the following error message: “The
network path was not found”. Users on subnet A report no
problems when they connect to the servers on either
subnet. What should you do?
A. In the DHCP server, authorize the scope needed for
subnet B.
B. Correct the error in the routers routing table.
C. Install and configure a DHCP Relay Agent on subnet A.
D. Install and configure a DHCP Relay Agent on subnet B.
Answer: D
24. You are the network administrator of a Windows 2000
workgroup at Coho Vineyard, a small office that is
configured as shown in the exhibit.
<Exhibit - Not Available>
All Windows 2000 Professional client computers are
configured to obtain IP addresses automatically. Server1
is configured to have a static IP address. However, no
applications on Server1 require a static IP address.
Server2 uses a dial-up connection to connection to the
Internet. You enable Internet Connection Sharing on
Server2. You discover that the IP address on the LAN
network adapter for Server2 is now 192.168.0.1. You want
to ensure that all network computers can connect to
Server2 and access the Internet. What should you do?
A. On all of the computers except Server1, configure
static IP addresses in the range of 192.168.0.1 to
192.168.255.255. Restart all of the computers except
Server1.
B. On all of the computers, configure static IP
addresses in the range of 192.168.0.2 to
192.168.255.255. Restart all of the computers.
C. Configure Server1 to obtain its IP address
automatically. Restart all of the computers except
Server2.
D. Configure Server2 to obtain its IP address
automatically. Restart Server2.
E. Configure Server2 with a static IP address of
169.254.53.98.’ Restart Server2.
F. On Server1, configure static IP addresses in the
range of 192.168.0.2 to 192.168.255.255. Restart
Server1.
Answer: C
25. Your Windows 2000 Server computer contains a single
18-GB hard disk. The drive is configured as a basic disk
and has twp partitions. Partition C is 2 GB in size and
contains the operating system files. Partition D is 16
GB in size and contains user data that is updated
frequently. Both partitions are formatted as NTFS. Both
partitions are backed up to a tape every evening at
10:00 P.M. You have a current Emergency Repair Disk (ERD)
for the computer, and Recovery Console is installed on
the computer. One day at 4:00 P.M., the server fails.
You attempt to restart the computer, but you receive the
following error message: “Boot disk or operating system
not found”. You use Recovery Console to discover that
the files on partition C are corrupted. You need to
recover the server from the failure as quickly as
possible. You also must recover as mush user data as
possible. What should you do?
A. Use the ERD to start the computer. Replace the
corrupted files on partition C by copying them from a
Windows 2000 Server CD-ROM.
B. Boot the Recovery Console. Copy any files that have
changed since 10:00 P.M. the previous evening to a
second server. Use the most recent tape backup to
restore the remaining user data to the second server.
C. Start the computer by using a Windows 2000 Server
CD-ROM. Select the Repair option in Setup.
D. Install a second hard disk in the computer. Install
Windows 2000 Server on the new hard disk. Re-create the
shared folders on the first hard disk.
Answer: C
|
26. You are the administrator of
a Windows 2000 Server computer that has Routing
and Remote Access for Windows 2000 installed.
Routing and Remote Access is configured with the
policies shown in the exhibit:
<Exhibit - Not Available>
The current configuration allows users to
connect remotely after logging on. You want to
limit remote connections to logon connections
only. What should you do?
A. Delete the Require L2TP policy.
B. Configure the Logon required policy to grant
access.
C. Move the Logon required policy to number one
in the policy order.
D. Change the Allow access if dial-in permission
is enabled policy to include the Logon required
policy.
Answer: C
27. You are the administrator of a Windows 2000
Server computer named ServerA. ServerA runs one
network application and also stores the roaming
user profiles for all company employees. ServerA
contains five hard disks. The size and
configuration of the hard disks are shown in the
Exhibit:
<Exhibit - Not
Available>
A 750-MB paging file is located on the RAID-1
set. The RAID-5 set has 4 GB of free space. You
analyze the disk performance and notice that the
RAID-1 set has five times more disk activity
than the RAID-5 set. You need to optimize the
hard disk activity and disk storage by using the
existing hard disk. You decide to move the
existing paging file. What should you do?
A. Create standard partitions using the free
space on disk 3 and 4. Create a 400-MB paging
file on each new partition.
B. Create a standard partition using the free
space on disk 1, 3, and 4. Create a spanned
volume that includes the free space on disk 1,
3, and 4. Move the paging file to the new
spanned volume.
C. Create a striped volume that includes the
free space on disk 3 and 4. Move the paging file
to the new striped volume.
D. Create a spanned volume that includes the
free space on disk 3 and 4. Move the paging file
to the new spanned volume.
Answer: C
28. You need to install Windows 2000
Professional on 300 computers. The computers
have different manufactures and different
hardware abstraction layers (HALs). You plan to
use a Windows 2000 Server computer running
Remote Installation Services (RIS) to perform
the installation. After the installation is
complete for the first 25 computers, users of
those computers report problems. You discover
that the latest Windows 2000 service pack
resolves those problems. You want to apply the
service pack to the remaining 275 computers
during the installation. What should you do?
A. Install the service pack on a reference
Windows 2000 Professional computer, and then run
the Riprep command on that computer. Use the
resulting image for RIS.
B. Install the service pack on the RIS server,
and then run the Riprep command on that server.
Use the resulting image for RIS.
C. Copy the service pack to the CD-based image
shared folder used by RIS.
D. Slipstream the service pack into a new i386
distribution shared folder, and then run the
Risetupcommand to create a new CD-based image
for the RIS server.
Answer: D
29. You are the administrator of a Windows NT
Server 4.0 computer named BDC1. BDC1 is a backup
domain controller, and a member of your
company’s Windows 2000 Activate Directory
domain. BDC1 contains five hard disks. Disk 0
and 1 are configured as a Windows NT 4.0 mirror
set. The mirror set contains the operating
system files and 500 MB of free disk space. Disk
2, 3 and 4 are configured as a Windows NT 4.0
stripe set with parity and contain employee data
files. The Windows NT 4.0 stripe set with parity
has a maximum capacity of 140 GB and contains 15
GB of free disk space. BDC1 runs an application
that is used by 400 company employees. A new
version of the application is available. You
need to install the new version, but it requires
Windows 2000 Server. Also, the application will
not run on a domain controller. You need to
install the new application on BDC1 as quickly
as possible. What should you do first?
A. On BDC1, back up the employee data files.
Then format all five disks and perform a clean
installation of Windows 2000 Server. Restore the
employee data files.
B. On BDC1, install Windows 2000 Server.
Configure BDC1 to use a dual-boot configuration
that includes Windows NT Server 4.0 and Windows
2000 Server.
C. Upgrade BDC1 to Windows 2000 Server. During
the upgrade, select the option to make BDC1 a
member server.
D. Upgrade BDC1 to Windows 2000 Server. During
the upgrade, select the option to make BDC1 a
domain controller. After the upgrade is
complete, demote BDC1.
Answer: A
30. You are the administrator of a Windows 2000
Server computer. This sever contains critical
payroll files. You must perform a daily backup
of these files. You shutdown the server and
connect a non-Plug and Play tape device. You
restart the server and install the tape device
driver. After the driver loads, you are promoted
to restart the server. You then receive the
following STOP error:
“DRIVER_IRQL_NOT_LESS_OR_EQUAL” You need to
enable thus server to start correctly.
What should you do?
A. Restart the server in debugging mode. When
the server starts, remove the device and its
associated driver.
B. Restart the server by using the Windows 2000
Server CD-ROM and choose to repair the
installation.
C. Restart the server by using the last known
good configuration.
D. Restart the server by using a Windows 2000
bootable floppy disk. When the server starts,
remove the device and its associated driver.
Answer: C
31. You are the administrator of a Windows 2000
Server computer named ServerA. ServerA contains
five hard disks. Disks 0 and 1 are configured as
a mirrored volume and contain the operating
system files. Disk 2, 3, and 4 are configured as
a stripe set with parity volume and contain 150
GB of data files. ServerA also contains a tape
backup device, which is used to make a full
backup of the data files every weekend. Disk 2
fails on Tuesday. You replace disk 2 with a new
hard disk. You need to return the stripe set
with parity volume to normal operation as
quickly as possible. You also need to minimize
the amount of data lost. What should you do?
A. Use the Disk Manager console to delete and
re-create the stripe set with parity volume.
B. Restore the data files from the most recent
tape backup to the stripe set with parity
volume.
C. Modify the Boot.ini file so that the ARC path
for Windows 2000 Server points to disk2.
D. Use the Disk Manager console to repair the
volume.
Answer: D
32. You are the network administrator of a
Windows 2000 Active Directory domain. The three
Windows 2000 Server computers in the domain have
the Securews.inf template file installed. To the
domain, you add a Windows NT Server 4.0 computer
that runs a single application. You upgrade the
server to Windows 2000 Advanced Server, and then
apply the same level of security that the other
servers in the domain have. You discover that
the application no longer runs. You need to
ensure that the application can run. What should
you do?
A. Run the dcpromo command on the Server.
Reinstall the application on the server,
B. Run the application from the command prompt
followed by the /separate switch.
C. Apply the Securews.inf template file.
D. Apply the Compatws.inf template file.
Answer: D
33. You install an internal EIDE DVD-ROM drive
in one of your critical Windows 2000 Server
computers. After installing the
manufactured-provided device drivers, you
restart the server. While the server is
starting, the monitor displays the following
error message “IRQ_LESS_OR_NOT_EQUAL”. You need
to ensure as quickly as possible that the server
is operational. What should you do?
A. Restarts the computer by using the Recovery
Console, and copy the device drivers to the
WINNT\System32 folder.
B. Restart the computer by using the last known
good configuration. chedule the DVD-ROM
installation for your next scheduled maintenance
period.
C. Restart the computer in safe mode. Schedule
the DVD-ROM installation for your next scheduled
maintenance period.
D. Connect the DVD-ROM drive to a different EIDE
controller bus, and restart the computer.
Answer: B
34. You are the administrator of a Windows 2000
Server computer named ServerA. ServerA runs
Internet Information Services (IIS) and has a
single Web site named Default Web Site. The
manager of your company’s sales department asks
you to create a new shared folder named
Forecasts on ServerA. The manager plans to place
documents in the shared folder. All company
employees need to access the documents by means
of a Web browser and the URL http://servera/forecasts/.
You create the Forecasts shared folder and
configure the appropriate share and NTFS
permissions. You verify that the manager is able
to place documents in the shared folder and map
a network drive to \\ServerA\Forecasts. However,
company employees cannot access the documents by
means of their Web browser. When they attempt to
access the documents, their browsers display the
following error message: “Page not found”. You
need to ensure that all company employees can
access the documents by using a Web browser and
the URL http://servera/forecasts/. What should
you do?
A. Restart the World Wide Web Publishing
service.
B. Create an additional share named Forecasts$
for \\ServerA\Forecasts.
C. Ensure that the TCP/IP Helper service on
ServerA is configured to start automatically.
D. In the Internet Services Manager console,
configure a new virtual directory named
Forecasts. Point Forecasts to \\ServerA\Forecasts.
Answer: D
35. You want to set an account policy for domain
accounts to have a maximum password age of 30
days and for local computer accounts to have a
maximum password age of 90 days. Which action or
actions should you take? (Choose all that apply)
A. Configure a Group Policy object (GPO) on the
domain that sets the maximum password age to 30
days.
B. Configure a Group Policy object (GPO) on the
domain that sets the maximum password age to 90
days.
C. Configure a Group Policy object (GPO) that
sets the maximum password age to 30 days, and
link it to all organizational units (OUs)
D. Configure a Group Policy object (GPO) that
sets the maximum password age to 90 days, and
link it to all organizational units (OUs).
E. Configure a local computer policy on all
local computers that sets the maximum password
age to 30 days.
F. Configure a local computer policy on all
local computers that sets the maximum password
age to 90 days.
Answer: A, F
36. Your company network consists of a Windows
2000 domain and 300 Windows 2000 Professional
computers. A member server named Applic1 has
Terminal Services installed in Remote
Administration mode. All client computers have
Terminal Services Client software installed. You
need to make Terminal Services on Applic1
available on all client computers. Which two
actions should you take? (Each correct answer
presents part of the solution.)(Choose two)
A. Install Terminal Services licensing on
Applic1.
B. Install Windows 2000 Advanced Server on
Applic1.
C. Install Terminal Services licensing on a
domain controller.
D. Remove Terminal Services from Applic1.
E. Reconfigure Terminal Services to operate in
Application Server mode.
Answer: C, E
37. You are the network administrator for your
company. The network includes a Windows 2000
Server computer named ServerA. The network also
includes five UNIX client computers and 450
Windows Professional client computers. Your
manager asks you to create a new shared folder
named SalesDocs on ServerA. You create the
SalesDocs shared folder on an NTFS partition.
Your manager places several documents in
SalesDocs. Employees who use UNIX client
computers cannot connect to the SalesDocs shared
folder. Your manager asks you to ensure that all
company employees can access the documents. You
verify that the share and file permissions on
the SalesDocs shared folder grant Read
permission to all employees. You need to ensure
that all employees can access the documents in
the SalesDocs shared folder. What should you do?
A. Move the SalesDocs shares folder to a FAT32
partition on ServerA.
B. Create a host file on each UNIX client
computer that includes the name and IP address
for ServerA.
C. Modify the share permissions on the SalesDocs
shared folder so that Everyone group has Full
Control permissions.
D. Install Internet Information Services (IIS)
on server A. Configure a new FTP site that uses
the SalesDocs shared folder as its root.
Answer: D
38. You are the administrator of a Windows 2000
Server computer named ServerA. ServerA contains
a single 10/100-Mbps network adapter and is
connected to a 100-Mbps network segment. ServerA
is used as a file and print server by the users
on your network. You install a second
10/100-Mbps network adapter in ServerA and
connect it to the same network segment as the
first network adapter. The files contained on
ServerA are mission critical, and you need to
ensure that ServerA will remain available to
network users even if the server’s network
adapter fails. You want ServerA to use the
second network adapter only if the first network
adapter fails. What should you do?
A. Configure the second network adapter so that
is has a different default gateway from the
first network adapter.
B. Configure the second network adapter so that
it has the same IP address as the first network
adapter.
C. Configure the first network adapter to use
100 Mbps. Configure the second network adapter
to use 10 Mbps.
D. Configure the first network adapter so that
it has an interface metric if 1. Configure the
second network adapter so that it has an
interface metric of 10.
Answer: D
39. You are the administrator of a Windows 2000
Server computer that has Routing and Remote
Access for Windows 2000 installed. Routing and
Remote Access is configured with the policies
shown in the exhibit:
<Exhibit - Not Available>
The current configuration allows users to
connect remotely after logging on. You want to
limit remote connections to logon connections
only. What should you do?
A. Delete the Require L2TP policy.
B. Configure the Logon required policy to grant
access.
C. Move the Logon required policy to number one
in the policy order.
D. Change the Allow access if dial-in permission
is enabled policy to include the Logon
requiredpolicy.
Answer: C
40. You are the administrator of a Windows 2000
Server computer named Intra. This server hosts
an intranet Web site for you company. The
marketing department stores marketing files in a
shared folder on a separate file server. The
NTFS permissions on the folder are shown in the
File Permissions exhibit:
<Exhibit 1 - Not Available>
The marketing director wants to make the
marketing files available to the rest of the
company by means of the intranet. She wants
company users to be able to read, but not
modify, all of the files. You create a new
virtual directory named Marketing under the
intranet Web site folder on Intra. You configure
the virtual directory as shown in the Virtual
Directory Configuration exhibit.
<Exhibit 2 - Not Available>
Some users report that they are not able to
access the marketing files from their Web
browser. However, all users in the marketing
department are able to access the files. You
need to ensure that all company users are able
to read the marketing files. What should you do?
A. Select Directory browsing check box on the
Virtual Directory tab.
B. Copy the files from their location on the
filer server to \\Intra\Marketing.
C. Modify the NTFS permissions on the file
server to remove the entry for Marketing.
D. Modify the NTFS permissions on the file
server to include an entry for Everyone: Read.
Answer: D
41. You install a new computer named
Srv34.millertextiles.com on your Windows 2000
network. Part of your network is shown in
network diagram. When you complete the
installation of Srv34.millertextiles.com, you
find that you cannot connect to
Srv22.admin.millertextiles.com. You examine the
TCP/IP configuration on Srv34.millertextiles.com
and find no default gateway address. You want to
connect from Srv34.millertextiles.com to
Srv22.admin.millertextiles.com. Which default
gateway address should you use? To Answer, click
the appropriate IP address in the network
diagram.
<Exhibit - Not Available>
A. <Exhibit - Not
Available>
Answer: A
42. Your domain includes numerous domain
controllers. One of the domains controllers is
malfunctioning, and a disk with the following
ARC path is not responding:
multi(1)disk(0)rdisk(1)partition(1).
The nonresponsive disk needs to be replaced.
Which disk should you replace?
To Answer: click the appropriate disk in the
diagram.<br><font color="red"><b><Exhibit 1 -
Access all exam exhibits when you purchase this
exam></b></font>
A. <font color="red"><b><Exhibit 1 - Access all
exam exhibits when you purchase this
exam></b></font>
Answer: A
43. You install a new server application on your
Windows 2000 Server computer. Response times
fail to meet user specifications. You want to
use the Processes page in Task Manager to find
out whether the response time of new application
would improve by the addition of one or more
processors. Which two columns should you select
to view? (Choose two.) To answer, click the two
appropriate check boxes in the Select Columns
dialog box. (Note: The default settings have
been changed.)
<Exhibit - Not Available>
A. <Exhibit - Not
Available>
Answer: A
44. You are installing a new computer names
Svr2.justtogs.com on your Windows 2000 network.
Part of the network is shown in the exhibit.
<Exhibit 1 - Not Available>
You want to enter the appropriate TCP/IP
addresses for the subnet mask and the default
gateway for Svr2.justtogs.com. Which subnet mask
and default gateway should you use? To answer,
click the Select and Place button, and then drag
the appropriate addresses to the appropriate
boxes in the Internet Protocol (TCP/IP)
Properties dialog box.
<Exhibit 2 - Not Available>
A. <Exhibit - Not
Available>
Answer: A
45. You are the administrator of the A. Datum
Corporation network shown in the exhibit.
<Exhibit 1 - Not Available>
You want to use a Virtual Private Network (VPN)
so that 100 users in the Phoenix office can
access resources in the Portland office. How
should you configure the VPN server in the
Portland office? To answer, click the Select And
Place button, and then drag the appropriate
value or values to the Address Range dialog box.
Select and Place
<Exhibit 2 - Not Available>
A. <Exhibit - Not
Available>
Answer: A
46. You want to delegate the backup and restore
responsibilities of all servers to a new
employee named Richard. Richard must not be able
to shut down any servers or uninstall any driver
files. You need to apply the appropriate
permissions for Richard. What should you do?
A. Make Richard a member of the domain admins
group.
B. Make Richard a member of the server
operations group.
C. Make Richard a member of the backup operators
group.
D. Grant Richard the user rights to backup and
restore files on all computers in the domain.
E. Grant Richard read only permission to the
volumes from which he needs to back up and
restore files.
Answer: D
47. Your company recently hired you to
administer its Windows 2000 network. The network
includes 100 Windows 2000 Server computers.
These servers are members of a Windows 2000
domain and are contained in an OU named servers.
You discover that each Windows 2000 Server
computer has local security auditing enabled and
that each server is configured to audit
different events. You want to standardize the
events that are audited on the servers. You also
want to ensure that auditing remains
standardized even if the audit policy changes.
What should you do?
A. Configure a local auditing policy on each
domain controller.
B. Configure each server to implement a
standardized auditing policy.
C. Configure the standardized auditing policy on
all domain controllers in the domain.
D. Configure a local group policy object on each
server in the servers OU.
E. Configure a group policy object, and apply it
to the servers OU.
Answer: E
48. You are installing Windows 2000 Server on a
multiprocessor computer. The manufacturer has
provided a customized Hardware abstraction layer
(HAL) to use with the computer. The customized
HAL is on the floppy disk. You want to install
the customized HAL designed for the computer.
What should you do?
A. During the text mode portion of the Windows
2000 setup, install the customized HAL.
B. After the text mode portion of Windows 2000
setup is complete, use the Recovery Console to
copy the customized HAL to the system32 folder
on the boot partition, and then continue Windows
2000 Setup
C. After the text mode portion of windows 2000
setup is complete, use the emergency repair
process to replace the existing HAL with the
customized HAL, and then continue the windows
2000 setup.
D. After the Windows 2000 setup is complete, use
device manager to scan for Hardware changes.
When prompted, install the customized HAL.
Answer: A
49. You are the administrator of your company’s
network. The company adds a new application to
the network. This application reads and writes
large image files to a server. Approximately 100
users use the application. When all 100 users
use the application simultaneously, the
application has a slower response time. More
than 10,000 users are in the domain where the
imaging server resides, but no other users are
reporting network response problems. You need to
find out the cause of the problem. What should
you do in the System Monitor?
A. Log the Processor Queue Length counter for
the System object.
B. Log the Avg. Disk Queue Length counter for
the PhysicalDisk object.
C. Chart the Demand Zero Fault/sec counter for
the Memory Object.
D. Chart the Pages/sec counter for the Memory
object.
Answer: B
50. Your network includes Windows 2000
Professional client computers, Windows NT
Workstation 4.0 client computers, Windows 95
client computers and UNIX client computers.
Users of the Windows operating systems sent
print jobs to shared printers on a Windows 2000
Server computer named PrintServ. The UNIX client
computers support the LPR printing protocol. You
want to make the shared printers on PrintServ
available to the UNIX computers. What should you
do?
A. Configure each of the printers to use an LPR
port.
B. Install Microsoft print services for Unix on
PrintServ.
C. Configure each of the printers to support
TCP/IP printing.
D. Use the SRVANY utility from the Windows NT
Resource Kit to run the LPR program as a
service.
Answer: B
|
51. You are the
administrator of a Windows 2000 Server
network. Users report that they are
unable to access shared folders on one
of your servers. You open My computer on
the server and do not find the volumes
on dynamic Disk 3 that contain the
shared folders. When you open Disk
Management, you see that Disk 3 is
offline. You confirm that the disk has
power and it is attached to your SCSI
adapter. Other disks connected to the
adapter appear to be functioning
normally. You want to use Disk
Management to resolve the problem. What
should you do next?
A. Rescan the disks on the server.
B. Reactivate disk 3.
C. Remove disk 3 by using disk
administration, and restart the
computer.
D. Convert disk 3 to a basic disk, and
then convert it back to a dynamic disk.
Answer: B
52. Your Windows 2000 Server computer
contains a 14-GB hard disk formatted as
FAT32. This computer has been operating
on your network for several months. You
want to find out whether you need to
defragment the disk to improve
performance. What should you do first?
A. From a command prompt, convert the
disk to NTFS and then run the Chkdsk
command.
B. From disk management, format the disk
as NTFS and then run the Chkdsk command.
C. Use disk Defragmenter to analyze the
disk.
D. Use disk Defragmenter to defragment
the disk.
Answer: C
53. You are the administrator of a
Windows 2000 Server network consisting
of 500 Windows 2000 Professional
computers and 50 Windows 2000 Server
computers. You configure two domains;
litware.local and dev.litware.local. You
enable auditing in the domain policy
object for litware.local to audit the
success and failure of object access.
You install a printer on a domain
controller named dc7.dev.litware.local.
You configure auditing on this printer
to observe successes and failures of
printing by members of the Research
universal group. When you view the
security log for dc7.dev.litware.local
computer one week later, you find that
no events have been written to the log.
However, you know that members of the
research universal group used the
printer during the past week. You want
to log all successes and the failures of
printing by this group for the printer
on dc7.dev.litware.local. What should
you do?
A. Enable auditing in the Domain Policy
for dev.litware.local to audit the
success and failure of object access.
B. Edit the domain policy object for
litware.local to enable auditing of the
success and failure of directory service
access.
C. Configure auditing of successes and
failures of object access in the default
domain controller policy object in the
domain controllers Organizational Unit
of the dev.litware.local domain.
D. Configure auditing of successes and
failures of the object access in the
default domain controllers policy object
in the domain controllers Organizational
Unit of the litware.local domain.
Answer: A
54. Your network uses TCP/IP as the only
protocol. Devices on the network are
configured to use IP addresses from the
private 10.0.0.0 range. All the client
computers on the network use Windows
2000 Professional. The network includes
Windows 2000 Servers and UNIX Servers.
Users’ print jobs are sent to shared
printers on a Windows 2000 Server
computer named PrintServ that directs
the print jobs to the print devices
attached directly to the network. You
have a high-capacity print device that
is attached to one of the UNIX Servers.
The UNIX computer uses LPR printing
protocol, and its IP address is
10.1.1.99. The name of the printer queue
is GIANT. You want users to be able to
connect to this printer from their
computers. What should you do?
A. Install Microsoft print services for
Unix on PrintServ. Create a network
printer on users’ computers, and specify
that the printer URL is LPR://10.1.1.99/GIANT.
B. Install Microsoft print services for
Unix on users’ computers. Create a
network printer on users’ computers, and
specify that the printer URL is LPR://10.1.1.99/GIANT.
C. Create a network printer on PrintServ
and specify that the printer name is
\\10.1.1.99\GIANT. Share this printer
and connect to it from users’ computers.
D. Create a local printer on PrintServ.
Create a new TCP/IP port for an LPR
server at address 10.1.1.99 with a queue
name of GIANT. Share this printer and
connect it from the users’ computers.
Answer: C or D (please confirm it)
55. You want to upgrade a Windows NT
Server 4.0 computer named Server34 to
Windows 2000 Server. Server34 is a
member server in a Windows 2000 domain
named marketing.fabrikam.local. The
domain runs in native mode. You want to
change the role of Server34 from a
member server to a domain controller in
the same domain. What should you do?
(Choose two)
A. Reinstall Windows NT 4.0 on Server34
in the same WINNT folder, and make
Server34 a BDC in the marketing domain.
B. Use Server manager on Server34 and
promote Server34 a PDC for the marketing
domain.
C. Upgrade Server34 to Windows 2000
Server.
D. Run the Active Directory installation
wizard to make Server34 a domain
controller in the
marketing.fabrikam.local domain.
E. Run the Active Directory installation
wizard to convert Server34 to a domain
controller in the
marketing.fabrikam.local domain.
Answer: C, D
56. You Windows 2000 Server computer
contains four hard disks of different
sizes. Each hard disk is configured as a
basic disk and has a single 5-GB
partition. All four disks have the
amount of unpartitioned space shown in
the following table: Disk Unpartitioned
Space
Disk 0 3-GB
Disk 1 4-GB
Disk 2 3-GB
Disk 3 8-GB
On each hard disk, you create a second
partition that uses the remaining
unpartitioned space on the disk. You
create an 18-GB stripe volume that
includes all four of the new partitions.
Six months later, disk 1 fails. You
replace it with a new hard disk, and
create the necessary partitions. As
quickly as possible, you need to
retrieve the data that was contained on
disk 1.
What should you do?
A. Restore the first partition on disk 1
from the most recent tape backup. Use
disk management to repair and rebuild
the stripe volume.
B. Delete and re-create the stripe
volume. Restore the contents of disk 1
from the most recent tape backup.
C. Restore both partitions on disk1 from
the most recent tape backup.
D. Delete and re-create the stripe
volume. Restore the first partition on
disk 1 and then stripe volume from a
recent tape backup.
Answer: D
57. You are the administrator of a
Windows 2000 domain and two Windows NT
domains. The Windows 2000 domains trust
each of the Windows NT the domains, and
the Windows NT domains trust the Windows
2000 domain. A Windows 2000 domain
controller named DC1 is configured to
use the highly secure domain controller
security template. Users of computers in
the Windows NT domains report that they
cannot access DC1. You need to allow
users of computers in the Windows NT
domain to access resources on DC1.
What should you do?
A. Apply a less restrictive custom
security template to DC1.
B. Apply a less restrictive custom
system policy to the Windows NT domain
controllers.
C. Ensure that the Windows 2000 domain
is configured to run in mixed mode
D. Ensure that the Windows 2000 domain
is configured to run in native mode.
Answer: A
58. You are a network administrator for
your company. The company is currently
configuring its branch offices with a
Windows 2000 Server computer at each
office. Each branch office has a
technical-support department but not a
network administrator. You want to
configure the remote Windows 2000 Server
computer so that whenever a new
Microsoft driver becomes available, the
branch offices are notified
automatically when the administrator
logs onto the server. What should you
do?
A. Install the Windows 2000 Resource
Kit.
B. Install Windows Critical Update
Notification.
C. Configure system file Checker to
notify the branch offices.
D. Configure Windows File Checker to
notify the branch offices.
Answer: B
59. Your company has 50 offices. The
employees in these offices have limited
knowledge of Windows 2000. Each employee
has a network of between five and 20
client computers. The office networks
are not connected to any other network.
The company is buying 50 identical
computers to run Windows 2000 Server in
these offices. These servers must be
installed to company’s standard
configuration. You create a setup
information file (SIF) that specifies
the company’s standard configuration.
You want to automate the installation
process as much as possible in the least
possible amount of time. What should you
do?
A. Use the Makebt32.exe to create four
installation startup disks and add the
SIF to the first disk. Instruct an
employee at each office to start the
installation by using these disks.
B. Create an MS-DOS boot disk that
contains CD ROM drivers and the SIF and
that runs the Winnt/S: D:\i386 command.
Instruct an employee at each office to
start the installation by using this
disk.
C. Create a floppy disk that contains
only the SIF. Instruct an employee at
each office to start the installation by
using the Windows 2000 Server CDROM,
with the floppy disk inserted.
D. Create a Windows 2000 folder on a
hard disk. Copy the Windows 2000 Server
CD-ROM to the folder. Add the SIF to the
folder. Copy the folder to a writable
CD. Instruct an employee at each office
to start the installation by using this
CD.
Answer: C
60. You are the administrator of a
Windows 2000 Server network. On each
server, you format a separate system
partition and a separate boot partition
as NTFS. Several months later, you shut
down one of the servers for the
maintenance. When you try to restart the
server, you receive the following error
message “NTLDR is missing. Press any key
to restart”. You want to install a new
NTLDR file on the server, but you do not
want to lose any settings you made since
the original installation. What should
you do?
A. Start the computer by using Windows
2000 Server computer CD-ROM and choose
to repair the installation.
B. Select the Recovery Console and copy
the NTLDR file on the CD-ROM to the root
of the system volume.
C. Start the computer by using Windows
2000 Server computer CD-ROM and choose
to reinstall. When installation is
complete, copy the NTLDR file to the
root of the boot volume.
D. Start the computer by using a Windows
2000 bootable floppy disk. From the
command prompt, run the sfc/scanboot
command.
E. Start the computer by using a Windows
2000 bootable floppy disk. Run the File
Signature Verification utility.
Answer: B
61. Litware Inc., has two offices named
East and West. The Windows 2000 Server
computer named east.litware.com is a
domain controller in the East office,
and the Windows 2000 Server computer
named west.litware.com is a domain
controller in the west office. Both
offices create tape backups of server
applications, data and System State
data. The tapes are stored in the East
office. You need to restore the System
State data to west.litware.com. What
should you do?
A. Run windows backup on
east.litware.com, and restore the System
State data to the systemroot folder on
the west.litware.com.
B. Restart east.litware.com in directory
services restore mode. Run windows
backup on east.litware.com, and restore
the System State data to the systemroot
folder on west.litware.com.
C. Restart east.litware.com and
west.litware.com in directory services
restore mode. Run windows backup on
east.litware.com, and restore the System
State data to the systemroot folder on
west.Litware.com.
D. Ship the west.litware.com backup
tapes to the west office. Run windows
backup on west.litware.com, and restore
the System State data to the systemroot
folder.
Answer: D
62. You are the administrator of a
Windows 2000 Server network. You install
COM + applications on two of your
servers. You want to ensure that the
component services class registration
database is included in your normal
system backups on these servers. What
should you back up?
A. The Winnt\Registration folder.
B. The Winnt\System32\Com folders.
C. At least one file from each boot
volume.
D. The System State data.
Answer: D
63. Your network contains Windows 2000
Professional client computers that use
TCP/IP as the only network protocol. The
network also contains Windows 3.1
computers that use the NetBEUI protocol.
You install a new Windows 2000 Server
computer on the network. You configure
this server to use NetBEUI and TCP/IP.
All of the Windows 2000 Professional
client computers and Windows 3.1
computers are able to access the server.
When you browse network resources on the
server, you notice a delay before a list
of servers is returned. What should you
do to remove this delay?
A. In the Advanced settings for the
network adapter, disable NetBEUI from
Client for Microsoft networks.
B. In the Advanced settings for the
network adapter, disable NetBEUI from
file and printer sharing for Microsoft
network.
C. In the properties of the network
adapter, disable Client for Microsoft
Networks.
D. In the Advanced settings for TCP/IP,
enable NetBIOS over TCP/IP.
