A+ 2003 OS Technologies


1. An upgrade will preserve the applications, settings and user preferences from the previous operating system. You would like to perform an upgrade. Which of the following operating systems can be upgraded to Windows 2000? (Choose all that apply)

A. Windows 98
B. Windows 3.x
C. MS-DOS 6.22
D. Windows NT and Workstation 3.51
E. OS/2 Warp
F. RedHat Linux 5.0

>> !
Answer: A & D

Microsoft supports an upgrade path from Windows 98 to Windows 2000. During the installation, the existing Windows files will be replaced.

Microsoft supports an upgrade path from Windows NT3.51 to Windows 2000. During the installation, the existing Windows files will be replaced.

Microsoft does not provide an upgrade path from Windows 3.x to Windows 2000. You must perform a new installation. You can format the disk and install Windows 2000 as your only operating system or you can perform a dual boot installation and choose between booting into Windows 3.x or Windows 2000. You can upgrade to Windows 98 and then upgrade to Windows 2000 from there, but it would be better in the long run to simply install Windows 2000 from scratch.

Microsoft does not provide an upgrade path from MS-DOS to Windows 2000. You must perform a new installation. You can format the disk and install Windows 2000 as your only operating system or you can perform a dual boot installation and choose between booting into MS-DOS 6.22 or Windows 2000. You can upgrade to Windows 98 and then upgrade to Windows 2000 from there, but it would be better in the long run to simply install Windows 2000 from scratch.

Microsoft does not support upgrading to Windows 2000 from non-Microsoft operating systems. OS/2 Warp is a 32 bit IBM operating system.

Microsoft does not support upgrading to Windows 2000 from non-Microsoft operating systems. RedHat Linux 5.0 is a UNIX based operating system.


2. You want to be able to boot into Windows 98, NT or 2000 from the same computer. Which of the following is true in regard to installing multiple Microsoft operating systems?

A. You should install the operating systems in this order: Windows 2000, Windows NT, Windows 98.
B. You should install the operating systems in this order: Windows 98, Windows NT, Windows 2000.
C. It does not matter in which order the operating systems are installed.
D. You cannot install more than one Microsoft operating system on a computer.

>> !
Answer: B

The rule of thumb when installing multiple Microsoft operating systems for a multi boot configuration is to install the Windows 9x Operating Systems first (oldest to newest) and then the Windows NT based Operating Systems (oldest to newest). This prevents the 9x installation from replacing the boot sector, and ensures that the most recent OS will have the proper files. If you want to include MS-DOS in the multi boot, it should be installed first.

The Windows 9x installation would overwrite the boot sector, causing you to lose the operating system menu and option to boot into other operating systems, so Windows 9x should never be installed after Windows NT-based operating systems. In addition, the Windows 2000 installation upgrades NTFS to v5, so it should always be installed after Windows NT.

It does matter in which order the Operating Systems are installed, because installing Windows 9x after NT-based Operating Systems will overwrite the boot sector and cause you to lose the boot menu options. If the Operating Systems are not installed in correct order, some of them may not start and/or you may have problems with features such as NTFS.

You can install as many Microsoft operating systems as you have logical drives to install them on, and you can easily boot into any of the installed operating systems, so long as you install each on a separate drive and install them in the proper order.


3. You are trying to set up a dual boot configuration on a computer so you can boot to both Windows 95 and Windows 2000. The installation seems to complete, but when you boot into Windows 2000 and try to use Microsoft Internet Explorer (MSIE), you get the following error message: Iexplore caused an invalid page fault in module kernel32.dll What is the most likely cause of the problem?

A. You installed the operating systems in the wrong order.
B. Windows 95 cannot be dual booted with Windows 2000.
C. You installed Windows 95 and Windows 2000 on the same logical drive.
D. You must use the same version of MSIE on both operating systems.

>> !
Answer: C

If you install multiple operating systems on a single logical drive, this can cause problems when running the operating systems. Specifically, MSIE may quit and display the error message "iexplorer caused an invalid page fault in module kernel32.dll."

Installing the operating systems in the wrong order (Windows 2000, then Windows 95) will result in your not being able to start Windows 2000 after installing Windows 95 because the boot sector will be overwritten and you will lose the boot menu options.

