Windows 2000 Accelerated


1. As you blow the third layer of dust off the top of the case, you realize even though the server is loaded with Windows 2000, this old boy has been a round for awhile. You check the disk subsystem and, sure enough, it is all EIDE. No wonder the access times are so slow.You decide to proceed with the upgrade to SCSI. You install the card and four drives. When you reboot, Windows does not automatically detect the hardware. You know that the card is not on the Hardware Compatibility List (HCL). What two things can you do to get the controller installed and working properly?

A. Open SCSI from Control Panel. Use the wizard to add the new SCSI controller by using the drivers provided by the manufacturer.
B. Open System from Control Panel. Add the new SCSI controller by using the drivers provided by the manufacturer.
C. Open Add/Remove Hardware from Control Panel. Use the wizard to add the new SCSI controller by using the drivers provided by the manufacturer.
D. Run the manufacturer's installation program to install the driver for the controller.

>> !
Answer: C & D

By default, the Add/Remove Hardware Wizard attempts to detect plug and play devices that are in the computer. Add/Remove Hardware will most likely not detect a non-plug and play card. Because Windows 2000 does not automatically detect the device, you must manually add the driver. This can also be accomplished from the Add/Remove Hardware Wizard in Control Panel. When asked to choose a hardware device to troubleshoot, select the top entry in the Devices window "Add a new device" and click Next. On the next screen by default you are asked if you wish to have Windows 2000 attempt to automatically detect the device. Select "No, I want to select the hardware from a list" and click Next. On the following screen, select the type of device you wish to install and click Next. Finally select and configure the correct device driver for your hardware to complete the installation.Windows 2000 Help, Search for the article entitled: To install a non-Plug and Play device.


2. Doesn't it seem like the same old problems just keep coming around again and again. Here's one for you. You have a system board with a built in NIC (remember when this used to be a built in modem?). You are tired of 4Mbs Token Ring and decide to install a new 10/100 Ethernet card (remember when this was 14.4Kbs modem?). Needless to say the devices conflict and the new device doesn't work. What can you do about this?

A. Use Device Manager to reconfigure the resource allotment of the integrated NIC.
B. Use Device Manager to reconfigure the resource allotment of the new NIC.
C. Disable the integrated NIC (usually in BIOS today, remember back when you had to disable the modem with a jumper on the system board?). OK, so we're giving you this one for old time's sake. If you've been around this long, you've earned it. If not just pick one of the wrong answers to make us old timers feel better will you please?
D. Remove the drivers for the integrated card using Driver Manager.

>> !
Answer: C

When one device that is no longer needed is still installed and conflicting with another device that is still needed, the best thing to do is uninstall the device that is no longer needed. In this case, the device that is needed is actually a part of the system board and cannot be removed. Because of this, the best course of action is to disable the device by using Device Manager. To open Device Manager, go to the Start menu and select Settings => Control Panel => System. On the Hardware tab, click on Device Manager.Windows 2000 Help, Search for the article entitled: Device Manager overview.


3. Expletives just aren't enough this time and banging on the equipment isn't producing results either. You have screwed up worse than just about anyone in history. Judas, Brutus, Nixon, the drummer who dropped out of the Beatles just before they took off - all amateurs. You see, you just ran a script, without testing it on a non-production server first, that REALLY messed up the Active Directory schema. To make matters worse, it replicated out before you realized how bad the damage was. Did I mention that it is seven in the morning, on Monday, and that any moment now users are going to be coming into work and will start pounding the server with logon requests?Let's recap shall we? That's right, you ran an untested script that completely fouled up the Active Directory schema just before business hours at the beginning of the week. Fortunately you have last night's backup which completed successfully. How can you restore the schema so that it is just like it was last night when it still worked?

A. Reboot one of your domain controllers in Directory Services Restore Mode. Restore the System State data from last night's backup and reboot the computer.
B. Reboot one of your domain controllers in Directory Services Restore Mode. Restore the System State data from last night's backup. Run ntdsutil.exe and reboot the computer.
C. Reboot one of your domain controllers into the Recovery Console and enter Active Directory Repair Mode. Restore the System State data from last night's backup and reboot the computer.
D. Reboot one of your domain controllers into the Recovery Console and enter Active Directory Repair Mode. Restore the System State data from last night's backup. Run ntdsutil.exe and reboot the computer.

>> !
Answer: B

Many Active Directory operations must be performed in directory services restore mode. Restore mode does not load Active Directory. Instead it boots the domain controller and allows you to log in with a local administrative account. Because Active Directory is not loaded, the files relating to it can be overwritten, moved, etc.Ntdsutil.exe is the primary tool that is used to perform Active Directory restore and repair operations. According to Microsoft it can be used to repair, check, compact, move, and dump the directory database files. It is also used to list server, domain and site information as well as manage operations masters, perform authoritative restores and create domains.Windows 2000 Help, Search for the articles entitled: Safe mode startup options; and Active Directory support tools.


4. As you might imagine, we secretly monitor everyone's test scores in a perpetual search for new geniuses to join our company. We were so impressed with yours that we hired you. You now work for TBT and are currently working as our DNS administrator.Because of our massive success we have over 20 webservers. All of them contain the exact same content and should answer to www.thebestests.com. However, you notice that only one of the 20 servers is currently answering requests sent to that name. To be honest, we have been a little busy and never really noticed. People would complain about it being slow and we would just buy another server. Why did you really think we have 20 servers?Horrified, you look at us and say that what we really need is load balancing. You tell us there are two simple things you can do in DNS that will ensure that all of our servers are load balanced. What are they?

A. Go into Properties for our DNS server in the DNS console and enable Round Robin.
B. Go into Properties for our DNS server in the DNS console and enable Forwarding.
C. Buy a really expensive hardware solution.
D. Make sure each of the webservers have a Host (A) record in DNS that maps www.thebestests.com to its IP address.
E. Make sure each of the webservers have an alias record in DNS that maps www.thebestests.com to the server's actual Host (A) record.

>> !
Answer: A & D

Load balancing can be achieved through the use of Round Robin DNS. In order for Round Robin to be used, each server must have a Host (A) record in DNS. The Host records will all contain the same DNS name, but each will point to a different IP address. Each IP address corresponds to one of the servers that are being balanced between.When multiple resource records are associated with the same name, DNS rotates through the records as clients request them. For instance, the first client gets pointed to the first server in the list, the second client gets pointed to the second server in the list and so on. When the last entry is reached, the next client receives the address of the first server in the list. Round Robin can be enabled or disabled on DNS servers. It is enabled by default when DNS is installed.Windows 2000 Help, Search for the article entitled: Configuring round robin.


5. Your CIO has mandated disk quotas for all employees. While playing roulette last night he decided that no user should need more than 33 (RED) megabytes of disk space. You ask him how much he lost on 33 Red but he is strangely silent, and not especially nice.Needless to say you and your fellow administrators feel that you should be excluded from this policy and allowed to use as much disk space as you want. Since you're the one implementing the limit and no one else knows how to check up on what you're doing, you figure what the heck. You are all members of the BusinessAdmin group. How will you configure the quota for everyone else while ensuring that you are excluded from them? (Choose all that apply)

A. In the properties of the drive, Enable quota management. Check the box next to Deny disk space to users exceeding quota limit and set the default quota limit to 33MB.
B. Add a new quota entry for each of the administrators' accounts that you wish to exclude. Select the radio button next to Do not limit disk usage for this entry on each quota entry.
C. Add a new quota entry for each of the administrators' accounts that you wish to exclude. Set the account's quota limit to 0.
D. In the properties of the drive, Enable quota management. Clear the check box next to Deny disk space to users exceeding quota limit and set the default quota limit to 33MB.
E. Add a new quota entry for the BusinessAdmin group that you wish to exclude. Select the radio button next to Do not limit disk usage for this entry on each quota entry.

>> !
Answer: A & B

Disk quotas are set on a volume by volume basis. For example, the disk quotas on drive C: can be different than the quotas on drive D:. To enable disk quotas for a volume, check the box next to Enable quota management on the Quota tab in the Properties of the volume. You can reach the Properties of the volume by going to Windows Explorer, right clicking on drive C:, D:, etc. and selecting Properties.To restrict the amount of space that users can take up on the volume, select Deny disk space to users exceeding the quota limit, then configure the quota limit. The limits set on this tab apply to all users unless they have a specific quota entry added for them.
You can specify individuals that have different quota limits by clicking the Quota Entries button at the bottom of the Quota tab. This will bring up the Quota Entries for Local Disk dialog box. From the Quota menu, select New Quota Entry to specify an individual quota entry. In the Add New Quota Entry dialog box that appears, select the user that the entry should apply to and specify the user's quota limit by selecting Limit disk space to. You can also select Do not limit disk usage, in which case the user will not be restricted in the amount of disk space they can use. Specific quota limits cannot be set for groups, only users. Quotas can only be set on volumes formatted with the NTFS file system.Windows 2000 Help, Search for the articles entitled: Disk quotas overview; Enabling disk quotas; and To add new quota entries.


6. The computer that will become your new Windows 2000 Terminal Services box has finally arrived. You didn't think you would ever see the day. You smile as you remember all of the emails and personal folders you had to read through to get enough blackmail, er, I mean research information to justify the purchase. Both the new and old servers support hot swappable disks. You have installed Windows 2000 and are ready to go on the new computer. You want to move the spanned volume that has all the user data on it from the old server to the new server. The volume consists of five physical drives and uses drive letter F:. The letter F: is available on the new system, and five drive bays are open on it as well. How will you move the spanned volume and ensure that the same drive letter is used on the new machine for the volume while maximizing the uptime of both systems?

A. You will move the hard drives from the old server to the new server. You will then rescan the disks on both servers.
B. You will move the hard drives from the old server to the new server. You will then rescan the disks on the new server.
C. You will move the hard drives from the old server to the new server. You will then rescan the disks on the old server.
D. You will power down both servers and move the hard drives from the old server to the new server. You will then rescan the disks on the old server.

>> !
Answer: A

Because the disks are hot swappable, you do not need to power down the systems to move the drives from one system to the other one. You will, however, need to have both systems rescan their disks. The old system will need to do this so that it will know the drives are not longer installed. The new system must do this so that it will locate and install its new drives.Disks can be rescanned from Disk Management in the Computer Management console. Computer Management can be accessed by going to the Start => Programs => Administrative Tools menu. Under the Storage heading, select Disk Management then select Rescan Disks from the Action menu.Windows 2000 Help, Search for the articles entitled: To move disks to another computer.


7. Tomorrow is your birthday. You've scheduled yourself off and plan to go fishing. Leaving your pager and cell phone in your desk drawer, you head for the door. Your junior network administrator catches you in the parking lot and tells you that one of the drives on the database server has failed. You consider swearing him to secrecy and leaving, but just then the CEO and his son, the Senior VP of Lucky Heredity, pull in after finishing 18 holes at the club. The CEO wants to know what's up. Off you go to the server room. It turns out that the drive that failed is part of a spanned volume. You do nightly backups and can restore the data that it contained. You replace the drive with a new one. What do you need to do to make this restore happen?

A. You need to restore the data from the disk that failed to the new disk using Windows Backup.
B. You need to mark the new disk to be included in the spanned volume and reboot the server.
C. You need to rescan the disks and extend the volume to include the new disk, then restore the data from the disk that failed to the new disk using Windows Backup.
D. You need to rescan the disks and remove the spanned volume. Then make a new spanned volume that includes the disk you just installed and format the volume. Finally, you need to restore the data from backup using Windows Backup.

>> !
Answer: D

Spanned volumes are not fault tolerant. When a disk that is part of a spanned volume fails, the spanned volume must be removed. Any data on the volume will be lost and must be restored from backup. The spanned volume must then be re-established from scratch once the failed disk has been replaced. In order to locate the new disk for inclusion in the spanned volume, you must have Windows 2000 rescan the available drives. This will cause Windows 2000 to detect the new drive.Disks can be rescanned from Disk Management in the Computer Management console. Computer Management can be accessed by going to the Start => Programs => Administrative Tools menu. Under the Storage heading, select Disk Management then select Rescan Disks from the Action menu. Once the new drive appears, you can right click on a section of unallocated space and select Create volume. In the Create Volume wizard, select that you wish to create a Spanned volume and follow the prompts.Windows 2000 Help, Search for the articles entitled: Using spanned volumes; To create a spanned volume; To extend a simple or spanned volume; To delete a spanned volume (volume set) on a basic disk; and To update disk information.