Answer: D
64. You are the administrator of a
network that includes Windows NT server
4.0 computers, Windows NT workstation
4.0 computers, and UNIX computers. The
network consists of a single Windows NT
domain. You are upgrading a Windows NT
server computer named Server1 to Windows
2000 Server. Server1 is a BDC in the
domain. The existing DNS server is a
UNIX computer that supports SRV
(service) records and is configured to
accept dynamic updates. The existing
WINS server is another Windows NT server
computer. You want to configure Server1
as a domain controller in a new Active
Directory forest. You want the existing
Windows NT domain accounts to be
upgraded to Active Directory. You plan
to upgrade the other domain controllers
in the domain to Windows 2000 after the
upgrade of Server1 is complete. You want
to perform the upgrade of Server1 with
the least possible impact on other
computers on the network. What should
you do?
A. Promote Server1 to the PDC of the
domain. Run Windows 2000 Setup on
Server1.
B. Run Windows 2000 Setup on Server1. At
the end of Setup, configure server1 as a
DNS server and a WINS server.
C. Add a static mapping for server1 on
the WINS server. On the DNS server,
create an SRV record for the LDAP
service on server1. Run Windows 2000
Setup on server1.
D. Install the Microsoft DNS service on
an existing Windows NT server. Apply
Windows NT 4.0 service pack 4 or later
to the server. Run Windows 2000 Setup on
server1.
Answer: A or B (please confirm it)
65. You are the administrator for your
company. Mike Nash is a member of the
administration group, and Nate Sun is a
member of the Intern group. Both groups
are in the same domain. On the Intranet
Server, the administration group is
placed in the security group, and the
intern group is placed in the
Nonsecurity group. The security group is
then granted full control permission for
sales virtual directory. Nate needs to
update new sales information that is
located on the sales virtual directory.
What should you do so that Nate can
perform that task?
A. Enable anonymous access for the
Intranet Server.
B. Enable anonymous access for the sales
virtual directory.
C. Remove Nate from the intern group.
D. Make Nate a member of the security
group.
Answer: D
66. You are the administrator of a
Windows 2000 Server computer at Blue sky
Airlines. You configure a server named
print10.marketing.blueskyairlines.local
as a print server at the Los Angeles
site. You create and share a variety of
printers on the server for use by
employees in the marketing
blueskyairlines.local domain. You want
to review the configured properties of
all the shared printers on the
print10.marketing.blueskyairlines.local.
You want to perform this review from a
Windows 2000 Professional computer at
the London site of Blue sky Airlines.
What should you do?
A. Use your web browser to connect to
http://print10.marketing.blueskyairlines.local/printers.
B. Use your web browser to connect to
http://print10.blueskyairlines.local/printers.
C. Run the net view\\print10 command.
D. Run the net view\\print
10.blueskyairlines.com command.
Answer: A
67. You use computers in two different
offices. Your home folder is stored on a
server named UserData01. You work with
many files that are highly confidential.
You keep the confidential files in a
folder named Private in your home
folder. You need to maximize the
security of the private folder. You also
want to be able to access the folder
from the computers in each office. What
should you do?
A. Obtain a signing and sealing
certificate from a certificate server,
and install the certificate on the
computers you use.
B. Login in at UserData01as a domain
administrator, connect to your home
folder and set the encryption attribute.
C. Configure your account to have
roaming user profile. Use the properties
of the private folder to set the
encryption attribute.
D. Add the cipher/e/s *.* command to
your computer’s startup script.
Answer: C
68. You are the administrator of you
company’s network. You are configuring
the security policy for a group of users
in the Finance organizational unit (OU).
You need to configure the group policy
so that future changes to the group
policy will be applied within 15 minutes
to any computers that are logged on to
the network. What should you do?
A. Enable the background refresh setting
to use the default group policy refresh
rate.
B. Enable the asynchronous group policy
application setting.
C. Enable and configure the group policy
refresh interval for domain controllers.
D. Enable and configure the group policy
refresh interval for computers.
Answer: D
69. You are the administrator of a
Windows 2000 network. You upgrade 50
Windows NT Server 4.0 computers to
Windows 2000 and place them in a single
domain. The domain includes 300 member
client computers, consisting of 200
Windows 2000 Professional computers and
100 Windows NT Workstation 4.0
computers. You implement group policy
objects for each Organizational Unit.
However, you find that these GPOs apply
only to users of the Windows 2000
Professional computers. You want to
restrict the users of the Windows NT
Workstation computers from accessing
registry editing tools. What should you
do?
A. Create an OU that contains all
Windows NT users and computers. Create a
GPO in the OU that restricts users from
accessing registry editing tools.
B. Create a Windows NT system policy
file on Windows 2000 domain controller.
Configure the policy so that it
restricts default users from accessing
registry editing tools.
C. Create a mandatory user profile for
the Windows NT users that removes any
shortcuts for registry editor and system
policy editor from each user’s desktop.
D. Create a Windows NT system policy
that restricts the default users from
accessing registry editing tools. Save
the system policy file to each user’s
home folder.
Answer: B
70. You are a member of the backup
operators group in the arborshoes.com
domain. You are not a member of any
other group in this domain. You are
logged on to a Windows 2000 Server
computer named bcksbr3.arborshoes.com
You try to configure the software for a
tape backup device, but the
configuration fails during backup. The
documentation for the tape backup device
indicates that the current tape driver
is out of date and must be updated to
support the configuration. What should
you do?
A. Run the runas command, supplying user
name and password to start device
manager. Then click the update driver
command button on the driver tab for the
tape backup device. Instruct the domain
administrator to run the runas command,
supplying the domain
B. administrator’s user name and
password to start device manager. Then
click the update driver command button
on the driver tab for the tape backup
device.
C. Open device manager, and then click
the update driver command button on the
driver tab for the tape backup device.
D. Run the add/remove hardware wizard.
When prompted, select the Add/trouble
shoot a device option.
Answer: B
71. Your Windows 2000 Server computer
has two disks attached to an EIDE disk
controller. You need additional disk
space. You add a new SCSI disk
controller that has six new disks
attached. The new controller is not
included on the current hardware
compatibility list (HCL). When you
restart the computer, Windows 2000 does
not detect the new controller. What can
you do to install the new controller?
(Choose two)A. Use device manager to
turn off IRQ steering in the properties
of the standard PC. Then restart the
computer.
B. Use the Add/remove hardware wizard to
add a new SCSI and RAID controller from
the disk supplied by the manufacturer.
C. Use disk management to rescan the
disks.
D. Use the manufacturer’s setup program
to install the driver for the SCSI disk
controller.
E. Use disk management to restore the
basic configuration. Then restart the
computer.
Answer: B, D
72. You install a new modem in your
Windows 2000 Server computer. When you
restart the computer, Windows 2000
detects the modem and installs the
default driver. Occasionally the modem
stops communicating with your internet
service provider and then only way to
reactivate the modem is to restart the
computer. You download an updated driver
for the modem from the manufacturer’s
web site and save it in your WINNT
folder. You want to install the new
driver. What should you do?
A. In the property sheet for the modem
in device manager, click the update
driver command button.
B. Use device manager to scan for
hardware changes.
C. Use device manager to delete the
modem, and then restart the computer.
D. Move the new driver to the
\WINNT\driver Cache folder, and then
restart the computer.
Answer: A
73. You need to measure physical disk
performance counters on your Windows
2000 Server computer. You want to run
system monitor locally on the server.
You also want to ensure that system
monitor has the least impact on other
processes currently running. What can
you do? (Choose two)
A. From the command prompt, run the
start/min perfmon command.
B. From a command prompt, run the
start/low perfmon command.
C. From a command prompt, run the
start/normal perfmon command.
D. Open system monitor and then use task
manager to set the priority of the
Mmc.exe process to low.
E. Open system monitor, and then use
task manager to set the priority of
Mmc.exe process to normal.
Answer: B, D
74. A Windows 2000 Server computer named
server2 runs numerous 32-bit
applications and two 16-bit
applications. Users start the 16-bit
applications by running app1.exe for one
application and app2.exe for the other
application. The 16-bit applications are
configured to run in the separate memory
spaces. You want to create a performance
baseline chart in the system monitor for
all the applications on server2. You add
all of the 32-bit applications, and now
you want to add two 16-bit applications.
What should you do?
A. Add the app1 and app2 instances to
the %Processor Time counter for the
Process object.
B. Add the ntvdm, app1 and app2
instances for the %Processor Time
counter for the process object.
C. Add only the ntvdm instance of the
%Processor Time counter for the Process
object.
D. Add the ntvdm and ntvdm#2 instances
of the %Processor Time counter for the
process object.
Answer: D
75. You install a Windows 2000 Server
computer on your network. You place
several shared folders on a 12-GB
primary partition formatted as FAT32.
During nine months of continuous
operation, the number of users who
access the server and their access
frequency remains constant. The average
size of the files on the server remains
approximately constant. After the server
runs continuously for nine months, users
report that the server does not retrieve
files from the shared folders as fast as
you first installed the server. What
should you do to resolve the problem?
A. Convert the disk that contains the
shared folder to a dynamic disk.
B. Convert the partition that contains
the shared folders to NTFS.
C. Defragment the disk that contains the
shared folder.
D. Move the paging file to the partition
that contains the shared folder.
Answer: C
|
76. Every
afternoon, you run Microsoft
Excel locally on your Windows
2000 Server computer to update a
performance spreadsheet. Users
report that, during this time,
the server’s response to file
requests appears to slow down.
What should you do to resolve
the problem?
A. Use task manager to set the
priority for csrss.exe process
to AboveNormal.
B. Use task manager to set the
priority for Excel.exe process
to Low.
C. Run the Start/normal
csrss.exe command, before you
start the Excel.
D. Run the Start/normal
Excel.exe command to start
Excel.
Answer: B
77. Your network has two domains
with approximately 1,000 users
in each domain. Both domains are
Active Directory domains that
run in native mode. Some of the
users have portable computers
and access the network by using
remote access. The managers at
your company are concerned that
remote access might pose a
security risk. They want to see
a list that shows which users
are allowed to use remote
access. How should you configure
the remote access to display a
list of authorized users?
A. Create a group named
RAS_USERS. Add users who are
permitted to dial in to the
network. Create a remote access
policy that allows only this
group to use the remote access
server. To show who has access
to the remote access server,
display the members of the
group.
B. Create a group named
RAS_USERS. Add users who are
allowed to dial in to the
network. Set the remote access
permission for this group to
allow access. To show who has
access to the remote access
server, display the members of
the group.
C. Write a script for the
windows scripting host. In the
script, iterate through the
members of the users container.
Display the name of any user who
has the remote access permission
set to Allow access.
D. Use the default remote access
policy to view users and groups
who have been granted remote
access permission.
Answer: A
78. Your company has a routing
and remote access server at its
main office. One of the
company’s branch offices also
runs routing and remote access
on a server that has one modem.
The server is configured to use
demand-dial routing to connect
to the main office. The server
is part of company’s Active
Directory domain. The company
runs in native mode. Some
employees at this branch office
use the branch office server to
access their files from home.
The manager of the branch office
reports that sometimes none of
the users in the office can
connect to the main office. When
you examine the event log on the
branch office server, you find
that users have been connecting
to the server during working
hours. The manager wants users
to be able to dial in to the
server only between 6:00 P.M and
8:00 A.M. However, the manager
still wants users to be able to
log on at any time when
connected directly to the LAN.
What should you do to limit only
dial-in access to these times?
A. Change the logon hours for
users’ accounts to deny logons
between 8:00 A.M and 6:00 P.M.
B. Set the remote access policy
to deny connections between 8:00
A.M and 6:00 P.M.
C. Create one batch file to
start remote access connection
manager service, and create
another batch file to stop it.
Schedule the stop batch file to
run at 8:00a.m every day and
start batch file to run at 6:00
P.M every day.
D. Create two user accounts, for
each user. Grant dial-in
permissions to one account, and
deny dial-in permissions to the
second account. Change the logon
hours for the dial-in accounts
to deny logon between 8:00 A.M
to 6:00 P.M.
Answer: B
79. You are the administrator of
a Windows 2000 Server computer.
The computer has a spanned
volume that consists of areas on
three physical hard disks on the
server. The three disks support
hot swapping. You regularly back
up the spanned volume by using
windows backup. One of the disks
fails. You replace the disk with
a new, unpartitioned disk. You
want to recover the spanned
volume and its data as soon as
possible. What should you do?
A. Extend the spanned volume to
include the new disk. Rescan the
disks.
B. Extend the spanned volume to
include the new disk. Shut down
and restart the server. Use
windows backup to restore the
data.
C. Rescan the disks. Format the
spanned volume. Use windows
backup to restore the data.
D. Rescan the disks. Extend the
spanned volume to include the
new disk. Shut down and restart
the server. Use windows backup
to restore the new data.
E. Rescan the disks. Remove the
spanned volume and create a new
spanned volume that includes the
new disk. Format the spanned
volume. Use Windows back up to
restore the data.
Answer: E
80. You are the administrator of
two Windows 2000 Server
computers: Server1 and Server2.
Server1 has a spanned volume
that consists of areas on three
physical hard disks. The three
disks support hot swapping, and
three hot swappable disk bays
are available on server2. The
drive letter that the spanned
volume on server1 uses is not
currently in use on server2. You
want to move the three disks to
Server2. You want the spanned
volume to use the same drive
letter on Server2 that is used
originally on server1. You want
to minimize the impact of your
actions on the performance and
availability of the two servers.
You backup the spanned volume.
What should you do next?
A. Move the disk from server1 to
server2. On the server1, rescan
the disks. On the server2,
rescan the disks.
B. Shut down both servers. Move
the disks from server1 to
server2. Restart both computers.
On server2, rescan both disks.
C. Shut down server1. Move the
disks from server1 to server2.
Restart server1. On server2,
restore the spanned volume by
using Windows backup.
D. Move the disks from server1
to server2. On server2, create a
new spanned volume and format
the volume. Restore the spanned
volume by using Windows backup.
Answer: D
81. You are the administrator of
a Windows 2000 Server computer.
The server has a single hard
disk with two partitions. An
application that runs on your
server creates a very large log
file in the Systemroot\Temp
folder. There is not enough free
space on the system partition to
accommodate the log file. The
application does not provide a
way to change the path to the
log file. You want to run the
application on your server. What
should you do?
A. On the second partition,
create a shared folder named
Temp.
B. In the systemroot folder,
create a shortcut named Temp
that points to the second
partition on the disk.
C. Add a second hard disk.
Create and format a partition
from the free space on the
second hard disk. Create a Temp
folder on the new partition.
Mount the system partition as
the Temp folder on the new
partition.
D. Add a second hard disk.
Delete the contents of the
Systemroot\Temp folder. Create
and format a partition from the
free space on the second hard
disk. Mount the partition as the
Systemroot\Temp folder.
Answer: D
82. You are the administrator of
Windows 2000 Server computer.
Volume D is formatted as NTFS.
Volume D contains folders that
are shared by departments within
your company. You want to limit
the amount of disk space that
the shared folders can store. A
user named Richard has stored
10GB of files in the shared
folders. Richard’s files are
using more disk space on the
shared folders than any other
user’s files. You enable disk
quotas on Volume D and create a
default quota entry. You set the
quota limit to 1.1 GB and select
the Deny disk space to users
exceeding quota limit check box.
When Richard attempts to encrypt
the files in his home folder
using the encrypted file system
he receives the following error
messages: "There is insufficient
disk space to complete the
operation". You need to allow
Richard to encrypted the files
in his home folder. You also
need to maintain the space
restrictions. Which three
actions must you have? (Choose
three)
A. Create a quota entry for
Richard, and select the Do not
limit disk space check box.
B. Instruct Richard to encrypt
the files in his home folder.
C. Run the Cipher.exe/d command
D. Enable the compression
attribute on Richard’s home
folder.
E. Set the Richard’s quota limit
to equal the amount of disk
space used by the files in his
home directory.
F. Set the default quota entry
on volume D to 12GB, and clear
the Deny disk space too users
exceeding quota limit check box.
Answer: A, B, E
83. You run and install a
third-party 32-bit application
name Application on your Windows
2000 Server computer. After
several days, the application
stops responding. You open Task
Manager and find that the CPU
usage is at 100 percent. The
normal range of CPU usage on the
server is from 20 percent to 30
percent. You end the
application. However, you see
that the CPU usage on the server
is still at 100 percent. Task
manager shows no other
applications running. You then
examine the Processes page in
Task Manager and confirm that
Application.exe process is no
longer running. You want to
return the CPU usage to its
normal range. What should you
do?
A. Use Computer Management to
stop and restart the server
service.
B. Use Computer Management to
stop and restart the workstation
service.
C. Use task manager to end any
related child processes.
D. Use task manager to end and
automatically restart the
Explorer.exe process.
Answer: C
84. You are the administrator of
a Windows 2000 Server computer.
The Server has a single hard
disk with a single NTFS
partition. You use a third-party
tool to add a new partition to
the disk. When you restart the
server, you receive the
following error message:
“Windows 2000 could not start
because the following file is
missing or corrupt: <windows
2000 root>\System32\ntoskrnl.exe.
Please re-install a copy of the
above file”. What should you do
to resolve the problem?
A. Start the computer by using
the Recovery Console. Run system
file checker.
B. Start the computer by using
the Recovery Console. Modify the
partition parameter in the
operating system path in C:\Boot.ini.
C. Start the emergency repair
process. Choose the option to
repair system files.
D. Start the computer in safe
mode with command prompt. Modify
the partition parameter in the
operating system path in C:\Boot.ini.
Answer: B
85. Your company has a human
resource (HR) manager named Sean
Chai. He keeps your company’s
confidential HR files in a
shared folder. To increase the
security of the HR files, Sean
set the folder to encrypt the
files. Sean leaves the company
without resetting the
permissions and encryption
settings for the HR files. The
files must be made accessible to
the new HR manager. Which two
actions should you take to allow
this access? (Choose Two)
A. Select the file permissions
on the HR files to allow access
to the new manager.
B. Back up the shared folder to
tape and restore the files to a
different folder.
C. Log on as an administrator
and remove the encryption
attribute from the HR files.
D. Log on the new manager,
connect to the shared folder,
and run the cipher/e/s*.*
command.
E. Configure the new manager’s
account to be an Encrypted Date
Recovery Agent for Sean’s
account.
Answer: A, C
86. You install a second modem
on a Windows 2000 Server
computer configured with routing
and remote access. Dial-in
routers report that they are
unable to connect to the server
by using this new modem. What
can you do to help find out the
cause of the problem? (Choose
three)
A. Use the diagnostics tab in
Phone and Modem Options in
control panel to query the
modem.
B. Use device manager to
identify any port resource
conflicts.
C. Use the routing and remote
access snap-in to find out
whether the ports for both
modems are operational.
D. Use the Regedit32 to view the
Error control value in the From
the command prompt, run the Net
Config Server command.
E. From the command prompt, run
the Net statistics command.
F. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess
key.
Answer: A, B, C
87. You are the administrator of
a Windows 2000 Active Directory
network. Your network contains
two organizational units named
Boston and Los Angeles. Each of
these OUs contains subordinates
OUs named Corp, Finance and
Consulting. You suspect that
someone is trying to log on to
your domain by guessing user
account names and passwords. You
want to find out which computer
is being used for these logon
attempts. What should you do?
A. Edit the default Domain
Controller’s policy object to
audit directory service access
failures.
B. Edit the default domain
policy object to audit account
logon failures.
C. Edit the Boston OU and Los
Angeles OU group policy objects
(GPOs) to audit logon failures.
D. Edit the Group Policy Object
of each subordinate OU to audit
directory service access
failures.
Answer: B
88. Your network contains
NetWare 4.0 Servers. You have
successfully installed client
service for NetWare on Windows
2000 Professional computer, and
gateway service for NetWare on
Windows 2000 Server computer.
You recently added a new Windows
2000 Server computer to the
network and installed gateway
service for the NetWare on it.
However, the server is unable to
connect to any NetWare servers.
What should you do on new
Windows 2000 Server computer to
resolve this problem?
A. Enable NWLink NetBIOS.
B. Configure NWLink IPX/SPX/NetBIOS
compatible transport protocol to
use the correct Ethernet frame
type.
C. Install RIP routing for IPX.
D. Install the SAP agent.
Answer: B
89. You enable disk quotas on
volume D on the server. You
configure a disk quota 10 GB for
each user. You select the Deny
disk space to users exceeding
quota limit check box. A user
named Bruno reports that he
cannot save a Microsoft Windows
2000 document to a shared folder
used by his department. You need
to ensure that users can always
save more than 10 GB to their
home directories. What should
you do?
A. Clear the deny disk space to
users exceeding quota limit
check box in the quota
configuration for volume D.
B. Log on to the server as
administrator, and take
ownership of all files in the
group-shared folders
C. Create a new volume on the
server. Move the group-shared
folders to the new volume
D. Increase the quota limit on
volume D to permit extra space
for shared files
Answer: A
90. You install Windows 2000
Server on a computer that
contains two 8-GB hard disks.
Each disk is partitioned as a
single primary partition and is
formatted as FAT32. During the
installation, you convert the
second disk to NTFS. You install
the system files on the second
disk. You create a shared folder
on both disks. To conserve disk
space, you compress the shared
folders on the second disk. When
users move compressed files from
a shared folder on the second
disk to shared folders on the
first disk, the files lose their
compression attributes. You want
to ensure that all files moved
from the folders on the second
disk to the shared folders on
the first disk will be
compressed. Which two actions
should you take? (Choose two)
A. Format the first disk as
NTFS.
B. Convert the first disk to
NTFS.
C. Convert the both disks to
dynamic disks.
D. Convert first disk to a
dynamic disk.
E. Compress the shared folders
on the first disk.
Answer: B, E
91. You plan to install Windows
2000 Server on 10 new computers.
These servers will provide file
and print services in branch
offices of your company. The
company wants each branch office
to purchase its own copy of
Windows 2000 Server, and the
installation in each branch
office should use the serial
number associated with the
branch office’s own copy. You
want to install, configure, and
test Windows 2000 Server on
these computers at the main
office before shipping the
computers to the branch offices.
You want users in the branch
office to enter the computer
names and serial numbers when
they receive the computers. What
should you do?
A. Install Windows 2000 Server
computer on the computers by
using an unattend.txt file, and
then use the registry editor to
remove the computer name and
license details.
B. Start the installation
process from an MS-DOS boot
disk. Install Windows 2000
Server on the computers from an
existing server by running the
Winnt command with the /PreInst
switch.
C. Install Windows 2000 Server
on the computers, and then use
setup manager to create a
sysprep.inf file for
sysprep.exe. Place the
sysprep.inf file on the
computers and run the
sysprep-nosidgen command.
D. Create an unattend.txt file
by using setup manager. Include
the following line in the
unattend.txt file.
OemPrenistall=YES. Use this file
to perform the installation.
Answer: C
92. Q45. You want to improve the
TCP transmission speed of a
Windows 2000 Server computer.
You also want to remove an
unused registry key. You use
Regedit32 to edit the registry
of the Windows 2000 Server. You
insert a value in the registry
named TCPWindowSize, and you
remove the unused key. You
restart the computer, but the
computer stops responding before
the logon screen appears. You
want to return the computer to
its previous configuration.
What should you do?
A. Restart the computer in safe
mode. Then restart the computer
again.
B. Restart the computer by using
the Recovery Console. Run the
Fixboot c: command, and then run
the Exit command.
C. Restart the computer by using
the Recovery Console. Run the
enable winlogon
service_auto_start command, and
then run the Exit command.
D. Restart the computer by using
the last known good
configuration.
Answer: D
93. You plan to install Windows
2000 Server on 10 new computers
on your company’s network. These
servers will provide file and
print services to the
departments within the company.
The computers have identical
hardware and software
configuration. You want to use a
centralized copy of the Windows
2000 installation files, which
are stored on an existing
Windows 2000 computer. Which
three actions should you take to
install Windows 2000 Server on
the new computers? (Choose
Three)
A. Create a set of installation
boot disks by using
Makeboot.exe.
B. Create an MS-DOS network boot
disk.
C. Create an Unattend.txt file
by using Setup Manager. Create a
UDF file that identifies the
names of new computers.
D. Create a UDF file by using
setup manager. Create an
unattend.txt file that
identifies names of the new
computers.
E. Begin the installation by
running the Winnt command with
the /S, /U, and /udf switches.
F. Begin the installation by
running the Winnt32 command with
the /s, /unattended, and /udf
switches.
Answer: B, C, E
94. Your Windows 2000 Server
computer has a 10-GB hard disk
with two partitions; Drive C and
drive D. Windows 2000 Server is
installed on Drive D. Both
partitions are formatted as
NTFS. Your office experiences a
power failure that causes your
Windows 2000 Server computer to
restart. When the computer is
restarting, you receive the
following error message: “NTLDR
is missing. Press any key to
restart”. What should you do?
A. Start the computer by using
Windows 2000 Server computer
CD-ROM and choose to repair the
installation. Select the
Recovery Console and copy the
NTLDR file on the CD-ROM to the
root of the system partition.
B. Start the computer in
debugging mode. Copy the NTLDR
file on the CD-ROM to the root
of the system partition.
C. Start the computer by using
the Windows 2000 bootable floppy
disk. From a command prompt, run
the sfc/scanboot command.
D. Start the computer by using a
Windows 2000 bootable floppy
disk. Run the File Signature
Verification utility.
Answer: A
95. You are installing Windows
2000 Server on a new computer by
using the Windows 2000 Server
CD-ROM. The computer has three
100-GB hard disks, Disk 0, Disk
1 and Disk 2. The disks do not
have any partitions defined. You
want to use as much place on the
Disk 0 as possible for the
partition on which Windows 2000
Server is installed. You want as
much disk space as possible
across the three disks to be
accessible by using a single
drive letter in Windows 2000.
What should you do?
A. Install Windows 2000 Server
on a 4-GB FAT partition on the
Disk 0. After setup is complete,
create a 96-GB NTFS partition on
the Disk 0. Create a volume set
that combines the 96-GB NTFS
partition with the two remaining
100-GB disks.
B. Install Windows 2000 Server
on a 4-GB NTFS partition on the
Disk 0. After setup is complete,
configure the three disks as the
dynamic disks. Create a volume
set from the three 100-GB disks.
C. Install Windows 2000 Server
on a 100-GB NTFS partition on
the Disk 0. After setup is
complete, create a volume set
that combines the three 100-GB
disks.
D. Install Windows 2000 Server
on a 100-GB NTFS partition on
Disk 0. After setup is complete,
create a 100-GB partition on
Disk 1 and a 100-GB partition on
Disk 2. Mount the partitions on
Disk 1 and Disk 2 as
subdirectories on the 100-GB
partition on Disk 0.
Answer: D
96. You want to upgrade a
Windows NT Server 4.0 computer
to Windows 2000 Server. The
system partition uses the FAT
file system. You start the setup
program by starting the computer
from the Windows 2000 Server
CD-ROM. However, you receive the
following error message: “You
chose to install Windows 2000 on
a partition that contains
another operating system.
Installing Windows 2000 on this
partition might cause the
operating system to function
improperly”. You are unable to
perform the upgrade. What should
you do to resolve the problem?
A. Convert the system partition
to NTFS.
B. Disable Advanced
Configuration and Power
Interface (ACPI) support for the
computer.
C. Restart the computer, and
then run Winnt32.exe from the
Windows NT server 4.0
environment.
D. Remove the Windows 2000
Server CD-ROM and restart the
computer by using the setup
floppy disks.
Answer: C
97. Your Windows 2000 Server
computer uses a SCSI adapter
that is not included on the
current hardware compatibility
List. You install an updated
driver for the SCSI adapter.
When you start the computer, you
receive the following STOP
error:
“INACCESSIBLE_BOOT_DEVICE.” What
two procedures can you use to
resolve the problem? (Choose
two)
A. Start the computer in safe
mode. Reinstall the old driver
for the SCSI adapter.
B. Start the computer by using a
Windows 2000 bootable floppy
disk. Reinstall the old driver
for the SCSI adapter.
C. Start the computer by using
the Windows 2000 Server CD-ROM.
Perform an emergency repair.
Reinstall the old driver for the
SCSI adapter.
D. Start the computer by using
the Recovery Console. Run system
file checker. Restart the
computer. Reinstall the old
driver for the SCSI adapter.
E. Start the computer by using
the Recovery Console. Copy the
old driver for the SCSI adapter
to the system volume and to
C:\Ntbootdd.sys Reinstall the
computer
Answer: C, E
98. You are the administrator
for your company. Your Windows
2000 Server computer contains
two 23GB hard disks. Each disk
is configured as a basic disk
and has a single 23GB NTFS
partition. Both partitions are
backed up to tape every night.
The partition on Disk1 stores
user data. Most users of your
company encrypt their files.
Disk1 fails. You replace it with
a new disk. You need to recover
the data as quickly as possible
while maintaining the security
of the files. What should you
do?
A. Create a single NTFS
partition. Restore the contents
of Disk1 from the most recent
tape backup. Run the cipher /d
/i command.
B. Create a single NTFS
partition. Restore the contents
of Disk1 from the most recent
tape backup. Instruct the users
to verify the integrity of their
files.
C. Create a single NTFS
partition. Restore the contents
of Disk1 to a second file
server. Logon to the server
console as a recovery agent.
Copy the files from the second
file server to the new
partition.
D. Create a single NTFS
partition. Restore the contents
of Disk1 to a second file
server. Instruct users to copy
their files from the second file
server to the new partition.
Answer: B
99. You configure one of your
Windows 2000 Server computers as
a print server. You install a
second Plug and Play network
adapter on the server to improve
network adapter uses IRQ11. The
second adapter uses IRQ5. The
server is now unable to print to
the print device connected to
the non-Plug and Play LPT2 port
adapter. You want to continue to
use print devices installed on
Plug and Play LPT1 and non-Plug
and Play LPT2. What should you
do?
A. Use device manager to change
the IRQ for LPT1 to IRQ10.
B. Use device manager to change
the IRQ for LPT2 to IRQ7.
C. Edit the CMOS settings on the
server to reserve IRQ7 for
non-Plug and Play devices.
D. Edit the CMOS settings on the
server to reserve IRQ5 for
non-Plug and Play devices.
Answer: D
100. You are the network
administrator for your company.
You configure a shared printer
on a Windows 2000 Server
computer. The printer connects
to a Hewlett Packard JetDirect
print device that uses DLC. This
print device is on the same
network segment as the server.
Six months later, you relocate
the print device to a different
network segment. Users report
that they are able to send print
jobs to the printer but that
their print jobs no longer
print. You need to ensure that
the printer and the print device
are working properly. What
should you do?
A. Configure the JetDirect print
device to use DHCP.
B. Uninstall and reinstall the
DLC protocol from the server.
C. Configure the printer and the
JetDirect print device to use
LPR printing protocol.
D. Delete the printer. Re-create
the printer by using DLC to
connect to the JetDirect print
device.
Answer: D
|
101.
You are the
administrator of a
Windows 2000 Server
computer. You add a
new hard disk to the
computer and
configure it as a
basic disk. You
create a single NTFS
partition that uses
all of the space on
the disk. You assign
the drive letter G
to the new partition
You share drive G as
DataFiles and assign
the default share
permissions to the
drive. You want to
create several
folders in the root
of drive G. You plan
to use these folders
to store network
users’ files. You
want to prevent
users from creating
additional folders
in the root of drive
G. You also want to
allow users to
create subfolders
under the folders
that you have
already created. You
want to configure
the NTFS security
permissions for the
drive G folders in
the minimum amount
of time. What should
you do?
A. Create your
folders in the root
of drive G.
Configure the
permissions on these
folders to block
permission
inheritance.
B. Create your
folders in the root
of drive G. Modify
the permissions on
the folders to allow
users to create
subfolders.
Configure the
permissions on these
folders to block
permission
inheritance.
C. Create your
folders in the root
of drive G.
Configure the
permissions on these
folders to block
permission
inheritance. Modify
the permissions on
the root of drive G
to prevent users
from creating
folders on the root.
D. Modify the
permissions on the
root of drive G to
prevent users from
creating folders on
the root. Create
your folders in the
root of drive G.
Configure the
permissions on these
folders to block
permission
inheritance.
Answer: C
102. Your Windows
2000 domain contains
a Windows 2000
member server named
server1. Server1 has
routing and remote
access for Windows
2000 enabled.
Server1 is also
configured to use a
modem bank to accept
incoming dial-up
attempts. You need
to configure server1
so that users can
connect to it from
their home
computers. You want
to restrict access
to the network to
only users who can
access the network
at speeds faster
than 64 Kbps. You
also must ensure
that the users
connect by using
mutual
authentication.
Which three actions
should you take?
(Choose Three)
A. Configure the
authentication
provider to be
RADIUS server.
B. Configure the
authentication
provider to be
Windows
Authentication.
C. Specify IDSL as
the dial-in media.
D. Specify Async as
the dial-in media.
E. Configure support
for EAP.
F. Configure support
for MS-CHAP
G. Configure support
for MS-CHAP version
2.
Answer: B, C, G
103. You are the
administrator of a
Windows NT 4.0
Terminal server
edition computer.
The server has one
hard disk, which is
divided into two
partitions The first
partition contains
the Windows NT 4.0
system files and is
formatted as FAT.
The second partition
contains application
data and user data.
This second
partition is
formatted as NTFS.
The server currently
has Service Pack 3
installed. You need
to upgrade the
server to Windows
2000 Server. You
want to ensure that
no application data
or user data is lost
during the upgrade.
