If you want to
post your mcse braindumps - click here
Corrected and
verified mcse braindumps enriched with explanations are available in the
members area.
Sign up to access the verified and corrected
mcse braindumps
USEFUL SUBMITTED DUMPS
1. You install Windows 2000 Professional on your computer. Your computer
has a built in 33.6 kbps modem. You install a 56-kbps ISA-based modem.
When the installation is complete, you notice that the 56-Kbps modem is
not functioning. You use computer management to view the modems for your
computer. Device Manager shows that the 33.6 Kbps modem and the 56Kbps
modem are conflicting with each other. You want to configure Windows 2000
Professional to use only the 56Kbps modem. What should you do? To answer,
click the select and place button and then drag the designated actions to
the appropriate action box for each modem in the diagram. (Note: Both
boxes must be filled. If a box does not require a specified action, use No
action required.)
<Exhibit - Not Available>
A. <Exhibit - Not Available>
Answer: A
2. You are the administrator of your company's network. You want to
install Windows 2000 Professional on 10 non-PXE-compliant computers that
are on the marketing segment of your network. You start one of the
computers by using a RIS boot disk. However, you cannot connect to the RIS
server. You verify that existing client computers on the network can
connect to network servers, including the RIS server. You discover that
the network router does not support BOOTP. You want to enable the new
computers to connect to the RIS server. What should you do? To answer,
click the select and place button, and then drag the appropriate server to
the place server here boxes on the network (Note: Both boxes must be
filled. If a box does not require a server, use No server needed)
<Exhibit - Not Available>
A. <Exhibit - Not Available>
Answer: A
3. You are configuring your computer to use both Windows 2000 Professional
and Windows 98. Your computer has 3 6GB hard disks, Disk0, Disk1 and
Disk2. You want to configure each hard disk to have a 6GB partition. You
want to install Windows 98 on Disk0 and Windows 2000 Professional on
Disk1. You want to store your project file on Disk2. You want to implement
file level security on Disk1. You want to be able to access your project
files when using either operating system. What should you do? To answer,
click the select and place button and then drag the designated file
systems to the appropriate preferred file system box for each disk in the
diagram. (Note: All three boxes must be filled. A file system may be
applied to several Disks.)
<Exhibit - Not Available>
A. <Exhibit - Not Available>
Answer: A
4. You want to install Windows 2000 Professional on 20 new PXE compliant
computers, which do not have operating systems installed. You create a RIS
image and load the image onto the RIS server and then start the new
computers. You find that the new computers cannot connect to the RIS
server. You verify that existing client computers on the network can
connect to network servers. What should you do? (Select and Place)
<Exhibit - Not Available>
A. <Exhibit - Not Available>
Answer: A
5. You want to upgrade 100 computers from Windows 98 to Windows 2000
Professional. You use setup manager to create the unattended.txt file. The
hardware on each computer is configured identically. You upgrade 10 of the
computers. You notice that the monitors on the 10 computers go blank after
Windows 2000 Professional loads. You restart one of the computers in Safe
Mode, and find that the monitor appears to be working. Which change should
you make to unattend.txt to configure your video settings correctly? To
answer, click the appropriate line on the Unattend.txt-notepad screen:
<Exhibit - Not Available>
A. <Exhibit - Not Available>
Answer: A
6. You install Windows 2000 Professional on a computer named client 2.
Client 2 is configured to have a TCP/IP address of 10.10.167.4 and a
default gateway of 10.10.167.1. The network is configured as shown in the
exhibit:
<Exhibit - Not Available>
You want to connect to a shared folder on server B. You want to attempt to
connect to the network share. You receive the following error message:
"the network location cannot be reached". You run IP configure to view the
configuration on client 2. Which configuration setting would you change?
(To answer click the incorrectly configured network setting.) In the IP
configuration display.
A. <Exhibit - Not Available>
Answer: A
7. You are a system administrator of a network with 100 Windows 2000
Professional computers. A user named Peter wants to share a local printing
device directly connected to his computer. Peter needs to share this
device among three groups: Engineering, Accounting, and Operations. Peter
wants to delegate printer administration to one print administrator from
each group. Each print administrator must be able to delete print jobs
generated by their own group on the print device. They should not be able
to delete print jobs from other groups. You want to configure Peter’s
client computer to support these requirements. What should you do?
A. Create a single shared printer to be used by all three groups. Allow
each print administrator Manage Documents permission.
B. Create a separate shared printer for each group. For each shared
printer, allow the respective print administrator Manage Documents
permission.
C. Create a single shared printer to be used by all three groups. Add the
print administrator’s user account from each group to the Power Users
group on Peter’s client computer.
D. Create a separate shared printer for each group. Add the print
administrator’s user account from each group to the Power Users group on
Peter’s client computer.
Answer: B
8. You are the administrator of a Windows 2000 network. A user named
Carlos configures a shared folder named Technical_Data on his Windows 2000
Professional computer. Carlos wants to audit access to the Technical_Data
folder and track any attempts to delete files. Carlos configures auditing
for Technical_Data, as shown in the exhibit:
<Exhibit - Not Available>
The Security Log on Carlos’s computer is set to a maximum log file size of
512 KB and to Overwrite events as needed. The next day Carlos reports that
files were deleted from the Folder. However, no evens were generates in
his computer’s Security Log. Carlos needs to discover who is deleting
files on his computer. What should you do?
A. Restart the Security Accounts Manager Service.
B. Modify the Security Log size settings to set the file size to 2,048 KB.
C. In the Local Security Policy setting for Audit Object Access, select
the Success and Failure check boxes.
D. In the Auditing Entry dial box for Technical_Data, select the Change
button and change Everyone to Authenticated Users.
Answer: C
9. You are the system administrator for an electronics manufacturing
company. The accounting department uses Windows 98 computers. The
department has purchased a third-party spreadsheet application that only
runs on Windows 2000 Professional. You need to upgrade the computers to
Windows 2000 Professional and install the new application. You choose an
unattended installation method for both the operating system and the
application. The Windows 2000 Professional installation files reside on a
server named Filesrv in a shared folder name W2Ksource. You place the
installation files for the spreadsheet application in
\\Filesrv\W2Ksource\i386\$OEMS$. You create an answer files named
Acctanswer.txt and place in \\Filesrv\W2Ksource. You map drive letter H:
to \\Filesrv\W2Ksource and begin the installation on a test computer by
running the winnt32 /s:H:\i386/u:H:\acctanswer.text command. Windows 2000
Professional is installed successfully. However, the spreadsheet
application is not installed. You want to ensure that the spreadsheet
application is installed during the unattended installation. What should
you do?
A. Run the winnt /s:H:\i386 /u:H:\acctanswer.txt command instead of the
winnt32 /s:H:\i386 /u:H:\acctanswer.text command.
B. Move the spreadsheet application installation files to
\\Filesr\W2Ksource\i386, and then run the winnt /s:H:\i386
/u:H:\acctanswer.txt command.
C. Edit the [Unattended] section of the answerer file to contain the
parameter OemPreinstall = Yes, and then run the winnt32
/s:H:\i386/u:H:\acctanswer.text command.
D. Rename Accctanswer.txt to Unattend.txt, and then run the winnt32
/s:H:\i386 /u:H:\unattend.text command.
Answer: C
10. You are the network administrator for a company and you support the
portable computer users. An Account Executive named Anita frequently
travels to meet with customers and uses her portable computer to
demonstrate the company’s new software products. Anita needs to update
these products frequently to update these products frequently so customers
can evaluate the latest software releases. You need to allow Anita to
install the product updates while limiting her ability to perform other
administrative duties on her portable computer. What should you do?
A. Add Anita’s user accounts to the Pre-Windows 2000 Compatible Access
group.
B. Add Anita’s user account to the local Power Users group.
C. Allow Anita’s user account Full Control permission to the Program Files
folder. Propagate the permissions to all the subdirectories and files in
that directory.
D. Allow Anita’s user account Write permissions to the Program Files
folder. Propagate the permissions to all the subdirectories and files in
that directory.
Answer: B
11. You use a Windows 2000 Professional portable computer both at the
office and at home. In the office you connect the portable computer to a
docking station and use Internet Explorer to access the Internet through
your LAN connection. At home, you configure a new dial-up connection to
the Internet. Now when you attempt to access the Internet from the office
you are prompted to connect via your dial-up connection. When you cancel
this message, you can only work offline and cannot access the Internet.
You want to maintain your dial-up connection for home use and your ability
to access the Internet when connected to the company LAN. What should you
do?
A. Reconfigure the dial-up connection to dial-up to a private network.
B. Create another connection that uses a virtual private network (VPN) to
connect a private network though the Internet.
C. Configure Internet Explorer to automatically detect proxy settings.
D. Configure Internet Explorer to dial whenever a network connection is
not present.
Answer: D
12. You are the network administrator for a software development company.
Your network consists of 25 Windows 2000 Professional client computers and
four Windows 2000 Server computers in a native-mode Windows 2000 domain.
All of the computers are on a single subnet. The client computers are
configured for dynamic IP address allocation. The network is configured as
shown in the exhibit:
<Exhibit - Not Available>
A developer named Julia reports that she cannot connect to file server
Filesrv1 from her client computer named Computer22. When she attempts to
browse \\Filesrv1 from the Run line she receives the message, “The network
path was not found”. No other users are reporting problems connecting to
Filesrv1. From Julia’s client computer, you browse \\192.168.14.5 from the
Run line and successfully connect to the server. You run the ipconfig /all
command. The relevant results are shown in the following table. Host Name
COMPUTER22 DHCP Enabled Yes IP Address 192.168.14.42 Subnet Mask
255.255.255.0 Default Gateway (not configured) DHCP Server 192.168.14.7
DNS Server 192.168.14.7 WINS Server (not configured) Node Type Peer-peer
You want Julia to be able to access resources on Filesrv1 by using the
computer name. What should you do?
A. Configure the client computer with a default gateway of 192.168.14.2.
B. Configure the client computer with a subnet mask of 255.255.0.0.
C. On the Internet Protocol (TCP/IP) Properties sheet, select the Obtain
DNS server address automatically option.
D. On the Internet Protocol (TCP/IP) Properties sheet, select the Obtain
an IP address automatically option.
Answer: C
13. You are a consultant who uses a Windows 2000 Professional portable
computer. Your domain user account is a member of the local Administrator
group. From your portable computer, you map a drive to a shared folder
named ConsultMertics on a computer named Server1. You configure
ConsultMertics to be available offline. When you log of the portable
computer, you receive the following error message:
<Exhibit - Not Available>
You need to successfully synchronize the offline files. What should you
do?
A. Compress the folder and files in the shared folder on Server1 by using
Windows Explorer.
B. Configure manual caching of the offline folders on Server1 by using the
Disk Management administrative tool.
C. Increase available disk space by running the Disk Cleanup utility.
D. Increase the amount of disk space for offline folders on the portable
computer by using Windows Explorer.
Answer: D
14. You are the network administrator for your company. Two users named
Eric and Julia share a Windows 2000 Professional computer. Eric’s user
account is a member of the local Administrator group. Eric needs to share
files with Julia. Eric wants Julia to be able to change any of the shared
files on to create her own files if necessary. Eric wants to prevent Julia
from changing the permissions on file that Eric creates. To accomplish his
goal, Eric creates a folder named C:\Data. He changes the NTFS permission
on C:\Data to allow his local user account Full Control permissions and to
allow Julia’s local user account default permissions. Eric places 10 files
in the folder. When Julia logs on to the computer using her local user
account and opens a file in C:\Data, she cannot save the changes to the
file. Julia also cannot create any new files in the folder. You need to
help Eric configure the correct permissions of C:\Data. What should you
instruct Eric to do?
A. Add Julia’s user account to the local Power Users group.
B. Add Julia’s user account to the local Administrators group.
C. Allow Julia’s user account Write permissions to C:\Data.
D. Allow Julia’s user account Full Control permission to C:\Data.
Answer: C
15. You are the network administrator for you pharmaceuticals company.
Laura is a sales representative for the company. She travels on a regular
basis and dials into the company network from her Windows 2000
Professional portable computer. Your company recently implemented a new
computing security policy that mandates all remote connections be
established by a two-way authentication method. You configure a Windows
2000 Server computer to run Routing and Remote Access Server for Windows
2000 to meet the requirements of the new security policy. Laura reports
she now cannot initiate a dial-up connections. Laura needs to dial in to
the company network. What should you do?
A. Apply the Hisecws.inf Security Template to Laura’s computer.
B. Apply the Compatws.inf Security Template to Laura’s computer.
C. Instruct Laura to configure her dial-up connection to use multi-link.
D. Instructs Laura to configure her dial-up connection to use MS-CHAP v2.
E. Instruct Laura to configure her dial-up connections to use L2TP.
Answer: D
16. You are the network administrator for your company. You manage Windows
2000 Professional computers on four subnets and Windows 2000 Server
computers on a dedicated subnet. All of the client computers are
configured as DHCP clients. You receive a call from Andrew who cannot
access a file server. You run the ipconfig /all command from Andrew’s
computer. The results are shown in the exhibit:
<Exhibit - Not Available>
Other client computers on the same subnet can connect to the file server.
You confirm that the DHCP service is operating correctly. You need to help
Andrew connect to the file server. What should you do?
A. Configure the routers to forward BOOTP traffic.
B. Add IP addresses to the appropriate scope in the DHCP server.
C. Run the net start DHCP command on Andrew’s client computer.
D. Configure a default gateway of 169.154.72.1 on Andrew’s client
computer.
E. Configure a LMHOSTS file entry for the file server on Andrew’s client
computer.
Answer: B
17. You are the administrator of a Windows 2000 network. You need to store
secured files for your company's accounting and legal departments on a
Windows 2000 Professional computer. You want to accomplish the following
goals:
• Enable users in both departments to access their own files from the
network
• Enable users in the accounting department to view the legal accounting
department’s documents
• Prevent users in the legal department from being able to view the
accounting department’s documents
• Enable managers within the company to access and modify both the
accounting and the legal department’s files You take the following
actions:
• Create two shared folders named Accounting and Legal
• Create three groups named Accounting, Legal, and Management
• Allow the Accounting group Modify permission on the Accounting folder
• Allow the Accounting group Read permissions on the legal folders.
• Allow the Management group Modify permission on both the Accounting and
Legal folders. Which result or results do these actions produce? (Choose
all that apply)
A. Users in both departments can access to their own files from the
network.
B. Users in the accounting department can view the legal department’s
documents.
C. Users in the legal department cannot view the accounting department’s
documents.
D. Company managers can access and modify both departments’ files.
Answer: B, C, D
18. You are the network administrator for a company. You are configuring a
network consisting of 100 client computers and six subnets for the
company’s new office. You configure the first two subnets and configure
client computers on both subnets for testing. You test the initial
configuration and discover that not all of the client computers can
communicate with each other. The two subnets are show in the following
diagram:
<Exhibit - Not Available>
All client computers must be able to communicate with each other. What
should you do?
A. Change the subnet mask of all the client computers and on the two
gateways to 255.255.255.240.
B. Change the subnet mask of all the client computers and on the two
gateways to 255.255.255.255.
C. Change the IP address for Gateway2 to 131.107.5.214 and the IP address
for WKS21 to 131.107.5.210.
D. Change the IP address for WKS11 to 131.107.5.190 and the IP address for
WKS12 to 131.107.5.191.
Answer: C
19. You are the administrator of your company’s network. You want to
deploy a Windows 2000 Professional service pack to 10 computers in the
developmental Organizational Unit. You create a Windows 2000 installer
package file for the service pack. You use the package files to
successfully install the service pack to other computers in the domain.
You assign the package file to the development Organizational Unit. After
the installation you notice that the service pack was not installed on any
of the 10 computers. You want to ensure that the service pack is
successfully installed on the computers in the development Organizational
Unit. What should you do?
A. Use computer management to start the Windows installer service on all
the computers in the Development Organizational Unit
B. Use the local administrator account to log on to the computers in the
Development Organizational Unit. Then redeploy the service pack to the
computer in the Development Organizational Unit.
C. Run Windows installer to repair the package file. Then redeploy the
service pack to the computers in the Development Organizational Unit.
D. Add the user accounts from the Development Organizational Unit to a
DACL. Grant the user accounts read permission to the service pack
deployment directory.
Answer: D
20. During startup, a Windows 2000 Professional computer in your office
proceeds directly to the desktop without first prompting for a user name
and password first. You need to enforce logon requirements. What should
you do?
A. Change the Netlogon service startup setting to manual.
B. Disable the Disable CTRL+ALT+DEL requirement for logon option in the
local group policy.
C. In control panel, modify the startup and recovery settings in the
system option.
D. In control panel, add the appropriate user accounts to the users and
passwords setting.
Answer: B
21. You have 17GB of private files on drive D on your Windows 2000
Professional computer. You have shared the files as private_files. You do
not want other users to see this share name in the browse list. You want
all other share names to continue to appear in the browser list. What
should you do?
A. Stop the computer browser service, and disable the startup state.
B. Change the comment for the share to hidden:Yes
C. Change the share name to private_files$.
D. Add a hidden entry to the
HKLMSystem\currentcontrolset\services\larmanserver\shares\private_files
registry value entry.
Answer: C
22. You are the administrator of the corp.arborshoes.com domain. Users in
the domain run Windows 2000 Professional on their desktop computers. A
user named Katrin in the Sales organizational unit reports that her mouse
is not working correctly. You logon to the domain from Katrin’s computer
by using a domain administrative account. You use Device Manager to
display current information for the mouse drivers. You discover that
Katrin’s computer is using an older version of the mouse driver. You have
a current driver by the manufacturer of mouse. You install the current
driver by the usage of Device Manager and restart the computer. You test
the mouse and it is still not functioning correctly. You check the problem
and see that previous driver is still installed. You want to be able to
install the correct mouse driver. What should you do?
A. Set the Sales OU policy for security to warn and allow the installation
to override the local security defaults.
B. Set the domain policy for security to block but allow the installation
to override local and Sales OU security defaults.
C. Set the local computer policy for security on Katrin’s computer to warn
but allow the installation to override the domain and the Sales OU
security defaults.
D. Disable, plug and play on Katrin’s computer. Restart the computer and
manually setup the system resources for the mouse.
Answer: A
23. All of the client computers in your company network are Windows 2000
portable computers. A user named Maria stores Sales files in her My
Documents folder. She uses these files when she travels. Maria informs you
that when she takes her portable computer to trade shows, she can access
some of the Sales files but not all of them. When her portable computer is
connected to the network at the office, she can access all of the files.
You need to enable Maria to access all of the files in her My Documents
folder when she is working remotely. What should you do?
A. Allow Maria full control permissions on the %systemroot%\documents and
settings\Maria\My Documents folder.
B. Allow Maria full control permissions on the %systemroot%\documents and
settings\all users\My Documents folder.
C. Configure Maria’s computer to automatically copy the entire contents of
her network My Documents folder to her offline files folder.
D. Configure Maria’s computer to automatically copy the entire contents of
her network My Documents folder to her local My Documents folder.
Answer: C
24. Your company network includes 6,000 Windows 2000 Professional client
computers and 35 Windows 2000 Server computers in a single domain. Your
company has a print device that is used to print payroll checks. The print
device is physically attached to the parallel port of one of the client
computers. This print device’s tray is loaded with checks at all times.
You have shared this printer on the network as ChkPrinter and retained the
default permissions. A payroll application runs on a server named HRserv.
Every Wednesday at 5:00P.M, the application prints paychecks from
employees on this printer. The payroll application runs as a Windows 2000
service on HRserv. You need to configure ChkPrinter so that only the
payroll application will be able to use the printer. What should you do?
A. Configure the share name for ChkPrinter to be ChkPrinter$. Configure
the payroll application to print to this new share name.
B. Configure ChkPrinter so that it is available only from 5:00 P.M to 5:30
P.M
C. Configure ChkPrinter to allow the HRserv domain account print
permissions for ChkPrinter. Remove print permissions for the Everyone
group.
D. Configure ChkPrinter to allow all HRserv domain accounts Print
permissions for ChkPrinter. Change the permissions to deny print on
ChkPrinter for the Everyone group.
Answer: C
25. Your Windows 2000 Professional computer is configured to support two
monitors. You install a DOS-based application on your computer. The
application uses the Windows 2000 Professional default settings
AUTOEXEC.NT and CONFIG.NT. Your primary and secondary video adapters are
both set to 16-bit color, 1024x 768 resolutions, and default refresh
rates. You create a shortcut for the DOS-application on the secondary
monitor and use the default PIF settings. You attempt to run the DOS-based
application on the primary monitor. The application opens, but the display
area is scrambled. You then attempt to run the DOS-based application on
the secondary monitor. The application does not open. Both monitors
function correctly when you run Windows-based applications. What should
you do?
A. Change the color setting for both video adapters to 256 colors.
Reconfigure the shortcut properties to run the DOS-based application in
full-screen mode.
B. Change the refresh rate setting to optimal for both video adapters.
Reconfigure the PIF settings for the DOS-based application to start in the
window.
C. Change the drivers for the secondary video adapter from WDM-compliant
drivers to DOS drivers. Reconfigure the PIF settings to run the DOS-based
application in full-screen mode.
D. Update the drivers for the primary video adapter. Change the secondary
video adapter to use 640 x 480 resolution and 256 colors.
Answer: A
26. You want to configure your Windows 2000 Professional computer to
support two monitors. Your computer is configured to use 16-bit color,
1024 x 768 and an optimal refresh rate. You physically install plug and
play PCI adapters and their appropriate drivers. The video adapters are
included on the current hardware compatibility list (HCL). You start the
computer after Windows 2000 Professional loads. You notice that the
secondary monitor does not display an image. What should you do?
A. Move the video adapters to different PCI slots so that the primary
video adapter is in slot zero.
B. Use the hardware troubleshooter to upgrade the video adapter drivers
for the secondary video adapter.
C. Run DXDIAG.exe to configure the video adapters. Configure the secondary
video adapters to use the optimal refresh rate.
D. Change the resolution of the primary video adapter to 640 x 480 and use
the default refresh setting for the primary video adapter.
Answer: A
27. You are the administrator of your company's network. Your network has
20 Windows 2000 server computers in the contoso.com domain. Your network
also has 250 Windows 98 computers. You want to perform clean installation
of Windows 2000 Professional on all of the Windows 98 computers. All of
the Windows 98 computers are identical models and are PXE complaint. You
want to accomplish the following goals: An unattended installation of
Windows 2000 Professional will be performed. An unattended installation of
company's standard application will be performed during the installation
of Windows 2000 Professional. Each computer will be assigned a unique
security identifier description. The unattended installation script will
be modified so that the computers automatically join the contoso.com
domain. You take the following actions: Install Windows 2000 Professional
on Windows 98 computer named computer 1. Install and configure computer
standard application on computer 1. Use set up manager on computer1 to
create an unattended.txt file based on the current configuration including
domain membership. Start the remaining Windows 98 computers and then
install Windows 2000 Professional. Use the unattended.txt file to provide
the setting for the installation. Which result or results do these actions
produce? (Choose all that apply)
A. An unattended installation of Windows 2000 Professional will be
performed.
B. An unattended installation of company's standard application will be
performed during the installation of Windows 2000 Professional.
C. Each computer will be assigned a unique security identity description.
D. The unattended installation script will be modified so that the
computers automatically join the contoso.com domain.
Answer: A, C, D
28. Your Windows 2000 Professional computer has 10 shared folders that are
available to other network users. A user reports that he cannot access a
shared folder named ShareA. You want to respond to the user’s problem as
quickly as possible by using an administrative tool. However, you cannot
remember the server location of ShareA. What should you do?
A. Use Windows explorer to display the file paths of your shared folders.
B. Use storage in computer management to view logical drive properties.
C. Use event viewer in computer management to search for shared folder
error messages.
D. Use System tools in computer management to display the file paths of
your shared folders.
Answer: D
29. You use a Windows 2000 Professional computer to run a weekly accounts
table. The report has the name ap_financial_reports. You also want the use
the computer to run a task named perf_log to connect to network routers
and retrieve their performance logs. When the ap_financial_reports is
running on the computer perf_log task stops responding the eventually
times out. When you run only the perf_log task the task completes
successfully. You use the task manager to view your system resources. You
want to resolve the performance log time out problem by using task
manager. What should you do?
A. Decrease the base priority of the ap_financial_reports task.
B. Decrease the number of threads available for the ap_financial_reports
task.
C. Increase the base priority of the perf_log task.
D. Increase the number of threats available for perf_log task.
Answer: A
30. You have stored confidential financial data in a shared folder named
AccSecured on your Windows 2000 Professional computer. Your company hires
an intern named Richard. You create a subfolder named intern, which
Richard needs to access. You want to allow Richard access to the intern
subfolder only. You create a user account named intern. You want to allow
the intern user account the ability to update, create, and delete files
within the intern folder. You need to prevent Richard from accessing any
other files or folders within the AccSecured folder. What should you do?
(Choose all that apply)
A. Map a network drive to the AccSecuredintern folder from Richard’s
computer.
B. Map a network drive to the AccSecured shared folder from Richard’s
computer.
C. Allow the intern user account modify permissions on the intern
subfolder.
D. Allow the intern user account traverse folder/execute file permission
on the AccSecured folder.
E. Allow the intern user account list folder content permission on the
AccSecured folder. Remove read extended attributes and read permissions.
Answer: A, C
31. You are configuring 5 computers to use both Windows NT workstation 4.0
and Windows 2000 Professional. Each computer has an 8GB hard disc. You
configure that hard disc on each computer to have two 4GB partitions.
Windows NT workstation is installed on drive C. Windows 2000 Professional
is installed on drive D. in Windows 2000 Professional you configure a disc
quota on drive D to prevent users from saving work files on the disc. You
restart the computer and load Windows NT workstation. You notice that
users can still save files to drive D. You want to prevent users from
saving files to drive D in either operating system. You also want to
ensure that users can access both drivers using either operating system.
What should you do on each computer?
A. Use Windows 2000 Professional to configure drive D as a dynamic volume.
B. Use Windows 2000 Professional to enable encrypting file system (EFS) on
drive D.
C. Use Windows NT workstation to configure NTFS permission on drive D to
deny the users write permission.
D. Reinstall Windows NT workstation after configuring the disc code task.
Answer: C
32. You are the administrator of a Windows 2000 network. You purchase 25
new portable computers that have a preinstalled version of Windows 98. You
upgrade the 25 new computers to Windows 2000 Professional. You want to
remove the Logoff option from the start menu on the 25 new computers.
Which two methods can you use to accomplish this goal? (Choose two)
A. On the advanced tab of the task bar and start menu dialog box, clear
the Display log off option.
B. On the advanced tab of the task bar and start menu dialog box, clear
the administrative tools option.
C. On the general tab of the task bar and start menu dialog box, clear the
personalized menus option. Log off and then log on to the computers.
D. Use a local computer policy that will not include the logoff option on
the start menu.
E. Use the user profiles tab within the properties of my computer to
change the profile from the local profile to a roaming user profile.
Answer: A, D
33. Your Windows 2000 Professional computer has a removable disk device
installed. The device can use storage modules of varying sizes. You use
these storage modules to transfer graphics filed between your location and
a printing company. The printing company uses Windows NT 4.0 service pack
3. You insert a new 20-Mailbox disk device into your computer. When you
attempt to format it as FAT32 with the default options, you receive the
following error message “Windows was unable to complete the format.” You
need to format the device so that you can use it to send a large graphic
file to the printing company. How should you format the device?
A. As FAT16 with a 4-KB cluster size.
B. As FAT32 with a 1-KB cluster size.
C. As FAT32 with a 4-KB cluster size.
D. As NTFS with a 4-KB cluster size.
Answer: A
34. You want to upgrade 400 computers from Windows 95 to Windows 2000
Professional. Most of the computers in your company use the same hardware.
However, several different peripheral devices are used throughout the
company. You want to verify that the hardware in use is compatible to
Windows 2000 Professional. You want to accomplish this with least amount
of administrative effort. What should you do?
A. Create several different computer configurations. Install Windows 2000
Professional and enable driver signing.
B. Create a bootable floppy disk that contains and automatically runs
WinNT32.exe/checkupgradeOnlyQ. Send the floppy disk to each user on the
network.
C. Copy the contents of Windows 2000 Professional CD-ROM to a network
share. From the network, modify your network logon scripts to run
WinNT32.exe/Unattended:ReportOnly.
D. Use setup manager to create a setup.inf file. Add the entry
ReportOnly=Yes to the [Win9xUpg] section of the answer file. Run
Winnt32.exe/unattended.setup.inf on all of the different computer
configurations.
Answer: D
35. You want to install Windows 2000 Professional on 45 new computers on
your company’s network. You first install Windows 2000 Professional on one
of the new computers. You log on to the computer by using the local
administrator account. You install Microsoft Office 97, a virus scanner,
and other company-standard applications. You then create a RIS image of
the computer you configured. You want to configure the RIS image so that
the standard applications will be accessible to the user when the user
first logs on to the network. What should you do?
A. Run Rbfg.exe before installing the standard applications.
B. Run RIPrep.exe before installing the standard applications.
C. Copy the all users profile to the default users profile.
D. Copy the local administrator account profile to the default users
profile
Answer: D
36. You copy the contents of the Windows 2000 Professional CD to a shared
network folder named \\Server1\Win2000p. You use the shared folder to
perform over-the-network installations of Windows 2000 Professional on new
computers purchased by your company. You receive a Windows 2000 service
Pack CD. You apply the Service Pack to Server1 and to the
\\Server1\Win2000p folder. You discover that the service pack contains
several files that are incompatible with the new computers. You want to
make sure that the service pack files are not installed on any new
computers until the problem has been corrected. What can you do?
A. Use update.exe from the service pack CD on server1. Select the
uninstall option.
B. Copy the contents of the Windows 2000 Professional CD to
\\Server1\Win2000p again, allowing the operating system to overwrite newer
files while copying.
C. Run \\server1\Win2000p\WinNT32.exe/u on the new computer.
D. Run Update.exe/s:\\Server1\Win2000p/you from the Service Pack CD on
Server1.
Answer: B
37. You are the administrator of your company’s network. Your network
consists of 20 Windows 2000 Professional computers. You want to configure
all of the computers to allow access to the Internet. Your Budget does not
allow for installing a permanent Internet connection for the network. You
do have a single dial-up account at a local Internet service provider
(ISP) and a 56-Kbps modem. You want the computer to be able to access the
Internet when web resources are requested. What should you do? (Choose all
that apply)
A. Configure the shared modem to use software handshaking
B. Configure the dial-up connection to enable on-demand dialing.
C. Configure the dial-up connection to enable the Internet connection
sharing.
D. Configure all the other computers to have a dial-up connection that
uses the shared modem.
E. Attach the modem to one of the Windows 2000 Professional computer, and
create a dial-up connection to the ISP.
F. Attach the modem to one of the Windows 2000 Professional computers, and
share the modem on the network.
Answer: B, C, E
38. You are the administrator of a Windows 2000 Professional computer. A
user named Maria assists you in performing some administrative tasks.
Maria is a member of local administrators group. Users report that Maria
has been viewing and changing their files. You want Maria to be able to
install programs, perform backup and manage printer, but not to view,
change or read other users’ files for which permission has not been
granted. You want to setup Maria’s account to have minimal rights and
permission. You want to accomplish this with least amount of
administrative effort. What should you do?
A. Leave Maria and local administrators group. Limit her rights by using
local policy.
B. Leave Maria and local administrators group. Change the NTFS provision
on other users’ files to deny Maria’s request.
C. Remove Maria from the local administrators group. Add her to both the
power users group and backup operators group.
D. Remove Maria from local administrators group. Add her to power user
group. Then grant her NTFS read permission on the files to be backed up.
Answer: C
39. You install a new AGP video adapter in your Windows 2000 Professional
Computer. You start the computer and notice that the video display has
retained the default setting of 16 color 640*480 resolution. You install
the manufacturer’s drivers for the new video adapter. You then restart the
computer. During the setup process the monitor goes blank. After several
minutes the screen is still black. You restart the computer and experience
the same problem again. You want to enable Windows 2000 Professional to
start successfully. What should you do?
A. Start the computer in the debug mode. Restore the original adapter
driver settings.
B. Start the computer in the Safe Mode. Rename the AGP device by using
Device Manager
C. Start the computer by using the Recovery Console. Rename the AGP
driver.
D. Start the computer by using the emergency repair disk. Restore the
original driver settings.
Answer: C
40. Your Windows 2000 Professional computer has 64 MB of RAM and two hard
disk drives, drive C and drive D. Each hard disk has more than 500 MB of
free disk space. Windows 2000 Professional is installed on drive C. You
frequently run two or more memory-intensive graphics applications
simultaneously. You notice that access to drive C is much slower when you
are using the graphic applications. You want to maximize disk performance.
What should you do?
A. Configure the paging file on drive C to set the initial size of the
virtual memory and a maximum size of the virtual memory to the 64 MB.
B. Configure the paging file on drive C to set the initial size of the
virtual memory and a maximum size of the virtual memory to the 128 MB.
C. Move the paging file from drive C to drive D to set the initial size of
virtual memory and the maximum size of virtual memory to 256 MB.
D. Move the paging file from drive C to drive D. Set the initial size of
virtual memory to 56 MB and maximum size of virtual memory to 256 MB.
Answer: C
41. You configure your Windows 2000 Professional portable computer to
redirect your My Documents folder to your home folder. You want to ensure
that you can access all of your files in your My Documents folder when you
are not connected to the network.
What should you do?A. Use Windows Explorer to enable offline files.
B. Use Windows Explorer to create shortcut to access offline files folder
as desktop.
C. Use Windows Explorer to configure the properties of your home folder to
be available offline.
D. Use synchronization manager to configure your home folder to be
available offline.