8. Who would have guessed that the "occasional travel" mentioned by the company when they hired you meant that occasionally you only had to travel four, instead of six, days a week. The money is great, but your spouse is none too happy about the fact that they never see you any more. The company has promised you that they will be hiring a junior administrator for you to support the Chicago office, but right now your time is still divided between there and the home office in Indianapolis.Up until now, you have used LMHOSTS files for NetBIOS name resolution on your network. The company is doing very well and even though the network is mostly comprised of Windows 2000 systems, you feel that it is time to install WINS. You decide to draw up a series of targets for your WINS implementation project before you begin. For fault tolerance purposes, you determine that you should install two WINS servers in each location. Because you will not be there as often, you want the two servers in Chicago to replicate their databases after each new client reservation to ensure their databases are as consistent as possible. This is not an issue in your home base of Indianapolis, so you decide that the WINS servers there should only synchronize with each other every hour. Every four hours, you would like the changes that have occurred on the WINS servers at each location to be synchronized. Which three of the following will you select to implement your design goals?

A. Make each of the servers in Chicago push/pull partners with each of the servers in Indianapolis and configure them with a replication interval of one hour.
B. Make the servers in Chicago push/pull replication partners and set the number of changes before replication to 1.
C. Make the servers in Indianapolis push/pull replication partners and configure them with a replication interval of one hour.
D. Make the servers in Chicago push replication partners and set the replication interval to 0.
E. Make one of the servers in Chicago push/pull partners with one of the servers in Indianapolis and configure them with a replication interval of one hour.

>> !
Answer: B, C & E

Explanation: WINS replication can be triggered either by a specified number of changes to the database or by a regular time interval. Replication is set on a partner by partner basis. This means that WINS server A can be set to replicate with WINS server B by either the number of database changes or a regular time interval. Likewise, WINS server A can be set to replicate with WINS server C by different parameters than it uses when replicating with WINS server A Windows 2000 Help, Search for the article entitled: Configuring WINS replication.


9. To be honest, you are not real sure if it was a promotion or not. On the one hand, last week your job title was technology associate and this week it is network administrator. On the other hand, you are being sent to an office in a remote part of Alaska where your company has an oil pipeline.You arrive on site and find that your primary server has a mirrored volume created on it. During a routine check you determine that the status of the volume is Failed Redundancy and that one of the disks is listed as Missing. You look up the relevant support document and it says to attempt to reactivate the disk, but after doing so its status doesn't change. What do you need to do to restore the mirrored volume?

A. Replace the failed disk and then select the Repair Mirror option.
B. Replace the failed disk and add back the mirror using the new disk.
C. Replace the failed disk and reboot.
D. Replace the failed disk and use the rpmirror.exe command to regenerate the mirror using the new disk.

>> !
Answer: B

The first step in repairing a Mirrored Volume is to reactivate the disk that is having problems. If this does not work, the next step is to replace the disk. Before powering down the computer, you should remove the existing mirror by right clicking the disk and selecting Remove Mirror in Computer Management. Next, power down the system, replace the disk and boot the computer. When the computer comes back up, log in and select Computer Management from the Start => Programs => Administrative Tools menu. This is the console that can be used to configure disks. Under the Storage heading, select Disk Management then right click the volume to be re-mirrored and select Add Mirror.Windows 2000 Help, Search for the articles entitled: To replace the failed mirror with a new mirror on another disk.


10. "And make it snappy," you hear as you leave the office. You know that your boss has no real sense of time, and snappy in his world is a range from one to fifteen minutes. You hate the word snappy and choose for it to mean fifteen minutes. He has asked you to make some changes to the security settings in one of the Group Policy Objects (GPO) on the network and to make sure that the policy is refreshed at a "snappy" interval for computers that are currently up on the network. What will you do, fourteen minutes from now?

A. You will make the other changes to the GPO and configure the Group Policy refresh interval for Active Directory servers.
B. You will make the other changes to the GPO and configure the Group Policy refresh interval for logged on users.
C. You will create a batch script that will run the gpo.exe /refresh command on the computers in the network. You will then use the Task Scheduler to run the command in the context of an administrative account.
D. You will make the other changes to the GPO and configure the Group Policy refresh interval for computers.

>> !
Answer: D

Group policy is refreshed and reapplied at a regular interval. By default group policy is refreshed every 90 minutes with a random offset of 30 minutes for most computers in the domain. Domain controllers have their group policy refreshed every five minutes by default. The frequency at which group policy is refreshed can be set by using the Group Policy refresh interval for computers setting.Windows 2000 Help, Search for the articles entitled: To set Group Policy refresh rate for computers; Policy for Group Policy: User configuration; and Policy for Group Policy: Computer configuration.


11. One of the cool things about having a DVD drive and headphones is you can use your workstation to keep up with the latest movies. Just when the flick you've chosen is starting to get good, a user in one of your organizational units (OU) calls and says they are having trouble with their mouse. You send a tech to investigate the problem and he discovers the computer was not using the latest version of the mouse driver. The tech logged on as a domain administrator, installed the driver on user's computer and rebooted. When the tech logged back on as the user, the mouse still did not function properly and a little research showed that the previous driver was still installed. What do you tell this tech to do to resolve the problem?

A. You tell the tech to reinstall the mouse driver while logged in as the user.
B. You tell the tech to make the user a member of the local administrators group.
C. You tell the Tech to alter the security policy for the OU to warn and allow the installation to override local security defaults.
D. You tell the Tech to alter the security policy for the OU to not warn or allow the installation to override local security defaults.

>> !
Answer: C

Windows 2000 provides drivers and operating system files that have been digitally signed by Microsoft. The digital signatures are designed to ensure quality. Microsoft states that a digital signature provides assurance that a file has met a certain level of testing. It also insures that the file has not been altered or overwritten, such as by another program's installation process.File Signature Verification can be set by selecting Driver Signing on the Hardware tab from System in Control Panel. There are three levels of settings that are possible: Ignore, Warn and Block. Ignore allows all signed and unsigned drivers to be installed on the system. Warn displays a message when you try to install an unsigned driver. Block prevents the installation of unsigned drivers.Driver Signing options can be specified for more than one system at a time by using group policy. When assigning Driver Signing options using group policy, the settings you specify will override the local security defaults.Windows 2000 Help, Search for the articles entitled: Using File Signature Verification; To set file signature verification options; and Code Signing for Windows 2000.


12. Sometimes you think you should have gone into sales. Even though the company has decided to stay with Windows NT 4.0 through next year, you have heard that Windows 2000 can be configured as a killer gaming platform so, of course, you want it on your workstation. Because the rest of the company will still be using Windows NT for the foreseeable future, you have to convince your boss Cristine to let you install it. Using reverse psychology, you tell her how much you're dreading having to learn W2K and what a pain it would be to have to setup a dual boot(on your workstation. Since the only satisfaction she ever seems to squeeze out of her pathetic existence is when she is making your life miserable, she orders you to install Windows 2000 on your workstation immediately! What do you need to do to your current system before installing Windows 2000?

A. Ensure that you have at least 3GB of free disk space on the drive you will be installing the Windows 2000 system files on.
B. Make sure that Service Pack 4 is installed.
C. Make sure that Service Pack 3 is installed.
D. Defragment the drive you are going to install the Windows 2000 system files on.

>> !
Answer: B

Windows 2000 uses the latest version of NTFS. In a dual boot situation, Windows NT 4.0 will not be able to access the local NTFS file system on a computer that has had Windows 2000 installed on it unless it has been upgraded to be able to use the same version of NTFS that Windows 2000 does. This is enabled by installing Windows NT 4.0 Service Pack 4.Windows 2000 Help, Search for the article entitled: Choosing between NTFS, FAT, and FAT32.


13. You are trying your best to migrate the programmers to Windows 2000 Professional from Windows 98. The programmers hit management with a list of "concerns" that, while mostly bogus were enough to stop you in your tracks. You both know that the only real concern is how their favorite games will work on Windows 2000. It is bad enough these guys get paid so much, can come into work half naked and even let their pets roam around the office. You wonder why you chose to go into system engineering, these programmers really seem to have it made.A compromise is struck and you agree to allow the systems to dual boot. You need to make sure that all files are accessible regardless of the file system that the user is booted into, and that disk performance is optimized. What will you do to address these issues?

A. Format the programmers' computers with a FAT32 partition.
B. Format the programmers' computers with a FAT16 partition.
C. Use a dynamic NTFS volume on the programmers' systems.
D. Use a basic NTFS volume on the programmers' systems.

>> !
Answer: A

Windows 98 is not capable of using the NTFS file system. The most efficient file system that both Windows 2000 and Windows 98 can both use is FAT32. If users need to be able to access all files stored on the disk drive from either operating system then the hard drive should be formatted with FAT32. Windows 2000 Help, Search for the article entitled: Choosing between NTFS, FAT, and FAT32.


14. You check the clock. Amazing! You might actually make it home in time to have dinner with your long suffering spouse. You are right in the middle of a Remote Installation Services (RIS) deployment and up until now everything has been going great. All of the computers use the same hardware and are PXE compliant. You might even get out early enough to stop at the local video store. All of a sudden your hopes fade. You knew this was too good to be true. For some reason, the last half of the computers are not able to install Window 2000 Professional. What can you do to remedy the problem?

A. Prestage the remaining computers in Active Directory.
B. Prestage the remaining computers in RIS.
C. Add additional IP addresses to the DHCP scope.
D. Boot the remaining computers from a RIS startup disk.

>> !
Answer: C

Each RIS client must receive a DHCP address lease. It is important when adding clients to the network to take into account the need to expand existing service configurations such as DHCP address scopes to ensure that the new number of clients are supported.Windows 2000 Help, Search for the article entitled: Related technologies and services.


15. You have recently been fired from a systems administrator job at a large company. Through social engineering you gain access to a client computer on the network. Bent on revenge, you attempt to connect from your Windows NT 4.0 Workstation to one of the Windows 2000 computers on the network that you know contains highly confidential information. Much to your surprise, you find that you cannot make the connection.As it turns out the new systems administrator put a security measure in place to make sure that Windows 2000 computers could only communicate with other Windows 2000 computers. Other systems such as Windows NT, 98 and 95 can no longer connect to Windows 2000 systems. How did the administrator accomplish this?

A. The administrator used the hisecws.inf security template file to alter the default security settings by importing it with the Security Configuration and Analysis tool.
B. The administrator used the hisecprof.inf security template file to alter the default security settings by importing it with the Security Configuration and Analysis tool.
C. The administrator used the Security Configuration and Analysis tool to alter the default security settings on the system by setting the "Allow connection to Windows 2000 systems only option".
D. The administrator used the Security Configuration and Analysis tool to alter the default security settings on the system by setting the "Do not allow connection to Pre-Windows 2000 systems option".

>> !
Answer: A

Security templates are provided by Microsoft to assist administrators in applying the level of security they desire to the Windows 2000 computer they are responsible for. The templates can be applied as is, or modified by an administrator before being applied.One such template is Hisecws.inf. It is one of the most secure templates provided by Microsoft. The highly secure template for workstations is set to require maximum network protection for traffic and protocols that are used between computers running Windows 2000. Computers configured with the highly secure template can only communicate with other Windows 2000 computers. They are not able to communicate with computers running Windows 95, 98 or Windows NT.Windows 2000 Help, Search for the article entitled: Predefined security templates.


16. You've finally made it. All of your hard work has paid off. An office with a door instead of cubicle. A staff of eager techs to satisfy your every whim. With any luck you'll never see another end user again. Yes sir, you've pulled yourself up by your own boot straps and, with a little help from a few slightly questionable emails you happened to discover in the CEO's inbox, you are the new CIO. As your First official act, you decide that it is high time that you had your own killer laptop. So, you order one for around $9,500.00 that even comes with a docking station. Once you get everything all set up, you decide to put the ISA SCSI adapter from your old system into the docking station. You start the computer but Windows 2000 Professional does not detect the new hardware. You try to use the Add/Remove hardware wizard to detect the adapter but this does not work either. What can you do to get Windows to detect the adapter?