You also want to
perform the minimum
number of steps
necessary to
complete the
upgrade. What should
you do? (Choose all
that apply)
A. Convert the
system partition to
NTFS.
B. Install service
pack4 or later on
the server.
C. Use a Windows
2000 Server CD to
start the server. In
setup, select the
option to upgrade.
D. Replace the
Terminal Server
installation with a
standard Windows NT
server 4.0
installation.
Answer: A, B, C
or B (please confirm
it)
104. You are a
network
administrator for
Fabrikam Inc.
Fabrikam Inc has
three offices. The
network consists of
one native mode
Windows 2000 domain.
All servers are
Windows 2000
Professional
computers. The
network is connected
by a Frame Relay
connection. You
install a
third-party network
management suite of
applications on a
server named Mon1.
You need to ensure
that this new
software will be
able to interact
with and manage the
existing devices on
your network. What
should you do?
A. Install SNMP on
Mon1.
B. Install SNMP on
all computers except
Mon1.
C. Configure the
SNMP service option
in the TCP/IP
installation
properties on Mon1.
D. Configure the
SNMP server option
in the TCP/IP
installation
properties on all
computers except
Mon1.
Answer: A
105. You are the
network
administrator at
Awesome computers, a
hardware
manufacturing firm.
You are deploying 20
new Windows 2000
Server computers in
the software
development
department. The
software testers
will use these
servers for testing.
Each tester is a
member of the Power
Users group. Each
tester must be able
to install new
hardware and device
drivers on these
servers. You want
the testers to be
able to test custom
applications that
install drivers
without
interruption. You
install Windows 2000
Server on one
computer so that you
can prepare a system
image for the
deployment. You must
configure this
system image to meet
the needs of the
software testers.
What should you do?
A. For the Power
Users group, apply
the right to load
and unload device
drivers.
B. For the domain
users group, apply
the right to load
and unload device
drivers.
C. Configure the
driver signing
options to install
all files,
regardless of file
signature. Configure
the setting to be a
system default.
D. Configure the
driver signing
options to install
all files,
regardless of file
signature. Configure
the setting not to
be a system default.
Answer: A
106. You are the
administrator of a
Windows 2000 Server
computer. The server
hosts several web
sites that have
logging enabled. You
use a third-party
reporting utility to
analyze the log
files produces by
the web sites. You
notice that all data
from 7:00 P.M to
midnight each night
is included in the
following day’s log
file. You want all
data to be included
in the correct day’s
log file. What
should you do?
A. Ensure that the
log type is set to
W3C.
B. Change the log
rollover property in
the web site logging
properties.
C. Change the time
zone setting in the
time properties on
the web server.
D. Configure the
time server service
o the web server to
use the LocalSystem
account.
Answer: B
107. You are the
administrator of a
Windows 2000 Server
computer. The
computer is
configured to have a
single 18-GB drive,
which contains the
operating system
files. This drive
also contains a
shared folder where
five network users
store their
Microsoft Excel
files. You want to
prevent each network
user from using more
than 1GB of space in
the shared folder.
Which action or
actions should you
take to achieve this
goal? (Choose all
that apply)
A. Create a quota
entry for Everyone
account. Set the
quota limit to 1 GB.
B. Enable disk
quotas on the
volume.
C. Set the default
disk quota limit to
1 GB.
D. Select the Deny
disk space to users
exceeding quota
limit check box.
E. Upgrade the disk
to a dynamic disk.
Answer: B, C, D
108. You upgrade a
Windows NT Server
4.0 computer to
Windows 2000 Server.
The computer has two
hard disks. The
system and boot
partitions are
located on two
primary partitions
on Disk 0. Both
partitions are
mirrored on Disk 1.
One month later,
Disk 1 fails. You
replace the disk
with a disk taken
from another Windows
2000 computer. When
you try to repair
the fault-tolerant
volumes by using
Disk Management, you
find that the Repair
Volume option is
unavailable. You
want to repair the
mirror set. What can
you do? (Choose
two.)
A. Delete all
volumes on Disk 1.
Change Disk 1 back
to a basic disk.
Repair the
fault-tolerant
volumes on Disk 0.
B. Create two new
volumes on Disk 1.
Copy all the data
from the two disk
partitions on Disk 0
to the two volumes
on Disk 1.
C. Break the mirror
set. Convert Disk 0
to a dynamic disk.
Create a mirror on
Disk 1.
D. Create a single
volume on Disk 1.
Copy all the data
from Disk 0 to the
single volume.
Convert Disk 0 to a
dynamic disk.
E. Restart the
computer by using
the Windows 2000
Server CD-ROM and
choose to repair the
installation
Answer: A, C
109. You install a
second modem on a
Windows 2000 Server
computer configured
with routing and
remote access.
Dial-in users report
that they are unable
to connect to the
server by using the
new modem. What
should you do to
help find out the
cause of the
problem?
A. Use the routing
and remote access
snap-in to find out
whether the ports
for both modems are
operational.
B. Use Regedt32 to
view the error
Control value in the
From a command
prompt, run the Net
Config Server
command.
C. From a command
prompt, run the Net
Statistics command.
D.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess
key.
Answer: A
110. Your network
contains Windows
2000 Server
computers and
NetWare server
computers. The
NetWare client
computers on your
network use only the
IPX/SPX transport
protocol. You
install a database
server on a Windows
2000 Server computer
named DB_serv. This
server has the
NWLink IPX/SPX/NetBIOS
compatible transport
protocol, TCP/IP and
the NetBEUI protocol
installed. NWLink
uses the 802.2 frame
type and a network
number of 77. In
addition, client for
Microsoft networks
and file and printer
sharing for
Microsoft networks
are installed on
DB_serv. The NetWare
client computers
that are on the same
subnet as DB_serv
can connect to
DB_serv and the
database stored on
it. However, the
NetWare client
computers that are
on the other subnets
cannot connect to
DB_serv. What should
you do to allow the
NetWare client
computers on the
other subnets to
connect to the
DB_serv?
A. Install gateway
service for NetWare
on DB_serv.
B. Install the SAP
Agent on DB_serv.
C. Configure the
NetWare client
computers on the
other subnets to use
NetBEUI.
D. Configure IPX/SPX
on the NetWare
client computers on
the other subnets to
use a network number
of 77.
Answer: D
111. You are the
administrator of
contoso.local
domain. You organize
the domain into
organizational units
as shown in the
exhibit.
<Exhibit - Not
Available>
You configure the
Local Security
Options and other
settings for the
default domain
policy object. You
delegate
administration of
the Michigan and
Florida OU. You want
to prevent those
administrators from
creating any other
group policy objects
with settings that
conflict with those
you configured. What
should you do?
A. From the group
policy options for
the contoso.local
domains, set the
option not to
override.
B. From the group
policy options for
the Michigan and
Florida OUs, set the
option not to
override.
C. Block the group
policy inheritance
for the
contoso.local
domain.
D. Block the group
policy inheritance
in the Michigan and
Florida OUs.
Answer: A
112. Your network
contains Windows
2000 Professional
client computers
that use TCP/IP as
the only network
protocol. The
network also
contains Windows 3.1
computers that use
the NetBEUI
protocol. You
install a new
Windows 2000 Server
computer on the
network. You
configure this
server to use
NetBEUI and TCP/IP.
The Windows 3.1
computers can
connect to the new
server and use
resources located on
it. However the
Windows 2000
Professional client
computers cannot
access the new
server. When you run
the ipconfig command
on the new server,
it returns the
information shown in
the exhibit.
<Exhibit - Not
Available>
You want to allow
the Windows 2000
Professional client
computers to connect
to the servers. What
should you do?
A. Ensure that the
server is configured
to connect to a
Dynamic DNS server
that is
authoritative for
the domain.
B. Ensure that the
server is able to
communicate with a
DHCP server that has
valid addresses for
the network.
C. Ensure that
NetBIOS over TCP/IP
in enabled in the
Advanced settings
for TCP/IP.
D. Ensure that a
valid WINS address
is configured in the
Advanced settings
for TCP/IP.
Answer: B
113. You are the
administrator of the
Windows 2000 Server
network shown in the
exhibit.
<Exhibit - Not
Available>
Users in the
research group and
the executives have
permission to access
the Internet through
a Windows 2000
Server computer
running Microsoft
Proxy server. These
users must enter
their proxy server
user names and
passwords to connect
to the proxy server,
to the Internet, and
to your local
Intranet server. The
users who do not
access the Internet
do not have user
accounts on proxy
server and,
therefore, cannot
connect to the
Intranet server. You
want all users to be
able to connect to
the Intranet server
without entering a
separate user name
and password. What
should you do?
A. Move the Intranet
server to the client
segment of the
network.
B. Move the proxy
server to the server
segment of the
network.
C. Configure each
client computer to
bypass server for
local address.
D. Configure each
client computer to
use Port 81 for the
proxy Server.
Answer: C
114. You are the
administrator of a
Windows 2000 Server
network that runs in
mixed mode. You
install a new
Windows 2000 Server
computer. You create
and share a new HP
LaserJet 4L printer.
Your Windows 2000
Professional Client
computer can print
to the new printer
successfully.
However, when users
try to connect to
the printer from
Windows NT
Workstation 4.0
client computers,
they receive the
dialog box shown in
the exhibit.
<Exhibit - Not
Available>
You want the printer
driver to install
automatically on the
Windows NT
Workstation
computers. What
should you do?
A. Copy the Windows
NT 4.0 printer
drivers to the
Netlogon shared
folders on all
Windows NT Server
4.0 computers still
configured as BDCs.
B. Copy the Windows
NT 4.0 printer
drivers to the
Netlogon shared
folders on the PDC
emulator.
C. Change the
sharing options on
the printer to
install additional
drivers for Windows
NT 4.0 or Windows
2000.
D. Copy the Windows
NT 4.0 printer
drivers to the Winnt\System32\printers\drivers
folder on the
Windows 2000 print
Server.
Answer: C
115. Your network
consists of numerous
domains within a
LAN, plus one remote
location that is
configured as
another domain
within the tree.
Each domain contains
several
organizational
units. The remote
domain is connected
to the main office
network by using
56-Kbps connection,
as shown in the
Exhibit.
<Exhibit - Not
Available>
The remote location
is running a
previous service
pack for Windows
2000, and the LAN is
running the most
recent service pack.
You want to
configure a group
policy for the
remote locations so
that users can
repair a problem
with a service pack
system file. You
also want to reduce
the traffic on the
LAN and ease
administration of
the group policies.
You want to retain
the domain
administrator’s
access to the group
policy
configuration. What
should you do?
A. Configure a group
policy for each OU
in the
west.litware.com
domain. Configure a
service pack
software package for
each group policy.
B. Configure a group
policy for each OU
in the litware.com
domain. Configure a
service pack
software package for
each group policy.
C. Configure a group
policy for
west.litware.com
domain. Configure a
service pack
software package for
the group policy.
D. Configure a group
policy for the
litware.com domain.
Configure a service
pack software
package for the
group policy.
Answer: C
116. You share a
folder on a Windows
2000 Server computer
for users in your
company's London
office. You place
several subfolders
in the London folder
as shown in the
exhibit.
<Exhibit - Not
Available>
The Marketing-2
folder is
compressed. You want
to remove some files
from the Research
folder into
Marketing-2, and you
want to make sure
that the files are
compressed when you
move them. However,
you do not want to
compress the
remaining files in
Research. What
should you do?
A. Move each of the
files from Research
to Marketing-2.
B. Copy the files
from Research to
Marketing-2, and
then delete the
original files.
C. Compress
Research, and apply
changes to the
folder only, and
then move the files
from Research to
Marketing-2.
D. Encrypt
Marketing-2, move
the files from
Research to
Marketing-2, and
then decrypt
Marketing-
Answer: B
117. You are the
administrator of the
contoso.local
domain. You organize
the domain into
organizational units
(OUs) as shown in
the Exhibit.
<Exhibit - Not
Available>
You configure the
Local Security
Options and other
settings for the
Default Domain
Policy object. You
enable a local
security option
policy to display a
logon message each
time a user attempts
to log on. Suzan
Fine, the
administrator of the
Florida OU, wants to
configure a
different logon
message for the
Orlando OU without
changing the other
Local Security
Options. What should
Susan do?
A. Create a new
group policy object
(GPO) in the Orlando
OU with the
appropriate logon
message. Block
policy inheritance
for the new GPO.
B. Create a new
Group Policy Object
in the Florida OU
with the appropriate
logon message. Set
the option not to
override the new
GPO.
C. Create a new
Group Policy Object
in the Orlando OU
with the appropriate
logon message.
Enable policy
inheritance for the
new GPO.
D. Create two new
group policy objects
in the Miami and
Orlando OUs.
Configure the GPO
for the Orlando OU
with the appropriate
logon message for
the Orlando OU.
Place the GPO for
the Orlando OU at
the top of the
policy list.
Answer: C
118. You are the
administrator of the
intranet at Blue Sky
Airlines. You
install and
configure a new
Windows 2000 Server
computer named
server1.departments.blueskyairlines
as an intranet
server. This server
holds the multiple
departmental and
resource web links
to the network and
databases. You
configure a
ticketing web site.
You also configure
finance virtual
directory in the
departments website,
as shown in the
exhibit.
<Exhibit - Not
Available>
During the first
morning at the
server is available,
users report that
the only information
they are seeing in
their browser is a
list of .htm and
.asp files. For
security reasons,
the first action you
need to take is to
disable the user’s
ability to view
files of all web
sites in the form of
a list. What should
you do?
A. Clear the
directory browsing
check box for the
Ticketing web site,
and then apply the
setting to the child
virtual directories.
B. Clear the
directory browsing
check box for the
Departments web
site, and then apply
the setting to the
child virtual
directory.
C. Clear the
directory browsing
check box for the
server properties,
and then apply the
setting
D. Clear the
directory browsing
check box for the
Financing virtual
directory. to the
child web sites.
Answer: A
119. You are the
administrator of
homeoffice.local
domain. You want to
create a shared
printer for the
company’s executives
so that they do not
have to wait for
their documents to
print when the
default printer’s
queue contains a
large number of
documents. You
configure the new
high-priority
Printer and want to
set permissions for
the groups shown in
the exhibit. Note:
The default settings
have been cleared.
<Exhibit - Not
Available>
You select the check
box to allow print
permission for the
executives group.
You want only the
administrators,
print operators,
server operators,
and executives group
to be able to print
to the printer. What
can you do?
A. Remove the
Everyone group.
B. Select the check
box to deny print
permission for the
Everyone group.
C. Select the check
box to deny manage
documents permission
for everyone group.
D. Select all deny
check boxes for the
Everyone group.
E. Clear all check
boxes for Everyone
group.
Answer: A, E
120. You are the
administrator of a
windows 2000 Active
Directory network.
The network consists
of a single domain
named adatum.local
that runs in native
mode. The domain
includes 500 member
client computers,
consisting of 200
Windows 2000
Professional
computers and 300
Windows NT
workstation 4.0
computers. You
create a group
policy for the
Research
organizational unit
(OU) and configure
the policy as shown
in the exhibit.
<Exhibit - Not
Available>
None of the users in
the Research OU who
are working at
Windows 2000
Professional
computers can change
the wallpaper on
their desktop or the
resolution and color
depth of their
displays. However,
when users log on
from any of the
Windows NT
Workstation
computers in the OU,
they can change all
the display
settings. You want
to restrict all
users of Windows NT
Workstation
computers in the OU
from changing their
desktop wallpaper
and from accessing
the Settings tab in
display in control
panel. What should
you do?
A. Add a new
computer to the OU
and select the Allow
pre-windows 2000
computers to use
this account check
box.
B. Change the group
policy so that it
also hides the
Background tab.
C. Create a separate
group policy for a
nested OU that
contains all window
NT computers.
D. Configure a
Windows NT policy
file and place it in
the Winnt\Sysvol\Adatum.local\scripts
folder on the PDC
emulator.
Answer: D
121. The Litware
Inc. network has
three main network
segments and six
domain controllers.
Part of the network
is shown in the
exhibit.
<Exhibit - Not
Available>
You backup all of
the System State
data for each domain
controller and place
the data on a single
tape. That tape is
currently attached
to the
srv1.west.litware.com
computer. To which
server or servers
can you restore the
System State data
from
srv1.west.litware.com?
(Choose all that
apply)
A.
srv1.west.litware.com
B.
srv2.west.litware.com
C.
srv3.central.litware.com
D.
srv4.central.litware.com
E.
srv5.east.litware.com
F.
srv6.east.litware.com
Answer: A
122. Your network is
configured as shown
in the exhibit.
<Exhibit - Not
Available>
All the servers are
Windows 2000 Server
computers that use
TCP/IP as the only
network protocol.
The sales department
uses one subnet and
has servers named
Sales1 and Sales2.
The engineering
department uses
another subnet and
has servers named
Engineering1 and
Engineering2. Sales1
and Engineering1 are
configured to act as
DHCP servers. The
router that joins
the two subnets is
not RFC 1542
compliant and does
not support DHCP/BOOTP
relay. You want to
allow Sales1 and
Engineering1 to
support client
computers on each
other's subnets.
What should you do?
A. Set the router
option in the DHCP
Scopes to
192.168.2.1 for
Engineering1 and
192.168.1.1 for
Sales1.
B. On Engineering2
and Sales2, install
Routing and Remote
Access, and
configure RIP as a
routing protocol.
C. On Engineering2
and Sales2, install
and configure the
DHCP Relay Agent
service.
D. Configure
Engineering2 and
Sales2 as DHCP
servers without any
scopes.
Answer: C
123. Your network
has Windows 2000
professional client
computers and
Windows NT
Workstation 4.0
client computers.
The network uses
TCP/IP as the only
network protocol.
One server on the
network acts as WINS
server and DNS
server. The IP
address of this
server is
192.168.1.10. All of
the client computers
are configured to
use this server for
the DNS and WINS
services. Users of
Windows NT
Workstation
computers cannot
connect to a file
server named FS_1.
However, users of
Windows 2000
Professional
computer can access
FS_1. FS_1 has a
statically assigned
address of
192.168.1.11. The
TCP/IP settings for
FS_1 are shown in
the Exhibit.
<Exhibit - Not
Available>
Which change should
you make to allow
Windows NT
Workstation
computers to connect
to FS_1?
A. Add the WINS
address used by the
Windows NT
Workstation
computers and select
the Enable LMHOSTS
lookup check box.
B. Select Enable
LMHOSTS lookup
checkbox and import
Lmhosts file used by
the Windows NT
Workstation
computers.
C. Select Enable
NetBIOS over TCP/IP
option button and
add the WINS address
used by the Windows
NT Workstation
computer.
D. Select the Use
the NetBIOS setting
from the DHCP server
option button and
add the WINS address
used by the Windows
NT Workstation
computer.
Answer: C
124. You are the
administrator of a
Windows 2000 Server
network. The network
is a routed network
that uses TCP/IP as
the only network
protocol. All of the
Windows 2000
Professional client
computers and
Windows NT
Workstation 4.0
client computers are
members of the
single domain. You
install Gateway
Service for NetWare
on a Windows 2000
Server computer. You
install a second
network adapter on
the gateway on the
gateway server. The
network is now
configured as shown
in the exhibit.
<Exhibit - Not
Available>
You want to
configure adapter #1
for communications
to and from the
Windows-based client
computers
exclusively.
Which check boxes in
the Local Area
Connection
Properties dialog
box should you
select? (Choose all
that apply)
A. Gateway (and
client) services for
NetWare.
B. Client for
Microsoft Networks.
C. File printer
sharing for
Microsoft Networks.
D. NWLink NetBIOS.
E. NWLink IPX/SPX/NetBIOS
Compatible Transport
Protocol.
F. Internet Protocol
(TCP/IP)
Answer; B, C, F
125. You share a
folder on a Windows
2000 Server computer
for users in your
company’s London
office. You place
several subfolders
in the London Folder
as shown in the
exhibit.
<Exhibit - Not
Available>
The Marketing-2
folder is
compressed. You want
to delete
Marketing-2, but you
want to keep all the
files that are
currently in the
folder. You plan to
copy all the files
in Marketting-2 into
the marketing folder
before deleting
marketing-2. You
want these files to
remain compressed.
However, you do not
want to compress any
existing files in
marketing or
compress any other
new files added to
the marketing. What
should you do before
you delete
marketing-2?
A. Copy all the
files from
marketing-2 to
marketing.
B. Move all the
files from
marketing-2 to
marketing.
C. Compress
marketing and then
copy all the files
from marketing-2 to
marketing.
D. Compress
marketing and then
move all the files
from marketing-2 to
marketing.
Answer: B
|
126. You are
the network
administrator
responsible
for testing
and
deploying
new service
packs for
Windows
2000. Your
forest has
two trees,
with four
domains in
each tree,
as shown in
the exhibit:
<Exhibit - Not
Available>
For the
testing of
each service
pack, you
plan to
deploy the
service pack
to the
support.IS.contoso.com
domain and
the
support.IS.litware.com
domain, but
to no other
domains. You
plan to use
a group
policy to
configure
and
administer
the service
pack
package. You
need to
minimize the
complexity
and
administration
of the
service pack
package, and
to minimize
network
traffic
between the
domains. You
create a
Microsoft
Windows
installer
package for
the service
pack.
What should
you do to
configure
the group
policy?
A. Configure
the Windows
installer
package in a
group policy
for the
litware.com
and
contoso.com
domains
B. Configure
the Windows
installer
package in a
group policy
for the
support.IS.litware.com
and
support.IS.contoso.com
domains.
C. Configure
two sites,
with one
tree in each
site.
Configure
the Windows
installer
package in a
group policy
for each
site.
D. Configure
one site
that
contains
both trees.
Configure
the Windows
installer
package in a
group policy
for the
site.
Answer: B
127. You are
the domain
administrator
for your
company. The
domain and
OU structure
is shown in
the exhibit.
<Exhibit - Not
Available>
You want to
log all
unsuccessful
attempts to
delete files
from all
your data
servers.
Which two
actions
should you
take?
(Choose two)
A. Set audit
permissions
on all file
and print
server
computers
B. Use
Secedit to
import the
Hisecws.inf
template for
all
computers in
the file and
print
servers OU.
C. Use
Secedit to
import the
Hisecws.inf
template for
all
computers in
the Client
computers OU.
D. Enable
group policy
auditing on
the file and
print
servers OU.
E. Set
auditing
permissions
on all of
the client
computers.
F. Enable
auditing
group policy
on the
client
computers OU.
Answer:
A, D
128. You are
the network
administrator
of the
Windows 2000
network at
Island
Hopper News.
Your company
does not
have a Web
presence.
Your network
consists of
a Windows
2000 domain
controller,
a file
server, and
a member
server named
Server 1.
Server 1 is
connected to
a modem
bank. Many
users want
to log on to
the network
for home.
These users
have Windows
95, Windows
98 and
Windows 2000
are
professional
computers.
You enable
routing and
remote
access for
Windows 2000
on server 1.
You
configure
the server 1
properties
as shown in
the exhibit.
<Exhibit 1 - Not
Available>
<Exhibit 2 - Not
Available>
Users
configure
dial-up
networking
on their
client
computers to
connect to
server 1.
Some users
report that
they are
unable to
connect to
server 1.
What should
you do?
A. Change
the
authentication
provider to
RADIUS
Authentication.
B. Disable
EAP.
C. Disable
MS-CHAP
version2.
D. Enable
SPAP.
E. Enable
MS-CHAP.
Answer: E
129. You are
the network
administrator
at Contoso
Ltd. You
work at the
main office
in Seattle.
The branch
office in
Denver is a
call center.
The network
consists of
a Windows
2000-only
domain. The
network is
configured
as shown in
the exhibit.
<Exhibit - Not
Available>
Denver is a
token ring
network.
Seattle is
an Ethernet
network.
None of your
network
adapters at
Contoso Ltd
support
promiscuous
mode. The
Brouter does
not support
multicast
traffic.
Wks1.contoso.com
and
mem1.contoso.com
are
available
for use as
network
monitor
clients. You
want to be
able to
detect and
identity
rogue
installations
of network
monitor on
your network
by using the
fewest
possible
computers.
What should
you do?
(Choose all
that apply)
A. Install
network
monitor
tools on
wks1.contoso.com
by using the
Windows
components
wizard.
B. Install
the SNMP
protocol on
wks1.contoso.com
by using the
Windows
components
wizard.
C. Install
network
monitor
tools on
mem1.contoso.com
by using the
Windows
components
wizard.
D. Install
the SNMP
protocol on
mem1.contoso.com
by using the
Windows
components
wizard.
E. Install
network
monitor
tools on
wks1.contoso.com
that
supports
promiscuous
mode.
F. Install
network
monitor
tools on
mem1.contoso.com
that
supports
promiscuous
mode.
Answer:
A, C
130. You are
the network
administrator
at Island
Hopper News.
The domain
and network
configuration
is a
single-site
Windows 2000
domain that
is
configured
as shown in
the exhibit.
<Exhibit - Not
Available>
You must
provide
Terminal
Services to
the Pentium
MMX client
computers.
You also
need to able
to manage
user
licenses and
enable users
to access
term1.islandhoppernews.com
First, you
install
terminal
services in
application
server mode
on
term1.islandhoppernews.com.
What should
you do next?
A. Install
terminal
services
licensing on
term1.islandhoppernews.com.
Select the
Enterprise
License
server
option.
B. Install
terminal
services
licensing on
term1.islandhoppernews.com.
Select the
Domain
license
server
option.
C. Install
terminal
services
licensing on
file1.islandhoppernews.com.
Select the
Enterprise
license
server
option.
D. Install
terminal
services
licensing on
file1.islandhoppernews.com.
Select the
Domain
license
server
option.
E. Install
terminal
services
licensing on
uu2.islandhoppernews.com.
Select the
Enterprise
license
server
option.
F. Install
terminal
services
licensing on
uu2.islandhoppernews.com.
Select the
Domain
license
server
option.
Answer: B
131. You
configure an
HP Jet
Direct print
device as
sown in the
network
diagram
exhibit.
<Exhibit 1 - Not
Available>
You want to
create and
share a
printer at
Srv2.sales.justtogs.com
that is
connected to
the TCP/IP
port of the
print
device.
However,
when you
enter the IP
address of
the device,
you receive
the dialog
box shown in
the Printer
Port Wizard
exhibit.
<Exhibit 2 - Not
Available>
Printer Port
Wizard What
should you
do?
A. Select
Hewlett
Packard
JetDirect
from the
Standard
drop-down
list.
B. Select
the Custom
option
button,
click the
settings
command
button, and
select the
LPR
protocol.
C. Change
the IP
address of
the print
device to
10.5.20.200.
D. Change
the subnet
mask of the
print device
to
255.0.0.0.
E. Change
the default
gateway
address on
Srv2.sales.justtogs.com
to
10.5.20.100.
Answer: C
132. You are
the
administrator
of a server
called X.
There is
only one
domain in
server X.
Server X has
a folder
named
Accounting
that holds
alot of
sensitive
information,
and can be
accessed by
two groups
with these
permissions:
Accounting
global
group: Full
Control
Users: Full
Control
Eric is a
user of the
domain and
needs full
access to
the
Accounting
folder. You
make Eric a
member of
the
Accounting
global
group, but
when Eric
tries to
access the
Accounting
folder he is
not allowed
access.
What should
you do to
give him
access to
the
Accounting
folder?
A. Have Eric
sign off and
sign back
on.
B. Give the
Everyone
group read
access to
the
Accounting
folder.
C. Make Eric
a member of
the Local
Administrator
group.
D. Can't
remember the
last chose,
but it was
wrong
Answer: A
133. You are
the network
administrator
for your FR.
The network
consists of
a Windows
2000 Active
Directory
domain named
FR.com. The
network
includes a
Windows 2000
Server
computer
named FR1,
which is a
member of
the domain.
FR1 runs
Routing and
Remote
Access for
Windows 2000
and is
connected to
a modem
bank. An
existing
company
policy
allows all
domain users
to dial in
to FR1.
Your company
hire 10
inters. Each
intern has a
domain user
account. All
inters are
permitted to
access all
resources on
the company
network. One
intern is
permitted to
dial in to
FR1 for
remote
access. The
other nine
interns are
not
permitted to
dial in to
FR1 for
remote
access.
You need to
ensure that
the nine
interns
cannot
establish a
dial-up
connection
to FR1. What
should you
do?
A. Modify
the default
remote
access
policy to
Deny
permissions.
B. Configure
the nine
interns'
domain user
accounts so
that FR1 is
not listed
on the Logon
Workstations
list.
C. Place the
nine
interns'
user
accounts
into a
domain
global
grouped
named
NoRemoteAccess.
On FR1,
configure a
remote
access
policy that
denies
access to
the
NoRemoteAccess
group.
D. On FR1,
place the
nine
interns'
domain user
accounts
into a local
group named
NoRemoteAccess.
Then
configure a
remote
access
policy that
denies
access to
the
NoRemoteAccess
group.
Answer: C
134. You are
the
administrator
of a Windows
2000 Server
computer
named
FRIntra.
FRIntra is a
member of an
Active
Directory
domain and
hosts an
intranet Web
site for
your
company.
Company
policy
requires
that only
authenticated
users have
access to
the intranet
site. All
company
users have
user
accounts in
the Active
Directory
domain.
You
configure
directory
security for
the Web site
to use
integrated
security.
However, you
discover
that users
can access
the Web site
without
being
authenticated.
You need to
ensure that
only
authenticated
users can
access the
Web site.
What should
you do?
A. Install
Active
Directory on
FRIntra.
B. Select
the Basic
authentication
check box.
C. Clear the
Anonymous
access check
box.
D. Disable
the
IUSR_FRIntra
user account
on FRIntra.
E. Clear the
Allow IIS to
control
password
check box.
Answer: C
135. You are
the
administrator
of a Windows
2000 Server
computer
named FR4.
FR4 runs two
applications
that are
used by all
users in the
company.
Users report
that FR4 is
responding
slowly. Each
week, users
report that
the
performance
on FR4 is
slower that
it was the
previous
week. You
run System
Monitor on
FR4 and
document
performance
data as
shown in the
table in the
( exhibit )
You need to
correct the
condition
that is
reducing the
performance
on FR4. What
should you
do?
A. Upgrade
to a faster
hard disk.
B. Upgrade
to a faster
processor.
C. Increase
the size of
the paging
file.
D. Increase
the amount
of RAM.
Answer: A
136. You are
the network
administrator
at FR. The
network has
a domain
that
contains 10
Windows 2000
Server
computers.
The
computers
are
configured
as domain
controllers.
FR's
information
technology
director
asks you to
create a
schedule to
automatically
back up all
of the
servers
registry
files and
Windows 2000
Active
Directory
Services
databases.
You use the
Windows 2000
Server
backup
application
to ensure
that all
files are
backed up to
removable
media on a
nightly
basis.
The backup
process
needs to run
without
affecting
availability
and
production
during
normal hours
of
operation.
You need a
backup
configuration
that
requires the
least amount
of time to
implement.
What should
you do?
A. Configure
one domain
controller
to back up
the System
State data
for all 10
domain
controllers
to removable
media at
12:00
midnight.
B. Configure
the
scheduler
service to
run Rdisk /s
on all
domain
controllers
at 12:00
midnight.
Configure
one domain
controller
to back up
the C:\Winnt\Repair
folder for
all domain
controllers
to removable
media at
1:00 A.M.
C. Configure
all domain
controllers
to back up
their own
System State
data at
12:00
midnight to
a local
shared
folder.
Configure
one domain
controller
to back up
that shared
folder to
removable
media at
1:00 A.M.
D. Configure
all domain
controllers
to back up
their own
security and
registry
files at
12:00
midnight to
a shared
folder.
Configure
one domain
controller
to back up
that shared
folder to
removable
media at
1:00 A.M.
Answer: C
137. You are
the
administrator
of a Windows
2000 Network
for FR, Inc.
The network
includes
four Web
servers
named WWW1,
WWW2, WWW3,
and WWW4.
Your network
also
includes a
Windows 2000
Server
computer
that uses
DNS.
Each Web
server
contains
exactly the
same
content, and
users
accessing
www.FR.com
can be
directed to
any one of
them.
You add
records to
your DNS
server, as
shown in the
following
table:
Record type
Name IP
address
---------------------------------------------------
CNAME www
192.168.10.5
CNAME www
192.168.10.6
CNAME www
192.168.10.7
CNAME www
192.168.10.8
When you
examine the
logs for the
Web servers,
you discover
that all
incoming
traffic is
being
directed to
192.168.10.5,
which is the
IP address
for WWW1.
You want the
incoming
traffic to
be balanced
across the
four Web
servers.
What should
you do?
A. Select
the Disable
recursion
check box in
the
properties
of the DNS
server.
B. Enable
round-robin
in the
properties
of the DNS
server.
C. Enable
W3C logging
in the
properties
of the Web
servers.
D. Install
and
configure
Network Load
Balancing on
WWW1.
Answer: B
138. You are
the network
administrator
for FR. You
are
configuring
a new
Windows 2000
Server
computer.
The server
contains
five
physical
disks. You
plan to
implement a
Windows 2000
software
RAID.
You need to
ensure that
all disk
volumes are
fault
tolerant.