You can multi boot any Microsoft operating systems, as long as you install each on a separate logical drive and install them in the proper order.

It is not necessary to have the same version of MSIE installed on all operating systems in a multi boot configuration but you must install each instance of Windows in a separate logical drive so the operating systems will not attempt to share OS files.


4. You are running Windows 2000. You want to create an Emergency Repair Disk for emergencies. Which of the following is true of the Windows 2000 ERD?

A. A Windows 2000 ERD can be created by inserting the Windows 2000 installation CD and selecting the emergency repair option (R).
B. You can create an ERD by copying the Windows 2000 boot files (NTLDR, NTDETECT.COM and BOOT.INI) to a floppy disk.
C. You can create an ERD by using the Recovery Console.
D. You can create an ERD using the Windows Backup utility.

>> !
Answer: D

The Windows 2000 backup utility, which can be run by typing ntbackup.exe at the command prompt or selected from the Programs | Accessories | System Tools menu, includes the option to make an Emergency Repair Disk (ERD). This can be done by clicking the Emergency Repair Disk button on the General tab or by selecting Create an Emergency Repair Disk from the Tools menu.

Selecting the emergency repair option (R) from the Windows installation CD allows you to perform an emergency repair with an ERD that you have already created previously. It does not create an ERD.

Copying the Windows 2000, boot files to a floppy disk will create a boot disk, but this does not create an ERD. The ERD contains backups of system files, the boot sector and the startup environment that can be used to repair problems related to these areas. The ERD is not bootable.

The Recovery Console is a command line interface that is used to perform repairs. It is not used to create an ERD.


5. You want to use MS-DOS mode on your Windows computer. In which of the following situations would you use MS-DOS mode?

A. You want to run a command line utility such as MEM in Windows 9x.
B. You want to run a program in Windows 9x that requires the exclusive use of all your computer's resources.
C. You want to run a Windows 3.x program in Windows 2000.
D. You want to dual boot MS-DOS and Windows 9x.

>> !
Answer: B

MS-DOS mode in Windows 9x is designed to run MS-DOS based applications that require exclusive use of all the computer's resources. Usually, when you attempt to run such a program, Windows will detect that the application requires MS-DOS mode. If it does not, you can manually configure the program to use MS-DOS mode.

To run a command line utility such as MEM in Windows 9x, you can type command in the run dialog box to bring up a command prompt window. There is no need to go to MS-DOS mode, which requires that you exit Windows.

Windows 2000 does not have an MS-DOS mode. MS-DOS mode is used only by Windows 9x. Windows 2000 can run Windows 16 bit 3.x programs in a virtual machine called Windows on Windows (WOW).

To dual boot MS-DOS and Windows 9x, you must first install MS-DOS, then install Windows 9x. If you press F8 during the startup of Windows, you will see a boot options menu that includes a choice to boot to your previous version of MS-DOS (6.22 or below). This is different from booting into the MS-DOS 7.0 (MS-DOS mode) that is included with Windows 9x.


6. You are running a dual boot configuration with Windows 98 and Windows 2000 Professional on your computer. You decide to remove Windows 98, so you delete the directory into which it is installed. However, the choice to boot to Windows 98 still appears on the boot menu at startup. What is the best way to remove the Windows 98 boot option from the boot menu?

A. The boot menu cannot be changed; if an OS has ever been installed, it will always appear here.
B. Edit the boot.ini file.
C. Reinstall Windows 2000 to overwrite the boot sector of the hard disk.
D. Use the Control Panel | System | Advanced tab and select Startup and Recovery to select which operating system choices will be displayed in the boot menu.

>> !
Answer: B

You can remove an old OS from the boot menu by editing the boot.ini file. It is a text file that can be edited in a text editor such as Notepad. First, you must remove the hidden, read-only and system attributes from the file. Then you open the file and delete entries that point to the Windows 98 installation, and save the changes. You should back up the file before editing it.

Every OS that has been installed will appear in the boot menu unless you manually remove it; however, you can do so by editing the boot.ini file.

