MCSE 70-215 Free Braindumps
|
If you want to
post your mcse braindumps - click here
Corrected and
verified mcse braindumps enriched with explanations are available in the
members area.
Sign up to access the verified and corrected mcse
braindumps.
1. You are the administrator of a Windows 2000 Server computer named Paris. A user named Peter manages the local nonadministrative user accounts on Paris. He also stops and starts services that are not started by default. A former employee configured Peter?s user account. You do not want Peter to be able to change user rights assignments, install system services, or modify operating system files. You want to ensure that peter does not have more privileges than necessary to perform his responsibilities on Paris What should you do? To answer, click the Simulation button and then perform the appropriate actions in the simulation of Computer Management.
A. 1 - Click Start > Programs > Administrative Tools > Computer Management. 2 - Expand ?Local Users and Groups? by clicking the plus (+) sign. 3 - Click the Users folder. 4 - Double click the Peter's user account. 5 - Click the ?Member of? tab. 6 - To remove Peter from the Administrators group, select the Administrators group then click the Remove button. 7 - Click the Add button. 8 - Select the Power Users group, click the Add button the click the OK button. 9 - Click the OK button and you will be returned to the Computer Management console. 10 - Close the Computer Management console by clicking the X in the top right corner.
Answer: A
2. You are the network administrator for your company. The network contains a Windows 2000 Server computer named Toronto, which is configured as shown in the following table. Drive Label Contents C System System files D Mgmt Manager?s home foldersE Employ Employees? home folderCompany policy does not allow you to limit the amount of disk space that is available for managers to use. At 9:00 A.M. on a business day, you discover that drive D contains no free space. You need to increase the capacity of drive D by at least 7 GB so that managers can continue to save files to their existing home folders. You also need to ensure that no data is lost and that user disruption is minimized. What should you do to accomplish these goals? To answer, click the Simulation button and then perform the appropriate actions in the simulation of Windows 2000 Server.
A. 1 - Click Start > Programs > Administrative Tools > Computer Management. 2 - Click the Disk Management icon to open Disk Management. 3 - Right click on the D drive (Mgmt) and select Extend Volume. 4 - Click Next. (In Extend Volume Wizard) 5 - Select the dynamic disk containing the free space. 6 - Type in the amount you want to extend the disk by. Here 7168 MB (=7GB). 7 - Click Next. 8 - Click Finish to complete the Wizard. 9 - Close the Computer Management console by clicking the X in the top right corner.
Answer: A
3. You are the administrator of a Windows 2000 Server computer named Paris. A printer named PrinterColor is configured on Paris. You want to allow only users in the Administrators group and users in the Managers group to print to PrinterColor. You also want to allow users in the Managers group to pause and resume their print jobs, and you want to ensure that users in the Administrators group have full control permission for PrinterColor. What should you do? To answer, click the Simulation button and then perform the appropriate actions in the simulation of the Printers folder.
A. 1 - Click Start > Settings > Printers. 2 - Select the printer and click the file menu. 3 - In the File menu, select Properties. 4 - Click the Security tab. 5 - Select the Everyone group and click the Remove button. 6 - Select the Power Users group and click the Remove button. 7 - Click the Add button. 8 - Select the Management group and click the Add button. 9. Then click the OK button. Note: The default permission for the Management group is ?Print?, which is what we want. 10 - We can select the CREATOR OWNER group and verify that it has the Manage Documents permission. 11 - Click the OK button to close the dialog box. 12 - Close the Printers folder.
Answer: A
4. You are the network administrator for your company. The network contains a Windows 2000 Server computer named Server1. You suspect that someone is unsuccessfully attempting to access a confidential file in the folder D:\Maria on Server1. You configure the local Group Policy for Server1 as shown in the Local Security Settings exhibit.
You configure auditing on drive D to track Full Control access for the Everyone group. This auditing change is propagated to and inherited by child objects on Drive D. You open the Security log and discover that it is filled with multiple entries of the type shown in the Event Properties exhibit.
You need to prevent these entries from re-appearing. What should you do?
A. In the Audit account logon events local Group Policy, clear the Failure check box.
B. In the Audit object access local Group Policy, clear the Success check box.
C. In the Auditing Entry for Local Disk d:\ dialog box, replace the Everyone group with the Administrators group.
D. In the Auditing Entry for Local Disk d:\ dialog box, replace the Everyone group with the Authenticated Users group.
E. In the Audit privilege use local Group Policy, clear the Success check box.
Answer: B
5. You are the network administrator of a Windows 2000 Active Director domain. You have a Windows 2000 Server computer that contains a shred folder named Personnel. Personnel contains a subfolder named Evaluation. The Evaluation subfolder is configured not to inherit NTFS permissions from its parent folder. The share and NTFS permissions are shown in the following table. Folder Share permissions NTFS permissions Personnel Evaluation Not shared Managers: Read Managers: Full Control HR: Full Control HR: Full Control Managers: Full Control HR: Full Control You want to grant the Managers group Full Control permission for the Evaluation folder, and you want to grant the Human Resources (HR) group Read permission for the Evaluation folder. You do not want to change either group?s effective permissions for the Personnel folder.
What should you do?
A. Change the share permissions for the Personnel folder to Full Control for the Managers group. Share the Evaluation folder as Evaluation, and grant the HR group Read permission.
B. Change the share permissions for the Personnel folder to Full Control for the Managers group. Change the NTFS permissions for the Personnel folder to Read for the Managers group. Change the NTFS permissions for the Evaluation folder to Read for the HR group.
C. Change the Evaluation folder to inherit NTFS permissions from its parent folder. Change the share permissions for the Personnel folder to Full Control for the Managers group. Change the NTFS permissions for the Personnel folder to Read for the HR group.
D. Change the Evaluation folder to inherit NTFS permissions from its parent folder. Change the share permissions for the Personnel folder to Read for the HR group. Change the NTFS permissions for the Personnel folder to Read for the HR group.
Answer: B
6. You are the administrator for your company?s Windows 2000 Server network. Your Windows 2000 Active Directory structure currently has an organizational unit (OU) for each department in your company. You create a custom security template to ensure the highest level of security for the research and development (RD) department. The RD department uses local accounts for daily operations. You want to account policy settings to be applied to all computers in the RD department?s OU. What should you do?
A. Create a Group Policy object (GPO) for the domain and import the template that was created by using the Windows.adm file.
B. Create a Group Policy object (GPO) for the domain and import the template that was created by using the Common.adm file.
C. Create a Group Policy object (GPO) for the computers in the RD department?s OU. Use POLEDIT to deploy the policy to all computers.
D. Create an OU named RD Computers in the RD department?s OU. Create a Group Policy object (GPO) in the RD Computers OU and then import the policy.
Answer: D
7. You are the administrator of a Windows 2000 Server computer named ServerA. ServerA runs an application that is used by all of your company?s employees. Employees report that the application on ServerA is responding slowly. You discover that the built-in Plug and Play network adapter on ServerA cannot accommodate the traffic generated by the application. You purchase a faster network adapter and install it in ServerA. You need to turn off the built-in network adapter. However, the BIOS settings do not allow you to do so. What should you do on ServerA?
A. In Device Manager, delete the built-in network adapter.
B. In Device Manager, disable the built-in network adapter.
C. Uninstall the deice driver for the built-in network adapter.
D. In the BIOS configuration, reserve an IRQ address for the faster network adapter.
E. Overwrite the device driver for the built-in network adapter with the device driver for the faster network adapter.
Answer: B
8. You are planning to upgrade Windows NT Server 4.0 computers that have SCSI controllers to Windows 2000 Server. You want to perform the upgrades by means of a distribution folder. You review the Hardware Compatibility List (HCL) and discover that the drivers for the SCSI controllers are not provided by Microsoft. You learn that the manufacturer of the SCSI controllers produces drivers that are compatible with Windows 2000 Server computers. You download the drivers from the manufacturer?s Web site. You need to include these new drivers in the distribution folder so that they are automatically installed during the upgrade process. What should you do?
A. Create a subfolder named $OEM$\$C\Drivers under the i386 folder. Copy the drivers to that subfolder.
B. Create a second sharepoint named $OEM$. Copy the drivers to that sharepoint.
C. Create a subfolder named $OEM$\Textmode under the i386 folder. Copy the drivers to that subfolder.
D. Create a second sharepoint named Drivers. Copy the drivers to that sharepoint.
Answer: C
9. You are a recently hired network administrator at A. Datum Corporation. A. Datum Corporation has an office in New York and an office in Toronto. The company network is configured as shown in the exhibit.
You are responsible for monitoring all servers from Monitor1. Monitor1 and Monitor2 are configured as management consoles running third-party network management software. Appserver and Webserver are configured as SNMP agents. You discover that you cannot manage Appserver from Monitor1. What should you do?
A. Relocate Appserver to the Toronto office.
B. Move the Appserver computer account to the toronto.adatum.com domain.
C. Add ADatumA to the list of accepted community names on Appserver.
D. Add Public to the list of accepted community named on Appserver.
E. Remove all community names from Appserver.
F. Remove all community names from Monitor2.
Answer: C
10. You are the network administrator for your company. The network contains a Windows 2000 Server computer named ServerA and is connect to the Internet by means of a 1.544-Mbps network connection. The network also contains a firewall, which performs network address translation (NAT)-. The firewall is located between ServerA and the Internet. Your manager informs you that company employees will be allowed to work from home. Employees who work from home will need to connect to the company network by using a virtual private network (VPN) connection. You install and configure Routing and Remote Access for Windows 2000 on ServerA and then configure ServerA to accept PPTP connections. You also configure the firewall to permit PPTP traffic. You attempt to open a VPN connection to ServerA from your home, but you cannot connect. You can open a VPN connection to ServerA from other computers on your company?s network. You need to ensure that employees can connect to ServerA by using a VPN connection from their home adapters. Which two actions should you take? (Each correct answer presents part of the solution.)(Choose two)
A. Configure the firewall to perform call ID translation for the General Routing Encapsulation (GRE) protocol.
B. Configure the firewall to permit General Routing Encapsulation (GRE) traffic.
C. Configure ServerA to use EAP.
D. Configure ServerA to use MS-CHAP v2.
E. Configure ServerA and employees? home computers to use L2TP connections and IPSec encryption.
F. Configure employee?s home computers so that Internet Connection Sharing is enabled.
Answer: A, B
11. You need to upgrade a computer from Windows NT Server 4.0 to Windows 2000 Server. The server has dual processors, 2 GB of RAM, a RAID controller with five SCSI hard disks in an array, and a generic 10/100-Mb network adapter. You begin the installation of the Windows 2000 Server operating system. During the text portion of the installation, you receive an error message indicating that no hard disks can be found. You need to ensure that you can upgrade the computer. What should you do?
A. Specify an additional driver during the attended installation process.
B. Replace the current RAID controller with a RAID controller that is on the Hardware Compatibility List (HCL).
C. Verify that at least one of the SCSI hard disks is set to a SCSI ID number of zero, and then verify that this hard disk is terminated properly.
D. Before starting the installation, convert all disks from Basic to Dynamic by using the Disk Management console.
Answer: A
12. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an intranet Web site for you company. Company policy requires that only authenticated users have access to the intranet site. All company users have user accounts in the Active Directory domain. You configure directory security for the Web site to use integrated security. However, you discover that users can access the Web site without being authenticated. You need to ensure that only authenticated users can access the Web site. What should you do?
A. Install Active Directory on Intra.
B. Select the Basic authentication check box.
C. Clear the Anonymous access check box.
D. Disable the IUSR_Intra user account on Intra.
E. Clear the Allow IIS to control password check box.
Answer: C
13. You are the network administrator for your company. A Windows NT Server 4.0 member server in your network has a non-Plug and Play ISA modem. You need to update this computer to Windows 2000 Server. You also need to ensure that you maintain the current device configuration during the upgrade. What should you do?
A. Disable the modem. Start the upgrade process. Enable the modem.
B. Configure BIOS to reserve the IRQ currently in use by the modem. Start the upgrade process.
C. Remove the modem. Start the upgrade process. Reinstall the modem.
D. Install the latest driver for the modem. Start the upgrade process.
Answer: B
14. You create two shared printers on a Windows 2000 Server computer in your company. One printer is shared as Admin, and the other printer is shared as Executive. Both printers are connected to the same print device. You set the priority of the Admin printer to 90 and the priority of the Executive printer to 50. You want all users in your company network to be able to send print jobs to either printer. However, you do not want the Executive printer to appear in the browse list when employees other than executives and administrative assistants create a new printer connection on their client computers. What should you do?
A. Change the priority of the Executive printer to 99 Change the priority of the Admin printer to 10.
B. Change the share name of the Executive printer to Executive$. Manually reconfigure client computers that are already connected to the Executive printer.
C. Deny the Everyone group permission to access the Executive printer. Allow access to the users who are allowed to include the printer in their browse lists.
D. Install separate device drivers for the Executive printer. Configure NTFS permissions on the device driver files to allow access only to the System account and to users who are allowed to include the printer in their browse lists.
Answer: B
15. You are the administrator of a network that contains a sever cluster named App1. App1 runs the Windows 2000 Cluster Service. It also runs a custom financial application that does not have a remote administration tool set. You install Terminal Services in Remote Administration mode on App1. You want to be able to administer your company?s custom application on App1 from your Windows 98 computer at your home office. What should you do?
A. Uninstall Terminal Services and reinstall Terminal Services in Application Server mode on App1.
B. Install Terminal Services Licensing on App1.
C. Install the Management and Monitoring Tools on the Windows 98 client computer.
D. Install the Terminal Services client on the Windows 98 client computer.
Answer: D
16. You are the administrator of a Windows 2000 Server computer named ServerA. Server A. ServerA runts two applications that are used by all users in the company. Users report that ServerA is responding slowly. Each week, users report that the performance on ServerA is slow that it was the previous week. You run System Monitor on ServerA and document performance data as shown in the following table. Object Counter Average value System Processor Queue Length 1 Processor % Processor Time 70 Processor Interrupts/sec 290 Physical disk Disk queue length Physical disk Disk bytes/sec Memory Available bytes 4 25 KB 128 MB Memory Pages/sec 11 You need to correct the condition that is reducing the performance on ServerA. What should you do?
A. Upgrade to a faster hard disk.
B. Upgrade to a faster processor.
C. Increase the size of the paging file.
D. Increase the amount of RAM.
Answer: A
17. You are a network administrator of a Windows 2000 Active Directory domain. The company has multiple branch offices and multiple Windows 2000 Server computers at each office. A junior administrator is located at each office. This junior administrator is responsible for local server configurations. One junior administrator has applied a new security template to the local file server. Local users running Windows 95 on their computer can no longer communicate with the server. You need to verify that the security settings on the Windows 2000 Server computer at the branch office will allow client computers to connect. What should you do?
A. Use MMC and load the Local Computer Policy snap-in. Examine the Administrative templates in the User and Computer section. Compare the templates against the template settings currently in place on the server.
B. Use MMC and load the Security Configuration and Analysis snap-in. Create and open a database. Then choose Import file and specify the basicsv template.
C. Use MMC and load the Computer Management snap-in. Specify the appropriate template file to compare against, and then select the Analyze option.
D. Run the secedit /validate command to display the appropriate template file.
Answer: A
18. You are the administrator of a Windows 2000 Network for Contoso, Ltd. The network includes four Web servers named WWW1, WWW2, WWW3, and WWW4. Your network also includes a Windows 2000 Server computer that uses DNS. Each Web server contains exactly the same content, and users accessing www.contoso.com can be directed to any one of them. You add records to your DNS server, as shown in the following table. Record type Name IP address CNAME www 192.168.10.5 CNAME www 192.168.10.6 CNAME www 192.168.10.7 CNAME www 192.168.10.8 When you examine the logs for the Web servers, you discover that all incoming traffic is being directed to 192.168.10.5, which is the IP address for WWW1. You want the incoming traffic to be balanced across the four Web servers. What should you do?
A. Select the Disable recursion check box in the properties of the DNS server.
B. Enable round-robin in the properties of the DNS server.
C. Enable W3C logging in the properties of the Web servers.
D. Install and configure Network Load Balancing on WWW1.
Answer: B
19. You are the network administrator for a domain that contains 10 Windows 2000 Server computers. The computers are configured as domain controllers. You company?s information technology director asks you to create a schedule to automatically back up all of the servers registry files and Windows 2000 Active Directory Services databases. You use the Windows 2000 Server backup application to ensure that all files are backed up to removable media on a nightly basis. The backup process needs to run without affecting availability and production during normal hours of operation. You need a backup configuration that requires the least amount of time to implement. What should you do?
A. Configure one domain controller to back up the System State data for all 10 domain controllers to removable media at 12:00 midnight.
B. Configure the scheduler service to run Rdisk /s on all domain controllers at 12:00 midnight. Configure one domain controller to back up the C:\Winnt\Repair folder for all domain controllers to removable media at 1:00 A.M.
C. Configure all domain controllers to back up their own System State data at 12:00 midnight to a local shared folder. Configure one domain controller to back up that shared folder to removable media at 1:00 A.M.
D. Configure all domain controllers to back up their own security and registry files at 12:00 midnight to a shared folder. Configure one domain controller to back up that shared folder to removable media at 1:00 A.M.
Answer: C
20. You are the network administrator for your company. The network consists of a Windows 2000 Active Directory domain. The network includes a Windows 2000 Server computer named ServerA, which is a member of the domain. ServerA runs Routing and Remote Access for Windows 2000 and is connected to a modem bank. An existing company policy allows all domain users to dial in to ServerA. Your company hires 10 inters. Each intern has a domain user account. All inters are permitted to access all resources on the company network. One intern is permitted to dial in to ServerA for remote access. The other nine interns are no t permitted to dial in to ServerA for remote access. You need to ensure that the nine interns cannot establish a dial-up connection to ServerA. What should you do?
A. Modify the default remote access policy to Deny permissions.
B. Configure the nine interns? domain user accounts so that ServerA is not listed on the Logon Workstations list.
C. Place the nine interns? user accounts into a domain global grouped named NoRemoteAccess. On ServerA, configure a remote access policy that denies access to the NoRemoteAccess group.
D. On ServerA, place the nine interns? domain user accounts into a local group named NoRemoteAccess. Then configure a remote access policy that denies access to the NoRemoteAccess group.
Answer: C
21. You are the network administrator for your company. You are configuring a new Windows 2000 Server computer. The server contains five physical disks. You plan to implement a Windows 2000 software RAID. You need to ensure that all disk volumes are fault tolerant. You want to minimize disk access time and maximize available storage. What should you do?
A. Configure the system volume as a simple volume and the other volumes as striped volumes.
B. Configure the system volume as a simple volume and the other volumes as RAID-5 volumes.
C. Configure the system volume as a mirrored volume and the other volumes as mirrored volumes.
D. Configure the system volume as a mirrored volume and the other volumes as RAID-5 volumes.
Answer: D
22. You are the administrator of a Windows 2000 Server computer named ServerA. ServerA is used in your company?s research department and does not belong to a domain. Employees in the research department use the local Guests user account to access ServerA. However, new company security guidelines state that employees must not use the local Guest user account to log on to company computers. You disable the Guest account on Server A. You also create local user accounts for each employee in the research department. Three weeks later, you discover that the Guest account has been used to access ServerA. You disable the account again. You need to ensure that the Guest account cannot be used to log on to ServerA. What should you do?
A. Rename the Guest account to Guest$.
B. Remove all user accounts except your own from the local Administrators group on ServerA.
C. Set the Audit account logon events audit policy to audit successful and failed attempts.
D. Modify the Local Security Policy on ServerA so that the Accounts: Guest account status policy is set to Disabled.
Answer: B
23. You are the network administrator of a small Windows 2000 Active Directory domain. The network uses TCP/IP as its only network protocol. The network has two subnets, A and B. The subnets are connected by a router. All servers in the network have static IP addresses. You install a DHCP server on subnet A for the client computers. You also configure the DHCP server with two class C scopes, one for subnet A and one for subnet B. When users on subnet B attempt to connect to servers on subnet A, they receive the following error message: ?The network path was not found?. Users on subnet A report no problems when they connect to the servers on either subnet. What should you do?
A. In the DHCP server, authorize the scope needed for subnet B.
B. Correct the error in the routers routing table.
C. Install and configure a DHCP Relay Agent on subnet A.
D. Install and configure a DHCP Relay Agent on subnet B.
Answer: D
24. You are the network administrator of a Windows 2000 workgroup at Coho Vineyard, a small office that is configured as shown in the exhibit.
All Windows 2000 Professional client computers are configured to obtain IP addresses automatically. Server1 is configured to have a static IP address. However, no applications on Server1 require a static IP address. Server2 uses a dial-up connection to connection to the Internet. You enable Internet Connection Sharing on Server2. You discover that the IP address on the LAN network adapter for Server2 is now 192.168.0.1. You want to ensure that all network computers can connect to Server2 and access the Internet. What should you do?
A. On all of the computers except Server1, configure static IP addresses in the range of 192.168.0.1 to 192.168.255.255. Restart all of the computers except Server1.
B. On all of the computers, configure static IP addresses in the range of 192.168.0.2 to 192.168.255.255. Restart all of the computers.
C. Configure Server1 to obtain its IP address automatically. Restart all of the computers except Server2.
D. Configure Server2 to obtain its IP address automatically. Restart Server2.
E. Configure Server2 with a static IP address of 169.254.53.98.? Restart Server2.
F. On Server1, configure static IP addresses in the range of 192.168.0.2 to 192.168.255.255. Restart Server1.
Answer: C
25. Your Windows 2000 Server computer contains a single 18-GB hard disk. The drive is configured as a basic disk and has twp partitions. Partition C is 2 GB in size and contains the operating system files. Partition D is 16 GB in size and contains user data that is updated frequently. Both partitions are formatted as NTFS. Both partitions are backed up to a tape every evening at 10:00 P.M. You have a current Emergency Repair Disk (ERD) for the computer, and Recovery Console is installed on the computer. One day at 4:00 P.M., the server fails. You attempt to restart the computer, but you receive the following error message: ?Boot disk or operating system not found?. You use Recovery Console to discover that the files on partition C are corrupted. You need to recover the server from the failure as quickly as possible. You also must recover as mush user data as possible. What should you do?
A. Use the ERD to start the computer. Replace the corrupted files on partition C by copying them from a Windows 2000 Server CD-ROM.
B. Boot the Recovery Console. Copy any files that have changed since 10:00 P.M. the previous evening to a second server. Use the most recent tape backup to restore the remaining user data to the second server.
C. Start the computer by using a Windows 2000 Server CD-ROM. Select the Repair option in Setup.
D. Install a second hard disk in the computer. Install Windows 2000 Server on the new hard disk. Re-create the shared folders on the first hard disk.
Answer: C
26. You are the administrator of a Windows 2000 Server computer that has Routing and Remote Access for Windows 2000 installed. Routing and Remote Access is configured with the policies shown in the exhibit:
The current configuration allows users to connect remotely after logging on. You want to limit remote connections to logon connections only. What should you do?