You want to
minimize
disk access
time and
maximize
available
storage.
What should
you do?
A. Configure
the system
volume as a
simple
volume and
the other
volumes as
striped
volumes.
B. Configure
the system
volume as a
simple
volume and
the other
volumes as
RAID-5
volumes.
C. Configure
the system
volume as a
mirrored
volume and
the other
volumes as
mirrored
volumes.
D. Configure
the system
volume as a
mirrored
volume and
the other
volumes as
RAID-5
volumes.
Answer: D
139. Your
Windows 2000
Server FRSrv
included an
integrated
network
interface
adapter. You
are
replacing
the
integrated
adapater
with a new
network
interface
adapter.
You install
the new
network
interface
adapter in
an available
PCI slot.
When you
restart
FRSrv, you
receive
error
messages in
the System
log stating
that the new
network
interface
adapter is
missing or
is not
working.
What should
you do to
resolve the
problem?
A. Create a
new hardware
profile.
B. Run the
Add/Remove
Hardware
wizard.
C. Disable
the
integrated
network
interface
adapter.
D. Delete
the device
driver for
the
integrated
network
interface
adapter from
the
Systemroot\system32\drivers
folder.
Answer: C
140. You are
the network
administrator
for FR. A
Windows NT
Server 4.0
member
server in
your network
has a
non-Plug and
Play ISA
modem.
You need to
update this
computer to
Windows 2000
Server. You
also need to
ensure that
you maintain
the current
device
configuration
during the
upgrade.
What should
you do?
A. Disable
the modem.
Start the
upgrade
process.
Enable the
modem.
B. Configure
BIOS to
reserve the
IRQ
currently in
use by the
modem. Start
the upgrade
process.
C. Remove
the modem.
Start the
upgrade
process.
Reinstall
the modem.
D. Install
the latest
driver for
the modem.
Start the
upgrade
process.
Answer: B
141. You are
a network
administrator
of a Windows
2000 Active
Directory
domain
FR.com. The
company has
multiple
branch
offices and
multiple
Windows 2000
Server
computers at
each office.
A junior
administrator
is located
at each
office. This
junior
administrator
is
responsible
for local
server
configurations.
One junior
administrator
has applied
a new
security
template to
the local
file server.
Local users
running
Windows 95
on their
computer can
no longer
communicate
with the
server.
You need to
verify that
the security
settings on
the Windows
2000 Server
computer at
the branch
office will
allow client
computers to
connect.
What should
you do?
A. Use MMC
and load the
Local
Computer
Policy
snap-in.
Examine the
Administrative
templates in
the User and
Computer
section.
Compare the
templates
against the
template
settings
currently in
place on the
server.
B. Use MMC
and load the
Security
Configuration
and Analysis
snap-in.
Create and
open a
database.
Then choose
Import file
and specify
the basicsv
template.
C. Use MMC
and load the
Computer
Management
snap-in.
Specify the
appropriate
template
file to
compare
against, and
then select
the Analyze
option.
D. Run the
secedit
/validate
command to
display the
appropriate
template
file.
Answer: A
142. You are
the
administrator
of a Windows
2000 Server
computer
named FRSrv.
FRSrv is
used in your
company's
research
department
and does not
belong to a
domain.
Employees in
the research
department
use the
local Guests
user account
to access
FRSrv.
However, new
company
security
guidelines
state that
employees
must not use
the local
Guest user
account to
log on to
company
computers.
You disable
the Guest
account on
FRSrv. You
also create
local user
accounts for
each
employee in
the research
department.
Three weeks
later, you
discover
that the
Guest
account has
been used to
access FRSrv.
You disable
the account
again.
You need to
ensure that
the Guest
account
cannot be
used to log
on to FRSrv.
What should
you do?
A. Rename
the Guest
account to
Guest$.
B. Remove
all user
accounts
except your
own from the
local
Administrators
group on
FRSrv.
C. Set the
Audit
account
logon events
audit policy
to audit
successful
and failed
attempts.
D. Modify
the Local
Security
Policy on
FRSrv so
that the
Accounts:
Guest
account
status
policy is
set to
Disabled.
Answer: B
143. All
server
computers
and client
computers on
FR's network
are domain
members. You
want to
configure
all client
computer,
local
server, and
domain user
accounts to
have a
password
expiration
policy of 60
days.
What should
you do?
A. Create a
Group Policy
object (GPO)
to enforce a
maximum
password age
of 60 days.
Link this
GPO to all
organizational
units (OUs)
that contain
user and
computer
accounts.
B. Create a
Group Policy
object (GPO)
to enforce a
maximum
password age
of 60 days.
Link this
GPO to the
domain.
C. Create a
batch file
to run the
Secedit
command on
each client
computer to
import a
security
template
that
enforces a
maximum
password age
of 60 days.
D. Create a
batch file
to run the
Secedit
command on
each domain
controller
to import a
security
template
that
enforces a
maximum
password age
of 60 days.
Answer: B
144. Your
Windows 2000
Server
computer
named FRSrv
that
contains a
single 18-GB
hard disk.
The drive is
configured
as a basic
disk and has
two
partitions.
Partition C
is 2 GB in
size and
contains the
operating
system
files.
Partition D
is 16 GB in
size and
contains
user data
that is
updated
frequently.
Both
partitions
are
formatted as
NTFS. Both
partitions
are backed
up to a tape
every
evening at
10:00 P.M.
You have a
current
Emergency
Repair Disk
(ERD) for
FRSrv, and
Recovery
Console is
installed on
the
computer.
One day at
4:00 P.M.,
the server
fails. You
attempt to
restart
FRSrv, but
you receive
the
following
error
message:
"Boot disk
or operating
system not
found".
You use
Recovery
Console to
discover
that the
files on
partition C
are
corrupted.
You need to
recover
FRSrv from
the failure
as quickly
as possible.
You also
must recover
as much user
data as
possible.
What should
you do?
A. Use the
ERD to start
the
computer.
Replace the
corrupted
files on
partition C
by copying
them from a
Windows 2000
Server
CD-ROM.
B. Boot the
Recovery
Console.
Copy any
files that
have changed
since 10:00
P.M. the
previous
evening to a
second
server. Use
the most
recent tape
backup to
restore the
remaining
user data to
the second
server.
C. Start the
computer by
using a
Windows 2000
Server
CD-ROM.
Select the
Repair
option in
Setup.
D. Install a
second hard
disk in the
computer.
Install
Windows 2000
Server on
the new hard
disk.
Re-create
the shared
folders on
the first
hard disk.
Answer: C
145. You are
the network
administrator
for your
company. The
network
contains a
Windows 2000
Server
computer
named FRSrv
and is
connected to
the Internet
by means of
a 1.544-Mbps
network
connection.
The network
also
contains a
firewall,
which
performs
network
address
translation
(NAT).
The firewall
is located
between
FRSrv and
the
Internet.
Your manager
informs you
that company
employees
will be
allowed to
work from
home.
Employees
who work
from home
will need to
connect to
the company
network by
using a
virtual
private
network (VPN)
connection.
You install
and
configure
Routing and
Remote
Access for
Windows 2000
on FRSrv and
then
configure
FRSrv to
accept PPTP
connections.
You also
configure
the firewall
to permit
PPTP
traffic.
You attempt
to open a
VPN
connection
to FRSrv
from your
home, but
you cannot
connect. You
can open a
VPN
connection
to FRSrv
from other
computers on
your
company's
network.
You need to
ensure that
employees
can connect
to FRSrv by
using a VPN
connection
from their
home
adapters.
Which two
actions
should you
take?
(Choose two)
A. Configure
the firewall
to perform
call ID
translation
for the
General
Routing
Encapsulation
(GRE)
protocol.
B. Configure
the firewall
to permit
General
Routing
Encapsulation
(GRE)
traffic.
C. Configure
FRSrv to use
EAP.
D. Configure
FRSrv to use
MS-CHAP v2.
E. Configure
FRSrv and
employees'
home
computers to
use L2TP
connections
and IPSec
encryption.
F. Configure
employee's
home
computers so
that
Internet
Connection
Sharing is
enabled.
Answer:
A, B
146. You are
the network
administrator
for FR inc.
The network
includes a
Windows 2000
Server
computer
named FrA.
The network
also
includes
five UNIX
client
computers
and 450
Windows
Professional
client
computers.
Your manager
asks you to
create a new
shared
folder named
SalesDocs on
FrA. You
create the
SalesDocs
shared
folder on an
NTFS
partition.
Your manager
places
several
documents in
SalesDocs.
Employees
who use UNIX
client
computers
cannot
connect to
the
SalesDocs
shared
folder. Your
manager asks
you to
ensure that
all company
employees
can access
the
documents.
You verify
that the
share and
file
permissions
on the
SalesDocs
shared
folder grant
Read
permission
to all
employees.
You need to
ensure that
all
employees
can access
the
documents in
the
SalesDocs
shared
folder.
What should
you do?
A. Move the
SalesDocs
shares
folder to a
FAT32
partition on
FrA.
B. Create a
host file on
each UNIX
client
computer
that
includes the
name and IP
address for
FrA.
C. Modify
the share
permissions
on the
SalesDocs
shared
folder so
that
Everyone
group has
Full Control
permissions.
D. Install
Internet
Information
Services (IIS)
on FrA.
Configure a
new FTP site
that uses
the
SalesDocs
shared
folder as
its root.
Answer: D
147. You are
the
administrator
of a Windows
2000 Server
computer
named FR1.
This server
hosts an
intranet Web
site for you
company.
The
marketing
department
stores
marketing
files in a
shared
folder on a
separate
file server.
The NTFS
permissions
on the
folder are
shown in the
File
Permissions
( exhibit )
The
marketing
director
wants to
make the
marketing
files
available to
the rest of
the company
by means of
the
intranet.
She wants
company
users to be
able to
read, but
not modify,
all of the
files.
You create a
new virtual
directory
named
Marketing
under the
intranet Web
site folder
on FR1. You
configure
the virtual
directory as
shown in the
Virtual
Directory
configuration
( exhibit
q52a.gif ).
Some users
report that
they are not
able to
access the
marketing
files from
their Web
browser.
However, all
users in the
marketing
department
are able to
access the
files.
You need to
ensure that
all company
users are
able to read
the
marketing
files.
What should
you do?
A. Select
Directory
browsing
check box on
the Virtual
Directory
tab.
B. Copy the
files from
their
location on
the filer
server to
\\FR1\Marketing.
C. Modify
the NTFS
permissions
on the file
server to
remove the
entry for
Marketing.
D. Modify
the NTFS
permissions
on the file
server to
include an
entry for
Everyone:
Read.
Answer: D
148. You are
the
administrator
of a Windows
2000 Server
computer
named FrA.
This server
contains
critical
payroll
files. You
must perform
a daily
backup of
these files.
You shutdown
the server
and connect
a non-Plug
and Play
tape device.
You restart
the server
and install
the tape
device
driver.
After the
driver
loads, you
are promoted
to restart
the server.
You then
receive the
following
STOP error:
"DRIVER_IRQL_NOT_LESS_OR_EQUAL"
You need to
enable the
server to
start
correctly.
What should
you do?
A. Restart
the server
in debugging
mode. When
the server
starts,
remove the
device and
its
associated
driver.
B. Restart
the server
by using the
Windows 2000
Server
CD-ROM and
choose to
repair the
installation.
C. Restart
the server
by using the
last known
good
configuration.
D. Restart
the server
by using a
Windows 2000
bootable
floppy disk.
When the
server
starts,
remove the
device and
its
associated
driver.
Answer: C
149. You are
the
administrator
of a Windows
2000 Server
computer
named
FRServer.
FRServer
contains
five hard
disks. Disks
0 and 1 are
configured
as a
mirrored
volume and
contain the
operating
system
files. Disk
2, 3, and 4
are
configured
as a stripe
set with
parity
volume and
contain 150
GB of data
files.
FRServer
also
contains a
tape backup
device,
which is
used to make
a full
backup of
the data
files every
weekend.
Disk 2 fails
on Tuesday.
You replace
disk 2 with
a new hard
disk.
You need to
return the
stripe set
with parity
volume to
normal
operation as
quickly as
possible.
You also
need to
minimize the
amount of
data lost.
What should
you do?
A. Use the
Disk Manager
console to
delete and
re-create
the stripe
set with
parity
volume.
B. Restore
the data
files from
the most
recent tape
backup to
the stripe
set with
parity
volume.
C. Modify
the Boot.ini
file so that
the ARC path
for Windows
2000 Server
points to
disk2.
D. Use the
Disk Manager
console to
repair the
volume.
Answer: D
150. You are
the
administrator
of a Windows
2000 Server
computer
named FR3.
FR3 runs
Internet
Information
Services (IIS)
and has a
single Web
site named
Default Web
Site.
The manager
of your
company's
sales
department
asks you to
create a new
shared
folder named
Forecasts on
FR3. The
manager
plans to
place
documents in
the shared
folder. All
company
employees
need to
access the
documents by
means of a
Web browser
and the URL
http://FR3/forecasts/.
You create
the
Forecasts
shared
folder and
configure
the
appropriate
share and
NTFS
permissions.
You verify
that the
manager is
able to
place
documents in
the shared
folder and
map a
network
drive to
\\FR3\Forecasts.
However,
company
employees
cannot
access the
documents by
means of
their Web
browser.
When they
attempt to
access the
documents,
their
browsers
display the
following
error
message:
"Page not
found".
You need to
ensure that
all company
employees
can access
the
documents by
using a Web
browser and
the URL
http://
FR3/forecasts/.
What should
you do?
A. Restart
the World
Wide Web
Publishing
service.
B. Create an
additional
share named
Forecasts$
for
\\FR3\Forecasts.
C. Ensure
that the
TCP/IP
Helper
service on
FR3 is
configured
to start
automatically.
D. In the
Internet
Services
Manager
console,
configure a
new virtual
directory
named
Forecasts.
Point
Forecasts to
\\FR3\Forecasts.
Answer: D
|
151.
You
are
required
to
strengthen
security
in
the
fr.com
domain.
You
decide
to
set
an
account
policy
for
domain
accounts
to
have
a
maximum
password
age
of
30
days
and
for
local
computer
accounts
to
have
a
maximum
password
age
of
90
days.
Which
action
or
actions
should
you
take?
(Choose
all
that
apply)
A.
Configure
a
Group
Policy
object
(GPO)
on
the
domain
that
sets
the
maximum
password
age
to
30
days.
B.
Configure
a
Group
Policy
object
(GPO)
on
the
domain
that
sets
the
maximum
password
age
to
90
days.
C.
Configure
a
Group
Policy
object
(GPO)
that
sets
the
maximum
password
age
to
30
days,
and
link
it
to
all
organizational
units
(OUs)
D.
Configure
a
Group
Policy
object
(GPO)
that
sets
the
maximum
password
age
to
90
days,
and
link
it
to
all
organizational
units
(OUs).
E.
Configure
a
local
computer
policy
on
all
local
computers
that
sets
the
maximum
password
age
to
30
days.
F.
Configure
a
local
computer
policy
on
all
local
computers
that
sets
the
maximum
password
age
to
90
days.
Answer:
A, F
152.
You
are
the
administrator
of a
Windows
NT
Server
4.0
computer
named
FR1.
FR1
is a
backup
domain
controller
(BDC),
and
a
member
of
your
company's
Windows
2000
Active
Directory
domain.
FR1
contains
five
hard
disks.
Disk
0
and
1
are
configured
as a
Windows
NT
4.0
mirror
set.
The
mirror
set
contains
the
operating
system
files
and
500
MB
of
free
disk
space.
Disk
2, 3
and
4
are
configured
as a
Windows
NT
4.0
stripe
set
with
parity
and
contain
employee
data
files.
The
Windows
NT
4.0
stripe
set
with
parity
has
a
maximum
capacity
of
140
GB
and
contains
15
GB
of
free
disk
space.
FR1
runs
an
application
that
is
used
by
400
company
employees.
A
new
version
of
the
application
is
available.
You
need
to
install
the
new
version,
but
it
requires
Windows
2000
Server.
Also,
the
application
will
not
run
on a
domain
controller.
You
need
to
install
the
new
application
on
FR1
as
quickly
as
possible.
What
should
you
do
first?
A.
On
FR1,
back
up
the
employee
data
files.
Then
format
all
five
disks
and
perform
a
clean
installation
of
Windows
2000
Server.
Restore
the
employee
data
files.
B.
On
FR1,
install
Windows
2000
Server.
Configure
FR1
to
use
a
dual-boot
configuration
that
includes
Windows
NT
Server
4.0
and
Windows
2000
Server.
C.
Upgrade
FR1
to
Windows
2000
Server.
During
the
upgrade,
select
the
option
to
make
FR1
a
member
server.
D.
Upgrade
FR1
to
Windows
2000
Server.
During
the
upgrade,
select
the
option
to
make
FR1
a
domain
controller.
After
the
upgrade
is
complete,
demote
FR1.
Answer:
A
153.
Your
company
has
two
locations-north
and
south.
Windows
2000
Servers
in
both
locations
create
weekly
tape
backups
of
critical
data.
The
tapes
are
stored
in
the
south
location.
How
can
you
restore
system
state
data
to
the
server
in
the
north
location?
A.
Within
Windows
Backup
on
the
south
server,
restore
the
system
state
data
to
the
system
root
folder
on
the
north
server.
B.
Ship
the
backup
tape
to
the
north
office.
Run
Windows
Backup
on
the
north
server
and
restore
system
state
data
to
the
system
root
folder.
C.
Restart
the
south
server
in
Directory
Services
Restore
Mode,
run
Windows
Backup,
and
restore
system
state
data
to
the
system
root
folder
of
the
north
server.
D.
Copy
the
backup
file
to
any
directory
on
the
north
server.
Double-click
on
the
file
and
choose
"Restore
System
State
Data."
Answer:
B
154.
You
administer
a
routed
Window
2000
network.
You
install
a
new
Windows
2000
Server
computer
on a
new
routed
segment
and
configure
the
existing
DHCP
Server
with
a
scope
that
is
valid
for
the
new
routed
segment.
After
enabling
the
new
Windows
2000
Server
for
DHCP,
you
find
on
your
first
boot
that
it
has
been
assigned
the
IP
address
of
102.93.1.100,
a 16
bit
subnet
mask,
and
no
default
gateway.
When
opening
My
Network
Places,
you
see
only
the
local
computer.
What
two
actions
must
be
taken
so
that
this
new
Windows
2000
Server
can
see
other
computers
on
the
network?
(choose
two)
A.
Configure
all
routers
to
route
BOOTP
broadcast
frames.
B.
Configure
the
default
gateway
to
route
all
requests
through
TCP
port
72.
C.
Add
the
IP
address
of
the
default
gateway
to
the
new
2000
Server's
TCP/IP
properties.
D.
Add
a
DHCP
relay
agent
computer
to
the
new
routed
segment.
E.
Add
a
WINS
server
to
the
new
routed
segment.
Answer:
A, D
155.
An
NT
4.0
Server
named
ELIZABETH
is a
member
server
in a
Windows
2000
domain
named
testing.product.local.
You
want
to
upgrade
ELIZABETH
to
Windows
2000.
The
domain
runs
in
native
mode.
You
also
want
to
change
the
role
of
ELIZABETH
to
be
PDC
within
testing.product.local.
Which
of
the
following
two
actions
must
be
performed?
(choose
two)
A.
Reinstall
NT
4.0
on
ELIZABETH
to
the
existing
\Winnt
folder
and
promote
ELIZABETH
to
PDC.
B.
Use
Server
Manager
on
ELIZABETH
to
promote
ELIZABETH
to
PDC.
C.
Upgrade
ELIZABETH
to
Windows
2000
Server.
D.
Run
the
Active
Directory
Installation
Wizard
to
make
ELIZABETH
PDC
of
the
testing.product.local
domain.
E.
Designate
ELIZABETH
as
PDC
from
the
existing
PDC
and
reboot
the
existing
PDC.
Answer:
C, D
156.
Your
network
currently
contains
6 NT
4.0
Servers
and
620
NT
4.0
Workstations.
You
want
to
bring
a
Windows
2000
Server
online
and
implement
it
to
act
as
primary
domain
controller
in
the
existing
domain.
How?
A.
Run
the
Active
Directory
Installation
Wizard
to
configure
Active
Directory
on
the
2000
Server.
Promote
the
2000
Server
to
be
PDC
of
the
domain.
Reboot
the
existing
NT
4.0
PDC
and
demote
it
to
BDC
status.
B.
Shut
down
the
existing
NT
PDC.
Run
the
Active
Directory
Installation
Wizard
on
the
2000
Server
and
specify
the
current
NetBIOS
name
of
the
domain.
Restart
NT
on
the
PDC
and
demote
it
to
BDC.
C.
Install
NT
Server
4.0
on
the
new
computer
and
designate
the
computer
as
PDC
of
the
existing
domain.
Specify
the
currently
used
NetBIOS
name
of
the
domain.
Upgrade
the
computer
to
Windows
2000
Server
and
use
Active
Directory
to
force
synchronization
with
the
current
PDC.
D.
Install
NT
Server
4.0
on
the
new
computer
and
promote
the
computer
as
PDC
of
the
existing
domain.
Be
sure
to
specify
the
currently
used
NetBIOS
name
of
the
domain.
Upgrade
the
computer
to
Windows
2000.
Answer:
D
157.
You
administer
the
Greenware.com
domain
for
the
Greenware
Corporation.
In
Greenware's
main
office
in
Toronto,
Internet
Information
Services
run
on a
computer
named
web.greenware.com.
You
want
web
developers
in
Puerto
Rico
and
Los
Angeles
to
be
able
to
update
web
sites
and
virtual
directories
on
web.greenware.com
via
Microsoft
FrontPage.
How
do
you
do
this?
A.
Install
server
extensions
for
IIS
on
web.greenware.com
using
the
FPRENAME
command.
Configure
the
server
extensions
for
each
web
site.
B.
Install
server
extensions
for
IIS
on
web.greenware.com
using
the
FPSRBADM
command.
Configure
the
server
extensions
for
each
web
site.
C.
Install
server
extensions
from
the
All
Task
menu
within
IIS.
Configure
the
server
extensions
for
each
web
site.
D.
Install
server
extensions
for
each
web
site
by
selecting
Configure
Server
Extensions
from
the
All
Tasks
menu
in
IIS.
Configure
the
server
extensions
to
allow
each
developer
update
access
for
each
web
site.
Answer:
D
158.
Your
company
network
includes
a
Windows
2000
application
server
named
App1.
App1
runs
many
different
production
applications.
All
applications
currently
start
automatically
when
you
start
the
server.
One
of
these
applications
is a
critical,
custom
accounting
application.
This
application
runs
as a
single
service
named
finance.
You
discover
that
finance
has
a
programming
defect
that
causes
App1
to
become
unstable.
You
need
to
troubleshoot
this
programming
defect.
Until
the
defect
is
repaired,
you
need
to
ensure
that
finance
does
not
interface
with
the
other
applications
on
the
server.
What
must
you
do?
A.
Use
task
manager
to
set
the
priority
of
finance
to
BelowNormal.
B.
Use
Task
Manager
to
set
the
priority
of
Finance
to
Low.
C.
Create
a
batch
file
to
be
launched
upon
restart
that
pauses
the
Finance
service.
D.
Use
the
services
console
to
change
the
startup
type
for
Finance
to
manual.
Answer:
D
159.
You
administer
a
Windows
2000
Server
with
two
14
GB
hard
disks.
The
first
is
formatted
using
FAT
32.
The
second
is
formatted
using
NTFS.
You
create
a
shared
folder
on
both
disks.
To
conserve
disk
space,
you
compress
the
shared
folder
on
disk
two.
When
you
move
files
from
the
shared
folder
on
disk
two
to
the
first
disk,
the
files
lose
their
compression
attributes.
How
do
you
ensure
that
compression
is
maintained
when
transferring
files
from
the
second
disk
to
shared
folders
on
the
first
disk?
(Choose
two)
A.
Format
the
first
disk
as
NTFS.
B.
Convert
the
first
disk
to
NTFS.
C.
Convert
both
disks
to
be
dynamic
disks.
D.
Convert
the
first
disk
to a
dynamic
disk.
E.
Compress
the
shared
folders
on
the
first
disk.
Answer:
B, E
160.
You
are
installing
Windows
2000
Server
on a
new
computer
that
has
a
hardware-based
RAID
array,
a
floppy
disk
drive,
and
a
CD-ROM
drive.
The
disk
controller
for
the
RAID
array
is
not
included
on
the
current
hardware
compatibility
list
(HCL).
You
run
Windows
2000
Setup
by
starting
the
computer
from
the
Windows
2000
Server
CD-ROM.
When
the
computer
restarts
at
the
end
of
the
text
mode
portion
of
Windows
2000
Setup,
you
receive
the
following
STOP
error:
"INACCESSABLE_BOOT_DEVICE
".
Which
two
actions
should
you
take
to
eliminate
the
STOP
error?
(Choose
Two)
A.
Modify
the
Boot.ini
file.
B.
Restart
Windows
2000
Setup
from
the
CD-ROM.
C.
Select
safe
mode
from
the
Windows
2000
boot
menu.
D.
Remove
the
Windows
2000
Server
CD-ROM
from
the
CD-ROM
drive.
E.
Install
a
driver
for
the
RAID
controller
form
a
floppy
disk.
F.
Use
device
manager
to
update
the
driver
for
the
RAID
controller.
Answer:
B, E
161.
You
administer
two
Windows
2000
Servers,
Server1
and
Server2.
Sever1
has
a
spanned
volume
that
consists
of
areas
on
three
physical
hard
disks.
The
three
disks
support
hot
swapping,
and
three
hot
swappable
disk
bays
are
available
on
Server2.
The
drive
letter
that
the
spanned
volume
on
Server1
uses,
is
not
currently
in
use
on
Server2.
You
want
to
move
the
three
disks
to
Server2.
You
want
the
spanned
volume
to
use
the
same
drive
letter
on
Server
2
that
it
originally
used
on
Server1.
You
want
to
minimize
the
impact
of
your
actions
on
the
availability
and
performance
of
the
two
servers.
You
back
up
the
spanned
volume.
What
should
you
do
next?
A.
Move
the
disks
from
Server1
to
Server2.
On
Server1,
rescan
the
disks.
On
Server2,
rescan
the
disks.
B.
Shut
down
both
servers.
Move
the
disks
from
Server1
to
Server2.
Restart
both
computers.
Rescan
the
disks
on
Server2.
C.
Shut
down
Sever1.
Move
the
disks
from
Server1
to
Server2.
Restart
Server1.
On
Server2,
restore
the
spanned
volume
by
using
Windows
Backup.
D.
Move
the
disks
from
Server1
to
Server2.
On
Server2,
create
a
new
spanned
volume
and
format
the
volume.
Restore
the
spanned
volume
by
using
Windows
Backup.
Answer:
A or
D
(please
confirm
it)
162.
You
are
the
network
administrator
for
Island
Hopper
News.
The
main
office
has
a
Windows
2000
workgroup
that
includes
five
Windows
2000
Server
computers
and
10
Windows
2000
Professional
computers.
Currently,
no
users
at
the
main
office
have
internet
access.
Island
hopper
news
also
has
two
remote
offices,
each
with
a
Windows
2000
workgroup.
None
of
these
offices
are
networked
to
another.
However,
users
at
the
remote
office
connect
to
main
office
individually
to
access
network
resources.
A
server
named
member2
is
located
at
the
main
office.
Member
2
has
two
network
adapters,
which
are
designated
adapter1
and
adapter2.
adapter1
is
connected
to
the
LAN,
and
adapter2
is
connected
to a
DSL
modem
that
is
connected
to
the
internet.
To
provide
users
at
the
main
office
with
internet
access,
you
enable
internet
connection
sharing
on
member
2.
Now,
some
users
in
the
remote
office
report
that
they
can
no
longer
access
local
network
resources.
In
addition,
users
at
the
main
office
are
still
unable
to
access
the
internet.
You
need
to
ensure
that
local
network
resources
are
always
accessible,
and
you
need
to
ensure
that
users
at
the
main
office
have
internet
access.
What
should
you
do?
A.
Configure
internet
connection
sharing
to
be
enabled
on
adapter
1.
B.
Configure
internet
connection
sharing
to
be
enabled
on
adapter
2.
C.
Configure
network
address
translation
on
member
2.
D.
Install
a
proxy
server
on
the
company's
network.
Answer:
C
163.
Your
network
uses
the
private
IP
address
192.168.0.0.
You
connect
via
dialup
to a
Windows
2000
Server
that
is
configured
as a
remote
access
server.
You
connect
successfully,
but
receive
the
error
"Request
timed
out"
when
trying
to
run
any
IP
applications.
You
check
to
see
if
you
have
been
assigned
an
IP
address,
and
IPCONFIG
indicates
that
your
IP
address
is
125.22.67.100.
What
should
be
done
to
resolve
the
problem?
A.
Configure
the
remote
access
server
with
the
address
of a
DHCP
server.
B.
Have
the
remote
access
server
synchronize
itself
with
all
domain
controllers
on
the
network.
C.
Configure
the
remote
access
server
to
be a
DHCP
relay
agent.
D.
Ensure
that
the
remote
access
server
is
able
to
connect
to
DHCP
and
that
the
DHCP
has
the
remote
access
server's
subnet
within
its
scope.
Answer:
D
164.
Your
Windows
2000
Server
network
is a
routed
network
that
uses
TCP/IP
as
the
only
network
protocol.
All
of
the
Windows
2000
Professional
computers
and
Windows
NT
Workstation
4.0
computers
are
members
of
the
single
domain.
You
install
Gateway
Service
for
Netware
on a
Windows
2000
Server
computer.
You
install
a
second
network
adapter
on
the
gateway
server.
The
network
is
now
configured
as
shown
in
the
(
exhibit
)
You
want
to
configure
Adapter
#1
for
communications
to
and
from
the
Windows-based
client
computers
exclusively.
Which
checkbox
or
boxes
in
the
Local
Area
Connection
Properties
dialog
box
should
you
select?
(Choose
all
that
apply.)
A.
Gateway
(and
client)
Services
for
Netware.
B.
Client
for
Microsoft
Networks.
C.
File
and
Printer
Sharing
for
Microsoft
Networks.
D.
NWLink
NetBIOS.
E.
NWLink
IPX/SPX/NetBIOS
Compatible
Transport
Protocol.
F.
Internet
Protocol
(TCP/IP)
Answer:
B,
C, F
165.
You
are
configuring
Internet
access
for
a
remote
site
of
your
company.
The
remote
site
has
12
computers
on a
private
network
with
a
56Kbps
connection
to
the
Internet.
Network
address
translation
(NAT)
and
the
AT
feature
of
routing
and
remote
access
will
be
used.
You
test
the
configuration
and
find
that
web
sites
can
only
be
reached
by
their
IP
address
and
not
their
fully
qualified
domain
name.
What
must
you
do
to
fix
this
problem?
(Choose
two)
A.
Configure
each
of
the
computers
in
the
remote
site
with
the
address
of a
WINS
server.
B.
Configure
each
of
the
computers
in
the
remote
site
with
the
address
of a
DNS
server
on
the
Internet.
C.
Configure
a
filter
on
the
NAT
Server
to
pass
DNS
packets.
D.
Create
a
host
file
on
each
of
the
NAT
Servers.
Answer:
B, C
or
B, D
(please
confirm
it)
166.
You
administer
a
large
network
consisting
of 6
domain
controllers,
4
member
servers,
and
500
clients.
All
computers
are
using
Windows
2000
Server
or
Windows
2000
Professional.
TCP/IP
is
the
only
protocol
in
use.
You
want
to
configure
the
network
so
that
all
computers
can
resolve
the
addresses
of
all
other
computers
using
DNS.
There
must
be
redundancy
built
into
the
system,
in
case
the
primary
name
server
fails.
How
should
you
implement
DNS
on
your
network?
A.
Configure
one
server
with
a
standard
primary
zone
for
the
domain
and
configure
at
least
one
server
with
a
standard
secondary
zone.
B.
Configure
one
server
responsible
for
an
Active
Directory
integrated
primary
zone;
configure
at
least
one
server
responsible
for
a
standard
secondary
zone.
C.
Configure
one
server
with
a
standard
primary
zone
for
the
domain
and
configure
at
least
one
server
responsible
for
an
Active
Directory
integrated
primary
zone.
D.
Configure
at
least
two
servers
responsible
for
the
Active
Directory
integrated
primary
zone
of
the
domain.
Answer:
D
167.
Your
Windows
2000
Server
computer
has
two
disks
attached
to
an
EIDE
disk
controller.
You
need
additional
disk
space.
You
add
a
new
SCSI
disk
controller
that
has
six
new
disks
attached.
The
new
controller
is
not
included
on
the
Hardware
Compatibility
List
(HCL).
When
you
restart
the
computer,
Windows
2000
does
not
detect
the
new
controller.
What
can
you
do
to
install
the
new
controller?
(Choose
two).
A.
Use
Device
Manager
to
turn
off
IRQ
steering
in
the
properties
of
the
standard
PC.
Then
restart
the
computer.
B.
Use
Disk
Management
to
restore
the
basic
configuration.
Then
restart
the
computer.
C.
