OMRAN'S CERTIFICATIONS
HQ

MS
PSYCHOLOGY
B4
THE EXAM
FREE
EXAMS
NT
TIPS, TIPS
OPTIMIZATION
NT
DRIVERS
NT
TOOLS
ARTICLES
COMPAQ ASE
CCIE-CISCO
NOVELL EXAMS
A+
CERTIFICATE
DRIVERS HEAVEN
WIN98
UTILITIES
FREE BIES
FREE
JAVA
FREE
GRAPHICS
FREE COUNTERS
FREE
GAMES
FREE
BANNERS
JOBS
AND JOBS
POST UR RESUME
AWARDS
MISC
LINKS AND LINKS
MAIL
VIEW-GUEST-BOOK
SIGN-GUEST-BOOK
HOME

|
Install and Admin 2000 Server
Number: 70-215, Questions:
, Passing Score: , Time: .
Testing: Standard
name = Enjoyyyyyyyyyyyyyyyyyy 70-215
exam = 70-215
Enjoyyyyyyyyyyyyyyyyyyyy
Hai Friends
Got 960 today
I have complied all possible dumps.
I have gone through the dumps since the Ultimate dump was submitted. I have compiled all of the questions submitted since Ultimate that are purported to be test questions that also included answers. Some of the questions have more than one answer since I personally disagree with the answers of the person who submitted them.I would appreciate anyone interested to look over the questions and answers. If you disagree with any answers please post your opinions on the discussion forum. I will assess all of the responses and try to come up with a set of the best answers possible.If you have any other questions and answers purported to have been seen on the tests, please submit them or send to me also. I will do the same.Also included in my set are some ClonePony questions that someone said they disagree with.If you have an opinion about any of them, please submit or send me your opinions.This should bring the set of reported test questions up to date.Below are my set of new questions and disputed CP questions-13 New Questions
1.You have 20 identical new pc ,except for network & vga card,all pc in the same HCLyou need to install windows 2k server in easy way? (take 2)A. use setp manager to creat Answer File B. copy the folder I386 to every local hard disk C. use SYSPREP with –NOSIDGEN D. use SYSDIFF to creat image file E. Create UDF file I THINK AND SURE THE ANSWER IS: A & B BECASE : IF YOU USE SYSPREP HERE NO NEED TO OTHER ONE AND WORK IF ALL IDENTICAL 100% SYSDIFF WORK IN NT4 NO NEED TO UDF FILE BECAUSE ALL PC IDENTICAL2. You have a HP printer using JetDirect driver on your network, the user will print the package label with this Printer. It is configured to use HPCL. Later, your user complained about the slowness in printing the package labels. what should you do thenA. HPCL -> RAW B. HPCL -> Postscript C. Add another HP printer, blah, blah D. Add another 3 HP printer, blah, blah I select B3. You configured a RAS server, you want to accept only connect which speed is faster than 64kbps, and you want to use mutual authentication. (select 3)A. RADIUS provider B. Windows Authentication provider C. to allow IDSL mediaD. to allow Async media E. EAP F. MS CHAP G. MS CHAP v2 I select A, C, E4. You intall a new USB mouse, then restart the computer, but the mouse is not responding. You confirm that the mouse driver is correctly installed and other USB devices are working correctly. What should you do then?A. Enable mouse port in BIOS B. Unplug the mouse, restart computer, Plug the mouse againC. US Add/Remove Hardware Wizard to scan D. use Device Manager to enable USB mouse in the current profile E. use Device Manager to enable mouse port in the current profile I select C5. You will be shown a network exhibition configured with 5 sites connected to internet. Each configured with VPN. You want two sites, Miami and Chicago to be able to connect to each other. What should you do?A. Configure Miami VPN client Configure Chicago VPN server B. Configure Miami VPN server Configure Chicago VPN clientC. Configure Miami VPN client, server Configure Chicago VPN client, server D. Configure Miami VPN server Configure Chicago VPN server I select D,I think it is C- SeeUltimate 1177. You have a HP printer with DLC protocol. After you removed the printer to another segment, users can not get print job done. What to do ?A. Set up DHCP server for the printer B. Change to LDR protocol C. Delete and recreate the printer with DLC connection D. ???From technet: DLC cannot be used to connect to printers on the far side of a router. My answer: C. Since the printer’s static IP address is changed, you should recreate a DLC printer with the new IP address and same protocol DLC. 8. You are the administrator of a Windows 2000 Network. You want to upgrade 50 NT Server machines to W2K 2000 and place them in a single domain. The domain includes 300 member client computers consisting of 200 Windows Professional computers and 100 NT workstation computers. You implement GPO's for each OU. However, you want to restrict users of the W2K Professional computers from accessing registry editing tools. What should you do?A) Create an OU that contains all win nt users and computers Create a GPO in the OU that restricts users from accessing registry editing tools B) Create a NT system policy file on the W2K domain controller Configure the policy so that it restricts default users from accessing registry editor toolsC) Create a mandatory user profile for the win nt users that removes any shortcuts or registry editor and system policy editor from each users desktop D) Create a NT System policy file that restricts default users from accessing registry editing tools. Save the system policy to each users home folder.My choice was D- I question this since the policy is supposed to apply to the W2k pro computers and all of the answers refer to win nt policies, users and computers.9. You are the administrator of a W2K active directory network. Network consists of a single domain named adatun.loca. that runs in native mode. The domain includes 500 member client computers consisting of 200 W2K professional computers and 300 NT 4 computers. You create a group policy for the research OU and configure as shown. (Exhibit shown) Restrict users so they can’t change the desktop wallpaper.A) add a new computer to the OU and select ALLOW PRE-2000 to use the account B) Change the group policy so that it hides the backgrounds C) Create a seperate group policy for a nested OU that contains all WinNT computers D) Configure a nt policy file and place it in the in nt\systool\admin.local\scripts folder. My choice was B10) You install W2K on a computer that contains two 8gb hard disks. Each disk is partitioned as a single primary partition and is formatted fat32. During installation, you convert the second disk to ntfs. You install system files on the second desk. You create shared folders on both disks. To conserve disk space, you compress the shared folders on the first disk. The files lose their compression attributes. You want to ensure that all the files moved from the folders on the second disk to the shared folders on the first disk will be compressed. Choose 2:A)format the first disk as ntfs B)convert the first disk to ntfs C)convert both disks to dynamic disksD)convert the fist disk to dynamic disks E)compress the shared folders on the first diskMy answer was B and C- I disagree. I choose B and E. When you move folders from one disk to another they lose their compression attributes. Therefore, after converting the disk to ntfs, you have to compress the folders.11)You have a new modem on a W2K server. When you restart the computer W2k detects the modem and installs the default drivers. Occasionally the modem stops communicating with your ISP and you have to restart. You download an updated driver for the modem and save it to your winnt folder. What do you do next?A) In the property sheet for the modem device you click on the UPDATE DRIVER command buttonB) Use device manager to search for hardware changes C) use device manager to delete the modem, the restart the pc D) move new driver to the winnt\drivercache folder, restart your pc I chose A12) A W2K server has 2 disks attached to an EIDE. You need additional space. You add a new scsi disk controller that has 6 new disks attached. the new controller is not included on the current HCL. When you restart you computer, W2K does not detect the new controller. What do you do? Choose 2:A) Use device manager to turn of the IRQ steering in the properties of the standard pc B) Use the disk manager to restore the basic configuration. Restart the pc. C) Use the add/remove hardware wizard to add a new scsi and raid controller supplied by the manufacturer D) Use disk management to rescan the disks E )Use the manufacturer’s setup program to install the driver for the scsi disk controller I chose C & E***(This question is in ClonePony , I'm just explaining it better here according to what was on the exhibit in my test)***41. You are installing a new computer named Svr2.justtogs.com on your Windows 2000 network. Part of the network is shown in the exhibit. You want to enter the appropriate TCP/IP addresses for the subnet mask and the default gateway for Svr2.justtogs.com. Which subnet mask and default gateway should you use? To answer, drag the appropriate addresses to the appropriate boxes in the Internet Protocol (TCP/IP) Properties dialog box.10.1.10.65/16 10.1.10.100/16 w.z.y.z________________ _______| Svr2.justtogs.com |-----------------------------| Router |----------------Something else here--------------------- ---------Answer: The first router on your computer subnet will be your default gateway and subnet. The IP scheme and subnet will match yours, the router will be configured to route the request out to the network you are looking for. Example Svr2 has an IP of 10.1.10.65/16 the router will have more than one address assigned but yours will be 10.1.10.100/16. Yours selections will be for Default Gateway - 10.1.10.100; and for Subnet Mask - 255.255.0.0.***(I disagree with the answers in ClonePony for this next question)***71. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?A. Restart the computer by using the last known good menu option. B. Perform an emergency repair and select fast repair, restart the computer. C. Restart the computer in the safe mode, remove the driver and restart the computer. D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver. I chose CExplanation: The scenario here depicts that you were able to logon to the system and after that it crashed. The easiest and fastest way to get this system up and running again is by using the Safe Mode (answer C.) Read Best practices and Recovery Options (Overview) on Windows 2000 Server Help, you do the Advanced Options first before doing Recovery Console.