A. Delete the Require L2TP policy.
B. Configure the Logon required policy to grant access.
C. Move the Logon required policy to number one in the policy order.
D. Change the Allow access if dial-in permission is enabled policy to include the Logon required policy.
Answer: C
27. You are the administrator of a Windows 2000 Server computer named ServerA. ServerA runs one network application and also stores the roaming user profiles for all company employees. ServerA contains five hard disks. The size and configuration of the hard disks are shown in the Exhibit:
A 750-MB paging file is located on the RAID-1 set. The RAID-5 set has 4 GB of free space. You analyze the disk performance and notice that the RAID-1 set has five times more disk activity than the RAID-5 set. You need to optimize the hard disk activity and disk storage by using the existing hard disk. You decide to move the existing paging file. What should you do?
A. Create standard partitions using the free space on disk 3 and 4. Create a 400-MB paging file on each new partition.
B. Create a standard partition using the free space on disk 1, 3, and 4. Create a spanned volume that includes the free space on disk 1, 3, and 4. Move the paging file to the new spanned volume.
C. Create a striped volume that includes the free space on disk 3 and 4. Move the paging file to the new striped volume.
D. Create a spanned volume that includes the free space on disk 3 and 4. Move the paging file to the new spanned volume.
Answer: C
28. You need to install Windows 2000 Professional on 300 computers. The computers have different manufactures and different hardware abstraction layers (HALs). You plan to use a Windows 2000 Server computer running Remote Installation Services (RIS) to perform the installation. After the installation is complete for the first 25 computers, users of those computers report problems. You discover that the latest Windows 2000 service pack resolves those problems. You want to apply the service pack to the remaining 275 computers during the installation. What should you do?
A. Install the service pack on a reference Windows 2000 Professional computer, and then run the Riprep command on that computer. Use the resulting image for RIS.
B. Install the service pack on the RIS server, and then run the Riprep command on that server. Use the resulting image for RIS.
C. Copy the service pack to the CD-based image shared folder used by RIS.
D. Slipstream the service pack into a new i386 distribution shared folder, and then run the Risetupcommand to create a new CD-based image for the RIS server.
Answer: D
29. You are the administrator of a Windows NT Server 4.0 computer named BDC1. BDC1 is a backup domain controller, and a member of your company?s Windows 2000 Activate Directory domain. BDC1 contains five hard disks. Disk 0 and 1 are configured as a Windows NT 4.0 mirror set. The mirror set contains the operating system files and 500 MB of free disk space. Disk 2, 3 and 4 are configured as a Windows NT 4.0 stripe set with parity and contain employee data files. The Windows NT 4.0 stripe set with parity has a maximum capacity of 140 GB and contains 15 GB of free disk space. BDC1 runs an application that is used by 400 company employees. A new version of the application is available. You need to install the new version, but it requires Windows 2000 Server. Also, the application will not run on a domain controller. You need to install the new application on BDC1 as quickly as possible. What should you do first?
A. On BDC1, back up the employee data files. Then format all five disks and perform a clean installation of Windows 2000 Server. Restore the employee data files.
B. On BDC1, install Windows 2000 Server. Configure BDC1 to use a dual-boot configuration that includes Windows NT Server 4.0 and Windows 2000 Server.
C. Upgrade BDC1 to Windows 2000 Server. During the upgrade, select the option to make BDC1 a member server.
D. Upgrade BDC1 to Windows 2000 Server. During the upgrade, select the option to make BDC1 a domain controller. After the upgrade is complete, demote BDC1.
Answer: A
30. You are the administrator of a Windows 2000 Server computer. This sever contains critical payroll files. You must perform a daily backup of these files. You shutdown the server and connect a non-Plug and Play tape device. You restart the server and install the tape device driver. After the driver loads, you are promoted to restart the server. You then receive the following STOP error: ?DRIVER_IRQL_NOT_LESS_OR_EQUAL? You need to enable thus server to start correctly.
What should you do?
A. Restart the server in debugging mode. When the server starts, remove the device and its associated driver.
B. Restart the server by using the Windows 2000 Server CD-ROM and choose to repair the installation.
C. Restart the server by using the last known good configuration.
D. Restart the server by using a Windows 2000 bootable floppy disk. When the server starts, remove the device and its associated driver.
Answer: C
31. You are the administrator of a Windows 2000 Server computer named ServerA. ServerA contains five hard disks. Disks 0 and 1 are configured as a mirrored volume and contain the operating system files. Disk 2, 3, and 4 are configured as a stripe set with parity volume and contain 150 GB of data files. ServerA also contains a tape backup device, which is used to make a full backup of the data files every weekend. Disk 2 fails on Tuesday. You replace disk 2 with a new hard disk. You need to return the stripe set with parity volume to normal operation as quickly as possible. You also need to minimize the amount of data lost. What should you do?
A. Use the Disk Manager console to delete and re-create the stripe set with parity volume.
B. Restore the data files from the most recent tape backup to the stripe set with parity volume.
C. Modify the Boot.ini file so that the ARC path for Windows 2000 Server points to disk2.
D. Use the Disk Manager console to repair the volume.
Answer: D
32. You are the network administrator of a Windows 2000 Active Directory domain. The three Windows 2000 Server computers in the domain have the Securews.inf template file installed. To the domain, you add a Windows NT Server 4.0 computer that runs a single application. You upgrade the server to Windows 2000 Advanced Server, and then apply the same level of security that the other servers in the domain have. You discover that the application no longer runs. You need to ensure that the application can run. What should you do?
A. Run the dcpromo command on the Server. Reinstall the application on the server,
B. Run the application from the command prompt followed by the /separate switch.
C. Apply the Securews.inf template file.
D. Apply the Compatws.inf template file.
Answer: D
33. You install an internal EIDE DVD-ROM drive in one of your critical Windows 2000 Server computers. After installing the manufactured-provided device drivers, you restart the server. While the server is starting, the monitor displays the following error message ?IRQ_LESS_OR_NOT_EQUAL?. You need to ensure as quickly as possible that the server is operational. What should you do?
A. Restarts the computer by using the Recovery Console, and copy the device drivers to the WINNT\System32 folder.
B. Restart the computer by using the last known good configuration. chedule the DVD-ROM installation for your next scheduled maintenance period.
C. Restart the computer in safe mode. Schedule the DVD-ROM installation for your next scheduled maintenance period.
D. Connect the DVD-ROM drive to a different EIDE controller bus, and restart the computer.
Answer: B
34. You are the administrator of a Windows 2000 Server computer named ServerA. ServerA runs Internet Information Services (IIS) and has a single Web site named Default Web Site. The manager of your company?s sales department asks you to create a new shared folder named Forecasts on ServerA. The manager plans to place documents in the shared folder. All company employees need to access the documents by means of a Web browser and the URL http://servera/forecasts/. You create the Forecasts shared folder and configure the appropriate share and NTFS permissions. You verify that the manager is able to place documents in the shared folder and map a network drive to \\ServerA\Forecasts. However, company employees cannot access the documents by means of their Web browser. When they attempt to access the documents, their browsers display the following error message: ?Page not found?. You need to ensure that all company employees can access the documents by using a Web browser and the URL http://servera/forecasts/. What should you do?
A. Restart the World Wide Web Publishing service.
B. Create an additional share named Forecasts$ for \\ServerA\Forecasts.
C. Ensure that the TCP/IP Helper service on ServerA is configured to start automatically.
D. In the Internet Services Manager console, configure a new virtual directory named Forecasts. Point Forecasts to \\ServerA\Forecasts.
Answer: D
35. You want to set an account policy for domain accounts to have a maximum password age of 30 days and for local computer accounts to have a maximum password age of 90 days. Which action or actions should you take? (Choose all that apply)
A. Configure a Group Policy object (GPO) on the domain that sets the maximum password age to 30 days.
B. Configure a Group Policy object (GPO) on the domain that sets the maximum password age to 90 days.
C. Configure a Group Policy object (GPO) that sets the maximum password age to 30 days, and link it to all organizational units (OUs)
D. Configure a Group Policy object (GPO) that sets the maximum password age to 90 days, and link it to all organizational units (OUs).
E. Configure a local computer policy on all local computers that sets the maximum password age to 30 days.
F. Configure a local computer policy on all local computers that sets the maximum password age to 90 days.
Answer: A, F
36. Your company network consists of a Windows 2000 domain and 300 Windows 2000 Professional computers. A member server named Applic1 has Terminal Services installed in Remote Administration mode. All client computers have Terminal Services Client software installed. You need to make Terminal Services on Applic1 available on all client computers. Which two actions should you take? (Each correct answer presents part of the solution.)(Choose two)
A. Install Terminal Services licensing on Applic1.
B. Install Windows 2000 Advanced Server on Applic1.
C. Install Terminal Services licensing on a domain controller.
D. Remove Terminal Services from Applic1.
E. Reconfigure Terminal Services to operate in Application Server mode.
Answer: C, E
37. You are the network administrator for your company. The network includes a Windows 2000 Server computer named ServerA. The network also includes five UNIX client computers and 450 Windows Professional client computers. Your manager asks you to create a new shared folder named SalesDocs on ServerA. You create the SalesDocs shared folder on an NTFS partition. Your manager places several documents in SalesDocs. Employees who use UNIX client computers cannot connect to the SalesDocs shared folder. Your manager asks you to ensure that all company employees can access the documents. You verify that the share and file permissions on the SalesDocs shared folder grant Read permission to all employees. You need to ensure that all employees can access the documents in the SalesDocs shared folder. What should you do?
A. Move the SalesDocs shares folder to a FAT32 partition on ServerA.
B. Create a host file on each UNIX client computer that includes the name and IP address for ServerA.
C. Modify the share permissions on the SalesDocs shared folder so that Everyone group has Full Control permissions.
D. Install Internet Information Services (IIS) on server A. Configure a new FTP site that uses the SalesDocs shared folder as its root.
Answer: D
38. You are the administrator of a Windows 2000 Server computer named ServerA. ServerA contains a single 10/100-Mbps network adapter and is connected to a 100-Mbps network segment. ServerA is used as a file and print server by the users on your network. You install a second 10/100-Mbps network adapter in ServerA and connect it to the same network segment as the first network adapter. The files contained on ServerA are mission critical, and you need to ensure that ServerA will remain available to network users even if the server?s network adapter fails. You want ServerA to use the second network adapter only if the first network adapter fails. What should you do?
A. Configure the second network adapter so that is has a different default gateway from the first network adapter.
B. Configure the second network adapter so that it has the same IP address as the first network adapter.
C. Configure the first network adapter to use 100 Mbps. Configure the second network adapter to use 10 Mbps.
D. Configure the first network adapter so that it has an interface metric if 1. Configure the second network adapter so that it has an interface metric of 10.
Answer: D
39. You are the administrator of a Windows 2000 Server computer that has Routing and Remote Access for Windows 2000 installed. Routing and Remote Access is configured with the policies shown in the exhibit:
The current configuration allows users to connect remotely after logging on. You want to limit remote connections to logon connections only. What should you do?
A. Delete the Require L2TP policy.
B. Configure the Logon required policy to grant access.
C. Move the Logon required policy to number one in the policy order.
D. Change the Allow access if dial-in permission is enabled policy to include the Logon requiredpolicy.
Answer: C
40. You are the administrator of a Windows 2000 Server computer named Intra. This server hosts an intranet Web site for you company. The marketing department stores marketing files in a shared folder on a separate file server. The NTFS permissions on the folder are shown in the File Permissions exhibit:
The marketing director wants to make the marketing files available to the rest of the company by means of the intranet. She wants company users to be able to read, but not modify, all of the files. You create a new virtual directory named Marketing under the intranet Web site folder on Intra. You configure the virtual directory as shown in the Virtual Directory Configuration exhibit.
Some users report that they are not able to access the marketing files from their Web browser. However, all users in the marketing department are able to access the files. You need to ensure that all company users are able to read the marketing files. What should you do?
A. Select Directory browsing check box on the Virtual Directory tab.
B. Copy the files from their location on the filer server to \\Intra\Marketing.
C. Modify the NTFS permissions on the file server to remove the entry for Marketing.
D. Modify the NTFS permissions on the file server to include an entry for Everyone: Read.
Answer: D
41. You install a new computer named Srv34.millertextiles.com on your Windows 2000 network. Part of your network is shown in network diagram. When you complete the installation of Srv34.millertextiles.com, you find that you cannot connect to Srv22.admin.millertextiles.com. You examine the TCP/IP configuration on Srv34.millertextiles.com and find no default gateway address. You want to connect from Srv34.millertextiles.com to Srv22.admin.millertextiles.com. Which default gateway address should you use? To Answer, click the appropriate IP address in the network diagram.
A.
Answer: A
42. Your domain includes numerous domain controllers. One of the domains controllers is malfunctioning, and a disk with the following ARC path is not responding:
multi(1)disk(0)rdisk(1)partition(1).
The nonresponsive disk needs to be replaced. Which disk should you replace?
To Answer: click the appropriate disk in the diagram.
A.
Answer: A
43. You install a new server application on your Windows 2000 Server computer. Response times fail to meet user specifications. You want to use the Processes page in Task Manager to find out whether the response time of new application would improve by the addition of one or more processors. Which two columns should you select to view? (Choose two.) To answer, click the two appropriate check boxes in the Select Columns dialog box. (Note: The default settings have been changed.)
A.
Answer: A
44. You are installing a new computer names Svr2.justtogs.com on your Windows 2000 network. Part of the network is shown in the exhibit.
You want to enter the appropriate TCP/IP addresses for the subnet mask and the default gateway for Svr2.justtogs.com. Which subnet mask and default gateway should you use? To answer, click the Select and Place button, and then drag the appropriate addresses to the appropriate boxes in the Internet Protocol (TCP/IP) Properties dialog box.
A.
Answer: A
45. You are the administrator of the A. Datum Corporation network shown in the exhibit.
You want to use a Virtual Private Network (VPN) so that 100 users in the Phoenix office can access resources in the Portland office. How should you configure the VPN server in the Portland office? To answer, click the Select And Place button, and then drag the appropriate value or values to the Address Range dialog box. Select and Place
A.
Answer: A
46. You want to delegate the backup and restore responsibilities of all servers to a new employee named Richard. Richard must not be able to shut down any servers or uninstall any driver files. You need to apply the appropriate permissions for Richard. What should you do?
A. Make Richard a member of the domain admins group.
B. Make Richard a member of the server operations group.
C. Make Richard a member of the backup operators group.
D. Grant Richard the user rights to backup and restore files on all computers in the domain.
E. Grant Richard read only permission to the volumes from which he needs to back up and restore files.
Answer: D
47. Your company recently hired you to administer its Windows 2000 network. The network includes 100 Windows 2000 Server computers. These servers are members of a Windows 2000 domain and are contained in an OU named servers. You discover that each Windows 2000 Server computer has local security auditing enabled and that each server is configured to audit different events. You want to standardize the events that are audited on the servers. You also want to ensure that auditing remains standardized even if the audit policy changes. What should you do?
A. Configure a local auditing policy on each domain controller.
B. Configure each server to implement a standardized auditing policy.
C. Configure the standardized auditing policy on all domain controllers in the domain.
D. Configure a local group policy object on each server in the servers OU.
E. Configure a group policy object, and apply it to the servers OU.
Answer: E
48. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized Hardware abstraction layer (HAL) to use with the computer. The customized HAL is on the floppy disk. You want to install the customized HAL designed for the computer. What should you do?
A. During the text mode portion of the Windows 2000 setup, install the customized HAL.
B. After the text mode portion of Windows 2000 setup is complete, use the Recovery Console to copy the customized HAL to the system32 folder on the boot partition, and then continue Windows 2000 Setup
C. After the text mode portion of windows 2000 setup is complete, use the emergency repair process to replace the existing HAL with the customized HAL, and then continue the windows 2000 setup.
D. After the Windows 2000 setup is complete, use device manager to scan for Hardware changes. When prompted, install the customized HAL.
Answer: A
49. You are the administrator of your company?s network. The company adds a new application to the network. This application reads and writes large image files to a server. Approximately 100 users use the application. When all 100 users use the application simultaneously, the application has a slower response time. More than 10,000 users are in the domain where the imaging server resides, but no other users are reporting network response problems. You need to find out the cause of the problem. What should you do in the System Monitor?
A. Log the Processor Queue Length counter for the System object.
B. Log the Avg. Disk Queue Length counter for the PhysicalDisk object.
C. Chart the Demand Zero Fault/sec counter for the Memory Object.
D. Chart the Pages/sec counter for the Memory object.
Answer: B
50. Your network includes Windows 2000 Professional client computers, Windows NT Workstation 4.0 client computers, Windows 95 client computers and UNIX client computers. Users of the Windows operating systems sent print jobs to shared printers on a Windows 2000 Server computer named PrintServ. The UNIX client computers support the LPR printing protocol. You want to make the shared printers on PrintServ available to the UNIX computers. What should you do?
A. Configure each of the printers to use an LPR port.
B. Install Microsoft print services for Unix on PrintServ.
C. Configure each of the printers to support TCP/IP printing.
D. Use the SRVANY utility from the Windows NT Resource Kit to run the LPR program as a service.
Answer: B
51. You are the administrator of a Windows 2000 Server network. Users report that they are unable to access shared folders on one of your servers. You open My computer on the server and do not find the volumes on dynamic Disk 3 that contain the shared folders. When you open Disk Management, you see that Disk 3 is offline. You confirm that the disk has power and it is attached to your SCSI adapter. Other disks connected to the adapter appear to be functioning normally. You want to use Disk Management to resolve the problem. What should you do next?
A. Rescan the disks on the server.
B. Reactivate disk 3.
C. Remove disk 3 by using disk administration, and restart the computer.
D. Convert disk 3 to a basic disk, and then convert it back to a dynamic disk.
Answer: B
52. Your Windows 2000 Server computer contains a 14-GB hard disk formatted as FAT32. This computer has been operating on your network for several months. You want to find out whether you need to defragment the disk to improve performance. What should you do first?
A. From a command prompt, convert the disk to NTFS and then run the Chkdsk command.
B. From disk management, format the disk as NTFS and then run the Chkdsk command.
C. Use disk Defragmenter to analyze the disk.
D. Use disk Defragmenter to defragment the disk.
Answer: C
53. You are the administrator of a Windows 2000 Server network consisting of 500 Windows 2000 Professional computers and 50 Windows 2000 Server computers. You configure two domains; litware.local and dev.litware.local. You enable auditing in the domain policy object for litware.local to audit the success and failure of object access. You install a printer on a domain controller named dc7.dev.litware.local. You configure auditing on this printer to observe successes and failures of printing by members of the Research universal group. When you view the security log for dc7.dev.litware.local computer one week later, you find that no events have been written to the log. However, you know that members of the research universal group used the printer during the past week. You want to log all successes and the failures of printing by this group for the printer on dc7.dev.litware.local. What should you do?
A. Enable auditing in the Domain Policy for dev.litware.local to audit the success and failure of object access.
B. Edit the domain policy object for litware.local to enable auditing of the success and failure of directory service access.
C. Configure auditing of successes and failures of object access in the default domain controller policy object in the domain controllers Organizational Unit of the dev.litware.local domain.
D. Configure auditing of successes and failures of the object access in the default domain controllers policy object in the domain controllers Organizational Unit of the litware.local domain.
Answer: A
54. Your network uses TCP/IP as the only protocol. Devices on the network are configured to use IP addresses from the private 10.0.0.0 range. All the client computers on the network use Windows 2000 Professional. The network includes Windows 2000 Servers and UNIX Servers. Users? print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to the print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX Servers. The UNIX computer uses LPR printing protocol, and its IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do?
A. Install Microsoft print services for Unix on PrintServ. Create a network printer on users? computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.
B. Install Microsoft print services for Unix on users? computers. Create a network printer on users? computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.
C. Create a network printer on PrintServ and specify that the printer name is \\10.1.1.99\GIANT. Share this printer and connect to it from users? computers.
D. Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect it from the users? computers.
Answer: C or D (please confirm it)
55. You want to upgrade a Windows NT Server 4.0 computer named Server34 to Windows 2000 Server. Server34 is a member server in a Windows 2000 domain named marketing.fabrikam.local. The domain runs in native mode. You want to change the role of Server34 from a member server to a domain controller in the same domain. What should you do? (Choose two)
A. Reinstall Windows NT 4.0 on Server34 in the same WINNT folder, and make Server34 a BDC in the marketing domain.
B. Use Server manager on Server34 and promote Server34 a PDC for the marketing domain.
C. Upgrade Server34 to Windows 2000 Server.
D. Run the Active Directory installation wizard to make Server34 a domain controller in the marketing.fabrikam.local domain.
E. Run the Active Directory installation wizard to convert Server34 to a domain controller in the marketing.fabrikam.local domain.
Answer: C, D
56. You Windows 2000 Server computer contains four hard disks of different sizes. Each hard disk is configured as a basic disk and has a single 5-GB partition. All four disks have the amount of unpartitioned space shown in the following table: Disk Unpartitioned Space
Disk 0 3-GB
Disk 1 4-GB
Disk 2 3-GB
Disk 3 8-GB
On each hard disk, you create a second partition that uses the remaining unpartitioned space on the disk. You create an 18-GB stripe volume that includes all four of the new partitions. Six months later, disk 1 fails. You replace it with a new hard disk, and create the necessary partitions. As quickly as possible, you need to retrieve the data that was contained on disk 1.
What should you do?
A. Restore the first partition on disk 1 from the most recent tape backup. Use disk management to repair and rebuild the stripe volume.
B. Delete and re-create the stripe volume. Restore the contents of disk 1 from the most recent tape backup.
C. Restore both partitions on disk1 from the most recent tape backup.
D. Delete and re-create the stripe volume. Restore the first partition on disk 1 and then stripe volume from a recent tape backup.
Answer: D
57. You are the administrator of a Windows 2000 domain and two Windows NT domains. The Windows 2000 domains trust each of the Windows NT the domains, and the Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use the highly secure domain controller security template. Users of computers in the Windows NT domains report that they cannot access DC1. You need to allow users of computers in the Windows NT domain to access resources on DC1.
What should you do?
A. Apply a less restrictive custom security template to DC1.
B. Apply a less restrictive custom system policy to the Windows NT domain controllers.
C. Ensure that the Windows 2000 domain is configured to run in mixed mode
D. Ensure that the Windows 2000 domain is configured to run in native mode.
Answer: A
58. You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computer so that whenever a new Microsoft driver becomes available, the branch offices are notified automatically when the administrator logs onto the server. What should you do?
A. Install the Windows 2000 Resource Kit.
B. Install Windows Critical Update Notification.
C. Configure system file Checker to notify the branch offices.
D. Configure Windows File Checker to notify the branch offices.
Answer: B
59. Your company has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each employee has a network of between five and 20 client computers. The office networks are not connected to any other network. The company is buying 50 identical computers to run Windows 2000 Server in these offices. These servers must be installed to company?s standard configuration. You create a setup information file (SIF) that specifies the company?s standard configuration. You want to automate the installation process as much as possible in the least possible amount of time. What should you do?