A. Add the drivers manually using the Add/Remove Hardware wizard.
B. Enable ISA PNP in the system BIOS.
C. Download the latest Windows 2000 Update from Microsoft.
D. Add the drivers manually using winmsd.exe.

>> !
Answer: A

By default, the Add/Remove Hardware Wizard attempts to detect plug and play devices that are in the computer. The SCSI card uses ISA technology so it is very unlikely that it is a plug and play device. Add/Remove Hardware will most likely not detect a non-plug and play card.Because Windows 2000 does not automatically detect the device, you must manually add the driver. This can also be accomplished from the Add/Remove Hardware Wizard in Control Panel. When asked to choose a hardware device to troubleshoot, select the top entry in the Devices window "Add a new device" and click Next. On the next screen by default you are asked if you wish to have Windows 2000 attempt to automatically detect the device. Select "No, I want to select the hardware from a list" and click Next. On the following screen, select the type of device you wish to install and click Next. Finally select and configure the correct device driver for your hardware to complete the installation.Windows 2000 Help, Search for the article entitled: To install a non-Plug and Play device.


17. You aren't the administrator of a Windows 2000 network, but you seem to be the only one who knows what the heck is going on. Your pitiful salary is dwarfed by that of your do-nothing, know-nothing systems administrator. A perfect example of this occurred recently when the systems administrator that your company hired put in a SCSI card and tape drive on one of the servers.Things seemed to go smoothly enough. The drive was detected and installed automatically by Windows 2000. However, that night during a routine reboot the computer would not load the operating system. You tried it several more times with no luck. Naturally, your highly paid systems administrator had no clue. What did you do to fix the problem?

A. You rebooted the computer using the Safe Mode Command Prompt and disabled the SCSI card driver by using the disable command.
B. You rebooted the computer using the Safe Mode and used the GUI to repair the problem.
C. You rebooted the computer using the Recovery Console and disabled the SCSI card driver by using the "device disable" command.
D. You rebooted the computer using the Recovery Console and disabled the SCSI card driver by using the "disable" command.

>> !
Answer: D

The only obvious change that you have made to your system is the SCSI driver that was added. It is logical to assume that it is the problem since the computer hasn't booted properly since that driver was installed. Because the system will not boot into Windows 2000, you cannot use the GUI tools provided by Windows to disable the driver.The Recovery Console is new in Windows 2000. It is a command line tool that can be started by entering Windows 2000 setup. The Recovery Console can be used to disable devices, start and stop services, access data on the local hard and floppy drives, format local drives, repair the boot sector or master boot record and much more. The disable command is used to disable device drivers and services when using the Recovery Console.Windows 2000 Help, Search for the articles entitled: The Recovery Console; and Recovery Console commands.


18. At the CEO's request, you have been compiling a series of files that contain password lists for all of the company's servers. You tried to explain what a bad idea this was, only to have him request that it be placed on a network share where other administrators could access it. You decide to stop pleading your case because you fear the next thing out of his mouth might be a request to post the lists on the bulletin board in the break room.Every computer on your network runs Windows 2000 and you are concerned that an administrator with a laptop that has offline files enabled might access the share and inadvertently take a copy home with them. How can you prevent this from happening?

A. Disable file caching for the files on the network share by using Windows 2000 Explorer.
B. In the properties of the share, deny the Everyone group Read permission.
C. In the properties of the share, deny the Everyone group the Allow file caching permission.
D. Disable offline files by using Windows 2000 Explorer.

>> !
Answer: A

The offline files option in Windows 2000 allows a user to continue to work on documents that are located on a network share, even when the computer is no longer connected to the network. The local computer will cache a copy of the file from the network share. If the user changes the file while they are working offline, the changes will be synchronized with the original file when the computer comes back onto the network.Files and folders that are available for use offline need to be specified. This can be accomplished in the Properties of the folder on the Sharing tab. If a folder should not be made available offline, click Caching on the Sharing tab. In the Caching Settings dialog box clear the checkbox next to Allow caching of files in this shared folder.Windows 2000 Help, Search for the articles entitled: Offline Files overview; To make a file or folder available offline; and Sharing a drive or folder overview.


19. You're a sales guy. You can sell ice to Eskimos and sand to Arabs. The last thing you ever want to be is like those weird little guys who hang around the server room. You get the willies just thinking about it. All of them are pale as ghosts, lack any muscle tone and probably couldn't hit a fairway wood if their life depended on it. Now, as if a desktop computer wasn't hard enough to figure out, the company has issued you a laptop. And, you have to depend on those little geeks to keep you working. It has both a standard network connection and a dial-up connection, which frightens you. The laptop is configured to use offline files and some of your project's files are absolutely huge. You don't want to grow old waiting for them to synchronize while you are using your dial-up connection. When you are on the road, you will be using your dial-up connection frequently to get your email and calendar changes. How can you ensure that your larger files are not synchronized automatically when you connect to the network with your dial-up connection?

A. Set the Synchronization Settings to manual for all files.
B. Set the Synchronization Settings to only sync your files when you connect to the network with a LAN connection.
C. Set the Synchronization Settings to only sync the project files when you are connected to the network with a LAN connection. Configure the sync of personal files for both LAN and dial-up connections.
D. Set the Synchronization Settings to manual sync for the project files. Configure the sync of personal files for both LAN and dial-up connections.

>> !
Answer: C

Synchronization Manager can be used to control the files that are available offline and how offline files are synchronized with their online counterparts. Synchronization Manager is accessed from the Start menu and is found under Programs => Accessories. Different synchronization settings can be established for dial-up and LAN connections.Windows 2000 Help, Search for the article entitled: Offline Files overview.


20. "Change Control? What's that?" you ask the IS Manager. "It's a committee which approves any production changes. Everyone, even consultants, have to have their proposed changes reviewed by them. Here is the form you have to fill out." Rolling your eyes, you go back to your desk to fill out the form. When you get to the committee meeting, you realize that Change Control is really just a place for egotistic know-nothings to exercise meaningless power by nitpicking people's projects. After reviewing your changes, everyone but the senior member signs off. "What was your problem again?" You grind your teeth since it is right in front of his nose, but you repeat that you have just upgraded all of the Windows NT 4.0 Workstations to Windows 2000. Before the upgrade a number of system policy settings, such as minimum password length, were applied to the systems locally. After the upgrade, the policies were not working. "Oh, and how can you fix that?" Sitting on your hands so you won't choke him, you reply:

A. You can use the secedit.exe /a to configure a local Security Policy for the machine.
B. You can use the Local Computer Policy to configure a local Security Policy for the machine.
C. You can edit the registry manually on the machines to enforce the policy by using the spol key.
D. You can automate editing of the registry on the machines to enforce the policy by using the spol key and a batch file.

>> !
Answer: B

The Local Computer Policy MMC Snap-in is used to configure the local security settings for a computer. Settings that can be configured include Password, Audit, IPSec, and Account Lockout policy. Only computers that are not functioning as domain controllers have a local security policy. If domain level policies exist, Windows 2000 computers that are members of a Windows 2000 domain might have their local security settings overridden.Windows 2000 Help, Search for the articles entitled: Administrative Tools; and To edit a security setting.


21. Your boss recently read an article on the benefits of using smart cards and decided that it was the way to go for dial-up authentication. As you are sitting in his office you ponder how nice it must be to be able to make decisions that cause other people endless hours of work and yet not have your 6-hour days and 2-hour lunches impacted.You leave his office thinking that he has probably read more about smart cards than you have. You do your research, order the necessary equipment, etc. Finally the day comes to configure the users' laptops for smart card authentication. Your remote access server already supports certificate authentication. You install a smart card reader on your test laptop and configure it with the correct drivers. What else needs to be done to enable smart card support on the laptop?

A. You need to set one of the user's dial-up connections to use the Extensible Authentication Protocol (EAP) and choose the smart card device for authentication.
B. You need to set one of the user's dial-up connections to use the Extensible Authentication Protocol (EAP) and choose the server based certificate that the smart card device will use for authentication.
C. You need to set one of the user's dial-up connections to use the Extensible Authentication Protocol (EAP) and choose the "Accept any physical authentication including smart cards" option in the properties of the connection.
D. You need to set one of the user's dial-up connections to use certificate based authentication and choose the smart card device for authentication.

>> !
Answer: A

Extensible Authentication Protocol (EAP) was developed to support additional authentication methods including smart cards. Microsoft considers the use of smart cards the highest level of authentication supported for users in Windows 2000. The use of smart cards requires the user's computer to be equipped with a smart card reader. The dial up connection must be configured to use smart cards on the Security tab of the connection's properties. The user is given a smart card that contains his or her logon credentials. When they swipe their card through the reader while at the logon prompt, it is the equivalent of hitting Ctrl+Alt+Del. The user must still supply a password (called a PIN) to logon to the computer.On the server side, the certificates must be in use on the network. The Remote Access Server must have a machine certificate installed and EAP must be enabled. The remote access policy in use should specify smart card logons.Windows 2000 Help, Search for the articles entitled: Extensible Authentication Protocol (EAP); Using smart cards for remote access; To enable smart card or other certificate authentication; and To configure identity authentication and data encryption settings for a dial-up connection. (Choose all that apply)


22. You work at a top national lab. One of the rocket scientists calls you over because his Windows 2000 system is performing poorly. You check the system out. It is a PIII 450 with 64 MB of RAM and 100MB of free space on the disk drive. "Rocket scientist huh," you think to yourself as the guy continues to press you for answers as to why his system is slow. What can you do to help him? (Choose all that apply)

A. Configure all Win32 programs to share a single memory space.
B. Enable the disk performance counters.
C. Run a disk analysis. If recommended defragment the disk drive using Disk Defragmenter.
D. Run Disk Cleanup to get rid of temporary and other unnecessary files.

>> !
Answer: C & D

Disk Cleanup is used to free up space on your hard drive. It is designed to search for temporary files, Internet cache files and unnecessary program files that the system feels are safe to delete. You can use Disk Cleanup to delete some or all of the recommended files.Disk Defragmenter is designed to locate files and folders that have become fragmented. Files and folders are said to be fragmented when they are scattered in more than one place on the physical disk drive rather then being stored contiguously. Fragmented files and folders can take longer to access because the information must be searched for and brought together from many different places on the disk. Likewise, writing to a fragmented drive can take longer because files and folders must be stored in pieces on the physical disk drive. In addition to determining the level of disk fragmentation, Disk Defragmenter can also be used to reduce the level of fragmentation on the disk without harming any of the information currently stored on it.Windows 2000 Help, Search for the articles entitled: Disk Defragmenter overview; and Using Disk Cleanup.


23. You are sitting at a recruiting table at the local college. So far you haven't had any luck. The Army and Air Force on either side of you seem to be getting all the visits. You start announcing that your company doesn't require pushups or getting up at 4a.m. At this point the Army recruiter comes over to your table and you think you're in deep doo doo. Instead he relates a problem he is having with one of the Windows 2000 computers on the network at their table. It seems that a different recruiter last night used the Encrypting File System (EFS) on all of the forms he created in Microsoft Word. Today's recruiter needs to get at them. He copied them over into his folder but cannot open them. He just keeps getting an "Access Denied" message. After talking to the college's systems administrator, who isn't sure what to do, you tell the administrator to fix the problem in what way?

A. You tell him to log on using an account that is a member of the server operators group and decrypt the files for the nice soldier.
B. You tell him to take ownership of the files, give himself the Decrypt permission and decrypt the files for the nice soldier.
C. You tell him to log on as the Recovery Agent and decrypt the files for the nice soldier.
D. You explain that the only way to decrypt the files is to log on using the other recruiter's account.