.4. Mon1 server running 3rd party network software:a) Install SNMP in TCP/IP installation tab on ALL CLIENTS except Mon1 b) Install SNMP in TCP/IP installation tab on Mon1 ANS: B (refer MS press 70-216(pg 95))PRINTING5. You share a printer name Telesales on win2000 server. The printer will be used to print packing Labels for order processed by 300 sales person. The printer is HP laser 5000N that have HP Jet direct device on board. The packing labels are printed by using PCL. User said printer is too slow. You want maximize the number of packing label printed in a specified time. What ‘s you do?A: modify property of Telesales printer. Set default data type for sales set RAW. B: change packing label to use the post script page description language instead of PCL. C: use second HP printer to network. Let Telesales to print in both printer. D: attach 3 post script laser printer device to network. ANS: B6. You have a HP printer with DLC protocol. After you removed the printer to another segment, users can not get print job done. What to do ?A. Set up DHCP server for the printer B. Change to LDR protocol C. Delete and recreate the printer with DLC connectionD. ??? ANS: C. Since the printer’s static IP address is changed, you should recreate a DLC printer with the new IP address and same protocol DLC.7. You configure a HP jet direct network printer device on your window 2000 domain srv2 on sales.juttogs.com. This is connected to the TCP/IP port to the print device. However, when you enter IP address of the device, you receive the dialog box in the printer port wizard. See diagram show:srv2 ip: 10.1.10.35. gateway 10.1.10.100/16HP printer jet direct Ip: 10.4.20.200/16Router Ip: 10.5.20.100/16Another diagram : A: Select HP Jet Direct from standard drop-down list.B: Select the custom option button, click setting command button and than LPR printer. C: Change IP of the printer device to 10.5.20.200 D: Change subnet mask of the print device to 255.0.0.0 E: Change default gateway on Srv2.sales.jottom.com to 10.5.20.100. ANS: C (I had this on exam; scored 1000)RAS9. You configured a RAS server, you want to accept only connect which speed is faster than 64kbps, and you want to use mutual authentication.(select 3)A. RADIUS provider B. Windows Authentication provider C. to allow IDSL media D. to allow Async media E. EAP F. MS CHAP G. MS CHAP v2 ANS: B, C & G10. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. The computer is a member of a Windows 2000 domain running in native mode. You configure this computer as a RAS server. You want to configure RAS so that only members of the domain local group RAS-Access can establish a dial-up connection to the RAS server.What step or steps should you take to limit access to only this group? Select all that apply.A. Configure the incoming connections on the RAS server for MS-CHAP authentication only. Configure the client computers to use MS-CHAP for the outgoing connections. B. In Active Directory Users and Computers configure the Dial-in settings of the group RAS-Access to allow remote access C. Delete the default remote access policy on the RAS server. Create a new remote access policy. Create a condition in the policy that grants remote access permission only to the group RAS-Access D. Delete the default remote access policy on the RAS server. Create a new remote access policy. Define the remote access profile settings to grant remote access permission only to the group RAS-Access ANS: A, C Reason: I try to do it on server. B is worng, because there are not dail-in settings tab on Group. 11. You enable Routing and Remote Access (RRAS) on six computers running Windows 2000 Server in your enterprise. These computers belong to a Windows 2000 domain. You also configure one computer running Windows 2000 Server as an Internet Authentication Service (IAS) server to centralize the authentication of remote access users for the domain. You plan to govern the use of remote access by implementing remote access policies. How should you create these policies?A. Use the Group Policy editor to create the policies in the default domain policy. B. Use the Group Policy editor to create the policies in a Group Policy object linked to an organizational unit (OU) that contains the computer objects for the remote access and IAS servers. C. Use the Routing and Remote Access snap-in to create policies on the IAS server. D. Use the Routing and Remote Access snap-in to create policies on each remote access server. Answer: C (others say D, but I say C per IAS white paper)13. You are the network administrator at Humongous Insurance, a major insurance company that has 1,000 offices worldwide. You are configuring the network so that only the sales staff can connect to it from home. Your Windows 2000 forest contains a member server named Server1 that has Routing and Remote Access for Windows 2000 enabled. You configure Server1 to use a modem bank to accept incoming dial-up attempts. You configure Server1 to use Windows Authentication as the authentication provider. The only supported authentication method is MS-CHAP version 2. You need to restrict access to Server1. What should you do?a. Create an organizational unit (OU) named "Sales_Staff. Populate Sales_Staff with the sale staff user accounts. Provide access to this OU by using the Client-Friendly-Name attribute of the default remote access policy.b. Create an organizational unit (OU) named "Sales_Staff. Populate Sales_Staff with the sale staff user accounts. Provide access to this OU by using the Windows-Groups. ANS: A (I had this on exam; scored 1000)VPN14. You will be shown a network exhibition configured with 5 sites connected to internet. Each configured with VPN. You want two sites, Miami and Chicago to be able to connect to each other. What should you do?A. Configure Miami VPN client Configure Chicago VPN server B. Configure Miami VPN server Configure Chicago VPN clientC. Configure Miami VPN client, server Configure Chicago VPN client, server D. Configure Miami VPN serverConfigure Chicago VPN server ANS: A, B (each must be VPN server & client)15. You need to ensure that only authorized remote connections are posible on your W2K network. You create a policy named Required L2TP on the RRAS, the settings for this policy and the policy order are shown in the exhibit. You test the VPN connections and discover that for the SueJ user the connection is made through a lower security PPTP tunnel rather L2TP. Sue's dial-in properties are shown in SueJ properties exhibit. All other port, policy and server settings are the default settings for a VPN server. You want to ensure that the server will deny all PPTP conections. Which two actions should you take?A. Change the required L2TP policy properties to deny remote access permission. B. Change the dial-in properties of the SueJ user account to control access through remote access policy. C. Remove all PPTP ports from the server. D. Remove the allow access if dial-in permissions enabled policy from the server.E. Remove all but one PPTP port from the server and deny both inbound and outbound connections on that port. ANS: B & "remove Allow authenticated connection policy in RAS" (I had a similar question with different options that made sense; answer was clear) USB17. You installed a new USB mouse and after restarting your computer your mouse does not work. You confirm the correct drivers are installed and other USB devices work fine.a. enable mouse port in BIOS b. enable mouse in your hardware profile c. unplug mouse, restart, and plug in mouse d. don't remember (He did't remember, hopefully a wrong answer)e. don¡¯t remember ANS: A (dumps say A and B; verify for yourself)19. You have a local Win 2000 network setup as a Workgroup. There are several Win 2000 remote sites also setup as a Workgroup. The remote sites connect to local resources by direct dial modems. Member1 is a server on the local network, it has two adapters, adapter1 is an NIC to the local network and Adapter2 is an NIC connected to a DSL modem which is connected to the Internet. You install ICS on Member1 to allow local network to have Internet access. After install, remote sites are unable to view local resources and local users are still not able to connect to the Internet. Choose one to correct problem:A. Install ICS on Adapter1. B. Install ICS on Adapter2.C. Install NAT D. Install Proxy Server on local network. ANS:C20. Your workgroup consists of two Win2K server and 10 Win2k Pro. Each Win2K Pro dials up to Internet separately and has own dialup settings. You purchase a DSL line. You install ICS on a Windows 2000 server and disconnect all win2kPro connections. The Win2Kpro users can not connect to Internet when they dial up. You should not change (many) dialup settings on Win2K Pro. What should you do on each Win2K Pro?A. In Internet options, select Never dial a connection B. In LAN settings: select automatically detect settings C. In LAN settings: select automatic configuration script. D. In LAN settings, select use a Proxy server. ANS: A (I think B too).HARD DISKS21. Your win2000 server computer contains four 16-gb hard disks. Disk 0 is configured as a basic disk. Disk 0 has a single 16-gb partition that contains the os files. Disk 1,2, and 3 are configured as dynamic disk in a raid-5 volume. The entire server is backed up to a tape drive each night. During your daily review of the server’s event logs, you discover that disk 1 has failed. You shut down the server and replace disk 1 with a new hard disk. When you restart the server win2000 starts normally but the data on the raid-5 volumn is inaccessible. Disk management indicates that disk 2 has failed also. You replace disk 2 with a new hard disk. Now you need to recover the data on the raid-5 volume as quickly as possible. What should you do ?A. use disk manager to rebuild raid-5 partition B. delete and recreate the raid-5 partition.redtore the contents of raid-5 partition from the most recent tape back-up C. use win2000 backup to restore the contents of disk2. Use disk manager to rebuild the raid-5 partition on disk 1 D. delete and recrate the raid-5 partition . setart the server by using win2000 setup cd, and select the repair option ANS: B22. You have a Windows 2000 Server and has 2 disk drives attached to the IDE controller. You want more space so you add a new SCSI Controller with 6 disks. The SCSI controller is not in the HCL. You restart the server but it's not dectected. What should you do? (Choose 2)A. Use Device Manager to turn off IRQ steering in the Properties of the Standard PC. Restart B. Use Disk Management to restore the asic configuration. Restart C. Use Add/Remove Hardware wizard to add new SCSI & RAID controller from the disk of the manufacturer. D. Use Disk Management to rescan disk E. Use Manufacturer's setup program to install the drivers for the SCSI disk controller. ANS: C,E23. You are installing Windows 2000 Server on a new computer that has a single 10-gb scsi disk. The disk controller is not included on the current Hardware Compatibility List (HCL). You start the computer by using the Windows 2000 Server CD-Rom. Then the computer restarts. At the end of the text mode portion of Windows 2000 Setup, you receive the following STOP error: "INACCESSIBLE_BOOT-DEVICE." Which two actions should you take to eliminate the STOP error? (Choose two)a.Restart Windows 2000 Setup by using the Windows 2000 Server CD-ROM. b.Select Safe Mode from the windows 2000 boot menu.c. remove the windows 2000 server CD-ROM from the CD-ROM drive. d.Install a driver for the SCSI controller from a floppy disk. e.Use Device Mananger to update the driver for the SCSI controller. ANS: A, D (I had this on exam; scored 1000)24. You are planning the installation of windows 2000 server on a new computer that has four 50-GB hard disk drives installed. You want windows 2000 setup to create a single partition on disk 0 of the largest possible size and to install the operating system on the partition. After windows 20000 has been installed you also want to configure the remaining three disks in such a way that the maximum amount of space on all four disks can be accessed from a single drive letter.Which of the following methods should you use to achieve your objectives?a. On disk0 create a 4 GB fat16 partition during setup. Use disk management to covert all four disks to dynamic disks and combine unallocated space on all four disks into a single spanned volume. b. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to create a single 50 GB ntfs partition on each of the remaining disks and then mount each partition to a separate empty folder on disk 0. c. On disk 0 create a 32 FB fat32 partition during setup. Use disk management to convert all four disks. d. On disk 0 create a single 50 GB ntfs partition during setup. Use disk management to convert all four disks to dynamic disks and then extend the simple volume on disk 0 to include all of the remaining disks into a single striped volume. AND: BChoice b is correct. During windows 2000 setup, you can create a FAT16 partition of up to 2 GB, a FAT32 partition of up to 32 GB or an ntfs partition of almost any practically reasonable size. Currently, 2 tb should be considered a practical limit on a single ntfs volume. To meet the first requirement of this scenario that the partition on disk 0 be of the largest possible size, you should create a single 50 GB ntfs partition. To meet the second requirement you should create single 50 GB partition on each of the remaining disks and then mount each partition to a separate empty ntfs folder on disk 0. Then, all 200 GB of the available space will be accessible through a single drive letter C. You cannot extend a simple volume that was created from a partition of a basic disk; only simple volumes that were created from unallocated space on a dynamic volume can e extended. Additionally, you cannot create a striped volume by extending a simple volume. To create a striped volume, you must specify unallocated space, not an existing volume.INSTALL25. You plan to install windows 2000 server on 10 new computers, these servers will provide file and print servers in branch offices of your company, the company wants each branch office to purchase its own copy of window 2000 server, and the installation in each branch office should use the serial number associated with the branch office’s own copy. You want to install, configure, and test windows 2000 server on these computers at the main office before shipping the computers to the branch offices, you want users in the branch offices to enter the computer named and serial numbers when they receive the computers. What should you do?A.Install windows 2000 server on the computers by using an unattend.txt file, and then use the Registry Edition to remove the computer name and license details. B. Start the installation process from an MS-DOS boot disk. Install windows 2000 server on the computers from an existing server by running the winnt command with the /Prelnst switch. C. Install windows 2000 server on the computers and then use setup manager to create a sysprep.inf file for sysprep.exe. Pleace the sysprep.inf file on the computers and run the sysprep-nosidgen command. D. Create an unattend.txt file by using Setup Manager. Include the following line in the Unattend.txt file: oenPreinstall=Yes. Use the file to perform the installation. ANS:C26. You are the administrator of a network that includes windows nt server 4.0 computers, NT Workstation 4.0 computers and unix computers. The network consists of a single windows NT domain. You are upgrading a windows NT server computer named server1 to windows 2000 server. Server1 is a bdc in the domain. The existing DNS server is a unix computer that supports srv (services) records and is configured to accept dynamic updates. The existing WINS server is another windows NT server computer. You want to configure server1 as a domain controller in a new active directory forest. You want the existing windows NT domain accounts to be upgraded to active directory. You plan to upgrade the other domain controllers in the domain to windows 2000 after the upgrade of server 1 is complete. You want to perform the upgrade of server1 with the least possible impact on other computers on the network.what should you do?A. Promote server1 to the pdc of the domain. Run windows 2000 setup on server1.B. Run windows 2000 setup on server1. At the end of setup.configure server1 as a dns server and a wins server.c. Add a static mapping for server1 on the WINS server. On the DNS server, create a srv record for the ldap service on server1. Run windows 2000 setup on server1. D. Install the ms dns service on an existing windows nt server. Apply SP 4 or later to the server. Run windows 2000 setup on server1. ANS: A (I had this on exam; scored 1000)27. Which of the following sections in unattend.txt contains the ComputerName?a) Unattended b) UserData c) Networking d) Identification e) Data ANS: B28. What should you use for installing multiple Windows 2000 servers with dissimilar hardware?a) SMS b) Sysprep c) Syspart d) RIS ANS: D29. What service is responsible for answering client computer network service requests during the OS installation using RIS?a) TFTPD b) BINLSVC c) RIS service d) DHCP e) Active Directory ANS: D STARTUP & TASK MANAGER31. You have an application server named App1. On this server you have many custom built programs. All of these programs are launched as a service on startup. You have one program that is called Finance. This application is critical to your Accounting department.You find that the Finance program is making App1 unstable due to errors in the program code. You want to have App1 run stable until the code errors are fixed. What should you do? (Not exactly word for word, but you get the idea. It was worded bad on the exam too)A. Open Task Manager and run the Finance application as /BelowNormal B. Open Task Manager and run the Finance application as /Low C. Don't remember - It was wrong D. Open Services and change the startup type from Automatic to Manaul ANS: D32. Your company includes a PentiumII, 450-MHZ database server named webdata1. webdata1 supportts a high-traffic, e-commerce web site on a server named webserver1. Users access the e-commerce web site from their Internet browsers. Users report that when they attempt to complete a purchase, they must wait five minutes for confirmation that their order has been processed.You want to use Task Manager to help you decide whether an additional processor is needed, what can you do ?A: on the performance tab, select the option to monitor the system cache B: on the performance tab, select the option to monitor the available physical memory C on the process tab, select the option to monitor the memory usage column, Monitor this columnD: on the process tab, configure the view to include the thread count column, Monitor this column E: on the process tab, configure the view to include the page faults column, Monitor this column ANS: D (not sure)GPO33. You have the following exhibit:(garbled litware.com, contoso.com, is.litware.com, finance.litware.com, is.contoso.com, support.is.litware.com, support.contoso.com & development.contoso.com)You need to deploy and service pack to the support.is.litware.com domain and the support.contoso.com. How should you deploy?A. Assign to litware.com and contoso.com domains B. ?? C. Create 2 sites, 1 tree in each site. Create a GPO in each siteD. Create 1 site that contains 2 trees. Creat a GPO for the site ANS: D34. You are a regional admin who is performing location-specific tests for an enterprise migration. Test server computers and test client computers have been deployed at your location. Your location plans to have a site Group Policy applied after the actual migration is complete. You need to provide the lead admin the security settings for the appropriate computers in your location. Which item should you provide?A. a policy template file that is exported from the Security Configuration and Analysis utility. B. An administrative template file from Group policy. C. A template list that is exported from the Security Configuration and Analysis utility. D. A Group Policy Object. ANS: D35. You are the administrator of a high security network. Many files stored on your Windows 2000 file servers and Windows 2000 Professional computers are highly confidential. You want to implement identical security configurations on all Windows 2000 file servers and Windows 2000 Professional computers. What should you do? (Choose all that apply)A. Configure Group Policies to apply the security configuration to all Windows 2000 file servers and Windows 2000 Professional computers. B. Use the Security Configuration Management Console to import security information from a file server as a template.C. Use the Security Configuration Management Console to import security information from a Windows 2000 Professional Computer as a template. D. Use Secedit to export the security configuration to all file servers.E. Use Secedit to export the security configuration to all Windows 2000 Professional computers. Answer: A, B, CFOLDER PERMISSIONS36. You create some folder in a root G and you don`t want users from network to create folders in root but they can create subfolders in the folder you have created. What do you do?a.create folder in G:,configure block permission inherihanceb.create folder in G:,configure permission allow user create subfolder.block permission inherihancec.create folder in G:,confige block permission inherihance prevent create folder in the root.d.create prevent create folder in the root create folder in G:, confige block permission inherihance ANS: B37. You are the administrator of a Windows 2000 server computer named Intra. This server hosts an intranet web site for your company. The marketing department stores marketing files in a shared folder on a separate file server. The NTFS permissions on the folder are shown on this exhibit:Exhibit 1: Marketing users have full controlExhibit 2: Virtual Directory with Read, Log Visit, and Index this resource boxes checked and Write and Directory Browsing boxes uncheckedThe marketing director wants to make the marketing files available to the rest of the company via internet. She wants company users to be able to read but no modify all the files. You create a new virtual directory named marketing under the intranet web site folder on Intra. You configure the virtual directory as shown some users report that they cannot access the marketing files from their web browsers. However, all users in the marketing department are able to access the files. You need to provide need acess to all company users. What should you do?a) Select directory browsing check box on virtual directory tab. b) Copy files form their location on the file server to the Intra Marketing. c) Modify NTFS permission on the file server to remove the entry for Marketing. d) Modify NTFS permission on the file server to include an entry for Everyone: Read ANS: D (I had this on the exam; scored 1000)IIS38. You are the administrator of windows 2000 server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web Site for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However . You discover that users can access the Web Site without Authenticated. You need to ensure that only authenticated users can Access the web site. What should you do ?A. Install Active Directory on the server. B. Select Basic Authentication Check Box. C. Clear the Allow anonymous connection check Box. D. Disable the IUSE_intra user account on Intra. E. Clear the Allow IIS to control password check Box. ANS: C39. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?A. Ensure that the log type is set to W3C. B. Change the log rollover property in the website's logging properties. C. Change the time zone setting in the time properties on the web server. D. Configure the time service on the web server to use local system account. Answer: B40. You are the administrator of an Internet Bluesky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines.com as an intranet server. The server hosts the multiple departmental and resource WEB links to the network and databases. You configure a ticketing WEB site. You also configure a finance virtual directory in the department’s WEB site as shown in the Exhibit. "We see an exhibit in which we see the dir browsing enabling and person can see all the three". During the first morning the new server is available and the user reports that the only information they are seeing in their browser is a list of HTM and ASP files. For security reasons what the first action you need to take to disable the user ability to all the WEB sites in the form of a list. What should you do? A. Clear the directory browing on the server properties, and apply to child WEB sites. B. Clear the directory browsing settings for the ticketing WEB sites and then apply the settings to child virtual directories. C. Clear the directory browsing checkbox for the department’s WEB sites and then apply the settings to the child virtual directory D. Clear the directory browsing checkbox for the financing virtual directory. Answer: A (I had this on exam; scored 1000. Correction to Clonepony.)QUOTAS41. You are administrator. A user David has 10 GB on his home folder on drive D. You set up disk quota with default setting. Limit size to 11 GB and enable deny if exceeding the limit. David tries to encrypt his files and gets error “ insufficient space”. What can you do ? Select three answers:A. Set no limit to David B. Instruct David encrypt files. C. Compress the files D. Use Cipher.exe./d E. Set default limitation to 12 GB for all users, clear deny when exceeding the limitation. F. Allow David’s home folder equal the size limitation (on drive?), something like that. ANS: A, E, F (wording of F not clear, but B, C & D are clearly wrong)42. You have a W2K server named SR8. You enable compression on the whole D volume. You enable a quote limit of 500 MB and set the option to deny space for users who exceed the quota limit. This volume is set up for user’s home folders. A user works on a W2K server named SR7; he has a compressed folder with a file (files) that occupy 498 MB. He wants to save the file(s) to his home folder on SR8. Halfway through the process he received an error message saying he ran out of space. You want to allow him to save the file(s) on SR8 and at the same time you want him to have a quota limit. What to do?A. Wrong answer B. Uncompress the file(s) on SR7 check the uncompress size, set a quota entry for the user on SR8 to match this new size. C. Create a quota entry on SR8 for the user and set the “Do not limit disk usage” option. D. Wrong answer. ANS: B 43. You are the Administrator of windows 2000 server computer. The computer is configured to have a single 18 GB drive which contains the operating systems (OS) files. This drive also contain a share folder where 5 network users store there MS excel files. You want to prevent each network user from using more than 1 GB of space in the shared folder. Which action or actions should you take to achieve this goal? (Choose all that apply)A. Create a quota entry for everyone account. Set the quota limit to 1 GB. B. Enable disk quotas on the volume. C. Set default quota limit to 1 GB. D. Select the deny disk space to users exceeding quota limit check box. E.Upgrade the disk to a dynamic disk. An A, D. ENCRYPTION44. You are the administrator for your company. Your Windows 2000 Server computer contains two 23GB hard disks. Each disk is configured as a basic disk and has a single 23GB NTFS partition. Both partitions are backup up to tape every night. The partition on Disk1 stores user data. Most users of your company encrypt their files. Disk1 fails. You replace it with a new disk. You need to recover the data as quick as possible while maintaining the security of the files. What should you do?A. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Run the cipher /d /i command.B. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Instruct the users to verify the integrity of their files. C. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Logon to the server console as a recovery agent. Copy the files from the second file server to the new partition. D. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Instruct users to copy their files from the second file server to the new partition. ANS: B45. John, an employee in your company has used windows 2000 encrypting file system on his windows 2000 computer to encrypt a file that contains sensitive information. John’s computer belongs to the domain that you administer. When john left the company Greg was hired for the position. You must enable greg to access the contents of the encrypted file. Which of the following should you do?a. Log on to john’s computer by using the local administrator account and decrypt the file. b. Back up the encrypted file restore the backup on your computer and decrypt the file. c. Assign greg the take ownership permission for the file and let him take ownership.d. Copy the encrypted file to a fat volume. ANS: B46. You are the network administrator for your company. Your Windows 2000 Server Computer contains two 23 GB hard disks. Each disk is configured as a basic disk and has a single 23 GB NTFS partition. Both partitions are backed up to a tape each night. The parititon on Disk-1 stores user data. Most users at your company encrypt their files. Disk-1 fails. You replace it with a new hard disk. You need to recover the data as quickly as possible while mantaining the security of the Disk-1 files. What should you do?A) Create a single NTFS partition, Restore the contents of Disk-1 from the most recent tape backupRun the cipher /d /i commandB) Create a single NTFS partition, Restore the contents of Disk-1 from the most recent tape backup Instruct the users to verify the integrity of their files. C) Create a single NTFS partition, Restore the contents of Disk-1 to a second file server Logon to the server console as a recovery agent Copy the files from the second file server to the new partition D) Create a single NTFS partition,Restore the contents of Disk-1 to a second file server Instruct users to copy their files from the second file server to the new partition ANS: B (others say C; verify for yourself)RECOVERY47. You start win2k. You have create ERD. Receive a "boot.ini is missing". What can you do?a. Start with win2K CD.start recovery console, run FIXBOOT b. Start with win2K CD.start recovery console, run FIXMBRc ...... d. Start with win2K CD. Start recovery console. Copy appropriate parameter ANS: DFrom Technet:Recreating Boot.ini Using the Recovery ConsoleYou can use the Emergency Repair Process to replace a missing or corrupted Boot.ini file. Alternatively, you can use the map command to determine the location of the disks. With this information, you can create a Boot.ini file on another computer, and then use a floppy disk to transfer the Boot.ini file to the original computer.Fixboot Writes a new boot sector onto the system partitionFixmbr Repairs the master boot code of the boot partition48. After you installed a application on a Win2K server and rebooted it, you get a error” Invalid boot.ini file” What to do ?A. Boot from Windows 2000 CD and select repair in o Recovery Console and use COPY command. B. ? C. ? D. ? My answer : A49. You install a new EIDE DVD, after the installation the computer stops with an error IRQ_NOT_EQUAL. What should you do to resolv the problem?a) Start with recovery console (or ERD disk). Copy the driver in the directory c:\winnt\system32 b) Start the computer with the last know good configuration, uninstall the driver and schedulle the installation for the next maintenance period. c) Start the computer in safe mode, uninstall the driver and schedulle the installation for the next maintenance period.d) Connect the DVD in another EIDE bus. ANS: D50. You are having problems starting one of your Windows 2000 domain controllers, so you want to start the system using the Advanced Startup options. Which two options will be unavailable when you choose Advanced Startup Options? (Choose two) A. Safe Mode B. Debugging Mode C. Safe Mode with Networking D. Last Known Good Configuration. E. Safe Mode with Command Prompt . ANS: A, E Reason: Server is DC, so can not use safe mode and safe mode with command prompt.SERVICE ACCOUNT51. Some Application on your company network uses defined domain user accounts as their service accounts. Each computer that runs one of these apps should have the respective service account in the local Administrators Group.Currently, you individually place these service accounts in the local Administrators group on the appropiate Win2000 professional computers. You need to centralize this process. What should you do?a) Add the applications service accounts to the Domain Administrator group. b) Add the applications service accounts to the local administrator group. Use the restricted Groups option in each computers local Group Policy. c) Add the applications service accounts to the local administrator group using the restricted Groups option in an OU Group policy. d) Add the applications service accounts to the local administrator group. Use the restricted Groups option in a domain Group Policy. ANS: DBecause the question said "place these service accounts in the local Administrators group on the appropiate Win2000 professional computers",so a) is uncorrect. "You need to centralize this process",so b) is wrong. The question doesn't talk about OU, so I won't select c). d) is correct.TERMINAL SERVICES53. You are the admin of Win NT4.0 Terminal Server Edition computer. The server has one hard disk, which is divided into two partitions. The first partition contains the Win NT4.0 system files and is formatted as FAT. The second partition contains application data and user data. This second partition is formatted as NTFS. The server currently has SP3 installed. You need to upgrade the server to Win2000 server. You want to ensure that no application data or user data is lost during the upgrade. You also want to perform the minimum number of steps necessary to complete the upgrade.What should you do? (choose all that apply)A. Convert the system partition to NTFS. B. Install SP4 or later on the server. C. Use a Win2000 server CD to start the server. In Setup, select the option to Upgrade. D. Replace the Terminal Server installation with a standard WinNT server 4.0 installation. ANS: A, BResonse: The upgrade from NT4.0 Terminal Server Edition is automatic so, I don't think D pertains. The easiest way to upgrade to WIN2000 is to insert the WIN2000 CD into the CD-ROM and keyin Winnt32.exe or Autorun. That means C would not be the correct answer, as you would not be booting from the CD but running it from within NT. B would would definitely have to happen due to the conversion of the different NTFS versions. I don't think you would have to convert the system partition to NTFS for the upgrade but, it would make the transition smoother. So I say it should be A & B.54. Your company network consists of a Windows 2000 domain and 300 Windows 2000 professional computers. A member server named APPLIC1 has Terminal server installed in Remote Admin mode. You need to make Terminal Server on APPLIC1 available on all client computers. Which two actions should you take? (choose two)A. Install Terminal Server licensing on APPLIC1. B. Install Windows 2000 Advanced server On APPLIC1. C. Install Terminal Server licensing On a domain controller. D. Install Terminal Server licensing On each client computers.E. Remove Terminal Server from APPLIC1. F. Reconfigure Terminal server to operate in application server mode. Answer: C, F55. You are the administrator for a small company and have decided to use Terminal Services to provide access to certain applications for the clients. You currently have the following client operating systems on your network: -30 computers running Windows 2000 Professional-25 computers running Windows NT 4.0 Workstation-15 computers running Windows 98-30 computers running Windows 95-10 computers running Windows for WorkgroupsYou install Terminal Services in Application Server mode on a computer running Windows 2000 Server. However, there are two things that you are unsure of. First, can Windows 2000 Terminal Services support all of the client operating systems listed above without the use of any third-party software (such as Citrix Metaframe)? Second, how many Terminal Services Client Access Licenses will you need for the client operating systems that are supported?A. Yes, Windows 2000 Terminal Services will support all of the client operating systems listed above. You will need 110 Terminal Services Client Access Licenses. B. Yes, Windows 2000 Terminal Services will support all of the client operating systems listed above. You will need 80 Terminal Services Client Access Licenses. C. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 100 Terminal Services Client Access Licenses for the supported client operating systems. D. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 70 Terminal Services Client Access Licenses for the supported client operating systems. E. No, Windows 2000 Terminal Services will not support all of the client operating systems listed above without the use of third-party software. You will need 55 Terminal Services Client Access Licenses for the supported client operating systems. ANS: BOther clients (such as Macintosh clients) require the use of third-party software such as Citrix Metaframe. Windows 2000 Professional clients do not require a Terminal Services Client Access License. All of the other client operating systems listed in the scenario above will require a Terminal Services CAL.I don't know why win2kpro don't need cal to access Terminal, as i know, all the clinet must have cal to access terminal, So, I think the ans is A.LOGGING56. You are administrator. You enable security auditing. A week later, the server stops response. You logon and see error ”Auditing failed”. You want to continue the auditing and do not want this error happens again . What to do ?A. Set “Autocrach” Key to 0 B. Increase the logfile size in EventViewer. C. Save the logfile and clear the Eventviwer every morning. D. ? ANS: B From Server Help:If the registry was previously configured with CrashOnAuditFail = 1 and the security log becomes full, Windows 2000 will stop responding and will display the message "Audit Failed" If that happened, use the procedure above. So if Autocrach means CrashOnAuditFail the correct answer should be ANICs57. You are administrator of a Windows 2000 Server computer. The Server contains one n/w (network) adapter and is a file and print server for critical company resources. You install a second n/w adapter in the server and connect it to the same n/w subnet as the first adapter. You want to ensure that first adapter is used for all n/w that the second adapter is used only if the first adapter fails or is disconnected from the n/w. You also want to ensure that the server always has n/w connectivity even if one n/w adapter fails. What should you do?A) Set the second adapter’s status disabled B) Configure the first adapter to use TCP/IP metric of 100 C) Configure the second adapter to use TCP/IP metric of 25 D) Configure the binding order on the second adapter to bind TCP/IP last ANS:C(I had this on the exam; scored 1000)Explanation: http://support.microsoft.com/support/kb/articles/Q258/4/87.ASPMISCELLANEOUS58. What is the purpose of the Ntdis.dit file?a) Contains the SAM b) Contains the Active Directory Store c) A log file created when installing Active Directory services d) Contains locale user profiles e) A management utility for Active Directory ANS: B? (ntds.dit is the Active Directory file)59. You administrate a server named server1 in you network. You perform the fully backup daily . One day your domain administrator change the Server name Server1 to SSU43 according to Company new criterion. After several days you find an application failure due to the name change. You restore the server use your daily backup data. You restart the computer and find you can not logon.what should you do to resolve ?A.Restart the computer and logon with your adminstrator name and password. B..Restart the computer and logon with your domain adminstrator name and password. C.? D?E? ANS: A (since domain thinks it’s other host name). Other says “B,not sure”60. You create and share a folder on a computer running Windows 2000 Server. The folder will be used to store documents that define corporate standards. Most employees use these files frequently. You set the shared folder permissions to allow Read access for Authenticated Users. You set the read-only attribute of each file in this folder. How should you configure the offline folder setting for this shared folder to minimize network traffic?A. Clear the setting Allow Caching of files in this shared folder B. Manual Caching for Documents C. Automatic Caching for Programs D. Automatic Caching for Documents Answer: C Reason: "You set the read-only attribute of each file in this folder." See MS Press Book about offline file.61. You have Apple computers on your network that can’t connect to your w2k servers. What can you do?ANS: SAP (I had this on exam; scored 1000)62. Your network is configured with the NWLink protocol only. You have NetWare servers and windows clients. You add a w2k server and configure NWLink. You copy the Netware files to the w2k server, and then share them. You verify that the clients can connect to the new shares. You then remove the NetWare servers, and now the clients can’t connect to the shares. What can you do?A. On the w2k server, change the frame type to 802.5 B. On the clients, configure TCP/IP C. On the w2k server, add it to the network 18283838. D. On the w2k server, add NWLink. E. On the w2k server, add GSNW. ANS: E (I had this on the exam; scored 1000)
1.Running System Monitor locally, and ensuring it has the least impact on other processes, how do you measure the physical disk performance counters on your Windows 2000 Server computer? (Choose2)
From the command prompt, run the Start/Low perform command.
Use Task Manager to set the priority if the MMC.EXE process to Low.
2. You work with files that are confidential. These files are kept in your Private folder located in your home folder. You use numerous computers to access these folders. What should you do to maximise security of the Private folder, and still allow access from the remote computers?
Configure your account to use a roaming profile. Use the properties of the Private folder to set the encryption attribute
3. Your Windows 2000 Avtive Directory network consists of Windows 2000 Professional computers and Windows NT Workstation computers. Users of the Windows 2000 Professional computers cannot change their desktops or the display settings on their computers. Users of the Windows NT Workstation computers can change all display settings. What should you do to restrict all users of Windows NT Workstation computers from changing their desktop settings?
Configure a Windows NT policy file and place it in the proper folder on the PC emulator.
4. Your Windows 2000 network consists of Windows 2000 Servers that were upgraded from Windows NT, Windows 2000 Professional computers and Windows NT Workstation computers. After you implement GPO's for each OU, you find that the GPO's only apply to users of the Windows 2000 Professional computers. You want to restrict users of the Windows NT Workstation computers from accessing registry editing tools. What should you do?
Creat a Windows NT system policy file on a Windows 2000 domain controller. Configure the policy so that it restricts default users from accessing registry editing tools
5. You have created a GPO for the Finance OU in your network. You want to prevent users in the Finance OU from accessing My Network Places and running System in Control Panel. Bit, you want the Managers Domain Local group to be able to access My Network Places, yet not run System in Control Panel. What should you do?
Creat a second GPO in the OU. Add the Manager's group to the ACL of the GPO. Allow the Manager's group to apply the Group Policy. Disable the permission of the Authenticated Users group to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.
6. You share a folder on your Windows 2000 Server that contains multiple subfolders. Some of these subfolders are compressed, and some are not. The Marketing folder is compressed. You want to delete it, but want to keep all the files in the folder. You want to copy all the files to the Admin folder before deleting the Marketing folder. You want the files to remain compressed, but do not want to compress any files in the Admin folder. What should you do?
Move all the files from the Marketing folder to the Admin folder.
7. Your Windows 2000 Server contains two hard disks. Each disk is partitioned as a single primary partition. The first disk is formatted with FAT32, the second as NTFS. You compress shared folders on second disk. When users move compressed files from a shared folder ont eh second disk to a shared folder on the first disk, the files lose their compression. What two actions should you take to ensure that all files moved from folders on the second disk to shared folders on the first disk remain compressed?
Convert the first disk to NTFS. Compress the shared flders on the first disk.
8. You have two Windows 2000 Servers, Srv1 and Srv2. Srv1 has a spanned volume over three physical disks. These disks support hot swapping. The drive letter that the spanned volume on Srv1 is not currently in use on Srv2. You want to move the three disks to Srv2, using the same drive letter as Srv1. You back up the spanned volume. What should you do next?
Move the disks from Srv1 to Srv2. In Srv1, rescan the disks. On Srv2, rescan the disks.
9. You are installing a Windows 2000 Sever on a new computer that is connected to a network that conatins Windows 98 computers, and Windows 2000 Server computers. You want to install Windows 2000 Server from source files located on a server on the network. What should you do?
Start the new computer by using a Windows 98 boot disk. Connect to the network server. Run WINNT.EXE.
10. Your Windows 2000 Sefver has two NTFS partitions. Windows 2000 Server is installed on drive D. After a power failure, you recieve the error message: "NTLDR is missing. Press any key to restart". What should you do?
Start the computer by using the Windows 2000 Server CD-ROM and choose to repair the installation. Select the Recovery Console and copy the NTLDR file on the CD-ROM to the root of the system partition
12. Your network consists of two domains: troytec.local and tech.troytec.local. It has Windows 2000 Professional computers and Windows 2000 Server computers. You enable auditing in the domain policy object for troytec.local to audit the success and failure of object access. After installing a printer on a domain controller, you configure auditing on this printer to monitor printing successes and failures. When you review the security log later, no events have been written to the log, even though you know the printer has been used. What should you do to log all successes and failures of printing for the printer?
Configure auditing of successes and failures of object access in the Default Domain Controllers Policy object in the Domain Controllers OU of the tech.troytec.local domain.
13. Your network uses the TCP/IP protocal for its Windows 2000 Professional and Windows NT computers. You have one server that acts as both a WINS server, and a DNS server. All the client computers are configured to use this server for DNS and WINS. User of Windows NT Workstation cannot connect to a file server, but Windows 2000 Professional users can. This server has a static address of 192.168.1.11. What should you do to allow the Windows NT Workstation computer to connect to the file server?
Select the Enable NetBIOS over TCP/IP. Add the WINS address used by the Windows NT Workstationb computers.
14. Both of your domains are Active Directory domains that run in native mode. How can you see a list that shows which users are allowed to use remote access to your network?
Create a group named RAS_USERS. Add the users who are permitted to dial in to the network. Create a remote access policy that allows only this group to use the remote access server. Display the member of the group.
15. Your network is routed and uses TCP/IP as its only protocal. You have a single domain with Windows 2000 Professional and Windows NT Workstation computers. You install Gateway Service for NetWare on a Windows 2000 Server computer. You install a second network adapter on the gateway server. You want to configure the first adapter for communications to and from your Windows based client computers exclusively. Which checkboxes in the Local Area Connection Properties dialog box should you select? (Choose all that apply)
Client for Microsoft Networks File and Print Sharing for Microsoft Networks Internet Protocal (TCP/IP)
16. You have Routing and Remote Access on a servewr that has one modem. The server is configured to use demand-dial routing to connect to the main office. The manager wants users to be able to dial in to the server only between 6:00 p.m. and 8:00 a.m., but wants users to be able to log on at any time when connected directly to the LAN. What should you do to limit dial-in access to this timeframe?