Use
the
Add/Remove
Hardware
wizard
to
add
a
new
SCSI
and
RAID
controller
from
the
disk
supplied
by
the
manufacturer.
D.
Use
Disk
Management
to
rescan
the
disk.
E.
Use
the
manufacturer's
setup
program
to
install
the
driver
for
the
SCSI
disk
controller.
Answer:
C, E
168.
The
network
you
administer
has
two
organizational
units
named
North
America
and
South
America.
Within
each
OU
are
subordinate
OU's
named
Marketing,
Graphics,
and
Sales.
You
suspect
someone
is
trying
to
log
into
your
domain
by
guessing
account
names
and
passwords.
How
can
you
configure
your
network
so
that
you
can
detect
which
computer
is
being
used
for
these
log
on
attempts?
A.
Edit
the
default
domain
controller
policy
object
to
audit
account
logon
failures.
B.
Edit
the
default
domain
controller
policy
object
to
audit
resource
access
failures.
C.
Edit
the
North
and
South
America
OU
group
policy
objects
to
audit
log
on
failures.
D.
Edit
the
GPO
of
each
subordinate
OU
to
audit
resource
access
failures.
Answer:
A
169.
You
administer
a
Windows
2000
Server
that
hosts
an
important
network
share
named
REPORTS
on
an
NTFS
partition.
The
permissions
for
REPORTS
are
as
follows:
Type
of
Permission
Account
Permission
Share
Users
Change
NTFS
Users
Full
Control
The
CEO
of
your
company
has
called
to
request
that
particular
files
in
the
REPORTS
folder
be
prevented
from
being
modified
immediately.
Many
of
the
files
are
currently
in
use.
What
two
actions
should
you
take
to
fulfill
this
request?
(choose
two)
A.
Disconnect
users
from
the
REPORTS
folder.
B.
Modify
the
NTFS
permissions
of
the
REPORTS
folder.
C.
Modify
share
permissions
of
the
REPORTS
folder.
D.
Disconnect
users
from
the
network.
E.
Modify
NTFS
permissions
for
the
ten
files.
Answer:
A, E
170.
You
administer
a
Windows
2000
Server
network
consisting
of
500
Windows
2000
Professional
computers
and
50
Windows
2000
Servers.
You
configure
two
domains-
litware.local
and
dev.litware.local.
You
enable
auditing
in
the
domain
policy
object
for
litware.local
to
audit
the
success
and
failure
of
object
access.
You
install
a
printer
on a
domain
controller
named
dc7.dev.litware.local.
You
configure
auditing
on
this
printer
to
observe
successful
and
failed
attempts
to
print
by
the
Research
universal
group.
You
view
the
security
log
for
dc7.dev.litware.local
one
week
later
and
find
that
no
events
have
been
written
to
the
log.
You
know
users
in
the
Research
universal
group
have
used
the
printer
repeatedly.
What
should
be
done
to
fix
the
problem?
A.
Enable
auditing
in
the
domain
policy
objects
of
dev.litware.local
to
audit
the
success
and
failure
of
object
access.
B.
Audit
the
domain
policy
object
for
litware.local
to
enable
auditing
of
the
success
and
failure
of
directory
service
access.
C.
Configure
auditing
of
the
success
and
failure
of
object
access
in
the
default
domain
controller
policy
object
on
the
domain
controller
organizational
unit
(OU)
of
the
dev.litware.local
domain.
D.
Configure
auditing
of
the
success
and
failure
of
object
access
in
the
default
domain
controller
policy
object
on
the
domain
controller
organizational
unit
(OU)
of
the
litware.local
domain.
Answer:
A
171.
You
administer
a
network
with
NT
Server
4.0
computers,
NT
Workstation
4.0
computers,
and
several
UNIX
computers.
The
network
consists
of a
single
Windows
NT
domain.
You
want
to
upgrade
a
Windows
NT
Server
computer
named
Server1,
which
is
currently
a
BDC,
to
Windows
2000
Server.
Your
existing
DNS
server
is a
UNIX
computer
that
supports
SRV
(service)
records
and
is
configured
to
accept
dynamic
updates.
The
existing
WINS
server
is
another
Windows
NT
Server
computer.
You
want
to
configure
Server1
as a
domain
controller
in a
new
Active
Directory
forest.
You
want
the
existing
Windows
NT
domain
accounts
to
be
upgraded
to
Active
Directory.
You
want
to
upgrade
Server1
with
the
least
impact
on
the
network.
What
should
you
do?
A.
Promote
Server1
to
the
PDC
of
the
domain.
Run
Windows
2000
Setup
on
Server1.
B.
Run
Windows
2000
Setup
on
Server1.
Configure
Server1
as a
DNS
server
and
WINS
server.
C.
Run
Windows
2000
Server
Setup
on
Server1
and
select
the
PDC
AutoConfigure
option
during
Setup.
D.
Set
up
Server1
as a
WINS
server.
Run
Windows
2000
Server
Setup
on
Server1.
Answer:
A
172.
Your
Windows
2000
Server
computer
has
five
hard
disks.
Four
100-GB
hard
disks
on
the
server
are
configured
as a
single
striped
volume.
You
want
to
reconfigure
the
four
disks
so
that
the
volume
is
fault-tolerant
and
has
as
much
space
as
possible
for
data
storage.
You
want
to
use
only
the
existing
hardware.
What
should
you
do?
A.
Convert
the
disk
to a
dynamic
disk.
Shut
down
and
restart
the
server.
B.
Back
up
the
data
on
the
striped
volume
and
then
delete
the
striped
volume.
Create
a
RAID-5
volume
on
the
the
four
disks.
Restore
data
to
the
new
RAID-5
volume.
C.
Backup
the
data
on
the
striped
volume
and
then
delete
the
striped
volume.
Create
two
mirrored
volumes.
Shut
down
and
restart
the
server.
Restore
the
data
to
the
new
mirrored
volumes.
D.
Back
up
the
data
on
the
stripped
volume,
and
then
delete
the
stripped
volume.
Create
a
spanned
volume
from
the
first
two
disks.
Create
a
second
spanned
volume
from
the
last
two
disks.
Mount
the
root
of
the
second
spanned
volume
in
the
root
of
the
first
spanned
volume.
Restore
the
data
to
the
first
spanned
volume.
Answer:
B
173.
You
want
to
measure
physical
disk
performance
on
your
Windows
2000
Server.
You
want
to
run
System
monitor
locally
on
the
server.
You
also
want
to
ensure
that
System
Monitor
has
the
least
impact
on
other
processes
currently
running.
What
can
you
do?
(Choose
two)
A.
From
a
command
prompt,
run
the
start/low
perfmon
command.
B.
From
a
command
prompt,
run
the
start/normal
perfmon
command.
C.
From
a
command
prompt,
run
the
start
/min
perfmon
command.
D.
Open
System
Monitor,
and
then
use
Task
Manager
to
set
the
priority
of
the
Mmc.exe
process
to
Low.
E.
Open
System
Monitor,
and
then
use
Task
Manager
to
set
the
priority
of
the
Mmc.exe
process
to
normal.
Answer:
A, D
174.
You
install
a
new
tape
drive
on
your
Windows
2000
Server.
You
reboot,
log
in,
and
are
prompted,
"irq1_not_less_or_equal."
The
Server
contains
important
data
that
must
be
accessed
by
users
on
the
network
at
all
times.
How
do
you
bring
the
server
back
online
as
soon
as
possible?
A.
Disconnect
the
tape
drive
and
reboot.
B.
Perform
an
emergency
repair
and
select
"Fast
Repair"
and
reboot.
C.
Boot
into
Safe
Mode.
Remove
the
new
driver
in
Device
Manager
and
reboot.
D.
Restart
the
computer
using
Recovery
Console.
Disable
the
new
driver.
Restart
the
computer
and
disable
the
new
tape
device
driver.
Answer:
D
175.
You
edit
the
registry
on
your
Windows
2000
Server
and
reboot.
The
computer
stops
responding
before
you
reach
the
login
screen.
How
do
you
restore
the
computer's
previous
configuration?
A.
Boot
into
Safe
Mode.
Run
REGEDIT
and
click
File,
Restore
Previous
Registry.
B.
Start
the
computer
using
Recovery
Console.
Run
FIXBOOT
C:.
Reboot.
C.
Run
the
emergency
repair
process
and
choose
"Registry
Restore."
Reboot.
D.
Restart
the
computer
and
choose
the
"Last
Known
Good
Configuration"
as
it
boots.
Answer:
D
|
176. A Windows 2000 Server computer at your company is connected to two print devices. Company executives use one print device, which is shared as Executive. The office staff use the other print device, which is shared as Office.
Occasionally, a company executive directs a member of the office staff to print a report to the Executive printer. However, the executives report that some members of the office staff are printing to the Executive printer without authorization.
You need to find out which users are printing to the Executives printer without authorization.
What should you do?
A. Monitor the printer's spool directory for files printed by unauthorized users.
B. Use system monitor to monitor the print jobs being set to the executive printer.
C. Enable audit logging for object access. Configure auditing on the executive printer.
D. Use the event viewer to review the security log for messages from the printer subsystem.
Answer: C
177. Your company network includes Windows 98, Windows 2000 Professional, and Macintosh client computers. All of the client computers currently use TCP/IP as their only network protocol.
You create several shared folders on a Windows 2000 Server computer. You plan to store the company's financial data in these shared folders. During testing, you discover that the Macintosh client computers cannot access the shared folders.
You want the shared folders to be accessible from all of the client computers on the network.
What should you do first?
A. Install the SAP protocol on the Windows 2000 Server computer.
B. Install the Apple Talk network protocol on the Macintosh computers and on the Windows 2000 Server computer.
C. Install Apple Talk network integration on the Windows 2000 Server computer.
D. Install RIP on the Windows 2000 Server computer.
Answer: B
178. You are the administrator of the Intranet at Blue Sky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines.com as an intranet server. This server hosts the multiple departmental and resource Web links to the network and databases.
You configure a ticketing Web site. You also configure a finance virtual directory in the department's Web site, as shown in the exhibit.
During the first morning that the new server is available, users report that the only information they are seeing in their browser is a list of HTM and ASP files. For security reasons the first action you need to take is to disable the users' ability to view the files of all WEB sites in the form of a list.
What should you do?
A. Clear the Directory Browsing checkbox for the Server Properties, and then apply the settings to the child WEB sites.
B. Clear the Directory Browsing checkbox for the Ticketing WEB site, and then apply the setting to child virtual directories.
C. Clear the Directory Browsing checkbox for the Department's WEB site, and then apply the setting to the child virtual directories.
D. Clear the Directory Browsing checkbox for the Financing virtual directory.
Answer: A
179. You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of your company's client computers are connected to this server.
A shared folder named Data on the server is on an NTFS partition. The Data folder contains more than 200 files. The permissions for the Data folder are shown in the following table.
You discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effect on users who are using other files on the server.
Which two actions should you take? (Choose two.)
A. Modify the NTFS permissions for the 10 files.
B. Modify the NTFS permissions for the Data folder.
C. Modify the share permissions for the Data folder.
D. Log off the users from the network.
E. Disconnect the users from the Data folder.
Answer: A, E
180. You are the administrator of Coho Vineyard. You are responsible for all remote locations, each of which has at least one Windows 2000 Server computer.
After you install a new video adapter, one of the users at a remote location reports that Routing and Remote Access does not accept calls. After you resolve the Routing and Remote Access problem, you need to configure the server to prevent users from installing any unsigned device drivers.
What two actions should you take in the Driver Signing Option dialog box? (choose two)
A. Set File Signature Verification to Ignore.
B. Set File Signature Verification to Block.
C. Set File Signature Verification to Warn.
D. Select the Apply Settings As System Default check box.
Answer: B, D
181. You are the administrator of a Windows 2000 Server computer. Your computer has a spanned volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the spanned volume by using Windows Backup.
One of the disks fails. You replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible.
What should you do?
A. Extend the spanned volume to include the new disk. Rescan the disk.
B. Extend the spanned volume to include the new disk. Shut down and restart the server. Use Windows Backup to restore the data.
C. Rescan the disk. Format the spanned volume. Use Windows Backup to restore the data.
D. Rescan the disk. Extend the spanned volume to include the new disk. Shut down and restart the server. Use Windows Backup to restore the new data.
E. Rescan the disks. Remove the spanned volume and create a new spanned volume that includes the new disk. Format the spanned volume. Use Windows Backup to restore the data.
Answer: E
182. One of the differences between basic disks and dynamic disks is the number of partitions (on basic disks) and volumes (on dynamic disks) that each can contain. Which of the following statements regarding this is correct?
A. Basic disks can contain a maximum of two partitions. Dynamic disks can contain a maximum of four volumes.
B. Basic disks can contain a maximum of two partitions. Dynamic disks can contain an unlimited number of volumes.
C. Basic disks can contain a maximum of four partitions. Dynamic disks can contain a maximum of 24 volumes.
D. Basic disks can contain a maximum of four partitions. Dynamic disks can contain an unlimited number of volumes.
E. Basic disks can contain an unlimited number of partitions. Dynamic disks can contain a maximum of four volumes.
Answer: D
183. You have 20 identical new pc ,except for network & vga card,all pc in the same HCL you need to Install windows 2k server in easy way? (choose two)
A. use setp manager to creat Answer File
B. copy the folder I386 to every local hard disk
C. use SYSPREP with -NOSIDGEN
D. use SYSDIFF to creat image file
E. Create UDF file
Answer: A, B
184. You are installing Windows 2000 Server on a new computer that has a single 10-GB SCSI disk. The disk controller is not included on the current Hardware Compatibility List (HCL). You start the computer by using the Windows 2000 Server CD-ROM.
When the computer restarts at the end of the text mode portion of Windows 2000 setup, you receive the following STOP error: "INACCESSIBLE_BOOT_DEVICE."
Which two actions should you take to eliminate the STOP error? (Choose Two)
A. Restart the Windows 2000 Setup by using the Windows 2000 Server CD-ROM.
B. Select Safe Mode from the Windows 2000 boot menu.
C. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
D. Install a driver for the SCSI controller from a floppy disk.
E. Use Device Manager to update the driver for the SCSI controller.
Answer: A, D
185. Your network contains Windows 2000 Professional client computers that use TCP/IP as the only network protocol. The network also contains Windows 3.1 computers that use the NetBEUI protocol.
You install a new Windows 2000 Server computer on the network. You configure this server to use NetBEUI and TCP/IP. The Windows 3.1 computers can connect to the new server and use resources located on it. However the Windows 2000 Professional client computers cannot access the new server.
When you run the ipconfig command on the new server, it returns the information shown in the exhibit.
You want to allow the Windows 2000 Professional client computers to connect to the servers.
What should you do?
A. Ensure that the server is configured to connect to a Dynamic DNS server that is authoritative for the domain.
B. Ensure that the server is able to communicate with a DHCP server that has valid addresses for the network.
C. Ensure that NetBIOS over TCP/IP in enabled in the Advanced settings for TCP/IP.
D. Ensure that a valid WINS address is configured in the Advanced settings for TCP/IP.
Answer: B
186. You configure a Group Policy Object for the marketing Organizational Unit (OU) to prevent users from accessing My Network Places and from running system in control panel. You want the Managers Domain Local group to be able to access My Network places, but you still want to prevent them from running System in control panel.
What should you do?
A. Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy.
B. Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.
C. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run system in control panel. Give the original GPO a higher priority than the new GPO.
D. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to my network places. Give the new GPO a higher priority than the original GPO.
Answer: D
187. You are the administrator of you company's network. You are configuring the security policy for a group of users in the Finance organizational unit (OU). You need to configure the group policy so that future changes to the group policy will be applied within 15 minutes to any computers that are logged on to the network.
What should you do?
A. Enable the background refresh setting to use the default group policy refresh rate.
B. Enable the asynchronous group policy application setting.
C. Enable and configure the group policy refresh interval for domain controllers.
D. Enable and configure the group policy refresh interval for computers.
Answer: D
188. You are preparing to install Windows 2000 Server on a new computer. The computer is connected to a network that includes Windows 98 computers and Windows 2000 Server computers. You want to install Windows 2000 Server from source files that are located on a server on the network.
What should you do?
A. Start the new computer by using a Windows 98 network boot disk. Connect to the network server. Run Winnt32.exe.
B. Start the new computer by using Windows 98 network boot disk. Connect to the network server. Run Winnt.exe.
C. On a Windows 2000 Server computer, use Makebt32.exe to create installation startup disk. Start the new computer by using the first disk.
D. On a Windows 2000 computer, format a floppy disk. Copy NTLDR, boot.ini, Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the disk.
Answer: B
189. You are the network administrator of a Windows 2000 network. Your network contains five Windows 2000 Server computers and 100 Windows 2000 Professional computers. You want to deploy an update for an application that is used on the Windows 2000 Professional computers.
You want uses to automatically install the update when they log on to the domain.
What should you do?
A. Create a distributed file system(Dfs). Place the application update in the root folder of the Dfs.
B. Create a Microsoft Windows installer package for the application update. Configure RIS to use the package.
C. Create a Microsoft Windows installer package for the application update. Apply the package to the local computer policy on all of the computers.
D. Create a Microsoft Windows installer package for the application update. Apply the package to a group policy.
Answer: D
190. You create and share a folder on a computer running Windows 2000 Server. The folder will be used to store documents that define corporate standards. Most employees use these files frequently. You set the shared folder permissions to allow Read access for Authenticated Users. You set the read-only attribute of each file in this folder.
How should you configure the offline folder setting for this shared folder to minimize network traffic?
A. Clear the setting Allow Caching of files in this shared folder
B. Manual Caching for Documents
C. Automatic Caching for Programs
D. Automatic Caching for Documents
Answer: D
191. You are having problems starting one of your Windows 2000 domain controllers, so you want to start the system using the Advanced Startup options.
Which two options will be unavailable when you choose Advanced Startup Options? (Choose two)
A. Safe Mode
B. Debugging Mode
C. Safe Mode with Networking
D. Last Known Good Configuration.
E. Safe Mode with Command Prompt .
Answer: A, E
192. What service is responsible for answering client computer network service requests during the OS installation using RIS?
A. TFTPD
B. BINLSVC
C. RIS service
D. DHCP
E. Active Directory
Answer: B
193. What should you use for installing multiple Windows 2000 servers with Dissimilar hardware?
A. SMS
B. Sysprep
C. Syspart
D. RIS
Answer: C
194. Which of the following sections in unattend.txt contains the ComputerName?
A. Unattended
B. UserData
C. Networking
D. Identification
E. Data
Answer: B
195. Your win2000 server computer contains four 16-gb hard disks. Disk 0 is configured as a basic disk. Disk 0 has a single 16-gb partition that contains the os files. Disk 1,2, and 3 are configured as dynamic disk in a raid-5 volume. The entire server is backed up to a tape drive each night. During your daily review of the server’s event logs, you discover that disk 1 has failed. You shut down the server and replace disk 1 with a new hard disk. When you restart the server win2000 starts normally but the data on the raid-5 volumn is inaccessible. Disk management indicates that disk 2 has failed also. You replace disk 2 with a new hard disk. Now you need to recover the data on the raid-5 volume as quickly as possible.
What should you do ?
A. use disk manager to rebuild raid-5 partition
B. delete and recreate the raid-5 partition.redtore the contents of raid-5 partition from the most recent tape back-up
C. use win2000 backup to restore the contents of disk2. Use disk manager to rebuild the raid-5 partition on disk 1
D. delete and recrate the raid-5 partition . setart the server by using win2000 setup cd, and select the repair option
Answer: B
196. A user named Kathy belongs to four global groups in Corp, a Windows 2000 domain that you manage. The global groups are GGApps, GGData, GGMgr and GGDB. The group GGApps is a member of the domain local group Apps. The group GGData is a member of the domain local group Data-Access. The group GGDB is a member of the domain local group DB-Access.
You create and share a folder on a member server of the domain. You allow the share permission Full Control for the group DB-Access, the share permission Read for the group Apps, and the share permission Change for the group Data-Access. Kathy uses a computer running Windows 2000 Professional that is a member of Corp.
What is the effective permission for Kathy when she connects to the shared folder from her computer?
A. Access is denied
B. Read
C. Change
D. Full Control
Answer: D
197. You create a stand-alone Distributed File System (Dfs) root on Srv1, a computer running Windows 2000 Server. You then add two links to the root. The links refer to shares on computers running Windows 2000 Server that are members of the same workgroup as Srv1. The servers hosting the links are named SrvA and SrvB. You want to replicate the content of the Dfs link on SrvA to SrvB.
What step or steps should you take?
A. You should create the link replica on SrvB and manually copy the contents of the share on SrvA to replica.
B. You should enable the File Replication Service on Srv1, SrvA, and SrvB
C. You should enable the File Replication Service on SrvA and SrvB
D. You should create a replica of the Dfs root on SrvB
Answer: A
198. You implement Internet Printing on a computer running Windows 2000 Server.
When a user attempts to connect to a printer using Internet Explorer 4.0, what protocol will the client computer use first?
A. Remote Procedure Call (RPC)
B. Server Message Block (SMB)
C. Internet Printing Protocol (IPP)
D. Hypertext Transport Protocol (HTTP)
Answer: A
199. You manage a computer running Windows 2000 Server and Exchange Server 5.5. You want to optimize the performance of the server.
Which setting should you enable for the File and Print Sharing for Microsoft Networks in the properties of the local area connection of the computer?
A. Maximize data throughput for network applications.
B. Minimize memory used.
C. Balance.
D. Maximize data throughput for file sharing.
Answer: A
200. You want a user to manage a computer running Windows 2000 Server on which Terminal Services are enabled in Remote Administration mode. The computer is a member of a Windows 2000 domain. You do not want this user to be a member of the Domain Admins group.
What should you do to enable the user to perform basic tasks using Terminal Services?
A. Add the user to the Server Operators group.
B. Use Terminal Services Configuration to modify the permissions of the RDP-TCP connection object.
C. Use Local Security Policy to assign rights for that computer to the user.
D. Use Terminal Services Configuration to modify the Permission Capability setting for the server.
Answer: B or C (please confirm it)
|
201. You enable Routing and Remote Access (RRAS) on a computer running Windows 2000 Server. You plan to use IP packet filters to manage the protocols available to remote access clients. What component of the Routing and Remote Access snap-in can you use to implement the IP packet filters?
A. The profile of a remote access policy.
B. The Properties dialog box of the remote access server.
C. The conditions of a remote access policy.
D. The Properties dialog box of the remote access ports.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
3/3 |
202. You enable Routing and Remote Access (RRAS) on six computers running Windows 2000 Server in your enterprise. These computers belong to a Windows 2000 domain. You also configure one computer running Windows 2000 Server as an Internet Authentication Service (IAS) server to centralize the authentication of remote access users for the domain. You plan to govern the use of remote access by implementing remote access policies.
How should you create these policies?
A. Use the Group Policy editor to create the policies in the default domain policy.
B. Use the Group Policy editor to create the policies in a Group Policy object linked to an organizational unit (OU) that contains the computer objects for the remote access and IAS servers.
C. Use the Routing and Remote Access snap-in to create policies on the IAS server.
D. Use the Routing and Remote Access snap-in to create policies on each remote access server.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
4/4 |
203. You enable RRAS on a computer running Windows 2000 Server. You want to configure a Virtual Private Network (VPN) using only Layer 2 Tunneling Protocol (L2TP), and disable the Point-to-Point Tunneling Protocol (PPTP).
What 3 steps should you take? (Choose three)
A. In the appropriate properties dialog box of the Ports node, set the Remote Access Connection (Inbound Only) check box for PPTP
B. In the properties dialog box of the Ports node, clear the Demand Dial Routing Connections (Inbound and Outbound) check box for PPTP
C. In the properties dialog box of the Ports node, set the Demand Dial Routing Connections (Inbound and Outbound) check box for PPTP
D. Set the number of PPTP ports to 1
E. In the properties dialog box of the Ports node, clear the Remote Access Connection (Inbound Only) check box for PPTP
F. Set the number of PPTP ports to 0
Answer(s) |
Rank (%) |
Rank (# votes) |
B,D,E |
71% |
5/7 |
B,D,F |
29% |
2/7 |
204. You are testing a custom application on a computer running Windows 2000 Server. The application (AppA) starts 4 child processes (Proc1, Proc2, Proc3 and Proc4). Proc2 starts 2 child processes (Proc2a and Proc2b). You also have 3 other applications running on the server. You notice that the processor queue has grown to 4, and you want to eliminate the custom application.
What steps should you take to eliminate the application as quickly as possible?
A. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, set the priority to AboveNormal
B. On the Processes tab in Task Manager, select each process of the application that has a child process (AppA and Proc2). From the context menu of AppA and Proc2, select End Process
C. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, select End Process
D. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, select End Process Tree
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
3/3 |
205. The X.25 link between your office and a branch office of your company is inaccessible. Both offices also have T1 lines to local Internet Service Providers (ISPs). You need to update configuration parameters for the default web site on a computer running Internet Information Services (IIS) at the branch office.
What parameter must you include in the Uniform Resource List (URL) in order to administer the site using your web browser?
A. The host header of the administration web site
B. The port number of the administration web site
C. The home page of the administration web site
D. Port 433
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
4/4 |
206. You create a new folder named CorpInfo on a computer running Windows 2000 Server. You share the folder. You assign the following share permissions to the folder:
"h CorpDataAdmin Full Control
"h CorpDataEntry Change
"h Joe Read
Joe belongs to the global group Support. Support is a member of the domain local groups CorpDataAdmin, CorpDataEntry and CorpUpdate.
What is Joe's effective permission to the shared folder CorpInfo?
A. Access is denied
B. Change
C. Full Control
D. Read
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
3/3 |
207. Your department has a custom application that your manager wants you to install on a computer running Terminal Services.
What steps should you take when you configure this application to run on the Terminal Services server?
A. Enable the RDP connection while you set up the application. After installing the application, run the command "change user / install", and edit the necessary settings in the User Interface of the application.
B. Enable the RDP connection while you set up the application. After installing the application, run the command "change user / execute", and edit the necessary settings in the User Interface of the application.
C. Disable the RDP connection while you set up the application. After installing the application, run the command "change user / install", and edit the necessary settings in the User Interface of the application.
D. Disable the RDP connection while you set up the application. After installing the application, run the command "change user / execute", and edit the necessary settings in the User Interface of the application.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
20% |
1/5 |
D |
80% |
4/5 |
208. You manage a Help Desk for your company. You decide to install Terminal Services on one of your company's computers running Windows 2000 Server (SrvRC) to allow your help desk personnel to assist users via remote control. The users and the help desk personnel work on computers running Windows 98. In addition to installing the Terminal Services client on the user's computers, what steps should you take to provide the remote control capability?
A. Install Terminal Services on SrvRC and configure it to use the Application Server mode. Have the Help Desk personnel manage client computers from the terminal server's console.
B. Install Terminal Services on SrvRC and configure it to use the Remote Administration mode. Install the Terminal Services client on the computers used by the Help Desk personnel.
C. Install Terminal Services on SrvRC and configure it to use the Application Server mode. Install the Terminal Services client on the computers used by the Help Desk personnel.
D. Install Terminal Services on SrvRC and configure it to use the Remote Administration mode. Have the Help Desk personnel manage client computers from the terminal server's console.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
17% |
1/6 |
B |
67% |
4/6 |
D |
17% |
1/6 |
209. Gerry has several types of computers with a variety of adapter cards on his Windows 2000 based network. The Windows-based computers are configured to use NWLink, and the non-Windows computers are configured to use IPX/SPX.
The drivers on each machine are compatible with the protocols in use on that machine, but one of the computers cannot connect to the network. You have checked the cabling and connectors on the computer, and they appear to be good.
What is the most likely cause of the problem?
A. IRQ conflicts
B. Protocol mismatch
C. Data speed mismatch
D. Frame type mismatch
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
4/4 |
210. Gary is creating a stripe set with parity using four physical disk drives on a computer running Windows 2000 Server. Each disk has free space available, and the least amount of free space on any disk is 250Mb.
What will be the data storage capacity of this stripe set with parity?
A. 250Mb
B. 750Mb
C. 500Mb
D. 1000Mb
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
11% |
1/9 |
B |
89% |
8/9 |
211. You have six physical disks, disks 0-5, attached to a computer running Windows 2000 Server.
Disk 0 contains drive C:, which has the Windows 2000 system files
Disk 1 contains Drive D:, which has the Windows 2000 boot files
Disks 2-5 comprise a stripe set with parity
For best performance, where should you place the page file?
A. Place the page file on Drive D
B. Place the page file on the stripe set with parity
C. Create a page file on both the stripe set with parity and on drive C
D. Place the page file on drive C
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
22% |
2/9 |
B |
67% |
6/9 |
A |
11% |
1/9 |
212. You create a stand-alone Dfs root on a computer running Windows 2000 Server. You want to attach links to the Dfs root.
What share-level permission must you have for each shared folder that you use to define a Dfs link?
A. Change
B. Full Control
C. Read
D. No permission is needed
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
4/4 |
213. You are the administrator of a Windows 2000 network. You have installed two shared printers for a print device on a Windows 2000 Server. Both printers are available to all users. They are shared as Admin and Executive. Admin is configured with a priority of 90, Executive is configured with a priority of 50. Now, you are advised to prevent the printer Executive to be visible to all users. Only members of the Executive group should be able to print to Executive.
What should you do?
A. Allow the Executive Group print permission only. Remove the sharename Executive and add the sharename Executive$. Reconnect all members of the Executive Group to the new sharename.
B. Install a second printer driver for the print device. Set NTFS permissions to the new driver files so that only the Executive Group is allowed to access the files.
C. Deny print permission to the Everyone Group.
D. Change the priority of Executive to 99, so that ...........
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
83% |
5/6 |
B |
17% |
1/6 |
214. You create a printer on a computer running Windows 2000 Server. A user reports that she has been trying to print to the network printer from an MS-DOS based application. She has been unsuccessful.
What should you do to solve this printing problem?
A. Run the application in MS-DOS Exclusive mode.
B. Increase the amount of memory given to this MS-DOS application.
C. Use the MS-DOS LPRINT command.
D. Map a physical port to the network printer at a command prompt
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
2/2 |
215. You enable Terminal Services in Application Server Mode on a computer running Windows 2000 Server. You install and configure three applications on the server. Five users who will run these applications using the Terminal Services client have print devices connected to USB ports on their computers. Those computers run Windows 98, and each user has local printers defined for the device connected to his or her computer.
What step should you take to allow the users to print to their local devices when running an application from the Terminal Services client?
A. Define a script to run when each user starts a Terminal Services session. Use the net use command in this script to redirect print output to the local port.
B. Log on interactively at the Terminal Services server. Run the Add Printer wizard to define a printer for each of the print devices.
C. Install the print drivers for the devices on the Terminal Services server.
D. Instruct each user to run the Add Printer wizard from a Terminal Services session to define a local printer.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
80% |
4/5 |
A |
20% |
1/5 |
216. You are looking for a new driver for an application server monitor hoping to improve its resolution. However, a warning is issued when you select a driver from the Microsoft list. What procedure should you follow when selecting a monitor driver?
A. Download the latest driver for your monitor from the Microsoft site to ensure compatibility with your hardware and other Plug and Play devices on your system.
B. Download a current driver from the manufacturer for the make and model of your monitor, and install it to avoid damage to the monitor.
C. Choose to manually select the driver from the Microsoft list to assure hardware compatibility with your operating system.
D. Let the Microsoft wizard find the proper Plug and Play driver so the settings will work with other devices on the system.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
25% |
2/8 |
C |
12% |
1/8 |
D |
50% |
4/8 |
A |
12% |
1/8 |
217. You manage a computer running Windows 2000 Server. You create a file in a folder on an NTFS partition of the computer. You configure the following NTFS permissions for the file:
"h Authenticated Users Read & Execute, Read
"h Accounting Full Control
"h Jack Deny Write
Accounting is a local group, Jack is a member of the group Accounting What is Jack's effective permission(s) for the file?
A. Cannot be determined - it depends on the parent folder permissions
B. Read and Execute, Read
C. No access
D. Full control
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
83% |
5/6 |
D |
17% |
1/6 |
218. You work on a computer running Windows NT Workstation 4.0 that is a member of a Windows 2000 domain running in mixed-mode. You want to manage the printers defined on a print server that is a member of the same domain. The print server is also configured as a Web Server and DHCP server. You need to have access to real-time information about the print devices managed by the print server.
What application can you install on your Windows NT workstation to manage the printers on the print server, as well as view the real-time print device information?
A. Adminpak.msi
B. Windows 2000 Device Manager
C. Internet Explorer 5.0
D. Directory Services Client
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
2/2 |
219. Your unattended setup is failing over a device that you provided a Windows 2000 compatible driver and .inf file for in the \$oem$\$1\Drivers subdirectory of the distribution folder. What did you overlook when you were preparing for the unattended installation?
A. The driver was not installed on the source computer using Sysdiff
B. The Cmdlines.txt file does not include a Rundll32.exe command
C. The [Unattended] section of the answer file must set the key OemPreinstall=Yes
D. The dosnet.inf file does not refer the incompatibility in the ServicesToDisable section
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
2/2 |
220. You have already created an unattended answer file using Setup Manager with 10 computers named. Before you begin the installations, you are asked if you can include three more computers. What will be required for you to include more computers in the unattended installation over the network?