E. Create a shortcut in my network places to access your home folder.
Answer: A, C
42. You use Windows backup to backup the files on your Windows 2000
Professional computer. Your computer is configured to perform a daily
backup of your files on drive D. On Thursday morning, drive D on your
computer fails. You replace the failed hard disc with a new hard disc. You
want to restore files on drive D to the new hard disc. You view your back
up log as shown in the exhibit:Exhibit Backup Status Exhibit
Backup Status
Operation: Backup
Active backup destination: Tape
70-210 78
Media name: “Set created Friday at 11:00 PM”
Backup of “D;”
Backup set #1 on media #1
Backup description: “Set created Friday at 11:00 PM”
Backup Type: Normal
Backup started on 9/8/1999 at 11:00 PM.
Backup completed on 9/9/1999 at 1:30 AM.
Directories: 5012
Files: 4323
Bytes: 4, 623, 252, 320
Time: 2 hours 30 minutes 2 seconds
-------- --------------------
Backup Status
Operation: Backup
Active backup destination: Tape
Media name: “Set created Saturday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Saturday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/9/1999 at 11:00 PM.
Backup completed on 9/9/1999 at 11:26 PM.
Directories: 116
Files: 320
Bytes: 6, 278, 256
Time: 26 minutes 32 seconds
--------- ----------------------
Backup Status
Operation: Backup
Active backup destination: Tape
Media name: “Set created Sunday at 11:00 PM”
70-210 79
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Sunday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/10/1999 at 11:00 PM.
Backup completed on 9/10/1999 at 11:15 PM.
Directories: 10
Files: 24
Bytes: 4, 272, 903
Time: 15 minutes 55 seconds
------------ ---------------------
Backup Status
Operation: Backup
Active backup destination: Tape
Media name: “Set created Monday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Monday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/11/1999 at 11:00 PM.
Backup completed on 9/11/1999 at 11:55 PM.
Directories: 732
Files: 964
Bytes: 9, 243, 747
Time: 55 minutes 12 seconds
---------- --------------------------
Backup Status
Operation: Backup
Active backup destination: Tape
Media name: “Set created Tuesday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
70-210 80
Backup description: “Set created Tuesday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/12/1999 at 11:00 PM.
Backup completed on 9/12/1999 at 11:01 PM.
Directories: 116
Files: 1
Bytes: 1, 623, 252
Time: 6 seconds
---------- -----------------------------
Backup Status
Operation: Backup
Active backup destination: Tape
Media name: “Set created Wednesday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Wednesday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/13/1999 at 11:00 PM.
Backup completed on 9/13/1999 at 11:14 PM.
Directories: 84
Files: 38
Bytes: 2, 984, 837
Time: 14 minutes 32 seconds
In which order should you restore your data?A. Friday, Wednesday: files
will be current as of the Wednesday night.
B. Friday, Thursday: files will be current as of the Thursday morning.
C. Friday, Saturday, Sunday, Monday: files cannot be restored after this
time.
D. Friday, Saturday, Sunday, Monday, Tuesday, Wednesday: files will be
current as of the Wednesday night.
Answer: D
43. You are the administrator of a Windows 2000 network that has 1,500
Windows 2000 Professional computers. Microsoft Office 2000 was assigned to
all the computers on the network by using a Group Policy object (GPO). You
deploy the Office 2000 service release to all the Windows 2000
Professional computers on the network. The service release, in addition to
other software that had been assigned, fails to install on only one of the
computers. What should you do?
A. Redeploy the service release by using a .Zap file.
B. Redeploy the service release by using a .mst file.
C. Restart Windows Installer on the domain controller.
D. Restart Windows Installer on the computer that failed to install the
service release.
Answer: D
44. You are the administrator of your company’s network. A user named
Stephen in the graphics department logs on to his Windows 2000
Professional computer. He installs a shared color laser printer. The color
laser printer is connected to a computer named Server1. The next day
Stephen returns and logs on to a Windows NT Workstation 4.0 computer.
Stephan reports that when he attempts to print a document to the shared
color laser printer, the printer is not included in the list of available
printers. You want to allow Stephen to send print jobs to the shared color
laser printer from any computer on the network. What should you do?
A. Configure a roaming user profile for Stephen’s user account.
B. Configure the server properties of the printer system folder to connect
to the shared printer.
C. Install the printer driver for the print device on the Windows NT
workstation computer.
D. Upgrade the Windows NT Workstation computer to Windows 2000
Professional, and then import the profile settings for Stephen’s user
account.
Answer: A
45. You install a 16-Bit ISA sound card on your Windows 2000 Professional
computer. You install the manufacturer’s device driver for the sound card.
You then restart the computer. During the start up process, the computer
stops loading Windows 2000 Professional. You restart the computer, and
again the computer stops loading Windows 2000 Professional. You start the
computer in Safe Mode. What should you do next?
A. Remove the sound card device driver by enabling driver signing.
B. Remove the sound card device driver by disabling driver signing.
C. Disable the sound card device driver by using the disable command.
D. Disable the sound card device driver by using computer management.
Answer: D
46. You are the administrator of a Windows 2000 network. You use a user
account named user1 to log on to a Windows 2000 Professional computer. The
computer is used by different students in a classroom. User1 does not have
administrative rights. However, you prefer to use this account for most of
your daily activities, because it is not a security breach if you fail to
log off. You want to schedule a task to run on the command file named
AddUser.cmd that automatically adds six more student user accounts. What
should you do?
A. Schedule the task to run under the administrative account.
B. Log on by using the local administrator account. Then schedule the task
to run under user1.
C. Take ownership of the AddUsers.cmd. Then Schedule the task to run under
user1.
D. Grant user1 read & execute permission for AddUsers.cmd. Then schedule
the task to run under User1.
Answer: A
47. You are the network administrator for your company. A user reports
that the USB ports on his Windows 2000 Professional portable computer
function only when the portable computer is in its docked position at the
office. He asks you to configure the computer so that the USB port works
when the portable computer is docked and when it is undocked and running
on battery power. You verify that the portable computer supports ACPI
power management. What should you do?
A. Modify the portable computer’s power management settings to ensure the
USB ports are not shut down when the computer is running on battery power.
B. Modify the portable computer’s BIOS settings to disable ACPI when the
computer is running on battery power.
C. Modify the portable computer’s undocked hardware profile, and enable
the USB root hub.
D. Disable the BIOS power management features in the portable computer’s
BIOS settings.
E. Obtain external power supplies for the user’s USB devices. Ensure that
these power supplies are connected when the portable computer is undocked.
F. Undock the portable computer, and reinstall the drivers for the USB
port.
Answer: C
48. You attach a USB camera to your Windows 2000 Professional computer.
Your Windows 2000 Professional detects the camera and prompts you to
install the manufacturer’s device driver. You insert the
manufacturerprovided floppy disk. After installing the device drivers, you
restart the computer. When Windows 2000 Professional loads, you notice
that your USB board does not respond. You suspect that the camera drivers
are not certified for Windows 2000 Professional. You want to configure
your computer to enable your USB keyboard and to prevent uncertified
drivers from being installed in future. What should you do? (Choose two)
A. Configure Windows 2000 Professional to enable driver signing.
B. Configure Windows 2000 Professional to disable driver signing.
C. Start the computer by using the Recovery Console. Restore the system
state data.
D. Start the computer in Safe Mode. Replace the camera driver with Windows
2000 Professional certified driver by using Device Manager.
E. Start the computer in debug mode. Replace the camera driver with
Windows 2000 Professional certified drivers by using the Device Manager.
Answer: A, D
49. You are the network administrator for your company. An employee named
Bruno uses a Windows 2000 Professional portable computer. When he starts
the computer, Windows 2000 prompts him to select either a docked or an
undocked mode. Bruno primarily works out of the office and does not use a
docking station. What should you do?
A. Modify the portable computer’s BIOS settings, and disable support for
the docking station.
B. Modify the portable computer’s hardware profiles, to remove the Docked
hardware profile
C. Modify the portable computer’s device settings to disable the Unplug
devices icon in the system tray.
D. Modify the portable computer’s hardware profiles, and move the Docked
hardware profile to the top of the list of hardware profiles.
Answer: B
50. You use Windows 2000 Professional on a desktop computer. You schedule
a task to run an MMC-snap in to perform configuration tasks to another
computer. You notice that task is completing incorrectly. You manually
start MMC. You add snap-in and are then able to successfully run the task.
You verify that all of your other tasks are working correctly. You want to
enable your task to complete successfully. What should you do?
A. You schedule the tasks to configure the task to run under the security
context of your account.
B. Configure the task scheduler service account to use the local
administrator account and password.
C. Use Computer Management to start the messenger service and to configure
the messenger service to start automatically.
D. Use Computer Management to start the task scheduler service and to
configure the task scheduler service to start automatically.
Answer: A
51. You want to connect your Windows 2000 Professional computer to a new
color laser printer. The printer is Plug and Play compliant. The printer
is included on the current hardware compatibility list (HCL). You are a
member of the Sales organizational unit. You want to share the printer
with other users in the Sales organizational unit. You plug the printer
into the LPT port on the back of the computer. You then attempt to install
the 32-bit application printer software that came with the printer. During
the installation you receive an error message as shown below. “Failed to
load Windows Print.dll, the specified module could not be found” What
should you do before you share the printer to other users in the Sales OU?
A. Change the LPT port settings to enable legacy plug and play detection
on your computer.
B. Change the LPT port setting to bidirectional in the BIOS on your
computer. Then reinstall the printer software.
C. Connect the printer to another computer in the Sales Organizational
Unit. Then install the device drivers for the printer.
D. Obtain and install WDM-compliant device driver and printing software
for the printer.
Answer: D
52. You need to create a web share on your Windows 2000 Professional
computer named Admin01. You create a folder named reports. Then you
configure web sharing on Reports. You name the share WebReports and allow
Read permissions on the share. You test the web share by pointing to
http://admin01/WebReports from another computer. You receive the following
error message: "You are not authorized to view this page." You need to be
able to access the folder. What must you do?
A. Allow write permission on WebReports.
B. Allow directory browsing permissions on WebReports.
C. In the IIS console, enable anonymous access to WebReports.
D. In the IIS console, set the execute permissions option to script and
executables on WebReports.
Answer: C
53. You have updated the modem driver on your Windows 2000 Professional
computer. You restart your computer. Immediately after you log on, you
receive a stop error. You need to start Windows 2000. What must you do?
A. Restart the computer in Safe Mode. Uninstall the modem driver.
B. Restart the computer by using the last known good configuration.
C. Restart the computer in Recovery Console. Replace the new Modem.inf
file with the old modem.inf file.
D. Start the computer from the Windows 2000 startup floppy disks. Repair
the registry.
E. Start the computer from the Windows 2000 startup floppy disks. Repair
the system files.
Answer: A
54. You are preparing to install Windows 2000 Professional on 100
MPS-compliant computers. Each computer has two 550 MHz processors. The
computers are configured identically. You want to use one of the computers
as a reference computer for deploying Windows 2000 Professional to the
remaining computers. You install Windows 2000 Professional on the
reference computer. You view the Device Manager and notice that the
drivers for the second processor are not installed. You want to add
support for the second processor and the remaining 99 computers. You want
to do this with least amount of administrative effort. What should you do?
A. Use setup manager to configure the reference computer, and then create
a disk image.
B. Use the system preparation tool with the -pnp parameter to set up the
reference disk, and then create the disk image.
C. Use Device Manager to add the appropriate hardware abstraction layer to
the reference computer to support the second processor, and then create a
disk image.
D. After imaging the reference computer, restart the reference computer in
Safe Mode and add the driver for the second processor.
Answer: C
55. Your company has just upgraded its Category 5 Ethernet network from
10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional
computers in the marketing department can no longer connect to the
network. The remaining 80 Windows 2000 computers in the company can
connect, however. Your company uses NWLink as the only network protocol.
You need to connect the computers in the marketing department to the
network. What must you do?
A. Configure the NWLink frame type of the network adapters to be Ethernet
802.3.
B. Configure the NWLink frame type of the network adapters to be Ethernet
II.
C. Replace the network adapters with 10/100 BNC adapters.
D. Replace the network adapters with 10/100 UTP network adapters.
Answer: D
56. A user in your company network needs to encrypt a folder that is on
her Windows 2000 Professional computer. Her computer has two drives: Drive
C and Drive D. The folder that needs to be encrypted is located on Drive
D. When the user attempts to encrypt the folder, no option for encryption
can be found in the folder properties. What should you do to enable the
user to encrypt the folder?
A. Log on to her computer as an administrator, and then run the cipher/e
command.
B. Instruct the user to run the chipper/e command.
C. Log on to her computer as an administrator, and then run the
Secedit/enforce command.
D. Instruct the user to run the Secedit/enforce command.
E. Log on to her computer as an administrator, and then run the Convert
d:/FS:NTFS command.
Answer: E
57. You recently upgraded all Windows NT Workstation 4.0 computers to
Windows 2000 Professional. You want to give a new employee named Maria the
ability to back up files, share resources, and install programs on a
client computer that she shares with other users. You do not want Maria to
be able to read other users’ files. What should you do to accomplish these
goals? (Choose all that apply)
A. Add Maria’s user account to the system group.
B. Add Maria’s user account to the interactive group.
C. Add Maria’s user account to the power user group.
D. Add Maria’s user account to the administrators group.
E. Add Maria’s user account to the Backup Operators group.
Answer: C, E
58. You want to use Windows 2000 backup to perform a weekly backup of the
user data on a Windows 2000 Professional computer. You want to ensure that
the registry, boot files and COM plus objects are also backed up. What
should you do?
A. Configure the Windows backup to backup the system partition.
B. Configure the Windows backup to backup the system state data.
C. Create a script written in MS Visual Basic scripting addition language
to run rdisk.exe/s before back up starts.
D. Create the batch file to run rdisk.exe/s before the backup starts.
Answer: B
59. You are using Windows 2000 Professional on your desktop computer. You
are working on the company’s financial report and you want other users on
the network to able to modify your documents for the report. You want
users to share the financial report folder on the network. Because the
network contains confidential information you want to prevent users from
the enabling off line access for the network share that contains the
financial report. What should you do?
A. Use Windows Explorer to receive the offline files.
B. Using the Windows Explorer, disable the cache for the reports on the
network share.
C. Use the Windows NT explorer to grant the special access for the reports
on the network share.
D. Use the synchronization manager to configure synchronization not to
occur when users are connected to the LAN connection.
Answer: B
60. You install Windows 2000 Professional on your portable computer. You
create a new dial up connection to connect to your company’s remote access
server. You connect to the remote access server by using the dial up
connection. You can connect to the servers on the same segment as the
remote access server. You cannot access the shared resources that are on
the remote segments from the remote access server. What should you do?
A. Configure the company remote access server to accept multilink
connections.
B. Configure the TCP/IP program for the dial up connection to disable IP
header compression.
C. Configure the TCP/IP properties for the dial up connection to use the
default gateway on the remote network.
D. Grant your user account dial in permission on the company remote access
server.
Answer: C
61. You are delegated administrative control of graphics Organizational
Unit. You install Windows 2000 Professional on 25 PXE-compliant computers
in graphics Organizational Unit by using disk-duplicating software. The
reference computer was configured to have the Windows 2000 default desktop
settings. Users in the graphics Organizational Unit have home folders
specified in their user account settings. The home folders are located on
the \\server1\usersnetwork share. You want to change the default path of
the users my documents folder to their respective home folder whenever
users log on to the network. You want to accomplish this with least amount
of administrative effort. What should you do?
A. In the properties of the My Documents folder select move and define the
UNC path\\server1\users.
B. Reconfigure domain user account properties on the profile tab and
define the UNC path\\server1\users.
C. Enable a local computer policy to redirect the My Documents folder and
define the UNC path\\server1\users\%username%.
D. Create a group policy object of the graphics Organizational Unit to
redirect the My Documents folder and define the UNC path
\\server\user\%username%.
Answer: D
62. You are the administrator of you company network. A user named Peter
requests assistance in his Windows 2000 Professional portable computer.
Peter is preparing for his test and wants to optimize the battery life for
his portable computer. You want to configure Peter’s computer to save the
contents of memory on hard disk and then shutdown when Peter presses the
sleep button. What should you do?
A. Configure power settings to use the standard option.
B. Configure power settings to use the power off option.
C. Configure power settings to use the hibernate option.
D. Configure power settings to use always on power scheme.
E. Configure the computer to use the portable laptop power scheme.
Answer: C
63. You are the administrator of a Windows 2000 Professional computer that
has a shared printer. Several departments in your company use the shared
printer. The Sales department frequently prints multiple-page presentation
graphics, which take a long time to print. Users in other departments who
have short messages to print must wait an unnecessary long time for their
jobs to print. You want to improve the efficiency of printing for all
users who use the shared printer. You want to accomplish this with the
least amount of administrator effort. What should you do?
A. Configure the priority of the printer to 50. Add a new printer, and set
the priority to 1. For the new printer, deny print permission for users in
the Sales department.
B. Configure the priority of the printer to 50. Add a new printer, and set
the priority to 95. For the new printer, deny print permissions for users
in the Sales department.
C. Monitor the print queue, and raise the priority of all print jobs that
are sent by users who are not members of the Sales department.
D. Delete the old printer. Add a new printer, and set the priority to a
higher value. Pause the print queue only when graphic intensive print jobs
are printing.
Answer: B
64. You upgrade your computer from Windows NT Workstation to a Windows
2000 Professional computer. Your computer is a member of justtalks.com
domain. Prior to this upgrade your computer was configured by a system
policy to require at-least a 12 alphanumeric character password. After the
upgrade your computer will not apply security policy. What should you do?
A. Use secedit.exe to refresh the security policy.
B. Use the local computer policy to configure the local security policy.
C. Use security configuration and analysis to support the security files
as a .pol file.
D. Use computer management to configure the security policy setting.
Answer: B
65. You are the administrator of your company’s network. A user named Paul
in the service department has a Windows 2000 Professional computer. Paul
needs to access the files that are in a shared folder on his computer. A
local computer named Sales has all the data. Paul is the member of Sales
local group but he cannot access the file he needs. What should you do?
A. Grant Paul NTFS permission so that he can access any parent folder to
files in the shared folder.
B. Share the Sales folder and grant Paul shared folder permission to
access the shared Sales folder.
C. Remove Paul from any other group that has been explicitly denied access
to the Sales folder.
D. Delete the Sales local group and recreate, add individual user accounts
from Sales department back into Sales local group.
Answer: C
66. You want to configure a system to run both Windows NT Workstation and
Windows 2000 Professional. What should you do?
A. When installing Windows 2000 Professional run chkdisk in Windows NT
Workstation.
B. Disable the disk compression in Windows NT Workstation.
C. Install service pack four or later in Windows NT Workstation.
D. Install the distributed file system client on the Windows NT
Workstation.
Answer: C
67. You install Windows 2000 Professional on your portable computer. You
install an SCSI and PC card adapter, that you can use in the office to use
color scanner. You use a docking station for your computer when you are in
the office. You want to maximize the battery performance for your portable
computer. You also want to prevent the driver from loading whenever you
are away from the office. What should you do?
A. When away from the office use Device Manager to remove the adapter.
B. When away from the office configure the startup properties for the
adapter to be automatic.
C. Remove the computer from the docking station and start Windows 2000
Professional to disable the SCSI PC card adapter device for the current
profile.
D. Remove the computer from the docking station and start Windows 2000
Professional, use Device Manager to remove SCSI PC card adapter device.
Answer: C
68. You are the administrator of the desktop.com domain. You are
configuring a roaming user profile for a user named Paul West. You create
a user account named Paul West on the Windows 2000 server computer named
server 1. You define a network profile by entering the path
\\server1\profile\%username% in Paul’s user account setting. When Paul
logs on to a Windows 2000 Professional computer he sees the following
message. "Windows can not locate your roaming profile and is attempting to
log you on with your local profile which will not be propagated to the
server." The details of network cannot be found. You want to configure the
roaming user profile for Paul. What should you do?
A. Create a home folder for Paul.
B. Share the network profile directory.
C. Map a device to network profile directory.
D. Use the %username% variable to allow access.
Answer: B
69. You are the administrator of your company's network. A user named Tom
in the art department wants to update his Windows 2000 Professional
computer so that he can view graphics at the highest resolution. Tom
downloads a video card driver from the Internet and then asks of your
assistance in installing it. You are unsure of the source of driver. You
want to ensure that Tom does not loose productive time because of the
incompatible driver. What should you do?
A. Install the driver in the computer. Save after installing the driver.
Restart the computer, then use the last known good configuration to
recover the original driver.
B. Install the driver in the computer. Save after installing the driver,
use hardware troubleshooter then use Recovery Console to recover the
original driver.
C. Display the advance attributes a parallel works for video card driver
file. Install the file, if the contents have been secured.
D. Run file signature verification survey to verify that the driver has a
digital signature. Do not install otherwise.
Answer: D
70. You encrypt your files to ensure the security of the files. You want
to make a backup copy of the files and maintain their security settings.
You have the option of backing up to either the network or floppy disk.
What should you do?
A. Copy the files to a network share on a NTFS volume and do nothing
further.
B. Copy the files to a network, shared on a NTFS 32 volume and do nothing
further.
C. Copy the files to a floppy disk that has been formatted by using
Windows 2000 Professional.
D. Replace the files in an encrypted folder, and then copy the folder to
floppy disk.
Answer: A
71. You are the administrator of your company’s network. You install
Windows 2000 Professional on 10 computers in the graphics department. The
10 computers have built in USB controllers. You physically install a USB
tablet pointing device on each computer. You install the 32MB manufacturer
tablets software on each computer. A tablet icon appears in the central
panel to configure the device but the device does not work. You want USB
tablets to work on 10 computers. What should you do?
A. Enable the USB ports in the BIOS and reinstall the USB tablet device
drivers.
B. Enable the USB root hub controller and reinstall the USB tablet device
driver.
C. Disable the USB error detection for the USB root hub controller and
enable USB tablet device in hardware profile.
D. Reinstall the USB device drivers and disable the USB error detection.
Answer: A
72. You need to install Windows 2000 Professional on a new computer in
your network. You use the setup manager wizard to configure a fully
automated installation script file. You begin an unattended installation
and leave the office. When you return, the installation has reached the
GUI-mode setup and you see the following error message: “Unattended setup
is unable to continue because a setup parameter specified by your system
administrator or computer manufacturer is missing or invalid.” You need to
complete the installation. What must you do?
A. In the unattended section of the answer file, set the OemPreinstall
property to Yes.
B. In the NetBinding section of the answer file, specify the enable
variable.
C. In the UserData section of the answer file, specify the ProductID
variable
D. In the GUIUnattended section of the answer file set the OemSkipWelcome
property to 1.
Answer: C
73. You use a Windows 2000 Professional computer at home. You need to
access shared files on a server named server1. This server is on your
company's network and is not accessible from the internet. Your company's
network also includes a third party VPN server that is accessible from the
internet. You dial in to your internet service provider and then create a
VPN connection to your company's VPN server. After the connection is
successfully established, you run the net view\\server1 command and
receive the following error: "the server is inaccessible or could not be
found". You need to access the shared files on server 1. What should you
do?
A. Stop and then start the TCP/IP NetBIOS helper service on your computer.
B. Stop and then start the DNS client service on your computer.
C. Add a HOSTS entry for server1 to your computer.
D. Add a LMHOSTS entry for server1 to your computer.
Answer: D
74. You are the administrator of a small server based network. While
installing Windows 2000 Professional on your computer, you configure the
network adapter card for each computer to use TCP/IP and assign static IP
setting information. During installation the setup detects and installs
the 10/100 Mbps UTP only network adepter card on computers 6 and 8 and 10
Mbps/UTP combination adapter card on the other 7 computers. You accept the
default settings for the network adapter card and finish installing the
network adapter card. All computers are connected to 10/100 switch that
has category 5 UTP cabling. After installation you find that computer 6
and 8 can communicate with each other. You want all 9 computers on your
network to be able to communicate with each other. What should you do?
A. Configure the 10/100 switch to transfer only at the 100 Mbps rate.
B. Configure 10/100 MBPS network adapter card to switch all the computers
at 10 Mbps rate.
C. Change the combination network adapter card to use the BNC transceiver
setting.
D. Change the combination network adapter card to use the UTP transceiver
setting.
Answer: D
75. Your routed TCP/IP network consists of 10 Windows 2000 Server
computers and 75 Windows 2000 Professional computers. Your network uses
TCP/IP as the only network protocol. You are installing 10 new Windows
2000 Professional computers. You want to enable the new computers to use
NetBIOS names to connect to all shared resources as the network. You
configure a TCP/IP address and a subnet mask on each new computer. Which 2
additional TCP/IP properties should you configure on each new computer?
(Choose two)
A. The bindings.
B. A DNS address.
C. A Gateway address.
D. A WINS server address.
E. A DHCP server address.
Answer: C, D
76. You are the administrator of a Windows 2000 Professional computer that
is shared by several users in the Sales department. User accounts have
been created for current users. Current users can log on to the computers.
To accommodate new users, you add two new user accounts named User7 and
User8 to computer5. When user7 attempts to log on o the computer, she
receives the following error message: "Windows cannot copy file
C:\Documents and Settings\Default User\ to location C:\Documents and
Settings\User7. Contact you network administrator. Detail – Access is
denied." When User8 attempts to log on to the computer, he receives the
same type of error message. You want to allow the two new users, as well
as other users in the Sales department, to be able to log on to the
computer. Which two methods can you use to accomplish your goal? (Choose
two.)
A. Add the User7 and User8 user accounts to the DACL for the Profiles
shared folder on the network server.
B. Add the User7 and User8 user accounts to the DACL for the C:\Documents
and Settings\Default user folder.
C. Add the Everyone group to the DACL for the C:\Documents and
Settings\Default user folder.
D. Add a group Policy object (GPO) for the Sales OU that redirects user
profiles to a shared folder.
E. Log on by using the local Administrator account and create new folders
for User7 and User8 in the C:\documents and settings folder.
F. Select the allow inheritable permissions from parent to propagate to
this object option on the C:\Documents and Settings\Default user folder,
and reset the permissions on all child objects.
G. Move and retain permissions and compressions.
Answer: C, F
77. You are the administrator of your company’s network. You network has
five Windows 2000 server computers and 75 Windows 2000 Professional
computers. The Windows 2000 Professional computers were installed by using
a RIS image on one of the Windows 2000 Server computers. You need to
upgrade several applications on the Windows 2000 Professional computers.
The applications do not have built-in support for scripted installations.
You want to accomplish the following goals:
An unattended installation of the upgraded applications will be performed
on the Windows 20000 Professional computers.
Existing user environments will be maintained on the Windows 2000
Professional computers.
The network name of each Windows 2000 Professional computer will be
changed to match its asset tag.
The RIS image and the upgraded applications will be enabled as they are
added to the network.
You take the following actions:
Install the RIS image on a Windows 20000 Professional computer named
Computer1.
Install the upgraded applications on Computers1.
Change the network name of Computer1 to %DMI-SERIAL_NUM%.
Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server.
Start all of the Windows 2000 Professional computers, and then load the
RIS image from the RIS server.
Which result or results do these actions produce? (Choose all that apply.)
A. An unattended installation of the upgraded applications will be
performed on the Windows 20000 Professional computers.
B. Existing user environments will be maintained on the Windows 2000
Professional computers.
C. The network name of each Windows 2000 Professional computer will be
changed to match its asset tag.
D. The RIS image and the upgraded applications will be enabled as they are
added to the network.
Answer: A, D
78. You want to install Windows 2000 Professional on 30 PXE-compliant
computers and 35 Non-PXE-compliant computers. All 65 computers are
included on the current hardware compatibility list (HCL). You create a
RIS image. You load the image on the RIS server. You then start the 65
computers. You find that the 30 PXECompliant computers can connect to the
RIS server. However, the 35 Non-PXE-compliant computers fail to connect to
the RIS server. What should you do?
A. Run Rbfg.exe to create a Non-PXE-compliant startup disk.
B. Run Riprep.exe to create a Non–PXE complaint startup disk.
C. Grant the Everyone group NTFS Read permission for the RIS image.
D. Grant the Administrators group NTFS Read permission for the RIS image.
Answer: A
79. You are administering a Windows 2000 Professional, single Pentium II
400Mhz processor computer. You need to install a new accounting software
application. The software manufacturer recommends that you use a
dualprocessor configuration. First, you install a second identical
processor in your computer. You need to ensure that you will be able to
install the new software. What should you do next?
A. Update the HAL to support multiple processors.
B. In Device Manager, disable the direct memory access controller.
C. Use the Add/Remove Hardware Wizard to detect and install the driver for
the new processor.
D. Reinstall Windows 2000 Professional to support a multi-processor
configuration.
Answer: A
80. You want to configure your Windows 2000 Professional computer to
remotely access your company's Windows 2000 routing and remote access
server. You configure a VPN connection. For security purposes, you
configure the VPN connection to use MS-CHAP v2 only and to require
encryption. You also configure TCP/IP to obtain an IP address
automatically, to enable IPSec, and to set IPSec to secure server. When
you try to connect, you receive the following error message: "The
encryption attempt failed because no valid certificate was found." What
should you do to connect to the server?
A. Enable the VPN connection to use MS-CHAP.
B. Change the data encryption setting to Optional Encryption.
C. Specify a TCP/IP address in the network properties.
D. Change the IPSec policy setting to Client.
Answer: D
81. You are the administrator of your company network. You purchase 75 new
Windows 2000 Professional computers that will be shared by the users in
graphic organizational unit. All the computers are configured identically.
You want the users to be able to maintain their individual desktop
settings regardless of which computer to use. You want to accomplish this
with the least amount of administrative effort. What should you do?
A. Configure each computer to join a workgroup. Create a user account and
a local profile for each user.
B. Configure each computer to join a work group. Create a domain user
account that uses roaming user profiles.
C. Configure each computer to join the domain. Create a user account for
each user on a domain controller.
D. Configure each computer to join the domain. Create a domain user
account that uses a roaming user profile.
Answer: D
82. You upgrade all client computers in your network to Windows 2000
Professional. Then you apply the basicwk.inf security template to the
computers. Now, none of the users can run the company's database
application. What should you do?
A. Apply the compatws.inf security template to the computers.
B. Delete the basicwk.inf security template file from the computers.
C. Use the system policy editor to configure a new security policy for the
database application.
D. For each user account, allow read permission to the database
application and in associated files.
Answer: A
83. You are the administrator of your company’s network. You configure a
local group named accounting to have a mandatory user profile. The
mandatory profile has been configured to include a custom logo that was
saved with 16-bit color and 1024x768 resolution. Some of the Windows 2000
Professional computers in the accounting department have standard VGA
video adapters, and others have SVGA video adapters. Several users report
that when they log on to certain Windows 2000 Professional computers, the
custom bitmap becomes very pixilated and distorted, and does not reflect
the proper color depth. You want users to be able to correctly view the
custom bitmap on any computer in the accounting department. What should
you do?
A. Configure a roaming user profile for each user in the accounting group.
B. Configure a separate user profile for each user in the accounting
Group.
C. Change the custom bitmap to a 16-color bitmap that has 640x480
resolution, and reconfigure the mandatory user profile.
D. Reinstall the appropriate WDM-compliant drivers for the computers that
do not display the custom bitmap correctly.
Answer: C
84. You purchase a USB board, ISDN terminal adapter for your Windows 2000
Professional portable computer. You plug the device in to the USB port.
Plug and Play fails to detect the new device. You test the device on a
Windows 2000 Professional desktop computer. You find that plug and play
correctly detects the device. You want to resolve the problem so that you
can use ISDN terminal adapter on your portable computer. What should you
do?A. Use the Device Manager to enable the USB manager root hub.
B. Use the Device Manager to enable the USB host controller in the current
hardware profile.
C. Contact the hardware manufacturer to obtain the upgrade for the Plug
and Play BIOS.
D. Turn off the computer plug in the ISDN terminal host adapter and
restart the computer.
Answer: C
85. You are the administrator of your company's network. You attempt to
install a printer driver on a Windows 2000 computer for a user Linda. You
receive the following error message: “Error 11-Cannot install printer
driver.” The driver was originally downloaded from the printer
manufacturer’s web site. You have successfully used the driver in the past
on their Windows 2000 Professional computers. You want to configure
Linda’s computer to check for driver integrity and to allow you to install
this printer driver. What should you do?
A. Configure driver signing to display a message before installing an
unsigned driver.
B. Configure driver signing to ignore File Signature Verification. Create
a Local Computer Policy to enable Windows file protection.
C. Use the Add Printer driver wizard to install the driver. Create a local
computer policy to enable Windows file protection.
D. Use the print troubleshooter. Configure the computer to prevent the
installation of unsigned drivers.
Answer: A
86. A user named Tom reports that applications on his Windows 2000
Professional computer are running slowly. You notice that Tom’s computer
has 64 MB of RAM and 100 MB free disk space. Which method can you use to
improve performance? (Choose all that apply)
A. Add Tom to the power users group.
B. Set the total paging file to 75 percent of physical memory.
C. Perform a disk analysis, and use the disk defragmenter, if recommended.
D. Use disk cleanup to delete temporary files and unnecessary program
files.
E. Ensure that the performance options Window is optimized for background
services.
Answer: C, D or D (please confirm it)
87. You are the administrator of a Windows 2000 Professional computer. You
schedule a task to run after 15 minutes. One hour later, the task still
has not run. You notice that your Event Viewer system log has the
following error message: "The task scheduler service failed to start due
to following error. The service did not start due to login failure." You
want to run the scheduler task again. What should you do before restarting
the task scheduler service?
A. Set the task scheduler service to log on using a local system account
B. Set the task scheduler service to allow the service to interact with
the desktop
C. Restart the remote producer call (RPC) service.
D. Log off and then log on to an account in power users group.
Answer: A
88. You install a SCSI adapter and a SCSI tape drive on your Windows 2000
Professional computer. You start the computer and Windows 2000
Professional detects and installs drivers for the new SCSI devices. Later
the same day, you restart your computer. During the startup process, the
computer stops loading Windows 2000 Professional. You then restart the
computer and it stops again. You want to enable your Windows 2000
Professional computer to start successfully. What should you do?