Set the remote access policy to deny connections between 8:00 a.m. and 6:00 p.m.
17. Frequently, a newly uinstalled modem stops communicating with your ISP. The only way to reactivate the modem is to restart the computer. You want to install a new driver for the modem. What should you do?
In Device Manager, on the property sheet for the modem, click the Update Driver command button.
22. You have a 12 GB primary partition formatted as FAT32 on your Windows 2000 Server computer. The number of users and average size of files remains constant over a period of time. Users then report that the server does not retrieve files as fast as when the server was first installed. What should you do?
Defragment the disk
24. Your Windows 2000 Server is configured with Routing and Remote Access. What can you do to help diagnose why dial-in users cannot connect to the server via a new modem?
Use the Routing and Remote Access snap-in to find out whether the ports for both modems are operational.
28. Your network uses the Encrypting File System (EFS) to encrypt data. You are installing a new server that has a 6 GB NTFS partition. You want to move numerous EFS folders to a new server. These folders must maintain their encryption. What should you do?
Backup the flder using the Backup utility in Windows 2000.
29. You are implementing a 140-node network. It should be divided into 10 subnets. Each subnet must be able to accommodate up to 14 nodes. How should you configure the IP addressing structure if your company's IP address is 194.194.194.0?
194.194.194.0/28
30. You have a PIII 400MHz Windows 2000 Server computer with a built-in sound card. You must install another sound card that is on the HCL and enable it on the server. How should you configure trhe computer to use the new sound card and install the drivers for the sound card? (Choose three)
Install the new sound card. In Device Manager, disable the integrated sound card. Allow Windows 2000 to automatically detect the new sound card during the next boot of the computer after the sound card is installed.
31. Your Windows 2000 domain operates in native mode. The server uses the default remote access policy. You want the remote access permissions for new user accounts to automatically allow access. What should you do?
Change the setting from Control Access through Remote Access Policy to Allow Access.
32. All subnets on your network us a /24 subnet addressing scheme. Your router that connects a subnet to the network has an IP address of 158.25.64.1. The next router in line has an IP address of 158.23.65.2. Which subnet mask and default gateway should you use to configure the client computer?
255.255.255.0
158.25.64.1
33. Your Windows 2000 network is configured with Active Directory and Group Policies. You create a Group Policy object linked to an Organizational Unit. You do not want the GPO to use any policies from the domain. What should you do?
Check the "Block Inheritance" box in the main screen of the OU's Group Policy editor.
34. On your Windows 2000 Active Directory domain controller, you are backing up the system boot files, the registry, the COM+ class registration database, the Certificate Server database, the Active Directory Services database, and the SYSVOL directory. Your domain controller is a Pentium 200 MHz with a RAID-5 array with ten 3-GB partitions. Minimizing backup time, how can you backup these files?
Use Windows Backip to back up the System State data.
36. You have an Active Directory enabled Windows 2000 Server. You create an Organized Unit with a child OU named Designers. The child object must have explicit rights assigned to it, but the OU's permissions must ropagate to the OU and all its other child objects. What should you do? (Choose all that apply)
Configure permission inheritance on the OU.
From the Security tab, clear the Allow Inheritable Permissions From Parent to Propagate To This Object on the Designer's object.
38. Your network contains two routed subnets: Subnet A and Suvbnet B. Subnet B contains a Windows 2000 server configured as a DHCP server. This server has scopes created for both Subnet A and Subnet B. Subnet A does not contain a DHCP server. The clients on Subnet A are not recieving IP addresses from the DHCP server. What can you do to enable clients in Subnet A to recieve dynamically assigned IP addresses? (Choose all that apply)
Configure an RFC 1542-compliant router to forward BOOTP messaging between subnets. Configure an RFC 1560-compliant router to pass all UDP traffic on ports 2151, 2152, 2153 and 2154. Configure a DHCP relay agant on Subnet A to forward CHCP messages to Subnet B.
39. You configure several Group Policies to restrict user's desktop configuration changes. You want them to be applied immediately. What should you do?
Run the SECEDIT.EXE command to refresh the policy.
40. On the Windows 2000 computers you install the NWLink IPX/SPX/NetBIOS Compatible Transport Protocal. After installing the protocal you discover that the Windows 2000 machines can communicate with some but not all of the NetWare servers. What should you do?
The frame type is not saet correctly. Reconfigure the Windows 2000 comouters for Manual Frame Dectection.
41. You are backing up all of the data on a computer on your network using the following strategy. (Click on Exhibit)
On Friday at 2:15 PM, you experience a hard drive failure on the computer. What should you do to restore your data?
Restore data from Saturday, the Thursday.
43. You are concerned that someone is accessing confidential data fies on a Windows 2000 Professional computer. You would like to configure the system so that all attempts to access thoses files, whether successful or failed, are tracked. What should you do? (Choose all that apply)
Right-click on the files to be audited. From the Security tab, click Advanced. From the Auditing tab click Add and select the user or group whose actions you want to audit. In the Local Computer Policy, choose Audit Policy and select the checkboxes for "Success" and "Failure" under "Audit object access".
45. You are installing a new computer named Svr2.troy.com on your Windows 2000 network. Yopu want to enter the appropriate TCP/IP addresses for the subnet mask and the default gateway for Srv2.troy.com. Which subnet mask and default gateway should you use?
**To answer, drag the appropriate addresses to the appropriate boxes in the Internet Protocal (TCP/IP) Properties dialog box.**
Drag 255.255.0.0 to the Subnet mask, and the IP addres of the ROUTER to the Default Gatway.l
46. Using Task Manager's Process tab, you must monitor the following process settings:
The total processor time a process has used the processor since it started.
The ranking of a process which determines the order in which te process uses the processor.
**Select two boxes,,,,choose two**
**CPU Time on left, and Base Priority on the right**
48. Running System Monitor locally, and ensuring it has the least impact on other processes, how do you measure the physical disk performance counters on your Windows 2000 Server computer? (Choose two)
From command prompt, run the Start/Low perfmon command. Use Task Manager to set the priority of the MMC.exe process to Low.
50. You have created a GPO for the Finance OU in your network. You want to prevent users on the Finance OU from accessing My Network Places and running System in Control Panel. But, you want the Managers Domain Local group to be able to access My Network Places, yet not run System in Control Panel. What should you do?
Create a second GPO in the OU. Add the Manager's group to the ACL of the GPO. Allow the Manager's group to apply the Group Policy. Disable the permission of the Authenticated Users group to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give new GPO a higher priority than the original GPO.
51. You have two Windows 2000 Servers, Srv1 and Srv2. Srv1 has a spanned volume over three physical disks. These disks support hot swapping. The drive letter that the spanned volume on Srv1 is not currently in use on Srv2. You want to move the three disks to Srv2, using the same drive letter as Srv1. You back up the spanned volume. What should you do next?
Move the disks from Srv1 to Srv2. On Srv1, rescan the disks
1) some Exhibit Q about an Website which you don’t want to give the users the ability to change:
Answ: to me the logic answer seemed to be giving every one: READ
2) . You create and share a folder on a computer running Windows 2000 Server. The folder will be used to store documents that define corporate standards. Most employees use these files frequently. You set the shared folder permissions to allow Read access for Authenticated Users. You set the read-only attribute of each file in this folder. How should you configure the offline folder setting for this shared folder to minimize network traffic?
A. Clear the setting Allow Caching of files in this shared folder B. Manual Caching for Documents C. Automatic Caching for Programs D. Automatic Caching for Documents Answer: my answ B
3 Your network consists of a Windows 2000 Server computer and 10 Windows 2000 Professional computers. The Windows 2000 Professional computers use a modem and a dial-up connection each to connect to the Internet. Now, you rent a single DSL-Line which will be configured on your Windows 2000 Server computer. You install Internet Connection Sharing (ICS) on the server. All Windows 2000 Professional computers have to use ICS. How should you configure all Windows 2000 Professional computers to connect to the internet without changing or removing the existing dial-up connection? (Choose all that apply)
A. In Internet Options select "Never dial a connection". B. In Local Area Network Settins set "Use automatic configuration script". C. In Local Area Network Settins set "Automatically detect settings". D. In Local Area Network Settins set "Use a Proxy Server". E. In Local Area Network Settins set "Bypass Proxy Server for local addresses". Answer: A, C ( not sure)
4 You are the administrator of a Windows 2000 network. You have installed two shared printers for a print device on a Windows 2000 Server. Both printers are available to all users. They are shared as Admin and Executive. Admin is configured with a priority of 90, Executive is configured with a priority of 50. Now, you are advised to prevent the printer Executive to be visible to all users. Only members of the Executive group should be able to print to Executive. What should you do?
A. Allow the Executive Group print permission only. Remove the sharename Executive and add the sharename Executive$. Reconnect all members of the Executive Group to the new sharename. B. Install a second printer driver for the print device. Set NTFS permissions to the new driver files so that only the Executive Group is allowed to access the files. C. Deny print permission to the Everyone Group. D. Change the priority of Executive to 99, so that ...........
Answer: A
5 Your Win2000 Srv computer contain four hard disks of different sizes. Each hard disk is configured as a basic disk and has a single 5-GB partition. All 4 disks have the amount of unpartitioned space shown in the following table:
Disk Unpartitioned Space
Disk 0 3-GB Disk 1 4-GB Disk 2 3-GB Disk 3 8-GB
On each hard disk, you create a second partition that uses the remaining unpartitioned space on the disk. You create an 18-GB stripe volume that includes all four of the new partitions. Six months later, disk 1 fails. You replace it with a new hard disk, and create the necessary partitions. As quickly as possible, you need to retrieve the data that was contained on disk 1. What should you do?