>> !
Answer: C

Encrypting File System (EFS) is new in Windows 2000. It is used by users to encrypt files and folders that are stored either locally or on Windows 2000 servers. EFS is designed to protect sensitive data from unauthorized access. Even if someone is given access permissions to an encrypted file, they cannot view it unless the correct decryption key is associated with their user account. This can cause problems when a user legitimately needs to access a file that was encrypted by another user.Fortunately, Windows 2000 includes a provision for such a situation. Each file is encrypted not only with the key of the user, but also with the key of a recovery agent. Because of this, when necessary, the person who is designated as the recovery agent can logon, decrypt the file and turn it over to another user in unencrypted form.Windows 2000 Help, Search for the articles entitled: Recovery agents; and To recover an encrypted file or folder if you are a designated recovery agent.


24. Try as he might, your boss just could not get a hold of the nighttime systems administrator last night when he noticed that the webserver was unavailable. Wasn't he surprised when the two of you came walking in just as he had beat out the last of his friends in the First Person Shooter (FPS) they were all playing on the corporate network. Wasn't he even more surprised when security came back for him after they had finished escorting his friends out of the building.This morning, one of the operators was promoted to the nighttime administrator position. The night administrator's account had a great deal of specific user rights and permission assignments associated with it. You want to make sure that the new night administrator has the same rights and permissions that the old one had, and that the previous administrator has no access to the network. What is the easiest way to accomplish this?

A. Rename the night administrator's account to the new administrator's username. Change the password on the account.
B. Copy the night administrator's account and name the new account using the new administrator's username. Delete the old administrator's account.
C. Create a new account for the new night administrator and assign it all the same rights and permissions. Delete the old administrator's account.
D. Allow the new night administrator to use the builtin administrator account.
E. Copy the night administrator's account and name the new account using the new administrator's username. Disable the old administrator's account.
F. Create a new account for the new night administrator and assign it all the same rights and permissions. Disable the old administrator's account.

>> !
Answer: A

When a user account is renamed, it retains most of its properties such as its: description, password, group memberships, user environment profile, account information and any assigned rights and permissions. If an account is copied and used to create a new account, explicitly assigned rights and permissions do not transfer over to the new account.Windows 2000 Help, Search for the article entitled: To rename a user account.


25. You downloaded a printer driver from HP's website but every time you try to install it on the person's computer you get the following error message: "Error 11 - Cannot install printer driver." You always use this driver when installing this printer and cannot quite figure it out. You decide to try and configure the user's computer to check for driver integrity and to allow you to install the printer driver. How will you do this?

A. By configuring driver signing to display a message before allowing an unsigned driver to be installed.
B. By configuring driver signing not to block the installation of unsigned drivers.
C. By creating the printer manually at the command line using the configure printer command.
D. By creating the printer manually at the command line using the install printer command.

>> !
Answer: A

Windows 2000 provides drivers and operating system files that have been digitally signed by Microsoft. The digital signatures are designed to ensure quality. Microsoft states that a digital signature provides assurance that a file has met a certain level of testing. It also insures that the file has not been altered or overwritten, such as by another program's installation process.File Signature Verification can be set by selecting Driver Signing on the Hardware tab from System in Control Panel. There are three levels of settings that are possible: Ignore, Warn and Block. Ignore allows all signed and unsigned drivers to be installed on the system. Warn displays a message when you try to install an unsigned driver. Block prevents the installation of unsigned drivers.If you are logged on as an administrator, you can select "Apply setting as system default" to apply the File Signature Verification setting you selected to all users who log onto the computer.Windows 2000 Help, Search for the articles entitled: Using File Signature Verification; To set file signature verification options; and Code Signing for Windows 2000.


26. You work for Moo Goo Gai LAN. It's a networking consulting company AND a Chinese restaurant. You have a late night order from the systems administrator of a local insurance company for some cashew chicken and the solution to the following problem: She is installing her first Windows 2000 Professional machines on her Windows NT network. The network has several different subnets and only uses the TCP/IP protocol. She wants the new Windows 2000 Professional computers to have no problems resolving NetBIOS names to TCP/IP addresses. What answer do you print out to insert into the fortune cookie?

A. Manually add entries to the ARP cache.
B. Place a WINS server on the network and configure the clients to use WINS.
C. Place a DNS server on the network and configure the clients to use DNS.
D. Manually add entries to the DNS Resolver cache.

>> !
Answer: B

Windows Internet Name Service (WINS) is a dynamic database system that maps NetBIOS names to IP addresses. Only one WINS server is required on a network, however additional servers can be added for fault tolerance and performance reasons. Clients need to be configured with the address of at least one WINS server in order to use WINS.When a WINS client boots up on the network it registers its NetBIOS names with the WINS server it has been configured to use. Once it has registered, it can query the WINS database for the IP address of any NetBIOS name it needs to have resolved. Windows 2000 Help, Search for the article entitled: WINS defined.


27. Your father invites you to visit him at his new home in Phoenix. When you get there you can't help but notice his killer new computer system, and how few of the accessories that came with it are hooked up. After a few hours of idle chit-chat, you feel the call. You notice a type of USB camera that you have always wondered about and set about installing it.You plug in the camera and his Windows 2000 system tries to find the driver. It cannot and prompts you for the manufacturer's CD that has the drivers on it. You know that they are not certified by Microsoft but install them anyway. When you reboot the system the keyboard fails to respond. You noticed that it, too, is a USB device. All this time, in fact all of the time, the financial news channel is on in the background. All of a sudden, the market starts dropping and your father bolts for the computer to quickly get out of some of his investment positions. Fear grips his face as he realizes that you have messed up his system and he can't make his trades. You need to get this computer back up quick and make sure that it will prevent uncertified drivers from being installed. What two things will you do to save your father's retirement and your place in his will?

A. Enable driver signing.
B. Enable driver blocking.
C. Reboot in safe mode. Use Driver Manager to replace the camera drivers you provided with certified drivers.
D. Reboot in safe mode. Use Device Manager to replace the camera drivers you provided with certified drivers.

>> !
Answer: A & D

Windows 2000 provides drivers and operating system files that have been digitally signed by Microsoft. The digital signatures are designed to ensure quality. Microsoft states that a digital signature provides assurance that a file has met a certain level of testing. It also insures that the file has not been altered or overwritten, such as by another program's installation process.File Signature Verification can be set by selecting Driver Signing on the Hardware tab from System in Control Panel. There are three levels of settings that are possible: Ignore, Warn and Block. Ignore allows all signed and unsigned drivers to be installed on the system. Warn displays a message when you try to install an unsigned driver. Block prevents the installation of unsigned drivers.Device Manager is used to replace and update drivers in Windows 2000. You must be logged on as an administrator to manage drivers in Windows 2000. To open Device Manager, go to the Start menu and select Settings => Control Panel => System. On the Hardware tab, click on Device Manager.Windows 2000 Help, Search for the articles entitled: Using File Signature Verification; To set file signature verification options; Code Signing for Windows 2000; and To update or change a device driver.


28. Being the technoid you are, you have your home setup with the best cast-off equipment your company could afford. Those 10 token-ring MAUs aren't the best printer stand, but they sure look impressive. Your spouse really likes the massive line printer now that it is covered with plants. And that Bay ARN leftover from the Cisco conversion adds just the right toucH - However, not all is bliss in your dream home.Recently you've taken home a laptop with a docking station. The laptop is old and barely runs Windows 2000 Professional. You've installed a SCSI PC card in the laptop that you use to support another recent acquisition, a scanner. You want to get the most out of your battery performance when you are not connected to the docking station, and make sure the drivers for the SCSI adapter do not load. How do you configure the system to support these goals?

A. Undock the laptop and boot it up. Once in Windows, disable the SCSI PC card for the docked profile.
B. Undock the laptop and boot it up. Once in Windows, remove the SCSI PC card from the current profile using Services.
C. Undock the laptop and boot it up. Once in Windows, remove the SCSI PC card from the current profile using Computer Management.
D. Undock the laptop and boot it up. Once in Windows, disable the SCSI PC card for the current profile.

>> !
Answer: D

In order to ensure that your SCSI PC card does not load when you computer is in an undocked state, perform the following steps: 1.) Undock the laptop and boot it up; 2.) Disable the SCSI PC card for the current profile by using Device Manager. There is no need to remove the card or the device from the profile. When you disable a device, Windows 2000 will not attempt to initialize the device at startup. It will be as if the device is not installed in the system.Windows 2000 Help, Search for the articles entitled: Hardware profiles overview; and To disable a device.


29. Who would have thought having the CIO walk in on you at 2 a.m., finding you in nothing but a pair of shorts with a can of Jolt cola and a burning cigarette on top of one of the servers would be a blessing. But here you are, starting up your own network gaming company. I mean, every night administrator in the country is a hard core gamer, right? So there has to be a market for this, right? You are starting with 20 workstations and decide to use Windows 2000 Professional as your OS. You install your First Person Shooter, IRC and a Massively Multiplayer 3D game as the local administrator on the first machine. You soon realize that you are going to want the kids to logon to the network so you can track (and charge for) their usage. You figure that each person will want his or her own profile. You configure the profile directory path in the user accounts as \\gameserver1\profiles\%username%. When the first user attempts to log on to the network, they get an error message that says: "Windows cannot locate your roaming profile and is attempting to log you on with your local profile. Changes to the profile will not be propagated to the server. Detail - The network name cannot be found."What can you do to ensure that roaming profiles work correctly for your customers?

A. Manually create the folders on the server.
B. Share the profile directory on the network.
C. Make sure that you type %USERNAME% in all caps.
D. Do not use %USERNAME%.

>> !
Answer: B

In order for a folder to be accessed across the network, it must be shared. Although you have properly configured the user account to use a roaming user profile, if the folder containing the profile is not shared it will be inaccessible from the network. The path entered to the roaming user profile must follow the standard UNC naming convention for shares (i.e. \\server\share). In the case of roaming user profiles, the following is often used: \\server\share\username.Roaming user profiles are used with domain user accounts. A user's profile contains their environmental information such as their desktop settings, mapped drives, etc. By default this is stored on their local workstation. In order for them to receive the same desktop settings regardless of the computer they log in at, they must have a roaming user profile configured in their user account properties.When a user with a roaming user profile logs on to a computer, Windows 2000 will download the user's profile information and apply it to the machine they are logging in at. When the user logs out, any changes made by the user to their profile will be copied back and saved on the server that holds the user's roaming profile. The next time the user logs in, their profile will download and they will receive the same desktop and environment they had the last time they logged out. Windows 2000 Help, Search for the articles entitled: User profiles overview; and To create a roaming user profile.


30. Life can be so unfair. You work as a tech for a major multinational company. As usual, you are jealous of the workstations that the scientists in the R&D department of the company are getting. These guys get treated like royalty while in other sections of the company you are still supporting Windows 3.1.This quarter, they are receiving new MPS compliant computers that are running Windows 2000 Professional and have dual 800MHz processors, 2GB of RAM and SCSI hardware based RAID 5 in them. You just hope that you can sneak one of last quarter's machines to your desk without anyone noticing after switching them out.The R&D department uses a number of heavy programs including CAD, Mathmatica, and high-end graphics programs. Their applications run the gambit from Win32 to Win16 and DOS based. After you install the new machines, users report that they are not noticing any difference in performance for their Win 16 based programs. You want these users to see a significant improvement in the performance of their new machines when compared with their previous models. How can you accomplish this?

A. Create shortcuts to that run the Win16 based programs in a separate memory space.
B. Install MPS compliant drivers for the second processor on all machines.
C. Replace the Win16 based applications with Win32 applications.
D. Run msmps.exe to upgrade all systems to enable the multiple processor features of Windows 2000 Professional.

>> !
Answer: C

Windows 2000 is a 32-bit operating system. This means that it functions most efficiently when it has 32-bit programs running on it. 32-bit programs are often able to take advantage of multiple processors. In addition, they do not require the translation, or "thunking", that 16-bit programs do. When Windows 2000 is using 16-bit programs, it must convert their data to be compatible with the 32-bit memory space of Windows 2000 and then convert it back again. This conversion process is not necessary with 32-bit programs. In addition, 32-bit programs often store their settings in the registry. 16-bit programs commonly use .ini files that are not as fast to access.Windows 2000 Help, Search for the articles entitled: Application performance; and 16-bit Vs. 32-bit programs.