A. Start the computer in Safe Mode. Enable driver signing.
B. Start the computer in Safe Mode. Use Device Manager to remove the SCSI
tape device.
C. Start the computer by using the Recovery Console. Repair the Master
Boot Record by using the fixmbr command.
D. Start the computer by using the Recovery Console. Disable the SCSI
adapter device driver by using the disable command.
Answer: D
89. You want to configure your Windows 2000 Professional portable computer
to use offline files. The files that you want to access offline include a
large project file and some smaller personal files. Your portable computer
is configured to connect to the network by using the dial up connection at
scheduled times during day to automatically download your e-mail messages.
You do not want to synchronize the project file when you connect to the
network using the dial-up connection. What you should do?
A. Configure the synchronization settings to perform a quick
synchronization.
B. Configure the synchronization settings to ask you before synchronizing
items.
C. Configure the synchronization settings to synchronize the project file
only when using the LAN connection. Set synchronization for the personal
files for both the LAN connection and your dial-up connection.
D. Set the synchronization settings to synchronize the project file only
when you log off the network. Set synchronization for the personnel files
for both the LAN and dialup connection for logging on and logging off.
Answer: C
90. You installed an updated device driver for a zip drive on a Windows
2000 Professional computer. You restart the computer. During the startup
process, the computer stops responding. You then restart the computer in
the Safe Mode. During the startup process, the computer stops responding
again. You suspect the new device driver is causing the problem. You want
to resolve the problem so that the computer starts successfully. What
should you do? (Choose all that apply)
A. Use the listsvc command to disable the zip device driver.
B. Use the disable command to disable the zip device driver.
C. Select Recovery Console from the repair menu.
D. Select the debug mode from the Windows 2000 advanced options menu.
E. Insert emergency repair disk.
F. Specify the path to the recovery file on the hard disk.
G. Start the computer by using the Windows 2000 Professional CD-ROM.
Answer: B, C, G
91. Five of your company's employees have Windows 2000 Professional
portable computers. The employees use their portable computers in a
network enabled docking station when they are at their desks. When the
employees are working outside of the office, they use the portable
computers without network connectivity. You have just installed wireless
PC card network adapters in the portable computers so that the employees
can access the network when they are in the conference rooms in the office
building. You need to configure the portable computers for optimum
performance in all of the working environments. What should you do?
A. Configure the wireless PC card network adapters to use DHCP to obtain
their IP addresses.
B. Configure three different hardware profiles on each portable computer.
C. Configure the wireless PC Card network adapters to use Automatic
Private IP Addressing when they cannot detect a DHCP server.
D. Instruct each employee to unplug the wireless PC card network adapter
whenever the portable computer is attached to a network-enabled docking
station.
Answer: B
92. You are the administrator of your company’s network. A user named
Peter runs Windows 2000 Professional on his portable computer. Peter wants
to be able to work at home on files that were created in the office on the
company network. Prior to logging off the network and leaving the office,
Peter enables offline files. Peter calls you from home and reports that
copies of his folders and files on the network are not available on his
portable computer. What should you instruct Peter to do?
A. Enable file and print sharing. Peter will be able to access his files
at home immediately.
B. Synchronize all offline files. Peter will be able to access his files
at home immediately.
C. At the office, make all files available offline. Peter will be able to
access his files the next time he logs off the network.
D. At the office, create a shortcut to the Offline Files folder. Peter
will be able to access his files the next time he logs off the network.
Answer: C
93. You are the administrator of a Windows 2000 network. You need to store
secured files for your company's accounting and legal departments on a
Windows 2000 Professional computer.
You want to accomplish the following goals:
• Enable users in both departments to access their own files from the
network
• Enable users in the accounting department to view the legal accounting
department’s documents
• Prevent users in the legal department from being able to view the
accounting department’s documents
• Enable managers within the company to access and modify both the
accounting and the legal department’s files
You take the following actions:
• Create two shared folders named Accounting and Legal
• Create three groups named Accounting, Legal, and Management
• Allow the accounting group modify permission on the Accounting folder
• Allow the legal group modify permissions on the legal folders.
• Allow the management group modify permission on both the accounting and
legal folders.
Which result or results do these actions produce? (Choose all that apply)
A. Users in both departments can access to their own files from the
network.
B. Users in the accounting department can view the legal accounting
department’s documents.
C. Users in the legal department cannot view the accounting department’s
documents.
D. Company managers can access and modify both department’s files.
Answer: A, C, D
94. On a Windows 2000 Professional computer, you run a shipping
application that prints packing labels to a laser printer for every
outgoing shipment, 24 hours per day. During peak hours, your company ships
more than 1,000 packages per hour. You have just purchased a second
identical laser printer to aid in printing. You want to configure the
printers so that the jobs are load balanced. You connect the second laser
printer to the computer. What must you do next?
A. Enable bi-directional support.
B. Enable printer pooling.
C. Configure print spooling.
D. Configure print sharing.
Answer: B
95. You are responsible for migrating client computers from Windows 98 and
Windows NT Workstation 4.0 to Windows 2000 Professional. You have
installed Windows 2000 Professional and reinstalled the necessary
applications on 10 computers. You have returned these computers to their
users. The users of these computers report that their word processing
application will not start. What should you do?
A. Set the permissions on the application to execute.
B. Add the application to the urn key in the registry.
C. Apply the Securews.inf security template on the users’ computers.
D. Apply the Compatws.inf security template on the users’ computers.
Answer: D
96. Your Windows 2000 Professional computer contains a single hard disk
configured as a single partition. You want to move a folder named Sales
under a folder named CORP on your computer. You want the files in the
Sales folder to remain compressed after moving the folder. You want the
files in the CORP folder to remain uncompressed. You want to ensure that
files are recoverable in case of any disk problems. You also want to move
the files with the least amount of administrative effort. What should you
do?
A. Copy the Sales folder to the Corp folder. Do nothing further.
B. Backup the Sales folder. Move the Sales folder to the CORP folder.
C. Compress the CORP folder then copy the Sales folder to the CORP folder.
D. Move the Sales folder to a second computer then move the Sales folder
to the CORP folder.
Answer: B
97. You install a new USB scanner on a Windows 2000 Professional computer.
Two weeks later, the user of the computer informs you that when he scans
images with the scanner, the colors do not display correctly. When he
prints the scanned images, the colors print correctly. You need to ensure
that the scanned images display the correct colors. What should you do?
A. In scanners and cameras in control panel, remove the color management
profile.
B. In the display properties in control panel, set the Windows color
scheme to Windows standard.
C. In the advanced properties of the display properties in control panel,
remove all color management profiles.
D. In the display properties in control panel, increase the colors
setting.
Answer: C
98. From your Windows 2000 Professional computer, you need to print from a
16-bit accounting application to a network printer named Printer02.
Printer02 is attached to a print server named PrtSrv. The accounting
application allows you to print only to a local LTP port. You currently
have two printers attached to your local LPT1 and LPT2 ports. You need to
be able to print to the network printer and to both local printers. You
install the driver for the network printer on your computer. What must you
do next to enable printing on the network printer?
A. Create a new local printer port named PrtSrv\Printer02, and configure
the printer to use the new port.
B. Create a new local printer port named PrtSrv\Printer02. In the
properties for the new port, select the option to print directly to the
printer. Configure the printer to use the new port.
C. Run the net use Lpt3 \\PrtSrv\Printer02 command.
D. Run the net print\\PrtSrv\Printer02 command.
Answer: C
99. You are the administrator of your company's network. A use named
Michael has limited dexterity, which prevents him from using a standard
keyboard to complete his daily computing tasks. You want to configure his
Windows 2000 Professional computer to use the appropriate accessibility
options. You logon to Michael’s computer by using Michael’s user account,
which is a member of local users group. You configure the stickykeys,
filterkeys and togglekeys options. You then log off. Michael logs on to
the computer by using this user account. Michael is able to use the
accessibility option that you have configured. However, when he returns
from lunch, the accessibility options are automatically turned off. What
should you do?A. Use Accessibility Options in control panel to reconfigure
accessibility idle time settings.
B. Use Accessibility Options in control panel to enable the filterkeys
option to reconfigure the time setting.
C. Use Utility Manager to configure the accessibility options to start
automatically when Windows 2000 Professional loads.
D. Use Utility Manager to increase accessibility idle time setting for
Michael’s accessibility options, and save the settings.
Answer: A
100. You are the administrator of your company’s network. A user named
Lilly prints dozens of documents daily from her Windows 2000 Professional
computer. Lilly reports that she receives a dialog box announcing that
each print job she sends has printed successfully. Lilly’s default printer
is a shared printer that is connected to Windows 2000 Server computer. She
wants to have this notification turned off because she has so many
documents. What should you do?
A. In the server properties of the printer system folder, clear the Notify
when remote documents are printed option.
B. In the server properties of the printers system folder, clear the
notify computer, not user, when remote documents are printed option.
C. In the default printer properties, select the Ports tab, and clear the
Enable bidirectional support option.
D. In the default printer properties, select the Advanced tab, and clear
the advanced printing features option.
Answer: A
101. You install Windows 2000 Professional on your portable computer. You
use a docking station for your portable computer when you are in the
office. You install an ISA-based SCSI adapter in your docking station. You
insert your computer into the docking station and start the computer. The
SCSI adapter is not detected during the startup process. You start
Add/Remove hardware wizard. When the wizard process is finished, the SCSI
adapter is not listed. You want to allow Windows 2000 Professional to
detect SCSI adapter. What should you do?
A. Restart the Add/Remove hardware wizard. Manually add SCSI adapter
driver.
B. Restart the computer in Safe Mode. Restart Add/Remove Hardware wizard
to detect the SCSI adapter.
C. Configure Windows 2000 Professional to use driver signing. Restart the
Add/Remove Hardware wizard to detect the SCSI adapter.
D. Copy the SCSI adapter drivers to WinNT\driver CACHE\i386 folder.
Restart the Add/Remove Hardware wizard to detect SCSI adapter.
Answer: A
102. You are delegated administrative control of the administration
organizational unit. The administration OU has 12 Window 2000 Professional
computers that were recently purchased. Each computer has a Fax Modem.
Each computer has the fax service installed with default values and
settings. A user named Helene reports that she can use Microsoft Word 2000
to send faxes, but she cannot receive any faxes by using the fax printer.
She also informs you that she cannot reconfigure the fax service on her
computer. You want to reconfigure fax service correctly. You want to
accomplish this with least amount of administrative effort. You logon to
Helene’s computer by using local administrator account. What should you do
next?
A. Use Fax service management to start the fax service, and configure the
fax service to start automatically.
B. Use Fax service manger to select the fax management service, and enable
the device to receive faxes.
C. Use Fax in control panel to reinstall the fax service, and configure
the fax services to receive faxes.
D. Use Fax in control panel to add a fax printer, and configure the fax
print device to receive faxes.
Answer: B
103. Your company upgrades its network to 100 Mbps. You remove the old
network adapter and install a new 10/100 Mbps network adapter into a
Windows 2000 Professional computer. You configure the TCP/IP protocol
settings to be the same as they were for the previously installed network
adapter. When you restart the computer, however, you cannot access the
network. You try to ping your network adapter’s TCP/IP address locally.
You receive the following error message, “Request timed out ” Next, you
try to ping 127.0.0.1 and receive the same error message. What must you
do?
A. Configure a different TCP/IP address.
B. Enable DHCP in the TCP/IP properties.
C. Enable DNS in the TCP/IP properties.
D. Configure the network adapter to run at 100 Mbps only.
E. Replace the network adapter.
Answer: E
104. From your Windows 2000 Professional computer, you need to map drive G
to the default administrative share on drive C of a server named AppSrv.
What can you do to map the drive?
A. Run the net share C$=G:\ command.
B. Run the net use G: \\AppSrv\C$ command.
C. Browse to AppSrv in Windows Explorer, and map drive G to the C$ share.
D. Browse to AppSrv in My Network Places, and map drive G to the C$ share.
Answer: B
105. You are the administrator of a Windows 2000 network. You install
Windows 2000 Professional on a new computer and configure the TCP/IP
settings to have a static IP address. While testing network connectivity
from the new computer, you discover an error in the DNS server address
that is configured in the TCP/IP settings. You configure the correct DNS
server address, which is 10.1.1.5. However, you are still unable to
successfully connect to network resources by name. You run the
IPconfig/all command. The results indicate that the DNS server address is
now configured as 0.0.0.0 You need to ensure that the computer can connect
to network resources by name. What should you do?
A. Stop and restart the DNS client service.
B. Add 10.1.1.5 to the DNS server list on the TCP/IP advanced properties
tab.
C. Add an A (host) record for the computer to the DNS server’s zone file.
D. Configure your DHCP server to have a DNS server address of 10.1.1.5.
Answer: A
106. You want to connect to your company network from your Windows 2000
Professional computer at home. You have an ISDN line that is used for
Internet connectivity. You create a VPN connection and are able to connect
successfully to the company network. While connected to the company
network, you are unable to access the Internet. What must you do so that
you can access the Internet?
A. Configure the ISDN connection to use SLIP instead of PPP.
B. Select the Enable Internet Connection Sharing for this connection check
box in the ISDN connection properties.
C. Clear the Use default gateway on remote network checkbox.
D. Install and configure the SAP Agent service.
Answer: C
107. A folder on your Windows 2000 Professional computer contains bitmap
files that have been compressed from 2MB to 1MB. You want to copy one of
the compressed bitmap files from the hard disk to 1.4-MB floppy disk. When
you attempt to copy, you receive the following error message ‘Destination
drive is Full’. What should to do?
A. Move, rather than copy, the compressed bitmap file to the floppy disk.
B. Reformat the floppy disk. Then copy the compressed bitmap file to the
floppy disk.
C. Use another program to compress the bitmap file before copying it to
the floppy disk.
D. Copy an empty compressed folder to the floppy disk. Then copy the
compressed bitmap file to the folder on the floppy disk.
Answer: C
108. You are the administrator of a Windows 2000 Professional computer
named computer1. Computer1 has a shared color laser printer named
printer1. Printer1 will not turn on. The printer queue for printer1 has
three jobs waiting to print. You want to enable the three waiting print
jobs to print to an identical print device, which has been shared as
printer2 on computer2. You also want to connect users who currently
connect to printer1 to automatically use printer2 without having to
reconfigure their default printer. What should you do?
A. Enable bidirectional support for printer1.
B. Change the share name of printer2 to printer1.
C. Configure printer1 to add a port, and set the port to
\\computer2\printer2.
D. Configure the printer server properties to use the path
\\computer2\$winnt$\system32\spool\printers.
Answer: C
109. You are upgrading computer1 to computer2 from Windows NT Workstation
4.0 to Windows 2000 Professional. You successfully upgrade the computer1.
During the upgrade of computer2, a series of power outrages interrupts the
upgrade. You discover that upgrade of computer2 is incomplete.
Furthermore, you find that computer2 can no longer run Windows NT
workstation 4.0. Computer2 does not support booting from Windows 2000
Professional CDROM. You decide to use computer1 to help recover the failed
upgrade. What should you do?
A. On computer1, copy the CD-ROM driver and system files named ntdetect,
ntbootdd.sys, Ntdll.dll and Setupldr.bin to a formatted floppy disk. On
computer2, restart the computer by using the floppy disk. Then run
WinNT32/debug from the Windows 2000 Professional CD-ROM.
B. From computer1, copy the CD-ROM driver and system files named Ntdetect,
Ntbootdd.sys, Ntdll.dll, and Setupldr.bin to a formatted floppy disk. On
the computer2, restart and upgrade by using the floppy disk. Then run
WinNT32/rx from the Windows 2000 Professional CD-ROM.
C. On the computer1, run Makebt32.exe from the Bootdisk folder on the
Windows 2000 Professional CDROM. On computer2, restart the upgrade by
using the newly created floppy disks.
D. On computer1, perform a remote installation from a network share. On
computer2, when the text portion of setup has completed, resume the
installation by using the Setup Manager.
Answer: C
110. You want to connect your Windows 2000 Professional computer to
multiple TCP/IP subnets on your company's network. Your computer currently
has an ISA network adapter installed. You install a second ISA network
adapter. After you restart your computer, you notice that the second ISA
network adapter is not functioning. What should you do?
A. Set the driver signing option to block.
B. Set the driver signing option to ignore.
C. In the computer’s BIOS, reserve an unused IRQ for ISA devices.
D. In the Device Manager, configure the second ISA network adapter to use
an unused IRQ.
Answer: D
111. You are creating a shared Internet connection on your Windows 2000
Professional computer. You want to enable other computers on the LAN to be
able to access only HTTP and FTP sites on the Internet. What should you
do? (Choose all that apply)
A. Configure your shared Internet connection to disable LCP extensions.
B. Configure your shared Internet connection to disable on-demand dialing.
C. Create an Internet connection sharing application type for HTTP to use
remote server for port 25.
D. Create an Internet connection sharing application type for HTTP to use
remote servers port 80.
E. Create the Internet connection sharing application type for FTP to use
remote server port 21.
F. Create an Internet connection sharing application type for FTP to use
remote server port 72.
Answer: D, E
112. You have just added three new hard disks to your Windows 2000
Professional computer. You want to configure all of the disks as two
drives. You want the two drives to be as equal in size as possible. You
want to configure the non-system drive for the best optimal performance.
What should you do?
A. Extend the system volume onto disk1. Create a single, stripe volume
from disk2 and disk3.
B. Extend the system volume onto disk2. Create a single, stripe volume
from disk1 and disk2.
C. Extend the system volume onto disk1. Create a single, spanned volume
from disk2 and disk3.
D. Extend the system volume onto disk1. Create a single, spanned volume
from disk1 and disk2.
E. Create a single, stripe volume from disk1, disk2, and disk3.
F. Create a single spanned volume from disk1, disk2, and disk3.
Answer: A
113. You are the administrator of a Windows 2000 network. Your network
includes 75 Windows NT Workstation 4.0 computers. You are adding 50 new
PXE-compliant computers to the network. The hardware on each computer is
configured identically. You are using a RIS image to deploy Windows 2000
Professional to the 50 computers. You successfully install Windows 2000
Professional on the first 10 computers. However, you cannot install
Windows 2000 Professional on remaining 40 computers. What should you do?
A. Configure the DHCP scope to add additional IP addresses.
B. Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.
C. Modify the startup sequence in the CMOS of the remaining computers.
D. Create computer accounts on the remaining computers in the active
directory.
Answer: A
114. You are the administrator of your company’s network. Ten Windows 2000
Professional computers are located in research department. The computer
contains highly confidential information. You want the 10 computers to be
able to communicate with other Windows 2000 Professional computers on the
network. However, you do not want them to communicate with computers that
are not running Windows 2000, including those that are running Windows 95,
Windows 98 and Windows NT. You want to configure a security policy on each
computer to ensure that the confidential information is secure. What
should you do?
A. Use security configuration and analysis to import the Hisecws.inf
security template file to modify the default security settings.
B. Use security templates to create a security template file and import
the security settings to modify the default security settings.
C. Use the local computer policy to disable the access this computer from
the network option.
D. Use Secedit.exe to reconfigure the computer default security settings
to not allow anonymous access to the computer.
Answer: A
115. You upgrade 11 computers in the accounting department from Windows NT
Workstation 4.0 to Windows 2000 Professional. All of the upgraded
computers are configured to have the default security settings. After the
upgrade, users in the accounting department report that they can no longer
run any financial or credit applications on their computers. You want all
accounting department users to be able to run these applications. You want
to allow only the rights that allow users to run the applications. What
should you do?
A. Add each user account to the Power Users group on that user’s computer.
B. Configure the financial and credit applications to run as services on
the computers in the accounting department.
C. Apply the Compatws.inf security template to the local security policy
of the computers in the accounting department.
D. Use the computer management console to configure separate memory spaces
for each financial and credit application on the accounting department
computers.
Answer: C
116. You are the administrator of your company’s network. The dial-up
server on your network is configured to support certificate
authentication. A user names Tom wants to use smart card authentication on
his Windows 2000 Professional portable computer. You verify that the Toms
computer has a PC card smart card reader and the appropriate driver
installed. You give to Tom a smart card to use. What else should you do to
enable smart card authentication on Tom’s computer?
A. Configure a dial-up connection to use EAP. Select the smart card device
for authentication.
B. Configure a dial-up connection to use SPAP. Select the smart card
device for authentication.
C. Configure a dial-up connection to use certificate authentication.
Enable the users credentials for authentication.
D. Configure a dial-up connection to connect to a private network through
the Internet. Enable L2TP to create a virtual private network (VPN)
tunnel.
Answer: A
117. Your Windows 2000 Professional computer belongs to the contoso.com
domain. You need to encrypt a compressed file named C:\DATA. You
successfully encrypt the file but discover that it is not longer
compressed. hat is the most likely cause of this problem?
A. A group policy is preventing the compression of encrypted files.
B. The file is stored on a FAT32 partition.
C. Only members of the administrators and the power users groups can
compress and encrypt files.
D. Encrypted files cannot be compressed.
Answer: D
118. You are the administrator of your company’s network. An employee
named Mark is leaving the company. A new employee named Eric has been
hired to replace him. Mark has a local user account on Windows 2000
Professional computer. Mark has rights to multiple files and folders on
the computer. You want Eric to have the same rights and permissions that
Mark has. You want to ensure that Mark will no longer have access to the
files and folders. You want to accomplish this with least administrative
effort. What should you do?
A. Rename Mark’s user account to Eric and change the account password.
B. Create Eric’s account by copying Mark’s profile to Eric’s account.
Delete Mark’s account.
C. Create Eric’s account by copying Marks account. Delete Mark’s account.
D. Delete Mark’s account. Add Eric’s account. Add Eric to the same groups
to which Mark belonged. Grant Eric to all the individual user rights and
permissions that Mark had.
Answer: A
119. Users report that some shortcuts on the start menu of their Windows
2000 Professional computers are hidden. They want to access their
shortcuts without having to click a scroll arrow. How must you configure
the client computers to always display all Start menu shortcuts?
A. In the folder options dialog box, clear the enable web content check
box in My Desktop Properties.
B. In the display properties dialog box, clear the transaction effects for
menus and tool tips check box.
C. In the folder options dialog box, clear the hide file extensions for
known file types check box.
D. In the Taskbar and Start Menu Properties dialog box, clear the Use
Personalized Menus check box.
Answer: D
120. You are the administrator of your company’s network. Your company is
based in Russia and conducts the majority of its business in Russian.
Users in your company create, view, and edit documents in English (US),
French, and Spanish to communicate with vendors internationally. Users run
the Russian localized edition of Windows 2000 Professional on their
desktop and portable computers. A user named Katrin wants to create word
processing documents in both English and Spanish by using Notepad in
Windows 2000 Professional. She requests your assistance in enabling
English and Spanish on her computer. What should you do?
A. Instruct Katrin to select the desired input locale for either English
or Spanish within Notepad.
B. Instruct Katrin to select the input locale indicator on the taskbar and
select either English or Spanish.
C. Instruct Katrin to use Regional Options in Control Panel to add input
Locales and keyboard layouts/IME for both English and Spanish.
D. Create a Local Computer Policy for Katrins computer to include both
English and Spanish.
Answer: C
121. Your desktop computer has Windows 2000 Professional installed. You
create a new dial-up connection to connect to the Internet. You configure
the Internet connection to enable Internet Connection Sharing. After you
configure the connection, you cannot see or connect to any shared
resources. You want your computer to be able to connect to shared
resources. What should you do?
A. Configure the dial-up connection to disable shared access.
B. Configure the dial-up connection to disable on-demand dialing.
C. Disable data encryption in the new dial-up connection.
D. Use the ipconfig command to release and renew your network TCP/IP
address.
Answer: D
122. You are the administrator of the Coho Vineyard network. The network
consists of 10 Windows 2000Advanced Server computers and 250 Windows 2000
Professional computers. Your company has two domains cohovineyard.com and
westcoastsales.com. The company's intranet site is on a Windows 2000
Advanced Server computer named ServerA. ServerA is in the cohovineyard.com
domain and is running Internet Information Services and Microsoft Proxy
Server2.0 You want to configure the Windows 2000 Professional computers in
the westcoastsales.com domain to access the intranet site. You want users
to be able to connect to the intranet site by using the URL http://serverA
rather than its fully qualified domain name. What should you do?
A. Add cohovineyard.com to the domain suffix search order on the
computers.
B. Add westcoassales.com to the domain suffix search orders on the
computers.
C. Add westcoassales.com to the exceptions list in the Proxy server
settings on the computers.
D. Configure the Proxy server settings on the computers to bypass the
proxy server for intranet addresses.
Answer: A
123. You install Windows 2000 Professional on a new APM-compliant portable
computer. You notice that whenever you attempt to shut down the computer,
the Windows 2000 shutdown screen remains on the screen as the power
remains on. You attempt to shut off the computer by using Power Button,
but you want the computer to shut off when Windows 2000 Professional shuts
down. What should you do?
A. Restart the computer, disable APM in the system BIOS, and then restart
the computer.
B. Restart the computer, use power options in control panel to enable APM,
and restart the computer.
C. Restart the computer, use power options in control panel to enable
hibernate support, and then restart the computer.
D. Restart the computer, use power options in control panel to create a
different power scheme, and then restart the computer.
Answer: B
124. You are the administrator of your company’s network. A user named
Andrew has limited dexterity, which prevents him from using standard
keyboard when completing his daily computing tasks. You configure the
Windows 2000 Professional computer to use the on-screen keyboard and
stickykeys option. You save the accessibility option settings to a shared
folder on the local hard disk of Andrew’s computer. You want to configure
the same options for a user named Peter. You logon to Peters computer
using Peter’s login user account. You access the shared folder over the
network from Peter’s computer. You select the .acw file from the shared
folder to a set up Peter’s computer to use the accessibility options. You
receive the error message shown in the exhibit:Accessibility Wizard
There was a problem loading the file specified when running the
accessibility wizard.
OK
What should you do?
A. Copy the .acw file to the c:\documents and setting\default user folder.
B. Save the accessibility options to a floppy disk and change the
permissions to allow full control of the file.
C. Resave the settings for the options by using utility manager. Then copy
the file to Peter’s local profile folder.
D. Change the permissions of the .acw file in the shared network folder to
allow read access for Peter’s user account.
Answer: D
125. You are administrator of your company’s network. Your company has
offices in New York, Madrid, Paris and Tokyo. A user named Carmen works in
the New York office, but she often travels to the Madrid office. Carmen
uses the multi-language version of Windows 2000 Professional on her
portable computer. She needs to be able to access both an English and
Spanish user interface, input locale, and keyboard layout/IME. When Carmen
is in the New York office, she logs on to the network by using the
Carmen_eng user account. She is given the English user interface, input
locale and keyboard layout/IME. When Carmen is in the Madrid office she
logs on to the network by using the Carmen_span user account. She is then
given the Spanish interface, input locale and keyboard layout/IME. Carmen
reports that when she logs on to the network by using the Carmen_eng user
account, she is not allowed to add any languages to her computer other
than English, which is already installed. What should you do?
A. Add the Spanish keyboard layout/IME for the Carmen_eng user account
profile.
B. Add the English keyboard layout/IME for the Carmen_span user account
profile.
C. Reconfigure the Group Policy Object for the Carmen_eng user account to
allow her to change the languages on her computer.
D. Configure the Group Policy Object for the Carmen_span user account to
allow her to change the languages on her computer.
Answer: C
126. You are the administrator of your company’s network. Your network has
200 Windows 2000 Professional computers and 15 Windows 2000 Server
computers. Users on the network save their work files in home folders on a
network server. The NTFS partition that contains the home folders has
Encrypting File System (EFS) enabled. A user named John leaves the
company. You move all of the files from John’s home folder to his
manager’s folder. When the manager attempts to open any of the files, she
receives the following error message; “Access denied.” You want the
manager to be able to access the files. What should you do?
A. Grant the manager NTFS Full control permission to the files.
B. Grant the manager NTFS Take Ownership permission to the files.
C. Log on to the network as a Recovery Agent. Decrypt the files for the
manager.
D. Log on to the network as a member of the Backup Operators Group.
Decrypt the files for the manager.
Answer: C
127. Your Windows 2000 Professional computer has 50 MB of free disk space
on drive C and 500 MB free disk space on drive D. Print jobs are failing
because the available space on C is inadequate. You want printer to be
able to use the space on drive D. What should you do?
A. From the print server properties dialog box, change the location of the
spool folder to any existing file path on drive D.
B. From the printer properties dialogue box, use advanced settings to
change the location of the spool folder to
D:\WinNT\System32\spools\printers.
C. Copy the C:\WinNT\System32\spool\printers folder to the
D:\WinNT\system32\spool\printers folder.
D. Mount drive C as a subdirectory on the drive D.
Answer: A
128. You are the administrator of a Windows 2000 network. You replace the
uniprocessor computers in the graphics department with 25 new
MPS-compliant computers. Each computer has two 550-MHz processors. You
install the software that users need to perform their work. The software
includes Win32-, Win16-, and DOS-based applications. Users report that
when they use a Win 16-based application, they do not notice an
improvement in performance compared to using the uniprocessor computers.
You want the users in the graphics department to be able to see a
noticeable improvement in performance. What should you do?
A. Use Device Manager to install the MPS-compliant driver for the second
processor.
B. Use Device Manager to install the ACPI-compliant drivers for the second
processor.
C. Run the Win 16-based application in a separate memory space.
D. Replace the Win 16-based applications with available Win32-based
applications.
Answer: D
129. You are configuring five computers for Windows NT Workstation 4.0 and
Windows 2000 Professional. Each computer has an 8 GB hard disk. You
configure the hard disk on each computer to have two 4 GB partitions.
Windows NT Workstation is installed on drive C, Windows 2000 Professional
on drive D. In Windows 2000 Professional, you configure a disk quota on
drive D to prevent users from saving work files on the disk. You restart
your computer and load Windows NT Workstation. You notice that users can
save files to drive D. You want to prevent users from saving the files to
drive D in either operating system. You also want to ensure that users can
access both drives while using either operating system. What should you
do?
A. Use Windows 2000 Professional to configure drive D as a dynamic
partition.
B. Use Windows 2000 Professional to enable encrypting file system on drive
D.
C. Use Windows NT workstation to configure NTFS permissions on drive D to
deny the users write permission.
D. Reinstall Windows NT Workstation after configuring disk quotas.
Answer: C
130. You need additional storage space on your Windows 2000 Server
computer. You install a second SCSI controller and a second hard disk.
During the installation of the SCSI driver, you receive a warning that the
driver is unsigned. You complete the installation of the driver and
restart Windows 2000 Professional. During startup, you receive a Stop
error. You need to correct the error and start Windows 2000 as quickly as
possible. What should you do?
A. Start the computer in Recovery Console. Delete the SCSI controller
driver.
B. Start the computer by using the last known good configuration.
C. Start the computer by using the Windows 2000 startup floppy disks, and
repair the system files.
D. Start the computer by using the Windows 2000 startup floppy disks, and
repair the registry.
Answer: B
131. You are the administrator of a Windows 2000 Professional portable
computer that is shared by users in the Sales department. You want to
configure a roaming user profile for each user. You want each individual
user profile setting to be available from any location, including by using
a dial-up connection. You log on to the computer by using local
administrator account. You create user accounts for the users in the Sales
department. When you attempt to configure each individual user account
profile to be a roaming profile, you find that you cannot. You receive the
change profile type dialog box as shown in the exhibit:
You want to be able to configure each user account to use a roaming user
profile. What should you do?A. From system in control panel, select the
change type option, and then select the roaming profile option.
B. From users and passwords in control panel, select the advanced tab, and
then define the path for the profile location.
C. Use the network connection wizard to create a virtual private network
connection to the network, and define a mandatory profile path on each
domain user account.
D. Connect the portable computer to the network, and configure the user
accounts for a roaming user profile.
Answer: D
132. You are creating a dial-up connection on your Windows 2000 portable
computer to connect to your customer’s dial-up server. You are not sure
which type of server your customer is using for dial-up connections. You
want to ensure that your dial-up connection authentication is secure and
that your logon information is not sent in plain text. You view the
Advanced Security Settings dialog box as shown in the exhibit:
<Exhibit - Not Available>
Which option or options should you disable in the Advanced Security
Settings dialog box? (Choose all that apply)
A. Unencrypted password (PAP)
B. Shiva Password Authentication Protocol (SPAP)
C. Challenge Handshake Authentication Protocol (CHAP)
D. Microsoft CHAP (MS-CHAP)
E. Microsoft CHAP Version 2 (MS-CHAP v2)
F. For Microsoft CHAP based protocols.
Answer: A
133. You install Windows 2000 Professional on a computer named Client2.
The network configuration is shown in the exhibit:
<Exhibit 1 - Not Available>
You connect to the shared resources on ServerE daily. Today, you cannot
connect to ServerE. Heather can connect to ServerE successfully from her
computer. You ping ServerE to find out the nature of the problem as shown
in the Ping results exhibit:
<Exhibit 2 - Not Available>
You verify that all of the servers are connected to the network and are
running correctly. What is the most likely cause of the problem?
A. The router configuration.
B. The WINS configuration on Client2.
C. The WINS configuration on ServerE.
D. The default gateway setting on Client2.
Answer: A
134. You configure your Windows 2000 Professional computer for Internet
Connection Sharing and for TCP/IP filtering as shown in the exhibit:
<Exhibit - Not Available>
You test your TCP/IP filtering configuration from another client computer.
You can access web sites, but you cannot access FTP sites. What should you
do to be able to access FTP sites?
A. Add Port 21 to the TCP Ports section.
B. Add Port 138 to the TCP Ports section.
C. Add Port 21 to the IP Ports section.
D. Add Port 138 to the IP Ports section.
Answer: A
135. You are the administrator of a Windows 2000 network. The network is
configured as shown in the exhibit:
<Exhibit - Not Available>
Computers on the Sales subnet run Windows 2000 Professional. These
computers are dynamically assigned IP addressing and configuration
information from a DHCP server on the subnet. Computers on the development
subnet run Windows 98. These computers are statically assigned IP
addressing and configuration information. Users on the Sales subnet report
that they cannot communicate with users on the development subnet. A user
who works on computer3 reports that he cannot communicate with computers
on either subnet. You want all users to be able to communicate with other
users on both subnets. What should you do? (Choose two)
A. Change the frame type to 802.2 on computer3.
B. Change the default gateway option IP address on the DHCP server.
C. Change the default protocol on the computers on the Sales subnet to
NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.