A. Edit the unattend.txt file with Notepad
B. Edit the unattend.udf file with Notepad
C. Edit the winnt.sif file with Notepad
D. Edit the unattend.bat file with Notepad
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
17% |
1/6 |
B |
67% |
4/6 |
C |
17% |
1/6 |
221. You want to install Windows 2000 Server using NTFS on a new computer that currently has Windows 98 on a single 2Gb hard drive with a single partition. The partition is the size of the hard drive, and formatted as FAT32.
Which one of the following options for hard drive preparation is valid for this computer?
A. Install Windows 2000 over Windows 98, and run the Convert utility to create a second partition for NTFS. Use secedit commands to apply the default NTFS permissions to this converted file system.
B. Use the existing partition as the system partition for the Windows 2000 operating system, and create a second partition using the Disk Management Tool for NTFS after installation is complete.
C. Start the installation of Windows 2000 using the option to select the system partition during the installation. Run the Convert utility to create a second partition for NTFS, and apply the default NTFS permissions with secedit.
D. Repartition the hard drive, creating a partition size required for your Windows 2000 installation. Format it as NTFS, FAT32 or FAT16 during installation. Leave the remaining hard disk space to be formatted by the Disk Management Tool after installation.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
67% |
2/3 |
A |
33% |
1/3 |
222. You wish to audit the activity of the accounting department's share folder for file and subfolder deletion. The share folder is on a Windows 2000 server. What steps will you take to activate this security measure?
A. Enable auditing of the Directory Service Access event in Local Policies node of the Computer Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit.
B. Enable auditing of the Delete Subfolders and Files in the Security tab of the domain object's property sheet.
C. Enable Audit Object Access event in Local Policies node of the Computer Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit.
D. Enable auditing of the Delete Subfolders and Files in the property sheet of the share in Explorer.
Answer(s) |
Rank (%) |
Rank (# votes) |
C,D |
25% |
1/4 |
C |
75% |
3/4 |
223. You are the administrator of a Windows 2000 server computer named Intra. This server hosts an intranet web site for your company. The marketing department stores marketing files in a shared folder on a separate file server. The NTFS permissions on the folder are shown on this exhibit:
- Exhibit 1: Marketing users have full control
- Exhibit 2: Virtual Directory with Read, Log Visit, and Index this resource boxes checked and Write and Directory Browsing boxes unchecked
The marketing director wants to make the marketing files available to the rest of the company via internet. She wants company users to be able to read but no modify all the files. You create a new virtual directory named marketing under the intranet web site folder on Intra. You configure the virtual directory as shown some users report that they cannot access the marketing files from their web browsers. However, all users in the marketing department are able to access the files. You need to provide need acess to all company users.
What should you do?
A. Select directory browsing check box on virtual directory tab.
B. Copy files form their location on the file server to the Intra Marketing.
C. Modify NTFS permission on the file server to remove the entry for Marketing.
D. Modify NTFS permission on the file server to include an entry for Everyone: Read
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
33% |
1/3 |
D |
67% |
2/3 |
224. John, an employee in your company has used windows 2000 encrypting file system on his windows 2000 computer to encrypt a file that contains sensitive information. John's computer belongs to the domain that you administer. When john left the company Greg was hired for the position. You must enable greg to access the contents of the encrypted file.
Which of the following should you do?
A. Log on to john's computer by using the local administrator account and decrypt the file.
B. Back up the encrypted file restore the backup on your computer and decrypt the file.
C. Assign greg the take ownership permission for the file and let him take ownership.
D. Copy the encrypted file to a fat volume.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
33% |
3/9 |
C |
33% |
3/9 |
B |
33% |
3/9 |
225. Your network has over 200 Windows 2000 Server computers. They are all members of the same domain. You have made all of the members part of the Servers Organizational Unit (OU). You have configured each Windows 2000 Server computer to audit local security events. The servers are used for different purposes, thus you have configured different servers to audit different local security events. You would now like to institute a policy that makes all of the Windows 2000 Servers have identical local security auditing policies. You must also ensure that auditing remains standardized even if the audit policy changes.
How should you do this?
A. Configure a local auditing policy on each domain controller
B. Configure a local auditing policy on each computer
C. Configure a local group policy object on each server in the Servers OU
D. Configure a domain group policy object and apply it to the Servers OU
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
3/3 |
|
226. You have just recently installed Active Directory on your corporate LAN. You currently have a single domain environment with four domain controllers and have not transferred any of the operation master roles. One day another one of the administrators removes Active Directory from the first domain controller installed into the domain. You want to ensure that changes can still be made to objects within the database.
What must you do to ensure that operations continue normally?
A. Nothing, a domain controller will automatically be promoted to the role of Primary Domain Controller (PDC).
B. Nothing, the operations master roles will automatically be transferred to another domain controller.
C. Promote one of the functional domain controllers to the role of Primary Domain Controller (PDC).
D. Transfer the operations master roles of schema master and domain naming master to one of the functional domain controllers.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
14% |
2/14 |
A |
64% |
9/14 |
B |
21% |
3/14 |
227. Distributed File System (DFS) is a feature of Windows 2000 that gives administrators to ability to present a logical view of folders and files on the network without regard to their physical location. The first step in creating a DFS tree is to create the DFS root. After creating the DFS root, you then create nodes, known as "DFS links".
Which of the following statements regarding the creation of the DFS root and the DFS links are correct? (Choose all that apply.)
A. A domain-based DFS root can only be created on computers running Windows 2000.
B. A DFS root must be created on an NTFS partition.
C. A DFS root must be created on a dynamic disk.
D. DFS links can only be created on computers running Windows 2000.
E. DFS links must be created on NTFS partitions.
F. DFS links must be created on dynamic disk.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
56% |
5/9 |
B,C,D |
33% |
3/9 |
B,C,D,E |
11% |
1/9 |
228. As you migrate to Windows 2000 it is important to consider whether you wish to make resources available to your users through Active Directory. This will allow your users to query Active Directory and locate the resources based on various characteristics.
On your network you have a machine running Windows 2000 Server. This machine is a member of an Active Directory domain named acme.com. You decide to install a printer named HPLaser5 on the server. You also decide to share out a folder named AcctInfo.
Assuming the default settings, which of the following statements would be correct?
A. Both the printer and the shared folder will be published in Active Directory.
B. Only the printer will be published in Active Directory. You will have to manually publish the shared folder in Active Directory.
C. Only the shared folder will be published in Active Directory. You will have to manually publish the printer in Active Directory.
D. Neither the printer nor the shared folder will be published in Active Directory. You will have to manually publish both in Active Directory.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
3/3 |
229. As the person in charge of administration for the Marketing Department you have been given Full Control to a folder called Marketing which contains numerous subfolders and files that consist of data for the department. The Marketing folder is a subfolder of a parent folder named Departments. Other subfolders of Departments include Customer Service, Finance and Sales. The directory structure looks like this: http://www.2000tutor.com/images/folders.gif
You have configured the permissions properly for the Marketing department to only allow certain individuals the appropriate permissions. However, when you come into work one day you notice that the permissions have been changed to the Marketing folder and the subfolders and files contained within it. The administrator of the Finance department also complains that permissions have been changed to the Finance folder and its contents. You suspect that someone has modified the permissions to the Departments and that the permission assignments have propagated down to your folders.
What is the best way to prevent this from happening in the future?
A. Check the "No Override" box for the Departments folder.
B. Clear the "Allow inheritable permissions from parent to propagate to this object" check box for the Departments folder.
C. Check the "No Override" box for the Marketing folder.
D. Clear the "Allow inheritable permissions from parent to propagate to this object" check box for the Marketing folder.
E. Locate all user accounts that have the Change Permissions or Full Control permission allowed for the Departments folder and change the permission to "Deny".
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
43% |
6/14 |
D |
57% |
8/14 |
230. You have an accounting application that you want to be available to all people in the Accounting department. All of the members of the department occupy the fifth floor of your office. The computer accounts for all of the computers on that floor are located in an organizational unit (OU) called Accounting. However some of the user accounts for the members of the Accounting department are located in other OUs besides the Accounting OU such as the Accounting Manager who is located in the Managers OU.
You would like to have the accounting application available to all users in the department when they log in from a computer on the fifth floor.
What would be the best way to configure this?
A. Create a GPO and link it to the domain. Publish the application to computers within the domain. Filter the GPO to apply only to the computers in the Accounting OU.
B. Create a GPO and link it to the domain. Publish the application to users within the domain. Filter the GPO to apply only to the users in the Accounting OU.
C. Create a GPO and link it to the Accounting OU. Publish the application to computers within the OU.
D. Create a GPO and link it to the Accounting OU. Assign the application to computers within the OU.
E. Create a GPO and link it to the Accounting OU. Publish the application to users within the OU.
F. Create a GPO and link it to the Accounting OU. Assign the application to users within the OU.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
60% |
3/5 |
E |
40% |
2/5 |
231. Your Windows 2000 server is configured with four 30 GB hard drives (Disk 0, Disk 1, Disk 2 and Disk 3). All of the disks are dynamic disks. You have the operating system installed to a 5 GB partition on Disk 0. You currently do not have any other data stored on the disks.
You would like to provide fault tolerance for the operating system files in the event that the disk that the operating system is installed to fails. In addition, you will be storing data on the remainder of the disk subsystem. You would like to maximize performance but are not concerned about fault tolerance for this data.
Which of the following would provide the best solution?
A. Back up the boot and system partitions. Configure all four of the disks to be a RAID-5 volume. Restore the boot and system partitions to the RAID-5 volume.
B. Mirror the boot and system partitions to Disk 1. Configure a RAID-5 volume using the remaining 25 GB on Disk 0 and Disk 1 and 25 GB from Disk 2 and Disk 3.
C. Mirror the boot and system partitions to Disk 1. Configure a striped volume using the remaining 25 GB on Disk 0 and Disk 1 and 25 GB from Disk 2 and Disk 3.
D. Back up the boot and system partitions. Configure all four of the disks to be a striped volume. Restore the boot and system partitions to the striped volume.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
3/3 |
232. Your company's network consists of a single native-mode domain. Within the domain you have Organizational Units (OUs) for Sales, Marketing and Finance. Each of the OUs has a person that has responsibility for the OU and has been given full administrative control over it.
At the domain level you have configured a policy called Mandatory that contains certain desktop restrictions and security settings that you would like to have applied to all users in the domain regardless of which organizational unit they are located in. However you find that user objects located in the Sales OU are receiving different settings than those specified in the Mandatory policy. You suspect that a policy (named "SalesSettings") created by the administrator of the Sales OU is causing this problem.
What can you do to ensure that the settings in the Mandatory policy are received by all users in the domain?
A. Set the link for the Mandatory policy at the domain level to No Override.
B. Set the link for the SalesSettings policy at the OU level to No Override.
C. Set the domain to Block Policy Inheritance.
D. Set the Sales OU to Block Policy Inheritance.
E. Enable loopback processing mode for the Mandatory policy.
F. Enable loopback processing mode for the SalesSettings policy.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
2/2 |
233. Melissa is monitoring the behaviours of one of the servers on her company's network. She notices that disk space on the D: drive is getting low. In order to remedy this, she decides to extend the volume to add additional free space. However when she attempts to perform this action she is unsuccessful. The computer has the following configuration:
-Windows 2000 Server (upgraded from NT 4.0 Server)
-One Dynamic disk (converted from a basic disk)
-Two simple volumes (C: and D:) both formatted with the NTFS file system (converted from the FAT file system)
-C: drive is the active partition and the boot partition
-4 GB of unpartitioned free space on the disk
What is the most likely reason why Melissa is unable to extend the D: drive?
A. The volume that Melissa is attempting to extend was initially formatted with FAT file system. In order to extend a simple volume it must have been initially formatted with the NTFS file system.
B. The volume that Melissa is attempting to extend is located on a disk that was initially a basic disk. In order to extend a simple volume it must be located on a disk that was initially created as a dynamic disk.
C. The volume that Melissa is attempting to extend contains the operating system files. You cannot extend a simple volume that contains the operating system files.
D. The volume that Melissa is attempting to extend has already been extended before. You may extend a volume only one time.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
64% |
7/11 |
D |
9% |
1/11 |
C |
27% |
3/11 |
234. Your Windows 2000 Server computer has the following configuration:
-One physical hard disk configured as a basic disk-One partition (C:) formatted with the FAT file system
You would like to support disk quotas and the Encrypting File System (EFS) on your computer.
What must you do to allow this?
A. Convert the disk from a basic disk to a dynamic disk.
B. Convert the C: drive to the FAT32 file system.
C. Convert the C: drive to the NTFS file system.
D. Format the C: drive with the FAT32 file system.
E. Format the C: drive with the NTFS file system.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
5/5 |
235. Encrypting File System (EFS) provides an additional measure of security for confidential documents on your network.
Which of the following statements about EFS are true? (Choose all that apply.)
A. Users can share encrypted files.
B. Encrypted files can become decrypted if the user copies or moves the file to a FAT volume.
C. System files and compressed files can be encrypted.
D. Encrypting a folder or file does not protect against deletion. Anyone with delete permission can delete encrypted folders or files.
E. Only files and folders on NTFS volumes can be encrypted.
Answer(s) |
Rank (%) |
Rank (# votes) |
B,D,E |
100% |
5/5 |
236. You currently have two Terminal Servers in your company named TServer1 and TServer2. Both of the servers are running Terminal Services in application server mode. You would like to configure the Terminal Servers so that all Authenticated Users have access to TServer1 but only members of the Finance group have access to TServer2.
What could you do to allow only members of the Finance group to access TServer2 while still allowing other users to access TServer1?
A. From the Terminal Service Configuration utility, choose the connection for TServer2 and configure the permissions so that only the Finance group has the ability to access the server.
B. In the Terminal Services Profile tab in a user's properties, disable the option for "Allow logon to Terminal Services" for all users that are not members of the Finance group.
C. Enable Terminal Services in remote administration mode on TServer2.
D. Change the configuration for TServer2 so that all users other than members of the Finance group have only guest access.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
3/3 |
237. You are the Administrator of windows 2000 server computer. The computer is configured to have a single 18 GB drive which contains the operating systems (OS) files. This drive also contain a share folder where 5 network users store there MS excel files. You want to prevent each network user from using more than 1 GB of space in the shared folder.
Which action or actions should you take to achieve this goal? (Choose all that apply)
A. Create a quota entry for everyone account. Set the quota limit to 1 GB.
B. Enable disk quotas on the volume.
C. Set default quota limit to 1 GB.
D. Select the deny disk space to users exceeding quota limit check box.
E. Upgrade the disk to a dynamic disk.
Answer(s) |
Rank (%) |
Rank (# votes) |
B,C,D |
57% |
4/7 |
A,B,D |
43% |
3/7 |
238. You have an application server named App1. On this server you have many custom built programs. All of these programs are launched as a service on startup. You have one program that is called Finance. This application is critical to your Accounting department. You find that the Finance program is making App1 unstable due to errors in the program code. You want to have App1 run stable until the code errors are fixed. What should you do? (Not exactly word for word, but you get the idea. It was worded bad on the exam too)
A. Open Task Manager and run the Finance application as /BelowNormal
B. Open Task Manager and run the Finance application as /Low
C. Don't remember - It was wrong
D. Open Services and change the startup type from Automatic to Manual
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
57% |
4/7 |
B |
43% |
3/7 |
239. You are planning the installation of windows 2000 server on a new computer that has four 50-GB hard disk drives installed. You want windows 2000 setup to create a single partition on disk 0 of the largest possible size and to install the operating system on the partition. After windows 20000 has been installed you also want to configure the remaining three disks in such a way that the maximum amount of space on all four disks can be accessed from a single drive letter.
Which of the following methods should you use to achieve your objectives?
A. On disk0 create a 4 GB fat16 partition during setup. Use disk management to covert all four disks to dynamic disks and combine unallocated space on all four disks into a single spanned volume.
B. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to create a single 50 GB ntfs partition on each of the remaining disks and then mount each partition to a separate empty folder on disk 0.
C. On disk 0 create a 32 FB fat32 partition during setup. Use disk management to convert all four disks.
D. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to convert all four disks to dynamic disks and then extend the simple volume on disk 0 to include all of the remaining disks into a single striped volume.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
3/3 |
240. You are the administrator of a Windows 2000 workgroup at Awesome computer. Users currently do not have access to the internet.you want to all users to be able to access the Internet by using MEM3.
Which three are correct? (choose three)
A. Configure the appropriate DHCP scope options on MEM2
B. Anable ICS on MEM3
C. Install and configure Windows 2000DNS server on MEM2
Answer(s) |
Rank (%) |
Rank (# votes) |
A,B,C |
100% |
1/1 |
241. Your network contains two routed subnets: Subnet A and Subnet B. Subnet B contains a Windows 2000 server configured as a DHCP server. This server has scopes created for both Subnet A and Subnet B. Subnet A does not contain a DHCP server.
The clients on Subnet A are not receiving IP addresses from the DHCP server.
What can you do to enable clients in Subnet A to receive dynamically assigned IP addresses? (Choose all that apply)
A. Configure an RFC 1542-compliant router to forward BOOTP messaging between subnets.
B. Configure an RFC 1560-compliant router to pass all UDP traffic on ports 2151, 2152, 2153 and 2154.
C. Install and configure a DHCP server on Subnet A.
D. Configure the clients on Subnet A to use H-node NetBIOS name resolution.
E. Configure a DHCP relay agent on Subnet A to forward DHCP messages to Subnet B
F. Create a superscope on the DHCP server in Subnet B which contains both the scope for Subnet A and the scope for Subnet B.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,E |
67% |
8/12 |
A,C,E |
25% |
3/12 |
F |
8% |
1/12 |
242. You configure a local group called Accounting and create a mandatory profile for the group. The profile include a logo saved with 16 bit colour and 1024 x 768. Some pcs in Accounting have a standard VGA adapter while others have a SVGA adapter. 4 users say the bitmap is distorted and display the wrong colour depth. You want these users to view it correctly.
What to do?
A. Configure a roaming profile.
B. Configure a seperate profile for each user.
C. Change to 16 bit 640 x 840 and reconfigure.
D. Reinstall appropriate WDM compliant drivers for pcs that do not display the bitmap correctly
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
25% |
1/4 |
C |
75% |
3/4 |
243. A W2K server has 2 disks attached to an EIDE. You need additional space. You add a new scsi disk controller that has 6 new disks attached. the new controller is not included on the current HCL. When you restart you computer, W2K does not detect the new controller.
What do you do? (Choose 2)
A. Use device manager to turn of the IRQ steering in the properties of the standard pc
B. Use the disk manager to restore the basic configuration. Restart the pc.
C. Use the add/remove hardware wizard to add a new scsi and raid controller supplied by the manufacturer
D. Use disk management to rescan the disks
E. Use the manufacturer’s setup program to install the driver for the scsi disk controller
Answer(s) |
Rank (%) |
Rank (# votes) |
A,E |
17% |
1/6 |
C,E |
83% |
5/6 |
244. You have a new modem on a W2K server. When you restart the computer W2k detects the modem and installs the default drivers. Occasionally the modem stops communicating with your ISP and you have to restart. You download an updated driver for the modem and save it to your winnt folder.
What do you do next?
A. In the property sheet for the modem device you click on the UPDATE DRIVER command button
B. Use device manager to search for hardware changes
C. use device manager to delete the modem, the restart the pc
D. move new driver to the winnt\drivercache folder, restart your pc
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
7/7 |
245. You have a HP printer using JetDirect driver on your network, the user will print the package label with this Printer. It is configured to use HPCL. Later, your user complained about the slowness in printing the package labels.
what should you do then?
A. HPCL -> RAW
B. HPCL -> Postscript
C. Add another HP printer, blah, blah
D. Add another 3 HP printer, blah, blah
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
67% |
2/3 |
A |
33% |
1/3 |
246. Both of your domains are Active Directory domains that run in native mode.
How can you see a list that shows which users are allowed to use remote access to your network ??
A. Create a group named RAS_USERS. Add users who are permitted to dial in to the network. Create a remote access policy that allows this group to use the remote access server. Display the members of the group .
B. Create a group named RAS_USERS. Add users who are allowed to dial into the network. Set the remote access permissions for this group to allow access. To show who has access to the remote access server display the members of the group.
C. Write a script for the windows scripting host in the script through the members of the users container. Display the name of any user who has the remote access permission set to allow access.
D. Use the default remote access policy to users and groups who have been granted remote access permissions.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
25% |
1/4 |
A |
75% |
3/4 |
247. You are the administrator of a high security network. Many files stored on your Windows 2000 file servers and Windows 2000 Professional computers are highly confidential. You want to implement identical security configurations on all Windows 2000 file servers and Windows 2000 Professional computers.
What should you do? (Choose all that apply)
A. Configure Group Policies to apply the security configuration to all Windows 2000 file servers and Windows 2000 Professional computers.
B. Use the Security Configuration Management Console to import security information from a file server as a template.
C. Use the Security Configuration Management Console to import security information from a Windows 2000 Professional Computer as a template.
D. Use Secedit to export the security configuration to all file servers.
E. Use Secedit to export the security configuration to all Windows 2000 Professional computers.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,B,C |
33% |
1/3 |
A,D,E |
67% |
2/3 |
248. You are the administrator of 20 Windows 2000 Professional computers and 2 Windows 2000 Server computers for your domain. You want to set an account policy that locks any user account after 3 failed logon attempts. You also want to ensure that only administrators will be able to unlock the account.
What should you do? (Choose 2)
A. Set the account lockout duration to 0.
B. Set the account lockout duration to 3.
C. Set the account lockout threshold to 0.
D. Set the account lockout threshold to 3.
E. Set the reset account lockout after to 0.
F. Set the reset account lockout after 3.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,D |
100% |
6/6 |
249. You wish to setup a domain policy to have passwords expire in 30 days. You wish to setup a local computer policy to have passwords expire in 90 days. (Choose two)
A. Set Domain Policy for password expiration in 30 days.
B. Set Domain Policy for password expiration in 90 days.
C. Set OU for password expiration in 30 days.
D. Set OU for password expiration in 90 days.
E. Set Local Computer Policy for password expiration in 30 days.
F. Set Local Computer Policy for password expiration in 90 days.
Answer(s) |
Rank (%) |
Rank (# votes) |
B,E |
25% |
1/4 |
A,F |
75% |
3/4 |
250. Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only.
What should you do?
A. Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy.
B. Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy.
C. Set a Group Policy on all OUs containing computer accounts to enable the passwords must meet complexity requirements policy.
D. Set a Group Policy on all OUs containing user accounts to enable the passwords must meet complexity requirements policy.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
50% |
5/10 |
B |
40% |
4/10 |
C |
10% |
1/10 |
|
|
|
|
|
251. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed). An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
A. Set the CrashonAuditFail registry key to 0.
B. Set the Security Log to overwrite events as needed.
C. Delete the Liscense Trial registry key.
D. Increase the size of the security log.
E. Save the security log to a file, and clear it every morning.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
20% |
2/10 |
B |
50% |
5/10 |
D |
10% |
1/10 |
E |
20% |
2/10 |
252. You install a new application on a computer running Terminal Services in Application Server mode. Users of this application must have access to files stored on a computer running Netware 4.11. TCP/IP is not installed on the computer running Netware.
What steps should you take to enable Terminal Services clients to access the computer running NetWare?
A. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.2.
B. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3.
C. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.3.
D. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
4/4 |
253. You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all netowkr traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails.
What should you do?
A. Set the second adapters status to disable.
B. Configure the first adapter to use a TCP/IP metric of 100.
C. Configure the second adapter to use a TCP/IP metric of 25.
D. Configure the binding order on the second adapter to bind TCP/IP last.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
25% |
1/4 |
C |
75% |
3/4 |
254. You are a network administrator at Contoso, Ltd. You work at the main office in Seattle. The branch office in Denver is a call center. The network consists of a Windows 2000 domain only. The network is configured as shown in the exhibit. Denver is a Token Ring network. Seattle is an Ethernet network. None of you r network adapters at Contoso, Ltd. support promiscuous mode. The Router does not support multicast traffic. Wks1.contoso.com and mem1.contoso.com are available for use as network monitor clients. You want to be able to detect and identify rogue installations of network monitor on your network by using the fewest possible computers. What should you do? (check all that apply)
A. Install network monitor tools on wks1.contoso.com by using the Windows Components wizard.
B. Install the SNMP protocol on wks1.contoso.com by using the Windows Components wizard.
C. Install network monitor tools on mem1.contoso.com by using the Windows Components wizard.
D. Install the SNMP protocol on mem1.contoso.com by using the Windows Components wizard.
E. Install a network adapter on wks1.contoso.com that supports promiscuous mode.
F. Install a network adapter on mem1.contoso.com that supports promiscuous mode.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,C |
25% |
1/4 |
B |
25% |
1/4 |
C |
50% |
2/4 |
255. Your Windows 2000 server provides DNS for you network. You are not able to ping a Unix server called Unix1. You add a record to your server DNS for the Unix server, but you still are unable to ping the server. What should you do? (choose two)
A. Restart DNS on the Windows 2000 server.
B. Windows 2000 server does not support Unix server entries.
C. Run ipconfig /registerdns on the unix server.
D. Stop the DNS client service and restart it.
E. Run the ipconfig /flushdns command.
Answer(s) |
Rank (%) |
Rank (# votes) |
D,E |
58% |
7/12 |
C,E |
42% |
5/12 |
256. Your Windows 2000 Server computer contains four 16GB hard disks. Disk0 is configured as a basic disk. Disk0 has a single 16GB partition that contains the boot and system files. Disk 1, 2 and 3 are configured as dynamic disks in a RAID5 volume. The entire server is backed up to a tape drive each night. During your daily review of the servers event logs, you discover that Disk1 has failed. You shut down the server and replace Disk1 with a new hard disk. When you restart the server Windows 2000 starts normally, but the data on the RAID5 volume is inaccessible. Disk Management indicates that Disk2 has failed too. You replace Disk2 with a new hard disk. Now you need to recover the data on the RAID5 volume as quickly as possible. What should you do?
A. Use Disk Manager to rebuild RAID5 partition.
B. Delete and recreate the RAID5 partition. Restore the contents of RAID5 partition from the most recent tape backup.
C. Use Windows 2000 backup to restore the contents of Disk2. Use Disk Manager to rebuild the RAID5 partition on Disk1.
D. Delete and recreate the RAID5 partition. Restart the server by using Windows 2000 Setup CD, and select repair option.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
6/6 |
257. Your Windows 2000 Server computer has two SCSI hard disks. The hard disks are configured as SCSI ID 0 and SCSI ID 1 on a single SCSI host bus adapter. The hard disks are mirrored and each hard disk is formatted with a single NTFS partition. One of the hard disks has just failed. After replacing the failed hard disk with a new disk, what else should you do to recover from the hard disk failure?
A. Choose Establish Mirror in disk administrator
B. Choose Break Mirror in disk administrator and then choose regenerate in Disk Administrator
C. Choose Break mirror in disk administrator and then choose establish mirror in disk administrator
D. Wait for Windows NT to regenerate the mirror
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
6/6 |
258. Your company network includes a PentiumII, 450Mhz database server names Webdata1. Webdata1 supports a high-traffic e-commerce web site on a server names Webserver1. Users access the e-commerce website from their Internet browsers. Users report that when they attempt to complete a purchase, they must wait five minutes for confirmation that their order has been processed. You want to use Task Manager to help you decide whether an additional processor is needed. What should you do?
A. On the performance tab, select the option to monitor the system cache.
B. On the performance tab, select the option to monitor the available physical memory.
C. On the process tab, select the option to monitor the memory usage column, Monitor this column.
D. On the proces tab, configure the view to include the thread count column, Monitor this column.
E. On the proces tab, configure the view to include the page faults column, Monitor this column.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
2/2 |
259. How can you assign an application to one processor exclusively?
A. Right click on application executable, select properties and select assign processor.
B. Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor.
C. Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor.
D. Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
4/4 |
260. Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do?
A. Add the applications service accounts to the Domain Administrator Group.
B. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy.
C. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy.
D. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
33% |
2/6 |
D |
67% |
4/6 |
261. You are the network administrator at Humongous Insurance, a major insurance comapny that has 1,000 offices world wide. You are configuring the network so that only the sales staff can connect to it from home. Your Windows 2000 forest contains a member server named SV1 that has Routing and Remote Access for Windows 2000 enabled. You configure SV1 to use a modem bank to accepr incoming dial-up attempts. You configure SV1 to use Windows Authentication as the authentication Provider. The only supported authentic method is MS CHAP V2. You need to restrict access to SV1. What should you do?
A. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Client-Friendly-Name attribute of the default remote access policy.
B. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Windows-Group attribute of the default remote access policy.
C. Create a new remote access policy. Add the Everyone group to this policy by using the Windows-Group attribute in the properties of each sales staff user acounts. Control dial-in access through remote policy.
D. Create a Windows 2000 global group. Populate this global group with the sales staff user accounts. Provide access to the global group by using Windows-Group attributes of the default remote access policy.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
20% |
1/5 |
D |
60% |
3/5 |
C |
20% |
1/5 |
262. You have four different distribution shares on your network for Windows 2000 Server installations. A new service pack was just announced.
What should you do to make the service pack available for future installations?
A. Copy the service pack's driver.cab to the distribution "share", as well as layout.inf, dosnet.inf and txtsetup.sif
B. Use update /slip to apply the service pack to each "share".
C. Copy the layout.inf, dosnet.inf and txtsetup.sif files to each distribution "share".
D. Use sysdiff /diff to apply the service pack to each "share".
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
3/3 |
263. You have configured a Group Policy Object (GPO) for the marketing organization unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do?
A. Add the Managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy.
B. Add the Managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the Group Policy.
C. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Deny the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to deny the ability to run system Control Policy Panel. Give the original GPO a higher priority than the new GPO.
D. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Disable the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the original GPO a higher priority than the new GPO.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
5/5 |
264. Your network uses the TCP/IP protocol for its Windows 2000 prof and win2000 NT computers. You have one server that acts as both a Wins server, and a DNS server. All the client computers are configured to use this server for DNS and WINS. Users of Windows NT Workstation cannot connect to file server, but Windows 2000 professional users can. This server has a static address off 192.168.1.11. What should you do to allow the Windows NT Workstation computer to connect to the file server?A. Select the Enable NetBIOS over TCP/IP.
B. Add the WINS address used by the Windows NT Workstation computers.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
20% |
1/5 |
A |
60% |
3/5 |
A,B |
20% |
1/5 |
265. Your hard-drive configuration is as follows and one of your drives fails.
Controller label 1 Disk label
EIDE Controller 0 EIDE Disk 0 and Disk 1
Controller label 2 Disk label
SCSI Controller 1 SCSI Disk 0, 1, 2, 3, 4, 5, 6
The disk that fails is multi(1)disk(0)rdisk(1)partition(1). Place an "X" on the drive that has failed in the configuration below: ID Disk
A. EIDE 0 (disk 1)
B. EIDE 1 (disk 2)
C. SCSI 0 (disk 1)
D. SCSI 1 (disk 2)
E. SCSI 2 (disk 3)
F. SCSI 3 (disk 4)
G. SCSI 4 (disk 5)
H. SCSI 5 (disk 6)
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
60% |
9/15 |
A |
20% |
3/15 |
B |
20% |
3/15 |
266. You have two Windows 2000 servers, SRV1 and SRV2. SRV1 has a spanned volume over three physical disks. These disks support hot swapping. The drive letter that the spanned volume uses on SRV1 is not currently in use on SRV2. You want to move the three disks to SRV2, using the same drive letter as SRV1. You back up the spanned volume.
What should you do next? (choose two)
A. Move the disk from SRV1 to SRV2.
B. on SRV1 rescans the disks. On SRV2, rescan the disks
Answer(s) |
Rank (%) |
Rank (# votes) |
A,B |
100% |
5/5 |
267. Running system monitor locally and ensuring it has least impact on other processes, how do you measure the physical disk performance counters on your win2000 server computer?
A. From the command prompt run the start/low perform command
B. Use Task manager to set the priority off the MMC.EXE process to Low
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
12% |
1/8 |
B |
88% |
7/8 |
268. You are the administrator of a Windows 2000 Server computer named Server1. You create a Distribute file system (Dfs) root named Public. You add a shared folder named Docs as a Dfs node under the root. The share permissions and NTFS permissions for Public and Docs are shown in the following table.
Folder Share permissions NTFS permissions
-----------------------------------------------------------------------------------
Public Everyone: Read Everyone: Read
Domain Admins: Full Control
Docs Users: Read Training: Full Control
Domain Admins: Full Control Domain Admins: Full Control
A user named Maria is a member of the Users and Training user groups. When Maria attempts to save the file \\Server1\Public\Docs\memo.doc, she receives the following error message: "Access denied." You want Maria to be able to change and delete all files in the Docs folder. You do not want her to have more access than necessary. What should you do?