31. You have recently upgraded all of your client systems from Windows NT 4.0 to Windows 2000 Professional. Users in one department are reporting that since the upgrade they can no longer run one of their applications. The department manager, an old crank who has fought every upgrade including moving from cave wall drawings to pencils and paper, decided to use this opportunity to make "them young whippersnappers" look bad. Instead of waiting a few minutes and giving the IT department a chance to fix the problem, he sent his entire staff home. Then he sent a handwritten note to senior management - he hasn't mastered word processing or email either - explaining his actions.About 11.29 seconds later your phone rang. It was the CIO wanting to know what in the world was going on. The CIO gave you clarity of purpose and about 10 minutes to fix the problem, or else. The systems are using the default security settings. All users are members of the local Users group and no group memberships have changed since the upgrade. What needs to be done so that these people can use the application?

A. Use the Security Configuration and Analysis tool to determine what the problem is and apply any necessary changes to each workstation to ensure that the application can run properly.
B. On all computers in the department add the user accounts of the departmental personnel to the local Power Users group.
C. On all computers in the department add the local Users group to the local Administrators group.
D. All computers in the department need to have the Compatws.inf security template applied to them. You decide to use secedit.exe to apply the policy.

>> !
Answer: D

Security templates are used in Windows 2000 to apply security settings to computers. When a computer is upgraded from Windows NT 4.0 to Windows 2000, members of the Users group have much stricter security applied to them. This may cause users to be unable to perform some tasks they are used to performing, or make applications not function properly for users. The compatible security template for workstations (compatws.inf) is designed to loosen the security settings for the Users group so that applications that are not certified for Windows 2000 will run properly. The template lowers the security levels on certain files, folders and registry keys that are commonly accessed by applications. This allows most applications to function properly for users.Windows 2000 Help, Search for the article entitled: Predefined security templates.


32. Cristine should have given him that raise and not been so mean. He was a good systems administrator, but now he's gone and Cristine, his former boss, is sitting at his desk on a Sunday night with no one to help her. If he only knew, he'd be laughing for sure. She starts sobbing, as usual. Suddenly, a programmer who had been working a few cubicles down yells at her "shut up and check the help!" Brilliant! These tech guys are simply brilliant! She can't help but think that maybe he could be her new administrator since he knows so much! She scans help for the following problem. The former administrator had scheduled a task to run on his Windows 2000 computer, but it is not being completed successfully. Other tasks are executing without problems. The faltering task is critical and executes an MMC snap-in that configures a number of items on various computers in the network.When she launches a blank MMC manually and adds the snap-ins she has no problem completing the task. What does she need to do to make the scheduled task complete successfully?

A. In Scheduled Tasks, have the task run under the security context of her account.
B. Change the account the Task Scheduler service uses to her account.
C. Make sure the Task Scheduler service is started.
D. Stop and restart the Task Scheduler service.

>> !
Answer: A

Individual tasks in the Task Scheduler can be run in the context of different user accounts. For operations that require administrative rights, such as adding users, tasks should be scheduled to run under the administrator account or another account that has been given administrative privileges on the system.Windows 2000 Help, Search for the article entitled: Setting user credentials.


33. It's been years since you ran over the CIO's dog, but you fear it has come back to haunt you again. Right in the middle of last night's defragmentation, your building experienced a power outage. When the SQL server powered back up it displayed a message stating that it had a bad or missing operating system. As he strokes the frame around the picture on his desk of the dog you maimed, the CIO informs you that he expects it up and running in ten minutes. What do you do?

A. Reboot the server using the Windows 2000 CD-ROM and use the Recovery Console to repair the boot partition files.
B. Reinstall the server and then recover it from the last backup.
C. Boot the server from a DOS floppy and run FDISK.EXE /MBRFIX.
D. Reboot the server using the Windows 2000 CD-ROM and use the Recovery Console to repair the master boot record.

>> !
Answer: D

The Recovery Console is new in Windows 2000. It is a command line tool that can be started by entering Windows 2000 setup. The Recovery Console can be used to disable devices, start and stop services, access data on the local hard and floppy drives, format local drives, repair the boot sector or master boot record and much more.Always remember that you cannot start the computer by using the Emergency Repair Disk (ERD). Generally speaking you must use the ERD from the Windows 2000 setup program.Windows 2000 Help, Search for the article entitled: The Recovery Console.


34. "I don't understand. One plus one equals two." The user just keeps saying it over and over again as you try to explain what the problem is. The person is trying to copy an NTFS compressed file to a floppy disk. The file is 2.16MB when uncompressed but only 1.1MB when compressed. Clearly this is one of those cases where it will be easier to fix the problem yourself rather then try to explain the solution. What can you do to get the file on a floppy for him?

A. Use a third party compression utility to compress the file, then copy it to the floppy.
B. Format the floppy with NTFS and enable compression. Copy the file to the disk.
C. Format the floppy with NTFS and move the file to the disk.
D. Span the file across 2 floppy disks using the Windows 2000 Span Disk utility.

>> !
Answer: A

Files can only be stored in compressed form on the NTFS file system. A floppy disk cannot be formatted with NTFS and therefore cannot have files stored with NTFS compression on it. Because of this the files will be decompressed before they are copied to the floppy disk. If the size of the file in an uncompressed state exceeds the amount of free space on the floppy disk, the copy operation will fail. To circumvent this, use a third party compression utility and then copy the compressed file to the disk. Winzip is an example of one such program.Windows 2000 Help, Search for the article entitled: To compress a file or folder on an NTFS drive.


35. Your answering machine goes off and it is your junior systems administrator. He has misplaced the standard practices guidebook again. He is installing several new systems on the network tonight and needs to know how to configure them. With one icy glare your wife makes it clear that if you answer the phone you are going to have a very cold evening/week/month. You opt to ignore his call and just fix them in the morning.Your network uses TCP/IP and NetBIOS name resolution for connection to resources on its various subnets. Your junior cohort has configured the TCP/IP address and subnet mask on all of the systems. What two additional TCP/IP properties should you configure to ensure the systems are fully functional on the network?

A. The DNS server address.
B. The RIS server address.
C. The default gateway address.
D. The WINS server address.

>> !
Answer: C & D

The keys to this question are in the phrase "Your network uses TCP/IP and NetBIOS name resolution for connection to resources on its various subnets." NetBIOS name resolution across multiple subnets is normally accomplished in a Windows environment by using WINS. And, in a routed network (i.e. one with more than one subnet) a computer must have a default gateway specified for it in order to communicate with computers that are not located on its local subnet.Windows 2000 Help, Search for the articles entitled: WINS; and Default gateways.


36. "What's wrong with using the actual URL," you ask as the CIO. She tells you that she wants internal company personnel to be able to access the company website by simply being able to type in its name (webtests). The request sounds simple enough, the problem is the company has two domains: lucy.thebestests.com and ricky.thebestests.com. You silently think to yourself that if you get one more technically illiterate, MBA toting boss you are going to take your stock options and open a coffeehouse. The web server is in the lucy domain while most users are in the ricky domain. How can you enable users in ricky.thebestests.com to access webtests.lucy.thebestests.com by simply typing http://webtests into their browser?

A. On the users' computers, add lucy.thebestests.com to the Domain Suffix Search Order.
B. On the webserver, add ricky.thebestests.com to the Domain Suffix Search Order.
C. On the users' computers, add ricky.thebestests.com to the Domain Suffix Search Order.
D. On the webserver, add lucy.thebestests.com to the Domain Suffix Search Order.

>> !
Answer: A

The Domain Suffix Search Order in the Advanced Properties of TCP/IP can be used to allow clients to extend their DNS search capabilities. If a client enters a short name such as http://tbtserver, generally the domain that their client is a member of will be appended to it. For example, if a system is a member of the na.thebestests.com domain the server will search for http://tbtserver.na.thebestests.com. If one or more domains are entered in the Domain Suffix Search Order list, those domains will also be appended to the short name and tried. For instance, if thebestests.com is in the Domain Suffix Search Order list, http://tbtserver.thebestests.com will also be tried. The computer will keep working its way down the list until it finds a combination that corresponds to an actual computer on the network.Windows 2000 Help, Search for the article entitled: Configuring client settings.


37. It is the best of times. It is the worst of times. The good part, you're making a boatload of cash as a network administrator. The bad part, with the release of Windows 2000 you're working your butt off. You have recently upgraded all of the computers on your network to Windows 2000. Your network is only running TCP/IP. You want all computers to use DNS for name resolution. You also want all computers to be able to continue to register and resolve IP addresses if one of the DNS servers fails. The network has 15 Active Directory domain controllers spread across 7 subnets. Three of the domain controllers have DNS installed on them. How will you configure the DNS servers on your network?

A. You will create a Standard Primary zone on one of the DNS servers and Standard Secondary zones on the other 2 DNS servers.
B. You will create an Active Directory Integrated zone on one of the DNS servers and Standard Secondary zones on the other 2 DNS servers.
C. You will create a Standard Primary zone on all three servers.
D. You will create Active Directory Integrated zones on at least two of the three DNS servers.

>> !
Answer: D

When you are using a traditional DNS model of a Primary and one or more Secondary servers it is important to remember that only the zone database on the Primary server can be changed. Secondary servers contain Read-only copies of the Primary server's database. When the zone file allows Dynamic Updates in a traditional configuration, only the Primary server can write changes to the zone file. If that server fails, DNS cannot be updated dynamically.Active Directory integrated zones use domain controllers as DNS servers. There are no Primary or Secondary servers. All Active Directory DNS servers are able to accept changes to the database, including requests sent dynamically from clients.Windows 2000 Help, Search for the article entitled: Active Directory integration; and Dynamic update.


38. Your kids understand computers, but your spouse is an unholy terror at the keyboard. It is bad enough that you have to spend your whole day fixing user errors at work, you don't want to have to spend a lot of time doing it when you get home as well. You would like to configure your Windows 2000 home computer to automatically back up its configuration and repair information on a regular basis. How can you do this?

A. By using a third party backup program to schedule a regular backup of the System State data.
B. By using a third party backup program to schedule a regular backup of the registry and boot files.
C. By using the Windows 2000 Backup program to schedule a regular backup of the System State data.
D. By using the Windows 2000 Backup program to schedule a regular backup of the registry and boot files.

>> !
Answer: C

The Windows 2000 backup program includes the capability to schedule backup operations. It also includes a new backup option for a collection of information Microsoft calls System State Data. System State data refers to the following on Windows 2000 systems: the Registry, COM+ Class Registration database, boot files, Certificate Services database, Active Directory directory service, SYSVOL directory and Cluster service information. Not all of the above items will be backed up on every system. For instance, a server that is not a domain controller will not have Active Directory installed on it. As a result Active Directory can not be backed up on that server.Windows 2000 Help, Search for the articles entitled: System State data; and To schedule a backup.


39. You work in a 10/100 switched environment and your administrative workstation has a built in 10Mbps NIC. Recently, you got hammered in the latest shooter game by that new kid they hired to work the help desk. The kid can't possibly be better than you, so you figure that you must have lost because he had a 100Mbps NIC. You decided to take money out of the "Repair and Maintenance" account and order yourself a new 100Mbps card to put in your machine. The NIC arrived today and you put it in, but it did not function properly. You viewed Device Manager and saw that it is conflicting with the other NIC card in your machine. You had hoped to have two working network adapters in your machine, but given the choice you would much prefer that the 100Mbps card worked. What should you do?

A. Reboot to the Recovery Console and remove the driver for the 10Mbps adapter.
B. Use Device Manager to set priorities for the two cards. Give the 100Mbps card the highest priority in the system.
C. Use Driver Manager to remove the driver for the 10Mbps network interface card.
D. Use Device Manager to disable the 10Mbps network interface card's device.

>> !
Answer: D

When one device that is no longer needed is still installed and conflicting with another device that is still needed, the best thing to do is uninstall the device that is no longer needed. In this case, the device that is needed is actually a part of the system board and cannot be removed. Because of this, the best course of action is to disable the device by using Device Manager in Control Panel.Windows 2000 Help, Search for the article entitled: Device Manager overview.


40. Your dad just got a new laptop. Did I mention that he hates computers? Hate might be an understatement. His new laptop came with Windows 2000 Professional on it and is driving him absolutely nuts. It is APM compliant and when he tries to shut it down, the Windows 2000 shutdown screen remains on the display and it stays powered up. The poor guy cannot even get it to shut off using the power button! What can you do to help?