Reinstalling Windows 2000 over the existing version will still pick up the options that are present in the existing boot menu. If you formatted the hard disk and reinstalled Windows 2000 fresh, this would wipe out the previous boot menu and give you a new boot menu without the Windows 98 option, but is an unnecessarily drastic solution that would cause you to lose your Windows 2000 settings and any data files on the newly formatted partition.

Using the Control Panel | System | Advanced | Startup and Recovery will allow you to select which of the operating systems shown in the boot menu is the default, but it does not allow you to edit the boot menu and make changes to which OSs are displayed there.


7. You are having problems with booting your computer into Windows 95b, which is installed on a FAT32 drive. You suspect it may be due to a change you made to the display settings. The desktop is not visible when you boot into Windows.
Which of the following would be the best first step in troubleshooting this problem?

A. Boot into Safe Mode, insert the Windows installation CD, and copy the appropriate video drivers to the Windows directory.
B. Format the disk and reinstall Windows and all your applications.
C. Boot into MS-DOS mode and replace all video driver files.
D. Boot into Safe Mode and change the display settings.

>> !
Answer: D

Safe Mode allows you to restart the computer with only the minimum drivers necessary to start Windows. This includes a basic VGA video driver at default settings, so you will be able to see the display. You can then change the settings that are causing the problems.

Although booting into Safe Mode is appropriate, Safe Mode loads only the basic drivers that are needed to start Windows. It does not load CD ROM drivers; thus, you would not have access to the CD ROM drive and could not perform the rest of this action. Even if you could, this would not be the solution to the problem because it was caused by changing settings, not changing drivers.

Although this would probably fix the problem, it is a drastic solution that should not be necessary, and certainly would not be the first step in troubleshooting but an action of last resort.

This would not correct the problem because drivers are not the problem, and even if they were, you cannot replace the video drivers from MS-DOS.


8. When you attempt to start your computer, you get an error message that says "Himem.sys missing or corrupt." You attempt to start the computer from a bootable floppy disk and get the same result. You try the bootable floppy in another computer and can boot normally. Which of the following is most likely the cause of the problem?

A. The Himem.sys file on the hard disk is corrupt.
B. The Himem.sys file on the floppy disk is corrupt.
C. There is a problem with your CPU.
D. There is a problem with physical memory.

>> !
Answer: D

Because you are getting the same error message relating to memory when you try to boot from the hard disk or the floppy, it is likely that a problem with your physical RAM is causing the problem.

Because you got the same error message when you tried to boot from the bootable floppy, it is unlikely that this is the problem.

Because you get the same message when you attempt to boot from the hard disk, and because the floppy works when you try to boot it from a different computer, it is unlikely that this is the problem.

A problem with the CPU would not result in a message that this file is missing or corrupt.

An alternative is that even though you put a bootable floppy disk in the floppy disk drive, the boot sequence is not allowing you to boot from a floppy disk. Verify that the boot sequence allows you to boot from the floppy disk drive before replacing memory or troubleshooting this problem further.


9. You want to troubleshoot an application error in Windows 98 and need to analyze information about the state of the operating system at the time of the program fault. Which of the following utilities can you use to collection this information and save a snapshot of your system?

A. Dr. Watson
B. The Event Viewer
C. System Monitor
D. MSINFO32.EXE

>> !
Answer: A

Dr. Watson (which can be run by typing drwatson.exe in the Run dialogbox or from a command prompt) can be used to collect information about the state of the OS when a program fault occurs, and automatically log the information to a file on the disk. The information collected must be interpreted by Microsoft.

The Event Viewer can be used in Windows NT, 2000 and XP to view information about system and application errors and events. However, this tool is not included in Windows 98.

The System Monitor is an administrative tool included in Windows NT, 2000 XP and Server 2003 that is used for monitoring performance of various system components. It does not collect detailed information about the OS at the time of a program fault, and it is not included in Windows 98.

The MSINFO32.EXE utility is included with Windows 98, but it is used to view general system information and does not itself collect detailed information about the system state at the time of a program fault. However, Dr. Watson can be run from within the MSINFO32 utility by selecting it from the Tools menu.


10. You are running Windows 95 and want to run some realmode device drivers in the upper memory area to save conventional memory. You find that you are unable to do so. What is the most likely problem?