A. Use the Makebt32.exe to create four installation startup disks and add the SIF to the first disk. Instruct an employee at each office to start the installation by using these disks.
B. Create an MS-DOS boot disk that contains CD ROM drivers and the SIF and that runs the Winnt/S: D:\i386 command. Instruct an employee at each office to start the installation by using this disk.
C. Create a floppy disk that contains only the SIF. Instruct an employee at each office to start the installation by using the Windows 2000 Server CDROM, with the floppy disk inserted.
D. Create a Windows 2000 folder on a hard disk. Copy the Windows 2000 Server CD-ROM to the folder. Add the SIF to the folder. Copy the folder to a writable CD. Instruct an employee at each office to start the installation by using this CD.
Answer: C
60. You are the administrator of a Windows 2000 Server network. On each server, you format a separate system partition and a separate boot partition as NTFS. Several months later, you shut down one of the servers for the maintenance. When you try to restart the server, you receive the following error message ?NTLDR is missing. Press any key to restart?. You want to install a new NTLDR file on the server, but you do not want to lose any settings you made since the original installation. What should you do?
A. Start the computer by using Windows 2000 Server computer CD-ROM and choose to repair the installation.
B. Select the Recovery Console and copy the NTLDR file on the CD-ROM to the root of the system volume.
C. Start the computer by using Windows 2000 Server computer CD-ROM and choose to reinstall. When installation is complete, copy the NTLDR file to the root of the boot volume.
D. Start the computer by using a Windows 2000 bootable floppy disk. From the command prompt, run the sfc/scanboot command.
E. Start the computer by using a Windows 2000 bootable floppy disk. Run the File Signature Verification utility.
Answer: B
61. Litware Inc., has two offices named East and West. The Windows 2000 Server computer named east.litware.com is a domain controller in the East office, and the Windows 2000 Server computer named west.litware.com is a domain controller in the west office. Both offices create tape backups of server applications, data and System State data. The tapes are stored in the East office. You need to restore the System State data to west.litware.com. What should you do?
A. Run windows backup on east.litware.com, and restore the System State data to the systemroot folder on the west.litware.com.
B. Restart east.litware.com in directory services restore mode. Run windows backup on east.litware.com, and restore the System State data to the systemroot folder on west.litware.com.
C. Restart east.litware.com and west.litware.com in directory services restore mode. Run windows backup on east.litware.com, and restore the System State data to the systemroot folder on west.Litware.com.
D. Ship the west.litware.com backup tapes to the west office. Run windows backup on west.litware.com, and restore the System State data to the systemroot folder.
Answer: D
62. You are the administrator of a Windows 2000 Server network. You install COM + applications on two of your servers. You want to ensure that the component services class registration database is included in your normal system backups on these servers. What should you back up?
A. The Winnt\Registration folder.
B. The Winnt\System32\Com folders.
C. At least one file from each boot volume.
D. The System State data.
Answer: D
63. Your network contains Windows 2000 Professional client computers that use TCP/IP as the only network protocol. The network also contains Windows 3.1 computers that use the NetBEUI protocol. You install a new Windows 2000 Server computer on the network. You configure this server to use NetBEUI and TCP/IP. All of the Windows 2000 Professional client computers and Windows 3.1 computers are able to access the server. When you browse network resources on the server, you notice a delay before a list of servers is returned. What should you do to remove this delay?
A. In the Advanced settings for the network adapter, disable NetBEUI from Client for Microsoft networks.
B. In the Advanced settings for the network adapter, disable NetBEUI from file and printer sharing for Microsoft network.
C. In the properties of the network adapter, disable Client for Microsoft Networks.
D. In the Advanced settings for TCP/IP, enable NetBIOS over TCP/IP.
Answer: D
64. You are the administrator of a network that includes Windows NT server 4.0 computers, Windows NT workstation 4.0 computers, and UNIX computers. The network consists of a single Windows NT domain. You are upgrading a Windows NT server computer named Server1 to Windows 2000 Server. Server1 is a BDC in the domain. The existing DNS server is a UNIX computer that supports SRV (service) records and is configured to accept dynamic updates. The existing WINS server is another Windows NT server computer. You want to configure Server1 as a domain controller in a new Active Directory forest. You want the existing Windows NT domain accounts to be upgraded to Active Directory. You plan to upgrade the other domain controllers in the domain to Windows 2000 after the upgrade of Server1 is complete. You want to perform the upgrade of Server1 with the least possible impact on other computers on the network. What should you do?
A. Promote Server1 to the PDC of the domain. Run Windows 2000 Setup on Server1.
B. Run Windows 2000 Setup on Server1. At the end of Setup, configure server1 as a DNS server and a WINS server.
C. Add a static mapping for server1 on the WINS server. On the DNS server, create an SRV record for the LDAP service on server1. Run Windows 2000 Setup on server1.
D. Install the Microsoft DNS service on an existing Windows NT server. Apply Windows NT 4.0 service pack 4 or later to the server. Run Windows 2000 Setup on server1.
Answer: A or B (please confirm it)
65. You are the administrator for your company. Mike Nash is a member of the administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the Intranet Server, the administration group is placed in the security group, and the intern group is placed in the Nonsecurity group. The security group is then granted full control permission for sales virtual directory. Nate needs to update new sales information that is located on the sales virtual directory. What should you do so that Nate can perform that task?
A. Enable anonymous access for the Intranet Server.
B. Enable anonymous access for the sales virtual directory.
C. Remove Nate from the intern group.
D. Make Nate a member of the security group.
Answer: D
66. You are the administrator of a Windows 2000 Server computer at Blue sky Airlines. You configure a server named print10.marketing.blueskyairlines.local as a print server at the Los Angeles site. You create and share a variety of printers on the server for use by employees in the marketing blueskyairlines.local domain. You want to review the configured properties of all the shared printers on the print10.marketing.blueskyairlines.local. You want to perform this review from a Windows 2000 Professional computer at the London site of Blue sky Airlines. What should you do?
A. Use your web browser to connect to http://print10.marketing.blueskyairlines.local/printers.
B. Use your web browser to connect to http://print10.blueskyairlines.local/printers.
C. Run the net view\\print10 command.
D. Run the net view\\print 10.blueskyairlines.com command.
Answer: A
67. You use computers in two different offices. Your home folder is stored on a server named UserData01. You work with many files that are highly confidential. You keep the confidential files in a folder named Private in your home folder. You need to maximize the security of the private folder. You also want to be able to access the folder from the computers in each office. What should you do?
A. Obtain a signing and sealing certificate from a certificate server, and install the certificate on the computers you use.
B. Login in at UserData01as a domain administrator, connect to your home folder and set the encryption attribute.
C. Configure your account to have roaming user profile. Use the properties of the private folder to set the encryption attribute.
D. Add the cipher/e/s *.* command to your computer?s startup script.
Answer: C
68. You are the administrator of you company?s network. You are configuring the security policy for a group of users in the Finance organizational unit (OU). You need to configure the group policy so that future changes to the group policy will be applied within 15 minutes to any computers that are logged on to the network. What should you do?
A. Enable the background refresh setting to use the default group policy refresh rate.
B. Enable the asynchronous group policy application setting.
C. Enable and configure the group policy refresh interval for domain controllers.
D. Enable and configure the group policy refresh interval for computers.
Answer: D
69. You are the administrator of a Windows 2000 network. You upgrade 50 Windows NT Server 4.0 computers to Windows 2000 and place them in a single domain. The domain includes 300 member client computers, consisting of 200 Windows 2000 Professional computers and 100 Windows NT Workstation 4.0 computers. You implement group policy objects for each Organizational Unit. However, you find that these GPOs apply only to users of the Windows 2000 Professional computers. You want to restrict the users of the Windows NT Workstation computers from accessing registry editing tools. What should you do?
A. Create an OU that contains all Windows NT users and computers. Create a GPO in the OU that restricts users from accessing registry editing tools.
B. Create a Windows NT system policy file on Windows 2000 domain controller. Configure the policy so that it restricts default users from accessing registry editing tools.
C. Create a mandatory user profile for the Windows NT users that removes any shortcuts for registry editor and system policy editor from each user?s desktop.
D. Create a Windows NT system policy that restricts the default users from accessing registry editing tools. Save the system policy file to each user?s home folder.
Answer: B
70. You are a member of the backup operators group in the arborshoes.com domain. You are not a member of any other group in this domain. You are logged on to a Windows 2000 Server computer named bcksbr3.arborshoes.com You try to configure the software for a tape backup device, but the configuration fails during backup. The documentation for the tape backup device indicates that the current tape driver is out of date and must be updated to support the configuration. What should you do?
A. Run the runas command, supplying user name and password to start device manager. Then click the update driver command button on the driver tab for the tape backup device. Instruct the domain administrator to run the runas command, supplying the domain
B. administrator?s user name and password to start device manager. Then click the update driver command button on the driver tab for the tape backup device.
C. Open device manager, and then click the update driver command button on the driver tab for the tape backup device.
D. Run the add/remove hardware wizard. When prompted, select the Add/trouble shoot a device option.
Answer: B
71. Your Windows 2000 Server computer has two disks attached to an EIDE disk controller. You need additional disk space. You add a new SCSI disk controller that has six new disks attached. The new controller is not included on the current hardware compatibility list (HCL). When you restart the computer, Windows 2000 does not detect the new controller. What can you do to install the new controller? (Choose two)A. Use device manager to turn off IRQ steering in the properties of the standard PC. Then restart the computer.
B. Use the Add/remove hardware wizard to add a new SCSI and RAID controller from the disk supplied by the manufacturer.
C. Use disk management to rescan the disks.
D. Use the manufacturer?s setup program to install the driver for the SCSI disk controller.
E. Use disk management to restore the basic configuration. Then restart the computer.
Answer: B, D
72. You install a new modem in your Windows 2000 Server computer. When you restart the computer, Windows 2000 detects the modem and installs the default driver. Occasionally the modem stops communicating with your internet service provider and then only way to reactivate the modem is to restart the computer. You download an updated driver for the modem from the manufacturer?s web site and save it in your WINNT folder. You want to install the new driver. What should you do?
A. In the property sheet for the modem in device manager, click the update driver command button.
B. Use device manager to scan for hardware changes.
C. Use device manager to delete the modem, and then restart the computer.
D. Move the new driver to the \WINNT\driver Cache folder, and then restart the computer.
Answer: A
73. You need to measure physical disk performance counters on your Windows 2000 Server computer. You want to run system monitor locally on the server. You also want to ensure that system monitor has the least impact on other processes currently running. What can you do? (Choose two)
A. From the command prompt, run the start/min perfmon command.
B. From a command prompt, run the start/low perfmon command.
C. From a command prompt, run the start/normal perfmon command.
D. Open system monitor and then use task manager to set the priority of the Mmc.exe process to low.
E. Open system monitor, and then use task manager to set the priority of Mmc.exe process to normal.
Answer: B, D
74. A Windows 2000 Server computer named server2 runs numerous 32-bit applications and two 16-bit applications. Users start the 16-bit applications by running app1.exe for one application and app2.exe for the other application. The 16-bit applications are configured to run in the separate memory spaces. You want to create a performance baseline chart in the system monitor for all the applications on server2. You add all of the 32-bit applications, and now you want to add two 16-bit applications. What should you do?
A. Add the app1 and app2 instances to the %Processor Time counter for the Process object.
B. Add the ntvdm, app1 and app2 instances for the %Processor Time counter for the process object.
C. Add only the ntvdm instance of the %Processor Time counter for the Process object.
D. Add the ntvdm and ntvdm#2 instances of the %Processor Time counter for the process object.
Answer: D
75. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted as FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuously for nine months, users report that the server does not retrieve files from the shared folders as fast as you first installed the server. What should you do to resolve the problem?
A. Convert the disk that contains the shared folder to a dynamic disk.
B. Convert the partition that contains the shared folders to NTFS.
C. Defragment the disk that contains the shared folder.
D. Move the paging file to the partition that contains the shared folder.
Answer: C
76. Every afternoon, you run Microsoft Excel locally on your Windows 2000 Server computer to update a performance spreadsheet. Users report that, during this time, the server?s response to file requests appears to slow down. What should you do to resolve the problem?
A. Use task manager to set the priority for csrss.exe process to AboveNormal.
B. Use task manager to set the priority for Excel.exe process to Low.
C. Run the Start/normal csrss.exe command, before you start the Excel.
D. Run the Start/normal Excel.exe command to start Excel.
Answer: B
77. Your network has two domains with approximately 1,000 users in each domain. Both domains are Active Directory domains that run in native mode. Some of the users have portable computers and access the network by using remote access. The managers at your company are concerned that remote access might pose a security risk. They want to see a list that shows which users are allowed to use remote access. How should you configure the remote access to display a list of authorized users?
A. Create a group named RAS_USERS. Add users who are permitted to dial in to the network. Create a remote access policy that allows only this group to use the remote access server. To show who has access to the remote access server, display the members of the group.
B. Create a group named RAS_USERS. Add users who are allowed to dial in to the network. Set the remote access permission for this group to allow access. To show who has access to the remote access server, display the members of the group.
C. Write a script for the windows scripting host. In the script, iterate through the members of the users container. Display the name of any user who has the remote access permission set to Allow access.
D. Use the default remote access policy to view users and groups who have been granted remote access permission.
Answer: A
78. Your company has a routing and remote access server at its main office. One of the company?s branch offices also runs routing and remote access on a server that has one modem. The server is configured to use demand-dial routing to connect to the main office. The server is part of company?s Active Directory domain. The company runs in native mode. Some employees at this branch office use the branch office server to access their files from home. The manager of the branch office reports that sometimes none of the users in the office can connect to the main office. When you examine the event log on the branch office server, you find that users have been connecting to the server during working hours. The manager wants users to be able to dial in to the server only between 6:00 P.M and 8:00 A.M. However, the manager still wants users to be able to log on at any time when connected directly to the LAN. What should you do to limit only dial-in access to these times?
A. Change the logon hours for users? accounts to deny logons between 8:00 A.M and 6:00 P.M.
B. Set the remote access policy to deny connections between 8:00 A.M and 6:00 P.M.
C. Create one batch file to start remote access connection manager service, and create another batch file to stop it. Schedule the stop batch file to run at 8:00a.m every day and start batch file to run at 6:00 P.M every day.
D. Create two user accounts, for each user. Grant dial-in permissions to one account, and deny dial-in permissions to the second account. Change the logon hours for the dial-in accounts to deny logon between 8:00 A.M to 6:00 P.M.
Answer: B
79. You are the administrator of a Windows 2000 Server computer. The computer has a spanned volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly back up the spanned volume by using windows backup. One of the disks fails. You replace the disk with a new, unpartitioned disk. You want to recover the spanned volume and its data as soon as possible. What should you do?
A. Extend the spanned volume to include the new disk. Rescan the disks.
B. Extend the spanned volume to include the new disk. Shut down and restart the server. Use windows backup to restore the data.
C. Rescan the disks. Format the spanned volume. Use windows backup to restore the data.
D. Rescan the disks. Extend the spanned volume to include the new disk. Shut down and restart the server. Use windows backup to restore the new data.
E. Rescan the disks. Remove the spanned volume and create a new spanned volume that includes the new disk. Format the spanned volume. Use Windows back up to restore the data.
Answer: E
80. You are the administrator of two Windows 2000 Server computers: Server1 and Server2. Server1 has a spanned volume that consists of areas on three physical hard disks. The three disks support hot swapping, and three hot swappable disk bays are available on server2. The drive letter that the spanned volume on server1 uses is not currently in use on server2. You want to move the three disks to Server2. You want the spanned volume to use the same drive letter on Server2 that is used originally on server1. You want to minimize the impact of your actions on the performance and availability of the two servers. You backup the spanned volume. What should you do next?
A. Move the disk from server1 to server2. On the server1, rescan the disks. On the server2, rescan the disks.
B. Shut down both servers. Move the disks from server1 to server2. Restart both computers. On server2, rescan both disks.
C. Shut down server1. Move the disks from server1 to server2. Restart server1. On server2, restore the spanned volume by using Windows backup.
D. Move the disks from server1 to server2. On server2, create a new spanned volume and format the volume. Restore the spanned volume by using Windows backup.
Answer: D
81. You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the Systemroot\Temp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?
A. On the second partition, create a shared folder named Temp.
B. In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk.
C. Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new partition.
D. Add a second hard disk. Delete the contents of the Systemroot\Temp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the Systemroot\Temp folder.
Answer: D
82. You are the administrator of Windows 2000 Server computer. Volume D is formatted as NTFS. Volume D contains folders that are shared by departments within your company. You want to limit the amount of disk space that the shared folders can store. A user named Richard has stored 10GB of files in the shared folders. Richard?s files are using more disk space on the shared folders than any other user?s files. You enable disk quotas on Volume D and create a default quota entry. You set the quota limit to 1.1 GB and select the Deny disk space to users exceeding quota limit check box. When Richard attempts to encrypt the files in his home folder using the encrypted file system he receives the following error messages: "There is insufficient disk space to complete the operation". You need to allow Richard to encrypted the files in his home folder. You also need to maintain the space restrictions. Which three actions must you have? (Choose three)
A. Create a quota entry for Richard, and select the Do not limit disk space check box.
B. Instruct Richard to encrypt the files in his home folder.
C. Run the Cipher.exe/d command
D. Enable the compression attribute on Richard?s home folder.
E. Set the Richard?s quota limit to equal the amount of disk space used by the files in his home directory.
F. Set the default quota entry on volume D to 12GB, and clear the Deny disk space too users exceeding quota limit check box.
Answer: A, B, E
83. You run and install a third-party 32-bit application name Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent. You end the application. However, you see that the CPU usage on the server is still at 100 percent. Task manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?
A. Use Computer Management to stop and restart the server service.
B. Use Computer Management to stop and restart the workstation service.
C. Use task manager to end any related child processes.
D. Use task manager to end and automatically restart the Explorer.exe process.
Answer: C
84. You are the administrator of a Windows 2000 Server computer. The Server has a single hard disk with a single NTFS partition. You use a third-party tool to add a new partition to the disk. When you restart the server, you receive the following error message: ?Windows 2000 could not start because the following file is missing or corrupt: \System32\ntoskrnl.exe. Please re-install a copy of the above file?. What should you do to resolve the problem?
A. Start the computer by using the Recovery Console. Run system file checker.
B. Start the computer by using the Recovery Console. Modify the partition parameter in the operating system path in C:\Boot.ini.
C. Start the emergency repair process. Choose the option to repair system files.
D. Start the computer in safe mode with command prompt. Modify the partition parameter in the operating system path in C:\Boot.ini.
Answer: B
85. Your company has a human resource (HR) manager named Sean Chai. He keeps your company?s confidential HR files in a shared folder. To increase the security of the HR files, Sean set the folder to encrypt the files. Sean leaves the company without resetting the permissions and encryption settings for the HR files. The files must be made accessible to the new HR manager. Which two actions should you take to allow this access? (Choose Two)
A. Select the file permissions on the HR files to allow access to the new manager.
B. Back up the shared folder to tape and restore the files to a different folder.
C. Log on as an administrator and remove the encryption attribute from the HR files.
D. Log on the new manager, connect to the shared folder, and run the cipher/e/s*.* command.
E. Configure the new manager?s account to be an Encrypted Date Recovery Agent for Sean?s account.
Answer: A, C
86. You install a second modem on a Windows 2000 Server computer configured with routing and remote access. Dial-in routers report that they are unable to connect to the server by using this new modem. What can you do to help find out the cause of the problem? (Choose three)
A. Use the diagnostics tab in Phone and Modem Options in control panel to query the modem.
B. Use device manager to identify any port resource conflicts.
C. Use the routing and remote access snap-in to find out whether the ports for both modems are operational.
D. Use the Regedit32 to view the Error control value in the From the command prompt, run the Net Config Server command.
E. From the command prompt, run the Net statistics command.
F. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess key.
Answer: A, B, C
87. You are the administrator of a Windows 2000 Active Directory network. Your network contains two organizational units named Boston and Los Angeles. Each of these OUs contains subordinates OUs named Corp, Finance and Consulting. You suspect that someone is trying to log on to your domain by guessing user account names and passwords. You want to find out which computer is being used for these logon attempts. What should you do?
A. Edit the default Domain Controller?s policy object to audit directory service access failures.
B. Edit the default domain policy object to audit account logon failures.
C. Edit the Boston OU and Los Angeles OU group policy objects (GPOs) to audit logon failures.
D. Edit the Group Policy Object of each subordinate OU to audit directory service access failures.
Answer: B
88. Your network contains NetWare 4.0 Servers. You have successfully installed client service for NetWare on Windows 2000 Professional computer, and gateway service for NetWare on Windows 2000 Server computer. You recently added a new Windows 2000 Server computer to the network and installed gateway service for the NetWare on it. However, the server is unable to connect to any NetWare servers. What should you do on new Windows 2000 Server computer to resolve this problem?
A. Enable NWLink NetBIOS.
B. Configure NWLink IPX/SPX/NetBIOS compatible transport protocol to use the correct Ethernet frame type.
C. Install RIP routing for IPX.
D. Install the SAP agent.
Answer: B
89. You enable disk quotas on volume D on the server. You configure a disk quota 10 GB for each user. You select the Deny disk space to users exceeding quota limit check box. A user named Bruno reports that he cannot save a Microsoft Windows 2000 document to a shared folder used by his department. You need to ensure that users can always save more than 10 GB to their home directories. What should you do?
A. Clear the deny disk space to users exceeding quota limit check box in the quota configuration for volume D.
B. Log on to the server as administrator, and take ownership of all files in the group-shared folders
C. Create a new volume on the server. Move the group-shared folders to the new volume
D. Increase the quota limit on volume D to permit extra space for shared files
Answer: A
90. You install Windows 2000 Server on a computer that contains two 8-GB hard disks. Each disk is partitioned as a single primary partition and is formatted as FAT32. During the installation, you convert the second disk to NTFS. You install the system files on the second disk. You create a shared folder on both disks. To conserve disk space, you compress the shared folders on the second disk. When users move compressed files from a shared folder on the second disk to shared folders on the first disk, the files lose their compression attributes. You want to ensure that all files moved from the folders on the second disk to the shared folders on the first disk will be compressed. Which two actions should you take? (Choose two)
A. Format the first disk as NTFS.
B. Convert the first disk to NTFS.
C. Convert the both disks to dynamic disks.
D. Convert first disk to a dynamic disk.
E. Compress the shared folders on the first disk.
Answer: B, E
91. You plan to install Windows 2000 Server on 10 new computers. These servers will provide file and print services in branch offices of your company. The company wants each branch office to purchase its own copy of Windows 2000 Server, and the installation in each branch office should use the serial number associated with the branch office?s own copy. You want to install, configure, and test Windows 2000 Server on these computers at the main office before shipping the computers to the branch offices. You want users in the branch office to enter the computer names and serial numbers when they receive the computers. What should you do?