A. Reboot the computer. Enter BIOS setup and enable APM support. Save BIOS on exit and reboot.
B. Reboot the computer. Open Power Options in Control Panel and enable APM support. Reboot again.
C. Reboot the computer. Enter BIOS setup and disable APM support. Save BIOS on exit and reboot.
D. Reboot the computer. Open Power Options in Control Panel and disable APM support. Reboot again.

>> !
Answer: B

Windows 2000 supports both ACPI-compliant BIOS versions as well as some Advanced Power Management (APM) and Plug and Play designs. Older APM or Plug and Play designs might not be fully supported or detected correctly by the default installation of Windows 2000. If this is the case, it might effect the way a computer goes into Standby and Power Off modes. On some laptops you can elect to have the power button place the system into Standby mode instead of powering down the system.To ensure that the system detected the laptop's version of APM correctly, and that it is configured as you wish it to be, you can alter the settings manually. This is accomplished from Power Options in Control Panel. On the Advanced tab in Power Options, you can configure the computer to Standby, Hibernate or Power Off when the power button is pressed.Windows 2000 Help, Search for the articles entitled: Power Options overview; and To manually put your computer on standby.


41. You went into the network consulting field with dollar signs in your eyes. Somehow during the job interview they failed to mention that you would be spending your first two years with the firm in Russia, much less Siberia. You can't remember ever being so cold, and you really miss your family and friends back in the States.The company you work for does business all over the world. Being based in Russia, they run the Russian version of Windows 2000 Professional, however they also do business in most major Western languages. One of the users needs to create a document in both English and German. You are assigned to help her configure her system for the task. What do you do?

A. You have her use the input locale indicator on the taskbar to select between the languages she needs.
B. You have her use the Regional Options in Control Panel to add the English and German keyboard layouts/IME.
C. You have her use the Regional Options in Control Panel to add the English and German input locales and keyboard layouts/IME.
D. You have her use the Regional Options in Control Panel to add the English and German input locales.

>> !
Answer: C

Use of additional languages can be enabled on the Input Locales tab from Regional Options in Control Panel. Keyboard layouts and Input Method Editors (IMEs) are used to accommodate symbols and special characters that are used in different languages. When you change your keyboard layout, it effects which characters appear when you press the keys on the keyboard. All languages have a default keyboard layout and many have alternate layouts.Input locales select the language you want to type in. Some programs are able to detect this setting and alter the language used accordingly. When you add an input locale, the keyboard layout that corresponds with that language is generally added as well.Windows 2000 Help, Search for the articles entitled: Regional Options overview; and Common tasks: Regional Options.


42. You have managed to convince your husband that even the slightest wrong keystroke could result in utter disaster on your home computer. So far it has worked and kept him from snooping around where he doesn't belong. You figure as soon as he figures out how to program a universal remote, you'll consider giving him more end user lessons.Your home computer runs Windows 2000 Professional. It has a single hard drive that is formatted using NTFS. Your husband asks you to help him move a compressed folder from the root of drive C, and make it a subfolder of another folder that is not compressed. He wants the files to stay compressed and is very paranoid about something happening to the files during the move process. No doubt that paranoia stems mostly from the mind games you have played with him regarding the computer. What will you do to help him?

A. You will back up the folder using Windows 2000 Backup and then move the folder to its new location using the compmove command at the command prompt.
B. You will back up the folder using Windows 2000 Backup and then move the folder to its new location.
C. You will back up the folder using Windows 2000 Backup and then copy the folder to its new location using Windows 2000 Explorer.
D. You will back up the folder using Windows 2000 Backup and then copy the folder to its new location using the xcopy command from the command prompt.

>> !
Answer: B

When you copy a file or folder it inherits the compression state of its new parent object. When you move a file or folder from one volume to another (i.e. from D to C) it inherits the compression state of its new parent. When you move a file or folder from one location to another location on the same volume, it retains its compression state and does not inherit the compression state of its new parent.Because you are moving a compressed folder into an uncompressed folder on the same volume it will retain its previous compression settings. To ensure that the information is recoverable in the event of disk problems, backup the data first.Windows 2000 Help, Search for the article entitleD. To compress a file or folder on an NTFS drive.


43. Ok so maybe it's picky, but nothing drives you crazier than users downloading drivers off the Internet and installing them on their machines. Mostly because it means that you often have to go out and put the old one back on to get the system back up and running.As much as you have trouble believing it, one of your users has just called and actually asked for your help with installing such a driver. The guy actually came right out and said that he didn't want it to cause you any problems. You consider picking up a small gift for him on your way to his desk as a token of your thanks. When you get to his desk, what can you do to ensure that the driver he installed is compatible with Windows 2000?

A. You can use File Signature Verification to ensure that the driver has a Microsoft digital signature and not install the driver if it does not have one.
B. You can use the Microsoft Signature Verifier to ensure that the driver has a Microsoft digital signature and not install the driver if it does not have one.
C.- You can use winmsd.exe to ensure that the driver has a Microsoft digital signature and not install the driver if it does not have one.
D. You can ensure that the user downloaded the driver directly from Microsoft's website. If they didn't, do not install the driver.

>> !
Answer: A

Windows 2000 provides drivers and operating system files that have been digitally signed by Microsoft. The digital signatures are designed to ensure quality. Microsoft states that a digital signature provides assurance that a file has met a certain level of testing. It also insures that the file has not been altered or overwritten, such as by another program's installation process.File Signature Verification can be set by selecting Driver Signing on the Hardware tab from System in Control Panel. There are three levels of settings that are possible: Ignore, Warn and Block. Ignore allows all signed and unsigned drivers to be installed on the system. Warn displays a message when you try to install an unsigned driver. Block prevents the installation of unsigned drivers.If you are logged on as an administrator, you can select "Apply setting as system default" to apply the File Signature Verification setting you selected to all users who log onto the computer.Windows 2000 Help, Search for the articles entitleD. Using File Signature Verification; To set file signature verification options; and Code Signing for Windows 2000.


44. It's bad enough you have to work in the office next to all of those network guys. They kind of scare you. They speak in a weird tongue only they seem to understand. No matter what time, day or night, weekday or weekend, they're always in the office. Now, the network administrator has chosen to redirect everyone's My Documents folder to each user's home folder. You are concerned that it will not always be accessible because you use a laptop and will not always be connected to the network. What two steps can you perform to make sure that you can always access all of your files in My Documents regardless of whether or not you are connected to the network?

A. Enable offline files in Windows 2000 Explorer.
B. Enable offline files using Offline File Manager.
C. Alter the properties of your home folder to be available offline using Windows 2000 Explorer.
D. Mark your home folder as available offline using Offline File Manager.

>> !
Answer: A & C

The offline files option in Windows 2000 allows a user to continue to work on documents that are located on a network share, even when the computer is no longer connected to the network. The local computer will cache a copy of the file from the network share. If the user changes the file while they are working offline, the changes will be synchronized with the original file when the computer comes back onto the network.To begin using offline files, a user must enable the option by using Windows Explorer. From the Tools menu, select Folder Options and check the box next to "Enable Offline Files" on the Offline Files tab. Then, also using Windows Explorer, the user must make files available for offline caching on a share by share basis. The files and folders that a user needs to use offline need to be specified. All shared folders and files are not automatically available offline. Once specified, the most recent copies of the file are copied from the network share when the user logs off, then synchronized when the user logs back on. Windows 2000 Help, Search for the articles entitleD. Offline Files overview; To make a file or folder available offline; and Offline Files for mobile users.


45. Being inherently lazy, you're always looking for the path of least resistance. You need to upgrade all of the computers in your domain from Windows 95 to Windows 2000 Professional. You have used setup manager to create an unattended text install script called unattended.txt. When you test the script, you discover that the monitors are blanking out after the machines install and boot to Windows 2000. If you start the system in safe mode it works fine. Which line do you change in your script file to ensure that the screen does not blank out?

A. Xresolution under the [Display] heading
B. Yresoulution under the [Display] heading
C. Vrefresh under the [Display] heading
D. BitsPerPel under the [Display] heading

>> !
Answer: C

The V refresh setting under the [Display] heading in an unattended.txt file is used to control the refresh rate setting for the monitor. Setting the refresh rate to a setting that is unsupported by the monitor in use can cause the screen to blank out when booting into Windows. Safe mode uses the default VGA driver and a standard refresh rate and should display properly on most monitors.Windows 2000 Help, Search for the article entitleD. To change the refresh frequency for your monitorOnline Microsoft Knowledgebase article number Q155197


46. Your coworker actually manages to keep a straight face as he actually gets your boss, Cristine, to believe that he was here all night installing Windows 2000 on the new systems. Yeah, sure, he went around and installed every system one at a time from scratch. You know this guy, he's the king of the late night gaming circuit. Judging by the number of empty Mountain Dew cans on his desk, most of the time he spent away from his desk last night no doubt involved trips to the bathroom.You snoop around a little and notice that one of the older servers has a new share on it. As it turns out the share houses the install files for the same operating system that your coworker was installing last night. You suspect that he was installing from the network, probably in an automated fashion. What three actions do you suspect he was using?

A. You suspect that he created an unattended.sif file since all the computers were identical.
B. You suspect that he created and used a DOS boot disk.
C. You suspect that he created an unattended.txt file since all the computers were identical.
D. You suspect that he used the winnt32.exe command with the /s, /unattend and /udf switches.
E. You suspect that he used the winnt.exe command with the /s, /u and /udf switches.

>> !
Answer: B, C & E

Unattended installations involve three steps. First you must share the I386 directory from the Windows 2000 CD on the network. This can be done directly from the CD or by copying it over to a hard drive and sharing it. It is recommended that a hard drive be used because of the increased access times. In the second step, access the share from across the network. The third and final step is to run winnt.exe or winnt32.exe depending upon the system it is being installed on.WINNT32.EXE is used for upgrading from Windows 98, 95, or NT to Windows 2000. It can also be used for new installations. However, it cannot be run from a DOS, Windows 95 or Windows 98 boot disk. All three of these boot disks are considered DOS boot disks for installation purposes. Only WINNT.EXE can be used from one of these boot disks. Network installations can be automated by using the /unattend (/u for winnt.exe) and /udf switches and providing unattended installation and udf files.
The /unattend (/u for winnt.exe) switch is used to specify an unattended installation file. This file contains the configuration information for automating the Windows 2000 setup. Anything that you would normally have to specify during the installation process can be stored in this file and answered automatically. Udf files are used to specify unique items such as a computer name, IP address, or domain name. Although all computers might share the same hardware (which can be answered in the unattended.txt file), they will at the very least need to have unique names. These names are specified on a .udf file.Windows 2000 Help, Search for the articles entitleD. Winnt; and Winnt32.


47. "If an Active Directory tree falls in the forest, does it make a ..." Before you can finish your thought, your deep meditation is interrupted by the ringing of your support phone. You are a little upset because you feel that you were very close to a state of true Windows understanding and enlightenment. "What do you want," you snap as you answer the phone. So much for enlightenment.One of the junior administrators explains the situation. It is clear that she knows that she woke you up, again. She tells you that she is working at one of the servers that was upgraded from Windows NT 4.0 to Windows 2000. The system has three hard disks. Both the system and boot partitions are located on the first drive. The data from that drive is mirrored to the third drive in the system. The first drive in the system failed and she replaced it with another drive that she had in her bag. The other drive came from a Windows 2000 computer but when she tries to repair the volume the Repair Volume option is not available. What two different options do you provide her with for repairing the volume so you can return to your quest for oneness with Microsoft?

A. On the new disk, the first drive in the system, delete all existing volumes. Then convert the disk back to a basic disk and repair the mirror volume.
B. Break the mirror set and create a new mirror.
C. Break the existing mirror set, then make the third disk in the system a dynamic disk. Create a new mirror.
D. On the new disk, the first drive in the system, delete all existing volumes. And repair the mirror volume.