A. You cannot run device drivers in upper memory when running Windows 95.
B. HIMEM.SYS is not loaded.
C. You don't have enough physical RAM.
D. You need updated device drivers.

>> !
Answer: B

Windows 95 does not load HIMEM.SYS by default. You will need to edit the config.sys file to load HIMEM.SYS and EMM386.EXE in order to access the upper memory area. You will also need to include the DOS=UMB statement, and a DEVICEHIGH= statement to specify the realmode driver(s) to be loaded in upper memory.

You can run device drivers in upper memory when running Windows 95, and it should be done if you are running DOS programs that run in conventional memory and you need to conserve conventional memory. However, you must first edit your config.sys file to load HIMEM.SYS and EMM386.EXE before you can access the upper memory area.

Regardless of the amount of physical RAM installed in the computer, your devices will be loaded by default into conventional memory (below 640K) unless you edit the config.sys file to load HIMEM.SYS and EMM386.EXE so the upper memory area can be accessed.

Regardless of the drivers themselves, your devices will be loaded by default into conventional memory (below 640K) unless you edit the config.sys file to load HIMEM.SYS and EMM386.EXE so the upper memory area can be accessed.


11. Your Windows 9x system has gradually slowed down over time. You notice that no matter what you're doing, whether working in Microsoft Word or surfing the web, applications seem to run much more slowly than they did when you initially installed the operating system. Which of the following is NOT a likely reason for the slowdown?

A. Your hard disk is getting too full.
B. You have loaded too many programs into the Startup folder.
C. Your system has contracted a virus.
D. Your ISP has added too many customers for the available bandwidth.

>> !
Answer: D

This could cause your Internet access to slow down over time, but because you are experiencing the slowdown when working with local applications, this is not a likely cause of the problem.

If Windows 9x is set to dynamically resize the swap file, allowing the drive on which the swap file is located to get too full will cause Windows to shrink its size, which can slow down performance.

Programs that are in the Startup folder start automatically when Windows boots. Programs that automatically load when you start the computer take up system resources. Over time, if you increase the number of programs in the Startup folder, this can slow down the system. Some programs put themselves into the Startup folder during their installation, so you may not have done this explicitly.

Some viruses can cause the system to slow down. You should scan the system regularly for viruses and keep your anti virus software's definition files up to date.


12. When you attempt to start your Windows 98 computer, you get a message that says "Windows Protection Error." You try to start Windows 98 in Safe Mode and receive the same error. What should your next step be in troubleshooting this problem?

A. Remove all unnecessary hardware peripherals (sound card, modem, network card, etc).
B. Format the hard disk and reinstall Windows.
C. Restore the Windows Registry.
D. Add more physical RAM.

>> !
Answer: C

Corrupt Registry files can cause this error. The next step in troubleshooting when you are unable to start Windows 98 in Safe Mode is to restore the Registry after booting the computer from an emergency boot disk.

It is unlikely that a hardware device will cause this problem. Therefore removing the unnecessary peripherals is not likely to resolve the problem.

This will probably fix the problem; however, it is a drastic solution and should always be a last resort. It is not the next step in the troubleshooting process.

The Windows Protection Error is not caused by a lack of physical RAM, and adding more will not correct the problem.


13. You have recently upgraded your computer from MS-DOS/Windows 3.x to Windows 9x. The installation seems to complete successfully, but the computer hangs up and stops responding after the Windows logo screen displays. Which of the following is most likely to be the culprit?

A. Your disk is fragmented.
B. An antivirus program is loading from your AUTOEXEC.BAT.
C. The computer does not have the minimum amount of RAM necessary for Windows 9x.
D. The CONFIG.SYS file contains a line to load HIMEM.SYS.

>> !
Answer: B

If your AUTOEXEC.BAT contains instructions to load an antivirus program, the program may detect a change in COMMAND.COM due to the installation of Windows and think this is a virus. The AV program may be displaying a prompt screen that you cannot see because of the Windows logo screen. Press the Escape key and this will help to unveil a problem sometimes.

A fragmented disk will cause Windows to run slowly, but will not cause it to hang during startup.