D. Enable TCP/IP protocol with the default settings on Computer3.
E. Add the NetBEUI protocol to the binding order on all client computers.
Answer: B, D
136. You install Windows 2000 Professional on your portable computer. You
have an external CD-ROM drive that is connected to the parallel port on
your computer. When you start the Windows 2000 Professional, you cannot
see the CD-ROM drive in Windows Explorer. You use computer management to
scan for hardware changes. The CD-ROM drive is not found.
<Exhibit 1 - Not Available>
To view the port setting tab and the resources Tab of the ECP printer port
properties dialogue box as shown in the exhibit:
<Exhibit 2 - Not Available>
You want to enable Windows 2000 Professional to detect the CD-ROM driver.
What should you do?
A. Configure the parallel port to never use an interrupt.
B. Configure the parallel port to use the automatic resource setting.
C. Configure the parallel port to use any interrupt assigned to the port.
D. Configure the parallel port to enable legacy plug and play detection.
Answer: D
137. You are configuring a Windows 2000 Professional portable computer to
use a dial-up connection to connect to a routing and remote access server.
The computer has a smart card reader and appropriate drivers installed.
You install the MMC to request a new certificate. You install the
certificate to use the smart card. You want to use your smart card for
authentication when you connect to the routing and remote access server.
You want to use the advanced security settings dialog box as shown in the
exhibit:
<Exhibit - Not Available>
Which option or options should you enable in the Advanced Security
Settings dialog box? (Choose all that apply)
A. Use Extensible authentication protocol (EAP)
B. Unencrypted Password (PAP)
C. Shiva Password Authentication Protocol (SPAP)
D. Challenge Handshake Authentication Protocol (CHAP)
E. Microsoft CHAP (MS-CHAP)
F. Microsoft CHAP Version 2 (MS-CHAP v2)
G. For MS-CHAP based protocols, automatically use my Windows logon name
and password (and domain, if any)
Answer: A
138. You install Windows 2000 Professional on a computer that has a
non-plug and play video adapter. You want to configure the video adapter
to use 16-bit color and 1024 x 768 resolution. The color setting for the
video adapter is set to 16 colors, and you cannot change that setting. The
video adapter properties are shown in the (default monitor) and VGA
properties dialog box in the exhibit:
<Exhibit - Not Available>
What should you do?
A. Change the adapter refresh rate to 60Mhtz.
B. Change the monitor drivers to be WDM-compliant drivers.
C. Use List all modes to select the adapter default mode.
D. Install the WDM-compliant video adapter and monitor drivers.
Answer: D
139. Your Windows 2000 Professional computer has a single Pentium II
400-Mhz processor, 64 MB of RAM, and E-IDE hard disk. You use your
computer to design graphics ads for web sites and newspapers. When you are
working on multiple ads simultaneously, you notice that your computer
responds very slowly. You are also experiencing long delays when loading
color palettes and importing graphics. You use system monitor to view your
system performance as shown in the exhibit:
<Exhibit - Not Available>
You want to improve the performance of your computer based on the
performance results. What should you do?
A. Increase the physical RAM in the computer to 128 MB.
B. Increase the processor priority level for your development application.
C. Add a second Pentium II 400-MHz processor.
D. Upgrade the hard disk to a SCSI-based hard disk.
Answer: C
140. You are the administrator of your company’s network. You use your
Windows 2000 Professional computer to transfer 20 large files. Each file
is 100 MB in size. You want to copy the files from the UNIX server in your
branch office to a computer running Microsoft SQL server at the main
office. When you copy the files by using Windows Explorer, the connection
appears to time out and the file copy is aborted. You suspect that you
encountering a TCP/IP performance problem. Your network connection is
shown in the Xircom LAN Properties dialog box in the exhibit:
<Exhibit - Not Available>
You want to monitor the performance of TCP/IP on your computer. What
should you do?
A. Install the network monitor agent. Use the performance console to view
all the counters for the TCP object.
B. Install the network monitor agent. Use the performance console to view
the fragmented datagrams/sec counter.
C. Install SNMP. Use the performance console to view all the counters for
the TCP object.
D. Install simple TCP/IP services. Use the performance console to view the
fragmentation failures counter.
Answer: C
141. You are the administrator of your company's network. The network is
configured as shown in the exhibit:
<Exhibit - Not Available>
You want to install Windows 2000 Professional on 10 non-PXE-compliant
computers on the marketing segment of your network. The 10 computers do
not have operating systems installed. You attempt to load the computers by
using an existing RIS image that is on the RIS server. You find that the
10 computers cannot connect to the RIS server. You verify that existing
client computers on the network can connect to network servers, including
the RIS server. You then check the network servers and find that the
Windows NT Server 4.0 computer running WINS has stopped responding due to
hard disk failure. You want to enable the computers to connect to the RIS
server. What should you do? (Choose two)
A. Repair and restart the WINS server.
B. Repair the WINS server and upgrade the server to Windows 2000 Server.
C. Configure the Active Directory server to run DHCP.
D. Configure the static entry in WINS that points to the RIS server.
E. Create and use the RIS boot disk.
F. Run RIPrep.exe to create a non-PXE-compliant startup disk.
Answer: C, E
142. You are installing Windows 2000 Professional on a computer named
client2. The network is configured as shown in the exhibit:
<Exhibit - Not Available>
Your network uses TCP/IP as the only network protocol. You configure
Client2 to have a TCP/IP address of 10.10.20.234, a default gateway of
10.10.13.1, and a WINS Server address of 10.10.13.10. ServerB is
configured with TCP/IP. ServerB is the network WINS server. You cannot
connect to shared resources on ServerB and ServerC by using UNC names. You
want Client2 to be able to connect to ServerB and ServerC. What should you
do?
A. Configure Client2 to use a default gateway of 10.10.20.1.
B. Configure Client2 to use a TCP/IP address of 10.10.13.234.
C. Install a WINS server on the same segment as Client2.
D. Install and configure a DNS server, and configure Client2 to use the
DNS server service.
Answer: A
143. Ten users at your office run an accounting application on their
Windows NT Workstation 4.0 computers. The application stores its data in a
shared network folder named Accdata on a Windows 2000 Server computer
named Server1. You upgrade all 10 computers to Windows 2000 Professional
and verify that all applications are compatible with Windows 2000. After
the upgrade, some users report that they are receiving intermittent
data-corruption error messages. They are also receiving data file-version
mismatch error messages. When these errors occur, your only method of
recovery is to restore the entire contents of the Accdata folder from a
known good backup copy. You need to prevent these errors from occurring in
the future. What should you do?
A. Configure Accdata folder to allow a maximum of one user.
B. Configure the Accdata folder to disable client caching.
C. Create a group policy that removes the Bypass Traverse Checking user
right on server1.
D. Create a group policy that increases the amount of idle time required
before a session disconnects on server1.
Answer: B
144. You are the administrator for your company's network. The network is
configured as shown in the exhibit:
<Exhibit - Not Available>
You want to install Windows 2000 Professional on 20 new PXE-compliant
computers on the marketing segment of your network. The new computers do
not have operating systems installed. You create a RIS image. You load the
image onto the RIS server. You then start the new computers. You find that
the new computers cannot connect to the RIS server. You verify that the
existing client computers in the network can connect to the network
servers, including the RIS server. You want to enable the new computers to
connect to the RIS server. What should you do?
A. Add a Windows 2000 Server computer running WINS to the network.
B. Add a Windows 2000 Server computer running DHCP to the network.
C. Add the domain Everyone group to the RIS OS image security settings.
D. Place the new computers on the same segment as the RIS server.
Answer: B
145. You run a 16-bit scientific data analysis package on your Windows
2000 Professional computer. The package consists of three components. The
first component is a data acquisition application that monitors continuous
data output from scientific instruments. The second component is a data
analysis application that receives data from the data acquisition
application by using shared memory. The third component is a data graphing
application that displays the processed data in real time. The data
analysis application communicates with the data graphing application by
using OLE. When you attempt to analyze large data sets, your computer is
not able to display data in real time. You install a second processor in
your computer; only one processor is used while the package is running,
even though task manager shows both processors. You want your data
analysis package to use both processors. What should you do? (Choose two)
A. Configure the data acquisition application to run in its own virtual
DOS machine (VDM).
B. Configure the data analysis application to run in its own virtual DOS
machine (VDM).
C. Configure the data graphing application to run in its own virtual DOS
machine (VDM).
D. Configure the virtual DOS machine for the data acquisition and data
analysis applications to have a hard affinity for processor 0. Configure
the VDM for the data graphing application to have a hard affinity for
processor1.
E. Configure the virtual DOS machine for the data acquisition to have a
hard affinity for processor 0. Configure the VDM for the data graphing
application to have a hard affinity for processor1.
Answer: C, D
146. You are the administrator of your company's network. The network is
configured as shown in the exhibit:
<Exhibit - Not Available>
You want to install Windows 2000 Professional on 10 non-PXE-compliant
computers that are on the marketing segment of your network. You start one
of the computers by using a RIS boot disk. However, you cannot connect to
the RIS server. You verify that the existing client computers on the
network can connect to network servers, including the RIS server. The
network router does not support BOOTP, so existing client computers use
manually configured TCP/IP addresses. You want to enable the computers to
connect to the RIS server. What should you do?
A. Add a computer running DHCP Relay Agent to the marketing segment.
B. Add a computer running the network monitor driver to the marketing
segment.
C. Move the Windows 2000 Server computer running WINS to the marketing
segment.
D. Move the Windows 2000 Server computer running Active Directory to the
marketing segment.
Answer: A
147. You are the administrator of a Windows 2000 network. The network
diagram is shown in the exhibit:
<Exhibit - Not Available>
You install Windows 2000 Professional on a computer named Client2. The
computer is configured to have a TCP/IP address of 10.10.167.4 and a
default gateway of 10.10.167.1 You want to connect to a shared folder on a
server B. When you attempt to connect to the network share you receive the
following error message: "the network location could not be reached" You
want to allow Client2 to connect to server B. What should you do?
A. Place Client2 on the same segment as server B.
B. Place a computer running the wins proxy server on the same segment as
Client2.
C. Configure Client2 to use a default gateway of 10.10.13.1.
D. Configure Client2 use a DNS server address 10.10.13.24.
E. Configure Client2 to use a WINS server address of 10.10.13.24.
Answer: E
148. You install Windows 2000 Professional on 10 computers that have Video
Capture Cards installed. A user named Lilly reports that her video capture
card is not functioning correctly. She wants to use her video capturing
software to capture video frames, but she cannot view the video output.
You use the Device Manager to view the hardware settings on Lilly’s
Computer as shown in the exhibit:
<Exhibit - Not Available>
You want Lilly to be able to capture the video frames by using the video
capture card. What should you do?
A. Use system in control panel to enable the device.
B. Use Device Manager to update the driver for the device.
C. Move the video capture card to a different PCI slot
D. Uninstall the device and disable plug and play detection for the device
Answer: B
149. Your Windows 2000 Professional computer has a removable disk device
installed. The device can use storage modules of varying sizes. You use
these storage modules to transfer graphics filed between your location and
a printing company. The printing company uses Windows NT 4.0 service pack
3. You insert a new 20-Mailbox disk device into your computer. When you
attempt to format it as FAT32 with the default options, you receive the
following error message "Windows was unable to complete the format."
You need to format the device so that you can use it to send a large
graphic file to the printing company.
How should you format the device?
A. As FAT 16 with a 4-KB cluster size.
B. As FAT 32 with a 1-KB cluster size.
C. As FAT 32 with a 4-KB cluster size.
D. As NTFS with a 4-KB cluster size.
Answer: A
150. You need to install Windows 2000 Professional on 35 new computers on
the company LAN.
First, you create a distribution folder on the network server. Then you
create a network boot disk to install Windows 2000 Professional from the
distribution folder. Now you need to create a batch file, which the
network boot disk will execute to start the installation. You must specify
a source path and temporary drive for the installation files. You also
need to install the accessibility options within the batch file. The batch
file must execute a hardware-specific application to run after the
GUI-mode Setup has completed.
Which command must you specify in the batch file?
A. Z:\i386\winnt/s:z:\i386/t:d/a/e:z:\hardware\setup.exe
B. Z:\i386\winnt/s:z:\i386/rwinnt.tmp/a/e:z:\hardware\setup.exe
C. Z:\i386\winnt32/s:z:\i386/tempdrive:d/cmd:z\hardware\setup.exe
D. Z:\i386\winnt32/s:z:\i386/cmdcons:z:\hardware\setup/makelocalsource
Answer: A
151. You want to configure your Windows 2000 Professional computer to
remotely access your company’s Windows 2000 routing and remote access
server. You configure a VPN connection. For security purposes, you
configure the VPN connection to use MS-CHAP v2 only and to require
encryption. You also configure TCP/IP to obtain an IP address
automatically, to enable IPSec, to set IPSec to secure server. When you
try to connect, you receive the following error message, “The encryption
attempt failed because no valid certificate was found.”
What should you do to connect to the server?
A. Enable the VPN connection to use MS-CHAP
B. Change the data encryption setting to Optional Encryption
C. Specify a TCP/IP address in the Network properties
D. Change the IPSec policy setting to client
Answer: D
152. You are the administrator of your company's network supporting client
computers running Windows for Workgroups 3.11, Windows 95, Windows 98,
Windows NT 4.0, and Windows 2000. Which client computers can connect to an
Internet printer? (Choose all that apply.)
A. Windows 2000
B. Windows 9x with the Internet Printing Client
C. Windows NT Workstation 4.0 with the Internet Printing Client
D. Windows for Workgroups 3.11 with the Internet Printing Client
Answer: A, B
153. You are the administrator of a Windows 2000 Professional computer
with two monitors. The primary monitor displays the startup screen, and
the secondary monitor displays the desktop. What should you do to resolve
this problem? (Choose all that apply.)
A. Remove the primary adapter
B. Remove the secondary adapter
C. Ensure that VGA is disabled on the primary adapter display
D. Ensure that VGA is disabled on the secondary adapter display
Answer: D
154. You are the administrator of your company's network. Users who are
members of the Auditors group have raised some concerns about the security
of the \Audit folder, which resides on an NTFS partition on a Windows 2000
Professional computer. Although only members of the Auditors group should
have access to the folder, an unauthorized user is able to access the
folder. The folder permissions are assigned as follows: Everyone group -
Full Control; Auditors group - Modify. What should you do?
A. In the folder properties, allow the Auditors group Full Control
B. In the folder properties, deny Full Control to the Everyone group
C. In the folder properties, remove Full Control permission from the
Everyone group
D. In the folder properties, allow the Auditors group the Take Ownership
special permission
Answer: C
155. You are the administrator of a Windows 2000 Professional computer
with three hard disk drives (Disks 0, 1, and 2) containing dynamic NTFS
volumes. Disks 1 and 2 each have at least 50 MB of free space. You want to
achieve these results:
provide fault tolerance for a volume created from the free space
be able to extend a volume created from the free space
be able to include the free space in a striped volume
efficiently use the total available free space on both disks
Your proposed solution is to create a spanned volume using the free space
on Disks 1 and 2.
Which results does the proposed solution provide? (Choose all that apply.)
A. The spanned volume is fault tolerant
B. You are able to extend the spanned volume
C. You are able to include the spanned volume in a striped volume
D. The total available free space on both disks can be used efficiently
Answer: B, D
156. You want to troubleshoot system restoration by starting Windows 2000
Professional in Safe Mode. What should you do after the computer is
restarted into Safe Mode? (Choose three.)
A. Run msinfo32
B. Run verifier
C. Expand Components, and click Problem Devices
D. Expand Software Environment, and click Drivers
E. Expand Hardware Resources, and click Forced Hardware
F. Expand Hardware Resources, and click Conflicts/Sharint
Answer: A, C, F
157. You are the administrator of a workgroup supporting Windows 2000
Professional computers. Users of the Developers group use the default
Encrypting File System (EFS) settings to encrypt the contents of a folder
on a Windows 2000 Professional computer. User RichardC has a Windows 2000
Professional computer at home, and he uses the Enhaoced CryptoPAK to
encrypt the file Technical.doc. RichardC copies Technical.doc to a floppy
disk and brings it to work; however, he is unable to access Technical.doc.
How can RichardC access Technical.doc at work?
A. Use the recovery agent
B. The document cannot be decrypted
C. Use the Cipher command-line utility
D. Log on as Administrator, and take ownership of the file
Answer: B
158. You are the administrator of a Windows 2000 Professional computer
configured with two monitors operating at 1024x768 resolution and default
refresh rates. You install an MS-DOS-based application that uses the
Autoexec.nt and Config.nt files. You create a shortcut to the application.
When you attempt to run the application, the screen display becomes
distorted. When you attempt to use the secondary monitor to run the
application, the application fails to open. What should you do to resolve
this problem?
A. Edit Config.nt to serve as a custom startup file
B. Edit Autoexec.bat to serve as a custom startup file
C. Configure the MS-DOS application to run in a window
D. Configure the refresh rates for both displays to the optimal setting
Answer: C
159. You are the administrator of a network supporting Windows 2000
Professional computers. You want to create home folders for all users on a
network server. You create and share a folder to store all home folders on
the server. What else should you do to simplify administration? (Choose
two.)
A. Ensure that home folders reside on the volume where the operating
system is installed.
B. Remove Full Control permission from the Everyone group, and assign Read
to the Users group.
C. Ensure that home folders reside on a volume separate from applications
and the operating system.
D. Remove Full Control permission from the Everyone group, and assign Full
Control to the Users group.
Answer: C, D
160. You are the administrator of your company's network. You want to
support Internet printing from Windows 2000 Professional computers. What
should you install?
A. Peer Web Services
B. Web Server Service
C. Print Spooler Service
D. Internet Information Service
Answer: D
161. You use Group Policy to enable the Enforce Password History setting.
Which other policy should you configure?
A. Maximum password age
B. Minimum password age
C. Minimum password length
D. Passwords must meet complexity requirements
Answer: B
162. You are the administrator of a network supporting Windows 2000
Professional computers. Users in your company need multiple language
support. A user wants to create a document in Notepad with text in both
English and Greek. What should you do at the user's Windows 2000
Professional computer?
A. In Notepad, select the Greek version.
B. Install the Greek version of Windows 2000 Professional.
C. Close Notepad. Use the Regional Options icon in Control Panel to enable
support for the Greek language. Restart Notepad.
D. Use the Regional Options icon in Control Panel to enable support for
the Greek language. Log off, log back on, and restart Notepad.
Answer: C
163. You are the administrator of a network supporting Windows 2000
Professional computers. You want to configure user Group Policy to achieve
these results:
allow users to view the options in the Offline Files dialog box
remove the Offline Files tab from the Folder Options dialog box
disable the Settings button in the Offline Files Status dialog box
remove the Settings command from the Offline Files shortcut menu
Your proposed solution is to enable the group policy setting Disable user
configuration of Offline Files.
Which results does the proposed solution provide? (Choose all that apply.)
A. Users can view the options in the Offline Files dialog box.
B. The Offline Files tab is removed from the Folder Options dialog box.
C. The Settings button in the Offline Files Status dialog box is disabled.
D. The Settings command is removed from the Offline Files shortcut menu.
Answer: B, C, D
164. You are the administrator of a Windows 2000 Professional computer
with a fax modem. You want to route inbound faxes through a network
printer. What should you do? (Choose two.)
A. Open the Fax Service Properties, click the Log On tab, click This
account, and specify a user account and password with permission to access
the network printer.
B. Open the Fax Service Properties, click the Log On tab, ensure that
Local System account is selected, and ensure that the option 'Allow
service to interact with desktop' is enabled.
C. Ensure that the logon account for Fax Service is a member of the Users
group on the computer.
D. Ensure that the logon account for Fax Service is a member of the
Administrators group on the computer.
Answer: A, D
165. You are the administrator of a workgroup supporting Windows 2000
Professional computers. User LarryK stores documents in an encrypted
folder on an NTFS partition on his Windows 2000 Professional computer.
LarryK loses his private key and is unable to access his encrypted files.
You are designated as the recovery agent. What is the first step of the
recommended procedure for accessing Larry's encrypted documents?
A. The document cannot be decrypted
B. Have the file sent to your computer
C. Copy your public key to Larry's computer
D. Copy your private key to Larry's computer
Answer: B
166. You are the administrator of a network supporting Windows 2000
Professional computers. You are planning to install a shared application
on a network server. You create one shared folder to organize all shared
applications. You want to prevent a user from accessing the shared folder
using a Guest account. You also want to prevent the shared folder from
being deleted or having its files overwritten. How should you configure
the permissions to the shared application folder? (Choose two.)
A. Assign Full Control permission to the Users group
B. Assign Full Control permission to the Administrators group
C. Remove Full Control permission from the Everyone group, and assign Read
permission to the Users group
D. Remove Full Control permission from the Everyone group, and assign
Change permission to the Users group
Answer: B, C
167. You are the administrator of a network supporting Windows 2000
computers. You want to install Windows 2000 Professional on a Pentium III
computer with a blank hard disk by performing a network installation. The
computer has a network adapter without a Pre-Boot Execution Environment
(PXE) boot ROM. What should you do? (Choose all that apply.)
A. Install a network client
B. Install a PXE-compliant network adapter
C. Create a FAT partition on the target computer
D. Create a NTFS partition on the target computer
E. Configure the computer to boot from the network adapter
F. Copy the installation files from the Windows 2000 \i386 folder to a
shared folder on a distribution server
Answer: A, C, F
168. You are the administrator of a workgroup supporting Windows 2000
Professional computers. You want to provide EFS security for user data on
a portable computer. How can you configure system key protection?
A. Type syskey at a command prompt
B. Type regedt32 at a command prompt
C. Open the System icon in Control Panel
D. Open the Folder Option icon in Control Panel
Answer: A
169. You are planning to purchase new computer hardware to run Windows
2000 Professional. You want to allow users in the local office to share
documents prepared in multiple languages. You also want users in a remote
office to be able to read documents created in the local office. What
should you do? (Choose two.)
A. Install only the English (US) language on the local users' computers
B. Install all of the appropriate languages on the local users' computers
C. Request that the remote administrator install only the English (US)
language on the remote users' computers
D. Request that the remote administrator install all of the appropriate
languages on the remote users' computers
Answer: B, D
170. You are the administrator of your company's network. You are planning
to install Windows 2000 Professional by using Windows 2000 Server Remote
Installation Services (RIS). If the remote installation process fails, you
want to achieve these results:
The operating system installation process will be automatically restarted.
Users will not be required to re-answer any questions.
The installation process will be restarted at the point of failure.
RIS will attempt to fix problems that occurred with the previous setup
attempt.
Your proposed solution is to use Group Policy to configure the Restart a
Previous Setup client installation option for RIS.
Which results does the proposed solution provide? (Choose all that apply.)
A. The operating system installation process is automatically restarted
B. Users are not required to re-answer any questions
C. The installation process is restarted at the point of failure
D. RIS attempts to fix problems that occurred with the previous attempt
Answer: B
171. You are the administrator of a computer running Windows 2000
Professional. You want to use Windows Backup to create a snapshot of your
data, but you do not want markers to be cleared. Which backup type should
you use?
A. Copy
B. Normal
C. Incremental
D. Differential
Answer: A
172. You install a new AGP graphics display adapter in your Windows 2000
Professional computer. When prompted, you load the display driver supplied
by the manufacturer of the adapter. After the computer restarts, the
display goes blank. What should you do to resolve this problem?
A. Use the Emergency Repair Disk to repair the installation
B. Use the Recovery Console to restore the system state data
C. Restart the computer and invoke the Last Known Good configuration
D. Restart the computer in Safe Mode, and restore the default display
driver
E. Reinstall old adapter
Answer: C
173. What is the recommended method for encrypting files?
A. Create an NTFS folder and apply encryption to the folder
B. Create a FAT32 folder and apply encryption to the folder
C. Create an NTFS folder and apply encryption to individual files in the
folder
D. Create a FAT32 folder and apply encryption to individual files in the
folder
Answer: A
174. You want to configure your Pentium III computer to dual-boot Windows
98 and Windows 2000 Professional. Your computer has one hard disk drive
with one volume (C:). What should you do to accomplish your goal at
minimal cost? (Choose two.)
A. Install another hard disk drive
B. Install Windows 98 before installing Windows 2000 Professional
C. Install Windows 2000 Professional before installing Windows 98
D. Reformat and repartition the hard drive to make two separate volumes
available before you begin creating a multiple-boot configuration
Answer: B, D
175. Which TCP port number corresponds to HTTP used for the World Wide
Web?
A. 20
B. 21
C. 23
D. 80
Answer: D
176. You the administrator log onto a Windows 2000 professional computer,
which is used by different students. User1 is not an administrator. You
like to use this account instead of logging on as administrator for
security reasons. You want to schedule a task to run a command called
ADDUSERS.CMD to add six new users. What do you need to do?
A. Schedule the task to run under and administrator account
B. Log on as Administrator and schedule to run under USER1
C. Take Ownership of ADDUSERS.CMD
Answer: A
177. You are having problems with video during an unattended installation,
the screen flickers and blanks out. You examine the unattended
installation script. Place the crosshairs on the line where the problem
exists in your unattended.txt file.
[Display]
BitsPerPel = 8
Vrefresh = 150
Xresolution = 640
Yresolution = 480
[Networking]
InstallDefaultComponents = Yes
A. BitsPerPel = 8
B. Xresolution = 640
C. Yresolution = 480
D. Vrefresh = 150
E. Networking
Answer: D
178. You are the administrator of your company network. You want to
install win 2000 on 10 non-PXE compliant computers on the marketing
segment on the network. The 10 computers do not have OS installed. You
attempt to load the computers using the RIS image that is on the RIS
Server. You find that the computers cannot connect to the RIS Server. You
verify that the existing client computers can connect to the server
including the RIS Server. You then check the network servers to find out
that the Win NT server 4.0 running WINS Server, has stopped responding due
to HDD failurE.22. You want to enable the computers to connect to the RIS
Server. What should you do? (Choose two)
A. Repair and restore the WINS Server
B. Repair the WINS server and update the server to windows 2000 server
C. Configure the Active Directory server to also run DHCP
D. Configure static entry on the DHCP server that points to the RIS Server
E. Create and use the RIS boot disk and run rbfg.exe to create non-pxe
compliant start up disk.
Answer: C, E
179. Your network's dialup server is configured to support certificate
authentication. You want to use smart card authentication on your Win2000
Professional Portable computer. Your computer has a PC Card smart card
reader and the appropriate drivers installed, and a smart card. What else
should you do to enable smart card authentication on your computer?
A. Configure a dial-up connection to use EAP. Select the smart card device
for authentication.
B. Configure a dial-up connection to use PPTP. select the smart card
device for authentication.
C. Configure a dial-up connection to use certificate authentication,
enable the user credentials for authentication.
D. Configure a Dial-up connection to connect to a private network through
the Internet and enable L2TP to create a VPN.
Answer: A
180. You need to install Windows 2000 Pro on 30 computers. You also need
to deploy a Windows 2000 Pro Service Pack during the installation. First
you ceate a network Distrubution folders named InstalFiles. You copy the
I386 folder from the Windows 2000 Pro CD to the instal folder. What should
you do next?
A. Copy the Service pack files to the InstallFiles\Misc folder
B. Copy the Service pack files to the InstallFiles\$OEM$ folder
C. From existing client computer, run the " update -u " command from the
service pack to the install files folder
D. From exicting client computer, run the " update -s: " install file
command from the SP to the instalFiles folder
Answer: D
181. You have implemented the hisecws.inf security template on all the
Windows 2000 pro client computers in your network. A user has received a
driver and utility software for an internal SCSI controller in his
computer. He uses the manufacturer provided CD to install the driver and
the utility. He restarts the computer and reports that the internal SCSI
controller is not working correctly. You discover that the driver is not
installed correctly. What should you do?
A. Disable the security template. Reconfigure the driver signing option.
Install the driver. Enable the security template.
B. Reconfigure the driver signing option. Disable the security template.
Install the driver. Enable the security template.
C. Run the sigverif command. Reconfigure the driver signing option.
Install the driver.
D. Run the sigverif command. Disable the security template. Install the
driver. Enable the security template.
E. Run the sfc/cancel command. Install the driver. Run the sfc/enable
command.
Answer: A
182. You want to prevent Windows 2000 Pro computer named PAyroll5 from
communicating with Win NT 4, Win 95 and WIn98. You want to enable the
payroll5 computer to communicate on your network with other Windows 2000
pro. What should you do?
A. Close all Netbios ports in the " Advanced TCP/IP " options of Payroll5.
B. Import the Hisecws.inf security template to payroll5.
C. Disable " Access this computer from network " in the local security
policy settingfor payroll5.
D. Clear all Wins client settings on Payroll5.
Answer: B
183. You are preparing to install Windows 2000 Professional on 75 new
computers. You want to create a Standard installation image to use on all
the new computers. The computers have several different configurations of
hardware components. You log on the computer using the local administrator
account. You install Windows 2000 Professional and other standard software
on one of the computers. You configure the standard applications and
customize the desktop settings you intend to deploy. You run the set-up
manager and create the sysprep.inf file. You copy the sysprep.exe and the
setupcl.exe file to c:/sysprep folder. You run sysprep.exe and run your
third party disk imaging software. You copy the image to the server and
install it on your computers. When the installation is complete you find
that some of your computers do not function at all. You also find that the
desktop settings do not appear as you have configured them on the set-up
computer. You want to correct the imaging process and ensure that all the
computers have same standard desktop. What should you do? (CHOOSE TWO)
A. Copy sysprep.inf to c:/sysprep folder.
B. Copy administrator profile to default user profile.
C. Include -pnp parameter for sysprep.exe when running utility.
D. Include -nosidgen parameter for sysprep.exe when you are running that
utility.
Answer: B, C
184. Your have a Windows 2000 Professional computer that has a removable
disk device installed. The device can use storage modules of varying
sizes. You use these storage modules to transfer graphics filed between
your location and a printing company. The printing company uses Windows NT
4.0 service pack 3.
You insert a new 20MB disk device into your computer. When you attempt to
format it as FAT32 with the default options, you receive the following
error message "Windows was unable to complete the format."
You need to format the device so that you can use it to send a large
graphic file to the printing company. How should you format the device?
A. As FAT 16 with a 4-KB cluster size
B. As FAT 32 with a 1-KB cluster size
C. As FAT 32 with a 4-KB cluster size
D. As NTFS with a 4-KB cluster size
Answer: A
185. Which protocols can RAS use as dial out protocols? Choose one answer:
A. NetBEUI
B. NetBEUI and TCP/IP
C. NetBEUI, TCP/IP and IPX
D. NetBEUI, TCP/IP, PPTP and IPX
Answer: C
186. Your RAS server is configured as shown in the exhibit uses of Windows
NT workstation computers dial in to the RAS server. Exhibit: NetBEUI and
TCP/IP enabled on server and client. IPX/SPX enabled on server but not
client. Allow any authentication and clear text. What can clients do on
the RAS server? (Choose all that apply)
A. Run applications that require Windows sockets interface
B. Run applications that require NetBIOS interface
C. Use IPX protocols to administer NetWare servers that reside on the
network
D. Connect shared resources that reside on the RAS server
Answer: B, D
187. You install a RAS Server on your network. Remote users will use NT
Workstation computers for Dial-up Networking to access the database. The
database is stored on a different 2000 Server computer than the RAS
Server.
You want to use data encryption for security, however, you have non-NT
Workstation clients. How can you ensure security on your RAS server?
A. Configure RAS Server to require data encryption for only NT Workstation
computers. Configure the Server, which contains the database to require
data encryption for remote users.
B. Configure the RAS Server to require data encryption for specific modem
ports. Configure the NT Workstation computers to dial up to the modems
attached only to these ports.
C. Configure RAS Server to require data encryption for specific user
accounts.
D. Configure the RAS Server to allow for all remote users. Configure the
server that contains the database to require encryption for remote users.
Answer: B
188. Your company has a Windows 2000 Server network. The brokers at your
firm each have laptop computers with Windows NT workstation
installed. You are developing a solution to provide network security.
Required Results: For all the brokers at your firm to have remote access
to the network from any location. Prevent all user accounts other than the
broker user accounts from remotely accessing the network.
Optional Desired Results: Implement a method to protect passwords while
they are transmitted. Implement a method to protect data while they are
transmitted.
Proposed Solution : Require passwords with a minimum length of 8
characters for all users and force passwords to be changed every forty
days. Install
RAS on one Windows 2000 Server computer on the network. Configure the NT
RAS Server for Microsoft Authentication with Data Encryption Enabled.
Enable
the Call Back Security for the Broker accounts.
Which result did the proposed solution produce?
A. The proposed solution produces the required result produces both the
optional desired results.
B. The proposed solution produces the required result produces only 1 of
the optional desired results.
C. The proposed solution produces the required result produces but neither
of the optional desired results.
D. The proposed solution does not produce the required result.
Answer: D
189. Your company uses the single domain model. Brokers with NT
workstation 2000 notebooks need to have access to the domain from remote
locations. Your job is to implement the highest level of security on the
domain.
Required results: Brokers need access to the domain. Only the brokers may
log in and no other users.
Optional results: Passwords are transmitted encrypted over the line. All
data must be transmitted encrypted.
Proposed solution: Use a password length with a minimum of 8 characters.
Let the system remember the last 10 used passwords. Force the brokers to
change their
password every month. Install a RAS server and configure it with the RAS
security so that only the brokers have permission to log in. Use the
Microsoft authentication method.