>> !
Answer: A & C

A mirror set must consist of two basic disks. A mirror volume must consist of two dynamic disks. Currently, the original drive is a basic disk and the new disk is a dynamic disk. There are two options. The first is to attempt to repair the current mirror set. In order for this to work the new disk will need to be converted back to a basic disk, and then the mirror set will need to be repaired. It is important to note that Microsoft often refers to a mirror set as a basic mirror volume.The second option is to convert the original drive to a dynamic disk. To do this, the original mirror set would have to be dissolved. This is called breaking the mirror set. Once it is broken the drive can be converted to a dynamic disk and a new mirror volume can be created from the original and dynamic disks.Windows 2000 Help, Search for the articles entitleD. To repair a basic mirrored volume (mirror set); Using mirrored volumes; and To replace the failed mirror with a new mirror on another disk.


48. They finally let you hire a personal assistant. He is a younger version of yourself. He dresses like you, cuts his hair like you and at times even talks like you. Things are going great until you overhear one of the help desk clowns call your assistant "Mini Me". To show them he wasn't hired strictly for his good looks you gave the staff, including your assistant, the following problem to solve. Being brilliant (maybe "Mini Me" isn't such a bad name) your assistant was the first to get the correct answer. - Two domains: thebestests.com and nevada.thebestests.com.- Shared printer in the thebestests.com domain that members of the Writers domain local group can access.- Your account in the nevada.thebestests.com domain, which is a member of the CoolEmployees global security group.- You need to be able to print to the shared printer. How does he tell you to make it happen?

A. He tells you to add the CoolEmployees group to the Writers group.
B. He tells you to add the Writers group to the CoolEmployees group.
C. He tells you to run addgroup.exe at the command prompt to add your user account directly into the Writers group.
D. He tells you to convert the Writers group into a global group and to run addgroup.exe at the command prompt to add your user account directly into the Writers group.
E. He tells you, "A man as handsome as yourself shouldn't worry about such trivial things."

>> !
Answer: A

There are two different types of groups in Windows 2000, Distribution and Security groups. Distribution groups cannot be used to assign permissions. They are designed for grouping users together for the distribution of messages, such as email. Security groups can also be used for this task, but are primarily designed for assigning permissions.Groups have scopes that govern who can and cannot be a member of the group. The three scopes are Global, Domain Local and Universal. Only Global and Domain Local security groups can be used in a mixed mode domain. Any Windows 2000 network that still has Windows NT domain controllers is a mixed mode domain.In mixed mode, Global groups can contain users from the same domain as the Global group. Domain Local groups can contain Global groups and users from any domain. Microsoft recommends granting resource access permissions by adding users to Global Security groups, adding Global Security groups to Domain Local Security groups and granting Domain Local Security groups access to specific resources.Windows 2000 Help, Search for the articles entitled: Group scope; Nesting groups; and Domain modes and groups.


49. "Wow check out this thing," your junior technician says to you while you are working in the server room. The "thing" he refers to is a SCSI card that might just be as old as he is. "I'll bet I could really give this system a boost by installing an updated driver," he says as he walks out of the room.The server runs Windows 2000 and when he comes back he tells you that the adapter isn't on the Windows 2000 Hardware Compatibility List (HCL), but that he did find an updated Windows 2000 driver for it on the manufacturer's website.When he reboots the system after replacing the driver he gets the following blue screen (GPF - STOP) error: "INACCESSIBLE_BOOT_DEVICE." What two things can he do to fix the problem?

A. Reboot the computer and log in using the Last Known Good Configuration Profile.
B. Boot the computer into the Safe Mode command prompt. Copy the old driver for the adapter to the system volume and to Ntbootdd.sys. Reboot.
C. Boot the computer from the Windows 2000 CD and perform the emergency repair procedure. Then, reinstall the previous driver for the adapter.
D. Boot the computer to the Recovery Console. Copy the old driver for the adapter to the system volume and to Ntbootdd.sys. Reboot.

>> !
Answer: C & D

The Recovery Console is new in Windows 2000. It is a command line tool that is started by entering Windows 2000 setup. The Recovery Console can be used to disable devices, start and stop services, copy data to and from the local drives, format local drives, repair the boot sector or master boot record and much more. Because the computer will not boot to a desktop, or even to safe mode, you must find another way of repairing the system. This is what the Recovery Console was designed for. Because it is accessed from setup, the fact that the system is not currently able to boot is irrelevant. The emergency repair process is also run from setup and is designed to repair a system that is unable to boot. It is able to restore a system that is having problems with the registry, system files, partition boot sector, or startup environment. The Ntbootdd.sys file is an adapter specific file that is used by SCSI cards that are not bios enabled.Windows 2000 Help, Search for the articles entitleD. The Recovery Console; Recovery Console commands; and To use emergency repair on a system that will not start.


50. It's not like you swerved to hit the darn car. You couldn't help the fact that it was right there in the middle of road. Maybe if you had a fewer number of shots of Everclear this wouldn't have happened. You can't help but think that life just isn't fair. You have been a loyal employee of this company for over 4 and a half months. You deserve more than this. Besides, with the bonuses the CIO makes, he can afford another Ferrari.As you finally make it down to your new office in the boiler room, you can't help but notice the sign on your door with your new title: Printer Tech. It's enough to make a grown man cry. You look at the list of tasks awaiting you on your desk and the first one is a killer. You are to configure a print server named printers.thebestests.com as a print server in the Nevada offices, and install and share a number of printers from the server.Employees from all over the state will be using the printer, including users from the following domains: reno.thebestests.com and lv.thebestests.com. You travel to all of the offices and won't always be at the print server to check on the status of the attached printers. You suspect that it would be a very good idea for you to spend as much time away from HQ as possible for awhile. How will you be able to monitor the shared printers while you are away from the server?

A. By using the web and connecting to the server with the following URL: http://printers.thebestests.com/printers
B. By using the web and connecting to the server with the following URL: http://printers.thebestests.com
C. By using the web and connecting to the server with the following URL: http://printers.thebestests.com/shares/printers
D. By using the web and connecting to the server with the following URL: http://www.thebestests.com/printers

>> !
Answer: A

Internet based printing is a fantastic new feature from Microsoft that is based on the Internet Printing Protocol (IPP) and is included as standard in Windows 2000. It can be used to submit print jobs to, as well as monitor printers and print jobs on, a printer across the Internet or a local Intranet. To connect to a print server over the Internet or an Intranet and obtain a list of printers that can be managed remotely use the following URL: HTTP://PrintServerName/printers. To access a printer directly over the Internet or an Intranet use the following URL: HTTP://PrintServerName/PrinterShareName.Windows 2000 Help, Search for the articles entitled: Internet printing; and To manage printers from a browser.


51. "Hmmm," you say looking over the tech's shoulder. She is trying to monitor the performance of all applications running on the user's machine. The user has several 32-bit applications and three 16-bit applications open. One of the three 16-bit applications is configured to run in a separate memory space.The tech had no problem setting up System Monitor to view the Process:% Processor Time performance counters of the 32-bit applications but cannot seem to find the 16-bit ones to add to the chart. What do you tell her?

A. You tell her to look for and add the ntvdm instance of the % Processor Time counter for the Process object, and to select the sub-instances for the three applications.
B. You tell her to disable the 16-bit application filter from the Action menu.
C. You tell her to enable the 16-bit application filter from the Action menu.
D. You tell her to look for and add the ntvdm and ntvdm#2 instances of the % Processor Time counter for the Process object.

>> !
Answer: D

DOS and Win16 (16-bit) programs run in NT Virtual Dos Machines (ndvdm's). Ntvdm's simulate a dos environment and may also include a component that is designed to simulate a Windows 3.1 environment. Win16 programs are designed to run in a Windows 3.1 environment. By default, all 16-bit programs launched in a system run in the same ntvdm. It is possible to have them run in separate ntvdm's by selecting the option to have them run in their own separate memory space. For performance monitoring purposes, the individual processes do not show up. Only the ntvdm processes are available for monitoring. If programs are running in their own separate memory spaces, and thus separate ntvdm's, the System Monitor will allow you to monitor ntvdm, ntvdm#2, ntvdm#3, and so forth.Windows 2000 Help, Search for the article entitled: Monitoring legacy programs.


52. You made the fatal error of letting your boss know you had once taken a Citrix class. Your company wants to use Windows 2000 Terminal Services to make an application available to users at Windows 3.11, 95, 98, NT and 2000 computers. He figures Citrix is close enough to terminal services in Windows 2000, so guess who gets the project? The application is used for call tracking in the sales department and runs 24 hours per day. Data that the application collects is available to all shifts. The company wants the users to be able to shut down their computers at the end of their shifts but still allow the application to run on the Terminal Server.

A. Configure the Remote Desktop Protocol (RDP) on the server to override user settings.
B. Configure the Remote Desktop Protocol (RDP) on the server to override user settings. Also, set the End disconnected sessions setting to Never.
C. Configure the Remote Desktop Protocol (RDP) on the server to override user settings. Also, set the End disconnected sessions setting to When Logging Out.
D. Install Citrix MetaFrame on top of the Windows 2000 server that is running Terminal Services. Publish the program.

>> !
Answer: B

End disconnected sessions is designed to allow administrators to reset disconnected sessions that are on a Windows 2000 server running terminal services. There are two ways that a user can end their session. If a user chooses to log off from their session, all resources that they are using on the terminal server will be freed up. If a user chooses to disconnect from the server, the resources remain in use on the server and the user can connect back into their session and pick up working where they left off.The End disconnected sessions option can be set on a user by user basis, however it can also be overridden at the connection level for all users if desired. If overridden at the connection level, all users that connect to a given RDP connection object will have the same End disconnected sessions setting. An administrator can choose to allow disconnected sessions to remain on the server indefinitely or for a finite period of time. All disconnected sessions will be reset when the server is rebooted. Some administrators choose to free up resources consumed by disconnected sessions by having them reset after a period of time. This makes more system resources available for the other sessions.Windows 2000 Help, Search for the articles entitled: Configuring session limits; Sessions; Log off or disconnect; Terminal Services Configuration overview; To set time-out settings for disconnected, active, and idle sessions.


53. "Daddy," you can hear the tears in her voice as she rounds the corner to your room, "it did it again." "I'm sorry sweetie," you say as you get up to take a look. Sure enough the darn thing locked up again. You think back and realize that the problems must have started when you installed that new modem. It was a Plug and Play device and Windows 2000 detected it and installed a driver for it with no problem, but since then things just haven't been right. You reboot the computer, get back on the Internet and download an updated driver. What you do next?

A. Open Device Manager and go to the Properties dialog box for the modem. Click the Update Driver button.
B. Open System Manager, delete the current driver and reboot the system. On reboot when Windows 2000 detects the modem, specify the new driver.
C. Open Driver Manager and go to the Properties dialog box for the modem. Click the Update Driver button.
D. Open Driver Manager, delete the current driver and reboot the system. On reboot when Windows 2000 detects the modem, specify the new driver.

>> !
Answer: A

Device Manager is used to replace and update drivers in Windows 2000. You must be logged on as an administrator to manage drivers in Windows 2000. To open Device Manager, go to the Start menu and select Settings => Control Panel => System. On the Hardware tab, click on Device Manager.Windows 2000 Help, Search for the article entitled: To update or change a device driver.


54. Rubbing your eyes and yawning, you realize you must have nodded off. It's been awhile since you've had to pull an all nighter. You are installing a bunch of new Windows 2000 Professional clients on the network. You have a Windows 2000 network with Active Directory, DNS and WINS servers. The systems that are being installed are PXE compliant so you decide to use Remote Installation Services (RIS) to perform the install. You create the image, upload it to the server and boot the new systems. For some reason they fail to connect to the RIS server. Existing clients have no problem connecting to the RIS server. You promised your boss and all of the department heads that this little upgrade wouldn't cause any disruptions. People are going to start arriving for work in less than two hours. What can you do to resolve the problem?

A. Disable PXE support in BIOS.
B. Install a DHCP server on the network.
C. Boot the computers from a PXE compliant RIS boot disk.
D. Boot the computers from a DOS boot disk with the MS-DOS network client on it.

>> !
Answer: B

RIS requires an Active Directory domain controller, DNS server, and DHCP server to be present on the network and accessible to clients. When a RIS client boots up, it dynamically obtains addressing information from a DHCP server before attempting to contact the RIS server. If a DHCP server is not available, it will be unable to contact the RIS server.Windows 2000 Help, Search for the article entitled: Checklist: Installing Remote Installation Services.