If the computer does not have the minimum amount of RAM necessary to run Windows 9x, you will receive an error message during the installation process when SETUP examines the computer.

Although Windows 9x does not load HIMEM.SYS by default, you can edit the CONFIG.SYS file to do so. This should not cause Windows to hang during startup.


14. While installing a program on your Windows NT or 2000 computer, you get a message that says "The application log file is full." What should you do to correct this problem?

A. Disable event logging in Event Viewer.
B. Clear the event log.
C. Exit the installation and begin it again.
D. Reboot Windows and run the installation again.

>> !
Answer: B

The Windows installer writes entries to the application event log during installation. If this fills the log, the installer may stop and display the message "The application log file is full." To correct the problem, open the Event Viewer, right click the application log icon in the left pane, and select "Clear all events" from the context menu. You could also set the log to overwrite events as necessary to prevent this in the future.

The default Windows event logs is the system, application, and security logs. Security logging is disabled by default. There is no mechanism in Event Viewer to disable logging of system and application events, although you can use the filtering option to cause no logged events to be viewable in these logs.

If you begin the installation program again without clearing the application log, you will have the same problem because the log is already full, so when the installer tries to write to it, the same error message will appear.

Rebooting Windows does not clear the event log, so you will have the same problem when you try to run the installation again.


15. You want to join a Windows network in which all computers share their resources and there is no centralized administration or centralized security. What type of network does NOT have centralized administration or security?

A. Client-Server.
B. Domain Based.
C. Peer-to-Peer.
D. Local Area Network.

>> !
Answer: C

A Peer-to-Peer network is also called a workgroup. It is a simple network that has only a few computers, in which each user controls access to the resources on his/her computer and there is no centralized security or centralized administration.

A client-server network is one in which there is a centralized logon authentication server (in a Windows client-server network, it is called a domain controller) that controls resource access and security.

A domain is a client-server network based on a Windows NT, Windows 2000 or Windows Server 2003 that acts as a domain controller and controls access to resources and security.

A local area network (LAN) refers to a network that is located in one geographic area (such as within a building or on a campus of contiguous buildings). A LAN can be either a peer-to-peer or a client-server network, as LAN describes the physical proximity of the computers in the network and does not describe the administrative model.


16. You want to set up a simple peer-to-peer local area network with widely available and inexpensive cabling and network cards. You don't need high speed networking now, but would like the ability to upgrade to at least 100Mbps transmission in the future. Which LAN architecture would you be most likely to use?

A. Token Ring
B. Ethernet
C. ARCnet
D. Fiber optic

>> !
Answer: B

Ethernet is the most popular LAN architecture and the cabling, NICs and hubs used for it are widely available and inexpensive in comparison to other architectures. Ethernet uses the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) media access method and can run at 10Mbps or be upgraded to 100Mbps using the same cabling, by buying new NICs and hubs.

Token Ring is a LAN architecture developed by IBM that uses a more sophisticated media access method called token passing. It is second in popularity to Ethernet, but its equipment is more expensive. Token Ring is relatively slow (16Mbps).

ARCnet is an older technology that is not in use much anymore. Its components are not widely available and it is a slow technology that is difficult to upgrade.

Fiber optic is a media type, not a network architecture. Ethernet can run over fiber optic cabling, which uses pulses of light for communications transmissions instead of electrical impulses. Fiber optic cabling is expensive but fast and reliable, and can run longer distances than Ethernet without degradation of the signal.


17. Your company is setting up a new LAN and wants to use a technology that will let them combine voice, data and video transmissions, with the ability to use virtual channels for switching data traffic quickly. Which of the following would be a good choice for this network?

A. 10base2
B. Token Ring
C. ATM
D. Wireless

>> !
Answer: C

Asynchronous Transfer Mode (ATM) is a relatively new networking technology that uses high speed switching to offer the high bandwidth availability needed for voice and video communications. It uses fixed length (53 byte) packets called "cells" into which data is divided for transmission.

10base2 is a networking standard for Local Area Networks (LANs) based on thin coaxial cable. It is limited to 10Mbps transmission, which is not enough bandwidth for effective voice and video transmission.