A. Install Windows 2000 Server computer on the computers by using an unattend.txt file, and then use the registry editor to remove the computer name and license details.
B. Start the installation process from an MS-DOS boot disk. Install Windows 2000 Server on the computers from an existing server by running the Winnt command with the /PreInst switch.
C. Install Windows 2000 Server on the computers, and then use setup manager to create a sysprep.inf file for sysprep.exe. Place the sysprep.inf file on the computers and run the sysprep-nosidgen command.
D. Create an unattend.txt file by using setup manager. Include the following line in the unattend.txt file. OemPrenistall=YES. Use this file to perform the installation.
Answer: C
92. Q45. You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration.
What should you do?
A. Restart the computer in safe mode. Then restart the computer again.
B. Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command.
C. Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command.
D. Restart the computer by using the last known good configuration.
Answer: D
93. You plan to install Windows 2000 Server on 10 new computers on your company?s network. These servers will provide file and print services to the departments within the company. The computers have identical hardware and software configuration. You want to use a centralized copy of the Windows 2000 installation files, which are stored on an existing Windows 2000 computer. Which three actions should you take to install Windows 2000 Server on the new computers? (Choose Three)
A. Create a set of installation boot disks by using Makeboot.exe.
B. Create an MS-DOS network boot disk.
C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of new computers.
D. Create a UDF file by using setup manager. Create an unattend.txt file that identifies names of the new computers.
E. Begin the installation by running the Winnt command with the /S, /U, and /udf switches.
F. Begin the installation by running the Winnt32 command with the /s, /unattended, and /udf switches.
Answer: B, C, E
94. Your Windows 2000 Server computer has a 10-GB hard disk with two partitions; Drive C and drive D. Windows 2000 Server is installed on Drive D. Both partitions are formatted as NTFS. Your office experiences a power failure that causes your Windows 2000 Server computer to restart. When the computer is restarting, you receive the following error message: ?NTLDR is missing. Press any key to restart?. What should you do?
A. Start the computer by using Windows 2000 Server computer CD-ROM and choose to repair the installation. Select the Recovery Console and copy the NTLDR file on the CD-ROM to the root of the system partition.
B. Start the computer in debugging mode. Copy the NTLDR file on the CD-ROM to the root of the system partition.
C. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt, run the sfc/scanboot command.
D. Start the computer by using a Windows 2000 bootable floppy disk. Run the File Signature Verification utility.
Answer: A
95. You are installing Windows 2000 Server on a new computer by using the Windows 2000 Server CD-ROM. The computer has three 100-GB hard disks, Disk 0, Disk 1 and Disk 2. The disks do not have any partitions defined. You want to use as much place on the Disk 0 as possible for the partition on which Windows 2000 Server is installed. You want as much disk space as possible across the three disks to be accessible by using a single drive letter in Windows 2000. What should you do?
A. Install Windows 2000 Server on a 4-GB FAT partition on the Disk 0. After setup is complete, create a 96-GB NTFS partition on the Disk 0. Create a volume set that combines the 96-GB NTFS partition with the two remaining 100-GB disks.
B. Install Windows 2000 Server on a 4-GB NTFS partition on the Disk 0. After setup is complete, configure the three disks as the dynamic disks. Create a volume set from the three 100-GB disks.
C. Install Windows 2000 Server on a 100-GB NTFS partition on the Disk 0. After setup is complete, create a volume set that combines the three 100-GB disks.
D. Install Windows 2000 Server on a 100-GB NTFS partition on Disk 0. After setup is complete, create a 100-GB partition on Disk 1 and a 100-GB partition on Disk 2. Mount the partitions on Disk 1 and Disk 2 as subdirectories on the 100-GB partition on Disk 0.
Answer: D
96. You want to upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The system partition uses the FAT file system. You start the setup program by starting the computer from the Windows 2000 Server CD-ROM. However, you receive the following error message: ?You chose to install Windows 2000 on a partition that contains another operating system. Installing Windows 2000 on this partition might cause the operating system to function improperly?. You are unable to perform the upgrade. What should you do to resolve the problem?
A. Convert the system partition to NTFS.
B. Disable Advanced Configuration and Power Interface (ACPI) support for the computer.
C. Restart the computer, and then run Winnt32.exe from the Windows NT server 4.0 environment.
D. Remove the Windows 2000 Server CD-ROM and restart the computer by using the setup floppy disks.
Answer: C
97. Your Windows 2000 Server computer uses a SCSI adapter that is not included on the current hardware compatibility List. You install an updated driver for the SCSI adapter. When you start the computer, you receive the following STOP error: ?INACCESSIBLE_BOOT_DEVICE.? What two procedures can you use to resolve the problem? (Choose two)
A. Start the computer in safe mode. Reinstall the old driver for the SCSI adapter.
B. Start the computer by using a Windows 2000 bootable floppy disk. Reinstall the old driver for the SCSI adapter.
C. Start the computer by using the Windows 2000 Server CD-ROM. Perform an emergency repair. Reinstall the old driver for the SCSI adapter.
D. Start the computer by using the Recovery Console. Run system file checker. Restart the computer. Reinstall the old driver for the SCSI adapter.
E. Start the computer by using the Recovery Console. Copy the old driver for the SCSI adapter to the system volume and to C:\Ntbootdd.sys Reinstall the computer
Answer: C, E
98. You are the administrator for your company. Your Windows 2000 Server computer contains two 23GB hard disks. Each disk is configured as a basic disk and has a single 23GB NTFS partition. Both partitions are backed up to tape every night. The partition on Disk1 stores user data. Most users of your company encrypt their files. Disk1 fails. You replace it with a new disk. You need to recover the data as quickly as possible while maintaining the security of the files. What should you do?
A. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Run the cipher /d /i command.
B. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Instruct the users to verify the integrity of their files.
C. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Logon to the server console as a recovery agent. Copy the files from the second file server to the new partition.
D. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Instruct users to copy their files from the second file server to the new partition.
Answer: B
99. You configure one of your Windows 2000 Server computers as a print server. You install a second Plug and Play network adapter on the server to improve network adapter uses IRQ11. The second adapter uses IRQ5. The server is now unable to print to the print device connected to the non-Plug and Play LPT2 port adapter. You want to continue to use print devices installed on Plug and Play LPT1 and non-Plug and Play LPT2. What should you do?
A. Use device manager to change the IRQ for LPT1 to IRQ10.
B. Use device manager to change the IRQ for LPT2 to IRQ7.
C. Edit the CMOS settings on the server to reserve IRQ7 for non-Plug and Play devices.
D. Edit the CMOS settings on the server to reserve IRQ5 for non-Plug and Play devices.
Answer: D
100. You are the network administrator for your company. You configure a shared printer on a Windows 2000 Server computer. The printer connects to a Hewlett Packard JetDirect print device that uses DLC. This print device is on the same network segment as the server. Six months later, you relocate the print device to a different network segment. Users report that they are able to send print jobs to the printer but that their print jobs no longer print. You need to ensure that the printer and the print device are working properly. What should you do?
A. Configure the JetDirect print device to use DHCP.
B. Uninstall and reinstall the DLC protocol from the server.
C. Configure the printer and the JetDirect print device to use LPR printing protocol.
D. Delete the printer. Re-create the printer by using DLC to connect to the JetDirect print device.
Answer: D
101. You are the administrator of a Windows 2000 Server computer. You add a new hard disk to the computer and configure it as a basic disk. You create a single NTFS partition that uses all of the space on the disk. You assign the drive letter G to the new partition You share drive G as DataFiles and assign the default share permissions to the drive. You want to create several folders in the root of drive G. You plan to use these folders to store network users? files. You want to prevent users from creating additional folders in the root of drive G. You also want to allow users to create subfolders under the folders that you have already created. You want to configure the NTFS security permissions for the drive G folders in the minimum amount of time. What should you do?
A. Create your folders in the root of drive G. Configure the permissions on these folders to block permission inheritance.
B. Create your folders in the root of drive G. Modify the permissions on the folders to allow users to create subfolders. Configure the permissions on these folders to block permission inheritance.
C. Create your folders in the root of drive G. Configure the permissions on these folders to block permission inheritance. Modify the permissions on the root of drive G to prevent users from creating folders on the root.
D. Modify the permissions on the root of drive G to prevent users from creating folders on the root. Create your folders in the root of drive G. Configure the permissions on these folders to block permission inheritance.
Answer: C
102. Your Windows 2000 domain contains a Windows 2000 member server named server1. Server1 has routing and remote access for Windows 2000 enabled. Server1 is also configured to use a modem bank to accept incoming dial-up attempts. You need to configure server1 so that users can connect to it from their home computers. You want to restrict access to the network to only users who can access the network at speeds faster than 64 Kbps. You also must ensure that the users connect by using mutual authentication. Which three actions should you take? (Choose Three)
A. Configure the authentication provider to be RADIUS server.
B. Configure the authentication provider to be Windows Authentication.
C. Specify IDSL as the dial-in media.
D. Specify Async as the dial-in media.
E. Configure support for EAP.
F. Configure support for MS-CHAP
G. Configure support for MS-CHAP version 2.
Answer: B, C, G
103. You are the administrator of a Windows NT 4.0 Terminal server edition computer. The server has one hard disk, which is divided into two partitions The first partition contains the Windows NT 4.0 system files and is formatted as FAT. The second partition contains application data and user data. This second partition is formatted as NTFS. The server currently has Service Pack 3 installed. You need to upgrade the server to Windows 2000 Server. You want to ensure that no application data or user data is lost during the upgrade. You also want to perform the minimum number of steps necessary to complete the upgrade. What should you do? (Choose all that apply)
A. Convert the system partition to NTFS.
B. Install service pack4 or later on the server.
C. Use a Windows 2000 Server CD to start the server. In setup, select the option to upgrade.
D. Replace the Terminal Server installation with a standard Windows NT server 4.0 installation.
Answer: A, B, C or B (please confirm it)
104. You are a network administrator for Fabrikam Inc. Fabrikam Inc has three offices. The network consists of one native mode Windows 2000 domain. All servers are Windows 2000 Professional computers. The network is connected by a Frame Relay connection. You install a third-party network management suite of applications on a server named Mon1. You need to ensure that this new software will be able to interact with and manage the existing devices on your network. What should you do?
A. Install SNMP on Mon1.
B. Install SNMP on all computers except Mon1.
C. Configure the SNMP service option in the TCP/IP installation properties on Mon1.
D. Configure the SNMP server option in the TCP/IP installation properties on all computers except Mon1.
Answer: A
105. You are the network administrator at Awesome computers, a hardware manufacturing firm. You are deploying 20 new Windows 2000 Server computers in the software development department. The software testers will use these servers for testing. Each tester is a member of the Power Users group. Each tester must be able to install new hardware and device drivers on these servers. You want the testers to be able to test custom applications that install drivers without interruption. You install Windows 2000 Server on one computer so that you can prepare a system image for the deployment. You must configure this system image to meet the needs of the software testers. What should you do?
A. For the Power Users group, apply the right to load and unload device drivers.
B. For the domain users group, apply the right to load and unload device drivers.
C. Configure the driver signing options to install all files, regardless of file signature. Configure the setting to be a system default.
D. Configure the driver signing options to install all files, regardless of file signature. Configure the setting not to be a system default.
Answer: A
106. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produces by the web sites. You notice that all data from 7:00 P.M to midnight each night is included in the following day?s log file. You want all data to be included in the correct day?s log file. What should you do?
A. Ensure that the log type is set to W3C.
B. Change the log rollover property in the web site logging properties.
C. Change the time zone setting in the time properties on the web server.
D. Configure the time server service o the web server to use the LocalSystem account.
Answer: B
107. You are the administrator of a Windows 2000 Server computer. The computer is configured to have a single 18-GB drive, which contains the operating system files. This drive also contains a shared folder where five network users store their Microsoft Excel files. You want to prevent each network user from using more than 1GB of space in the shared folder. Which action or actions should you take to achieve this goal? (Choose all that apply)
A. Create a quota entry for Everyone account. Set the quota limit to 1 GB.
B. Enable disk quotas on the volume.
C. Set the default disk quota limit to 1 GB.
D. Select the Deny disk space to users exceeding quota limit check box.
E. Upgrade the disk to a dynamic disk.
Answer: B, C, D
108. You upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The computer has two hard disks. The system and boot partitions are located on two primary partitions on Disk 0. Both partitions are mirrored on Disk 1. One month later, Disk 1 fails. You replace the disk with a disk taken from another Windows 2000 computer. When you try to repair the fault-tolerant volumes by using Disk Management, you find that the Repair Volume option is unavailable. You want to repair the mirror set. What can you do? (Choose two.)
A. Delete all volumes on Disk 1. Change Disk 1 back to a basic disk. Repair the fault-tolerant volumes on Disk 0.
B. Create two new volumes on Disk 1. Copy all the data from the two disk partitions on Disk 0 to the two volumes on Disk 1.
C. Break the mirror set. Convert Disk 0 to a dynamic disk. Create a mirror on Disk 1.
D. Create a single volume on Disk 1. Copy all the data from Disk 0 to the single volume. Convert Disk 0 to a dynamic disk.
E. Restart the computer by using the Windows 2000 Server CD-ROM and choose to repair the installation
Answer: A, C
109. You install a second modem on a Windows 2000 Server computer configured with routing and remote access. Dial-in users report that they are unable to connect to the server by using the new modem. What should you do to help find out the cause of the problem?
A. Use the routing and remote access snap-in to find out whether the ports for both modems are operational.
B. Use Regedt32 to view the error Control value in the From a command prompt, run the Net Config Server command.
C. From a command prompt, run the Net Statistics command.
D. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess key.
Answer: A
110. Your network contains Windows 2000 Server computers and NetWare server computers. The NetWare client computers on your network use only the IPX/SPX transport protocol. You install a database server on a Windows 2000 Server computer named DB_serv. This server has the NWLink IPX/SPX/NetBIOS compatible transport protocol, TCP/IP and the NetBEUI protocol installed. NWLink uses the 802.2 frame type and a network number of 77. In addition, client for Microsoft networks and file and printer sharing for Microsoft networks are installed on DB_serv. The NetWare client computers that are on the same subnet as DB_serv can connect to DB_serv and the database stored on it. However, the NetWare client computers that are on the other subnets cannot connect to DB_serv. What should you do to allow the NetWare client computers on the other subnets to connect to the DB_serv?
A. Install gateway service for NetWare on DB_serv.
B. Install the SAP Agent on DB_serv.
C. Configure the NetWare client computers on the other subnets to use NetBEUI.
D. Configure IPX/SPX on the NetWare client computers on the other subnets to use a network number of 77.
Answer: D
111. You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the exhibit.
You configure the Local Security Options and other settings for the default domain policy object. You delegate administration of the Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured. What should you do?
A. From the group policy options for the contoso.local domains, set the option not to override.
B. From the group policy options for the Michigan and Florida OUs, set the option not to override.
C. Block the group policy inheritance for the contoso.local domain.
D. Block the group policy inheritance in the Michigan and Florida OUs.
Answer: A
112. Your network contains Windows 2000 Professional client computers that use TCP/IP as the only network protocol. The network also contains Windows 3.1 computers that use the NetBEUI protocol. You install a new Windows 2000 Server computer on the network. You configure this server to use NetBEUI and TCP/IP. The Windows 3.1 computers can connect to the new server and use resources located on it. However the Windows 2000 Professional client computers cannot access the new server. When you run the ipconfig command on the new server, it returns the information shown in the exhibit.
You want to allow the Windows 2000 Professional client computers to connect to the servers. What should you do?
A. Ensure that the server is configured to connect to a Dynamic DNS server that is authoritative for the domain.
B. Ensure that the server is able to communicate with a DHCP server that has valid addresses for the network.
C. Ensure that NetBIOS over TCP/IP in enabled in the Advanced settings for TCP/IP.
D. Ensure that a valid WINS address is configured in the Advanced settings for TCP/IP.
Answer: B
113. You are the administrator of the Windows 2000 Server network shown in the exhibit.
Users in the research group and the executives have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local Intranet server. The users who do not access the Internet do not have user accounts on proxy server and, therefore, cannot connect to the Intranet server. You want all users to be able to connect to the Intranet server without entering a separate user name and password. What should you do?
A. Move the Intranet server to the client segment of the network.
B. Move the proxy server to the server segment of the network.
C. Configure each client computer to bypass server for local address.
D. Configure each client computer to use Port 81 for the proxy Server.
Answer: C
114. You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional Client computer can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit.
You want the printer driver to install automatically on the Windows NT Workstation computers. What should you do?
A. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folders on all Windows NT Server 4.0 computers still configured as BDCs.
B. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folders on the PDC emulator.
C. Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000.
D. Copy the Windows NT 4.0 printer drivers to the Winnt\System32\printers\drivers folder on the Windows 2000 print Server.
Answer: C
115. Your network consists of numerous domains within a LAN, plus one remote location that is configured as another domain within the tree. Each domain contains several organizational units. The remote domain is connected to the main office network by using 56-Kbps connection, as shown in the Exhibit.
The remote location is running a previous service pack for Windows 2000, and the LAN is running the most recent service pack. You want to configure a group policy for the remote locations so that users can repair a problem with a service pack system file. You also want to reduce the traffic on the LAN and ease administration of the group policies. You want to retain the domain administrator?s access to the group policy configuration. What should you do?
A. Configure a group policy for each OU in the west.litware.com domain. Configure a service pack software package for each group policy.
B. Configure a group policy for each OU in the litware.com domain. Configure a service pack software package for each group policy.
C. Configure a group policy for west.litware.com domain. Configure a service pack software package for the group policy.
D. Configure a group policy for the litware.com domain. Configure a service pack software package for the group policy.
Answer: C
116. You share a folder on a Windows 2000 Server computer for users in your company's London office. You place several subfolders in the London folder as shown in the exhibit.
The Marketing-2 folder is compressed. You want to remove some files from the Research folder into Marketing-2, and you want to make sure that the files are compressed when you move them. However, you do not want to compress the remaining files in Research. What should you do?
A. Move each of the files from Research to Marketing-2.
B. Copy the files from Research to Marketing-2, and then delete the original files.
C. Compress Research, and apply changes to the folder only, and then move the files from Research to Marketing-2.
D. Encrypt Marketing-2, move the files from Research to Marketing-2, and then decrypt Marketing-
Answer: B
117. You are the administrator of the contoso.local domain. You organize the domain into organizational units (OUs) as shown in the Exhibit.
You configure the Local Security Options and other settings for the Default Domain Policy object. You enable a local security option policy to display a logon message each time a user attempts to log on. Suzan Fine, the administrator of the Florida OU, wants to configure a different logon message for the Orlando OU without changing the other Local Security Options. What should Susan do?
A. Create a new group policy object (GPO) in the Orlando OU with the appropriate logon message. Block policy inheritance for the new GPO.
B. Create a new Group Policy Object in the Florida OU with the appropriate logon message. Set the option not to override the new GPO.
C. Create a new Group Policy Object in the Orlando OU with the appropriate logon message. Enable policy inheritance for the new GPO.
D. Create two new group policy objects in the Miami and Orlando OUs. Configure the GPO for the Orlando OU with the appropriate logon message for the Orlando OU. Place the GPO for the Orlando OU at the top of the policy list.
Answer: C
118. You are the administrator of the intranet at Blue Sky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines as an intranet server. This server holds the multiple departmental and resource web links to the network and databases. You configure a ticketing web site. You also configure finance virtual directory in the departments website, as shown in the exhibit.
During the first morning at the server is available, users report that the only information they are seeing in their browser is a list of .htm and .asp files. For security reasons, the first action you need to take is to disable the user?s ability to view files of all web sites in the form of a list. What should you do?
A. Clear the directory browsing check box for the Ticketing web site, and then apply the setting to the child virtual directories.
B. Clear the directory browsing check box for the Departments web site, and then apply the setting to the child virtual directory.
C. Clear the directory browsing check box for the server properties, and then apply the setting
D. Clear the directory browsing check box for the Financing virtual directory. to the child web sites.
Answer: A
119. You are the administrator of homeoffice.local domain. You want to create a shared printer for the company?s executives so that they do not have to wait for their documents to print when the default printer?s queue contains a large number of documents. You configure the new high-priority Printer and want to set permissions for the groups shown in the exhibit. Note: The default settings have been cleared.
You select the check box to allow print permission for the executives group. You want only the administrators, print operators, server operators, and executives group to be able to print to the printer. What can you do?
A. Remove the Everyone group.
B. Select the check box to deny print permission for the Everyone group.
C. Select the check box to deny manage documents permission for everyone group.
D. Select all deny check boxes for the Everyone group.
E. Clear all check boxes for Everyone group.
Answer: A, E
120. You are the administrator of a windows 2000 Active Directory network. The network consists of a single domain named adatum.local that runs in native mode. The domain includes 500 member client computers, consisting of 200 Windows 2000 Professional computers and 300 Windows NT workstation 4.0 computers. You create a group policy for the Research organizational unit (OU) and configure the policy as shown in the exhibit.
None of the users in the Research OU who are working at Windows 2000 Professional computers can change the wallpaper on their desktop or the resolution and color depth of their displays. However, when users log on from any of the Windows NT Workstation computers in the OU, they can change all the display settings. You want to restrict all users of Windows NT Workstation computers in the OU from changing their desktop wallpaper and from accessing the Settings tab in display in control panel. What should you do?
A. Add a new computer to the OU and select the Allow pre-windows 2000 computers to use this account check box.
B. Change the group policy so that it also hides the Background tab.
C. Create a separate group policy for a nested OU that contains all window NT computers.
D. Configure a Windows NT policy file and place it in the Winnt\Sysvol\Adatum.local\scripts folder on the PDC emulator.
Answer: D
121. The Litware Inc. network has three main network segments and six domain controllers. Part of the network is shown in the exhibit.
You backup all of the System State data for each domain controller and place the data on a single tape. That tape is currently attached to the srv1.west.litware.com computer. To which server or servers can you restore the System State data from srv1.west.litware.com? (Choose all that apply)
A. srv1.west.litware.com
B. srv2.west.litware.com
C. srv3.central.litware.com
D. srv4.central.litware.com
E. srv5.east.litware.com
F. srv6.east.litware.com
Answer: A
122. Your network is configured as shown in the exhibit.
All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Sales1 and Sales2. The engineering department uses another subnet and has servers named Engineering1 and Engineering2. Sales1 and Engineering1 are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Sales1 and Engineering1 to support client computers on each other's subnets. What should you do?
A. Set the router option in the DHCP Scopes to 192.168.2.1 for Engineering1 and 192.168.1.1 for Sales1.
B. On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol.
C. On Engineering2 and Sales2, install and configure the DHCP Relay Agent service.
D. Configure Engineering2 and Sales2 as DHCP servers without any scopes.
Answer: C
123. Your network has Windows 2000 professional client computers and Windows NT Workstation 4.0 client computers. The network uses TCP/IP as the only network protocol. One server on the network acts as WINS server and DNS server. The IP address of this server is 192.168.1.10. All of the client computers are configured to use this server for the DNS and WINS services. Users of Windows NT Workstation computers cannot connect to a file server named FS_1. However, users of Windows 2000 Professional computer can access FS_1. FS_1 has a statically assigned address of 192.168.1.11. The TCP/IP settings for FS_1 are shown in the Exhibit.