A. Add Maria to the Domain Admins group.
B. Add Maria to the local Administrators group.
C. Set the share permissions for the Public folder to grant Maria Full Control permission.
D. Set the share permissions for the Docs folder to grant Maria Change Permission.
E. Set the NTFS permissions for the Public folder and is sub objects to grant Maria Modify permission.
F. Set the NTFS permissions for the Docs folder and its sub objects to grant Maria Full Control permission.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
3/3 |
269. You back up all of the system state date for each domain controller and place the date on a single tape. That tape is currently attached to the Srv1.west.litware.com computer. To which server or servers can you restore the system state from srv1.west.litware.com(choose all apply)
A. srv1.west.litware.com
B. srv2.west.litware.com
C. srv3.west.litware.com
D. srv4.west.litware.com
E. srv5.west.litware.com
F. srv6.west.litware.com
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
73% |
8/11 |
A,B,C,D,E,F |
18% |
2/11 |
B |
9% |
1/11 |
270. You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network.
What should you do?
A. Enable the background refresh settings to use the default group policy refresh date.
B. Enable the asynchronous group policy application settings.
C. Enable and configure the group policy refresh interval for domain controller.
D. Enable and configure the group policy refresh interval for computers.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
7/7 |
271. You are the administrator of a routed Windows 2000 network. The network includes 25 Windows 2000 Server computers. You want to install a new Windows 2000 Server computer as the first computer on a new routed segment. You configure the existing DHCP server with a scope that is valid for the new routed segment. During the installation of the new Windows 2000 Server, you specify that the server should obtain its IP address from an existing DHCP server. After you complete the installation, you open My Network Places. You see the new server but no other computers. You run the ipconfig command and find that the new server's assigned IP address is 169.254.1.200, with a 16-bit subnet mask and no default gateway address. You want to resolve the problem so that you can see other computers on the routed network.
What can you do? (Choose two)
A. Configure all of the routers to route BOOTP broadcast frames.
B. Configure the default gateway to the TCP/IP properties of the new server.
C. Add the IP address for the default gateway to the TCP/IP properties of the new server.
D. Add a DHCP Relay Agent computer to the new routed segment.
E. Add a WINS server to the new routed segment.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,D |
72% |
13/18 |
B,C |
28% |
5/18 |
272. Trey Research has a Windows 2000 Server computer named User_srv. This computer has a RAID-5 controller. The RAID array is configured as two partitions. Drive C is a 2-GB partition that holds the operating system and paging file. Drive D is a 30-GB partition that will hold the home folders for 200 users. Trey Research employs 10 scientists. The user accounts for scientists are members of a group named Scientists. The scientists use a data capture application that generates files that can be lager than 100 MB. Trey Research wants to use disk quotas. Ordinary users should be allowed to store a maximum of 75 MB of data is their home folder. The storage for users in the Scientists group should not be limited by quotas.
What should you do to configure this disk quota scheme? (Choose two)
A. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit Check box. Set the default quota limit to 75 MB.
B. Create a Scientist template account. Create a new quota entry for this account. Select the Do not limit disk usage for this entry option button.
C. Create new quota entries for the 10 scientists' user accounts. Select the Do not limit disk usage for this entry option button.
D. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit check box. Select the Do not limit disk usage option button for the default quota limit.
E. Create a Scientist template account. Create a quota entry for this account. Set the quota limit to 30 GB.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,C |
100% |
9/9 |
273. A Windows 2000 Server computer named Server1 is a file server on your network. Server1 runs numerous 16-bit applications. One of the applications, named App1, stops responding, causing all of the other 16-bit applications to stop responding. You want to isolate App1 for monitoring and troubleshooting purpose.
What can you do? (Choose all that apply)
A. Create a batch file that starts App1 by running the start command with the /separate switch. Use this batch file to start App1.
B. Create a shortcut to App1, and select the Run in separate memory space option in the shortcut properties. Use this shortcut to start App1.
C. In the properties for File and Printer Sharing for Microsoft Networks, select the Maximize data throughput for file sharing option button.
D. In the properties for File and Printer Sharing for Microsoft Networks, select the Balance option button.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,B |
62% |
15/24 |
B |
8% |
2/24 |
A |
29% |
7/24 |
274. You configure your Windows 2000 Server as a print server. You install a second PnP Network adapter to improve the performance. The first adapter uses IRQ11, and the second adapter uses IRQ5. The server is now unable to print to print devices connected to a non-PnP LPT2 port adapter. You want to continue to use the print devices connected to your print server.
What should you do?
A. Use device manager to change the IRQ for LPT1 to IRQ10.
B. Use device manager to change the IRQ for LPT2 to IRQ7.
C. Edit the CMOS setting of the servers BIOS to reserve IRQ7 for non-PnP devices.
D. Edit the CMOS setting of the servers BIOS to reserve IRQ5 for non-PnP devices.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
10/10 |
275. After you install a new video adapter, one of the users at a remote location reports that Routing and Remote Access does not accept calls. After you resolve the Routing and Remote Access problem, you need to configure the server to prevent users from installing any unsigned device drivers.
What two actions should you take in the Driver Signing Option dialog box? (Choose two)
A. Set File Signature Verification to Ignore
B. Set File Signature Verification to Block
C. Set File Signature Verification to Warn
D. Select the Apply settings as system default check box
Answer(s) |
Rank (%) |
Rank (# votes) |
B,D |
100% |
9/9 |
|
|
276. Your company n/w includes Win3.x, win95 client computers and win2000 prof. client computers the company manufacturing facilities are 24 Hrs a day. The company has developed its own 32bits application that collects the information from the manufacturing process so that workers from one shift can find out what was manufactured in the previous shift. The company wants to make the application available to all the client computers using terminal services on the win 2000 server computer. This server is not configured as DC .You install the terminal services. The IT department needs to be control terminals services users session to support and troubleshoot the application.
What should you do to enable the IT department to control users session?
A. Configure the terminal server to run in remote administration mode
B. Grant the IT department full control to "RDP" on the terminal server
C. Add the members of the IT department to the power users group to the terminal servers
D. Use the third party software to enable the control of the users section
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
7/7 |
277. You are N/W administrator of a win2k server your n/w contain five win2k server computer and 100 win2k professional computers. You want to deploy an update for an application that is used to the win2k professional computer. You want the users to automatically install the update the driver when they logon the domain.
What should u do?
A. Create a DFS, place the application update and the root folder of the DFS
B. Create an Ms windows installer package for the application update and configure the RIS to use the package.
C. Create a MS windows installer package for the application update. Apply the package to the local computer policy on all the computers.
D. Create a MS windows installer package for the package update. Apply the package to the group policy
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
89% |
16/18 |
B |
11% |
2/18 |
278. You are administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of your company client computer are connected to this server. A shared folder named DATA on server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.
TYPE OF PERMISSION ACCOUNT PERMISSION:
DATA Share Permissions Users: Change
DATA NTFS Permissions Users: Full Control
You discover that users are connected to the DATA folder. You have an immediate need to prevent 10 of the files in the DATA folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.
What TWO actions should you take? (choose 2)
A. Modify the NTFS permissions for the ten files.
B. Modify the NTFS permissions for the DATA folder.
C. Modify the shared permissions for the DATA folder.
D. Log off the users from the network.
E. Disconnect all Users from the DATA folder.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,D |
4% |
1/24 |
A,C |
4% |
1/24 |
A,E |
92% |
22/24 |
279. You are the administrator of a local workgroup. The network consists of one Windows 2000 Server, several Windows 3.11 clients and several Windows 2000 Professional clients.
You install NetBEUI and TCP/IP on the server.
You install NetBEUI on the Windows 3.11 clients.
You install TCP/IP on the Windows 2000 Professional clients.
All clients are able to connect to the server, but you notice a delay on the Windows 2000 Professional computers before they connect to the server.
What should you do to improve performance and decrease this delay?
A. Install a DCHP server
B. Install a WINS server
C. Enable “NetBIOS over TCP/IP” on the Windows 2000 computers.
D. Install a DNS server
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
57% |
17/30 |
B |
40% |
12/30 |
A |
3% |
1/30 |
280. You are the administrator of a local workgroup. The network consists of one Windows 2000 Server, several Windows 3.11 clients and several Windows 2000 Professional clients.
You install NetBEUI and TCP/IP on the server.
You install NetBEUI on the Windows 3.11 clients.
You install TCP/IP on the Windows 2000 Professional clients.
The Windows 3.11 clients have no problem connection to the server.
The Windows 2000 Professional clients however, can’t connect to the server.
You start a command prompt on one of the Windows 2000 Professional clients and type IPConfig. The result is shown in the exhibit.
What should you do to make the Windows 2000 Professional clients to be able to connect to the Server?
Exhibit:
IP address: 169.254.134.12
Subnet mask: 255.255.0.0
A. Install a DCHP server
B. Install a WINS server
C. Enable “NetBIOS over TCP/IP” on the Windows 2000 computers.
D. Install a DNS server
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
3% |
1/33 |
A |
73% |
24/33 |
C |
21% |
7/33 |
D |
3% |
1/33 |
281. You are the administrator of a Windows 2000 Server computer. The server contains a RAID-5 array that is configured as a volume D and an 18-GB hard disk that is configured as volume C. Volume D is formatted as NTFS, contains 60GB of data, and has 2GB of free disk space. Volume C is formatted as FAT32 and has 16GB of free disk space.
The server is used to store user home folders. Most of the data in the home folders has been encrypted with the encrypted with the encrypted file system.
You estimate that the sever will need an additional 10-GB disk space to meet user needs. However, you will not be able to purchase additional hard disks for three months.
You want to immediately free at least 10-GB of the disk space. You do not want to compromise the security of the user’s files.
What should you do?
A. Instruct the users to move at least 10-GB of data to another file server that has EFS.
B. Create additional shared folders on volume C. Move 10-GB of data to the new, shared folders.
C. Copy at least 10-GB of data to a writeable CD-ROM. Delete these files from the server.
D. Enable the compression attribute for the volume, and compress the users’ home folders. Ensure that EFS remains enabled on the home folders
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
21% |
6/28 |
A |
79% |
22/28 |
282. You are the administrator of Windows 2000 Server computer. Volume D is formatted as NTFS. Volume D contains folders that are shared by departments within your company.
You want to limit the amount of disk space that the shared folders can store. a user named Richard has stored 10GB of files in the shared folders. Richard’s files are using more disk space on the shared folders than any other user’s files.
You enable disk quotas on Volume D and create a default quota entry. You set the quota limit to 1.1 BG and select the Deny disk space to users exceeding quota limit check box.
When Richard attempts to encrypt the files in his home folder be using the encrypted file system he receives the following error messages, ‘There is insufficient disk space to complete the operation’.
You need to allow Richard to encrypted the files in his home folder. You also need to maintain
Which three actions must you have? (Choose Three)
A. Create a quota entry for Richard, and select the Do not limit disk space check box.
B. Instruct Richard to encrypt the files in his home folder.
C. Run the Cipher.exe/d command
D. Enable the compression attribute on Richard’s home folder.
E. Set the Richard’s quota limit to equal the amount of disk space used by the files in his home directory.
F. Set the default quota entry on volume D to 12GB, and clear the Deny disk space too users exceeding quota limit check box.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,B,F |
7% |
1/14 |
A,B,E |
71% |
10/14 |
A,E,F |
21% |
3/14 |
283. You Windows 2000 Server computer contain four hard disks of different sizes. Each hard disk is configured as a basic disk and has a single 5-GB partition. All four disks have the amount of unpartitioned space shown in the following table:
Disk Unpartitioned Space
Disk 0 3-GB
Disk 1 4-GB
Disk 2 3-GB
Disk 3 8-GB
On each hard disk, you create a second partition that uses the remaining unpartitioned space on the disk. You create an 18-GB stripe volume that includes all four of the new partitions.
Six months later, disk 1 fails. You replace it with a new hard disk, and create the necessary partitions. As quickly as possible, you need to retrieve the data that was contained on disk 1.
What should you do?
A. Restore the first partition on disk 1 from the most recent tape backup. Use disk management to repair and rebuild the stripe volume.
B. Delete and re-create the stripe volume. Restore the contents of disk 1 from the most recent tape backup.
C. Restore both partitions on disk1 from the most recent tape backup.
D. Delete and re-create the stripe volume. Restore the first partition on disk 1 and then stripe volume from a recnt tape backup.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
19% |
4/21 |
D |
71% |
15/21 |
A |
5% |
1/21 |
C |
5% |
1/21 |
284. You have installed routing and remote access for Windows 2000 on a server named Srv004. Your internal DNS, WINS, and DHCP services are running properly in the environment. You want this server to provide internet access for users on that network segment by using network address translation over a demand dial interface to your internet service provider.
You have installed the NAT protocol and configured the correct public and private interfaces. All client computers have their default gateway set to the private address of Srv004, and can successfully ping the gateway . users can’t connect to internal network computers correctly, but network traffic does not reach the ISP.
You need to ensure that all users can access the internet. What should you do?
A. Configure the DNS as a forwarder to your ISP’s DNS.
B. Configure your ISP’s DNS as a secondary to your DNS.
C. Install the RIP version 2 protocol in routing and remote access for Windows 2000 on Srv004.
D. Add a static route of 0.0.0.0.0.0.0.0 in routing and remote access for Windows 2000 on Srv004.
E. Add a static route of 0.0.0.0.0.0.0.0 by using the route-p add command Srv004.
Answer(s) |
Rank (%) |
Rank (# votes) |
E |
4% |
1/24 |
D |
42% |
10/24 |
A |
54% |
13/24 |
285. You are a member of the domain backup operators group in a remote office for a large company. You are responsible for manufacturing the system state of a new Windows 2000 member server named members.
You installed recovery console onto the hard disk of member1. You have Windows 2000 backup to create a backup of the system state data. You store the backup files on the hard disk in a folder named systemstate.
A member in the domain admins group changes the name of member 1 to CR45uu in order to adhere to a new naming standard.
One of the applications on CR45uu no longer functions after the name change. You use the restore wizard to restore system state data. Then you restart the server but you cannot log on to the server afterward.
You need to be able to log on to the server. What should you do?A. Log on to the server by using the local administrator account.
B. Log on to the server by using a domain administrator account.
C. Use recovery console to restore the system state data.
D. Use recovery console to perform a full restore from a recent backup.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
15% |
2/13 |
A |
77% |
10/13 |
C |
8% |
1/13 |
286. You are the network administrator for your company. As part of your disaster recovery plan, you create an emergency repair disk for each computer on your network. you also perform full daily backups.
You install a custom application on a server named member1. you restart member 1 and receive the following error message “Invalid Boot.ini file”.
What should you do to restore the boot.ini file?
A. Reboot member 1 by using the Windows 2000 Server CD. Lunch recovery console. Run the fixboot command with the appropriate parameters.
B. Reboot member 1 by using the Windows 2000 Server CD. Launch recovery console. Run the fixmbr command with the appropriate parameters.
C. Restart member 1 into safe mode. Launch Windows 2000 backup.
D. Restart member 1 into safe mode. Run the Chkdsk command with the appropriate parameters.
E. Reboot member 1 try using the Windows 2000 Server CD. Launch recovery console. Run the copy command with the appropriate parameters
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
12% |
2/16 |
E |
88% |
14/16 |
287. You are installing Windows 2000 Server on a new computer. The manufacturer has provided a customized hardware abstraction layer (HAL) to use with the computer. The HAL is on the floppy disk.
You want to install the customized HAL design for the computer what should you do?
A. During the hardware confimation portion of the Windows 2000 setup install the customized HAL.
B. After installing Windows 2000 server,use the recovery console to copy the customized HAL to the system32 folder on the boot partition.
C. After the installing windows 2000 setup, use the emergency repair process to install the customized HAL.
D. After installing Windows 2000 server, use the device manager to scan for Hardware changes. When prompted, install the customized HAL.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
11/11 |
288. You have two SCSI controllers, and two SCSI hard disk drives. You have a fault tolerance that involves the boot and system partition. Second SCSI controller is not BIOS enabled. Which file would you need in order that you boot from the hard drive that is connected to the second SCSI controller ?
A. NTBoot.com
B. Scsiboot.com
C. NTBootdd.sys
D. NTBootdd.com
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
10/10 |
289. You have an 2000 Server that has two network interface cards that are installed on the same network segment. Both cards are bound to TCP/IP and NetBEUI. When you restart the server, you get an error message about having duplicate server names on the network. What should you do to fix this?
A. Unbind NetBEUI from one NIC
B. Unbind TCP/IP from one NIC
C. Create a MH entry in LMHOSTS
D. Create a static entry on the WINS server
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
6/6 |
290. When directly editing the registry with Regedt32.exe, what can be done to ensure that unwanted changes aren't made accidentally? Choose the best answer:
A. Nothing needs to be done. NT prompts for confirmation and displays warning messages when changes are unsafe.
B. Use Registry Editor rather than Regedt32.
C. Select read-only mode in the options menu.
D. Just don't make a mistake.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
14% |
4/28 |
C |
75% |
21/28 |
D |
11% |
3/28 |
291. You have an 2000 Server with 6 SCSI hard disks. One hard disk is a
system disk and the other five are in Stripe Set with Parity. After a power outage the server reboots and two of the hard disks in the Stripe Set with Parity are destroyed and you replace both the hard disks. What else would you do to recover from the hard disk failure?
A. Use disk administrator to regenerate the data on the new drives.
B. Recreate Stripe Set with parity across the five disks and restore from backup.
C. Copy the lost data from the tape backup to the new drives.
D. Start the Emergency Repair Process.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
78% |
18/23 |
A |
4% |
1/23 |
C |
17% |
4/23 |
292. Router problem, what should you use to identify it?
A. Network Monitor
B. NBTSTAT
C. PCONFIG
D. TRACERT
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
8% |
1/12 |
D |
92% |
11/12 |
293. You have 5 SCSI drives. You have created a ERD disk during installation. Now you have made some changes in the configuration of the SCSI drives. You want to save the changes for future use. What will you do?
A. Use RDISK.EXE to create a new ERD to take account of the new configuration change.
B. Use SCSI applet in Control Panel
C. Use NT Backup Program
D. Use Disk Administrator
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
36% |
10/28 |
C |
61% |
17/28 |
D |
4% |
1/28 |
294. How will you create a memory dump file to record the memory contents in case of Stop errors?
A. Use Startup/Shutdown tab in System applet of Control panel
B. Use Dr. Watson
C. Turn on auditing using User manager for Domains.
D. Edit the registry.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
8% |
1/12 |
A |
92% |
11/12 |
295. Your Windows 2000 Server is configured with 5 SCSI hard disks. The first hard disk contains the System and boot partitions. The other four drives are configured in a Stripe Set with Parity. The first hard drive fails after power outage. After replacing the hard drive what do you have to do to recover from the failure?
A. Reinstall the 2000 Server and restore registry from tape backup.
B. Reinstall the 2000 Server and restore the registry using ERD created during installation.
C. Reinstall the 2000 Server. Recreate the user and group accounts, and account policies.
D. Use Disk administrator to regenerate the data on the new drive.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
78% |
18/23 |
D |
13% |
3/23 |
C |
4% |
1/23 |
B |
4% |
1/23 |
296. Your Windows 2000 Server is configured with 6 SCSI hard disks. One hard disk is the System disk and the other five are configured as a Stripe Set. After a power outage one of the hard disk in the Stripe Set fails. How can you replace the hard drive and recover from the Power outage?
A. Use disk administrator to regenerate the data on the new drive.
B. Recreate with Stripe Set across the five disks and restore from backup.
C. Copy the lost data from the tape backup to the new drives.
D. Start the Emergency Repair Process.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
8/8 |
297. You have just installed a new SCSI controller driver in Windows NT, but now you cannot got the system to boot properly. No other change has been made to the computer. What is the easiest way to troubleshoot this problem so that the system can boot properly?
A. Boot Windows NT from the Emergency Repair Disk
B. Boot to DOS and run Dumpexam.exe from the command prompt
C. Invoke the Last Known Good configuration when prompted
D. Run the emergency repair process to restore the registry
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
83% |
10/12 |
A |
8% |
1/12 |
D |
8% |
1/12 |
298. You have a Windows 2000 Server with six SCSI disks. On one disk is the system partition, and the other five are in a stripe set. One disk failed and you replaced the disk. What must be done next in the disk administrator?
A. Choose regenerate in the fault tolerance menu
B. Choose make stripe set with parity and restore from backup
C. Choose make stripe set and restore from backup
D. Choose restart in the fault tolerance menu
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
7/7 |
299. You replaced one SCSI hard disk after a mirror set up failure. What else would you do?
A. Break mirror and "establish mirror " in Disk manager option.
B. Break mirror and "regenerate mirror " in Disk manager option.
C. Wait for NT to restart.
D. Add Mirror
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
90% |
9/10 |
B |
10% |
1/10 |
300. You have just replaced the video card on your Windows NTcomputer. When you restart Windows NT, the monitor displays flashing lines. What is the fastest way to resolve the problem?
A. Invoke the Last Known Good configuration when prompted
B. Reinstall Windows NT and specify the correct display adapter during setup
C. Boot from the setup disks and modify the Display.Ini file in the Winnt\System32 directory
D. Select the VGA Mode option from the startup menu to boot Windows NT, then choose the appropriate video card in Display properties
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
80% |
16/20 |
A |
20% |
4/20 |
|
|
301. Your are experiencing system errors on your Windows 2000 Server computer. Microsoft enterprise technical support has requested a dump of system memory to a file. You have configured a system paging file on your boot partition that is larger than the total amount of system RAM.
How should you configure the Windows 2000 Server computer to generate the required dump file?
A. Configure the eventlog service to start automatically
B. Configure Dr. Watson for Win NT to create a crash dump file
C. Configure system recovery to write an event to the system log
D. Configure system recovery to write debugging information to %system root%memory dump
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
9/9 |
302. A STOP error occurs every time you start your windows 2000 Server computer. You find that no dump file exists on the disk. What must you do to enable creation of a dump file?
A. Create a new pagefile.sys in system root.
B. Create a new pagefile.sys on the root of drive C.
C. Add /sos to the operating system path in boot.ini.
D. Add /crashdebug to the operating system in boot.ini.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
18% |
2/11 |
A |
82% |
9/11 |
303. You have used the option of making a system memory dump.
How do you extract information from the memory dump file?
A. Debug.exe
B. dumpchk.exe
C. windbg.exe
D. Dumpexam.exe
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
31% |
14/45 |
C |
2% |
1/45 |
A |
11% |
5/45 |
B |
56% |
25/45 |
304. What is an advantage of using a single master domain model over a single domain model?
A. centralized account administration
B. support for over 2,000 users
C. decentralized resource management
D. a central user account database
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
92% |
11/12 |
B |
8% |
1/12 |
305. The recommended Windows NT domain database size is 40 MB. Performance is likely to suffer if the domain database grows beyond this limit. Your company plans to have 50,000 user accounts, 40,000 computer accounts and 500 group accounts on the company-wide network. What is the minimum required number of domain databases?
A. Two
B. Three
C. Four
D. Five
E. One
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
50% |
11/22 |
E |
18% |
4/22 |
B |
32% |
7/22 |
306. In the multiple master domain model, there are at least two master domains. Which of the following best states the trust relationships required in a multiple master domain model?
A. Every master domain is connected to every resource domain with a two-way trust.
B. Every master domain is connected to all other master domains by two-way trusts, and every resource domain trusts all master domains with one-way trusts.
C. Every master domain trusts all resource domains with one-way trusts, and every resource domain is connected to all other resource domains by two-way trusts.
D. Every master domain is connected to all other master domains by two-way trusts, and every resource domain is connected to all other resource domains by two-way trusts.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
10/10 |
307. There are three domains in your company: Corp, Tech and Sales. The Corp domain is the master domain in a single master domain model. What is the easiest way to grant the right to back up any member server in any of the three domains to all users in all domains?
A. Modify the user rights of the Corp\Domain Users group in the Corp domain to include the right to back up files and directories.
B. Modify the user rights of the Corp\Domain Users group in all three domains to include the right to back up files and directories on each domain's PDC or BDC.
C. Add the Corp\Domain Users group to the Backup Operators group on every member server in all three domains.
D. Create a local group called BkupCorp, BkupTech or BkupSales on all member servers in the Corp, Tech and Sales domains respectively. Include the Domain Users group from each of the three domains into each of these local groups. On every member server in each domain, grant the user right to back up files and directories for each domain's respective local group.
E. Create two two-way trust relationships between the Corp domain and the other domains. Create a local group called BkupCorp, BkupTech or BkupSales on all member servers in the Corp, Tech and Sales domains respectively. Include the Domain Users group from each of the three domains into each of these local groups. On every member server in each domain, grant the user right to back up files and directories for each domain 'e respective local group.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
58% |
14/24 |
E |
21% |
5/24 |
B |
4% |
1/24 |
A |
17% |
4/24 |
308. A computer named Station01 belongs to a domain called Sales. Jason wants to add another Windows NT computer named Station02 to the Sales domain. Jason disconnects Station01 from the network, and renames Station02 to Station01. However, the computer cannot participate in domain administration of the Sales domain. What is the most likely cause of the problem?
A. The Sales domain already has the maximum number of computer connected accounts.
B. There is another computer named Station0l in a trusted domain.
C. There is another computer named Station0l in a trusting domain.
D. Simply renaming the computer does not make the computer join the Sales domain.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
20/20 |
309. You are installing a network that has four Windows 2000 Server computers and 60 Windows NT workstation computers. Users in your company's three departments require access to all of the resources on all of the servers. You must centralize user accounts and management administration. How should you configure your windows NT directory services?
A. As a single workgroup with one server handling all user login attempts
B. As a single domain with a PDC
C. As a single domain with complete trust relationships
D. As a Master domain with three resource domains
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
67% |
20/30 |
D |
33% |
10/30 |
310. A domain must contain two computers running 2000 Server - one configured as a primary domain controller and the other as a backup domain controller.
A. True
B. False
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
17/17 |
311. Your organization is using a single domain split between two cities: Nashville and Memphis. Communication between the cities is facilitated by a WAN link. The PDC of the domain resides in Nashville. Users in Memphis are complaining that their logon process is along. What action should you perform to speed up logon authentication for the Memphis office?
A. Increase the value of the Pulse setting in the registry on the PDC in Nashville
B. Increase the value of the PulseConcurrency setting in the registry on the PDC in Nashville
C. Increase the value of the PulseMaximum setting in the registry on the PDC in Nashville
D. Add an additional BDC to the network in Memphis
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
15/15 |
312. You are installing Windows 2000 Server 2000 on a machine. You want the machine to be able to provide file and print resources to members in a domain called Corp, but you do not want it to authenticate user logons. How would you configure the computer?
A. As the PDC in the Corp domain
B. As a BDC in the Corp domain
C. As a member server in the Corp domain
D. As a member server in a workgroup
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
6% |
1/18 |
C |
94% |
17/18 |
313. You have 3 domains: ACCT, SALES and RESEARCH. You have to manage the trusts between these domains. The requirements are the following: users on the ACCT domain needs access to resources on the ACCT domain, users on the ACCT domain need access to resources on the SALES and RESEARCH domain, users on the SALES and RESEARCH domain need access to each others resources What is the most efficient way to make the trust relationships:
A. Let ACCT trust SALES and RESEARCH, make a full trust between SALES and RESEARCH
B. Let SALES and RESEARCH trust ACCT, make a full trust between SALES and RESEARCH
C. Let ACCT be on it's own, make a full trust between the SALES and RESEARCH domain
D. Implement a full trust
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
92% |
12/13 |
D |
8% |
1/13 |
314. During regular business hours the PDC for your domain goes down and you promote one of your two backup domain controllers to the role of PDC. One of your users comes to you saying that some of the resources he has recently been given access to are now restricted to him. Why? Choose the best answer:
A. Backup domain controllers contain limited account information and therefore won't allow access to any resources not located on the local machine.
B. He must log off and log on again in order for his account to correct itself.
C. The accounts database from the PDC must be restored from backup to the BDC.
D. The changes that were made to this users account were not yet replicated when the PDC went down.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
100% |
20/20 |
315. University of 75,000 users located in multiple building in a campus. You want to have centralised control of all accounts. Also you want to allow each department to manage its own user access to information. Which directory service architecture will you use?
A. Single domain
B. Single master domain
C. Multiple master domain
D. Complete trust
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
41% |
22/54 |
A |
26% |
14/54 |
C |
33% |
18/54 |
316. Your company use a single Master domain model with 5 domains. Each domain is in a different city as shown on the following diagram. New York - Master domain with sub-domains in Chicago, Dallas, Houston and Boston. Each domain has a 56 kbps link to and from the master domain. Users often experience delays in login on from computers that are located in a resource domain because of congestion on the 56 kbps frame relay link.
What should you do to speed up the log on time for remote users?A. Add BDCs at the Master domain location.
B. Reduce the value of the replication governor registry entry on the BDCs
C. Place a BDC from the Master domain at each resource domain location.
D. Modify the setting so that each client computer logs on to the local domain. Synchronize the directory databases from the master domain to each local resource domain.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
52% |
11/21 |
D |
43% |
9/21 |
B |
5% |
1/21 |
317. Your company has two domains, CORP and EAST. CORP trusts EAST. Your user account exists in the CORP domain, and you log on to the CORP domain from a machine that is a member of the EAST domain. To what resources do you have access?
A. Resources in CORP for which CORP\Domain Users have been granted access
B. Resources in EAST for which EAST\Domain Users have been granted access
C. Resources in EAST for which EAST\Domain Guests have been granted access
D. Resources in EAST for which CORP\DOmain guests have been granted access
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
12/12 |
318. Your organization has 5 domains. Each domain user in your domain
organization has a single account that resides in his home domain. Password security is strictly enforced. The Sales domain in your organization trusts Corp domain. Mary, a domain user in Sales domain, logs on to the Corp domain. What folders will she be able to view?
A. All folders in the Corp domain for which the Corp/Domain users global group has been granted Read access.
B. All folders in the Corp domain for which the Sales/Domain users global group has been granted Read access.
C. All folders in the Corp domain for which the Corp/Domain guests global group has been granted Read access.
D. All folders in the Corp domain for which the Sales/Domain guests global group has been granted Read access.
E. All folders in either the Corp or the Sales domain for which the Sales/Domain guests global group granted Read access.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
6% |
1/16 |
B |
25% |
4/16 |
C |
69% |
11/16 |
319. You want to allow a user that logs on from NT workstation that is not a member of any domain to access resources on Servers in the Sales domain. How can you accomplish this? (Choose two.)
A. Enable the guest account in the Sales domain.
B. Create a duplicate user account in Sales domain for each NT workstation user account that requires access to resources in the Sales domain.
C. Make user accounts on the NT workstation computer members of the appropriate group in the Sales domain.
D. Create a duplicate group account for each group on the Windows NT workstation computer.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,B |
35% |
6/17 |
A,C |
6% |
1/17 |
B,C |
59% |
10/17 |
320. You are the administrator of a multiple domain Windows 2000 Server network. The domains are named Sales and Support. There is currently no trust relationship between the domains. You want to allow Mary, a user in the Sales domain to print to a laser jet shared printer connected to a Server in the Support domain. You create a group, assign rights as shown in the network configuration exhibit. What changes must you make in the printer permissions dialog box to make Mary to be able to print to the laser jet? (choose 2)A. Configure the Sales domain to trust the Support domain.
B. Configure the Support domain to trust the Sales domain.
C. Place the support/sup laser local group in the sales/laser jet global group.
D. Place the sales/laser jet global group in the support/sup laser local group.
Answer(s) |
Rank (%) |
Rank (# votes) |
B,D |
100% |
13/13 |
321. Susan is an administrator of a windows NT workstation computer. Susan wants her computer to join with the domain. She does not have a domain account. Which method can be used to join Susan computer to a domain. (Choose two.)
A. The domain administrator can add Susan's computer to the domain. Then Susan can join the domain by using the network option from the control panel in her computer
B. Susan can join the domain by using the server manager from her computer, supplying her workstation administrator account and password.
C. Susan can join the domain by using the network option in the control panel. From her computer, supply her workstation administrator account and password
D. The domain administrator can use network option in the control panel. From Susan's computer supply the domain administrator's account and password.
E. The domain administrator can use the network option in the control panel from the PDC.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,D |
100% |
14/14 |
322. Your windows 2000 Server and network consists of two domains. The Sales domain trusts the Corp domain. All user accounts are contained in the Corp domain only. You want to allow users to backup home directories that are on an NTFS partition on a member Server in the Sales domain. How can you do this?
A. Create a local group named all backup in Sales. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group.
B. Create a local group named all backup in Corp. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group
C. Create a global group named all backup in Corp. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group
D. Create a local group named all backup on a member server in Sales. Add the user account from Corp to all backup. On the member server add the all backup group to the backup operators group.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
83% |
15/18 |
A |
17% |
3/18 |
323. Your network consists of three domains . The Corp domain contains all user accounts. The East and West domain trust the Corp domain. All users use Windows NT workstation computers. You want to configure the network so that any user installing a new Windows NT workstation computer can join any domain without any configuration needed from an administrator. How should you do this?
A. Modify the user rights in all 3 domains so that the Corp/Domain users global group can add computers to any of the domains.
B. Modify the user rights in all 3 domains so that the Corp/Domain users local group in each domain can add computers in any of the domains.
C. Modify the user rights in the Corp domain so that the users local group can add computers to the CORP domain.
D. Modify the user rights in the Corp domain so that the domain users global group from each domain can add computers to the CORP domain.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
91% |
10/11 |
B |
9% |
1/11 |
324. Your network has three domains names Sales, Marketing and Admin. User accounts are divided up into the three domains. All users need access to specific files on a Windows 2000 Server computer in the Sales domain. How should you configure the trust relationships.