Token Ring is a highly reliable LAN technology but is not fast enough to support voice and video transmission.

Wireless technologies such as 802.11b and 802.11a are LAN technologies that provide convenience to users who roam within a building or campus with their laptops, or for putting computers in places where it's difficult to run network cabling. It is not fast enough, however, at 11 or 22Mbps, for reliable transmission of high bandwidth applications such as voice and video.


18. Your next door neighbor, who knows nothing about computers, tells you that he has bought a computer loaded with Windows 2000 and asks what he has to do to send email and surf the web with it. Which of the following is necessary for your neighbor to access the Internet?

A. The neighbor needs to buy additional software programs for Internet access.
B. The neighbor needs to order a second telephone line.
C. The neighbor needs to subscribe to an ISP.
D. The neighbor needs to buy a router.

>> !
Answer: C

An Internet Service Provider (ISP) is the average consumer's gateway to the Internet. The ISP has one or more high speed lines connected to the Internet backbone, and a bank of modems on a remote access server that allows customers to dial into the ISP's network and connect to the Internet over regular phone lines. The ISP's connection provides web surfing, email, hosts web sites and other Internet services.

Windows 2000 comes with the Microsoft Internet Explorer web browser, the Outlook Express email client and other Internet connectivity software built in. The neighbor does not need to buy additional software to access the Internet.

Although it is nice to have a telephone line dedicated to Internet access, it is not necessary. Users can use the same phone line for Internet access that they use for voice communications.

A router is a device that is used to connect one network to another. If the neighbor were setting up multiple computers in his home that he wanted to access the Internet through a single ISP account, with each computer having its own public IP address, he would need a router. For a single computer, he does not. He may need to buy a modem, if the computer he bought doesn't have one installed.


19. You want to build your own web page, to be hosted on your ISP's web server. Which of the following languages would you use to construct the web page?

A. HTTP
B. HTML
C. FTP
D. URL

>> !
Answer: B

HTML, the Hypertext Markup Language, is used to construct web pages. It uses simple coding to tell web browsers how the text and embedded graphics in a document should be displayed.

HTTP, the Hypertext Transfer Protocol, is not a language but a protocol used for communications between web clients (such as your web browser software) and web servers (the computers on which web pages are stored).

FTP, File Transfer Protocol, is used to transfer files across the Internet (or across a local network) between one computer and another, when both computers are using the TCP/IP networking protocols.

A URL, Uniform Resource Location, is a string of text that serves as an address to identify where on a network (usually the Internet) a resource (such as a web page) is located. The URL is usually a "friendly name" that identifies the server, domain, and specific document or file. The server and domain name are translated by the system into a numerical IP address that is used by IP protocol to identify the location.


20. You have created a web page that you have saved as an HTML document. Now you need to upload this document to your ISP's web server. Which of the following would you most likely use to upload the document?

A. PING
B. E-mail
C. Telnet
D. FTP

>> !
Answer: D

FTP, File Transfer Protocol, is used for uploading and downloading files between computers. If your ISP has given you an account name and password to connect to its web server, you can use an FTP program to put your HTML document in the appropriate directory on the web server so that it can be accessed by others across the Internet using a web browser.

Packet Internet Groper (PING) is a TCP/IP utility that is used to test connectivity between computers or routers on a network. It does not have the capability of transferring files.

Although it is possible to email an HTML document as an attachment, this is not the usual way to send a document to your ISP's web server, as it would have to be received by someone at the ISP and they would have to then upload it to the correct server. This is not a service that most ISP offer.

Telnet is a utility that allows you to connect to another computer as a terminal node and access files or run programs on the remote system. It does not provide a way to transfer files from your computer to the remote system.


21. You are setting up a new computer. You want to be able to access the Internet from the computer. Which of the following networking protocols must be installed?

A. NETBEUI
B. IPX/SPX
C. TCP/IP
D. RIP

>> !
Answer: C

TCP/IP, the Transmission Control Protocol/Internet Protocol is a protocol stack developed in the 1960s for use on the ARPANET, the predecessor of the Internet. It uses a sophisticated addressing scheme. It is the standard protocol stack for Internet communications and must be installed for a machine to communicate on the Internet. TCP and IP are separate protocols that work at different layers of the networking model.