Which change should you make to allow Windows NT Workstation computers to connect to FS_1?
A. Add the WINS address used by the Windows NT Workstation computers and select the Enable LMHOSTS lookup check box.
B. Select Enable LMHOSTS lookup checkbox and import Lmhosts file used by the Windows NT Workstation computers.
C. Select Enable NetBIOS over TCP/IP option button and add the WINS address used by the Windows NT Workstation computer.
D. Select the Use the NetBIOS setting from the DHCP server option button and add the WINS address used by the Windows NT Workstation computer.
Answer: C
124. You are the administrator of a Windows 2000 Server network. The network is a routed network that uses TCP/IP as the only network protocol. All of the Windows 2000 Professional client computers and Windows NT Workstation 4.0 client computers are members of the single domain. You install Gateway Service for NetWare on a Windows 2000 Server computer. You install a second network adapter on the gateway on the gateway server. The network is now configured as shown in the exhibit.
You want to configure adapter #1 for communications to and from the Windows-based client computers exclusively.
Which check boxes in the Local Area Connection Properties dialog box should you select? (Choose all that apply)
A. Gateway (and client) services for NetWare.
B. Client for Microsoft Networks.
C. File printer sharing for Microsoft Networks.
D. NWLink NetBIOS.
E. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.
F. Internet Protocol (TCP/IP)
Answer; B, C, F
125. You share a folder on a Windows 2000 Server computer for users in your company?s London office. You place several subfolders in the London Folder as shown in the exhibit.
The Marketing-2 folder is compressed. You want to delete Marketing-2, but you want to keep all the files that are currently in the folder. You plan to copy all the files in Marketting-2 into the marketing folder before deleting marketing-2. You want these files to remain compressed. However, you do not want to compress any existing files in marketing or compress any other new files added to the marketing. What should you do before you delete marketing-2?
A. Copy all the files from marketing-2 to marketing.
B. Move all the files from marketing-2 to marketing.
C. Compress marketing and then copy all the files from marketing-2 to marketing.
D. Compress marketing and then move all the files from marketing-2 to marketing.
Answer: B
126. You are the network administrator responsible for testing and deploying new service packs for Windows 2000. Your forest has two trees, with four domains in each tree, as shown in the exhibit:
For the testing of each service pack, you plan to deploy the service pack to the support.IS.contoso.com domain and the support.IS.litware.com domain, but to no other domains. You plan to use a group policy to configure and administer the service pack package. You need to minimize the complexity and administration of the service pack package, and to minimize network traffic between the domains. You create a Microsoft Windows installer package for the service pack.
What should you do to configure the group policy?
A. Configure the Windows installer package in a group policy for the litware.com and contoso.com domains
B. Configure the Windows installer package in a group policy for the support.IS.litware.com and support.IS.contoso.com domains.
C. Configure two sites, with one tree in each site. Configure the Windows installer package in a group policy for each site.
D. Configure one site that contains both trees. Configure the Windows installer package in a group policy for the site.
Answer: B
127. You are the domain administrator for your company. The domain and OU structure is shown in the exhibit.
You want to log all unsuccessful attempts to delete files from all your data servers. Which two actions should you take? (Choose two)
A. Set audit permissions on all file and print server computers
B. Use Secedit to import the Hisecws.inf template for all computers in the file and print servers OU.
C. Use Secedit to import the Hisecws.inf template for all computers in the Client computers OU.
D. Enable group policy auditing on the file and print servers OU.
E. Set auditing permissions on all of the client computers.
F. Enable auditing group policy on the client computers OU.
Answer: A, D
128. You are the network administrator of the Windows 2000 network at Island Hopper News. Your company does not have a Web presence. Your network consists of a Windows 2000 domain controller, a file server, and a member server named Server 1. Server 1 is connected to a modem bank. Many users want to log on to the network for home. These users have Windows 95, Windows 98 and Windows 2000 are professional computers. You enable routing and remote access for Windows 2000 on server 1. You configure the server 1 properties as shown in the exhibit.
Users configure dial-up networking on their client computers to connect to server 1. Some users report that they are unable to connect to server 1. What should you do?
A. Change the authentication provider to RADIUS Authentication.
B. Disable EAP.
C. Disable MS-CHAP version2.
D. Enable SPAP.
E. Enable MS-CHAP.
Answer: E
129. You are the network administrator at Contoso Ltd. You work at the main office in Seattle. The branch office in Denver is a call center. The network consists of a Windows 2000-only domain. The network is configured as shown in the exhibit.
Denver is a token ring network. Seattle is an Ethernet network. None of your network adapters at Contoso Ltd support promiscuous mode. The Brouter does not support multicast traffic. Wks1.contoso.com and mem1.contoso.com are available for use as network monitor clients. You want to be able to detect and identity rogue installations of network monitor on your network by using the fewest possible computers. What should you do? (Choose all that apply)
A. Install network monitor tools on wks1.contoso.com by using the Windows components wizard.
B. Install the SNMP protocol on wks1.contoso.com by using the Windows components wizard.
C. Install network monitor tools on mem1.contoso.com by using the Windows components wizard.
D. Install the SNMP protocol on mem1.contoso.com by using the Windows components wizard.
E. Install network monitor tools on wks1.contoso.com that supports promiscuous mode.
F. Install network monitor tools on mem1.contoso.com that supports promiscuous mode.
Answer: A, C
130. You are the network administrator at Island Hopper News. The domain and network configuration is a single-site Windows 2000 domain that is configured as shown in the exhibit.
You must provide Terminal Services to the Pentium MMX client computers. You also need to able to manage user licenses and enable users to access term1.islandhoppernews.com First, you install terminal services in application server mode on term1.islandhoppernews.com. What should you do next?
A. Install terminal services licensing on term1.islandhoppernews.com. Select the Enterprise License server option.
B. Install terminal services licensing on term1.islandhoppernews.com. Select the Domain license server option.
C. Install terminal services licensing on file1.islandhoppernews.com. Select the Enterprise license server option.
D. Install terminal services licensing on file1.islandhoppernews.com. Select the Domain license server option.
E. Install terminal services licensing on uu2.islandhoppernews.com. Select the Enterprise license server option.
F. Install terminal services licensing on uu2.islandhoppernews.com. Select the Domain license server option.
Answer: B
131. You configure an HP Jet Direct print device as sown in the network diagram exhibit.
You want to create and share a printer at Srv2.sales.justtogs.com that is connected to the TCP/IP port of the print device. However, when you enter the IP address of the device, you receive the dialog box shown in the Printer Port Wizard exhibit.
Printer Port Wizard What should you do?
A. Select Hewlett Packard JetDirect from the Standard drop-down list.
B. Select the Custom option button, click the settings command button, and select the LPR protocol.
C. Change the IP address of the print device to 10.5.20.200.
D. Change the subnet mask of the print device to 255.0.0.0.
E. Change the default gateway address on Srv2.sales.justtogs.com to 10.5.20.100.
Answer: C
132. You are the administrator of a server called X. There is only one domain in server X. Server X has a folder named Accounting that holds alot of sensitive information, and can be accessed by two groups with these permissions:
Accounting global group: Full Control
Users: Full Control
Eric is a user of the domain and needs full access to the Accounting folder. You make Eric a member of the Accounting global group, but when Eric tries to access the Accounting folder he is not allowed access.
What should you do to give him access to the Accounting folder?
A. Have Eric sign off and sign back on.
B. Give the Everyone group read access to the Accounting folder.
C. Make Eric a member of the Local Administrator group.
D. Can't remember the last chose, but it was wrong
Answer: A
133. You are the network administrator for your FR. The network consists of a Windows 2000 Active Directory domain named FR.com. The network includes a Windows 2000 Server computer named FR1, which is a member of the domain. FR1 runs Routing and Remote Access for Windows 2000 and is connected to a modem bank. An existing company policy allows all domain users to dial in to FR1.
Your company hire 10 inters. Each intern has a domain user account. All inters are permitted to access all resources on the company network. One intern is permitted to dial in to FR1 for remote access. The other nine interns are not permitted to dial in to FR1 for remote access.
You need to ensure that the nine interns cannot establish a dial-up connection to FR1. What should you do?
A. Modify the default remote access policy to Deny permissions.
B. Configure the nine interns' domain user accounts so that FR1 is not listed on the Logon Workstations list.
C. Place the nine interns' user accounts into a domain global grouped named NoRemoteAccess. On FR1, configure a remote access policy that denies access to the NoRemoteAccess group.
D. On FR1, place the nine interns' domain user accounts into a local group named NoRemoteAccess. Then configure a remote access policy that denies access to the NoRemoteAccess group.
Answer: C
134. You are the administrator of a Windows 2000 Server computer named FRIntra. FRIntra is a member of an Active Directory domain and hosts an intranet Web site for your company.
Company policy requires that only authenticated users have access to the intranet site. All company users have user accounts in the Active Directory domain.
You configure directory security for the Web site to use integrated security. However, you discover that users can access the Web site without being authenticated.
You need to ensure that only authenticated users can access the Web site. What should you do?
A. Install Active Directory on FRIntra.
B. Select the Basic authentication check box.
C. Clear the Anonymous access check box.
D. Disable the IUSR_FRIntra user account on FRIntra.
E. Clear the Allow IIS to control password check box.
Answer: C
135. You are the administrator of a Windows 2000 Server computer named FR4. FR4 runs two applications that are used by all users in the company.
Users report that FR4 is responding slowly. Each week, users report that the performance on FR4 is slower that it was the previous week. You run System Monitor on FR4 and document performance data as shown in the table in the ( exhibit )
You need to correct the condition that is reducing the performance on FR4. What should you do?
A. Upgrade to a faster hard disk.
B. Upgrade to a faster processor.
C. Increase the size of the paging file.
D. Increase the amount of RAM.
Answer: A
136. You are the network administrator at FR. The network has a domain that contains 10 Windows 2000 Server computers. The computers are configured as domain controllers. FR's information technology director asks you to create a schedule to automatically back up all of the servers registry files and Windows 2000 Active Directory Services databases. You use the Windows 2000 Server backup application to ensure that all files are backed up to removable media on a nightly basis.
The backup process needs to run without affecting availability and production during normal hours of operation. You need a backup configuration that requires the least amount of time to implement.
What should you do?
A. Configure one domain controller to back up the System State data for all 10 domain controllers to removable media at 12:00 midnight.
B. Configure the scheduler service to run Rdisk /s on all domain controllers at 12:00 midnight. Configure one domain controller to back up the C:\Winnt\Repair folder for all domain controllers to removable media at 1:00 A.M.
C. Configure all domain controllers to back up their own System State data at 12:00 midnight to a local shared folder. Configure one domain controller to back up that shared folder to removable media at 1:00 A.M.
D. Configure all domain controllers to back up their own security and registry files at 12:00 midnight to a shared folder. Configure one domain controller to back up that shared folder to removable media at 1:00 A.M.
Answer: C
137. You are the administrator of a Windows 2000 Network for FR, Inc. The network includes four Web servers named WWW1, WWW2, WWW3, and WWW4. Your network also includes a Windows 2000 Server computer that uses DNS.
Each Web server contains exactly the same content, and users accessing www.FR.com can be directed to any one of them.
You add records to your DNS server, as shown in the following table:
Record type Name IP address
---------------------------------------------------
CNAME www 192.168.10.5
CNAME www 192.168.10.6
CNAME www 192.168.10.7
CNAME www 192.168.10.8
When you examine the logs for the Web servers, you discover that all incoming traffic is being directed to 192.168.10.5, which is the IP address for WWW1.
You want the incoming traffic to be balanced across the four Web servers. What should you do?
A. Select the Disable recursion check box in the properties of the DNS server.
B. Enable round-robin in the properties of the DNS server.
C. Enable W3C logging in the properties of the Web servers.
D. Install and configure Network Load Balancing on WWW1.
Answer: B
138. You are the network administrator for FR. You are configuring a new Windows 2000 Server computer. The server contains five physical disks. You plan to implement a Windows 2000 software RAID.
You need to ensure that all disk volumes are fault tolerant. You want to minimize disk access time and maximize available storage.
What should you do?
A. Configure the system volume as a simple volume and the other volumes as striped volumes.
B. Configure the system volume as a simple volume and the other volumes as RAID-5 volumes.
C. Configure the system volume as a mirrored volume and the other volumes as mirrored volumes.
D. Configure the system volume as a mirrored volume and the other volumes as RAID-5 volumes.
Answer: D
139. Your Windows 2000 Server FRSrv included an integrated network interface adapter. You are replacing the integrated adapater with a new network interface adapter.
You install the new network interface adapter in an available PCI slot. When you restart FRSrv, you receive error messages in the System log stating that the new network interface adapter is missing or is not working.
What should you do to resolve the problem?
A. Create a new hardware profile.
B. Run the Add/Remove Hardware wizard.
C. Disable the integrated network interface adapter.
D. Delete the device driver for the integrated network interface adapter from the Systemroot\system32\drivers folder.
Answer: C
140. You are the network administrator for FR. A Windows NT Server 4.0 member server in your network has a non-Plug and Play ISA modem.
You need to update this computer to Windows 2000 Server. You also need to ensure that you maintain the current device configuration during the upgrade.
What should you do?
A. Disable the modem. Start the upgrade process. Enable the modem.
B. Configure BIOS to reserve the IRQ currently in use by the modem. Start the upgrade process.
C. Remove the modem. Start the upgrade process. Reinstall the modem.
D. Install the latest driver for the modem. Start the upgrade process.
Answer: B
141. You are a network administrator of a Windows 2000 Active Directory domain FR.com. The company has multiple branch offices and multiple Windows 2000 Server computers at each office. A junior administrator is located at each office. This junior administrator is responsible for local server configurations.
One junior administrator has applied a new security template to the local file server. Local users running Windows 95 on their computer can no longer communicate with the server.
You need to verify that the security settings on the Windows 2000 Server computer at the branch office will allow client computers to connect.
What should you do?
A. Use MMC and load the Local Computer Policy snap-in. Examine the Administrative templates in the User and Computer section. Compare the templates against the template settings currently in place on the server.
B. Use MMC and load the Security Configuration and Analysis snap-in. Create and open a database. Then choose Import file and specify the basicsv template.
C. Use MMC and load the Computer Management snap-in. Specify the appropriate template file to compare against, and then select the Analyze option.
D. Run the secedit /validate command to display the appropriate template file.
Answer: A
142. You are the administrator of a Windows 2000 Server computer named FRSrv. FRSrv is used in your company's research department and does not belong to a domain.
Employees in the research department use the local Guests user account to access FRSrv. However, new company security guidelines state that employees must not use the local Guest user account to log on to company computers. You disable the Guest account on FRSrv. You also create local user accounts for each employee in the research department.
Three weeks later, you discover that the Guest account has been used to access FRSrv. You disable the account again.
You need to ensure that the Guest account cannot be used to log on to FRSrv. What should you do?
A. Rename the Guest account to Guest$.
B. Remove all user accounts except your own from the local Administrators group on FRSrv.
C. Set the Audit account logon events audit policy to audit successful and failed attempts.
D. Modify the Local Security Policy on FRSrv so that the Accounts: Guest account status policy is set to Disabled.
Answer: B
143. All server computers and client computers on FR's network are domain members. You want to configure all client computer, local server, and domain user accounts to have a password expiration policy of 60 days.
What should you do?
A. Create a Group Policy object (GPO) to enforce a maximum password age of 60 days. Link this GPO to all organizational units (OUs) that contain user and computer accounts.
B. Create a Group Policy object (GPO) to enforce a maximum password age of 60 days. Link this GPO to the domain.
C. Create a batch file to run the Secedit command on each client computer to import a security template that enforces a maximum password age of 60 days.
D. Create a batch file to run the Secedit command on each domain controller to import a security template that enforces a maximum password age of 60 days.
Answer: B
144. Your Windows 2000 Server computer named FRSrv that contains a single 18-GB hard disk. The drive is configured as a basic disk and has two partitions. Partition C is 2 GB in size and contains the operating system files. Partition D is 16 GB in size and contains user data that is updated frequently.
Both partitions are formatted as NTFS. Both partitions are backed up to a tape every evening at 10:00 P.M. You have a current Emergency Repair Disk (ERD) for FRSrv, and Recovery Console is installed on the computer.
One day at 4:00 P.M., the server fails. You attempt to restart FRSrv, but you receive the following error message:
"Boot disk or operating system not found".
You use Recovery Console to discover that the files on partition C are corrupted.
You need to recover FRSrv from the failure as quickly as possible. You also must recover as much user data as possible.
What should you do?
A. Use the ERD to start the computer. Replace the corrupted files on partition C by copying them from a Windows 2000 Server CD-ROM.
B. Boot the Recovery Console. Copy any files that have changed since 10:00 P.M. the previous evening to a second server. Use the most recent tape backup to restore the remaining user data to the second server.
C. Start the computer by using a Windows 2000 Server CD-ROM. Select the Repair option in Setup.
D. Install a second hard disk in the computer. Install Windows 2000 Server on the new hard disk. Re-create the shared folders on the first hard disk.
Answer: C
145. You are the network administrator for your company. The network contains a Windows 2000 Server computer named FRSrv and is connected to the Internet by means of a 1.544-Mbps network connection. The network also contains a firewall, which performs network address translation (NAT).
The firewall is located between FRSrv and the Internet. Your manager informs you that company employees will be allowed to work from home. Employees who work from home will need to connect to the company network by using a virtual private network (VPN) connection.
You install and configure Routing and Remote Access for Windows 2000 on FRSrv and then configure FRSrv to accept PPTP connections. You also configure the firewall to permit PPTP traffic.
You attempt to open a VPN connection to FRSrv from your home, but you cannot connect. You can open a VPN connection to FRSrv from other computers on your company's network.
You need to ensure that employees can connect to FRSrv by using a VPN connection from their home adapters.
Which two actions should you take? (Choose two)
A. Configure the firewall to perform call ID translation for the General Routing Encapsulation (GRE) protocol.
B. Configure the firewall to permit General Routing Encapsulation (GRE) traffic.
C. Configure FRSrv to use EAP.
D. Configure FRSrv to use MS-CHAP v2.
E. Configure FRSrv and employees' home computers to use L2TP connections and IPSec encryption.
F. Configure employee's home computers so that Internet Connection Sharing is enabled.
Answer: A, B
146. You are the network administrator for FR inc. The network includes a Windows 2000 Server computer named FrA. The network also includes five UNIX client computers and 450 Windows Professional client computers.
Your manager asks you to create a new shared folder named SalesDocs on FrA. You create the SalesDocs shared folder on an NTFS partition. Your manager places several documents in SalesDocs.
Employees who use UNIX client computers cannot connect to the SalesDocs shared folder. Your manager asks you to ensure that all company employees can access the documents. You verify that the share and file permissions on the SalesDocs shared folder grant Read permission to all employees.
You need to ensure that all employees can access the documents in the SalesDocs shared folder.
What should you do?
A. Move the SalesDocs shares folder to a FAT32 partition on FrA.
B. Create a host file on each UNIX client computer that includes the name and IP address for FrA.
C. Modify the share permissions on the SalesDocs shared folder so that Everyone group has Full Control permissions.
D. Install Internet Information Services (IIS) on FrA. Configure a new FTP site that uses the SalesDocs shared folder as its root.
Answer: D
147. You are the administrator of a Windows 2000 Server computer named FR1. This server hosts an intranet Web site for you company.
The marketing department stores marketing files in a shared folder on a separate file server.
The NTFS permissions on the folder are shown in the File Permissions ( exhibit )
The marketing director wants to make the marketing files available to the rest of the company by means of the intranet. She wants company users to be able to read, but not modify, all of the files.
You create a new virtual directory named Marketing under the intranet Web site folder on FR1. You configure the virtual directory as shown in the Virtual Directory configuration ( exhibit q52a.gif ).
Some users report that they are not able to access the marketing files from their Web browser. However, all users in the marketing department are able to access the files.
You need to ensure that all company users are able to read the marketing files.
What should you do?
A. Select Directory browsing check box on the Virtual Directory tab.
B. Copy the files from their location on the filer server to \\FR1\Marketing.
C. Modify the NTFS permissions on the file server to remove the entry for Marketing.
D. Modify the NTFS permissions on the file server to include an entry for Everyone: Read.
Answer: D
148. You are the administrator of a Windows 2000 Server computer named FrA. This server contains critical payroll files. You must perform a daily backup of these files. You shutdown the server and connect a non-Plug and Play tape device. You restart the server and install the tape device driver.
After the driver loads, you are promoted to restart the server.
You then receive the following STOP error: "DRIVER_IRQL_NOT_LESS_OR_EQUAL"
You need to enable the server to start correctly. What should you do?
A. Restart the server in debugging mode. When the server starts, remove the device and its associated driver.
B. Restart the server by using the Windows 2000 Server CD-ROM and choose to repair the installation.
C. Restart the server by using the last known good configuration.
D. Restart the server by using a Windows 2000 bootable floppy disk. When the server starts, remove the device and its associated driver.
Answer: C
149. You are the administrator of a Windows 2000 Server computer named FRServer. FRServer contains five hard disks. Disks 0 and 1 are configured as a mirrored volume and contain the operating system files. Disk 2, 3, and 4 are configured as a stripe set with parity volume and contain 150 GB of data files. FRServer also contains a tape backup device, which is used to make a full backup of the data files every weekend.
Disk 2 fails on Tuesday. You replace disk 2 with a new hard disk.
You need to return the stripe set with parity volume to normal operation as quickly as possible. You also need to minimize the amount of data lost.
What should you do?
A. Use the Disk Manager console to delete and re-create the stripe set with parity volume.
B. Restore the data files from the most recent tape backup to the stripe set with parity volume.
C. Modify the Boot.ini file so that the ARC path for Windows 2000 Server points to disk2.
D. Use the Disk Manager console to repair the volume.
Answer: D
150. You are the administrator of a Windows 2000 Server computer named FR3. FR3 runs Internet Information Services (IIS) and has a single Web site named Default Web Site.
The manager of your company's sales department asks you to create a new shared folder named Forecasts on FR3. The manager plans to place documents in the shared folder. All company employees need to access the documents by means of a Web browser and the URL http://FR3/forecasts/.
You create the Forecasts shared folder and configure the appropriate share and NTFS permissions. You verify that the manager is able to place documents in the shared folder and map a network drive to \\FR3\Forecasts.
However, company employees cannot access the documents by means of their Web browser. When they attempt to access the documents, their browsers display the following error message: "Page not found".
You need to ensure that all company employees can access the documents by using a Web browser and the URL http:// FR3/forecasts/.
What should you do?