A. The required result and the optional results.
B. The required result and one of the optional results.
C. The required result only.
D. Does not produce the required result or the optional results.
Answer: C
190. Your company has a Windows 2000 Server network. The brokers at your
firm each have laptop computers with Windows NT workstation installed. You
are developing a solution to provide network security.
Required Results: For all the brokers at your firm to have remote access
to the network from any location. Prevent all user accounts other than the
broker user accounts from remotely accessing the network.
Optional Desired Results: Implement a method to protect passwords while
they are transmitted. Implement a method to protect data while they are
transmitted.
Proposed Solution : Require passwords with a minimum length of 8
characters for all users and force passwords to be changed every forty
days. Install
RAS on one Windows 2000 Server computer on the network. Configure RAS to
allow any authentication method. Install hardware based security host
between RAS server and the Modems.
Which result did the proposed solution produce?
A. The proposed solution produces the required result produces both the
optional desired results.
B. The proposed solution produces the required result produces only 1 of
the optional desired results.
C. The proposed solution produces the required result produces but neither
of the optional desired results.
D. The proposed solution does not produce the required result.
Answer: D
191. Your company network consists of the MIS domain and the CORP domain.
A user Jim logs onto his Workstation at home with a local account. He then
connects to your company's RAS server by using DUN with CORP/JimH account.
The CORP/JimH account has change permission to share on file server in MIS
domain. However, when Jim attempts to access share, he receives message
saying access denied. What must you do to allow Jim to access share?
A. Create a local JimH account in MIS domain
B. Create a global JimH account in MIS domain
C. Configure Jim's Workstation as member of Corp domain, and then have Jim
log onto the CORP domain via RAS
D. Configure Jim's Workstation as member of MIS domain, and then have Jim
log onto the MIS domain via RAS
Answer: A or C (please confirm it)
192. You configure a Window 2000 Server computer with RAS so that remote
client computer have access to all resources. Your Network uses TCP/IP
without DHCP. How can you assign a predetermined IP address to each client
computer that connects to the RAS server?
A. Use DNS server to map a remote client computer's host name to an IP
address.
B. Use a HOSTS file on the RAS server to map a remote client computer's
host name to an IP address.
C. On the RAS server, assign an IP address to each user account name that
has been granted dial-in permission.
D. Configure RAS to allow client to specify their own IP address.
Configure each client computer with IP address.
Answer: D
193. Julia is a member of CORP. Accounting Server is being used as a RAS
server. Accounting trusts CORP. Error - account does not have RAS
permission. What must you do to allow access?
A. Grant Julia dial-in permissions in CORP domain.
B. Grant CORP\Julia the ACCESS THIS COMPUTER FROM NETWORK right to the RAS
server.
C. Create local account for Julia on RAS. Grant dial-in permissions to new
account.
D. Create global account for Julia in the accounting domain. Grant dial-in
permissions to new account.
Answer: A
194. You own an Internet service provider corporation. You need to provide
five new companies with virtual servers to maintain their WWW home pages.
The virtual Servers will all reside on a single Internet Information
server (IIS) machine. Each virtual server will have its own domain name
and IP address Your network is not currently using a WINS or DNS server.
At a minimum, which of the following steps must you perform to configure
your network to accommodate these virtual Servers? (Choose all steps that
apply.)
A. Assign each virtual server's IP address to the IIS server's network
adapter card. Create a WWW folder for each company. For each virtual
server's WWW folder, manually assign a corresponding IP address using the
Directories Properties dialog box.
B. Install a DNS server. Add each virtual server's domain name and IP
address to the database of the DNS server.
C. Install a WINS server. Add the NetBIOS names and IP addresses of the
virtual servers to the database of the WINS server. Reconfigure the DNS
server to resolve its domain names by querying the WINS server.
D. Install a DHCP server. Configure the DHCP server to maintain lease
information on the IP addresses assigned to the IIS server's network
adapter card.
Answer: A, B
195. You are setting up a WWW service for 5 different web sites within
your company. You will administer these web sites on 5 different virtual
servers on one physical machine.
There are no WINS or DNS servers in the company. What do you need to set
up in order to do this? (choose all that apply)
A. Assign multiple IP addresses to the NIC in your server
B. Assign a separate IP to each WWW folder
C. Implement a WINS server
D. Implement a DNS server
E. Implement a DHCP server
Answer: D
196. Your organization provides world-wide web services for 10 different
companies. Each company has a registered domain name. You want to create a
separate web site for each company on a single Windows 2000 Server
computer that has Microsoft Internet Information Server installed. What
should you do to accomplish this? (Choose 2)
A. Assign multiple IP addresses to the Windows 2000 Server's computers
network adapter.
B. Assign the same IP address to each company domain name on a DNS server.
C. Assign a separate IP address to each company WWW folder.
D. Use WINS to assign an IP address to a NetBIOS computer name, add the
computer name each of the company's WWW folder.
Answer: A, C
197. You are planning to provide connectivity from your company intranet
to the Internet. What should be used to provide security from
Internet-related threats?
A. SLIP
B. MS RAS Protocol
C. PPTP filtering
D. NetBIOS scope
Answer: C
198. You need to create a virtual server for IIS support. How can you
assign an IP address to the virtual server?
A. Use DHCP Manager
B. Use Server Manager
C. Use Control Panel
D. Use the IPCONFIG command at the command prompt
Answer: B
199. You are given the Error Log System View as an appellate. You have to
find out what has led the system to Stop Error. All entries from NE2000
are of red colored indication.
12:28 SAM
12:28 System Services Manager
12.28 NWLink Failure
12.28 System Services Manager
12:28 Parport
12:27 Parport
12:26 Parport
12:25 Parport
12:25 System Services Manager
12:25 NE2000
What caused the error to occur?
A. Sam
B. NE2000
C. System Services Manager
Answer: B
200. You install a new device driver for your SCSI hard disk. You discover
that your Windows 2000 Server does not start. You do not have the Set-up
disks but you have the ERD. What must you do to recover the system?
(Choose Two)
A. Create Set-up Disks.
B. Boot up the NT machine using the ERD and use the set-up disks to begin
recovery.
C. Replace the SCSI driver.
D. Boot up the 2000 Server machine using the Set-up disks and use the ERD
to recover the System.
Answer: A, D
201. You have two SCSI controllers, and two SCSI hard disk drives. You
have a fault tolerance that involves the boot and system partition. Second
SCSI controller is not BIOS enabled. Which file would you need in order
that you boot from the hard drive that is connected to the second SCSI
controller?
A. NTBoot.com
B. Scsiboot.com
C. NTBootdd.sys
D. NTBootdd.com
Answer C
202. You have an 2000 Server that has two network interface cards that are
installed on the same network segment. Both cards are bound to TCP/IP and
NetBEUI. When you restart the server, you get an error message about
having duplicate server names on the network. What should you do to fix
this?
A. Unbind NetBEUI from one NIC
B. Unbind TCP/IP from one NIC
C. Create a MH entry in LMHOSTS
D. Create a static entry on the WINS server
Answer: A
203. You are the administrator of your company's network. You use Security
Templates to configure a Security Policy on the Windows 2000 Professional
Computers in the Sales organizational unit (OU). You notice that the
Computers in the Sales OU are not downloading the Security Policy
settings. On each computer, the Security Policy appears in the Local
Computer Policy, but is not listed as the effective policy. You want all
computers in the Sales OU to have the Security Policy listed as the
effective policy. What should you do?
A. Use Security Templates to correct the setting and export the security
file.
B. Use Security Configuration and Analysis to import the security setting.
Then create a Group Policy object (GPO) for the Sales QU.
C. Use Secedit /RefreshPolicy Machine_Policy command.
D. Use the Basicwk.inf security file settings, save the security file, and
then import the file to the Computers.
Answer: C
204. Which Windows 2000 Advanced Options menu item would you use if you
wanted to load Windows 2000 Professional without the GUI?
A. Safe Mode
B. Safe Mode with No GUI
C. Safe Mode Limited
D. Safe Mode with Command Prompt
Answer: D
205. You are the administrator of your company's network. You want to
configure a Security Policy for the Windows 2000 Professional Computers
that are in the sales department. On one of the computers, you use
Security Templates to configure the Security Policy based on the desired
security settings. You then export those settings to an .inf file that
will be used on all of the Computers in the sales department. You want to
configure each Computer to have a customized Security Policy. What should
you do?
A. Use Secedit.exe to import the security settings from the .inf file to
the computers in the sales department.
B. Use a text editor to change the default security settings to the
desired security settings. Then export those settings to the Computers in
the sales department.
C. Create an organizational unit (OU) named Sales. Add the users in the
sales department to the Sales OU. Then apply the security template to the
users in the Sales OU.
D. Create an organizational unit (OU) named Sales. Add the computers in
the sales department to the Sales OU. Then apply the security template to
computers in the Sales OU.
Answer: D
206. You are delegated administrative control of the graphics
organizational unit (OU). You install Windows 2000 Professional on 25
PXE-compliant computers in the Graphics OU by using disk-duplicating
software. The reference Computer was configured to have Windows 2000
Professional default desktop settings. Users in the Graphics OU have home
folders specified in their user account settings. The home folders are
located on the \ServerlUsers network share. You want to change the default
path of the users My Documents folders to their respective home folders
whenever users log on to the network. You want to accomplish this with the
least amount of administrative effort. What should you do?A. In the
properties of the My Documents folder, select Move, and define the UNC
path \ServerlUsers.
B. Reconfigure each domain user account properties on the Profile tab, and
define the UNC path \ServerlUsers.
C. Enable a Local Computer Policy to redirect the My Documents folder, and
define the UNC path \Server 1 Users\%Username%.
D. Create a Group Policy object for the Graphics OU to redirect the My
Documents folder, and define the UNC path \ServerlUsers\%Username%.
Answer: D
207. You use a shared Windows 2000 Professional Computer. You notice, that
some of your Microsoft Word documents that were on the local hard drive
have been deleted. You restore the documents from a recent backup. You
want to be able to track all users who access your Word documents in the
future.
What should you do? (Choose two.)
A. Enable the local Group Policy for auditing object access events that
are successful.
B. Enable the local Group Policy for auditing object access events that
are unsuccessful.
C. Enable the local Group Policy for auditing process tracking events that
are successful.
D. Enable the local Group Policy for auditing process tracking events that
are unsuccessful.
E. Use Windows 2000 Explorer to enable auditing for your files.
F. Run the diskperf-y command. Use System Monitor to examine the logical
I/O counter. Restart the Computer.
Answer: A, E
208. You have ten computers in your organization that are not connected to
the Internet. The company breaks down and purchases a 56K modem to connect
to the Internet. You implement Internet connectivity sharing. Now you
can't see any of the other computers on your network. What do you do?
A. Disable Internet Connection Sharing.
B. Use IPCONFIG to release and to renewC. Disable dial on demand.
C. Recieve IP-address automatically
Answer: B
209. You are the administrator of your company's network. You want to
deploy a Windows 2000 Professional service pack to 10 computers in the
Development organizational unit (OU). You create a Windows Installer
package file for the service pack. You use the package file to
successfully install the service pack to other computers in the domain.
You assign the package file to the Development OU. After the installation,
you notice that the service pack was not installed on any of the 10
computers. You want to ensure that the service pack is successfully
installed on the Computers in the Development OU. What should you do?
A. Use Computer Management to start the Windows Installer service on all
of the computers in the Development OU.
B. Use the local Administrator account to log on to the Computers in the
Development OU. Then redeploys the service pack to the computers in the
Development OU.
C. Run WinINSTALL LE to repair the package file. Then redeploys the
service pack to the computers in the Development OU.
D. Add the user accounts from the Development OU to the DACL. Grant the
user accounts Read permission to the service pack deployment directory.
Answer: D
210. You are the Administrator of your company's network. You install
Windows 2000 Professional onto 10 Computers in the Graphics-Department.
The 10 Computers have built in USB- ontrollers. You then physically
install new USB-Tablet devices on each of the 10 Computers. You are
prompted for the Tablet-Software. You install the Tablet-Software and a
Tablet-Icon appears in the control panel to configure the device, but the
device does not work. You view Device Manager as in the "Exhibit", but no
USB device are displayed (Click the "Exhibit" Button). You want the
USB-Tablets to work on all 10 Computers. What should you do?
A. Disable USB error detection for the USB Root-Hub-Controller and enable
USB-Tablet device in hardware profile.
B. Reinstall the USB device drivers and disable the USB error detection.
C. Enable the USB Root-Hub-Controller and reinstall the USB-Tablet device
driver.
D. Enable the USB ports in the Computer BIOS and reinstall the USB-Tablet
device drivers.
Answer: D
211. You scan an image into your computer running Win2000, the image looks
distorted on your monitor and is not clear. You try and print the image
and it prints out well were can you solve this problem.
A. You can solve the problem through control panel, scanners & cameras
icon and click the colour management tab.
B. You can go to the Display properties icon and change the refresh
frequency.
C. You can go to the Display properties icon and click the colour
management tab.
D. You can go to the printers icon and the colour management tab.
Answer: C
212. How do you prevent or ensure the inappropriate use of the domain
Administrator account. (choose more than one)
A. Renaming the Administrator account and change password.
B. Track failed logons on the domain
C. Set account lockout policies to track after one fialed attempt.
Answer: A, C
213. One of your administrators on your network has accidentally deleted
an organizational unit named Marketing. You are looking to recover this
organizational unit. You check the documentation and verify that the
System State Data was backed up on all domain controllers last night. To
recover the organizational unit you restore the System State Data on a
randomly selected domain controller. Although the organizational unit
briefly appears in Active Directory Users & Computers, after a short
period of time it disappears.
Why did this happen and what should you do to permanently recover the
organizational unit?
A. You did not restore the System State Data from the domain controller
holding the Operations Master role of PDC Emulator. Perform a System State
Data restore on the PDC Emulator.
B. You were not logged in as a member of the Enterprise Administrators
group when attempting to perform the restore of the System State Data. Log
in as a member of the Enterprise Administrators group and perform the
restore.
C. You did not attempt to do an authoritative restore. Do a restore of the
System State Data and specify an authoritative restore using the NTDSUtil
utility.
D. You attempted to do a restore within a period of time that was less
than the Tombstone Interval of the objects that were deleted. Manually
change the length of the Tombstone Interval from the default of 60 days to
one day and repeat the restore of the System State Data.
Answer: C
214. You have been assigned the task of deploying the latest Windows 2000
Professional service pack to all computers on the network you administer.
After creating an installer package file, it installs on all computers
except a group of 7 computers in the Research Organizational Unit. What
can you do to ensure that the service pack is installed on these 7
computers?
A. Use Computer Management to start the Windows Installer Service on all
computers in the Research Organizational Unit.
B. Make sure you are logged in as a local administrator on all 7 computers
first, then duplicate your previous efforts to install the service pack on
the Research computers.
C. Repair the install package file with Windows Install LE and re-deploy
the service pack to the 7 computers in the Research Organizational Unit.
D. Add the user account from the developmental Organizational Unit to a
DACL. Grant the user account read access to the service pack¡¦s deployment
directory. Re-deploy the service pack.
Answer: D
215. You install Windows 2000 Professional on your portable computer but
find that Windows 2000 does not recognize the CD-ROM drive connected to
the parallel port. How should you configure the parallel port to recognize
the drive?
A. Manually specify an interrupt for the port.
B. Configure the parallel port to use automatically assigned resources.
C. Configure the parallel port to accept legacy plug and play detection.
D. Enable ECP on the parallel port in the computer¡¦s BIOS.
Answer: C
216. You want to perform a mass deployment of Windows 2000 Professional on
a network of 100 Windows 95 computers with varying hardware
configurations. With the least administrative effort, how can you
determine which computers have hardware that is compatible with Windows
2000 Professional?
A. Create a bootable floppy disk that automatically runs winnt.exe
/checkupgradonly and distribute it to each user on the network.
B. Configure SMS on your server and conduct an inventory of all hardware
on the Windows 95 computers.
C. Remotely access the registries of all Windows 95 computers and generate
a Report within Regedt32.
D. Enable driver signing when connecting to a RIS server to image the
Windows 95 computers.
Answer: B
217. The Recovery Console is a new feature of Windows 2000 that makes
recovering from a failed system much easier. Which of the following things
can you do from the Recovery Console command prompt? (Choose all that
apply.)
A. Start and stop services
B. Copy data from a floppy disk or CD
C. Format drives
D. Set an active partition
E. Copy data to a floppy disk or CD
Answer: A, B, C
218. [Exhibit question]
Before upgrade: Only Disk 0 (Active partition, Boot and system part.) -
4G.
After upgrade: [All are Dynamic Disks]
Disk 0- 4G
Disk 1- 6G
Disk 2 - 4G
Disk 3 - 4G.
Requirements [fill all if possible]
There is only 2 drives in your computer
2 drives have the same capacity if possible
Non-system drive have optimal performance
Choose the best answer
A. Expand the System Drive to Disk 1 and do a Stripe set on Disks 2, 3.
Giving:- Drive0(system) 10 GB Drive1 (Stripe) 8GB
Answer: A
219. You want to integrate the SP1 into the i386. What should you do?
Choose the best answer
A. Update -s:sourcedir
B. Update -u
Answer: A
220. You have a shared folder called A, and B is one of the folder in A.
Folder B has a file called important.doc. We want to know who attempt to
access this file, what can I do? (choose all that apply)
A. Audit Policy on shared folder A
B. Audit Policy on shared folder B
C. Check the box for successful audit
D. Check the box for failure audit
Answer: B, C, D
221. You are network administrator. Your network has some servers and some
pros. No policies are in effect. You have enabled driver signing on the
clients. Now some of the users want to test unsigned drivers, but cannot
install the drivers from the network share where they live. You want to
let them do this but keep some security. Which of the following should you
do?
A. Select WARN in the Driver Signing options dialog box on file server
B. Select WARN in the Driver Signing options dialog box on the relevant
clients
C. Select BLOCK in the Driver Signing options on file server
D. Select BLOCK in the Driver Signing options on relevant clients.
Answer: B
222. You want to set up FTP port on your computer. In an exhibit are a
TCPport box, UDP port box and IP box. The TCP port box has a few numbers
in (ie http-80). The question says what port do you use:
A. Put FTP port 21 in TCP port box
B. Put FTP port 138 in TCP port box
C. Put FTP port 21 in IP port box
D. Put FTP port 138 in IP port box
Answer: A
223. You want to implement IPadress to Computername resolving. How do you
configure this in a NETBIOS environment?
A. Install a DHCP server
B. Install a DNS server
C. Install a WINS server
D. Install an LMHOST convertor
Answer: C
224. You manage a routed TCP/IP network. You want to add 10 new comps. and
to use NetBios names to access shares on the network. You have configured
the IP address and Subnet Mask. What else? (Choose two.)
A. bindings
B. DNS
C. gateway
D. WINS
E. DHCP
Answer: C, D
225. Which servers must be online to be able to join a Windows 2000 domain
with a Windows 2000 Pro machine (choose all that apply)?
A. Domain Controller
B. Domain Naming master
C. DNS server
D. DHCP server
Answer: A, C
226. You are network administrator. Your network has x Win98 computers, y
WinNT4.0 computers, and a recently upgraded Win2kServer. You want to
upgrade Win NT w'stn 4.0 to Win2k. The computers are all identical they
also have a Win2k compatible application. You also have a domain on your
network. You will create a login script that will map the distribution
point to the clients. You test the upgrade on a test computer.
You want to
Identify any incompatibilities before Setup starts
Have no user intervention during upgrade
Upgrade over the network
Have the test computer join the domain
Have the application working after the upgrade
Have each computer assigned it's own SID
You plan to do the following;
Run Winnt32 /checkupgradeonly on the test computer
Use setup Manager to create an answer file named answer.txt
Create a shared distribution point on the network containing i386
directory from the CD
Select 'provide defaults' during Setup Manager
Select Windows Server Domain (option Workgroup or Computer Domain) during
Setup Manager
Create a domain account for the test computer
Run Winnt32 /unattend:answer.txt /s:[sourcepath] from command prompt on
test computer
What do you achieve? (choose all that are correct)A. hardware and software
compatibility issues are identified
B. upgrade prevents user interaction
C. upgrade occurs over the network
D. test computer joins the domain
E. the application functions after the upgrade
F. each computer is assigned a unique SID
Answer: A, C, E, F
227. Your windows 2000 prof computer contains a 166 MHz processor 64 mb of
ram and 750 mb of free disk space. You have installed a number of
applications on your computer including a word processing program a
spreadsheet program a third party scientific application and a multimedia
player. You notice that when you have several of these applications open
simultaneously the performance of your computer is noticeably slower. You
run system monitor and review the results as shown in the exhibit. There
was blue and red line touching 100%. Both line were processor lines. What
should you do to solve this problem?
A. Use diskprode to modify existing disk sector values.
B. Upgrade your processor.
C. Increase the amount of free disk space.
D. Increase the amount of ram
Answer: B
228. TCP/IP diagram question:
1 Client1 and Servere on one side of the router.
2.Client2 and SeverA on second side
3.Wins Server Dhcp may be DNS server.
Exibit shows that you can ping serverE from client2 on different subnet.
But client2 still cann't access resources on serverE
A. DHCP Problem
B. Dns Problem
C. Gateway problem
D. Wins problem
Answer: B
229. You want to map a drive G to the default admin share on drive c on
Application Server SRV01?
A. net share g:\\AppSrv01\c$
B. net share \\AppSrv01\c$:g:
C. Net Use g: \\AppSrv01\Admin$
D. Net Use g: \\AppSrv01\C$
Answer: C
230. If you choose Typical Settings, which of the following configurations
are made during the Network Settings component of the Windows 2000
Professional installation? (Choose all that apply).
A. Network connections for Client for Microsoft Networks
B. File and Print Sharing for Microsoft Networks
C. NetBEUI protocol with automatic addressing
D. TCP/IP protocol with automatically assigned address
Answer: A, B, D
231. You use Windows 2000 Professional on your desktop Computer. You are
working on your company's annual financial report. You want other users on
the network to be able to modify your documents for the report. You use
Windows Explorer to share the financial report folder on the network.
Because the report contains confidential information, you want to prevent
users from enabling offline access for the network share that contains the
financial report. What should you do?
A. Use Windows Explorer to disable Offline Files.
B. Use Windows Explorer to disable caching for the reports on the network
share.
C. Use Windows Explorer to grant users Special access for the reports on
the network share.
D. Use Synchronization Manager to configure synchronization not to occur
when users are connected to the LAN connection.
Answer: B
232. How do you make a web page available for offline viewing in Windows
2000? (choose all that apply)
A. On the Favorites menu in Internet Explorer, click Add to Favorites.
B. Select the Make Available Offline check box.
C. To schedule updates for content download, click Customize.
Answer: B
233. You are upgrading several Windows 95 computers to Windows 2000
Professional. Most have the same hardware, but there are many different
peripheral devices throughout the company. How can you verify that all of
the hardware in use is compatible with Windows 2000 Professional?
A. Install Win2k on every single PCs, since your gut instinct tells you
that it's going to work
B. Copy all i386 files to a shared network folder. Create network bootable
floppies containing "winnt32.exe/checkupgradeonlyQ", distribute to the
users and let them tell you what happen.
C. Add the entry ReportOnly=Yes to the [Win9xUpgrade] section of the
Answer: file. Run Winnt32.exe /Unattend:Setup.inf.
D. Use Setup Manager to create a Setup.inf file.
Answer: C
234. You configure a user's Windows 2000 Professional computer to use the
on-screen keyboard and StickyKeys options. You save the accessibility
option settings to a shared folder on the local hard disk of the user's
computer. You want to configure the same options for another user. You log
onto the second user's computer using his local user account. You access
the shared folder over the network, and select the .acw file from the
shared folder. You receive an error message stating that there was a
problem loading the specified file. What should you do?
A. copy the .acw file to the c;\documents\setting\default user folder
B. save the accessibility option to the floppy disk and change the
permission to allow full control of the file.
C. resume the setting for the option by using utility manager then copy
the file to peters local profile folder
D. Change the permission of the .acw file in the folder to allow access
for the User's user account.
Answer: D
235. Your computers have both Windows NT Workstation 4.0, and Windows 2000
Professional. You configure the hard disk on each computer to have a two
4-GB partitions. Windows NT Workstation is installed on drive C, and
Windows 2000 Professional is installed on drive D. You configure a disk
quota on drive D to prevent users from saving data on the disk. How can
you prevent users from saving files to drive D in either operating system?
A. Use NT4 NTFS permissions to deny users write access to D:
B. Enable EFS on D:
C. Format the NT 4 partition and reload NT 4
Answer: A
236. While installing a printer driver on a Windows 2000 Professional
computer, you are prompted with the error, Error 11-Cannot Install Printer
Driver. This driver was downloaded from the manufacturer¡¦s web site and
has been installed on other computers on your network. How should you
configure this Windows 2000 computer to check for driver integrity and to
allow you to install this printer driver?
A. Configure driver signing to display a message before installing an
unsigned driver.
B. Configure driver signing to ignore file signature verification. Create
a local computer policy to enable Windows file protection.
C. Use the Add Printer Driver Wizard to install the driver. Create a local
computer policy to enable Windows file protection.
D. Use the Printer Troubleshooter to configure the computer to prevent the
installation of unsigned drivers.
Answer: A
237. Install Windows 2000 Professional on your portable computer. You
create a new dial-up connection to connect to your company?s remote access
server. You connect to the remote access server by using the dial-up
connection. You can cormect to servers on the same segment as the remote
access server. You cannot access shared resources that are on remote
segments from the remote access server. What should you do?
A. Configure the company's remote access server to accept Multilink
connections.
B. Configure the TCP/IP properties for the dial-up connection to disable
IP header compresslon.
C. Configure the TCP/IP properties for the dial-up connection to use the
default gateway on the remote network.
D. Grant your user account dial-in perrnission on the company's remote
access server.
Answer: C
238. You create a new dial-up connection to connect to the Internet. You
configure the Internet connection to enable Internet Connection Sharing.
However, you cannot see or connect to any shared resource on your network.
What should you do?
A. Configure the dial-up connection to disable shared access.
B. Configure the dial-up connection to disable on-demand dialing.
C. Disable data encryption in the new dial-up connection.
D. Use the ipconfig command to release and renew your network TCP/P
address.
Answer: D
239. You use your Win2000 Professional computer to transfer 20 large
files. Each file is 100 MB in size. You want to copy the files from a UNIX
server in your branch office to a computer running SQL Server at the main
office. When you copy the files by using Windows Explorer, the connection
times out and the file copy is aborted. You want to monitor the
performance of TCP/IP of your computer. What should you do (choose two)?
A. Use the Performance Console to view all the counters of the TCPobject.
B. Enable Simple TCP/IP Services
C. Enable Network Monitor Agent
D. Examine Data Grams lost
E. Enable SNMP
Answer: A, E
240. Which methods should you use to identify and authenticate existing
customers on the Web site?
A. SSL, NTLM logon, and database validation
B. SSL, anonymous logon, and CHAP
C. SSL, NTLM logon and CHAP
D. SSL, anonymous logon and database validation
Answer: D
241. You have Win2000 Professional installed on your C drive. Both your C
and D drives have more than 500 MB of free disk space. You frequently run
many memory intensive graphics applications simultaneously. You notice
that access to drive C is much slower when you are using the graphics
applications. You want to maximize disk performance. What should you do?
A. Configure the initial size of the paging file on drive C to be set by
the system and place a maximum size on virtual memory of 64 MB.
B. Configure the initial size of the paging file on drive C to be set by
the system and place a maximum size on virtual memory of 128 MB.
C. Move the paging file to drive D. Have the system set initial virtual
memory size and maximize virtual memory size to 256 MB.
D. Move the paging file to drive D. Set the initial size of virtual memory
to 56 MB and maximize the size of virtual memory to 256 MB.
Answer: C
242. Computers on the ACCOUNTING subnet, which runs Win2000 Professional,
are dynamically assigned IP addressing and configuration information from
a DHCP server on the subnet. Computers on the DEVELOPMENT subnet run
Windows 98. They are statically assigned IP addressing and configuration
information. Users on the ACCOUNTING subnet report that they cannot
communicate with users on the DEVELOPMENT subnet. A user who works on
Computer3 reports that he cannot communicate with computers on either
subnet. You view the network configuration and it shows computers in
subnet ACCOUNTING get IP and gateway addresses by DHCP, but the gateway
configuration of DHCP Server is wrong. Computer3 only has NWLink protocol.
What should you do? (Choose two)
A. Change the frame type to 802.2 on Computer3
B. Change the default gateway option IP address on the DHCP server
C. Change the default protocol on the computers on the Sales subnet to
NWLink IPX/SPX/NETBIOS Compatible Transport Protocol
D. Enable TCP/IP protocol with the default settings on Computer3
E. Add the NETBEUI protocol to the binding order on all client computers
Answer: B, D
243. What file systems are supported by Windows 2000 (choose all that
apply)?
A. FAT
B. FAT32
C. NTFS
D. HPFS
E. OS/2
Answer: A, B, C
244. To logon locally, a computer must be a member of what (choose two)?
A. The computer must be a member of a Workgroup.
B. The computer must be a member of a domain.
Answer: A, B
245. One user has a Video Capture Card installed on her pc. She uses it to
capture video pictures. She complains the video capture card is not
working properly and she couldn't view captured video. You went to Device
manager (there was an exhibit show you the Device Manager, and there was
no video capture card listed in there. There was a yellow marked audio
adapter, but shouldn't have anything to do with the question). What should
you do.
A. Enable the device in Device manager
B. Install new driver from Device Manager
C. Disable PNP and install manually
D. Copy the manufacturer's driver to WINNT\driver cache\i386\ and then let
Windows 2000 to install the device.
Answer: B
246. You attempt to connect to the ISP. You view the status change from
Dialing to Verifying user name and password. After several seconds, the
status changes tom Disconnecting. You arc then disconnected from the
Computer you dialled. You verify that your user name and password are
entered correctly. You want to enable your Computer to connect to your
ISP. What should you do?
A. Configure your connection to enable data encryption.
B. Configure your connection to use the UNIX SLIP server.
C. Configure your connection to allow unsecured passwords.
D. Instruct your ISP to configure your account to support Multilink.
Answer: C
247. TCP/IP diagram question: Four PC's on one side of the router. Three
configured with TCP/IP and NWLink 802.2 and fourth PC with NWLink 802.2.
Their gateway configuration is wrong, the other side is all TCP/IP
configured correctly to the router. What are the two best things to get
them all talking together (choose all that apply)?
A. The DHCP server was handing out bad gateway addresses
B. Configure the Nwlink PC to use DHCP
C. Configure the Nwlink PC to use 802.2
D. Configure everyone to use NETBEUI
Answer: A, C
248. A user in your Accounting OU reports that their mouse is not working.
You log onto the domain from that user's computer by using the domain
Administrator's account. You discover the user is using an old mouse
driver. You install an updated mouse driver, and restart the computer. The
mouse is still not working correctly. You view Device Manager, and notice
the previous mouse driver is still installed. What should you do?A.
Configure the OU policy for security to warn and allow the installation to
overwrite the Local Policy.
B. Configure Domain policy to allow installation of drivers overwrite
local policy.
C. Configure local policy to allow installation of drivers to overwrite OU
policy
Answer: A
249. You are an administrator for a big network. You publish PowerPoint to
the 50 computers in the Accounting OU. The package fails to install on
only one computer. How should you resolve this problem?
A. Restart Windows Installer on the domain controller.
B. Restart Windows Installer on the computers that failed to install the
service release.
C. Re-deploy the service release using a .Zap file.
D. Reimage the 4 computers manually.
Answer: B
250. You have an encrypted file, which is copied to a NTFS share. What is
the status of the file after copying?
A. Still encrypted
B. Not encrypted
Answer: A
251. Strictly the DHCP Relay Agent should be on the same subnet as the
clent machine (you can't install a DHCP Relay Agent on a router) so if
there's a space on the remote subnet with the clients it goes there.The
DHCP server goes in the subnet on the other side of the router.
If there's a space on the remote subnet with the clients and one on the
router, the router one is just to confuse you. You need to share a
financial spreadsheet with other employees of your company. The material
is of a sensitive nature and you want to prevent the ability of users to
use offline caching. How do you do this?
A. Assign Special Permissions
B. Select Shared folder properties, caching, deselect "Allow Caching"
Answer: B
252. Your boss uses a laptop with some usb devices in the office and wants
to take the laptop on the road. When he removes the laptop from the
docking station, he finds his usb ports do not work, and he askes you to
help out. So what should you do:
A. Enable USB in BIOS
B. Obtain and make available external power sources for the USB devices
C. In power options, advanced, enable USB ports
D. Some thing about enabling USB ports in undocked hardware profile
Answer: D
253. You administer a network for a company with two domains, cycles.com
and blades.com. The corporate intranet is hosted on a Windows 2000 Server
on cycles.com which runs IIS and Proxy Server 2.0. You want users in
blades.com to access the corporate intranet using the url
http://cycles.com. How?
A. Add cycles.com to the domain suffix search order on the intranet
server.
B. Add blades.com to the domain suffix search order on the intranet
server.
C. Add blades.com to the exceptions list within the Proxy server settings
on the intranet server.
D. Configure proxy settings on all computers in the blades.com domain to
bypass proxy servers for intranet addresses.
Answer: A
254. You administer a Windows 2000 Professional computer that is shared by
many members of your company's sales department. You want to configure
roaming profiles. Each individual profile must be active from all
locations, including dialup locations. You log in locally to the computer
and create user accounts. However, after creating user accounts for all
users you find that you cannot configure each user account to be a roaming
profilE.Why?
A. You must make this change within the Change Type applet in the Control
Panel.
B. You must make this change within the Users applet in the Control Panel.
C. The computer must be connected to the network for the user accounts to
be designated as roaming.
D. You must create a Virtual Private Network (VPN) connection on the
portable computer prior to designating roaming profiles.