NETBEUI (the NETBIOS Extended User Interface) is a simple networking protocol that can be used to connect Microsoft computers in a local area network. It does not provide a sophisticated addressing scheme and thus communications cannot be routed across networks. This makes it inappropriate for Internet communications.

The IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) protocol stack is more sophisticated than NETBEUI and uses network addresses and internal network addresses to route data between networks. However, it is not compatible with the protocols of the Internet and usually is used for older Novell NetWare networks, as it is the native protocol of NetWare 4.x and earlier versions.

RIP is the Routing Information Protocol, which can be used by routers to dynamically exchange updates to their routing tables. It is not required on computers to communicate on the Internet.


22. The domain names used for designating web sites on the Internet must be translated to IP addresses to be processed by the system, which uses IP addressing as the means for locating computers on the network. Which of the following performs the service of translating domain names to IP addresses?

A. Domain controllers.
B. DNS servers.
C. Web servers.
D. WINS servers.

>> !
Answer: B

Domain Name System servers maintain a database that lists domain names and their corresponding IP addresses, and service requests from other computers to lookup this information and map the friendly names used in URLs, email and other Internet communications to the IP addresses that are needed to actually route the data to its destination.

A domain controller is a logon authentication server on a Windows network. It handles requests from client computers to access the Windows network and its resources, and contains a database (called the SAM on NT servers and Active Directory on Windows 2000 or Windows Server 2003) with the user accounts that have been created by the administrator and their passwords.

Web servers are computers running web server software such as Microsoft's Internet Information Services (IIS) or Apache, that allows them to store web sites and pages on their hard disks and make them available across the Internet or local area network to others who connect to them using web browser client software.

Windows Internet Naming Service (WINS) servers are computers on Microsoft networks that maintain a database matching NETBIOS computer names to IP addresses. This works similarly to DNS but does not use hierarchical naming; NETBIOS uses a flat name space so that each computer name on the network must be unique.


23. In Windows 2000, you want to encrypt a file that contains a list of your passwords, in order to protect it from unauthorized persons. What must you do to encrypt the file?

A. First you must compress it, then use the cipher.exe command to encrypt it.
B. Use the ATTRIB command to set the encryption attribute on the file.
C. Use the Advanced button on the files Properties sheet, then check the proper checkbox.
D. Select the Security tab on the file's Properties sheet, then check the proper checkbox.

>> !
Answer: C

One way to encrypt a file in Windows 2000 is to click the Advanced button on the General tab of the file's Properties sheet. You can then select the "Encrypt contents to secure data" checkbox. This will cause the file to be encrypted.

Although the cipher.exe command can be used to encrypt files in Windows 2000, you cannot encrypt a compressed file. File compression and EFS (Encrypting File System), the encryption system used by Windows 2000, are incompatible. You would have to uncompress the file before you could encrypt it.

The ATTRIB command is used to set the following file attributes: Read-only, Hidden, System, Archive. It cannot be used to view or set the encryption attribute.

The Security tab on the file's Properties sheet (which appears only if the file is on an NTFS partition) is used to assign permissions for accessing the file to users or groups. It is not used to set the encryption attribute.


24. You are running the Windows 2000 operating system. You want to be able to encrypt and compress files and folders without using any third party programs. You also want to be able to set file level permissions on files and folders, to protect them from access by other users . Which of the following file systems should you use?

A. FAT
B. FAT32
C. HPFS
D. NTFS

>> !
Answer: D

The NT File System (NTFS) was developed by Microsoft for Windows NT and is the native file system for Windows 2000. The version of NTFS included in Windows 2000 (v5) supports file level compression, setting user/group permissions at the file level, and EFS encryption.

The FAT (File Allocation Table) file system, originally used in MS-DOS (and also called FAT16) is compatible with all Microsoft operating systems but it does not support advanced features such as encryption. Entire FAT drives can be compressed using utilities such as DRIVESPACE, but files cannot be compressed individually. FAT does not support file level permissions.