A. Restart the World Wide Web Publishing service.
B. Create an additional share named Forecasts$ for \\FR3\Forecasts.
C. Ensure that the TCP/IP Helper service on FR3 is configured to start automatically.
D. In the Internet Services Manager console, configure a new virtual directory named Forecasts. Point Forecasts to \\FR3\Forecasts.
Answer: D
151. You are required to strengthen security in the fr.com domain. You decide to set an account policy for domain accounts to have a maximum password age of 30 days and for local computer accounts to have a maximum password age of 90 days.
Which action or actions should you take? (Choose all that apply)
A. Configure a Group Policy object (GPO) on the domain that sets the maximum password age to 30 days.
B. Configure a Group Policy object (GPO) on the domain that sets the maximum password age to 90 days.
C. Configure a Group Policy object (GPO) that sets the maximum password age to 30 days, and link it to all organizational units (OUs)
D. Configure a Group Policy object (GPO) that sets the maximum password age to 90 days, and link it to all organizational units (OUs).
E. Configure a local computer policy on all local computers that sets the maximum password age to 30 days.
F. Configure a local computer policy on all local computers that sets the maximum password age to 90 days.
Answer: A, F
152. You are the administrator of a Windows NT Server 4.0 computer named FR1. FR1 is a backup domain controller (BDC), and a member of your company's Windows 2000 Active Directory domain. FR1 contains five hard disks. Disk 0 and 1 are configured as a Windows NT 4.0 mirror set. The mirror set contains the operating system files and 500 MB of free disk space. Disk 2, 3 and 4 are configured as a Windows NT 4.0 stripe set with parity and contain employee data files.
The Windows NT 4.0 stripe set with parity has a maximum capacity of 140 GB and contains 15 GB of free disk space.
FR1 runs an application that is used by 400 company employees. A new version of the application is available.
You need to install the new version, but it requires Windows 2000 Server. Also, the application will not run on a domain controller. You need to install the new application on FR1 as quickly as possible.
What should you do first?
A. On FR1, back up the employee data files. Then format all five disks and perform a clean installation of Windows 2000 Server. Restore the employee data files.
B. On FR1, install Windows 2000 Server. Configure FR1 to use a dual-boot configuration that includes Windows NT Server 4.0 and Windows 2000 Server.
C. Upgrade FR1 to Windows 2000 Server. During the upgrade, select the option to make FR1 a member server.
D. Upgrade FR1 to Windows 2000 Server. During the upgrade, select the option to make FR1 a domain controller. After the upgrade is complete, demote FR1.
Answer: A
153. Your company has two locations-north and south. Windows 2000 Servers in both locations create weekly tape backups of critical data. The tapes are stored in the south location. How can you restore system state data to the server in the north location?
A. Within Windows Backup on the south server, restore the system state data to the system root folder on the north server.
B. Ship the backup tape to the north office. Run Windows Backup on the north server and restore system state data to the system root folder.
C. Restart the south server in Directory Services Restore Mode, run Windows Backup, and restore system state data to the system root folder of the north server.
D. Copy the backup file to any directory on the north server. Double-click on the file and choose "Restore System State Data."
Answer: B
154. You administer a routed Window 2000 network. You install a new Windows 2000 Server computer on a new routed segment and configure the existing DHCP Server with a scope that is valid for the new routed segment. After enabling the new Windows 2000 Server for DHCP, you find on your first boot that it has been assigned the IP address of 102.93.1.100, a 16 bit subnet mask, and no default gateway. When opening My Network Places, you see only the local computer. What two actions must be taken so that this new Windows 2000 Server can see other computers on the network? (choose two)
A. Configure all routers to route BOOTP broadcast frames.
B. Configure the default gateway to route all requests through TCP port 72.
C. Add the IP address of the default gateway to the new 2000 Server's TCP/IP properties.
D. Add a DHCP relay agent computer to the new routed segment.
E. Add a WINS server to the new routed segment.
Answer: A, D
155. An NT 4.0 Server named ELIZABETH is a member server in a Windows 2000 domain named testing.product.local. You want to upgrade ELIZABETH to Windows 2000. The domain runs in native mode. You also want to change the role of ELIZABETH to be PDC within testing.product.local. Which of the following two actions must be performed? (choose two)
A. Reinstall NT 4.0 on ELIZABETH to the existing \Winnt folder and promote ELIZABETH to PDC.
B. Use Server Manager on ELIZABETH to promote ELIZABETH to PDC.
C. Upgrade ELIZABETH to Windows 2000 Server.
D. Run the Active Directory Installation Wizard to make ELIZABETH PDC of the testing.product.local domain.
E. Designate ELIZABETH as PDC from the existing PDC and reboot the existing PDC.
Answer: C, D
156. Your network currently contains 6 NT 4.0 Servers and 620 NT 4.0 Workstations. You want to bring a Windows 2000 Server online and implement it to act as primary domain controller in the existing domain. How?
A. Run the Active Directory Installation Wizard to configure Active Directory on the 2000 Server. Promote the 2000 Server to be PDC of the domain. Reboot the existing NT 4.0 PDC and demote it to BDC status.
B. Shut down the existing NT PDC. Run the Active Directory Installation Wizard on the 2000 Server and specify the current NetBIOS name of the domain. Restart NT on the PDC and demote it to BDC.
C. Install NT Server 4.0 on the new computer and designate the computer as PDC of the existing domain. Specify the currently used NetBIOS name of the domain. Upgrade the computer to Windows 2000 Server and use Active Directory to force synchronization with the current PDC.
D. Install NT Server 4.0 on the new computer and promote the computer as PDC of the existing domain. Be sure to specify the currently used NetBIOS name of the domain. Upgrade the computer to Windows 2000.
Answer: D
157. You administer the Greenware.com domain for the Greenware Corporation. In Greenware's main office in Toronto, Internet Information Services run on a computer named web.greenware.com. You want web developers in Puerto Rico and Los Angeles to be able to update web sites and virtual directories on web.greenware.com via Microsoft FrontPage. How do you do this?
A. Install server extensions for IIS on web.greenware.com using the FPRENAME command. Configure the server extensions for each web site.
B. Install server extensions for IIS on web.greenware.com using the FPSRBADM command. Configure the server extensions for each web site.
C. Install server extensions from the All Task menu within IIS. Configure the server extensions for each web site.
D. Install server extensions for each web site by selecting Configure Server Extensions from the All Tasks menu in IIS. Configure the server extensions to allow each developer update access for each web site.
Answer: D
158. Your company network includes a Windows 2000 application server named App1. App1 runs many different production applications. All applications currently start automatically when you start the server. One of these applications is a critical, custom accounting application. This application runs as a single service named finance.
You discover that finance has a programming defect that causes App1 to become unstable. You need to troubleshoot this programming defect. Until the defect is repaired, you need to ensure that finance does not interface with the other applications on the server.
What must you do?
A. Use task manager to set the priority of finance to BelowNormal.
B. Use Task Manager to set the priority of Finance to Low.
C. Create a batch file to be launched upon restart that pauses the Finance service.
D. Use the services console to change the startup type for Finance to manual.
Answer: D
159. You administer a Windows 2000 Server with two 14 GB hard disks. The first is formatted using FAT 32. The second is formatted using NTFS. You create a shared folder on both disks.
To conserve disk space, you compress the shared folder on disk two. When you move files from the shared folder on disk two to the first disk, the files lose their compression attributes.
How do you ensure that compression is maintained when transferring files from the second disk to shared folders on the first disk? (Choose two)
A. Format the first disk as NTFS.
B. Convert the first disk to NTFS.
C. Convert both disks to be dynamic disks.
D. Convert the first disk to a dynamic disk.
E. Compress the shared folders on the first disk.
Answer: B, E
160. You are installing Windows 2000 Server on a new computer that has a hardware-based RAID array, a floppy disk drive, and a CD-ROM drive. The disk controller for the RAID array is not included on the current hardware compatibility list (HCL). You run Windows 2000 Setup by starting the computer from the Windows 2000 Server CD-ROM.
When the computer restarts at the end of the text mode portion of Windows 2000 Setup, you receive the following STOP error: "INACCESSABLE_BOOT_DEVICE ".
Which two actions should you take to eliminate the STOP error? (Choose Two)
A. Modify the Boot.ini file.
B. Restart Windows 2000 Setup from the CD-ROM.
C. Select safe mode from the Windows 2000 boot menu.
D. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
E. Install a driver for the RAID controller form a floppy disk.
F. Use device manager to update the driver for the RAID controller.
Answer: B, E
161. You administer two Windows 2000 Servers, Server1 and Server2. Sever1 has a spanned volume that consists of areas on three physical hard disks. The three disks support hot swapping, and three hot swappable disk bays are available on Server2. The drive letter that the spanned volume on Server1 uses, is not currently in use on Server2.
You want to move the three disks to Server2. You want the spanned volume to use the same drive letter on Server 2 that it originally used on Server1. You want to minimize the impact of your actions on the availability and performance of the two servers.
You back up the spanned volume. What should you do next?
A. Move the disks from Server1 to Server2. On Server1, rescan the disks. On Server2, rescan the disks.
B. Shut down both servers. Move the disks from Server1 to Server2. Restart both computers. Rescan the disks on Server2.
C. Shut down Sever1. Move the disks from Server1 to Server2. Restart Server1. On Server2, restore the spanned volume by using Windows Backup.
D. Move the disks from Server1 to Server2. On Server2, create a new spanned volume and format the volume. Restore the spanned volume by using Windows Backup.
Answer: A or D (please confirm it)
162. You are the network administrator for Island Hopper News. The main office has a Windows 2000 workgroup that includes five Windows 2000 Server computers and 10 Windows 2000 Professional computers. Currently, no users at the main office have internet access.
Island hopper news also has two remote offices, each with a Windows 2000 workgroup. None of these offices are networked to another. However, users at the remote office connect to main office individually to access network resources.
A server named member2 is located at the main office. Member 2 has two network adapters, which are designated adapter1 and adapter2. adapter1 is connected to the LAN, and adapter2 is connected to a DSL modem that is connected to the internet.
To provide users at the main office with internet access, you enable internet connection sharing on member 2.
Now, some users in the remote office report that they can no longer access local network resources. In addition, users at the main office are still unable to access the internet.
You need to ensure that local network resources are always accessible, and you need to ensure that users at the main office have internet access. What should you do?
A. Configure internet connection sharing to be enabled on adapter 1.
B. Configure internet connection sharing to be enabled on adapter 2.
C. Configure network address translation on member 2.
D. Install a proxy server on the company's network.
Answer: C
163. Your network uses the private IP address 192.168.0.0. You connect via dialup to a Windows 2000 Server that is configured as a remote access server. You connect successfully, but receive the error "Request timed out" when trying to run any IP applications. You check to see if you have been assigned an IP address, and IPCONFIG indicates that your IP address is 125.22.67.100. What should be done to resolve the problem?
A. Configure the remote access server with the address of a DHCP server.
B. Have the remote access server synchronize itself with all domain controllers on the network.
C. Configure the remote access server to be a DHCP relay agent.
D. Ensure that the remote access server is able to connect to DHCP and that the DHCP has the remote access server's subnet within its scope.
Answer: D
164. Your Windows 2000 Server network is a routed network that uses TCP/IP as the only network protocol. All of the Windows 2000 Professional computers and Windows NT Workstation 4.0 computers are members of the single domain.
You install Gateway Service for Netware on a Windows 2000 Server computer. You install a second network adapter on the gateway server. The network is now configured as shown in the ( exhibit )
You want to configure Adapter #1 for communications to and from the Windows-based client computers exclusively. Which checkbox or boxes in the Local Area Connection Properties dialog box should you select? (Choose all that apply.)
A. Gateway (and client) Services for Netware.
B. Client for Microsoft Networks.
C. File and Printer Sharing for Microsoft Networks.
D. NWLink NetBIOS.
E. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.
F. Internet Protocol (TCP/IP)
Answer: B, C, F
165. You are configuring Internet access for a remote site of your company. The remote site has 12 computers on a private network with a 56Kbps connection to the Internet. Network address translation (NAT) and the AT feature of routing and remote access will be used. You test the configuration and find that web sites can only be reached by their IP address and not their fully qualified domain name.
What must you do to fix this problem? (Choose two)
A. Configure each of the computers in the remote site with the address of a WINS server.
B. Configure each of the computers in the remote site with the address of a DNS server on the Internet.
C. Configure a filter on the NAT Server to pass DNS packets.
D. Create a host file on each of the NAT Servers.
Answer: B, C or B, D (please confirm it)
166. You administer a large network consisting of 6 domain controllers, 4 member servers, and 500 clients. All computers are using Windows 2000 Server or Windows 2000 Professional. TCP/IP is the only protocol in use. You want to configure the network so that all computers can resolve the addresses of all other computers using DNS. There must be redundancy built into the system, in case the primary name server fails. How should you implement DNS on your network?
A. Configure one server with a standard primary zone for the domain and configure at least one server with a standard secondary zone.
B. Configure one server responsible for an Active Directory integrated primary zone; configure at least one server responsible for a standard secondary zone.
C. Configure one server with a standard primary zone for the domain and configure at least one server responsible for an Active Directory integrated primary zone.
D. Configure at least two servers responsible for the Active Directory integrated primary zone of the domain.
Answer: D
167. Your Windows 2000 Server computer has two disks attached to an EIDE disk controller. You need additional disk space. You add a new SCSI disk controller that has six new disks attached. The new controller is not included on the Hardware Compatibility List (HCL). When you restart the computer, Windows 2000 does not detect the new controller.
What can you do to install the new controller? (Choose two).
A. Use Device Manager to turn off IRQ steering in the properties of the standard PC. Then restart the computer.
B. Use Disk Management to restore the basic configuration. Then restart the computer.
C. Use the Add/Remove Hardware wizard to add a new SCSI and RAID controller from the disk supplied by the manufacturer.
D. Use Disk Management to rescan the disk.
E. Use the manufacturer's setup program to install the driver for the SCSI disk controller.
Answer: C, E
168. The network you administer has two organizational units named North America and South America. Within each OU are subordinate OU's named Marketing, Graphics, and Sales. You suspect someone is trying to log into your domain by guessing account names and passwords. How can you configure your network so that you can detect which computer is being used for these log on attempts?
A. Edit the default domain controller policy object to audit account logon failures.
B. Edit the default domain controller policy object to audit resource access failures.
C. Edit the North and South America OU group policy objects to audit log on failures.
D. Edit the GPO of each subordinate OU to audit resource access failures.
Answer: A
169. You administer a Windows 2000 Server that hosts an important network share named REPORTS on an NTFS partition. The permissions for REPORTS are as follows:
Type of Permission Account Permission
Share Users Change
NTFS Users Full Control
The CEO of your company has called to request that particular files in the REPORTS folder be prevented from being modified immediately. Many of the files are currently in use. What two actions should you take to fulfill this request? (choose two)
A. Disconnect users from the REPORTS folder.
B. Modify the NTFS permissions of the REPORTS folder.
C. Modify share permissions of the REPORTS folder.
D. Disconnect users from the network.
E. Modify NTFS permissions for the ten files.
Answer: A, E
170. You administer a Windows 2000 Server network consisting of 500 Windows 2000 Professional computers and 50 Windows 2000 Servers. You configure two domains- litware.local and dev.litware.local. You enable auditing in the domain policy object for litware.local to audit the success and failure of object access.
You install a printer on a domain controller named dc7.dev.litware.local. You configure auditing on this printer to observe successful and failed attempts to print by the Research universal group. You view the security log for dc7.dev.litware.local one week later and find that no events have been written to the log. You know users in the Research universal group have used the printer repeatedly. What should be done to fix the problem?
A. Enable auditing in the domain policy objects of dev.litware.local to audit the success and failure of object access.
B. Audit the domain policy object for litware.local to enable auditing of the success and failure of directory service access.
C. Configure auditing of the success and failure of object access in the default domain controller policy object on the domain controller organizational unit (OU) of the dev.litware.local domain.
D. Configure auditing of the success and failure of object access in the default domain controller policy object on the domain controller organizational unit (OU) of the litware.local domain.
Answer: A
171. You administer a network with NT Server 4.0 computers, NT Workstation 4.0 computers, and several UNIX computers. The network consists of a single Windows NT domain.
You want to upgrade a Windows NT Server computer named Server1, which is currently a BDC, to Windows 2000 Server. Your existing DNS server is a UNIX computer that supports SRV (service) records and is configured to accept dynamic updates. The existing WINS server is another Windows NT Server computer.
You want to configure Server1 as a domain controller in a new Active Directory forest. You want the existing Windows NT domain accounts to be upgraded to Active Directory.
You want to upgrade Server1 with the least impact on the network. What should you do?
A. Promote Server1 to the PDC of the domain. Run Windows 2000 Setup on Server1.
B. Run Windows 2000 Setup on Server1. Configure Server1 as a DNS server and WINS server.
C. Run Windows 2000 Server Setup on Server1 and select the PDC AutoConfigure option during Setup.
D. Set up Server1 as a WINS server. Run Windows 2000 Server Setup on Server1.
Answer: A
172. Your Windows 2000 Server computer has five hard disks. Four 100-GB hard disks on the server are configured as a single striped volume. You want to reconfigure the four disks so that the volume is fault-tolerant and has as much space as possible for data storage. You want to use only the existing hardware.
What should you do?
A. Convert the disk to a dynamic disk. Shut down and restart the server.
B. Back up the data on the striped volume and then delete the striped volume. Create a RAID-5 volume on the the four disks. Restore data to the new RAID-5 volume.
C. Backup the data on the striped volume and then delete the striped volume. Create two mirrored volumes. Shut down and restart the server. Restore the data to the new mirrored volumes.
D. Back up the data on the stripped volume, and then delete the stripped volume. Create a spanned volume from the first two disks. Create a second spanned volume from the last two disks. Mount the root of the second spanned volume in the root of the first spanned volume. Restore the data to the first spanned volume.
Answer: B
173. You want to measure physical disk performance on your Windows 2000 Server. You want to run System monitor locally on the server. You also want to ensure that System Monitor has the least impact on other processes currently running.
What can you do? (Choose two)
A. From a command prompt, run the start/low perfmon command.
B. From a command prompt, run the start/normal perfmon command.
C. From a command prompt, run the start /min perfmon command.
D. Open System Monitor, and then use Task Manager to set the priority of the Mmc.exe process to Low.
E. Open System Monitor, and then use Task Manager to set the priority of the Mmc.exe process to normal.
Answer: A, D
174. You install a new tape drive on your Windows 2000 Server. You reboot, log in, and are prompted, "irq1_not_less_or_equal." The Server contains important data that must be accessed by users on the network at all times. How do you bring the server back online as soon as possible?
A. Disconnect the tape drive and reboot.
B. Perform an emergency repair and select "Fast Repair" and reboot.
C. Boot into Safe Mode. Remove the new driver in Device Manager and reboot.
D. Restart the computer using Recovery Console. Disable the new driver. Restart the computer and disable the new tape device driver.
Answer: D
175. You edit the registry on your Windows 2000 Server and reboot. The computer stops responding before you reach the login screen. How do you restore the computer's previous configuration?
A. Boot into Safe Mode. Run REGEDIT and click File, Restore Previous Registry.
B. Start the computer using Recovery Console. Run FIXBOOT C:. Reboot.
C. Run the emergency repair process and choose "Registry Restore." Reboot.
D. Restart the computer and choose the "Last Known Good Configuration" as it boots.
Answer: D
176. A Windows 2000 Server computer at your company is connected to two print devices. Company executives use one print device, which is shared as Executive. The office staff use the other print device, which is shared as Office.
Occasionally, a company executive directs a member of the office staff to print a report to the Executive printer. However, the executives report that some members of the office staff are printing to the Executive printer without authorization.
You need to find out which users are printing to the Executives printer without authorization.
What should you do?
A. Monitor the printer's spool directory for files printed by unauthorized users.
B. Use system monitor to monitor the print jobs being set to the executive printer.
C. Enable audit logging for object access. Configure auditing on the executive printer.
D. Use the event viewer to review the security log for messages from the printer subsystem.
Answer: C
177. Your company network includes Windows 98, Windows 2000 Professional, and Macintosh client computers. All of the client computers currently use TCP/IP as their only network protocol.
You create several shared folders on a Windows 2000 Server computer. You plan to store the company's financial data in these shared folders. During testing, you discover that the Macintosh client computers cannot access the shared folders.
You want the shared folders to be accessible from all of the client computers on the network.
What should you do first?
A. Install the SAP protocol on the Windows 2000 Server computer.
B. Install the Apple Talk network protocol on the Macintosh computers and on the Windows 2000 Server computer.
C. Install Apple Talk network integration on the Windows 2000 Server computer.
D. Install RIP on the Windows 2000 Server computer.
Answer: B
178. You are the administrator of the Intranet at Blue Sky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines.com as an intranet server. This server hosts the multiple departmental and resource Web links to the network and databases.
You configure a ticketing Web site. You also configure a finance virtual directory in the department's Web site, as shown in the exhibit.
During the first morning that the new server is available, users report that the only information they are seeing in their browser is a list of HTM and ASP files. For security reasons the first action you need to take is to disable the users' ability to view the files of all WEB sites in the form of a list.
What should you do?
A. Clear the Directory Browsing checkbox for the Server Properties, and then apply the settings to the child WEB sites.
B. Clear the Directory Browsing checkbox for the Ticketing WEB site, and then apply the setting to child virtual directories.
C. Clear the Directory Browsing checkbox for the Department's WEB site, and then apply the setting to the child virtual directories.
D. Clear the Directory Browsing checkbox for the Financing virtual directory.
Answer: A
179. You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of your company's client computers are connected to this server.
A shared folder named Data on the server is on an NTFS partition. The Data folder contains more than 200 files. The permissions for the Data folder are shown in the following table.
You discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effect on users who are using other files on the server.
Which two actions should you take? (Choose two.)
A. Modify the NTFS permissions for the 10 files.
B. Modify the NTFS permissions for the Data folder.
C. Modify the share permissions for the Data folder.
D. Log off the users from the network.
E. Disconnect the users from the Data folder.
Answer: A, E
180. You are the administrator of Coho Vineyard. You are responsible for all remote locations, each of which has at least one Windows 2000 Server computer.
After you install a new video adapter, one of the users at a remote location reports that Routing and Remote Access does not accept calls. After you resolve the Routing and Remote Access problem, you need to configure the server to prevent users from installing any unsigned device drivers.
What two actions should you take in the Driver Signing Option dialog box? (choose two)
A. Set File Signature Verification to Ignore.
B. Set File Signature Verification to Block.
C. Set File Signature Verification to Warn.
D. Select the Apply Settings As System Default check box.
Answer: B, D
181. You are the administrator of a Windows 2000 Server computer. Your computer has a spanned volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the spanned volume by using Windows Backup.
One of the disks fails. You replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible.
What should you do?
A. Extend the spanned volume to include the new disk. Rescan the disk.
B. Extend the spanned volume to include the new disk. Shut down and restart the server. Use Windows Backup to restore the data.