A. Restore the first partition on disk 1 from the most recent tape backup. Use disk management to repair and rebuild the stripe volume. B. Delete and re-create the stripe volume. Restore the contents of disk 1 from the most recent tape backup.
C. Restore both partitions on disk1 from the most recent tape backup. Delete and re-create the stripe volume. Restore the first partition on disk 1 and then stripe volume from a recnt tape backup. A: my answer is A
6 Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of theses applications should have the respective service account in the local administrators group. Currently, you individually place these service accounts in the local administrators group on the appropriate Win2000 Pro computers. You need to centralize this process. What should you do?
A. Add the applications service accounts to the domain admins group. B. Add the applications service accounts to the local administrator group. Use the restricted group option in each computers local group policy. C. Add the applications service accounts to the local administrators group by using the restricted groups option in an OU group policy. D. Add the applications service accounts to the local administrators group by using the restricted groups option in a domain group policy.
My answer is D (not sure). My guess: Not A, because you are giving them membership in Domain Admins – not good. Not B- don’t think this is an easy way of centralizing. Not-C because Q is not talking aboout OU. I think D because you then centralize the whole process trough an domain policy. But don’t trust this anwer – I am not sure
7 (below: new Q i never seen before)
Also had an exhibit Q choosing the right submask and default gateway for an IP adress something like 10.?.?.?. I guess it was a class A. so I choose 255.0.0.0 for sub net mask. Don’t remember what I choose for the def. Gate way. Anyway: I didn’t find any which ended on something like 10.0.0.1. Default gateway usually end on 1.
8 (below: new Q i never seen before)
I also had a Q there the exhibit showed an warning message, guess it had something to do with an appplication running which I had to close. Maybe it had to do with the process window in task manager. I don’t remember this Q correctly
I had choices like these:
A Close My Computer window B Choose yes to proceed C some kinda command???? C some kinda command????
My answer: A (not sure)
XXX. You install a new server application on your Windows 2000 Server computer. Response times fail to meet user specifications. You want to use the Process page in Task Manager to find out whether the response time of new application would improve by the addition of one or more processors. Which two columns should you select to view? (Choose two.) To answer, click the two appropriate check boxes in the Select Columns dialog box. Display image
A. User Objects B. I/O Reads C. I/O Writes D. Memory Usage E. Page Pooled
F. CPU Usage *** G. Threads Counts ***
88. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. (See the exhibit of the network layout)
What would you do to monitor Application server? (Choose two)
A. Install Network Monitor on Monitor 1 B. Install Network Monitor on Application Server C. Configure the network monitor ECP port comething for TCP D. Configure the network monitor EDP port something for UDP E. Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance Answer:
89. You have configured a Gourp Policy Object (GPO) for the marketing oranization unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do?
A. Add the Managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy. B. Add the Managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the Group Policy. C. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Deny the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to deny the ability to run system Control Policy Panel. Give the original GPO a higher priority than the new GPO. D. Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Disable the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the original GPO a higher priority than the new GPO. Answer: D
90. You are the administrator of a Windows 2000 Active Directory Network. The network consists of a single domain named adatum.local that runs in native mode. The domain includes 500 member client computers, consisting of 200 Windows 2000 Professional computers and 300 Windows NT Workstation 4.0 computers. You create a Group Policy for the Research organizational unit (OU) and configure the Policy as shown in the exhibit.
None of the users in the Research OU working at Windows 2000 Professional computers can change the wallpaper on their desktops or the resolution and colour depth of their displays. However, when users log on from any of the Windows NT Workstation computers in the OU, they can change all display settings. You want to restrict all users of Windows NT Workstation computers in the OU from changing their desktop wallpaper and from accessing the settings tab in Display in Control Panel.What should you do?
A. Add a new computer to the OU and select the "Allow Pre-Windows 2000 computers to use this account" check box.
B. Change the Group Policy so that it also hides the Background tab. C. Create a seperate Group Policy for a nested OU that contains all Windows NT computers. D. Configure a Windows NT Policy file and place it in the winnt\sysvol\Adatum.local\scripts folder on the PDC emulator. Answer: D
91. You are a member of the Backup Operators Group in the arborshoes.com domain. You are not a member of any other group in the domain. You are logged on to a Windows 2000 Server. You try to configure the software from a tape backup device, but the configuration fails during backup. The documanetation from the tape backup device indicates that the current tape driver is out of date and must be updated to support the configuration. What should you do?
A. Run the "runas" command, supply your user name and password to start device manager. Then click the update driver command button on the Driver tab for the tape backup device. B. Instruct a domain administrator to run the "runas" command, supplying the domain administrator user name and password to start device manager. Then click the update driver command button on the Driver tab for the tape backup device. C. Open the device manager, and then click the update driver command button on the driver tab for the tape backup device. D. Run the Add/Remove Hardware wizard, when prompted select the Add/Troubleshoot a device option. Answer: B
92. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?
A. Convert the disk that contains the shared folders to a dynamic disk. B. Convert the partition that contains the shared folders to NTFS. C. Defragment the disk that contains the shared folders. D. Move the paging file to the partition that contains the shared folders. Answer: C
93. You are the network administrator at Island Hopper News. The domain and network configuration is a single-site Windows 2000 domain that is configured as shown in the exhibit. You must provide Terminal Services to the Pentium MMX client computers. You also need to be able to manage user liscenses and enable users to access term1.islandhoppernews.com. First you install Terminal Services in Application server mode on term1.islandhoppernews.com. What should you do next?
A. Install Terminal Services liscensing on term1.islandhoppernews.com. Select the Enterprise liscense server option.
B. Install Terminal Services liscensing on term1.islandhoppernews.com. Select the Domain liscense server option. C. Install Terminal Services liscensing on file1.islandhoppernews.com. Select the Enterprise liscense server option. D. Install Terminal Services liscensing on file1.islandhoppernews.com. Select the Domain liscense server option. E. Install Terminal Services liscensing on uu2.islandhoppernews.com. Select the Enterprise liscense server option. F. Install Terminal Services liscensing on uu2.islandhoppernews.com. Select the Domain liscense server option. Answer: B
94. You are the network administrator at Humongous Insurance, a major insurance comapny that has 1,000 offices world wide. You are configuring the network so that only the sales staff can connect to it from home. Your Windows 2000 forest contains a member server named SV1 that has Routing and Remote Access for Windows 2000 enabled. You configure SV1 to use a modem bank to accepr incoming dial-up attempts. You configure SV1 to use Windows Authentication as the authentication Provider. The only supported authentic method is MS CHAP V2. You need to restrict access to SV1. What should you do?
A. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Client-Friendly-Name attribute of the default remote access policy. B. Create an OU named SS. Populate SS with the sales staff user accounts. Provide access to this OU by using the Windows-Group attribute of the default remote access policy. C. Create a new remote access policy. Add the Everyone group to this policy by using the Windows-Group attribute in the properties of each sales staff user acounts. Control dial-in access through remote policy. D. Create a Windows 2000 glocal group. Populate this global group with the sales staff user accounts. Provide access to the global group by using Windows-Group attributes of the default remote access policy. Answer: D
95. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
A. Set the CrashonAuditFail registry key to 0. B. Set the Security Log to overwrite events as needed. C. Delete the Liscense Trial registry key. D. Increase the size of the security log. E. Save the security log to a file, and clear it every morning. Answer: A
96. Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only. What should you do?
A. Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy.
B. Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy. C. Set a Group Policy on all OUs containing computer accounts to enable the passwords must meet complexity requirements policy. D. Set a Group Policy on all OUs containing user accounts to enable the passwords must meet complexity requirements policy.
Answer: A
97. You are a network administrator at Contoso, Ltd. You work at the main office in Seattle. The branch office in Denver is a call center. The network consists of a Windows 2000 domain only. The network is configured as shown in the exhibit. Denver is a Token Ring network. Seattle is an Ethernet network. None of you network adapters at Contoso, Ltd. support promiscuous mode. The brouter does not support multicast traffic. Wks1.contoso.com and mem1.contoso.com are available for use as
network monitor clients. You want to be able to detect and identify rogue installations of network monitor on your network by using the fewest possible computers. What should you do? (check all that apply)
A. Install network monitor tools on wks1.contoso.com by using the Windows Components wizard. B. Install the SNMP protocol on wks1.contoso.com by using the Windows Components wizard. C. Install network monitor tools on mem1.contoso.com by using the Windows Components wizard. D. Install the SNMP protocol on mem1.contoso.com by using the Windows Components wizard. E. Install a network adapter on wks1.contoso.com that supports promiscuous mode. F. Install a network adapter on mem1.contoso.com that supports promiscuous mode. Answer:
98. You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all netowkr traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?
A. Set the second adapters status to disable. B. Configure the first adapter to use a TCP/IP metric of 100. C. Configure the second adapter to use a TCP/IP metric of 25. D. Configure the binding order on the second adapter to bind TCP/IP last. Answer: C
100. Your company network includes a PentiumII, 450Mhz database server names Webdata1. Webdata1 supports a high-traffic e-commerce web site on a server names Webserver1. Users access the e-commerce website from their Internet browsers. Users report that when they attempt to complete a purchase, they must wait five minutes for confirmation that their order has been processed. You want to use Task Manager to help you decide whether an additional processor is needed. What should you do?
A. On the performance tab, select the option to monitor the system cache. B. On the performance tab, select the option to monitor the available physical memory. C. On the process tab, select the option to monitor the memory usage column, Monitor this column. D. On the proces tab, configure the view to include the thread count column, Monitor this column. E. On the proces tab, configure the view to include the page faults column, Monitor this column. Answer: D
101. You plan to install Windows 2000 Server on 10 new computers. These servers will provide file and print services in branch offices of your company. The company wants each branch office to purchase its own copy of Windows 2000 Server. The installation in each branch office should use the serial number associated with the branch office's own copy. You want to install, configure, and test Windows 2000 server on these computers at the main office before shipping the computers to the branch offices. You want users in the branch offices to enter the computer names and serial numbers when they receive the computers. What should you do?