The FAT32 file system was introduced with Windows 95B. It was designed to support larger hard disks than the old FAT16 (up to two terabytes in size) and it also uses disk space more efficiently, so there is less wasted space due to cluster size. However, it does not support file level compression and permissions, and does not include encryption capabilities.

The High Performance File System (HPFS) was a file system developed by IBM for its OS/2 operating system. Although it could be used in Windows NT 3.x, it is not supported by later Microsoft operating systems, including Windows 2000.


25. Your computer has been running slowly when it accesses the hard disk, and you suspect this is because you have installed and uninstalled a large number of programs and deleted and saved a large number of files. Which of the following would be most likely to help increase disk performance?

A. Run SCANDISK
B. Run DEFRAG
C. Run CHKDSK
D. Add more RAM to the system.

>> !
Answer: B

DEFRAG.EXE (the disk defragmenter tool) rearranges clusters so that all the data for each file is stored in clusters that are contiguous to one another. This speeds up disk access because the disk heads don't have to move all over the disk to find the data. The DOS version is run from the command line. In Windows, the utility can be accessed from the System Tools menu.

The SCANDISK utility is used to detect disk errors such as invalid file names, bad sectors, etc. Running it is recommended if you are receiving disk errors. However, the description of your problem indicates that your disk has become fragmented. This occurs when files? data is spread out across the disk instead of being stored in contiguous clusters, as happens when many files are removed.

The CHKDSK utility is an older version of SCANDISK, used to detect disk errors and find lost clusters and cross linked files. It does not address the problem of fragmented files.

Although RAM can often increase system performance, it has no effect on disk access time, so it would not help in this situation.


26. Your supervisor wants you to set up a server to provide redundancy and good performance, as well as use minimum CPU resources. The amount of storage space needs to be large to hold all of the necessary data. The type of server that will be used is unknown as yet, but the redundant array will need to be able to be utilized either on a Windows or Netware server. What type of Redundant Array of Independent Disks (RAID)should you use?

A. RAID 5 hardware implementation.
B. RAID 5 software implementation.
C. RAID 1 hardware implementation.
D. RAID 1 software implementation.

>> !
Answer: A

Since the CPU needs to be used as little as possible, a hardware RAID controller needs to be used that manages its own processing. Since a large amount of data needs to be utilized, possibly several hard disks will need to be used. A RAID 5 implementation can be 3 to 32 disks in size.

The RAID 5 implementation is correct since a large amount of disk space needs to be used, but a software implementation is not correct since it requires increased utilization of the CPU.

The RAID 1 is incorrect since only two disks are used, and the data storage is only equal to one disk since both have the same information. The hardware implementation part is correct, since this reduces the CPU usage. The hardware controller manages the processing of RAID implementation.

A software implementation of RAID is not correct since it requires utilization of the CPU.


27. You have decided to convert an NTFS partition to FAT32. How will you do this?

A. Formatting the partition.
B. Using Disk Management to convert the NTFS partition.
C. By using the command convert /fs:ntfs [/v] from a command prompt.
D. NTFS configured partitions cannot be moved to FAT32.

>> !
Answer: A

Going from NTFS to FAT32 requires you back up the drive, reformat it, configure it as FAT32 and restore the data. There are no shortcuts to convert file systems in this "direction."

Going from FAT32 to NTFS is much simpler. You may use a convert utility or a command.

Disk Management is a utility that comes with Windows 2000/ XP and Windows Server 2003, but unfortunately it is not capable of converting an NTFS partition to a FAT32 partition. You can use Disk Management to delete an NTFS partition and then create a FAT32 partition, but the question specifically asks you to convert the partition.


28. On a Windows 2000 Server, you want to make all data redundant using software to manage the RAID (Redundant Array of Independent Disks) implementation. Which of the following RAID implementations should you use? (Choose all that apply)

A. RAID 1
B. RAID 0
C. RAID 2
D. RAID 3
E. RAID 5

>> !
Answer: A & E

RAID 1 is the only RAID implementation that can be used on the system partition for the NOS (Network Operating System).

RAID 5 is supported and can be used for the actual user data and network applications

RAID 0 does not provide any redundancy and therefore is not a valid solution.

RAIDs 2, 3 and 4 are not supported by Windows 2000.