C. Rescan the disk. Format the spanned volume. Use Windows Backup to restore the data.
D. Rescan the disk. Extend the spanned volume to include the new disk. Shut down and restart the server. Use Windows Backup to restore the new data.
E. Rescan the disks. Remove the spanned volume and create a new spanned volume that includes the new disk. Format the spanned volume. Use Windows Backup to restore the data.
Answer: E
182. One of the differences between basic disks and dynamic disks is the number of partitions (on basic disks) and volumes (on dynamic disks) that each can contain. Which of the following statements regarding this is correct?
A. Basic disks can contain a maximum of two partitions. Dynamic disks can contain a maximum of four volumes.
B. Basic disks can contain a maximum of two partitions. Dynamic disks can contain an unlimited number of volumes.
C. Basic disks can contain a maximum of four partitions. Dynamic disks can contain a maximum of 24 volumes.
D. Basic disks can contain a maximum of four partitions. Dynamic disks can contain an unlimited number of volumes.
E. Basic disks can contain an unlimited number of partitions. Dynamic disks can contain a maximum of four volumes.
Answer: D
183. You have 20 identical new pc ,except for network & vga card,all pc in the same HCL you need to Install windows 2k server in easy way? (choose two)
A. use setp manager to creat Answer File
B. copy the folder I386 to every local hard disk
C. use SYSPREP with -NOSIDGEN
D. use SYSDIFF to creat image file
E. Create UDF file
Answer: A, B
184. You are installing Windows 2000 Server on a new computer that has a single 10-GB SCSI disk. The disk controller is not included on the current Hardware Compatibility List (HCL). You start the computer by using the Windows 2000 Server CD-ROM.
When the computer restarts at the end of the text mode portion of Windows 2000 setup, you receive the following STOP error: "INACCESSIBLE_BOOT_DEVICE."
Which two actions should you take to eliminate the STOP error? (Choose Two)
A. Restart the Windows 2000 Setup by using the Windows 2000 Server CD-ROM.
B. Select Safe Mode from the Windows 2000 boot menu.
C. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
D. Install a driver for the SCSI controller from a floppy disk.
E. Use Device Manager to update the driver for the SCSI controller.
Answer: A, D
185. Your network contains Windows 2000 Professional client computers that use TCP/IP as the only network protocol. The network also contains Windows 3.1 computers that use the NetBEUI protocol.
You install a new Windows 2000 Server computer on the network. You configure this server to use NetBEUI and TCP/IP. The Windows 3.1 computers can connect to the new server and use resources located on it. However the Windows 2000 Professional client computers cannot access the new server.
When you run the ipconfig command on the new server, it returns the information shown in the exhibit.
You want to allow the Windows 2000 Professional client computers to connect to the servers.
What should you do?
A. Ensure that the server is configured to connect to a Dynamic DNS server that is authoritative for the domain.
B. Ensure that the server is able to communicate with a DHCP server that has valid addresses for the network.
C. Ensure that NetBIOS over TCP/IP in enabled in the Advanced settings for TCP/IP.
D. Ensure that a valid WINS address is configured in the Advanced settings for TCP/IP.
Answer: B
186. You configure a Group Policy Object for the marketing Organizational Unit (OU) to prevent users from accessing My Network Places and from running system in control panel. You want the Managers Domain Local group to be able to access My Network places, but you still want to prevent them from running System in control panel.
What should you do?
A. Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy.
B. Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.
C. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run system in control panel. Give the original GPO a higher priority than the new GPO.
D. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to my network places. Give the new GPO a higher priority than the original GPO.
Answer: D
187. You are the administrator of you company's network. You are configuring the security policy for a group of users in the Finance organizational unit (OU). You need to configure the group policy so that future changes to the group policy will be applied within 15 minutes to any computers that are logged on to the network.
What should you do?
A. Enable the background refresh setting to use the default group policy refresh rate.
B. Enable the asynchronous group policy application setting.
C. Enable and configure the group policy refresh interval for domain controllers.
D. Enable and configure the group policy refresh interval for computers.
Answer: D
188. You are preparing to install Windows 2000 Server on a new computer. The computer is connected to a network that includes Windows 98 computers and Windows 2000 Server computers. You want to install Windows 2000 Server from source files that are located on a server on the network.
What should you do?
A. Start the new computer by using a Windows 98 network boot disk. Connect to the network server. Run Winnt32.exe.
B. Start the new computer by using Windows 98 network boot disk. Connect to the network server. Run Winnt.exe.
C. On a Windows 2000 Server computer, use Makebt32.exe to create installation startup disk. Start the new computer by using the first disk.
D. On a Windows 2000 computer, format a floppy disk. Copy NTLDR, boot.ini, Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the disk.
Answer: B
189. You are the network administrator of a Windows 2000 network. Your network contains five Windows 2000 Server computers and 100 Windows 2000 Professional computers. You want to deploy an update for an application that is used on the Windows 2000 Professional computers.
You want uses to automatically install the update when they log on to the domain.
What should you do?
A. Create a distributed file system(Dfs). Place the application update in the root folder of the Dfs.
B. Create a Microsoft Windows installer package for the application update. Configure RIS to use the package.
C. Create a Microsoft Windows installer package for the application update. Apply the package to the local computer policy on all of the computers.
D. Create a Microsoft Windows installer package for the application update. Apply the package to a group policy.
Answer: D
190. You create and share a folder on a computer running Windows 2000 Server. The folder will be used to store documents that define corporate standards. Most employees use these files frequently. You set the shared folder permissions to allow Read access for Authenticated Users. You set the read-only attribute of each file in this folder.
How should you configure the offline folder setting for this shared folder to minimize network traffic?
A. Clear the setting Allow Caching of files in this shared folder
B. Manual Caching for Documents
C. Automatic Caching for Programs
D. Automatic Caching for Documents
Answer: D
191. You are having problems starting one of your Windows 2000 domain controllers, so you want to start the system using the Advanced Startup options.
Which two options will be unavailable when you choose Advanced Startup Options? (Choose two)
A. Safe Mode
B. Debugging Mode
C. Safe Mode with Networking
D. Last Known Good Configuration.
E. Safe Mode with Command Prompt .
Answer: A, E
192. What service is responsible for answering client computer network service requests during the OS installation using RIS?
A. TFTPD
B. BINLSVC
C. RIS service
D. DHCP
E. Active Directory
Answer: B
193. What should you use for installing multiple Windows 2000 servers with Dissimilar hardware?
A. SMS
B. Sysprep
C. Syspart
D. RIS
Answer: C
194. Which of the following sections in unattend.txt contains the ComputerName?
A. Unattended
B. UserData
C. Networking
D. Identification
E. Data
Answer: B
195. Your win2000 server computer contains four 16-gb hard disks. Disk 0 is configured as a basic disk. Disk 0 has a single 16-gb partition that contains the os files. Disk 1,2, and 3 are configured as dynamic disk in a raid-5 volume. The entire server is backed up to a tape drive each night. During your daily review of the server?s event logs, you discover that disk 1 has failed. You shut down the server and replace disk 1 with a new hard disk. When you restart the server win2000 starts normally but the data on the raid-5 volumn is inaccessible. Disk management indicates that disk 2 has failed also. You replace disk 2 with a new hard disk. Now you need to recover the data on the raid-5 volume as quickly as possible.
What should you do ?
A. use disk manager to rebuild raid-5 partition
B. delete and recreate the raid-5 partition.redtore the contents of raid-5 partition from the most recent tape back-up
C. use win2000 backup to restore the contents of disk2. Use disk manager to rebuild the raid-5 partition on disk 1
D. delete and recrate the raid-5 partition . setart the server by using win2000 setup cd, and select the repair option
Answer: B
196. A user named Kathy belongs to four global groups in Corp, a Windows 2000 domain that you manage. The global groups are GGApps, GGData, GGMgr and GGDB. The group GGApps is a member of the domain local group Apps. The group GGData is a member of the domain local group Data-Access. The group GGDB is a member of the domain local group DB-Access.
You create and share a folder on a member server of the domain. You allow the share permission Full Control for the group DB-Access, the share permission Read for the group Apps, and the share permission Change for the group Data-Access. Kathy uses a computer running Windows 2000 Professional that is a member of Corp.
What is the effective permission for Kathy when she connects to the shared folder from her computer?
A. Access is denied
B. Read
C. Change
D. Full Control
Answer: D
197. You create a stand-alone Distributed File System (Dfs) root on Srv1, a computer running Windows 2000 Server. You then add two links to the root. The links refer to shares on computers running Windows 2000 Server that are members of the same workgroup as Srv1. The servers hosting the links are named SrvA and SrvB. You want to replicate the content of the Dfs link on SrvA to SrvB.
What step or steps should you take?
A. You should create the link replica on SrvB and manually copy the contents of the share on SrvA to replica.
B. You should enable the File Replication Service on Srv1, SrvA, and SrvB
C. You should enable the File Replication Service on SrvA and SrvB
D. You should create a replica of the Dfs root on SrvB
Answer: A
198. You implement Internet Printing on a computer running Windows 2000 Server.
When a user attempts to connect to a printer using Internet Explorer 4.0, what protocol will the client computer use first?
A. Remote Procedure Call (RPC)
B. Server Message Block (SMB)
C. Internet Printing Protocol (IPP)
D. Hypertext Transport Protocol (HTTP)
Answer: A
199. You manage a computer running Windows 2000 Server and Exchange Server 5.5. You want to optimize the performance of the server.
Which setting should you enable for the File and Print Sharing for Microsoft Networks in the properties of the local area connection of the computer?
A. Maximize data throughput for network applications.
B. Minimize memory used.
C. Balance.
D. Maximize data throughput for file sharing.
Answer: A
200. You want a user to manage a computer running Windows 2000 Server on which Terminal Services are enabled in Remote Administration mode. The computer is a member of a Windows 2000 domain. You do not want this user to be a member of the Domain Admins group.
What should you do to enable the user to perform basic tasks using Terminal Services?
A. Add the user to the Server Operators group.
B. Use Terminal Services Configuration to modify the permissions of the RDP-TCP connection object.
C. Use Local Security Policy to assign rights for that computer to the user.
D. Use Terminal Services Configuration to modify the Permission Capability setting for the server.
Answer: B or C (please confirm it)
201. You enable Routing and Remote Access (RRAS) on a computer running Windows 2000 Server. You plan to use IP packet filters to manage the protocols available to remote access clients. What component of the Routing and Remote Access snap-in can you use to implement the IP packet filters?
A. The profile of a remote access policy.
B. The Properties dialog box of the remote access server.
C. The conditions of a remote access policy.
D. The Properties dialog box of the remote access ports.
Answer(s) Rank (%) Rank (# votes)
A 100% 3/3
202. You enable Routing and Remote Access (RRAS) on six computers running Windows 2000 Server in your enterprise. These computers belong to a Windows 2000 domain. You also configure one computer running Windows 2000 Server as an Internet Authentication Service (IAS) server to centralize the authentication of remote access users for the domain. You plan to govern the use of remote access by implementing remote access policies.
How should you create these policies?
A. Use the Group Policy editor to create the policies in the default domain policy.
B. Use the Group Policy editor to create the policies in a Group Policy object linked to an organizational unit (OU) that contains the computer objects for the remote access and IAS servers.
C. Use the Routing and Remote Access snap-in to create policies on the IAS server.
D. Use the Routing and Remote Access snap-in to create policies on each remote access server.
Answer(s) Rank (%) Rank (# votes)
C 100% 4/4
203. You enable RRAS on a computer running Windows 2000 Server. You want to configure a Virtual Private Network (VPN) using only Layer 2 Tunneling Protocol (L2TP), and disable the Point-to-Point Tunneling Protocol (PPTP).
What 3 steps should you take? (Choose three)
A. In the appropriate properties dialog box of the Ports node, set the Remote Access Connection (Inbound Only) check box for PPTP
B. In the properties dialog box of the Ports node, clear the Demand Dial Routing Connections (Inbound and Outbound) check box for PPTP
C. In the properties dialog box of the Ports node, set the Demand Dial Routing Connections (Inbound and Outbound) check box for PPTP
D. Set the number of PPTP ports to 1
E. In the properties dialog box of the Ports node, clear the Remote Access Connection (Inbound Only) check box for PPTP
F. Set the number of PPTP ports to 0
Answer(s) Rank (%) Rank (# votes)
B,D,E 71% 5/7
B,D,F 29% 2/7
204. You are testing a custom application on a computer running Windows 2000 Server. The application (AppA) starts 4 child processes (Proc1, Proc2, Proc3 and Proc4). Proc2 starts 2 child processes (Proc2a and Proc2b). You also have 3 other applications running on the server. You notice that the processor queue has grown to 4, and you want to eliminate the custom application.
What steps should you take to eliminate the application as quickly as possible?
A. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, set the priority to AboveNormal
B. On the Processes tab in Task Manager, select each process of the application that has a child process (AppA and Proc2). From the context menu of AppA and Proc2, select End Process
C. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, select End Process
D. On the Application tab in Task Manager, select the custom application. From the context menu of the application, select Go To Process From the context menu of that process, select End Process Tree
Answer(s) Rank (%) Rank (# votes)
D 100% 3/3
205. The X.25 link between your office and a branch office of your company is inaccessible. Both offices also have T1 lines to local Internet Service Providers (ISPs). You need to update configuration parameters for the default web site on a computer running Internet Information Services (IIS) at the branch office.
What parameter must you include in the Uniform Resource List (URL) in order to administer the site using your web browser?
A. The host header of the administration web site
B. The port number of the administration web site
C. The home page of the administration web site
D. Port 433
Answer(s) Rank (%) Rank (# votes)
B 100% 4/4
206. You create a new folder named CorpInfo on a computer running Windows 2000 Server. You share the folder. You assign the following share permissions to the folder:
"h CorpDataAdmin Full Control
"h CorpDataEntry Change
"h Joe Read
Joe belongs to the global group Support. Support is a member of the domain local groups CorpDataAdmin, CorpDataEntry and CorpUpdate.
What is Joe's effective permission to the shared folder CorpInfo?
A. Access is denied
B. Change
C. Full Control
D. Read
Answer(s) Rank (%) Rank (# votes)
C 100% 3/3
207. Your department has a custom application that your manager wants you to install on a computer running Terminal Services.
What steps should you take when you configure this application to run on the Terminal Services server?
A. Enable the RDP connection while you set up the application. After installing the application, run the command "change user / install", and edit the necessary settings in the User Interface of the application.
B. Enable the RDP connection while you set up the application. After installing the application, run the command "change user / execute", and edit the necessary settings in the User Interface of the application.
C. Disable the RDP connection while you set up the application. After installing the application, run the command "change user / install", and edit the necessary settings in the User Interface of the application.
D. Disable the RDP connection while you set up the application. After installing the application, run the command "change user / execute", and edit the necessary settings in the User Interface of the application.
Answer(s) Rank (%) Rank (# votes)
B 20% 1/5
D 80% 4/5
208. You manage a Help Desk for your company. You decide to install Terminal Services on one of your company's computers running Windows 2000 Server (SrvRC) to allow your help desk personnel to assist users via remote control. The users and the help desk personnel work on computers running Windows 98. In addition to installing the Terminal Services client on the user's computers, what steps should you take to provide the remote control capability?
A. Install Terminal Services on SrvRC and configure it to use the Application Server mode. Have the Help Desk personnel manage client computers from the terminal server's console.
B. Install Terminal Services on SrvRC and configure it to use the Remote Administration mode. Install the Terminal Services client on the computers used by the Help Desk personnel.
C. Install Terminal Services on SrvRC and configure it to use the Application Server mode. Install the Terminal Services client on the computers used by the Help Desk personnel.
D. Install Terminal Services on SrvRC and configure it to use the Remote Administration mode. Have the Help Desk personnel manage client computers from the terminal server's console.
Answer(s) Rank (%) Rank (# votes)
C 17% 1/6
B 67% 4/6
D 17% 1/6
209. Gerry has several types of computers with a variety of adapter cards on his Windows 2000 based network. The Windows-based computers are configured to use NWLink, and the non-Windows computers are configured to use IPX/SPX.
The drivers on each machine are compatible with the protocols in use on that machine, but one of the computers cannot connect to the network. You have checked the cabling and connectors on the computer, and they appear to be good.
What is the most likely cause of the problem?
A. IRQ conflicts
B. Protocol mismatch
C. Data speed mismatch
D. Frame type mismatch
Answer(s) Rank (%) Rank (# votes)
D 100% 4/4
210. Gary is creating a stripe set with parity using four physical disk drives on a computer running Windows 2000 Server. Each disk has free space available, and the least amount of free space on any disk is 250Mb.
What will be the data storage capacity of this stripe set with parity?
A. 250Mb
B. 750Mb
C. 500Mb
D. 1000Mb
Answer(s) Rank (%) Rank (# votes)
D 11% 1/9
B 89% 8/9
211. You have six physical disks, disks 0-5, attached to a computer running Windows 2000 Server.
Disk 0 contains drive C:, which has the Windows 2000 system files
Disk 1 contains Drive D:, which has the Windows 2000 boot files
Disks 2-5 comprise a stripe set with parity
For best performance, where should you place the page file?
A. Place the page file on Drive D
B. Place the page file on the stripe set with parity
C. Create a page file on both the stripe set with parity and on drive C
D. Place the page file on drive C
Answer(s) Rank (%) Rank (# votes)
D 22% 2/9
B 67% 6/9
A 11% 1/9
212. You create a stand-alone Dfs root on a computer running Windows 2000 Server. You want to attach links to the Dfs root.
What share-level permission must you have for each shared folder that you use to define a Dfs link?
A. Change
B. Full Control
C. Read
D. No permission is needed
Answer(s) Rank (%) Rank (# votes)
D 100% 4/4
213. You are the administrator of a Windows 2000 network. You have installed two shared printers for a print device on a Windows 2000 Server. Both printers are available to all users. They are shared as Admin and Executive. Admin is configured with a priority of 90, Executive is configured with a priority of 50. Now, you are advised to prevent the printer Executive to be visible to all users. Only members of the Executive group should be able to print to Executive.
What should you do?
A. Allow the Executive Group print permission only. Remove the sharename Executive and add the sharename Executive$. Reconnect all members of the Executive Group to the new sharename.
B. Install a second printer driver for the print device. Set NTFS permissions to the new driver files so that only the Executive Group is allowed to access the files.
C. Deny print permission to the Everyone Group.
D. Change the priority of Executive to 99, so that ...........
Answer(s) Rank (%) Rank (# votes)
A 83% 5/6
B 17% 1/6
214. You create a printer on a computer running Windows 2000 Server. A user reports that she has been trying to print to the network printer from an MS-DOS based application. She has been unsuccessful.
What should you do to solve this printing problem?
A. Run the application in MS-DOS Exclusive mode.
B. Increase the amount of memory given to this MS-DOS application.
C. Use the MS-DOS LPRINT command.
D. Map a physical port to the network printer at a command prompt
Answer(s) Rank (%) Rank (# votes)
D 100% 2/2
215. You enable Terminal Services in Application Server Mode on a computer running Windows 2000 Server. You install and configure three applications on the server. Five users who will run these applications using the Terminal Services client have print devices connected to USB ports on their computers. Those computers run Windows 98, and each user has local printers defined for the device connected to his or her computer.
What step should you take to allow the users to print to their local devices when running an application from the Terminal Services client?
A. Define a script to run when each user starts a Terminal Services session. Use the net use command in this script to redirect print output to the local port.
B. Log on interactively at the Terminal Services server. Run the Add Printer wizard to define a printer for each of the print devices.
C. Install the print drivers for the devices on the Terminal Services server.
D. Instruct each user to run the Add Printer wizard from a Terminal Services session to define a local printer.
Answer(s) Rank (%) Rank (# votes)
C 80% 4/5
A 20% 1/5
216. You are looking for a new driver for an application server monitor hoping to improve its resolution. However, a warning is issued when you select a driver from the Microsoft list. What procedure should you follow when selecting a monitor driver?
A. Download the latest driver for your monitor from the Microsoft site to ensure compatibility with your hardware and other Plug and Play devices on your system.
B. Download a current driver from the manufacturer for the make and model of your monitor, and install it to avoid damage to the monitor.
C. Choose to manually select the driver from the Microsoft list to assure hardware compatibility with your operating system.
D. Let the Microsoft wizard find the proper Plug and Play driver so the settings will work with other devices on the system.
Answer(s) Rank (%) Rank (# votes)
B 25% 2/8
C 12% 1/8
D 50% 4/8
A 12% 1/8
217. You manage a computer running Windows 2000 Server. You create a file in a folder on an NTFS partition of the computer. You configure the following NTFS permissions for the file:
"h Authenticated Users Read & Execute, Read
"h Accounting Full Control
"h Jack Deny Write
Accounting is a local group, Jack is a member of the group Accounting What is Jack's effective permission(s) for the file?
A. Cannot be determined - it depends on the parent folder permissions
B. Read and Execute, Read
C. No access
D. Full control
Answer(s) Rank (%) Rank (# votes)
B 83% 5/6
D 17% 1/6
218. You work on a computer running Windows NT Workstation 4.0 that is a member of a Windows 2000 domain running in mixed-mode. You want to manage the printers defined on a print server that is a member of the same domain. The print server is also configured as a Web Server and DHCP server. You need to have access to real-time information about the print devices managed by the print server.
What application can you install on your Windows NT workstation to manage the printers on the print server, as well as view the real-time print device information?
A. Adminpak.msi
B. Windows 2000 Device Manager
C. Internet Explorer 5.0
D. Directory Services Client
Answer(s) Rank (%) Rank (# votes)
C 100% 2/2
219. Your unattended setup is failing over a device that you provided a Windows 2000 compatible driver and .inf file for in the \$oem$\$1\Drivers subdirectory of the distribution folder. What did you overlook when you were preparing for the unattended installation?
A. The driver was not installed on the source computer using Sysdiff
B. The Cmdlines.txt file does not include a Rundll32.exe command
C. The [Unattended] section of the answer file must set the key OemPreinstall=Yes
D. The dosnet.inf file does not refer the incompatibility in the ServicesToDisable section
Answer(s) Rank (%) Rank (# votes)
C 100% 2/2
220. You have already created an unattended answer file using Setup Manager with 10 computers named. Before you begin the installations, you are asked if you can include three more computers. What will be required for you to include more computers in the unattended installation over the network?
A. Edit the unattend.txt file with Notepad
B. Edit the unattend.udf file with Notepad
C. Edit the winnt.sif file with Notepad
D. Edit the unattend.bat file with Notepad
Answer(s) Rank (%) Rank (# votes)
A 17% 1/6
B 67% 4/6
C 17% 1/6
221. You want to install Windows 2000 Server using NTFS on a new computer that currently has Windows 98 on a single 2Gb hard drive with a single partition. The partition is the size of the hard drive, and formatted as FAT32.
Which one of the following options for hard drive preparation is valid for this computer?
A. Install Windows 2000 over Windows 98, and run the Convert utility to create a second partition for NTFS. Use secedit commands to apply the default NTFS permissions to this converted file system.