Answer: C
255. You load NT 4 on C: and W2kp on D: You do not want users to save
files to D: in either operating system, but you do want them to be able to
access D: You implement user quotas in W2k so that users cannot save files
to D: When you restart the PC an go into NT4, users can still write to D:
What to do?
A. Use NT4 NTFS permissions to deny users write access to D:
B. Enable EFS on D:
C. Format the NT 4 partition and reload NT 4
Answer: A
256. You install an external SCSI tape drive.The drivers install OK and
the system starts up normally. When you reboot the PC later in the
afternoon, you get a blue screen. What to do?
A. Go into device manager and remove SCSI device.
B. Select recovery console and disable the driver with DISABLE command
C. Select safe mode and remove the driver
D. Use ERD to remove the drivers.
Answer: B
257. You are an administrator in a company that has Windows 2000
professional systems. Your users have been installing unsupported USB
drivers on to their systems causing them to lock up and fail. You want to
insure that only drivers that are in the HCL can be installed. What must
be done? (Choose 2)
A. Under driver signing Ignore - Install all files, regardless of file
signature
B. Under driver signing Warn - Display a message before installing an
unsigned file
C. Under driver signing Block - Prevent installation of unsigned files
D. Apply setting as system default
E. Use the file Signature Verification Utility to configure drive
signature policies
F. create a system policy that denies installation of unassigned drivers
Answer: C, D
258. You have some compressed bitmap files in a directory of your Windows
2000 Professional computer. The file compression has reduced their size
from 2 MB to 1 MB. You attempt to copy them to a floppy disk,but an error
reports that the destination drive is full. How can you copy the bitmap
files to a 1.44 MB floppy disk?
A. Use a third-party file compression utility to create a compressed
archive containing the bitmap files. Copy the compressed archive to the
floppy disk.
B. Create an empty compressed folder on the floppy disk, and copy the
files to the new folder.
C. Format the floppy disk as NTFS, and restart the copy operation.
D. Confirm that the cluster size on the NTFS volume is greater than 32k
Answer: A
259. You administer a network consisting of 14 Windows 2000 Professional
computers and 1 Windows 2000 Server. You want all computers to share a
single dialup account with a local Internet service provider (ISP). You
buy a 56K V.90 modem. How do you enable Internet Connection Sharing?
(Choose all that apply)
A. Configure the shared modem to use software handshaking.
B. Configure the dialup connection to enable On-Demand dialing.
C. Configure the dialup connection to enable Internet Connection Sharing.
D. Configure all other computers to have a dialup connection that uses the
shared modem.
E. Attach the modem to one of the Windows 2000 Professional computers and
create a dialup connection to the ISP.
F. Attach the modem to one of the Windows 2000 Professional computers and
share the modem with the network.
Answer: B, C, E
260. You have an OU named GRAPHICS. You configure a GPO to install an
application to the GRAPHICS OU via an .msi filE.You want three users in
the GRAPHICS OU, Carlos, Maria, and Tony (similar names) to receive a
customized version of the software giving them access to additional
filters, etC. How can this be done?
A. Create the Graphics OU. Then redeploy the application via the .msi
filE.
B. Create the Graphics OU. Then redeploy the application via the .mst
filE.
C. Create the Advanced Software OU under the Graphics OU. Then add the
users to the new OU and redeploy the .msi file to the new OU.
D. Create the Advanced Software OU under the Graphics OU. Then add the
users to the new OU and redeploy the application using an .mst file.
Answer: D
261. You are the network administrator of a small 20-user network.
Management has decided to upgrade all computers to windows 2000.After
closer examination, you realise that only half of the network interface
cards are Net PC compliant. You decide to create Windows 2000 remote boot
floppies. What executable is used for creating RIS boot disks for non-pxe
compliant clients?
A. Run Rbfg.exe to create a Non-pxe-compliant startup disk.
B. Run Riprep.exe to create a non-pxe complaint startup disk.
C. Grant the everyone group NTFS Read permission for the RIS imagE.
D. Grant the Administrators group NTFS Read permission for the RIS imagE.
Answer: A
262. You install a ZIP drive into a Windows 2000 system. You install the
drivers. On reboot the system locks. You can't get in, and even safe mode
doesn't work. How do you unload the driver to get back in to Windows 2000
professional? (Choose three)
A. Go into device manager and remove Zip drive.
B. From a command prompt run LISTSVC to disable the zip driver
C. From a command prompt run DISABLE to disable the zip driver
D. Select recovery console from the repair
E. Start the PC from CD-ROM
Answer: C, D, E
263. Maria has been set up as an assistant to you the administrator. Users
are complaining that Maria has been opening their files and editing them.
She needs to perform backups and installations of programs, and setting up
of printers. How do you fix the problem with the minimum amount of effort,
yet allowing her to accomplish the assigned tasks?
A. Remove her Administrator privilege and give her Power Users and Backup
Operators
B. Leave her as Administrator and make deny on Users' files
C. Remove her administrator privileges and assign her Server Operators
D. Remove her administrator privileges and assign her Power Users and
Replicatior
E. Tell her that she isn't allowed to tamper with other users files.
Answer: A
264. A user downloads a video card driver from the Internet. You are
unsure of the source of the driver. You want to ensure the user does not
lose production time because of an incompatible driver. What should you
do?
A. Install the driver into the computer. Restart the computer, use the
last known good configuration to recover the original driver if necessary.
B. Install the driver in the computer. Use the hardware troubleshooter,
then use the rcovery console to recover the original driver if necessary
C. Display the advanced attributes of the video card driver filE.Install
the file only if the contents have been secureD.
D. Run file signature verification utility to verify that the driver has
been digitally signed, Do not install otherwisE.
Answer: D
265. You install Windows 2000 Professional on an existing workstation
depatment. Later you are told that a dial-up connection will be needed to
access a local Internet service provider. When you open the computer you
find that a 33.6k modem has already been installed, but the users insists
that you also installa a faster 56k modem. This results in a conflict
between the two modems. How do you resolve this situation?
A. Disable the 33.6K modem.
B. Disable the 56K modem
C. Disable the Com port 2
D. Disable Com port 4
E. Run Windows update, this will update this 33.6k modem drivers
Answer: A
266. A user copies a compressed folder from an NTFS partition on her
Windows 2000 Workstation to a shared NTFS folder on a remote Windows 2000
Server. What effect will this have on the newly created folder?
A. Folder compression depends on the users Access Permission.
B. The newly created folder will be automatically uncompresseD.
C. The newly created folder will inherit the compression state of the
target folder.
D. The newly created folder will retain its original compression state.
Answer: C
267. You are in charge of the admin organisation unit (OU) Your company
has recently purchased 19 new Windows 2000 Professional computers with Fax
Modems pre-installed. Each computer has the fax service installed with
default settings. Hayley has been assigned one of the new fax enabled
computers. She reports that Microsoft Word 2000 will only send faxes, but
her computer will not receive any. She also informs you that she cannot
configure the fax server on her computer. You want to configure the fax
server correctly and with the least amount of administration effort. You
logon to Hayley's computers by using administrative account. What should
you do?
A. Use the Fax Service to start the fax service and configure the Fax
service to start automatically
B. Use the Fax Service Management tool to enable the device to receive
faxes.
C. Use the Fax in Control Panel to reinstall the fax server and configure
the fax services to receive faxes
D. Use Fax in Control Panel to add a fax operator and run fax print device
to receive faxes.
Answer: B
268. You run englsih edition of windows 2000 pro on all computers in your
network. As your company continues to grow, and the number of computers is
continually esxpanding, you decide that another domain is needeD.
Management asks what is needed to accommodate this new doamin. What do you
tell them ?
A. wins DHCP and DNS
B. at least one domain controller and one DNS server
C. At least one domain controller and Active directory
D. Nothing more is needed
E. Nothing more is needed, we can just subnet the network
Answer: B
269. You want to configure the RIS image so that the standard applications
will be accessible to the user when the user first logs on to the network.
What should u do?
A. Run rbfg.exe before installing the standard applications.
B. Run riprep.exe before installing the standard applications.
C. Copy the all users profile to the default users profilE.
D. Copy the local administrator account profile to the default users
profile
Answer: D
270. You install a Zip device on your Windows 2000 Professional computer.
You reboot, and the computer does not responD. You reboot into Safe Mode,
and again, the computer will not responD. How do you recover? (Choose all
that apply)
A. Use the listsvc command to disable the Zip device driver.
B. Select Recovery Console from the Recovery Menu.
C. Use the disable command to disable the Zip device driver.
D. Select Debug mode from the Windows 2000 Advanced Option menu.
E. Insert the Emergency Repair Disk and specify the path of the recovery
file on the hard disk. Start the computer using the Windows 2000
Professional CD-ROM.
Answer: B, C, E
271. You are the administrators of your company's network. Your network
has 75 windows 2000 professional computers and 8 Windows 2000 Server
computers. Users on the network drive save their work files in home
folders on a network server. The NTFS partition that contains the home
folders has Encrypting File System (EFS) enableD. The partition also has
disk quotas defineD. A user named candy reports that she cannot save any
files to her home folder. She also cannot update files in her home folder.
When she attempts to save files to the folder she receives the following
error message 'Insufficient disk space.Other users are not experiencing
this problem with their home folders. You want to enable candy to save
files in her home folder. What should you do?
A. Log on to the network as a Recovery Agent. Decrypt all of candy's files
in her home folder.
B. Log on to the network by using the domain Administrator account. Grant
Candy Full control permission to her home folder.
C. Use Windows Backup to archive and remove old files on the server.
D. Increase the server a disk quota entry for candy to accommodate the
additional files
Answer: D
272. You are the administrator of your company's Windows 2000 network.
Your company has one laser printer (Printer1) that is used by both the
advertising department and the Sales department. The Advertising
departments is constantly printing large projects that can take several
minutes to print. The Sales department prints only small fast-printing
documents. The Sales does not want to wait for the Advertising departments
to finish. What do you do?
A. Set the Advertising departments priority to 50 on Printer1, add another
printer (Printer2). Assign Sales priority 1 and deny access from the
Advertising department.
B. Set the Advertising departments priority to 50 on Printer1, add another
printer (Printer2) and inform Sales to use Printer2. Assign Sales priority
99 and deny access from the Advertising department.
C. Set the Advertising departments priority to 50 on Printer1, add another
printer (Printer2) and inform Advertising to use Printer2. Assign Sales
priority 99 and deny access from the Advertising department.
D. Set the Advertising departments priority to 50 on Printer1, add another
printer (Printer2) and inform Advertising to use Printer2. Assign Sales
priority 99 and deny access from the Advertising department.
Answer: B
273. You want to configure your Win2000 Professional portable computer to
use offline files. The files include a large project file and some smaller
personal files. Your portable computer uses a dial-up to connect to the
server at scheduled times during the day to automatically download your
e-mail messages. You do not want to synchronize the project file when you
connect to the network by using your dial-up connection. What should you
do? (choose all that apply)
A. Configure the synchronisation settings to perform a quick
synchronisation
B. Configure the synchronisation settings to ask you before synchronising
items
C. Configure Synchronization Settings to synchronize the project file only
when using the LAN connection.
D. Set synchronization for the personal files for both the LAN connection
and your dial-up connection
Answer: C
274. You run the English (US) edition of windows 2000 professional on your
computer. You are developing a product installation document that has text
in both English and Spanish. The word processing program you are using is
a Windows 16-bit character-based application. You start the word
processing program and complete the English Portion of the document. You
then install Spanish as a language group by using Regional Options in
Control Panel. However, You cannot use Spanish to complete the Spanish
portion of your document. What should you do?
A. Change the language preference from English to Spanish within the word
processing Program.
B. Install the Spanish version of Windows 2000 Professional . Reconfigure
your language settings, and restart the word processing program.
C. Save and close the word processing program. Select Spanish by using the
locate indicator on the taskbar, and restart the word processing program.
D. Save and close the word program. Log off and log on to the computer.
Restart the Word processing program, and select Spanish by using the
locale indicator on the taskbar.
Answer: C
275. You install an INSA-based SCSI adapter in your portable Windows 2000
computer¡¦s docking station. You start the computer, but the adapter is
not detected while Windows 2000 boots. You run the Add/Remove Hardware
Wizard, but the adapter is still not detecteD. What should you do next?
A. Restart the Add/Remove Hardware Wizard and manually add the SCSI
adapter driver.
B. Restart the computer in Safe Mode and run Add/Remove Hardware to
automatically detect the SCSI adapter driver.
C. Copy the SCSI adapter driver to the \I386 directory and restart the
Add/Remove Hardware Wizard to automatically detect the SCSI adapter.
D. Reconfigure Windows 2000 for driver signing. Restart Add/Remove
Hardware to automatically detect the SCSI adapter.
Answer: A
276. Your network consists of 10 peer-to-peer Windows 2000 Professional
networked computers, one of which has Internet Connection Sharing
installeD. Some of the Windows 2000 Professional computers will need
access to the internet. What connection option should be selected in order
for the other computers to connect to the internet?
A. Accept incoming connections
B. Connect using my serial parallel, or infrared port.
C. Dial-up to private network
D. Enable Internet Connection Sharing for this Connection
E. VPN
Answer: D
277. Most of the Windows 2000 Professional clients on your network use the
TCP/IP Protocol to communicate with Server. You want to increase network
performance. Where do you change the binding order?
A. Windows 2000 Server >> Network >> Binding >> Server >> TCP/IP on the
top.
B. Windows 2000 Professional >> Network >> Binding >> Workstation >>
TCP/IP on the top.
C. Windows 2000 Professional >> Network >> Binding >> Server >> TCP/IP on
the bottom.
D. Windows 2000 Server >> Network >> Binding >> Workstation >> TCP/IP on
the top.
Answer: B
278. A smart card authentication system has been installed on your
network. It will be used for remote authentication. Which protocol(s) must
be used to allow smart card authentication? (Choose all that apply)
A. EAP
B. IPX/SPX
C. IPSec
D. SNMP
E. L2TP
Answer: A
279. You create a roaming user profile for a user named Art, but when he
logs in, he is told that Windows cannot locate his roaming profile and
that he will be logged in using local profile information. What must you
do to ensure that this roaming profile is effective wherever Art logs in?
A. Create a home folder for Art.
B. Share the directory which holds his profilE.
C. Map a network drive to his network profile directory.
D. Use the %username% variable when naming his user directory.
Answer: B
280. You are configuring a roaming user profile for a Scott Peters. You
create a user account named ScottP on a Windows 2000 Server. You define a
network profile directory path named \\Server1\Profiles\%Username%. When
Scott logs onto the computer, he receives the error message, "Windows
cannot locate your roaming profile and is attempting to log you on with
your local profile will not be propagated to the server, The details of
network cannot be found". What should you do?
A. Change the %Username% variable to ScottP.
B. Create a home folder for Clint
C. Map a device to network profile directory
D. Share the directory which holds his profile.
Answer: D
281. You have a Windows 2000 Professional portable computer that is shared
by users in one of your departments. You want to configure a roaming user
profile so that users can logon from any location including by using a
dial-up connection. You log on to the computer by using the local
Administrator account. You create user accounts for the users. When you
attempt to configure each individual user account profile to be a roaming
profile, you fail. You receive the Change Profile Type dialog box. What
should you do?
A. Connect the portable computer to the network, and configure the user
accounts for a roaming user profilE.
B. In control Panel select the change type option. Then select the roaming
profile option.
C. From users and passwords in the control panel select the advanced tab
and then redefine the path for the profile location.
D. Use the network connection wizard to create a Virtual Private
Network(VPN) connection to the network and define the mandatory profile
path on each domain user account.
Answer: A
282. You schedule a task to run after 15 minutes. After an hour, you check
the Event Viewer system log. It contains the error message: "The Task
Scheduler service failed to start". You want to run the scheduled task
again. What should you do before restarting the Task Scheduler?
A. Set the Task Scheduler service to log on as a Local System account.
B. Set the task scheduler service to interact with the desktop
C. Resatart the remote procedure serviced called RPC service
D. Log off then on using an account in the power users group
Answer: A
283. You configure your portable Windows 2000 Professional computer to
redirect all files saved to the My Documents folder to your home folder.
What two actions should be performed to ensure that all files in the My
Documents folder are available when the computer is not on the network
(choose all that apply)?
A. Enable offline files in Windows Explorer.
B. Create a shortcut in My Network Places to access your home folder.
C. Create a shortcut in Windows Explorer to access offline folders from
the desktop.
D. Use Synchronization Manager to configure your home folder to be
available offline.
E. Use Windows Explorer to configure the properties of your home folder to
be available offline.
Answer: A, E
284. You want to automate the installation of 20 Identical Pentiym III 550
MHZ computers, You create an answer file (unattenD.txt) and copy it to a
floppy disk. You insert the bootable CD-ROM, insert the floppy disk and
reboot thr computer. After the installation is complete you find that most
of the hardware and all the preconfigured desktop settings are missing.
What went wrong ?
A. The answer file on the floppy disk must be nemed Winnt.sif
B. The answer file on the floppy disk must be named Win2000.sif
C. The computer did not have 'El Torito No emulation' support
D. You can only automate the installation of windows 2000 computers with
RIS
E. The floppy disk was not bootable
Answer: A
285. You attempt to install 32-bit application printer software that came
with a new laser printer. During the installation, you receive the error
message "failed to load WINPRINT.DLL. Specified module could not be found"
(an exhibit will be shown). What should you do before you share the
printer with other users?
A. Change the LPT port settings to enable legacy plug and play detenction
B. At your computer change the LPT port settings to use bi-directional
printing then restart the print server
C. Obtain and install the WDM-compliant device drivers and printing
software for the printer.
D. Obtain and install WDM compliant drivers for the new colr laser printer
Answer: C
286. Video card, non-PNP. Resolution set to 1024x768, 16 color. You want
to change colors, but can't. Exhibit shows "unknown" for any of video card
properties. What to do ?
A. Install WDM driver for monitor
B. Install WDM drivers for monitor and video card
C. Set refresh rate to 60
D. Move the card to another slot.
Answer: B
287. You install Windows 2000 Professional on a new APM compliant
computer. You notice problems whenever you attemp to shut down the
computer or enter or resume from standby or hibernate mode. What tool can
you use to determine AOM problems (Choose all that apply)A. setup32.exe
/apm
B. The power options in control panel
C. System event log
D. apmstat -v command
E. apmbios /show_all command
F. Display Properties
Answer: B, C, D
288. Saul needs access to files that are in the Accounting folder on his
computer.A local group named accounting is granted full control permission
to the accounting folder and the files within it.Saul is a member of the
accounting local group but he cannot access the files that he needs.What
should you do?
A. Grant Saul NTFS permission so that he can access any parent folder or
files in the shared sales folder.
B. Share the Sales folder and grant Saul shared folder permission to
access the shared sales folder.
C. Remove saul from any other groups that have been explicitly denied
access to the accounting folder.
D. Delete the Sales local group and recreate, add individual user accounts
from the sales department back into sales local group
Answer: C
289. A user named Tom reports that an application on his W2kP computer is
running slowly. You notice Tom's computer has 64 MB of RAM and 100 MB of
free disk space. What should you do to improve the performance? (Choose
all that apply)
A. Add Tom to the Power user group
B. Set the total paging file to 75% of physical memory
C. Perform a disk analysis and use the disk defragmenter if recommended
D. Use Disk cleanup to delete temporary files and unnecessary program
files
E. Ensure that the Performance Options windows is optimized for background
services
Answer; C, D
290. You want to configure your Windows NT workstation 4.0 computer to run
both Win NT workstation and W2P. What should you do before installing W2P?
A. Run check Disk in Windows NT workstation 4.0
B. Disable disk compression in Windows NT workstation 4.0
C. Install service Pack 4 or later for Win NT workstation 4.0
D. Install the DFS client in Windows NT workstation 4.0
Answer: C
291. You want to see all the shares in use on your computer. How can you
easily view this information?
A. Control Panel\Data Sources (OBDC)
B. Control Panel\System Tools\Shared Folders
C. Computer Management\System Tools\System Information
D. Computer Management\System Tools\Shared Folders\Open Files
E. Computer Management\System Tools\Shared Folders\Sessions
F. Computer Management\System Tools\Shared Folders\Shares
Answer: F
292. You are upgrading a computer from Win98 to Win2K. The computer meets
the minimum hardware requirements. You are performing the installation
using the Win2K PRO CD. After the text mode installation portion is
complete, you restart the computer. The BIOS virus checker on your
computer indicates that your computer is infected with a MBR virus. What
should you do?
A. Remove the virus checker in Win98
B. Disable the BIOS virus checker and restart the computer
C. Run FIXMBR.exe from the Win2K PRO CD
D. Modify the Boot.ini to include a signature parameter on the ARC path of
the system partition
Answer: B
293. Your routed TCP/IP network consists of 10 Win2000 Server computers
and 75 Win2000 Professional computers. TCP/IP is the only network
protocol. You want newly installed computers to use NetBIOS names to
connect to all shared resources on the network. You configure a TCP/IP
address and a shared mask on each new computer. Which two additional
TCP/IP properties should you configure on each new computer? (choose two)
A. A Gateway address.
B. A WINS server address.
C. A DNS address
D. A DHCP server address
E. The Bindings
Answer: A, B
294. You want to create a shortcut to a folder named Project on a network
share. You want a shortcut available when you are not connected to the
network. You attempt to configure the shortcut to be available off-line.
However, you do not see any option. What should you do ?
A. Use Windows Explorer to enable caching for the Project folder.
B. Use Windows Explorer to configure the Project folder on the network
share to be available for off-line access.
C. Connect to the network before trying to make the shortcut available
off-line.
D. Create shortcuts to each file in the Project folder and make the
shortcuts to the files available off-line.
Answer: B
295. You have an employee named Drew leaving your company. A new employee
named Adam will replace him. Drew has a local user account on a Win2000
Professional computer, with rights and permissions to multiple files and
folders on the computer. You want Adam to have the same rights and
permissions. What should you do?A. Rename Drew's user account to Adam, and
change the account password.
B. Create a new account and link it to the previous users account.
C. Delete the account and create a new one
D. Add a new user account to all the groups that the previous employee was
added
Answer; A
296. You install 10 USB tablets on 10 Windows 2000 Professional computers
with built-in USB controllers. After installing the tablet software, the
tablets cannot communicate with the computers. What must you do to
recover?
A. Enable the USB root hub controller and reinstall the USB tablet device
drivers.
B. Disable USB error detection for the USB root hub controller and enable
the USB tablet within the Device Manager.
C. Reinstall the USB device drivers and disable USB error detection.
D. Enable the USB ports in the BIOS and reinstall the USB tablet device
drivers.
Answer: D
297. You have a 10Mb network card in your computer. You install a 100Mb
network card and restart the computer. The 100mb card in not working due
to a conflict with the 10Mb card.
You want only the 100Mb card to be active. What should you do?
A. Remove the 100MB Ethernet adapter driver by using device manager
B. Remove the drivers for both Ethernet adapters cards by using device
manager
C. Install the 100MB Ethernet adapter in different PC card slots
D. Disable the device drivers for the 10Mb card using by using Device
Manager
Answer: D
298. Which command in Recovery console will allow you to disable a
service?
A. Disable
B. stop
C. exit
D. Sstop
E. Fixboot
F. Fixmbr
Answer: A
299. On a Windows 2000 professional system you set up a scheduled task to
run. It does not run when expected. You log in and run the task, it works.
What should you do to insure that it works in the future?
A. Schedule the task to run in the same security context as yours
B. Schedule the task to be logged on as an administrator
C. Delete the task and start over
Answer: A
300. You are the administrator of a Win 2000 network that has 1500 Win
2000 Pro PC's. Microsoft Office 2000 was assigned to all the PC's on the
network by using GPO.
You deploy Office 2000 service release to all to of the Win 2000 Pro PC's
on the network. The service release in addition to other software that had
been assigned fails to install on only one of the PC's. What should you
do?
A. Redeploy the service release by using a .ZAPfile
B. Redeploy the service release by using a .MST file
C. Restart windows installer on the domain controller
D. Restart windows installer on the computer that failed to install the
service release
E. Restart Windows installer and use an.msp file
Answer: D
301. An administrator needs to allocate additional disk space on a windows
2000 professional computer. Disk space is low and additional applications
must be installed. Due to time constraints the administrator elects to add
an additional hard disk instead of replacing the current one and
reinstalling all the currently installed applications. The computer has
two dynamic hard drives. How can the administrator extend the existing
volume with the space of a newly added hard drive?
A. Configure a Simple volume
B. Configure a Spanned volume
C. Configure a Striped volume
D. Configure a Striped volume with parity
E. By using NTFS version 5
Answer: B
302. As the administrator of your company's network you are asked to
upgrade several Windows NT 4.0 computers to windows 2000 Professiional.
All user settings and application settings must be preserved. Most
applications currently running are compatible with Windows 2000 and all
the Windows NT 4.0 computers meet the minimum hardware requirements. After
you upgrade several computers to Windows 2000 professional , you find that
some applications did not upgrade properly. What utilities and/or
applications should be disabled (or removed) before upgrading ?
A. Custom printer third-party software
B. APM and Anti-virus software
C. All Non-Microsoft Products
D. All 32-bit applications
E. Third-party video drivers
Answer: B
303. Devin, a user on your Windows 2000 network, complains that when he
tries logging on locally to his Windows 2000 Professional computer an
error message is displayed
'The local Policy of this Computer does not allow interactive logons'
Devin is sure that he has used the correct username and password. What is
the most likely cause of this problem?
A. The local user account is disabled
B. The logon rights have been modified
C. the local user account password is case-sensitive
D. The local user account username is incorrect
Answer: B
304. As the administrator of your company's network you will be installing
Windows 2000 Professional on 10 new Pentium III computers. Your company
does business with a myriad of countries and accepts many currencies. You
must ensure that international currency options are set for 5 of the 10
computers. The remaining 5 computers must be configured to support
different input locals. How can you most efficiently set the correct
international currency options and configure different input locales on
each specified group of computers?
A. During the unattended installation of Windows 2000 Professional
B. Make the appropriate changes in the regional settings dialogue box
during the installation of Windows 2000 Professional
C. After Windows 2000 Professional is installed, logon and make the
changes through the panel
D. Make the appropriate changes in the date and time settings dialogue box
during the installation of Windows 2000 Professional
Answer: A
305. The human resources department has informed you that 2 new temporary
part-time workers will start next week. YOU are required to set up a
workstation that they will both share. They do not need access to the
network but they will need to access an HP LaserJet printer attached to
the local computer. You install Windows 2000 Professional and format the
hard disk using NTFS. What type of user account should you create for them
?
A. No account, They can use the built-in guest account
B. No Account. They can use the built-in Administrator account
C. Local user account
D. Domain user account
Answer: C
306. You want to install Windows 2000 on an older computer that meets
Windows 2000 hardware specifications. The hard disk is 4 GB. You install
Windows 2000 Professional and format the drive with NTFS. What functions
will the Windows 2000 system be able to do? (Choose all that apply)
A. Audit files and folders
B. Compress and Decompress files and folders
C. Encrypt and decrypt files and folders
D. Share files and folders
E. set File and folders permissions
F. None of the above
Answer: A, B, C, D, E
307. You want to install Windows 2000 on a computer that already has
windows 98 installed. The size of the hard disk is 20 GB. You want to keep
the original Windows 98 operating system and set up dual booting with
windows 2000. The entire hard drive is formatted FAT 32. What will the
windows 2000 system be able to do? (Choose all that apply)
A. Audit files and folders
B. Compress and Decompress files and folders
C. Encrypt and decrypt files and folders
D. Share files and folders
E. set File and folders permissions
F. None of the above
Answer: D
308. You are adding new PXE-compliant computers to your network. The
network contains Windows NT Workstation 4.0 computers. The hardware on the
new computers is identical. You are using a RIS image to deploy Windows
2000 Professional to the new computers. You successfully deploy Windows
2000 Professional on the first ten computers, but cannot install it on the
remaining computers. What should you do?
A. Configure the DHCP scope to add additional IP addresses.
B. Run RBFG from the remote install and admin folder on the RIS server
C. Modify the start up sequence in the CMOS of the remaining computer
D. Add computer accounts on the remaining computers in the active
directory
Answer: A
309. You are the network administrator at a software development company,
Currently all developers are running windows 98. the company wants to also
run windows 2000 professional. programmers need to code in both a windows
98 environment and a windows 2000 environment. What file system should you
install to optimize the availability of code for both environments?
A. FAT16
B. FAT32
C. NTFS
Answer: B
310. What protocol is used to access files on a Windows 2000 Server from
across the network?
A. NCP
B. CIFS
C. IPX
D. IP
Answer: B
311. You are the administrator of a Windows 2000 network. You use a user
account named Userl to log on to a Windows 2000 Professional computer. The
Computer is used by different students in a classroom. User does not have
administrative rights. However, you prefer to use this account for most of
your daily activities, because it is not a security breach if you fail to
log off. You want to schedule a task to run a command file named
AddUsers.cmd that automatically adds six more student user accounts. What
should you do?
A. Schedule the task to run under an Administrative account.
B. Log on by using the local Administrator account. Then schedule the task
to run under Userl.
C. Take ownership ofAddusers.cmD. Then schedule the task to run under
Userl.
D. Grant Userl Read & Execute permission for AddUsers.cmD. Then schedule
the task to run under Userl.
Answer: A
312. Dave has a drive formatted as FAT32 with 1kb clustering. He has 84000
files average 850bytes/ each. The drive starts go slow after decrementing.
What should you do to fix it?
A. Format his drive as a FAT32 with 4kb clustering
B. Format his drive as a NTFS with 512 bytes clustering
C. Format his drive as a NTFS with 4kb clustering
D. Format his drive as a FAT32 with 512 bytes clustering
Answer: A
313. As the network administrator of your companies network. As your
company grows you decide to delegate some of your responsibilities to
others in your company You configure a snap-in for a user in the graphics
department to help with Active Directory and Computer Management. You DO
NOT want the user to add additional snap-ins or change the snap-in
configuration. How should you configure the console mode?
A. Uers mode.Full Access
B. User mode, Delegated access, Multiple Windows
C. User mode, Delegated access, Single Windows
D. Author mode, Full Access
E. Author Mode, Delegated Access, Multiple Windows
F. Author Mode, Delegated Access, Single Windows
Answer: A
314. You want to upgrade 40 computers from Windows95 to Windows 2000
Professional. Most of the computers in thr company use the same hardware.
However, several different peripheral devices are used throughout the
company. You have to verify that the hardware used is compatible with
Windows 2000 professional. You want to accomplish this with the least
amount of administrative effort. What should you do?
A. Install several different computer configurations. Install Windows 2000
Professional and enable driver signing.
B. Copy winnt32.exe to a floppy disk and run it on all the machines with
the /checkupgradeonlyQ switch. Send the floppy disk to each user on the
network.
C. Use setup manager to create an unattend file, then modify the WIN9XUPG
section.
D. Run Win32.exe /unattended setup.inf on the various computer
configurations
E. Copy the contents of the Windows 2000 professional CD-ROM to a network
sharE.Modify your network login scripts to run Winnt32.exe/reporton.
Answer: C
315. Your network's dialup server is configured to support certificate
authentication. You want to use smart card authentication on your Win2000
Professional Portable computer.
Your computer has a PC Card smart card reader and the appropriate drivers
installed, and a smart carD. What else should you do to enable smart card
authentication on your computer?
A. Configure the dial-up connection to use EAP. Select the smart card
device for authentication.
B. Configure the dial-up connection to use SPAP. Select the smart card
device for authentication.
C. Configure the dial-up connection to use certificate authentication.
Enable the user credentials for authentication.
D. Configure thedial-up connection to connect to a private network through
the internet. Enable L2TP to create a VPN tunnel
E. No other configuration is needed to enable smart card authentication.
Answer: A
316. Can a Domain and Workgroup have the same name?
A. Yes
B. No
C. Depends on the configuration
Answer: A
317. You install a new 2nd processor of MPS to your system, but your
system is still slow you check the performance log and see that the 1st
processor is over loaded. What should you do to make your system use both
processors?
A. Enable AGP Bridge Controller.
B. Install the MPS-compliant drivers for the 2nd processor using Device
Manager.
C. Install the ACPI-compliant drivers for the 2nd processor using Device
Manager.
D. During startup, press F8 and install the MPS-compliant drivers for the
2 CPU.
Answer: B
318. You are installing Windows 2000 Professional on 100 MPS compliant
computers. You have created an image and copied the image to 2 test
computers. When you run the test
computers you find that the 2nd processor is not being useD. What should
you do to enable the 2nd processor.
A. On your original machine use Device
Manager\Computer\Properties\Drivers\Update Driver to install the correct
multiprocessor hal.
B. On the original computer, go to the control Panel, go to Add new
hardware, select the processor from the device list and install the
processor.
C. Download the patch from the motherboard manufacturer to allow for the
configuring dual processor.
D. Reinstall Windows 2000
Answer: A
319. You are the network admninistrator for a consultant firm. Each
consultant has issue a new microsoft pocket PC. for your first
installation, you place the pocket PC into its cradle and install software
on to a Windows 2000 Professional computer. You receive the error message
"unknown USB driver". you then remove the pocket PC from its cradle. what
should you do to correct the problem?
A. Restart the PC and modify the BIOS to specify an IRQ for the USB
device. Restart the computer. Reset the pocket PC, and place the pocket PC
back into cradle.
B. Use the device manager to delete the USB device, uninstall and
reinstall the software. Perform the reset on the pocket PC. Place the
pocket PC back into its cradle.
C. Uninstall and reinstall the software. Perform a reset on the pocket PC.
Place the pocket PC back to its cradle.
D. Restart the PC and use recover console to replace the USB driver.
Restart the computer. Perform a reset on the pocket PC. Place pocket PC
back to cradle.
Answer: C
320. You have a system with two monitors, both set for 16-bit color and
1024 X 768 resolution. You decide to set up a DOS application in a DOS
Virtual Machine Window. Default DOS configuration is in effect (Default
autoexec.nt and config.nt) and the default DOS .PIF file is present. You
place the shortcut on the first monitor screen. When you open it the
screen goes to scrambled. You move the shortcut to monitor #2 and
launching the app locks. What do you need to do?