A. Establish two one-way trust relationships in which Marketing trusts Sales and Admin trusts Sales.
B. Establish two one-way trust relationships in which Marketing trusts Sales and Admin trusts Marketing.
C. Establish two one-way trust relationships in which Marketing trusts Admin and Sales trusts Admin.
D. Establish two one way trust relationship in which Sales trusts Marketing and Sales trust Admin.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
94% |
17/18 |
A |
6% |
1/18 |
325. You want to design a network with centralized account administration for 500 users. You want department administrators to have control of resources, but not of user accounts. Which directory services architecture should you use?
A. Single domain
B. Single Master domain
C. Multiple Master domain
D. Complete Trust
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
75% |
12/16 |
A |
25% |
4/16 |
|
|
326. Tracy logs onto Corporate domain from a Windows NT workstation computer in the Marketing domain. The Marketing domain trusts the Corporate domain. Which resources can she access?
A. Resources in the Marketing domain to which users in the marketing domain have access.
B. Resources in the Corporate domain to which users in the corporate domain have access.
C. Resources in the Corporate domain to which guests in the corporate domain have access.
D. Resources in the Corporate domain to which the marketing domain guest group have access.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
42% |
28/66 |
A |
36% |
24/66 |
C |
18% |
12/66 |
D |
3% |
2/66 |
327. A user named Michael needs access to files on a shared directory on a Windows 2000 Server computer in the Sales domain. Michael's computer is in the Finance domain and is a member of the Managers Global group. The Sales domain trusts the Finance domain. The guest account is disabled in both domains. What should you do to enable Michael and all of the members of the manager's group to access the files?
A. Create a global group named Sales Rep in the Sales domain with access permissions for the directory and its files. Make Michael a member of the sales Rep group.
B. Create a global group named Sales Rep in the Sales domain with access permissions for the directory and its files. Make managers a member of the sales Rep group
C. Create a local group names Sales Rep in the Sales domain with access permissions for the directory and its files. Make Michael a member of the sales Rep group.
D. Create a local group named Sales Rep in the Sales domain with access permissions for the directory and its files. Make managers a member of the sales Rep group.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
94% |
16/17 |
B |
6% |
1/17 |
328. Your Windows 2000 Server network has two single domains named Corp and Finance. The company president logs onto the Corp domain as Susan. The two vice-presidents and Susan are members of the Corp Managers global group in the Corp domain. Susan requires read permission for the salary directory in the Finance domain. The Account Managers local group in the Finance domain has change permission for the salary directory. No one else should have access to the salary directory. How should you plan you network to allow required access?
A. Configure the Finance domain to trust the Corp. domain. Make Susan a member of the Account Managers Group.
B. Configure the Corp. domain to trust the Finance domain. Create a local group named account read in the Finance domain and assign it read permission for the salary directory. Make Susan a member of the account read group.
C. Configure the Finance domain to trust the Corp. domain. Create a local group named execs in the Finance domain and assign it read permission for the salary directory. Make Susan a member of the exec group.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
100% |
9/9 |
329. Maria is a user in the Test domain. You want to provide her with access to and change permission for a shared directory on a Server in the Product domain. The guest account is disabled in both domains. How should you provide access for Maria?
A. Establish a trust relationship so that the Test domain trusts the Product domain. Create a local group in the Product domain that has change permission for the directory. Make Maria a member of this group.
B. Establish a trust relationship so that the Test domain trusts the Product domain. Create a global group in the Product domain that has change permission for the directory. Make Maria a member of this group
C. Establish a trust relationship so that the Product domain trusts the Test domain. Create a local group in the Product domain that has change permission for the directory. Make Maria a member of this group.
D. Establish a trust relationship so that the Product domain trusts the Test domain. Create a global group in the Product domain that has change permission for the directory. Make Maria a member of this group.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
92% |
12/13 |
D |
8% |
1/13 |
330. Your Windows 2000 Server computer has two domains, Marketing and Tech. The Marketing domain trusts the Tech domain. You move the Post script printer from the Marketing domain to the Tech domain. The marketing/post users local group requires access to the printer. You create a Tech/post users local group to access the printer. How should you set up the printer to allow the original marketing group/post users group to access the post script printer? (choose all which apply.)
A. Create a one way trust in which Tech trusts Marketing.
B. Create a one way trust in which Marketing trusts Tech.
C. Create a new Global group mktg/postuser and assign it to the Local Group Tech/postusers.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
11% |
1/9 |
A,C |
89% |
8/9 |
331. You log on from a computer in the MKTG single domain to one in the CORP domain. The MKTG domain trusts the Corp Domain. Which resources can you access?
A. in MKTG, MKTG/DOMUSERS access
B. in CORP, CORP/DOMUSERS access
C. in CORP, CORP/DOMGUESTS access
D. in CORP, MKTG/DOMGUESTS access
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
32% |
8/25 |
A |
8% |
2/25 |
B |
60% |
15/25 |
332. Your company is in a single location . You have six 2000 Servers and 200 users. Your company wants to centralize management and wants users to be able to access resources from other departments. Which of the following options is the best solution?
A. Create a single domain and install one Server as a PDC and another Server as a BDC. Then set-up the remaining servers as part of the domain.
B. Use the master domain model. In the master domain install one server as PDC and another server as a BDC. Put each department in its own resource domain and install their departme2000 Server as PDC
C. Create a single domain that has a PDC and a BDC, and install the departmental servers as member servers in their own Workgroup
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
82% |
9/11 |
C |
18% |
2/11 |
333. You want to configure a directory service architecture so that the administrator in each business unit can manage only the user account and resource permission for that unit. You do not want to allow administration of one business unit to have administrative rights in another business unit. You want to allow an administrator from one business unit to permit a user from a different business unit to have access to local resources. Which directory service should you choose?A. Single domain model
B. Single master domain model
C. Multiple master domain model
D. Complete trust domain model
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
47% |
15/32 |
A |
38% |
12/32 |
D |
16% |
5/32 |
334. You install Internet Information Services 5.0 on a computer running Windows 2000 Server. You create two new department web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales web site while a developer updates the contents of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive?
A. The user will be redirected to an alternate default page for the Sales site's home directory.
B. The user will be redirected to the Default Web site home page.
C. The user will receive a 403.2 - Read Access Forbidden error message.
D. The user will receive a 404 - File Not Found error message
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
62% |
29/47 |
D |
38% |
18/47 |
335. How can you recreate the PTR record in your Windows 2000 DNS server from you Windows 2000 client?
A. Run ipconfig /registerdns from the client.
B. Run ipconfig all /registerdns from the DNS server.
C. Start the DNS Dynamic service on your client computer.
D. Create a host file with the #DYNAMIC command on the client computer.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
100% |
7/7 |
336. You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office.
Why are you unable to make a connection to the remote location?
A. NAT does not allow for remote networking.
B. L2TP does not work with Windows 2000 computers.
C. You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted.
D. You have not configured the NAT server to translate the IP Security packets.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
94% |
17/18 |
B |
6% |
1/18 |
337. Your computer has a mirrored volume and you wish to now install the Recovery Console for future troubleshooting.
How do you do this?
A. Reinstall Windows, this can only be applied during the installation.
B. Break the mirror, run X:\i386\winnt32.exe /cmdcons Reestablish the mirror.
C. Run X:\i386\winnt32.exe /cmdcons.
D. Run the add and remove programs and add the recovery console.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
9/9 |
338. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. The network consists of Windows 2000 domain controllers, Windows 2000 file and print servers, and Windows 2000 Professional computers. What should you do?
A. Configure a Group policy for the Domain that blocks all unsigned drivers.
B. Configure a Group policy for the Default Domain Controller to block all unsigned drivers.
C. Configure the domain controllers, file and print servers, and client computers to Block unsigned drivers.
D. Do nothing, this is the default setting.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
37% |
20/54 |
A |
61% |
33/54 |
B |
2% |
1/54 |
339. You have 6 domain controllers srv1, srv2, srv3, srv4, srv5, srv6, in three main segments. You back up all System State data of your network. The tape device is attached to srv1.
To which server can you restore the System State data.
A. Any server.
B. Any server that is on the same segment of srv1.
C. Any server on a different segment than srv1.
D. Only to server srv1.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
24% |
9/37 |
D |
76% |
28/37 |
340. You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers.
What should you do?
A. Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive.
B. Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noisgen.
C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers.
D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
79% |
22/28 |
C |
21% |
6/28 |
341. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?
A. CHAP
B. MS-CHAP v2
C. PAP
D. SPAP
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
12/12 |
342. You configure several Group Policies to restrict user's desktop settings. You want them to be applied immediately.
What should you do?
A. Run secedit /refreshpolicy MACHINE_POLICY
B. Run secedit /refreshpolicy USER_POLICY
C. Run net config /refreshpolicy DOMAIN_POLICY
D. Run refresh /DOMAIN_POLICY
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
100% |
12/12 |
343. You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific Client-Server application to run on, because.the application gets very slow returning query data. You want to have the fastest possible access for the Client-Server App to the HDD’s.
Which Raid should you apply?
A. RAID0
B. RAID1
C. RAID5
D. RAID2
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
95% |
18/19 |
C |
5% |
1/19 |
344. Every afternoon you run MS-EXCEL locally on Windows 2000 Server computer to update the performance spread sheet. Users report that during this time the server response to the file request appears to be slowed down.
What should you do to resolve the problem?
A. Run the start/normal CSRSS command, before you start the EXCEL.
B. Run the start/normal EXCEL.EXE command to start excel.
C. Use task manager to set the priority for CSRSS.EXE process to above normal.
D. Use task manager to set the priority for EXCEL.EXE process to low. ****
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
4% |
1/24 |
D |
96% |
23/24 |
345. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible.
What should you do?
A. Restart the computer by using the last known configuration option.
B. Perform an emergency repair and select fast repair, restart the computer.
C. Restart the computer in the safe mode, remove the driver and restart the computer.
D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
52% |
37/71 |
A |
24% |
17/71 |
C |
24% |
17/71 |
346. You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible.
What should you do?
A. Extend the span volume to include the new disk, rescan the disk.
B. Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data.
C. Re scan the disk, format the span volume. Use windows back up to restore the data.
D. Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data.
E. Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data. ****
Answer(s) |
Rank (%) |
Rank (# votes) |
E |
100% |
20/20 |
347. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware.
What should you do?
A. Convert the disk to dynamic disk shut down and restart the server.
B. Backup the data on the stripe volume and delete the stripe volume. Create a raid5 volume on the four disks, restore the data to the new raid5 volume.
C. Backup the data on the stripe volume and delete the stripe volume. Create to mirror volume, shut down and restart the server. Restore the data to new mirror volumes.
D. Backup the data on the stripe volume and delete the stripe volume. Create a span volume for the first two disks, create a second span volume for the last two disk. Mount the root of the second span volume in the root of the first span volume. Restore the data to the first span volume.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
4% |
1/25 |
B |
96% |
24/25 |
348. The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The PPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed.
What should you do?
A. Configure a client computer to use only TCP/IP for the connections to the remote access server.
B. Configure the client computer to use a defined IPX network address for the connection to the remote access servers.
C. Configure the remote access server to allow IPX based remote access demand dial connections.
D. Configure the remote access server to disable multi-link connection.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
91% |
39/43 |
B |
2% |
1/43 |
C |
5% |
2/43 |
D |
2% |
1/43 |
349. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer.
What should you do?
A. During the text mode portion of the Windows 2000 setup install the customized HAL.
B. After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition.
C. After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup.
D. After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
6% |
2/31 |
A |
94% |
29/31 |
350. Your network includes windows 98 computers and Windows 2000 Professional computers. You are adding a new computer to the network. You plan to install Windows 2000 Server computer on the new computer. The computer has one 20 GB hard disk with no partition defined. The Windows 2000 Server computer CD ROM is unavailable. You want to install windows 2000 server from the source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition.
What should you do?
A. On another windows 2000 computer use makebt32.exe to create installation startup disks. Start the computer by using the first disk.
B. On another Windows 2000 computer format a floppy disk. Copy NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by using the disk.
C. Start the new computer by using the Windows 98 network boot disk. Connect to the server. Run dsclient.exe. Create and format 20GB FAT32 partition.
D. Start the new computer by using the Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to network server. Run winnt.exe.
E. Start the computer by using Windows 98 network boot disk. Create and format a single Fat 32 partition. Start the new computer by using the Windows 2000 emergency repair disk.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
84% |
37/44 |
B |
11% |
5/44 |
A |
2% |
1/44 |
E |
2% |
1/44 |
|
|
351. You are the administrator of Windows 2000 Server network . On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation.
What should you do?
A. Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume.
B. Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume.
C. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command.
D. Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
92% |
37/40 |
B |
5% |
2/40 |
C |
2% |
1/40 |
352. The company has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each employee has a network between 5-20 client computers. The office networks are not connected to any other networks. The company is buying 50 identical computers to run Windows 2000 server in these offices. These servers must be installed to company’s standard configuration. You create a setup information file (SIF) that specifies the company’s data configuration. You want to automate the installation process as much as possible in the least possible amount of time.
What should you do?
A. Use the makebt32.exe to create 4 installation setup disks and add the SIF to the first disk. Instruct an employee at each office to start the installation by using these.
B. Create MS-DOS boot disk that contain CD ROM driver and the SIF and that runs WinNT /S:D:\I386 command. Instruct an employee at each office to start the installation by using this disk.
C. Create a floppy disk that contains only SIF. Instruct an employee at each office to start the installation by using the Windows 2000 server CD-ROM with the floppy disk inserted after startup.
D. Create a Windows 2000 folder on the hard disk, copy the Windows 2000 Server CD-ROM to the folder, add the SIF to the folder. Copy the folder to the writable CD. Instruct an employee at each office to start the installation by using this CD.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
10% |
3/29 |
A |
3% |
1/29 |
D |
3% |
1/29 |
C |
83% |
24/29 |
353. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1.
What should you do?
A. Apply a less restrictive custom security template to DC1.
B. Apply a less restrictive custom policy to Windows NT domain controller.
C. Ensure the Windows 2000 domain is configured in the mixed mode
D. Ensure the Windows 2000 domain is configured to run in the native mode.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
89% |
31/35 |
C |
11% |
4/35 |
354. You are the administrator of a Windows 2000 active directory network. The network consists of a single domain. The domain contains 20 Windows NT 4.0 client computers. All other client computers are Windows 2000 Professional client computers. You create an NT 4.0 default user policy on Windows 2000 Server computer that is configured as PDC emulator. The default policy denies access to the network neighborhood. You then install terminal services on one of the servers and terminal services client on two thousand Windows NT server client computers. You find that users of the terminal server can still browse the network when they open my network places. You want to prevent all default users from browsing the network.
What should you do?
A. Modify the Windows NT policy template file so that you can restrict access to both the my network places and network neighborhood. Save the policy file on the terminal server.
B. Copy the NT file to 20 Windows NT workstation computers.
C. Create a windows 2000 group policy that denies access to my network places.
D. Edit the local registry on Windows NT workstation computers to deny access to entire network in the entire neighborhood.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
14% |
4/28 |
C |
86% |
24/28 |
355. You are the administrator of an Internet Bluesky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines.com as an intranet server. The server hosts the multiple departmental and resource WEB links to the network and databases. You configure a ticketing WEB site. You also configure a finance virtual directory in the department’s WEB site as shown in the Exhibit. "We see an exhibit (image) in which we see the dir browsing enabling and person can see all the three". During the first morning the new server is available and the user reports that the only information they are seeing in their browser is a list of HTM and ASP files. For security reasons what the first action you need to take to disable the user ability to all the WEB sites in the form of a list.
What should you do?
A. Apply the settings to each child WEB sites.
B. Clear the directory browsing settings for the ticketing WEB sites and then apply the settings to child virtual directories.
C. Clear the directory browsing checkbox for the department’s WEB sites Properties and then apply the settings to the child virtual directory.
D. Clear the directory browsing checkbox for the financing virtual directory.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
71% |
24/34 |
A |
18% |
6/34 |
B |
12% |
4/34 |
356. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?
A. Convert both to dynamic disks.
B. Create an empty extended partition on new disk
C. Create a single unformatted primary partition on new array.
D. Format new disk array as a single NTFS primary partition.
E. Format the new disk array as a single NTFS logical drive in an extended partition.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
3% |
1/30 |
C |
13% |
4/30 |
B |
3% |
1/30 |
A |
80% |
24/30 |
357. You are the administrator of a Windows 2000 Server network. You configure two sites: one for your New York office and one for your Paris office. You configure two organization units (OUs) named New York and Paris. In each of these OUs, you create subordinate OUs named Sales, Marketing, and Research. You place user accounts, stand-alone member servers, and Windows 2000 Professional computers in their appropriate subordinate OUs. You suspect that someone is trying to log on to your domain by guessing user account names and passwords. You want to fine out which computers are being used for these logon attempts.
What should you do?
A. Edit the Default Domain Controllers Policy object to audit directory services access failures.
B. Edit the Default Domain Policy object to audit account logon failures.
C. Edit the New York OU and Paris OU Group Policy objects (GPOs) to audit logon failures.
D. Edit the Group Policy object (GPO) of each subordinate OU to audit directory service access failures.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
10% |
3/29 |
B |
86% |
25/29 |
C |
3% |
1/29 |
358. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open."
What should Amy do to allow this document to be saved?
(Choose all that apply.)
A. Compress the files in her home folder to save disk space.
B. Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level.
C. Move some of the files from her home folder to the IN_PROGRESS shared folder.
D. Remove files from her home folder until the total uncompressed file size is less than 100 MB.
Answer(s) |
Rank (%) |
Rank (# votes) |
A,B,C,D |
1% |
1/71 |
A,B,C |
3% |
2/71 |
D |
83% |
59/71 |
C,D |
8% |
6/71 |
A,C,D |
3% |
2/71 |
B,D |
1% |
1/71 |
359. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy.
What should you do next?
A. Replace Disk 1 and restart the computer. The mirror will automatically regenerate.
B. Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1.
C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer.
D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
94% |
31/33 |
D |
6% |
2/33 |
360. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume.
What should you do first?
A. Replace the third disk and restart the server. Use disk Management to repair the volume.
B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk.
C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
3% |
1/33 |
C |
3% |
1/33 |
B |
94% |
31/33 |
361. You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files.
How should you configure the three disks?
A. Convert all three disks to dynamic disks. Create a striped volume.
B. Convert all three disks to dynamic disks. Create a RAID-5 volume.
C. Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1.
D. Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
88% |
28/32 |
C |
6% |
2/32 |
B |
6% |
2/32 |
362. Your company has a main office and 50 branch offices. The main office has a private network with 1,000 computers. Each branch office has a private network with between 10 and 20 computers and a 56-Kbps connection to the Internet. The company plans to use the Network Address Translation (NAT) feature of Routing and Remote Access to provide each office with access to the Internet. When you test this configuration, you discover that connections cannot be made to sites by using fully qualified domain names. However, connections can be made to these sites by using their IP addresses. You want to be able to make connections by using fully qualified domain names.
What should you do?
A. Configure the computers on each of the branch office networks with the address of a WINS server.
B. Configure the computers on each of the branch office networks with the address of a DNS server on the Internet.
C. Configure a filter on the NAT servers to pass DNS packets.
D. Create a host file on each of the NAT servers.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
2% |
1/58 |
B |
67% |
39/58 |
D |
3% |
2/58 |
C |
28% |
16/58 |
363. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers.
Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server.
What should you do?
A. Grant the users the right to log on as a service.
B. Grant the users the right to log on locally.
C. Grant the users the right to log on over the network.
D. Copy the users' profiles to the Terminal server.
E. Copy the users' home folders to the Terminal server.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
90% |
26/29 |
C |
10% |
3/29 |
364. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails.
How should you configure the DNS servers?
A. Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone.
B. Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone.
C. Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone.
D. Configure at least two servers with Active Directory integrated primary zones for the domain.
E. Configure at least two servers with standard primary zones for the domain.
Answer(s) |
Rank (%) |
Rank (# votes) |
E |
2% |
1/43 |
D |
79% |
34/43 |
A |
9% |
4/43 |
C |
9% |
4/43 |
365. Your company's network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out that was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Services. The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application.
What should you do to enable the IP department to control users' sessions?
A. Configure the Terminal server to run in Remote Administration mode.
B. Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server.
C. Add the members of the IT department to the Power Users group on the Terminal server.
D. Use third-party software to enable remote control of users' sessions.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
85% |
28/33 |
A |
12% |
4/33 |
C |
3% |
1/33 |
366. You install the Routing and Remote Access service on a Windows 2000 Server computer in your network. Your network is not directly connected to the Internet and uses the private IP address range 192.168.0.0. When you use Routing and Remote Access to dial in to the server, your computer connects successfully, but you are unable to access any resources. When you try to ping servers by using their IP addresses, you receive the following message: "Request timed out." When you run the ipconfig command, it shows that your dial-up connection has been given the IP address 169.254.75.182.
What should you do to resolve the problem?
A. Configure the remote access server with the address of a DHCP server.
B. Authorize the remote access server to receive multiple addresses from a DHCP server.
C. Configure the remote access server to act as a DHCP Relay Agent.
D. Ensure that the remote access server is able to connect to a DHCP server that has a scope for its subnet.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
9% |
3/35 |
D |
77% |
27/35 |
C |
14% |
5/35 |
367. Your company has a senior manager named Paul West. Paul uses computers in two different offices. Paul's home folder is stored on a server named UserServer. Paul works with many files that are highly confidential. Paul keeps these files in a folder named Confidential in his home folder. You need to maximize the security of the Confidential folder. You also want Paul to be able to access the folder from computers in each office.
What should you do?
A. Obtain a signing and sealing certificate from a certificate server for Paul's account, and install the certificate on the computers that Paul uses.
B. Log on at UserServer as the administrator, connect to Paul's home folder, and set the encryption attribute.
C. Configure Paul's account to have a roaming user profile, and instruct Paul to use folder properties to set the encryption attribute for his folders.
D. Add the cipher /e /s . command to Paul's logon script.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
7% |
3/43 |
C |
88% |
38/43 |
B |
5% |
2/43 |
368. You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.
What should you do?
A. Configure an ADM template and add the template to the GPO.
B. Configure an INF policy and add the policy to the GPO.
C. Configure a Microsoft Windows Installer package and add the package to the GPO.
D. Configure RIS to include the registry entry.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
72% |
50/69 |
B |
28% |
19/69 |
369. You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full backups of each domain controller. You run a script to make changes to account information in Active Directory. As a result of errors in the script, the incorrect user accounts are modified. Active Directory replication then replicates the changes to the other two domain controllers. You want to revert Active Directory to the version that was backed up the previous day. What should you do?
A. On a single domain controller, use Windows Backup to restore the System State data. Shut down and restart the computer.
B. Shut down and restart a single domain controller in directory services restore mode. Use Windows Backup to restore the System State data. Run the Ntdsutil utility. Restart the computer.
C. Shut down and restart a single domain controller by using the Recovery Console. Use Windows Backup to restore the System State data. Exit the Recovery Console. Restart the computer.
D. Shut down and restart each domain controller by using the Recovery Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery Console. Restart the computer.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
88% |
38/43 |
C |
5% |
2/43 |
A |
7% |
3/43 |
370. You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with a single NTFS partition. You use a third-party tool to add a new partition to the disk. When you restart the server, you received the following error message: "Windows 2000 could not start because the following file is missing or corrupt: \system32\ntoskrnl.exe. Please re-install a copy of the above file."
What should you do to resolve the problem?
A. Start the computer by using the Recovery Console. Run System File Checker.
B. Start the computer by using the Recovery Console. Modify the Partition parameter in the operating system path in C:\Boot.ini
C. Start the emergency repair process. Choose the option to repair system files.
D. Start the computer in safe mode with command prompt. Modify the Partition parameter in the operating system path in C:\boot.ini.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
55% |
56/102 |
D |
5% |
5/102 |
C |
40% |
41/102 |
371. You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears.
You want to return the computer to its previous configuration. What should you do?
A. Restart the computer in safe mode. Then restart the computer again.
B. Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command.
C. Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command.
D. Restart the computer by using the last known good configuration.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
10% |
5/52 |
D |
88% |
46/52 |
A |
2% |
1/52 |
372. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application.
What should you do before you restart the application?
A. End the task named Application.
B. End the Application.exe process.
C. End the Application.exe process tree.
D. End both the Explorer.exe process and the Application.exe process.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
3% |
1/37 |
C |
89% |
33/37 |
D |
8% |
3/37 |
373. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days. the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent. You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running.
You want to return the CPU usage to its normal range. What should you do?
A. Use Computer Management to stop and restart the Server service.
B. Use Computer Management to stop and restart the Workstation service.
C. Use Task Manager to end any related child processes.
D. Use Task Manager to end and automatically restart the Explorer.exe process.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
94% |
31/33 |
A |
3% |
1/33 |
B |
3% |
1/33 |
374. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers.
You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain.
What should you do?
A. Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package.
B. Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy.
C. Create a Microsoft Windows Installer package for the service pack. Configure the package in the Local Computer Policy.
D. Place the service pack in a Distributed file system (Dfs).
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
6% |
3/53 |
B |
91% |
48/53 |
A |
4% |
2/53 |
375. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain.
What should you do?
A. On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server.
B. On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers.
C. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows 2000 domain as the existing Windows NT domain.
D. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart the Windows NT PDC on the network and demote it to a BDC.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
96% |
50/52 |
B |
4% |
2/52 |
|
|
376. You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?
A. Enable Anonymous access for the intranet server.
B. Enable Anonymous access for the Sales virtual directory.
C. Remove Nate from the Intern group.
D. Make Nate a member of the Security group.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
97% |
37/38 |
C |
3% |
1/38 |
377. You are the administrator of a Windows 2000 Server network at Blue Sky Airlines. You configure a server named print10.marketing.blueskyairlines.local as a print server at the Los Angeles site. You create and share a variety of printers on the server for use by employees in the marketing.blueskyairlines.local domain. You want to review the configured properties of all of the shared printers on the print10.marketing.blueskyairlines.local server. You want to perform this review from a Windows 2000 Professional computer at the London site of Blue Sky Airlines.
What should you do?
A. Use your Web browser to connect to http://print10.marketing.blueskyairlines.local/printers.
B. Use your Web browser to connect to http://print10.blueskyairlines.local/printer.
C. Run the net view \\print10 command.
D. Run the net view \\print10.blueskyairlines.com command.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
96% |
73/76 |
C |
1% |
1/76 |
B |
3% |
2/76 |
378. Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers.
What should you do?
A. Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.
B. Install Microsoft Print Services for Unix on users' Computers. Create a network printer, and specify that the printer name is \\10.1.1.99\GIANT
C. Create a network printer on PrintServ, and specify that the printer name is \\10.1.1.99\GIANT. Share this printer and connect to it from users' computers.
D. Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
92% |
54/59 |
A |
2% |
1/59 |
C |
7% |
4/59 |
379. You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators.
The share permissions and NTFS permissions are shown in the following table.
HR-Data Folder Share permissions HR-Data Folder NTFS permissions
Everyone: Full Control
Domain Admins: Read
Katrin: Full Control
Katrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted. Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions of other files in the HR-Data folder. You want your actions to have the least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file.
What should you do?
A. Grant yourself Full Control permission for only the HR-Data folder and not its files and subobjects. Delete the file. Then remove Full Control permission for the HR-Data folder.
B. Take ownership of the HR-Data folder. When prompted, take ownership of existing files. Grant yourself Full Control permission for the file. Delete the file.
C. Take ownership of the file. Grant yourself Modify permission for the file. Delete the file.
D. Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
1% |
1/73 |
D |
3% |
2/73 |
C |
96% |
70/73 |
380. You are the administrator of a Windows 2000 Server computer named Server1. You create a Distribute file system (Dfs) root named Public. You add a shared folder named Docs as a Dfs node under the root. The share permissions and NTFS permissions for Public and Docs are shown in the following table.
Docs Folder Share permissions Docs Folder NTFS permissions
Public Everyone: Read
Domain Admins: Full Control
User: Read
Domain Admins: Full Control
Training: Full Control
A user named Maria is a member of the Users and Training user groups. When Maria attempts to save the file \\Server1\Public\Docs\memo.doc, she receives the following error message: "Access denied."
You want Maria to be able to change and delete all files in the Docs folder. You do not want her to have more access than necessary.
What should you do?
A. Add Maria to the Domain Admins group.
B. Add Maria to the local Administrators group.
C. Set the share permissions for the Public folder to grant Maria Full Control permission.
D. Set the share permissions for the Docs folder to grant Maria Change permission.*****
E. Set the NTFS permissions for the Public folder and is subobjects to grant Maria Modify permission.
F. Set the NTFS permissions for the Docs folder and its subobjects to grant Maria Full Control permission.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
98% |
64/65 |
F |
2% |
1/65 |
381. You are the network administrator of the litware.com domain. LitWare, Inc., has its main office in Dallas and branch office in New York, Phoenix, and Seattle. A Windows 2000 Server computer named web1.litware.com is running Internet Information Service (IIS). This computer is located in the same office. Web developers in Dallas, New York, Phoenix, and Seattle need to update each of the Web sites and virtual directories located on web1.litware.com. Different updates will be occurring simultaneously. You want to ensure that each developer can use Microsoft FrontPage to update the sites successfully and to manage content changes.
What should you do?A. Run the fpremadm command to install the server extensions for IIS on web1.litware.com. Configure the server extensions for each web site.
B. Run the fpsrvadm command to install the server extensions for IIS on web1.litware.com. Configure the server extensions for each Web site.
C. Install the server extensions for IIS on web1.litware.com by selecting Upgrade Extensions from All Tasks menu in IIS. Configure the server extensions for each Web site.
D. Configure the server extensions for each Web site by selecting Configure Server Extensions from the All Tasks menu in IIS. Configure the server extensions to allow each developer update access for each Web site.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
4% |
2/46 |
B |
2% |
1/46 |
D |
93% |
43/46 |
382. You are a member of the Enterprise Admins group at Trey Research. You create and share a printer named HPColorL2 on a Windows 2000 Server computer named pserver.treyresearch.local. You grant Print permission only to the Domain Local group named CompanySales. Later, you add a new child domain named london.treyresearch.local. Clair Hector is a member of the global group named LondonSales in the london.treyresearch.local domain. Clair reports that she is unable to send a print job to the HPColorL2 printer.
You want all members of the LondonSales group to be able to print to the HPColorL2 printer. What should you do?
A. Add the LondonSales group to the CompanySales group.
B. Add the CompanySales group to the LondonSales group.
C. Change the CompanySales group to a universal group.
D. Change the LondonSales group to a universal group.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
96% |
88/92 |
D |
2% |
2/92 |
B |
1% |
1/92 |
C |
1% |
1/92 |
383. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter is missing or is not working.
What should you do to resolve the problem?
A. Create a new hardware profile.
B. Use Device Manager to remove the integrated 10-MB Ethernet adapter.
C. Use Device Manager to disable the integrated 10-MB Ethernet adapter.
D. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
1% |
1/89 |
B |
3% |
3/89 |
A |
2% |
2/89 |
C |
93% |
83/89 |
384. You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible.
What should you do?
A. Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server.
B. Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server.
C. Delete all references to modems in the registry.
D. Run the Modem troubleshooter and remove the modem when prompted. Restart the server.
Answer(s) |
Rank (%) |
Rank (# votes) |
A |
97% |
88/91 |
D |
2% |
2/91 |
B |
1% |
1/91 |
385. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5.
You want to resolve the problem. What should you do?
A. Use Device Manager to change the IRQ for the original modem to IRQ 9.
B. Use Device Manager to change the IRQ for the original modem to IRQ 10.
C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices.
D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices.
Answer(s) |
Rank (%) |
Rank (# votes) |
B |
2% |
3/173 |
D |
1% |
1/173 |
A |
3% |
5/173 |
C |
95% |
164/173 |
386. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied.
David needs to be able to update the file by using his account. What should you do?
A. Configure the settings for Internet Connecting Sharing to allow POP3 access.
B. Configure the settings for Internet Connecting Sharing to allow SMTP access.
C. Give David's user account administrator privileges on the Windows 2000 Server computer.
D. Instruct David to log on as a domain administrator on the Windows 2000 Server computer.
Answer(s) |
Rank (%) |
Rank (# votes) |
D |
3% |
4/135 |
C |
97% |
131/135 |
387. You are an administrator of your company's network. You want to perform routine upgrades on your Windows 2000 Server computer. You use your non administrator user account in the domain to log on to the server. You want to update all of the critical system files on the server in the shortest possible time. What should you do?
A. Run Windows Update.
B. Run System File Checker.
C. Log on as an Administrator and run Windows Update.
D. Log on as an Administrator and run System File Checker.
Answer(s) |
Rank (%) |
Rank (# votes) |
C |
88% |
399/451 |
D |
5% |
24/451 |
A |
5% |
21/451 |
B |
2% |
7/451 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
MCSE Simulations
MCSE Hands On Labs |
|
Success Stories
Success Stories about MCSE Braindumps |
|
|