A. Install Windows 2000 server on the computers by using an unattend.txt file, and then use the Registry Edition to remove the computer name and license details.
B. Start the installation process from an MS-DOS boot disk. Install windows 2000 server on the computers from an existing server by running the winnt command with the /PreInst switch.
C. Install Windows 2000 server on the computers and then use setup manager to create a sysprep.inf file for sysprep.exe. Place the sysprep.inf file on the computers and run the sysprep - nosidgen command. D. Create an unattend.txt file by using Setup Manager. Include the following line in the Unattend.txt file: oemPreinstall=Yes. Use the file to perform the installation. Answer: C
102. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web Site for your company. Company policy requires that only authenticated users have acces to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A. Install Active Directory on the server. B. Select Basic Authentication check box. C. Clear the Allow Anonymous Connection check box. D. Disable the IUSE_inta user account on Intra. E. Clear the Allow IIS to Control Password check box. Answer: C
103. You wish to setup a domain policy to have passwords expire in 30 days. You wish to setup a local computer policy to have passwords expire in 90 days. Choose two:
A. Set Domain Policy for password expiration in 30 days. B. Set Domain Policy for password expiration in 90 days. C. Set OU for password expiration in 30 days. D. Set OU for password expiration in 90 days. E. Set Local Computer Policy for password expiration in 30 days. F. Set Local Computer Policy for password expiration in 90 days. Answer: A, F
104. You are the network administrator for Island Hopper News. The main office has a Windows 2000 workgroup that includes 5 Windows 2000 server computers and 10 windows 2000 Professional computers. Currently no users at the main office have Internet access. Island Hopper News has two remote offices, each with a Windows 2000 workgroup. None of the three offices is networked to another. However, users at the remote office connect to the main office individually to access network resources. A server named Member2 is located at the main office. Member2 has two netowkr adapters. Adapter1 and Adapter2. Adapter1 is connected to the LAN and Adapter2 is connected to a DSL modem which is connected to the Internet. To provide users at the main office with internet access, you enable internet connection sharing on Member2. Now some users at the main office are still unable to access the Internet. You need to ensure that local network resources are always accessible, and you need to ensure that users at the main office have Internet access. What should you do?
A. Configure Internet Connection Sharing (ICS) to be enabled on Adapter1. B. Configure Internet Connection Sharing (ICS) to be enabled on Adapter2. C. Configure Network Address Translation (NAT) on Member2.
D. Install a Proxy Server on the company's Network. Answer: C
105. Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do?
A. Add the applications service accounts to the Domain Administrator Group. B. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy. C. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy. D. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy. Answer: C
106. You install a new application on a computer running Terminal Services in Application Server mode. Users of this application must have access to files stored on a computer running Netware 4.11. TCP/IP is not installed on the computer running Netware. What steps should you take to enable Terminal Services clients to access the computer running NetWare?
A. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.2.
B. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3. C. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.3. D. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3. Answer: A
107. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?
A. Ensure that the log type is set to W3C. B. Change the log rollover property in the website's logging properties.
C. Change the time zone setting in the time properties on the web server. D. Configure the time service on the web server to use local system account. Answer: B
108. Your Windows 2000 Server computer contains four 16GB hard disks. Disk0 is configured as a basic disk. Disk0 has a single 16GB partition that contains the boot and system files. Disk 1, 2 and 3 are configured as dynamic disks in a RAID5 volume. The entire server is backed up to a tape drive each night. During your daily review of the servers event logs, you discover that Disk1 has failed. You shut down the server and replace Disk1 with a new hard disk. When you restart the server Windows 2000 starts normally, but the data on the RAID5 volume is inaccessible. Disk Management indicates that Disk2 has failed too. You replace Disk2 with a new hard disk. Now you need to recover the data on the RAID5 volume as quickly as possible. What should you do?
A. Use Disk Manager to rebuild RAID5 partition. B. Delete and recreate the RAID5 partition. Restore the contents of RAID5 partition from the most recent tape backup. C. Use Windows 2000 backup to restore the contents of Disk2. Use Disk Manager to rebuild the RAID5 partition on Disk1. D. Delete and recreate the RAID5 partition. Restart the server by using Windows 2000 Setup CD, and select repair option. Answer: B
109. Your Routing and Remote Access for Windows 2000 is configured with the policies shown in the exhibit:
Remote Access Policy .............. 1
Remote Access Policy .............. 2
Remote Access Policy Logon Required 3
The current configuration allows users to connect remotely after logging on. You want to limit remote connections to logon connections only. What should you do?
A. Delete the required L2TP policy. B. Configure the logon required policy to grant access.
C. Move the logon required policy to number one in the policy order. D. Change the "Allow access if dial-in permission is enabled" policy to include the logong required policy. Answer:
110. You are a recently hired network administrator at Awesome Computer. Awesome Computer has an office in New York and Toronto. Company network configured as:
Toronto Office:
Windows 2000 Domain Controller
Monitor1 with community name of AwesomeA
WebServer with community name of AwesomeA
New York Office:Windows 2000 domain Controller
Monitor2 with community name of AwesomeB
ApplicationServer with community name of AwesomeB
These two offices are linked to two routers with Internet between the routers.You are responsible for monitoring all servers from Monitor1. Monitor1 and Monitor2 are configured with Management Console running third party network management software. ApplicationServer and WebServer are configured as SNMP agents. You discovered that you are unable to manage ApplicationServer from Monitor1. What should you do?
A. Relocate the ApplicationServer to Toronto office. B. Move ApplicationServer computer account to Toronto domain.
C. Add AwesomeA to the list of accepted community names on ApplicationServer. D. Add public to the list of accepted community names on ApplicationServer. E. Remove all community names from ApplicationServer. F. Remove all community names from Monitor2. Answer: C
111. You are the administrator of 20 Windows 2000 Professional computers and 2 Windows 2000 Server computers for your domain. You want to set an account policy that locks any user account after 3 failed logon attempts. You also want to ensure that only administrators will be able to unlock the account. What should you do? (Choose 2)
A. Set the account lockout duration to 0. B. Set the account lockout duration to 3. C. Set the account lockout threshold to 0. D. Set the account lockout threshold to 3. E. Set the reset account lockout after to 0.
F. Set the reset account lockout after 3. Answer: A, D
112. You are the administrator for your company. Your Windows 2000 Server computer contains two 23GB hard disks. Each disk is configured as a basic disk and has a single 23GB NTFS partition. Both partitions are backup up to tape every night. The partition on Disk1 stores user data. Most users of your company encrypt their files. Disk1 fails. You replace it with a new disk. You need to recover the data as quick as possible while maintaining the security of the files. What should you do?
A. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Run the cipher /d /i command. B. Create a single NTFS partition. Restore the contents of Disk1 from the most recent tape backup. Instruct the users to verify the integrity of their files. C. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Logon to the server console as a recovery agent. Copy the files from the second file server to the new partition.
D. Create a single NTFS partition. Restore the contents of Disk1 to a second file server. Instruct users to copy their files from the second file server to the new partition. Answer: B
113. Your network consists of a Windows 2000 Server computer and 10 Windows 2000 Professional computers. The Windows 2000 Professional computers use a modem and a dial-up connection each to connect to the Internet. Now, you rent a single DSL-Line which will be configured on your Windows 2000 Server computer. You install Internet Connection Sharing (ICS) on the server. All Windows 2000 Professional computers have to use ICS. How should you configure all Windows 2000 Professional computers to connect to the internet without changing or removing the existing dial-up connection? (Choose all that apply)
A. In Internet Options select "Never dial a connection". B. In Local Area Network Settins set "Use automatic configuration script". C. In Local Area Network Settins set "Automatically detect settings". D. In Local Area Network Settins set "Use a Proxy Server". E. In Local Area Network Settins set "Bypass Proxy Server for local addresses".
Answer: A, C
114. You are the administrator of a high security network. Many files stored on your Windows 2000 file servers and Windows 2000 Professional computers are highly confidential. You want to implement identical security configurations on all Windows 2000 file servers and Windows 2000 Professional computers. what should you do? (Choose all that apply)
A. Configure Group Policies to apply the security configuration to all Windows 2000 file servers and Windows 2000 Professional computers.
B. Use the Security Configuration Management Console to import security information from a file server as a template.
C. Use the Security Configuration Management Console to import security information from a Windows 2000 Professional Computer as a template.
D. Use Secedit to export the security configuration to all file servers.
E. Use Secedit to export the security configuration to all Windows 2000 Professional computers. Answer: A, B, C
115. You are the administrator of a Windows 2000 network. You have installed the SNMP agent on one of your Windows 2000 Server computers. You want to collect routing information on a second Windows 2000 Server computer running a third party Network Management Console. How should you configure the SNMP agent? (Click to put a crosshair in the appropriate checkbox)
A. Physical B. Applications C. Datalink and subnetwork D. Internet E. End-to-end Answer: C
117. Your company has five branch offices, which are not networked. On each side you have one Windows 2000 Server computer. The offices WEST and EAST have servers named West1.Testsys.com and East1.Testsys.com, which are configured with RRAS. You have to connect these two branch offices through the internet via VPN. Users from WEST should be able to connect to EAST and vice versa. (You see a picture with five servers and the Internet between them) How should you configure West1.Testsys.com and East1.Testsys.com?
A. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN Server.
B. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN Server.
C. West1.Testsys.com as VPN Server - East1.Testsys.com as VPN Client.
D. West1.Testsys.com as VPN Client - East1.Testsys.com as VPN Client. Answer: D
|