A. Change both monitors to 256 colors. Configure the application to run
full screen
B. Change both monitors to run and optima settings. Configure the
application to run full screen
C. Update the drivers for Video card #1 Change #2 to 640 X 480
Answer: A
321. As the Junior network administrator of your company you have been
asked to move the printer spool off the system partition and onto another
hard disk. How do you move the printer spool to another drive?
A. From the command prompt 'move c:\winnt\system32\spool printers [desired
location]'
B. From the command prompt 'move c:\winnt\spool printers [desired
locatiom]'
C. Printer Properties >> Advanced tab, browse to the desired location.
D. Because the printer spool is dynamic, it cannot be moved
E. Configure the print$ share on your computer to point to thr desired
location.
Answer: C
322. You take backups of your hard drives every night. On Thursday morning
you see that the hard disk has crashed. The backup log shows:
Friday normal backup completed
Saturday incremental backup completed
Sunday incremental backup completed
Monday incremental backup completed
Tuesday incremental backup incomplete
Wednesday incremental backup completed
What should you do?
A. Restore using the tapes from Friday, Saturday, Sunday, Monday and
Wednesday.
B. Restores using only Fridays tape
C. Restore using the tapes from Thursday, Friday, Saturday, Sunday and
Tuesday
D. Restore using the tapes from Friday and Tuesday
E. Restore using the tapes from Tuesday and Thursday.
Answer: A
323. You are using Windows 2000 Professional at home with a smart card
installed, you want to connect to a RAS server to pick up your e-mail.
What protocol will you need?
A. NWLink
B. PPTP
C. IPSec
D. NETBEUI
E. EAP
Answer: E
324. You Dial-In to your company's network from home, but find that you
can only access resources on the first subnet (where the Dial-In Server is
located), but cannot go beyond that. What Dial-In setting should you
change?
A. IP address.
B. Check the "Use default gateway on remote network" checkbox.
C. Disable "Use IP compression".
D. On the WINS tab of the TCP/IP Settings, check the "Use NetBIOS setting
from the DHCP-Server".
E. On the DNS tab of TCP/IP settings, check the "Register this connections
address in the DNS" checkbox.
Answer: B
325. You have 75 identically configured Win2000 Professional computers
that will be shared by users in the OU. With the least amount of
administrative effort, what should you do so that users are able to
maintain their individual desktop settings regardless of which computer
they use?
A. Configure each computer to join a workgroup, create a domain user
account that uses roaming user profiles.
B. Configure each computer to join a workgroup, create a domain user
account that uses roaming user profile from the domain controller.
C. Configure each computer to join the domain, create a domain user
account that uses a user profile.
D. Configure each computer to join a workgroup, create a user account with
a local group file for each user..
E. Configure each computer to join the domain, create a domain user
account that uses a roaming user profile.
Answer: A
326. A user moves an encrypted file from an NTFS-Partition on her Windows
2000 Workstation to an NTFS-Folder on a remote Windows 2000 Server. What
effect will this have on the encrypted file?
A. The encrypted file will automatically be decrypted.
B. The encrypted file will remain encrypted in the Windows 2000 folder.
C. The encrypted file will inherit the encryption state of the remote
NTFS-Folder.
D. Encrypted files and folders cannot be moved or copied. Decrypt it
first, then move or copy the file or folder.
Answer: B
327. You have a SCSI card that is installed in the docking station you put
your laptop into. How do you keep it from loading when the laptop is not
attached the the docking station.
A. While away use Device manager to disable the SCSI card
B. While away configure the startup properties for the SCSI device to be
automatic
C. Remove the laptop from the docking station, start Windows 2000 use
device manager to disable the SCSI adapter device.
D. Remove the laptop from the docking station, start Windows 2000 use
device manager to remove the SCSI adapter device.
Answer: C
328. You dial in using TPC/IP to your network from home. You see all the
PC's on the local network to the RAS server, but you do not see any of the
other networks. What dial in setting should you change ?
A. IP address
B. Disable User IP compression
C. Check Use default Gateway on the server.
D. On the DNS tab of the TCP/IP settings, check the 'Register this
connections address in DNS' checkbox
E. On the DNS tab of the TCP/IP settings, check the 'Use NETBIOS settings
from the DHCP server' checkbox.
Answer: C
329. Sandy has a Windows 2000 Professional system. Today she is visiting
another department, and is using a Windows NT 4.0 system. She wants to
print a document but is missing her printer. You want her to be able to
print from any computer she logs in at. What can you do to insure that she
has this ability?
A. Configure the server properties of printer system folder to connect to
the shared printer
B. Install a print driver for the print device on the windows NT
workstation computer.
C. Create a roaming user profile for Sandy
D. Upgrade the Windows NT 4 computer to a Windows 2000 Professional
computer and then import the file settings for Sandy's user account.
Answer: C
330. You have this PC with a USB keyboard. You install a USB scanner. The
system asks for the driver and you install them. After restart the
keyboard doesn't work anymore. What should you do?
A. Update the scanner drivers using certified drivers
B. Enable the USB port in the computers BIOS
C. USB keyboards DO NOT exist
D. Enable the USB hub controller
E. Reinstall the USB device driver and disable the USB error detection
Answer: A
331. You are the administrator of your company's network. A user named
Peter runs windows 2000 Professional on his portable computer. Peter wants
to be able to work at home on files that were created in the office on the
company network. Prior to logging off the network and leaving the office,
Peter enables offline files. Peter calls you from home and reports that
copies of his folders and files on the network are not available on his
portable computer. What should you instruct Peter to do?
A. Enable file and print sharing. Peter will be able to access his files
at home immediately.
B. Synchronize all offline files. Peter will be able to access his files
at home immediately.
C. At the office, make all files available offline. Peter will be able to
access his files the next time he logs off the network.
D. At the office, create a shortcut to the Offline Files folder. Peter
will be able to access his files the next time he logs off the network.
Answer: C
332. You have a computer that is currently running Windows 98. You plan on
installing Windows 2000 professional. You want to select the best file
system and features. You want to be able to use both operating systems to
access all disks. Which file system do you use?
A. FAT32
B. FAT16
C. NTFS
D. OS/2
E. MS-DOS
Answer: A
333. After restarting your Windows 2000 Professional Computer, your
Monitor shows a blank blue screen without text and the Computer will not
respond to keyboard or mouse commands. You discover that an incorrect
driver was just installed. How should you correct the problem?
A. Use the "Last Known Good Configuration" to restart you system and
correct the problem.
B. There is nothing you can do. Reinstall the Operating System.
C. Call the manufacturer to request a Windows 2000 compatible driver.
D. Use the Emergency-Repair-Disk.
Answer: A
334. You have configured accessibility options for Tom. Everything works
fine. Tom leaves for lunch, returning an hour later he finds that none of
the accessibility options work anymore. What should you do?
A. Turn on Filter Keys, this will allow accessibility options to be turned
on at will.
B. In accessibility options on the general tab, enable "turn off
accessibility features after idle for xx minutes".
C. From the Keyboard tab of the accessibility option applet, check the
Sticky Keys checkbox, this will save all accessibility options when you
exit the control panel applet.
D. In accessibility options on the general tab, disable "turn off
accessibility features after idle for xx minutes".
Answer: D
335. You are upgrading two windows NT4 computers to Windows 2000. Computer
1 completes the upgrade with no problems. During the upgrade of Computer
2, you experience a power loss and cannot boot into NT4. You want to use
Computer 1 to help Computer 2 recover. How can this be done?
A. Install Windows2000 across the network install
B. Run makeboot.EXE on Computer1 to make diskettes to start Computer 2.
C. Copy the boot files from computer 1 to a floppy, boot to the floppy and
continue the setup of computer2.
D. Computer 1 cannot help recover Computer 2
Answer: B
336. You want to install a dual boot system Windows98 and Windows 2000
Professional computers for an employee that will arrive next week. You
have three hard disk, you install Windows98 on disk0 Windows2000 on Disk1.
Disk2 will be used to store data, Disk1 should allow File security. The
data storage on Disk2 will be accessed by both system. Which file systems
should you install on Disk0, Disk1, and Disk2 ?
A. Disk 0: FAT16 Disk1: FAT32 Disk2: FAT 16
B. Disk 0: FAT32 Disk1: NTFS Disk2: FAT 32
C. FAT32 on all three disks
D. FAT16 on all three disks
E. NTFS on all three disks
Answer: B
337. You are the administrator of your company's network. You configure a
local group named accounting to have a mandatory user profile. The
mandatory profile has been configured to include a custom logo that was
saved with 16-bit color and 1025x768 resolution. Some of the Windows 2000
Professional computers in the accounting department have standard VGA
video adapters, and others have SVGA video adapters. Several users report
that when they log on to certain Windows 2000 Professional computers, the
custom bitmap becomes very pixilated and distorted, and does not reflect
the proper color depth. You want users to be able to correctly view the
custom bitmap on any computer in the accounting department. What should
you do?
A. Configure a roaming user profile for each user in the accounting group.
B. Configure a separate user profile for each user in the accounting
Group.
C. Change the custom bitmap to a 16-color bitmap that has 640x480
resolution, and reconfigure the mandatory user profile
D. Reinstall the appropriate WDM-compliant drivers for the computers that
do not display the custom bitmap correctly.
Answer: C
338. You are an administrator of a small business network. You have one
dial-up account at an ISP and want all computers on your network connect
to the Internet. What shall you do? (choose all that apply)
A. Enable Internet Connection Sharing
B. Enable on-demand dialing
C. Enable sharing a modem on one computer on the network
D. Configure a DHCP Server
E. Disable Internet Connection Sharing
Answer: A, B
339. Which of the following options is not an event type logged in the
Windows 2000 Professional Event Viewer utility?
A. Information
B. Critical
C. Warning
D. Error
Answer: B
340. Your network contains NetWare 4.0 Servers. You have successfully
installed Client Service for NetWare on Windows 2000 Professional
computers, and Gateway Service for NetWare on Windows 2000 Server
Computers. You recently added a new Windows 2000 Server computer to the
network and installed Gateway Service for NetWare on it. However, the
server is unable to connect to any NetWare servers.
What should you do on the new Windows 2000 Server computer to resolve this
problem?
A. Enable NWLink NetBIOS.
B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to
use the correct Ethernet frame type.
C. Install RIP routing for IPX.
D. Install the SAP Agent.
Answer: B
341. You are the administrator of a Windows 2000 domain that has three
domain controllers. Each day, you use Windows Backup to perform full
backups of each domain controller. You run a script to make changes to
account information in Active Directory. As a result of errors in the
script, the incorrect user accounts are modified. Active Directory
replication then replicates the changes to the other two domain
controllers. You want to revert Active Directory to the version that was
backed up the previous day. What should you do?
A. On a single domain controller, use Windows Backup to restore the System
State data. Shut down and restart the computer.
B. Shut down and restart a single domain controller in directory services
restore mode. Use Windows Backup to restore the System State data. Run the
Ntds utility. Restart the computer.
C. Shut down and restart a single domain controller by using the Recovery
Console. Use Windows Backup to restore the System State data. Exit the
Recovery Console. Restart the computer.
D. Shut down and restart each domain controller by using the Recovery
Console. Use Windows Backup to restore the Sysvol folder. Exit the
Recovery Console. Restart the computer.
Answer: B
342. Your Windows 2000 Server computer contains a stripe set with parity
on a four-disk array. You convert the strip set with parity to a dynamic
RAID-5 volume. Six months later, users report that disk access on the
server is slower than it had been on the previous day, you use Disk
Management and discover that the status of the third disk in the array is
Missing.
You want to recover the failed RAID-5 volume. What should you do first?
A. Replace the third disk and restart the server. Use disk Management to
repair the volume.
B. Ensure that the third disk is attached to the server and has power. Use
Disk Management to reactivate the disk.
C. Ensure that the third disk is attached to the server and has power. Use
Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the new
disk. Restart the computer and allow Windows 2000 to automatically repair
the volume on the extended partition.
Answer: B
343. You are the administrator of a Windows 2000 network. Users in the
engineering department run Windows 2000 Professional on their desktop
Computers. The size of the department has recently expanded from five
users to 10 users. Users need to be able to update files in a shared
folder named CommonData. The folder is stored on a FAT 16 partition on one
of the Windows 2000 Professional Computers on the network. The files in
CommonData are published in the Active Directory so that other users in
the company can refer to them. The network also uses Distributed File
System (DFS) to simplify access to its user data. Users in the
engineering department report that when they try to access CommonData,
they receive the following error message:
"CommonData is not accessible. No more connections can be made to this
remote Computer at this time."
You want to ensure that users can access the files. What should you do?
A. Move CommonData to FAT32 partition on the host Computer, and share it
again.
B. Move CommonData to an NTFS partition on the host computer, and share it
again.
C. Increase the user limit on the network share to the maximum allowed.
D. Increase the Clients Cache this Dfs referral value on the Dfs leafnode
that describes the data.
Answer: C
344. You have a Windows 95 computer with a Pentium 133, 64 MB of RAM, 2 GB
of hard disk space, and a CD-ROM. The network adapter is not PXE boot ROM
compliant. You want this computer to use Dfs since that will be a standard
for everyone on the upgraded network.
What should you do to enable Dfs on this machine?
A. Create a remote installation boot disk by running rbfg.exe. Upgrade the
system to Windows 2000 Professional from the network installation source.
B. Use the PCI empty slot to add a new PXE boot ROM-compliant network
adapter, set the BIOS to start from the network adapter card, and upgrade
to Windows 2000 Professional.
C. Create the four boot floppies to run startup and use the CD-ROM drive
to finish the upgrade to Windows 2000 Professional since this CD-ROM is
too old to be bootable device.
D. Install Internet Exploer (IE) 4.01 or later and enable the Active
Desktop components. Install the Directory Service Client.
Answer: D
345. You are creating two custom Microsoft Management Consoles (MMCs) for
use on your company's network. The first console will be called
"topadmin.msc" and will be used by top-level administrators to perform
daily tasks on the network. The second console will be called
"levelone.msc" and will be used to entry-level members of the support
staff to perform limited troubleshooting functions. You would like the
users of "topadmin.msc" to have the ability to make changes to the MMC
including the ability to add or remove snap-ins, createnew windows, create
taskpad views and tasks, add items to the Favorites list, and view all
portions of the console tree. You would like users of "levelone.msc" to
have full access to the console tree and all window management commands.
However, you want to prevent them from adding or removing snap-ins and
from changing the console properties.
Which of the following would be the best solution to achieve these
objectives?
A. Configure "topadmin.msc" with an access level of "Author mode" and
"levelone.msc" with an access level of "User mode - limited access,
multiple window"
B. Configure "topadmin.msc" with an access level of "Author mode" and
"levelone.msc" with an access level of "User mode- full access"
C. Configure "topadmin.msc" with an access level of "User mode - full
access" and "levelone.msc" with an access level of "Author mode"
D. Configure "topadmin.msc" with an access level of "User mode - full
access" and "levelone.msc" with an access level of "User mode - limited
access, multiple window"
Answer: B
346. Roger is a new user in your company whom you have just created an
account for. Rogers logs on to his computer for the first time and is
annoyed by the background that has been configured for his account. He
attempts to change the background and is successful. After working for a
couple of hours he logs off his computer and heads to lunch. When he
returns from lunch, he logs on to his computer and notices that he now has
the original background again. You receive a call from Roger who would
like to know why this happened.
What is the most likely explanation?
A. Roger does not have the appropriate permission to the bitmap file for
the background he wishes to use. You must have at least Read permission to
the file containing the background you wish to use.
B. Roger is not a member of the Power Users group. In order to make
permanent changes to user settings, you must be a member of this group.
C. Roger's account has been configured with a mandatory profile. In this
case, the user can still modify the desktop, but the changes are not saved
when the user logs off.
D. Roger's account is a member of the Guest Users group. Members of the
Guest Users group automatically have their changes discarded upon logoff.
Answer: C
347. You are installing Windows 2000 Professional on 25 computers. You
want to prevent users from installing device drivers that might cause
computers to become unstable. You want users to be able to install device
drivers only for devices that are included on the current Hardware
Compatibility List (HCL).
What should you do?
A. Create a Local Computer Policy to enable Windows File Protection.
B. Create a Local Computer Policy to prevent users from installing device
drivers.
C. Add Users to the Power Users local group rather than to the
Administrators group.
D. Enable driver signing to prevent the installation of unsigned drivers,
and set driver signing as a system default.
Answer: D
348. You are the administrator of a Windows 2000 network for Pamell
Aerospace. You upgrade 10 computers from Windows 98 to Windows 2000
Professional. You want the computers to join the pamellaerospace.com
domain. What should you do?
A. Log on to one of the Computers and create 10 unique Computer accounts
in Active Directory.
B. Log on to each Computer and create the Computer account for each
Computer when prompted to do so.
C. Log on to each Computer by using the domain Administrator account, join
the domain, and then create the computer account for each Computer when
prompted to do so.
D. Reconfigure TCP/IP on each Computer to ensure that the computers are on
the same subnet as the domain controller for the parnellaerospace.com
domain.
Answer: D
349. You are the administrator of your computer's network. Your company is
based in Russia and conducts the majority of its business in Russian.
Users in your company create, view, and edit documents in English (US),
French and Spanish to communicate with vendors internationally users run
the Russian localized edition of windows 2000 professional on their
desktop and portable computer. A user named Katrin wants to create a word
processing document in both English and Spanish by using Notepad in
windows 2000 professional. She requests your assistance in enabling
English and Spanish on her computer. What should you do?
A. Instruct Katrin to select the desired input locale for either English
or Spanish within Notepad.
B. Instruct Katrin to select the input locale indicator on the taskbar and
select either English or Spanish
C. Instruct Katrin to use Regional Options in Control Panel to add input
locales and keyboard layouts/IME for both English and Spanish.
D. Create a local computer policy for Katrin's computer to include both
English and Spanish.
Answer: C
350. Kristin works between 2 offices. From her laptop, she logs into her
Boston account using her login "Bost_Eng¨. She only has the English
version available. When Kristin logs into her Mexico account "Mex_Span¨,
she only has Spanish language available. Kristin logs in to the Bost_Eng
account and needs to use Spanish. She tries to install Spanish but is not
able to. You are the network administrator, how to address this problem so
that Kristen can use English and Spanish from her Bost_Eng account?
A. Change her settings in the OU to allow Kristin to use Spanish
B. Giver her appropriate permissions to allow her to install the Spanish
language option.
Answer: A or B (please confirm it)
351. You are the administrator of your company's network. You run the
Multilanguage version of Windows 2000 Professional on 1500 computers.
Users can choose Chinese, English (US), German, Japanese, or Spanish as
their language environment.
A user named Suzanne wants to change her computer desktop and user
interface from English to Japanese. She reports that she used Regional
Options in Control Panel to install Japanese as a language preference.
However, her computer desktop and user interface remain in English. What
should you instruct Suzanne to do?
A. Set Japanese as the default language by using Regional Options in
Control Panel.
B. Set Japanese as the default locale and keyboard layout/IME language by
using Regional Options in Control Panel.
C. Select Japanese by using Regional Options in Control Panel. Then log
off and log back on.
D. Select Japanese in the locale and keyboard layout/IME settings on the
taskbar. Then install the code page conversion table.
Answer: B
352. You are the administrator of your company's network. Your company has
offices in Hong Kong, Madrid, New York, Paris, and Tokyo. A user named
Carmen works in the New York office, but she often travels to the Madrid
office. Carmen uses the Multilanguage version of Windows 2000 Professional
on her portable Computer. She needs to able to access both an English and
Spanish user interface, input locale, and keyboard layout/IME. When Carmen
is in the New York office, she logs on to the network by using the Carmen
Eng user account. She is given the English user interface, input locale,
and keyboard layout/IME. When she is in the Madrid office, she logs on to
network by using the Carmen Spanish user account. She is then given the
Spanish user interface, input locale, and keyboard layout/IME. Carmen
reports that when she logs on to the network by using the Carmen Eng user
account, she is not allowed to add any languages to her Computer other
than English (US), which is already installed. What should you do?
A. Add the Spanish keyboard layout/IME for the Carmen eng user account
profile.
B. Add the English keyboard layout/IME for the Carmen span user account
profile.
C. Reconfigure the Group Policy object for the Carmen eng user account to
allow her to change languages on her computer.
D. Reconfigure the Group Policy object for the Carmen span user account to
allow her to change languages on her Computer.
Answer: C
353. You are an administrator of your company's network. You want to
perform routine upgrades on your Windows 2000 Server computer. You use
your non-administrator user account in the domain to log on to the server.
You want to update all of the critical system files and patched on the
server in the shortest possible time. What should you do?
A. Run Windows Update.
B. Run System File Checker.
C. Log on as an Administrator and run Windows Update.
D. Log on as an Administrator and run System File Checker.
Answer: C
354. One user leaves your company and another gets his position. How can
you give the same permissions and restrictions to him while minimizing
your work? The old user must have no further access.
A. Rename the user account and change the password.
B. Copy the old account to the new account and then delete the old
account.
C. Copy the old user profile to the new user account.
D. Delete the old account. Create a new account and place it in all the
groups that the old account was in. Manually re-assign all the user
specific rights and permissions from the old account to the new account.
Answer: A
355. Maria is a member of local administrators group. Administrator rights
to assist you with administering the server, creating backups and running
user manager. Some users complaints that she read and change their docs
and sensitive data. You want Maria to have fewer rights.
What rights should you give?
A. Remove Maria from Admin group. Add her to Power user and Backup
operator
B. Leave her as Administrator and choose "deny" on Users files
Answer: A
356. A user calls you because she cannot find the files she needs on a
network shared folder. You learn from her that she is looking with
Explorer for the n:\composite\division\projects folder.
What do you need to do so she can see the files?
A. You instruct her to type
\\servername\composite\division\projects\filename in her application
software.
B. Tell the user to click the Start button, and run the \\servername.
Using that route, she can click down to the target folder.
C. Give the user an access control entry for the needed folder, projects.
D. Give the user "list folder contents" permission to the network shared
folder using a security group.
Answer: D
357. You are using a DIALUP connection. You want to insure that your
PASSWORD is encrypted. What protocols from the list below would you
disable?
A. PAP
B. SPAP
C. MSCHAP
D. MSCHAP V1
E. MSCHAP V2
F. CHAP
Answer: A
358. Your remote access clients are complaining that their connection to
the server is too slow and that they are unable to work productively.
Currently most of the users are dialing in over analog modems.
Unfortunately higher speed methods of Internet access such as DSL and
cable modem are not available to most of these users. You decide instead
to install additional modems in the computers of the users who will
remotely access your company's network so that they will be able to
connect to the server using multiple modems simultaneously. What
additional software configuration must you do on your Remote Access
Servers to ensure that this will work properly?
A. Configure Routing and Remote Access (RRAS) to support the Remote
Authentication Dial-In User Service (RADIUS).
B. Enable dual callback.
C. Enable multilink.
D. Install the Bandwidth Allocation Protocol (BAP).
E. Install the Extensible Authentication Protocol (EAP).
Answer: C
359. You create a dial-up connection to your Internet service provider
(ISP). You configure the Security tab and the Networking tab of the
Internet Connection via MSN Properties dialog box as shown in the exhibit.
You attempt to connect to the ISP. You view the status change from Dialing
to Verifying user name and password. After several seconds, the status
changes to Disconnecting. You are then disconnected from the Computer you
dialed. You verify that your user name and password are entered correctly.
You want to enable your Computer to connect to your ISP. What should you
do?
A. Configure your connection to enable data encryption.
B. Configure your connection to use the UNIX SLIP server.
C. Configure your connection to allow unsecured passwords.
D. Instruct your ISP to configure your account to support Multilink.
Answer: C
360. Which of the following statements is true for disk quota management
in Windows 2000 Professional?
A. Quotas can only be set for all users of a volume.
B. Quotas can only be set for specific users or groups of a volume.
C. Quotas can be set for all new users of a volume or set individually for
users of a volume.
D. Quotas are only set for all users at the computer level through a group
policy.
Answer: C
361. Julie is trying to save a file that is 2MB in size. When she tries to
save the file, she gets an error message that the disk is out of space.
When the administrator checks available disk space, it is determined that
there is more than 4GB of free disk space. What is the most likely cause?
A. The disk needs to be defragmented.
B. Julie does not have the NTFS permissions she needs to access the folder
where she is trying to save the file.
C. Julie has exceeded her disk quota.
D. The folder is encrypted and Julie does not have the key required to
write to the folder.
Answer: C
362. Each user in your network has his/her own user directory. Jane copies
a file to her user directory and receives the message "insufficient
space." She finds that she cannot even add data to a file and save it.
Others are not having any problems.
What should you do?
A. Increase the Quota Limit for Jane
B. Defragment the hard drive
C. Confirm that NTFS compression has been enabled
D. Add Jane to the domain users group
E. Confirm that backup is not running
Answer: A
363. You are the administrator of your company's network. Your network has
75 windows 2000 professional computers and eight Windows 2000 Server
computers. Users on the network drive save their work files in home
folders on a network server. The NTFS partition that contains the home
folders has Encrypting File System (EFS) enabled. The partition also has
disk quotas defined. A user named Candy reports that she cannot save any
files to her home folder. She also cannot update files in her home folder.
When she attempts to save files to the folder she receives the following
error message "insufficient disk space". Other users are not experiencing
this problem with their home folders. You want to enable Candy to save
files in her home folder. What should you do?
A. Log on to the network as a Recovery Agent. Decrypt all of candy's files
in her home folder.
B. Log on to the network by using the domain Administrator account. Grant
Candy Full control permission to her home folder.
C. Use Windows Backup to archive and remove old files on the server.
D. Increase the server a disk quota entry for Candy to accommodate the
additional files.
Answer: D
364. You are the administrator of your company's network. Your network has
200 windows 2000 Professional computers and 15 windows 2000 server
computers. Users on the network save their work files in home folders on a
network server. The NTFS partition that contains the home folders has
Encrypting File System (EFS) enabled. A user named John leaves the
company. You move all of the files from John's home folder to his
manager's folder. When the manager attempts to open any of the files, she
receives the following error message; "Access denied." You want the
manager to be able to access the files. What should you do?
A. Grant the manager NTFS Full control permission to the files.
B. Grant the manager NTFS Take Ownership permission the files.
C. Log on to the network as a Recovery Agent. Decrypt the files for the
manager.
D. Log on to the network as a member of the Backup Operators Group.
Decrypt the fields for the manger.
Answer: C
365. You are the administrator of your company's network. A user named
Veronica uses a shared windows 2000 Professional computer. The computer is
a member of a workgroup. Veronica has encrypted five files on the computer
to ensure the security of the files. Two of these encrypted files are
needed for an important meeting. However, Veronica is out of the office
until next week. You need access to the files immediately. You also need
to ensure that Veronica can log on when she returns. You want to
accomplish this with the least amount of administrative effort. You log on
to Veronica's computer by using the local Administrator account. What else
should you do?
A. Open the two files. Do nothing further.
B. Turn off encryption for the two files. Do nothing further.
C. Backup the two files and then restore them. Turn off encryption on the
restored files.
D. Change Veronica's password. Log on by using her user name and new
password. Then open the two files.
Answer: A
366. You want to upgrade some PCs in your company. They have different
Hardware and use different peripherals. How can you check the
compatibility while minimizing your work?
A. Install W2k on all the machines and see what happens.
B. Copy winnt32.exe to a floppy disk and run it on all the machines with
the /checkupgradeonlyQ switch. - This is not a spelling mistake; they
actually did put a Q at the end of that switch)
C. Use setup manager to create an unattend file, and then modify the
WIN9XUPG section.
Answer: C
367. You want to upgrade 150 computers from Windows NT Workstation 4.0 to
Windows 2000 Professional. You create a Unattend.txt file by using Setup
Manager. You copy the file to a floppy disk. You then start the
installation on a test Computer by using the Windows 2000 Professional
CD-ROM. You insert the floppy disk after the computer starts. Although you
had set the user interaction level to full unattended mode, you are
prompted for all the required parameters. You want to ensure that the
unattended installation does not prompt you for input. What should you do?
A. Add a [Data] section to Unattend.txt, and set the Unattendedlnstall
parameter to Yes.
B. Add a [Unattend] section to Unattend.txt, and set the OEMPreInstaIl
parameter to Yes.
C. Rename Unattend.txt on the floppy disk to Winnt.sif.
D. Create a \$OEM$\$l folder on the hard disk of the test Computer, and
copy Unattend.txt to the folder.
Answer: C
368. You wish to check and make sure that the hardware that is installed
on a client will be compatible with a Windows 2000 professional upgrade.
Which of the following will give you this information?
A. EXE /checkupgradeonly
B. EXE /checkupgradeonly
C. EXE /checkupgrade
D. There is no way to do this other than to take inventory of the hardware
installed and verify it on the Hardware Compatibility List (HCL)
Answer: A
369. You are upgrading a computer from Windows 98 to Windows 2000
Professional. The computer is a 400-Mhz Pentium III, and has 128 MB of RAM
and a 10-GB hard disk. You are performing the installation by using the
Windows 2000 Professional CD-ROM. After the text mode installation portion
is complete, you restart the computer. The BIOS virus checker on your
computer indicates that your computer is infected with a Master Boot
Record virus. What should you do before you continue the installation?
A. Remove the virus checker in windows 98.
B. Disable the BIOS virus checker and restart the computer.
C. Run Fixmbr.Exe from the Windows 2000 Professional CD-ROM.
D. Modify the Boot.ini from to include a signature parameter on the ARC
path of the system partition.
Answer: B
370. You are preparing an unattended answer file for eight new Windows
2000 Professional computers. The person initiating the setups should not
have to answer questions during the installations.
How is the license agreement handled?
A. You will create the license agreement answer in the
[LicenseFilePrintData] section of the answer file.
B. Your acceptance of the license agreement answer is included as a switch
for winnt32.exe when you are using the Winnt.sif file.
C. Your acceptance of the terms of the license agreement is associated
during the computer name generation section of the answer file. Then the
agreement is tied to each computer installed.
D. You will be asked to accept the terms of the license agreement for all
unattended installations if you choose the Fully Automated option while
preparing the answer file.
Answer: D
371. You use slipstreaming to apply a service pack to the installation
files for Windows 2000 Professional on your network share. Then, you
publish a software application that will be installed by various
departments throughout the corporation on their Windows 2000 Professional
computers. The application impacts the system state on any computer on
which it gets installed from the publication.
What must you do about the new service pack?
A. The update /slip command will correct the system files that were
affected by the installation of the application on each computer receiving
the software. It will also apply the service pack from the distribution
folder. You need to run update /slip on each Windows 2000 Professional
computer of the installed based.
B. Windows 2000 knows to automatically reinstall the correct system files
that the service pack applied after the software is installed from the
publication. You aren't required to do anything.
C. The new service pack has not yet been applied to the installed base of
Windows 2000 Professional computers, so they don't have it. You must run
update on each computer that got a Windows 2000 Professional installation
before the service pack was slipstreamed to the installation share.
D. You should manage the newly published software application with Windows
Installer. Get the .msi from the vendor and reinstall this application on
the network share.
Answer: C
372. Your computer is configured to dual-boot between Windows 98 and
Windows 2000. How would you configure the computer so that Windows 98
would be the default selection if the user did not make a choice within
the specified amount of time?
A. Through the STARTUP.INI file
B. Through the SYSTEM.INI file
C. Through Control Panel, Startup Options
D. Through Control Panel, System, Startup and Recovery
Answer: D
373. Which of the following files is used to build the operating system
menu choices that are displayed during the boot process?
A. NTLDR
B. NTOSKRNL.EXE
C. STARTNT
D. BOOT.INI
Answer: D
374. Which of the following files is used to initialize and start the
Windows 2000 boot process?
A. NTLDR
B. NTOSKRNL.EXE
C. STARTNT
D. NTBOOT.EXE
Answer: A
375. Which of the following files loads the Windows 2000 Professional
operating system?
A. NTLDR
B. NTOSKRNL.EXE
C. BOOTNT.EXE
D. NTOS.EXE
Answer: B
376. Windows NT 4.0 is currently on the system you are using, and you want
to install Windows 2000 Professional. Windows NT 4.0 is currently on an
NFTS partition. For some reason you have decided that you are not going to
upgrade, but rather, you are going to run this in a dual boot fashion.
What do you need to do?
A. Can't be done.
B. You need to put Windows 2000 on a separate partition from Windows NT
4.0
C. You need to upgrade Windows NT 4.0 to SP4.
Answer: C
377. What steps would you take to access the Disk Defragmenter utility?
A. Use Disk Administrator
B. Use Disk Manager
C. Through Programs > Accessories > System Tools
D. Through Programs > Administrative Tools > System Tools
Answer: C
378. Scott frequently accesses and updates a large number of files. He is
noticing that the larger the files get, the longer it takes to access the
files. He suspects that the problem is related to the files being spread
over the disk.
What utility can be used to store the files sequentially on the disk?
A. Disk Cleanup
B. Disk Manager
C. Disk Administrator
D. Disk Defragmenter
Answer: D
379. What utility can be used to identify areas of disk space that can be
deleted to free additional disk space?
A. Disk Cleanup
B. Disk Manager
C. Disk Administrator
D. Disk Defragmenter
Answer: A
380. You work for an accounting firm. Currently all developers are running
Windows 98. The company wants to go to Windows 2000 Professional.
Programmers are going to need to code in both a Windows 98 environment and
a Windows 2000 environment. What platform can you install that will
optimize the availability of code to both environments?
A. FAT16
B. FAT32
C. NTFS
D. HPFS
Answer: B
381. Your computer has win2000 Professional installed. Your office has a
power outrage while you are running win 2000 disk defragmenter, when you
start the computer you receive the following message "bad or missing OS".
What should you do?