B. Use the existing partition as the system partition for the Windows 2000 operating system, and create a second partition using the Disk Management Tool for NTFS after installation is complete.
C. Start the installation of Windows 2000 using the option to select the system partition during the installation. Run the Convert utility to create a second partition for NTFS, and apply the default NTFS permissions with secedit.
D. Repartition the hard drive, creating a partition size required for your Windows 2000 installation. Format it as NTFS, FAT32 or FAT16 during installation. Leave the remaining hard disk space to be formatted by the Disk Management Tool after installation.
Answer(s) Rank (%) Rank (# votes)
D 67% 2/3
A 33% 1/3
222. You wish to audit the activity of the accounting department's share folder for file and subfolder deletion. The share folder is on a Windows 2000 server. What steps will you take to activate this security measure?
A. Enable auditing of the Directory Service Access event in Local Policies node of the Computer Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit.
B. Enable auditing of the Delete Subfolders and Files in the Security tab of the domain object's property sheet.
C. Enable Audit Object Access event in Local Policies node of the Computer Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit.
D. Enable auditing of the Delete Subfolders and Files in the property sheet of the share in Explorer.
Answer(s) Rank (%) Rank (# votes)
C,D 25% 1/4
C 75% 3/4
223. You are the administrator of a Windows 2000 server computer named Intra. This server hosts an intranet web site for your company. The marketing department stores marketing files in a shared folder on a separate file server. The NTFS permissions on the folder are shown on this exhibit:
- Exhibit 1: Marketing users have full control
- Exhibit 2: Virtual Directory with Read, Log Visit, and Index this resource boxes checked and Write and Directory Browsing boxes unchecked
The marketing director wants to make the marketing files available to the rest of the company via internet. She wants company users to be able to read but no modify all the files. You create a new virtual directory named marketing under the intranet web site folder on Intra. You configure the virtual directory as shown some users report that they cannot access the marketing files from their web browsers. However, all users in the marketing department are able to access the files. You need to provide need acess to all company users.
What should you do?
A. Select directory browsing check box on virtual directory tab.
B. Copy files form their location on the file server to the Intra Marketing.
C. Modify NTFS permission on the file server to remove the entry for Marketing.
D. Modify NTFS permission on the file server to include an entry for Everyone: Read
Answer(s) Rank (%) Rank (# votes)
A 33% 1/3
D 67% 2/3
224. John, an employee in your company has used windows 2000 encrypting file system on his windows 2000 computer to encrypt a file that contains sensitive information. John's computer belongs to the domain that you administer. When john left the company Greg was hired for the position. You must enable greg to access the contents of the encrypted file.
Which of the following should you do?
A. Log on to john's computer by using the local administrator account and decrypt the file.
B. Back up the encrypted file restore the backup on your computer and decrypt the file.
C. Assign greg the take ownership permission for the file and let him take ownership.
D. Copy the encrypted file to a fat volume.
Answer(s) Rank (%) Rank (# votes)
A 33% 3/9
C 33% 3/9
B 33% 3/9
225. Your network has over 200 Windows 2000 Server computers. They are all members of the same domain. You have made all of the members part of the Servers Organizational Unit (OU). You have configured each Windows 2000 Server computer to audit local security events. The servers are used for different purposes, thus you have configured different servers to audit different local security events. You would now like to institute a policy that makes all of the Windows 2000 Servers have identical local security auditing policies. You must also ensure that auditing remains standardized even if the audit policy changes.
How should you do this?
A. Configure a local auditing policy on each domain controller
B. Configure a local auditing policy on each computer
C. Configure a local group policy object on each server in the Servers OU
D. Configure a domain group policy object and apply it to the Servers OU
Answer(s) Rank (%) Rank (# votes)
D 100% 3/3
226. You have just recently installed Active Directory on your corporate LAN. You currently have a single domain environment with four domain controllers and have not transferred any of the operation master roles. One day another one of the administrators removes Active Directory from the first domain controller installed into the domain. You want to ensure that changes can still be made to objects within the database.
What must you do to ensure that operations continue normally?
A. Nothing, a domain controller will automatically be promoted to the role of Primary Domain Controller (PDC).
B. Nothing, the operations master roles will automatically be transferred to another domain controller.
C. Promote one of the functional domain controllers to the role of Primary Domain Controller (PDC).
D. Transfer the operations master roles of schema master and domain naming master to one of the functional domain controllers.
Answer(s) Rank (%) Rank (# votes)
D 14% 2/14
A 64% 9/14
B 21% 3/14
227. Distributed File System (DFS) is a feature of Windows 2000 that gives administrators to ability to present a logical view of folders and files on the network without regard to their physical location. The first step in creating a DFS tree is to create the DFS root. After creating the DFS root, you then create nodes, known as "DFS links".
Which of the following statements regarding the creation of the DFS root and the DFS links are correct? (Choose all that apply.)
A. A domain-based DFS root can only be created on computers running Windows 2000.
B. A DFS root must be created on an NTFS partition.
C. A DFS root must be created on a dynamic disk.
D. DFS links can only be created on computers running Windows 2000.
E. DFS links must be created on NTFS partitions.
F. DFS links must be created on dynamic disk.
Answer(s) Rank (%) Rank (# votes)
A 56% 5/9
B,C,D 33% 3/9
B,C,D,E 11% 1/9
228. As you migrate to Windows 2000 it is important to consider whether you wish to make resources available to your users through Active Directory. This will allow your users to query Active Directory and locate the resources based on various characteristics.
On your network you have a machine running Windows 2000 Server. This machine is a member of an Active Directory domain named acme.com. You decide to install a printer named HPLaser5 on the server. You also decide to share out a folder named AcctInfo.
Assuming the default settings, which of the following statements would be correct?
A. Both the printer and the shared folder will be published in Active Directory.
B. Only the printer will be published in Active Directory. You will have to manually publish the shared folder in Active Directory.
C. Only the shared folder will be published in Active Directory. You will have to manually publish the printer in Active Directory.
D. Neither the printer nor the shared folder will be published in Active Directory. You will have to manually publish both in Active Directory.
Answer(s) Rank (%) Rank (# votes)
B 100% 3/3
229. As the person in charge of administration for the Marketing Department you have been given Full Control to a folder called Marketing which contains numerous subfolders and files that consist of data for the department. The Marketing folder is a subfolder of a parent folder named Departments. Other subfolders of Departments include Customer Service, Finance and Sales. The directory structure looks like this: http://www.2000tutor.com/images/folders.gif
You have configured the permissions properly for the Marketing department to only allow certain individuals the appropriate permissions. However, when you come into work one day you notice that the permissions have been changed to the Marketing folder and the subfolders and files contained within it. The administrator of the Finance department also complains that permissions have been changed to the Finance folder and its contents. You suspect that someone has modified the permissions to the Departments and that the permission assignments have propagated down to your folders.
What is the best way to prevent this from happening in the future?
A. Check the "No Override" box for the Departments folder.
B. Clear the "Allow inheritable permissions from parent to propagate to this object" check box for the Departments folder.
C. Check the "No Override" box for the Marketing folder.
D. Clear the "Allow inheritable permissions from parent to propagate to this object" check box for the Marketing folder.
E. Locate all user accounts that have the Change Permissions or Full Control permission allowed for the Departments folder and change the permission to "Deny".
Answer(s) Rank (%) Rank (# votes)
B 43% 6/14
D 57% 8/14
230. You have an accounting application that you want to be available to all people in the Accounting department. All of the members of the department occupy the fifth floor of your office. The computer accounts for all of the computers on that floor are located in an organizational unit (OU) called Accounting. However some of the user accounts for the members of the Accounting department are located in other OUs besides the Accounting OU such as the Accounting Manager who is located in the Managers OU.
You would like to have the accounting application available to all users in the department when they log in from a computer on the fifth floor.
What would be the best way to configure this?
A. Create a GPO and link it to the domain. Publish the application to computers within the domain. Filter the GPO to apply only to the computers in the Accounting OU.
B. Create a GPO and link it to the domain. Publish the application to users within the domain. Filter the GPO to apply only to the users in the Accounting OU.
C. Create a GPO and link it to the Accounting OU. Publish the application to computers within the OU.
D. Create a GPO and link it to the Accounting OU. Assign the application to computers within the OU.
E. Create a GPO and link it to the Accounting OU. Publish the application to users within the OU.
F. Create a GPO and link it to the Accounting OU. Assign the application to users within the OU.
Answer(s) Rank (%) Rank (# votes)
D 60% 3/5
E 40% 2/5
231. Your Windows 2000 server is configured with four 30 GB hard drives (Disk 0, Disk 1, Disk 2 and Disk 3). All of the disks are dynamic disks. You have the operating system installed to a 5 GB partition on Disk 0. You currently do not have any other data stored on the disks.
You would like to provide fault tolerance for the operating system files in the event that the disk that the operating system is installed to fails. In addition, you will be storing data on the remainder of the disk subsystem. You would like to maximize performance but are not concerned about fault tolerance for this data.
Which of the following would provide the best solution?
A. Back up the boot and system partitions. Configure all four of the disks to be a RAID-5 volume. Restore the boot and system partitions to the RAID-5 volume.
B. Mirror the boot and system partitions to Disk 1. Configure a RAID-5 volume using the remaining 25 GB on Disk 0 and Disk 1 and 25 GB from Disk 2 and Disk 3.
C. Mirror the boot and system partitions to Disk 1. Configure a striped volume using the remaining 25 GB on Disk 0 and Disk 1 and 25 GB from Disk 2 and Disk 3.
D. Back up the boot and system partitions. Configure all four of the disks to be a striped volume. Restore the boot and system partitions to the striped volume.
Answer(s) Rank (%) Rank (# votes)
C 100% 3/3
232. Your company's network consists of a single native-mode domain. Within the domain you have Organizational Units (OUs) for Sales, Marketing and Finance. Each of the OUs has a person that has responsibility for the OU and has been given full administrative control over it.
At the domain level you have configured a policy called Mandatory that contains certain desktop restrictions and security settings that you would like to have applied to all users in the domain regardless of which organizational unit they are located in. However you find that user objects located in the Sales OU are receiving different settings than those specified in the Mandatory policy. You suspect that a policy (named "SalesSettings") created by the administrator of the Sales OU is causing this problem.
What can you do to ensure that the settings in the Mandatory policy are received by all users in the domain?
A. Set the link for the Mandatory policy at the domain level to No Override.
B. Set the link for the SalesSettings policy at the OU level to No Override.
C. Set the domain to Block Policy Inheritance.
D. Set the Sales OU to Block Policy Inheritance.
E. Enable loopback processing mode for the Mandatory policy.
F. Enable loopback processing mode for the SalesSettings policy.
Answer(s) Rank (%) Rank (# votes)
A 100% 2/2
233. Melissa is monitoring the behaviours of one of the servers on her company's network. She notices that disk space on the D: drive is getting low. In order to remedy this, she decides to extend the volume to add additional free space. However when she attempts to perform this action she is unsuccessful. The computer has the following configuration:
-Windows 2000 Server (upgraded from NT 4.0 Server)
-One Dynamic disk (converted from a basic disk)
-Two simple volumes (C: and D:) both formatted with the NTFS file system (converted from the FAT file system)
-C: drive is the active partition and the boot partition
-4 GB of unpartitioned free space on the disk
What is the most likely reason why Melissa is unable to extend the D: drive?
A. The volume that Melissa is attempting to extend was initially formatted with FAT file system. In order to extend a simple volume it must have been initially formatted with the NTFS file system.
B. The volume that Melissa is attempting to extend is located on a disk that was initially a basic disk. In order to extend a simple volume it must be located on a disk that was initially created as a dynamic disk.
C. The volume that Melissa is attempting to extend contains the operating system files. You cannot extend a simple volume that contains the operating system files.
D. The volume that Melissa is attempting to extend has already been extended before. You may extend a volume only one time.
Answer(s) Rank (%) Rank (# votes)
B 64% 7/11
D 9% 1/11
C 27% 3/11
234. Your Windows 2000 Server computer has the following configuration:
-One physical hard disk configured as a basic disk-One partition (C:) formatted with the FAT file system
You would like to support disk quotas and the Encrypting File System (EFS) on your computer.
What must you do to allow this?
A. Convert the disk from a basic disk to a dynamic disk.
B. Convert the C: drive to the FAT32 file system.
C. Convert the C: drive to the NTFS file system.
D. Format the C: drive with the FAT32 file system.
E. Format the C: drive with the NTFS file system.
Answer(s) Rank (%) Rank (# votes)
C 100% 5/5
235. Encrypting File System (EFS) provides an additional measure of security for confidential documents on your network.
Which of the following statements about EFS are true? (Choose all that apply.)
A. Users can share encrypted files.
B. Encrypted files can become decrypted if the user copies or moves the file to a FAT volume.
C. System files and compressed files can be encrypted.
D. Encrypting a folder or file does not protect against deletion. Anyone with delete permission can delete encrypted folders or files.
E. Only files and folders on NTFS volumes can be encrypted.
Answer(s) Rank (%) Rank (# votes)
B,D,E 100% 5/5
236. You currently have two Terminal Servers in your company named TServer1 and TServer2. Both of the servers are running Terminal Services in application server mode. You would like to configure the Terminal Servers so that all Authenticated Users have access to TServer1 but only members of the Finance group have access to TServer2.
What could you do to allow only members of the Finance group to access TServer2 while still allowing other users to access TServer1?
A. From the Terminal Service Configuration utility, choose the connection for TServer2 and configure the permissions so that only the Finance group has the ability to access the server.
B. In the Terminal Services Profile tab in a user's properties, disable the option for "Allow logon to Terminal Services" for all users that are not members of the Finance group.
C. Enable Terminal Services in remote administration mode on TServer2.
D. Change the configuration for TServer2 so that all users other than members of the Finance group have only guest access.
Answer(s) Rank (%) Rank (# votes)
A 100% 3/3
237. You are the Administrator of windows 2000 server computer. The computer is configured to have a single 18 GB drive which contains the operating systems (OS) files. This drive also contain a share folder where 5 network users store there MS excel files. You want to prevent each network user from using more than 1 GB of space in the shared folder.
Which action or actions should you take to achieve this goal? (Choose all that apply)
A. Create a quota entry for everyone account. Set the quota limit to 1 GB.
B. Enable disk quotas on the volume.
C. Set default quota limit to 1 GB.
D. Select the deny disk space to users exceeding quota limit check box.
E. Upgrade the disk to a dynamic disk.
Answer(s) Rank (%) Rank (# votes)
B,C,D 57% 4/7
A,B,D 43% 3/7
238. You have an application server named App1. On this server you have many custom built programs. All of these programs are launched as a service on startup. You have one program that is called Finance. This application is critical to your Accounting department. You find that the Finance program is making App1 unstable due to errors in the program code. You want to have App1 run stable until the code errors are fixed. What should you do? (Not exactly word for word, but you get the idea. It was worded bad on the exam too)
A. Open Task Manager and run the Finance application as /BelowNormal
B. Open Task Manager and run the Finance application as /Low
C. Don't remember - It was wrong
D. Open Services and change the startup type from Automatic to Manual
Answer(s) Rank (%) Rank (# votes)
D 57% 4/7
B 43% 3/7
239. You are planning the installation of windows 2000 server on a new computer that has four 50-GB hard disk drives installed. You want windows 2000 setup to create a single partition on disk 0 of the largest possible size and to install the operating system on the partition. After windows 20000 has been installed you also want to configure the remaining three disks in such a way that the maximum amount of space on all four disks can be accessed from a single drive letter.
Which of the following methods should you use to achieve your objectives?
A. On disk0 create a 4 GB fat16 partition during setup. Use disk management to covert all four disks to dynamic disks and combine unallocated space on all four disks into a single spanned volume.
B. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to create a single 50 GB ntfs partition on each of the remaining disks and then mount each partition to a separate empty folder on disk 0.
C. On disk 0 create a 32 FB fat32 partition during setup. Use disk management to convert all four disks.
D. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to convert all four disks to dynamic disks and then extend the simple volume on disk 0 to include all of the remaining disks into a single striped volume.
Answer(s) Rank (%) Rank (# votes)
B 100% 3/3
240. You are the administrator of a Windows 2000 workgroup at Awesome computer. Users currently do not have access to the internet.you want to all users to be able to access the Internet by using MEM3.
Which three are correct? (choose three)
A. Configure the appropriate DHCP scope options on MEM2
B. Anable ICS on MEM3
C. Install and configure Windows 2000DNS server on MEM2
Answer(s) Rank (%) Rank (# votes)
A,B,C 100% 1/1
241. Your network contains two routed subnets: Subnet A and Subnet B. Subnet B contains a Windows 2000 server configured as a DHCP server. This server has scopes created for both Subnet A and Subnet B. Subnet A does not contain a DHCP server.
The clients on Subnet A are not receiving IP addresses from the DHCP server.
What can you do to enable clients in Subnet A to receive dynamically assigned IP addresses? (Choose all that apply)
A. Configure an RFC 1542-compliant router to forward BOOTP messaging between subnets.
B. Configure an RFC 1560-compliant router to pass all UDP traffic on ports 2151, 2152, 2153 and 2154.
C. Install and configure a DHCP server on Subnet A.
D. Configure the clients on Subnet A to use H-node NetBIOS name resolution.
E. Configure a DHCP relay agent on Subnet A to forward DHCP messages to Subnet B
F. Create a superscope on the DHCP server in Subnet B which contains both the scope for Subnet A and the scope for Subnet B.
Answer(s) Rank (%) Rank (# votes)
A,E 67% 8/12
A,C,E 25% 3/12
F 8% 1/12
242. You configure a local group called Accounting and create a mandatory profile for the group. The profile include a logo saved with 16 bit colour and 1024 x 768. Some pcs in Accounting have a standard VGA adapter while others have a SVGA adapter. 4 users say the bitmap is distorted and display the wrong colour depth. You want these users to view it correctly.
What to do?
A. Configure a roaming profile.
B. Configure a seperate profile for each user.
C. Change to 16 bit 640 x 840 and reconfigure.
D. Reinstall appropriate WDM compliant drivers for pcs that do not display the bitmap correctly
Answer(s) Rank (%) Rank (# votes)
A 25% 1/4
C 75% 3/4
243. A W2K server has 2 disks attached to an EIDE. You need additional space. You add a new scsi disk controller that has 6 new disks attached. the new controller is not included on the current HCL. When you restart you computer, W2K does not detect the new controller.
What do you do? (Choose 2)
A. Use device manager to turn of the IRQ steering in the properties of the standard pc
B. Use the disk manager to restore the basic configuration. Restart the pc.
C. Use the add/remove hardware wizard to add a new scsi and raid controller supplied by the manufacturer
D. Use disk management to rescan the disks
E. Use the manufacturer?s setup program to install the driver for the scsi disk controller
Answer(s) Rank (%) Rank (# votes)
A,E 17% 1/6
C,E 83% 5/6
244. You have a new modem on a W2K server. When you restart the computer W2k detects the modem and installs the default drivers. Occasionally the modem stops communicating with your ISP and you have to restart. You download an updated driver for the modem and save it to your winnt folder.
What do you do next?
A. In the property sheet for the modem device you click on the UPDATE DRIVER command button
B. Use device manager to search for hardware changes
C. use device manager to delete the modem, the restart the pc
D. move new driver to the winnt\drivercache folder, restart your pc
Answer(s) Rank (%) Rank (# votes)
A 100% 7/7
245. You have a HP printer using JetDirect driver on your network, the user will print the package label with this Printer. It is configured to use HPCL. Later, your user complained about the slowness in printing the package labels.
what should you do then?
A. HPCL -> RAW
B. HPCL -> Postscript
C. Add another HP printer, blah, blah
D. Add another 3 HP printer, blah, blah
Answer(s) Rank (%) Rank (# votes)
B 67% 2/3
A 33% 1/3
246. Both of your domains are Active Directory domains that run in native mode.
How can you see a list that shows which users are allowed to use remote access to your network ??
A. Create a group named RAS_USERS. Add users who are permitted to dial in to the network. Create a remote access policy that allows this group to use the remote access server. Display the members of the group .
B. Create a group named RAS_USERS. Add users who are allowed to dial into the network. Set the remote access permissions for this group to allow access. To show who has access to the remote access server display the members of the group.
C. Write a script for the windows scripting host in the script through the members of the users container. Display the name of any user who has the remote access permission set to allow access.
D. Use the default remote access policy to users and groups who have been granted remote access permissions.
Answer(s) Rank (%) Rank (# votes)
C 25% 1/4
A 75% 3/4
247. You are the administrator of a high security network. Many files stored on your Windows 2000 file servers and Windows 2000 Professional computers are highly confidential. You want to implement identical security configurations on all Windows 2000 file servers and Windows 2000 Professional computers.
What should you do? (Choose all that apply)
A. Configure Group Policies to apply the security configuration to all Windows 2000 file servers and Windows 2000 Professional computers.
B. Use the Security Configuration Management Console to import security information from a file server as a template.
C. Use the Security Configuration Management Console to import security information from a Windows 2000 Professional Computer as a template.
D. Use Secedit to export the security configuration to all file servers.
E. Use Secedit to export the security configuration to all Windows 2000 Professional computers.
Answer(s) Rank (%) Rank (# votes)
A,B,C 33% 1/3
A,D,E 67% 2/3
248. You are the administrator of 20 Windows 2000 Professional computers and 2 Windows 2000 Server computers for your domain. You want to set an account policy that locks any user account after 3 failed logon attempts. You also want to ensure that only administrators will be able to unlock the account.
What should you do? (Choose 2)
A. Set the account lockout duration to 0.
B. Set the account lockout duration to 3.
C. Set the account lockout threshold to 0.
D. Set the account lockout threshold to 3.
E. Set the reset account lockout after to 0.
F. Set the reset account lockout after 3.
Answer(s) Rank (%) Rank (# votes)
A,D 100% 6/6
249. You wish to setup a domain policy to have passwords expire in 30 days. You wish to setup a local computer policy to have passwords expire in 90 days. (Choose two)
A. Set Domain Policy for password expiration in 30 days.
B. Set Domain Policy for password expiration in 90 days.
C. Set OU for password expiration in 30 days.
D. Set OU for password expiration in 90 days.
E. Set Local Computer Policy for password expiration in 30 days.
F. Set Local Computer Policy for password expiration in 90 days.
Answer(s) Rank (%) Rank (# votes)
B,E 25% 1/4
A,F 75% 3/4
250. Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only.
What should you do?
A. Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy.
B. Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy.
C. Set a Group Policy on all OUs containing computer accounts to enable the passwords must meet complexity requirements policy.
D. Set a Group Policy on all OUs containing user accounts to enable the passwords must meet complexity requirements policy.
Answer(s) Rank (%) Rank (# votes)
A 50% 5/10
B 40% 4/10
C 10% 1/10
|
Click here to see what other people are
saying about MCSE braindumps
|
MCSE Simulations
| MCSE Hands On Labs |
|
|
Success Stories
| Success Stories about MCSE Braindumps |
|
|
|