A. Start the computer in safe mode and reformat the hard disk
B. Start the computer in the debug mode and reformat the hard disk
C. Start the computer using the ERD and repair the Master Boot Record
D. Start the computer by using the win2000 professional CD Rom. Then use
recovery console to repair the Master Boot Record
Answer; D
382. You are the administrator of your company network. A user name Andrew
has limited dexterity which prevents him from using standard keyboard when
completing his daily tasks, you configure win 2000 professional to use
sticky keys and screen keyboard options. You save the accessibility
options to a shared folder on the local hard disk of Andrews's computer.
You want to configure the same option for another user Peter, you log on
to Peters computer using his local user account and you access the folder
over the network from Peters computer. You select the .acw file from the
shared folder to set up Peter's computer to use the accessibility option.
You receive an error message as follows: "there was a problem running the
file when running the accessibility wizard."
What should you do?
A. Give the user on the 2nd pc read access to the shared folder on the 1st
pc
B. Copy the .acw file to c:\documents and settings\default user
C. Copy the file to a SDD and then use it on the 2nd pc
Answer: A
383. You are the administrator of your company's network. You receive a
request from Stephen's manager to disable Stephen's access to a network
share named Financial. Stephen's user account is the only member in a
group named Reports. The Reports group has Full Control permission to the
Financial share. You delete the Reports group. You later find out that the
manager was in error and that Stephen should have his access to Financial
share restored.
What should you do?
A. Re-create Reports and re-create Stephen's user account. Use existing
NTFS permissions.
B. Re-Create Reports and grant Reports NTFS Full Control permission to
Financial. Stephen's user account will still be a member of Reports.
C. Re-create Reports and grant Reports Full Control permission to
Financial. Add Stephen's user account to Reports.
D. Re-Create Reports and add Stephen's existing user account to Reports.
Use existing NTFS permissions.
Answer: C
384. You need to share a financial spreadsheet with other employees of
your company. The material is of a sensitive nature and you want to
prevent the ability of users to use offline caching.
How do you do this?
A. Assign Special Permissions
B. Select Shared folder properties, caching, deselect "Allow Caching of
files in this shared folder"
Answer: B
385. You are using a Windows 2000 Professional computer. You create a
shortcut for a folder named Projects on a network share. You want to make
the shortcut to the Projects folder available when you are not connected
to the network. You attempt to configure the shortcut to be available
offline. However, you do not see an Option to make the folder available
offline. What should you do?
A. Use Windows Explorer to enable caching for the Projects folder.
B. Use Windows Explorer to configure the Projects folder on the network
share to be available for offline access.
C. Connect to the network before trying to make the shortcut available
offline.
D. Create shortcuts to each file in the Projects folder, and then make the
shortcuts to the files available offline.
Answer: B
386. You use Windows 2000 Professional on your desktop Computer. You are
working on your company's annual financial report. You want other users on
the network to be able to modify your documents for the report. You use
Windows Explorer to share the financial report folder on the network.
Because the report contains confidential information, you want to prevent
users from enabling offline access for the network share that contains the
financial report. What should you do?
A. Use Windows Explorer to disable Offline Files.
B. Use Windows Explorer to disable caching for the reports on the network
share.
C. Use Windows Explorer to grant users Special access for the reports on
the network share.
D. Use Synchronization Manager to configure synchronization not to occur
when users are connected to the LAN connection.
Answer: B
387. You are upgrading 50 Win98 computers to Win2kPro. They all have the
exact same hardware and are PXE compliant. The first 10 computers install
correctly.
How do you install Win2kPro to the rest?
A. Change BIOS settings
B. Add more IP addresses in the DHCP server
C. Make startup disks using RBFG.EXE
Answer; B
388. You want to install Win2K PRO on X new computers on your company's
network. You first install Win2K PRO on one of the new computers. You log
on to the computer by using local admin account. You install MS Office 97,
a virus scanner, and other company standard applications. You then create
a RIS image of the computer you configured. You want to configure the RIS
image so that the standard applications will be accessible to the user
when the user first logs on to the network. What should you do?
A. Run RBFG.exe before installing the standard apps
B. Run RIPREP.exe before installing the standard apps
C. Copy the ALL USERS profile to the DEFAULT users profile
D. Copy the LOCAL ADMINISTRATOR account profile to the DEFAULT user
profile
Answer: D
389. You are the administrator of a Windows 2000 network. Your network
includes 75 Windows NT Workstation 4.0 computers. You are adding 50 new
PXE-compliant computers to the network. The hardware on each computer is
configured identically. You are using a RIS image to deploy Windows 2000
Professional to the 50 computers. You successfully install Windows 2000
Professional on the first 10 computers. However, you cannot install
Windows 2000 Professional on the remaining 40 computers. What should you
do?
A. Configure the DHCP Scope to add additional IP addresses.
B. Run Rbfg.exe from the RemotelristallAdmin folder on the RIS server.
Answer: A
390. You want to view a list of installed multimedia devices, determine
driver versions and perform diagnostics. Which interface should you use?
A. the hardware tab of the sound and multimedia program in control panel
Answer: A
391. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem
configured to use IRQ 5. You add a PCI modem and restart the computer.
Device Manager reports an IRQ conflict between the two modems. Both modem
are trying to use IRQ 5. You want to resolve the problem.
What should you do?A. Use Device Manager to change the IRQ for the
original modem to IRQ 9.
B. Use Device Manager to change the IRQ for the original modem to IRQ 10.
C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug
and Play devices.
D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug
and Play devices.
Answer: C
392. You are configuring a Windows 2000 Server computer as a Routing and
Remote Access server for a Branch office. You discover that an incorrect
driver was installed during the installation of the modem. You attempt to
remove the modem by using Phone and Modem Options in Control Panel. After
each attempt to remove the modem by using this method, the computer stops
responding. You restart the computer again.
You must install the correct driver for the modem as quickly as possible.
What should you do?
A. Use the Add/Remove Hardware wizard to uninstall the modem. Restart the
server.
B. Shut down the server, remove the modem card, and restart the server.
Shut down the server again, insert the modem card, and restart the server.
C. Delete all references to modems in the registry.
D. Run the Modem troubleshooter and remove the modem when prompted.
Restart the server.
Answer: A
393. You install 10 PC's. PC 6 and 8 have a UTP card and connect to the
network. The other 7 PC's have UTP/BNC cards but do not connect. What
should you do?
A. change the settings of PC's with UTP/BNC cards to use the UTP
connector.
Answer: A
394. The PC picks up the installed screen card as VGA 16 colors. You
cannot change any of the colors or resolution settings. The manufacturer,
version, make etc. of the card is not shown. What should you do?
A. Install a driver for the monitor.
B. Install a WDM compliant driver for the screen card and monitor.
C. Change the screen card.
D. Move the card to another slot.
Answer: B
395. A user in your Accounting OU reports that their mouse is not working.
You log onto the domain from that user's computer by using the domain
Administrator's account. You discover the user is using an old mouse
driver. You install an updated mouse driver, and restart the computer. The
mouse is still not working correctly. You view Device Manager, and notice
the previous mouse driver is still installed. What should you do?
A. Configure OU policy to allow installation of drivers overwrite Local
Policy.
B. Configure Domain policy to allow installation of drivers overwrite
local policy.
C. Configure local policy to allow installation of drivers to overwrite OU
policy
Answer: A
396. You are the Administrator of your company's network. You install
Windows 2000 Professional onto 10 Computers in the Graphics-Department.
The 10 Computers have built in USB-controllers. You then physically
install new USB-Tablet devices on each of the 10 Computers. You are
prompted for the Tablet-Software. You install the Tablet-Software and a
Tablet-Icon appears in the control panel to configure the device, but the
device does not work. You view Device Manager as in the "Exhibit" (exhibit
not available). You want the USB-Tablets to work on all 10 Computers.
What should you do?
A. Enable the USB ports in the Computer BIOS and reinstall the USB-Tablet
device drivers.
B. Disable USB error detection for the USB Root-Hub-Controller and enable
USB-Tablet device in hardware profile.
C. Reinstall the USB device drivers and disable the USB error detection.
D. Enable the USB Root-Hub-Controller and reinstall the USB-Tablet device
driver.
Answer: B
397. You install a new CD-ROM. It is not working correctly. You check
resources and see that it is not using "Automatic resource settings". How
do you get your CDROM to work?
A. Check "Use Automatic Settings"
Answer: A
398. You are the administrator of your Company's network. The network has
50 Windows 2000 Professional computers. Each computer has 32 MB of RAM. A
user named Susan in the accounting department reports that her Computer
performs very slow when she runs the Company's accounts payable
application. You suspect that her Computer's RAM is insufficient when
other applications are running. You want to find out whether adding more
RAM would improve the performance of Susan's Computer. You start the
application. What should you do next?
A. Use Task Manager to see if memory usage exceeds 32 MB.
B. Use Task Manager to see if the peak commit charge exceeds 32 MB.
C. Use System Monitor to see if the Processor\%ProcessorTime counter
consistently exceeds 50.
D. Use System Monitor to see if the Memory\Page Faults per Second counter
consistently exceeds 50.
Answer: D
399. You are a member of the Enterprise Admins group at Trey Research. You
create and share a printer named HPColorL2 on a Windows 2000 Server
computer named pserver.treyresearch.local. You grant Print permission only
to the Domain Local group named CompanySales. Later, you add a new child
domain named london.treyresearch.local. Clair Hector is a member of the
global group named LondonSales in the london.treyresearch.local domain.
Clair reports that she is unable to send a print job to the HPColorL2
printer. You want all members of the LondonSales group to be able to print
to the HPColorL2 printer. What should you do?
A. Add the LondonSales group to the CompanySales group.
B. Add the CompanySales group to the LondonSales group.
C. Change the CompanySales group to a universal group.
D. Change the LondonSales group to a universal group.
Answer: A
400. You're running Windows 2000 professional. You set up a color LaserJet
printer on Computer1 and you name it printer 2. You have the same color
LaserJet on Computer2; you name this one printer 2.
The LaserJet on Computer1 fails. You want to send the three print jobs to
the printer on Computer2 that are in the Computer1 queue. You do not want
to have users to re-send these jobs to the printer. How can you accomplish
this?
A. Select a second printer port on the printer in computer1 redirect the
port to \\computer2\printer2
B. Physically haul a 120lb printer over to computer1
C. Stop and restart the service
Answer: A
401. You have a printer on Computer1 that is shared. Computer2 has an
identical shared printer. The printer on Computer1 fails. Users have sent
jobs to Computer1 and the jobs are waiting to be printed.
How can you print these documents without having the users resubmit the
jobs?
A. Assign a UNC name to the port similar to this: \\Computer2\Printer2.
Answer: A
402. You are the administrator of a Windows 2000 professional computer and
you have a shared printer. Several departments in your company use the
shared printer. The sales dept frequently sends multiple page graphics,
which takes long time to print. Users in other departments who have short
messages have to wait for a long time to get their documents printed. You
want to improve the efficiency of printing for all users who use the
shared printer. You want to accomplish this with least amount of
administrative effort.
What should you do?
A. Configure the priority of printer to 50. Add a new printer and set the
priority to 1. For the new printer deny the print permission for the users
of sales department.
B. Configure the priority of printer to 50. Add a new printer and set the
priority to 94. For the new printer deny the print permission for users in
the sales dept.
C. Monitor the print queue and raise the priority for all of the print
jobs that are sent by the members who are not members for the sales dept.
D. Delete the old printer. Add a new printer and set the priority to a
higher value. Pause and print queue only when the graphics intensive jobs
are printing.
Answer: B
403. A user with installed fax-service isn't able to receive faxes, but to
send them. What is the problem?
A. Log on to the machine as administrator and enable the fax to receive
faxes (this is disabled by default)
Answer: A
404. A user prints a lot of small docs by using a network printer. After
printing a doc, he gets a short message that the doc is printed
completely. How to turn these messages?
A. Print server properties, disable " notify when remote documents are
printed"
B. Print server properties, disable "notify computer, not user, when
remote documents are printed"
C. Printer properties, disable bi-directional support
Answer: A
405. You are admin of a company. You have a printer named printer 1 on
computer 1 and is not on. You have similar device named Printer 2 on
computer 2. Users have 3 print jobs that are pending for Printer 1. You
want to send the three print jobs to the printer2 on computer2 that are in
the computer1 queue. You do not want to have users to re-send these jobs
to the printer. How can you accomplish this?
A. Select a second printer port on the printer in computer1 redirect the
port to \\computer2\printer2
Answer: A
406. You want to connect to your branch office printer through the
browser. Your Windows 2000 Professional computer is running Peer Web
Server. You were told the share name of the printer is HPColorL. You are
unable to see it when you type its URL.
What do you need to do to connect to this printer?
A. Double-click the connect hotspot in the left pane of the printer's
dialog box to view the printer.
B. Ask the branch office administrator to reinstall the printer by using
its URL as the port.
C. Install Internet Explorer 3.0 or higher on your Windows 2000
Professional.
D. Ask the administrator at the branch office to install IIS on the branch
server.
Answer: D
407. You upgrade 5 computers in the Finance Organization (OU) from Win NT
workstation 4.0 to W2P. The computers are used by members of the Finance
OU to run financial application.
All 5 computers are configured to have default security setting. A user
named Helene report that she can no longer run the financial application
on her W2P computer. Prior to the upgrade, Helene was able to run the
financial application on her computer. Helene is a member of the local
user group. You want the financial application to run on Helene's
computer.
What should you do?
A. Use computer Management to configure separate memory space for each
financial application on Helene's computer
B. Use Security Templates to edit the Security Policy to include the
financial application on Helene's computer. Then, add Helene's user
account to the Power users group on Helene's computer.
C. Use Security configurations and Analysis to reconfigure the default
security Policy.inf file to allow the financial applications to run on
Helene's computer
D. Use Secedit.exe to apply the compatws.inf security to Helene's security
Policy to loosen the permission for the local group on Helene's computer.
Answer: D
408. You have 30 NT 4 machines and 5 W2kpro machines on your network. You
want to share files on the W2kpro machines that only they can access. The
NT 4 machines must not be able to access those shared files at all?
A. Implement the hisecws.inf template
Answer: A
409. You are the administrator of your company's network. You use Security
Templates to configure a Security Policy on the Windows 2000 Professional
Computers in the Sales organizational unit (OU). You notice that the
Computers in the Sales OU are not downloading the Security Policy
settings. On each computer, the Security Policy appears in the Local
Computer Policy, but is not listed as the effective policy. You want all
computers in the Sales OU to have the Security Policy listed as the
effective policy. What should you do?
A. Use Security Templates to correct the setting and export the security
file.
B. Use Security Configuration and Analysis to import the security setting.
Then create a Group Policy object (GPO) for the Sales QU.
C. Use Secedit /RefreshPolicy Machine_Policy command.
D. Use the Basicwk.inf security file settings, save the security file, and
then import the file to the Computers.
E. Use secedit /refreshpolicy machine_policy /enforce
Answer: C
410. You have a laptop that doesn't shut down at all. It stays on the
shutdown screen and even if you try to switch it off, it won't switch off?
A. Enable APM in control panel, power options.
B. Disable APM in the BIOS
C. Enable hibernate in control panel, power options
Answer: A
411. Bob is going on a trip with his laptop configured with Windows 2000
professional. He is concerned that he will run out of battery life and his
system will crash. He asks you
to configure the power savings feature so that when he is not using his
laptop, it will save his work and power down. You go into APM options.
What should you do next?
A. Set the system to hibernation mode to 15 minutes
B. Set the system to snooze mode after 15 minutes.
Answer: A
412. You the administrator logs onto a Windows 2000 professional computer,
which is used by different students. User1 is not an administrator. You
like to use this account instead of logging on as administrator for
security reasons. You want to schedule a task to run a command called
ADDUSERS.CMD to add six new users. What do you need to do?
A. Schedule the task to run under an administrator account
B. Log on as Administrator and schedule to run under USER1
C. Take Ownership of ADDUSERS.CMD
Answer: A
413. You use Windows 2000 Professional on your desktop Computer. You
schedule a task to run an MMC snap-in to perform configuration tasks on
other computers. You notice that the task is not completing correctly. You
manually start MMC. You add the snap-in. You are then able to successfully
run the task. You verify that all of your other tasks are working
correctly. You want to enable your tasks to complete successfully. What
should you do?
A. Use Scheduled Tasks to configure the task to run under the security
context of your account.
B. Configure the Task Scheduler service account to use a local
Administrator account and password.
C. Use Computer Management to start the Messenger service and to configure
the Messenger service to start automatically.
D. Use Computer Management to start the Task Scheduler service and to
configure the Task Scheduler service to start automatically.
Answer: A
414. What process do you use to restore an ERD?
A. Boot with the ERD
B. Use the Windows Backup utility
C. Use the Windows 2000 boot disk
D. Use the Windows 2000 Professional Setup Disks
Answer: D
415. Which of the following commands or utilities can be used to create an
Emergency Repair Disk?
A. ERD
B. RDISK
C. RDISK32
D. The Backup utility
Answer: D
416. You want to troubleshoot system restoration by starting Windows 2000
Professional in Safe Mode. What should you do after the computer is
restarted into Safe Mode? (Choose all that apply)
A. Run msinfo32
B. Run verifier
C. Expand Components, and click Problem Devices.
D. Expand Software Environment, and click Drivers.
E. Expand Hardware Resources, and click Forced Hardware.
F. Expand Hardware Resources, and click Conflicts/Sharing.
Answer: A, C, F
417. You install an ISA sound card into your Windows 2000 Professional
system. The card fails. You reboot and go into safe mode. What do you do?
A. Enable driver-signing
B. Disable driver-signing
C. Disable driver
D. Disable using computer management
Answer: D
418. After restarting your Windows 2000 Professional Computer, your
Monitor shows a blank blue screen without text and the Computer will not
respond to keyboard or mouse commands. You discover that an incorrect
driver was just installed.
How should you correct the problem?
A. Use the "Last Known Good Configuration" to restart you system and
correct the problem.
B. There is nothing you can do. Reinstall the Operating System.
C. Call the manufacturer to request a Windows 2000 compatible driver.
D. Use the Emergency-Repair-Disk.
Answer: A
419. You are the administrator of a workgroup supporting Windows 2000
Professional computers. You configure the Group Policy by setting the
Account lockout duration to 0. What effect will this have?
A. Users will never be locked out
B. Users will be locked out for 69 days.
C. Users will be locked out after one failed logon attempt.
D. Users will be locked out indefinitely until the Administrator unlocks
the user account.
Answer: D
420. You are the administrator of your company's network. You want to
configure a Security Policy for the Windows 2000 Professional Computers
that are in the sales department. On one of the computers, you use
Security Templates to configure the Security Policy based on the desired
security settings. You then export those settings to an .inf file that
will be used on all of the Computers in the sales department. You want to
configure each Computer to have a customized Security Policy.
What should you do?
A. Use Secedit.exe to import the security settings from the .inf file to
the computers in the sales department.
B. Use a text editor to change the default security settings to the
desired security settings. Then export those settings to the Computers in
the sales department.
C. Create an organizational unit (OU) named Sales. Add the users in the
sales department to the Sales OU. Then apply the security template to the
users in the Sales OU.
D. Create an organizational unit (OU) named Sales. Add the computers in
the sales department to the Sales OU. Then apply the security template to
computers in the Sales OU.
Answer: D
421. You want to remove the logoff option from your screen. What TWO
places can you do this from? (Choose 2)
A. Local Policy
B. Group policy
Answer: A, B
422. Someone is reading your Word documents. How should you setup
auditing? (choose all that apply)
A. Use Explorer to enable file auditing of your files
B. Enable successful auditing of object access
C. Enable failed auditing of object access
D. Enable successful auditing of processes
E. Enable failed auditing of processes
Answer: A, B
423. You need to upgrade 6 MPS computers from NT to W2K. Each machine has
two CPUs. After the upgrade performance is slow. What should you do?
A. Enable AGP Bridge Controller.
B. Install the MPS-compliant drivers for the 2nd processor using Device
Manager.
C. Install the ACPI-compliant drivers for the 2nd processor using Device
Manager.
D. During startup, press F8 and install the MPS-compliant drivers for the
2 CPU.
Answer: B
424. You are an administrator that has just received in 100 PC's with
Windows 98 on them. They also have Dual 500Mhz processors on them. You
decide that you want to upgrade them all up to Windows 2000 Professional.
After running set up on a machine, you realize that only one of the
processors is being seen by the OS what do you do next?
A. Run sysprep.exe update the machines after deployment
B. Run sysprep.exe with -pnp option
C. On the test machine update use device manager to update the system to
recognize the second processor. Then run sysprep.exe.
Answer: C
425. You are preparing to install Windows 2000 Professional on 100
MPS-compliant computers. Each computer has two 550-MHz processors. The
Computers are configured identically. You want to use one of the computers
as a reference computer for deploying Windows 2000 Professional to the
remaining Computers. You install Windows 2000 Professional on the
reference computer. You view Device Manager and notice that the drivers
for the second processor are not installed.
You want to add support for the second processor on the remaining 99
computers. You want to accomplish this with the least amount of
administrative effort. What should you do?
A. Use Setup Manager to configure the reference computer, and then create
a disk image.
B. Use the System Preparation Tool with the -pnp parameter to set up the
reference disk, and then create a disk image.
C. Use Device Manager to add the appropriate hardware abstraction layer
(HAL) to the reference computer to support the second processor, and then
Create a disk image.
D. After imaging the reference computer, restart the reference computer in
safe mode and add the driver for the second processor.
E. Use Device Manager to install a MPS compliant driver.
Answer: C
426. You create a shared Internet connection on a Windows 2000
Professional computer. Your network has 10 users on the LAN. All of the
users can connect to HTTP sites, FTP sites, and streaming audio content on
the Internet. One of the computers on your LAN is running an FTP host
application. Users on the Internet cannot connect to the FTP host on your
network. What should you do?
A. Configure the FTP host to accept incoming requests on service port 80.
B. Configure an Internet Connection Sharing application type for FTP to
use remote server port 23.
C. Configure an Internet Connection Sharing service type for FTP use
service port 21 on the FTP host computer.
D. Configure an Internet Connection Sharing service type for FTP use
service port 23 on the FTP host computer.
Answer: C
427. You want to create a shared Internet connection, but the users
shouldn't have any permission except http and ftp-site.
A. Enable HTTP-port 80 and FTP-port21
Answer: A
428. You have ten computers in your organization that are not connected to
the Internet. The company breaks down and purchases a 56K modem to connect
to the Internet. You implement Internet connectivity sharing. Now you
can't see any of the other computers on your network. What do you do?
A. Disable Internet Connection Sharing.
B. Use IPCONFIG to release and to renew
C. Disable dial on demand.
D. Set ICS client PC's to receive an IP address dynamically.
Answer: D
429. Your desktop Computer has Windows 2000 Professional installed. You
create a new dial-up connection to connect to the Internet. You configure
the Internet connection to enable Internet Connection Sharing. After you
configure the connection, you cannot see or connect to any shared
resources on your local network. You want your computer to be able to
connect to shared resources.
What should you do?
A. Configure the dial-up connection to disable shared access.
B. Configure the dial-up connection to disable on-demand dialing.
C. Disable data encryption in the new dial-up connection.
D. Use the ipconfig command to release and renew your network TCP/P
address.
E. Change the ICS clients to automatically receive an IP address
Answer; E
430. You are using Windows Installer to deploy an application to 750
Windows 2000 Professional Computers on your network. The network includes
an organizational unit (OU) named Sales. A Group Policy object is created
for the Sales OU. The software deployment of the application is
unsuccessful.
During the deployment, some users in the Sales OU report that the
installation is aborting with random errors midway through the
installation process. The remaining users in the sales OU report that the
software is installing, but is giving them general protection fault
errors. What should you do?
A. Repackage and re-deploy the application's .msi file for the Sales OU.
B. Repackage and re-deploy the application's .mst file for the Sales OU.
C. Re-deploy the application by using the Group Policy object for the
Sales OU.
D. Restart Windows Installer on all Computers in the Sales OU. Then
re-deploy the application's .zap file to the Sales OU.
Answer: A
431. You are deploying an application using windows 2000 (Windows 2000
Service pack). When Users try to install it the installation fails. What
do you need to do in order correct the situation?
A. Re-deploy the .msi file
B. Re-deploy the .mst file
C. Re-deploy using the .zap file
Answer: A
432. You are the administrator of a Windows 2000 network that has 1,5000
Windows 2000 Professional computers. Microsoft Office 2000 was assigned to
all the computers on the network by using Group Policy object (GPO). You
deploy the Office 2000 service release to all Windows 2000 Professional
computers on the network. The service release, in addition to other
software that had been assigned, fails to install on only one of the
computers. What should you do?
A. Re-deploy the service release by using a .Zap file.
B. ......... mst file.
C. Restart windows installer on the do main controller.
D. Restart windows installer on the computers that failed to install the
service release.
Answer: D
433. You have recently deployed an application to several hundred Windows
2000 Professional computers on your company's network. However, you were
just made aware that there is a patch available for the application and
you would like to apply this to all of the computers to which the
application was deployed.
Which of the following represents the correct way to do this?A. Replace
the .msi file on the network server with a new .msi file. Restart the
Windows Installer service on all of the clients.
B. Replace the .msi file on the network server with a .msp file. Restart
the Windows Installer service on all of the clients.
C. Replace the .msi file on the network server with a .mst file. Restart
the Windows Installer service on all of the clients.
D. Use the msiexec command to specify the location of a .msp file.
Redeploy the application through Group Policies.
E. Use the msiexec command to specify the location of a .mst file.
Redeploy the application through Group Policies.
Answer: D
434. You are the administrator of a Windows 2000 domain. You develop a
graphics software application to users in the Graphics organizational unit
(OU). You want to create a custom installation for three users named
Carlos, Carmen, and Maria, who are members of the Graphics OU. You want
these three users to be able to access additional text, filters, and other
graphics options for the software. What should you do?
A. Create the Graphic Users OU in the domain. Add a custom .msi file to
the Graphics OU.
B. Create the Graphic Users OU in the domain. Add a custom .mst file to
the Graphics OU.
C. Create the Advanced Software OU within the Graphics OU, and add Carlos,
Carmen, and Maria. Create an .msi file, including changes, and apply the
modifications to the Advanced Software OU.
D. Create the Advanced Software OU within the Graphics OU, and add Carlos.
Carmen, and Maria. Create an: mst file, including changes, and apply the
modifications to the Advanced Software OU.
Answer: D
435. You are the administrator of your company's network. You want to
deploy a Windows 2000 Professional service pack to 10 computers in the
Development organizational unit (OU).
You create a Windows Installer package file for the service pack. You use
the package file to successfully install the service pack to other
computers in the domain. You assign the package file to the Development
OU. After the installation, you notice that the service pack was not
installed on any of the 10 computers. You want to ensure that the service
pack is successfully installed on the Computers in the Development OU.
What should you do?
A. Use Computer Management to start the Windows Installer service on all
of the computers in the Development OU.
B. Use the local Administrator account to log on to the Computers in the
Development OU. Then redeploys the service pack to the computers in the
Development OU.
C. Run WinINSTALL LE to repair the package file. Then redeploys the
service pack to the computers in the Development OU.
D. Add the user accounts from the Development OU to the DACL. Grant the
user accounts Read permission to the service pack deployment directory.
Answer: D
436. You have two drives in a PC. You want to make sure that you are
prepared in case of disk failure. System and boot partition must be backed
up. How do you do it?
A. Configure the backup to backup the system state area
B. Run weekly backup it will take care of backing up these files
C. Create a batch file to run RDISK.EXE /s-before backup starts
D. Create a batch file to run RDISK.EXE /s- after backup is started
Answer: A
437. You are performing a Weekly backup and you want to be sure that you
backup everything including the registry, boot files, and COM. What should
you do?
A. Configure the backup to backup the system state area
B. Configure the backup to backup the system partition
C. Create a batch file to run RDISK.EXE /s-before backup starts
D. Create a batch file to run RDISK.EXE /s- after backup is started
Answer: A
438. You are trying to copy big files from a UNIX server to WIN2K computer
(running TCP/IP). You do the copy in explorer. The files are 100 MB each,
and you need to copy 20 of them. The copying always aborts.
What should you do to resolve the problem?
A. Install network monitor agent, use performance console and review all
counters for TCP/IP.
B. Install network monitor agent, use performance console and review
Fragmented Datagrams/Sec.
C. Install SNMP and monitor TCP/IP counters.
D. Install simple TCP/IP protocol and monitor Fragmented Data
Answer: C
439. You are the administrator of a Windows 2000 network that has 1,5000
Windows 2000 Professional computers. Microsoft Office 2000 was assigned to
all the computers on the network by using Group Policy object (GPO). You
deploy the Office 2000 service release to all Windows 2000 Professional
computers on the network. The service release, in addition to other
software that had been assigned, fails to install on only one of the
computers. What should you do?
A. Re-deploy the service release by using a .Zap file.
B. ......... mst file.
C. Restart windows installer on the do main controller.
D. Restart windows installer on the computers that failed to install the
service release.
Answer: D
440. You set up scheduled tasks to run and notify you of any failures. 3
days later you see that none of the tasks ran and you received no
notifications. What to do?
A. Set the schedule service to run under the administrator account.
B. Set the scheduled tasks to run under the administrator account.
C. Enable the messenger service
D. Set the schedule service to run under the local system account and set
it to start automatically.
Answer: D
441. Kevin, the Software Developer of Perfect Solution Inc., recently left
the job. The company's Administrator moves all of his home folder files to
his Manager's home folder. The NTFS partition that contains the home
folders has the Encrypting File System (EFS) enabled. When the Manager
attempts to open Kevin's files, he is denied access. What should be done,
so that the Manager can access those files with least administrative
burden?
A. Grant the Manager NTFS Full Control (FC) permission to the files.
B. Grant the Manager the NTFS Take Ownership (TO) permission to the files.
C. Logon to the network as a Recovery Agent. Decrypt the files for the
Manager.
D. Logon to the network as a member of Backup Operators group. Decrypt the
files for the Manager.
Answer: C
442. You are the administrator of your company's network. Your network has
75 windows 2000 professional computers and eight Windows 2000 Server
computers. Users on the network drive save their work files in home
folders on a network server. The NTFS partition that contains the home
folders has Encrypting File System (EFS) enabled. The partition also has
disk quotas defined. A user named Candy reports that she cannot save any
files to her home folder. She also cannot update files in her home folder.
When she attempts to save files to the folder she receives the following
error message "insufficient disk space". Other users are not experiencing
this problem with their home folders. You want to enable Candy to save
files in her home folder. What should you do?
A. Log on to the network as a Recovery Agent. Decrypt all of candy's files
in her home folder.
B. Log on to the network by using the domain Administrator account. Grant
Candy Full control permission to her home folder.
C. Use Windows Backup to archive and remove old files on the server.
D. Increase the server a disk quota entry for Candy to accommodate the
additional files.
Answer: D
443. You are the Administrator of your company's network. You install
Windows 2000 Professional onto 10 Computers in the Graphics-Department.
The 10 Computers have built in USB-Controllers. You then physically
install new USB-Tablet devices on each of the 10 Computers. You are
prompted for the Tablet-Software. You install the Tablet-Software and a
Tablet-Icon appears in the control panel to configure the device, but the
device does not work. You view Device Manager as in the "Exhibit" (not
included), but no USB device are displayed. You want the USB-Tablets to
work on all 10 Computers. What should you do?
A. Disable USB error detection for the USB Root-Hub-Controller and enable
USB-Tablet device in hardware profile.
B. Reinstall the USB device drivers and disable the USB error detection.
C. Enable the USB Root-Hub-Controller and reinstall the USB-Tablet device
driver.
D. Enable the USB ports in the Computer BIOS and reinstall the USB-Tablet
device drivers.
Answer: D
444. You are creating a dial-up connection for Internet access. The wizard
cannot access the default Internet Service Providers (ISP) with either of
the numbers provided. What is your alternate method for setting up the
connection?
A. Configure the dial-up connection to negotiate with the server using
Challenge-Handshake Authentication Protocol (CHAP).
B. You can choose the option to set up the Internet connection manually if
you know the ISP's phone number and your account and password already.
C. You need to provide a known IP address before attempting to connect to
the ISP server.
D. Your ISP is requiring Data Encryption. Configure the dial-up connection
to use it.
Answer: B
445. You install Windows 2000 professional on your computer at home. You
create a new dial-up connection to connect to your company's remote access
server. You configure the connection to use both of your external modems
and to use multi-link to bind the modems together. You start the dial-up
connection and connect to the remote access server. You notice that only
one of the modems is connected to the remote access server. What should
you do?
A. Configure the dial-up connection to use a SLIP connection
B. Configure the company's remote access server to accept multi-link
connections
C. Replace your modems with new modems that support multi-link
D. Grant your user account multi-link permission on the company's remote
access
Answer: B
446. You want to install windows2000 professional on 30 PXE-compliant
computers and 35 non-PXE-compliant computers. All 65 computers are
included on the current hardware compatibility list (HCL). You create a
RIS image. You load the Image on the RIS server. You then start the 65
computers. You find that the 30 PXE-Compliant computers can connect to the
RIS server. However, the 35 non-PXE-compliant computers have to connect to
the RIS server. What should you do?
A. Run Rbfg.exe to create a Non-PXE-compliant startup disk
B. Run Riprep.exe to create a non-PXE complaint startup disk
C. Grant the everyone group NTFS Read permission for the RIS image
D. Grant the Administrators group NTFS Read permission for the RIS image
Answer: A
447. You have a portable laptop with W2KPro installed. You add a PNP SCSI
device to the docking station, connect the portable and boot W2K. It fails
to detect the SCSI device. You start the Add/Remove Hardware wizard, but
when it finished it didn't detected the device. You want to enable W2K to
detect the device.
What to do?
A. Start the Add/Remove Hardware wizard. Manually install the drivers.
B. Wrong answer
C. Wrong answer
D. Adds the drivers to the %systemroot%\driver cache\i386 folder and start
the Add/Remove Hardware wizard.
Answer: A
|