55. Yesterday you were a travel agent. Today you are the new full time administrator of the organizational unit (OU) for the local travel office you work in. Welcome to the IT business! Hope you like reading a lot of really boring books.The OU for the office has been delegated to you. For your first task, the home office assigns you the job of redirecting the My Documents folder on users' computers to use a network share. Specifically, the same network share that they use for their home folder. The users' home folders are located under the path \\server2\users. How will you accomplish this?

A. Use a new Group Policy Object (GPO) to redirect the My Documents folder. Point it to the path: \\server2\users.
B. Use the properties of My Computer on each of the systems you administer. On the General tab select the Move button. In the Browse for Folder dialog box that appears, select the new location and click OK.
C. Use a new Group Policy Object (GPO) to redirect the My Documents folder. Point it to the path: \\server2\users\%username%.
D. Use the properties of My Documents on each of the systems you administer. On the General tab select the Move button. In the Browse for Folder dialog box that appears, select the new location and click OK.

>> !
Answer: C

Folder Redirection is an option that can be applied through Group Policy. It allows administrators to redirect some Windows 2000 special folders, such as My Documents, to network storage locations. Although My Documents still shows up on the user's desktop, anything saved in it will be located in a network location rather than on the user's local computer. Microsoft recommends use of the %USERNAME% variable when specifying the UNC redirection path so that each user will have a unique storage location on the network. Without it, all users that the Group Policy Object applies to will have their data redirected to the same folder.Windows 2000 Help, Search for the article entitled: Folder Redirection.


56. You are sick and tired of surfing the Internet through your lousy 56K connection. Work has a T1 and a modem bank so you decide to install two more modems in your computer and have a couple of extra phone lines installed. Why pay to connect at 56K though your ISP when you can connect at 150K+ through work for free! You install the modems and configure Multilink, however when you dial out only one modem connects to the remote access server at work. What do you need to do to claim your bandwidth?

A. Install Multilink drivers for your modems.
B. Configure Multilink on the remote access server at work.
C. Configure your dial-up networking settings to disable LCP extensions.
D. Configure your dial-up networking settings to disable hardware handshaking.

>> !
Answer: B

Multilink is used to combine bandwidth from several RAS devices, such as modems, in a single unit. For instance, two 28.8 modems can be combined to have an aggregate bandwidth of 57.6Kbps. Because only one of the modems successfully connected, it is reasonable to assume that although you have set up your workstation for Multilink, it is not set up on the server.Windows 2000 Help, Search for the article entitled: Multilink and BAP.


57. You knew the upgrade wasn't going to be easy. Your clients truly span the ages. Some are PXE compliant, some are not. You decide to use Remote Installation Services (RIS) to deploy your Windows 2000 Professional clients. You create your RIS image, upload it to the server, and boot all of your systems.The computers that are not PXE compliant cannot connect to the RIS server. What needs to be done to ensure that they can connect and download an image?

A. You need to make a non-PXE compliant startup disk using the Rbfg.exe utility.
B. You need to make a non-PXE compliant startup disk using the RIPrep.exe utility.
C. You need to make a non-PXE compliant startup disk using the RIPBoot.exe utility.
D. You need to use a DOS boot disk with network support and use it to connect to the RIS server.

>> !
Answer: A

Remote Installation Services (RIS) is used to set up new client computers remotely. When using RIS there is no need to physically visit each computer. You can install operating systems simply by connecting the computer to a network, starting the client computer and logging on with a valid user account. In order to work properly the computer must meet Net PC or PXE standards. These standards allow for a computer to boot up on the network, often from a special ROM chip on the NIC, obtain addressing information and then contact a RIS server to begin the operating system installation.For computers that do not support the Net PC or PXE standards, a remote boot disk can be used to connect to a RIS server. The boot disk is used to simulate a PXE environment on the computer. Rbfg.exe is used to create this boot disk.Windows 2000 Help, Search for the article entitled: Remote Installation Services boot disk.


58. A user wakes you up from your afternoon nap by telling you that one of your servers is responding very slowly. You mumble, "It's just old," and go back to sleep with the phone receiver still in your lap. You wake up completely refreshed around 4 p.m. and grab your coat as you head for the door.Just as you get to your car you remember the call and it dawns on you that the problem is on one of your new Windows 2000 servers. You momentarily consider returning to the office and having a look at the problem. "What was I thinking," you say to yourself as you head home. The next morning you decide to check it out first thing after lunch. It turns out that the RAID 5 volume shows the status of the fourth disk in the array as Missing. You poke around a bit more with Disk Manager but don't see anything else wrong. What will you do next to resolve the situation?

A. Make sure the fourth disk drive is plugged into the server and powered up. Select and restore the drive in Disk Manager.
B. Make sure the fourth disk drive is plugged into the server and powered up. Select and reactivate the drive in Disk Manager.
C. Make sure the fourth disk drive is plugged into the server and powered up. Break and recreate the RAID 5 volume in Disk Manager.
D. Make sure the fourth disk drive is plugged into the server and powered up. Reboot the server.

>> !
Answer: B

If a disk shows up as missing, that means that the system cannot detect it. It might be severely damaged or it might have simply come unplugged. Microsoft first recommends that you power down the computer and ensure that the disk is plugged in. Once this has been verified, they next suggest that you reactivate the disk. This is accomplished by using Disk Manger in the Computer Management console. Computer Management can be accessed by going to the Start => Programs => Administrative Tools menu. Under the Storage heading, select Disk Management then right click the missing disk and select Reactivate Disk.Windows 2000 Help, Search for the articles entitled: Repairing a dynamic RAID-5 volume; and To reconnect the disk and repair the RAID-5 volume.


59. Oh WAH! Like a great man once said, "There's nothing wrong with a network that the elimination of users couldn't fix." Brilliant man. Definitely ahead of his time. Yesterday, users complained when they couldn't get their email. WAH! Today they are complaining one of your file servers is running a little slow when they access their home folders. WAH! WAH! WAH!You decide to take a look at the server in question. It is a Windows 2000 box with tons of processor and memory. The disk size is adequate and formatted with FAT32. You check the network logs and see that there has been no increase in usage since you put the server in a year ago. What can you do to speed up user access to files?

A. Upgrade the drive to NTFS5 and make it a dynamic disk.
B. Upgrade the drive to HPFS and make it a dynamic disk.
C. Defragment the drive.
D. Compress the drive.

>> !
Answer: C

Disk Defragmenter is designed to locate files and folders that have become fragmented. Files and folders are said to be fragmented when they are scattered in more than one place on the physical disk drive rather then being stored contiguously. Fragmented files and folders can take longer to access because the information must be searched for and brought together from many different places on the disk. Likewise, writing to a fragmented drive can take longer because files and folders must be stored in pieces stored in different places on the physical disk drive. In addition to determining the level of disk fragmentation, Disk Defragmenter can also be used to reduce the level of fragmentation on the disk without harming any of the information currently stored on it. Fragmentation occurs through normal use of the system. Systems should regularly be checked for excessive fragmentation and defragmented if necessary.Windows 2000 Help, Search for the article entitled: Disk Defragmenter overview.


60. Get around, get around, you get around. You are the lone ranger. A masked administrator driving your trusty Ford Pinto to your company's offices all over town. Every now and then you run into a therapist that tries to convince you to remove the mask because, they say (usually with a snicker), driving a Pinto is nothing to be ashamed of. You've opted to keep the mask.Not being the swiftest cowboy in the west, you keep a file of passwords for all of the systems at the various offices. You keep the password file in a folder called, you guessed it, "Passwords" in your home folder. You want to ensure that the information stored in this folder is secure and that you can access it from every office you visit during the day. All offices are connected to the same network and are using the same Windows 2000 domain. What can you do?

A. Select the PGPEncryption attribute in the properties of the Passwords folder.
B. You can have your account use an administrative profile and select the encryption attribute in the properties of the Passwords folder.
C. Select the encryption attribute in the properties of the Passwords folder.
D. You can have your account use an administrative user profile and select the PGPEncryption attribute in the properties of the Passwords folder.

>> !
Answer: C

Encrypting File System (EFS) is new in Windows 2000. It is used to encrypt files and folders that are stored on NTFS volumes, either locally or on Windows 2000 servers. EFS is designed to protect sensitive data from unauthorized access. Even if someone is given access permissions to an encrypted file, they cannot view it unless the correct decryption key is associated with their user account. Each file is encrypted not only with the key of the user, but also with the key of a recovery agent. Because of this, the person who is designated as the recovery agent can logon, decrypt the file and turn it over to another user in unencrypted form.Windows 2000 Help, Search for the articles entitled: File encryption overview; and Data encryption and decryption.


61. You cannot count how many TV's you have put a bullet in since the Microsoft antitrust trial. Why? Because you live in mixed server hell! You can't imagine that any other vendor could get you out of it except Microsoft and now fear that all hope is lost.Your latest problem occurred today when you put in a new Windows 2000 server and installed Gateway Services for NetWare (GSNW). For some reason, it cannot communicate with the NetWare 4 servers on your network. Your current Windows 2000 (GSNW) servers communicate fine with the NetWare servers on your network. What do you need to do to this new server to get it up and running properly?

A. Reconfigure frame type on the NWLink protocol so that it uses 802.11.
B. Reconfigure frame type on the NWLink protocol so that it uses the correct Ethernet frame type.
C. Enable IPX Rip multicasting.
D. Uninstall GSNW. Install Client Service for NetWare (CSNW). Then Reinstall GSNW.

>> !
Answer: B

All computers on the network that need to communicate with each other must have a frame type in common. As an example, if one computer is configured to use frame type 802.2 and another is using 802.3 the two computers will not be able to communicate with each other.When configuring NWLink you can specify automatic frame type detection or select the frame type manually. By default, NWLink uses automatic frame type detection. Though it may sound like this setting detects and configures all frame types in use, it does not. When it detects multiple frame types, it defaults to 802.2. This means that the server cannot communicate with computers running any other frame type. Most modern servers use the 802.2 frame type. However, some older servers such as NetWare 3.11 and earlier use frame type 802.3. Because the servers do not have a frame type in common, they cannot communicate with each other.
A computer can be assigned more than one frame type to communicate with. In this way it can communicate with servers that use 802.2, in addition to servers that use 802.3. Though normally configured through the NWLink Properties graphical interface, another way to configure a server for more than one frame type is to directly edit the registry. When editing the registry you should enter in the hexadecimal values for the frame types under the key: HKEY_LOCAL_MACHINE\System\CurrentControlSet(number)\Services\NwlnkIpx\Parameters\Adapters\{adapter ID}\PktTypeWindows 2000 Help, Search for the articles entitled: Setting the frame type; and To configure NWLink.


62. It has been so slow recently in the server room that it was one of those rare days where you went looking for problems instead of them finding you. One of the computers you are responsible for runs a transactional database system. The system uses log files and writes many of them to disk. The files are generally on the system for only a few minutes before they are deleted. After monitoring this computer for a period of time, you learn that the disk subsystem is a significant performance bottleneck. You purchase and install a new SCSI adapter and four new 50GB disks. You are preparing to setup the disks and you want to make sure that all 200GB of space is available through a single drive letter. You also want to optimize the disk configuration for speed. What do you do?

A. You convert each of the disks to dynamic disks and make a striped volume.
B. You make a striped set.
C. You convert each of the disks to dynamic disks and make a RAID 5 volume.
D. You convert each of the disks to dynamic disks and make a spanned volume.

>> !
Answer: A

Striped volumes are the fastest type of disk configuration available in Windows 2000. They are not fault tolerant which means that if one of the disks fails, the data must be restored from backup. Striped volumes work by saving data in 64K chunks across all of the disks that comprise the volume. If the drives are connected to one or more SCSI disk controllers, often the data can be written to or read from the drives simultaneously. Striped volumes can be created using as few as 2 or as many as 32 hard disk drives. All of the drives that comprise a striped volume work as a single logical disk and have a single drive letter.Windows 2000 Help, Search for the article entitled: Using striped volumes.


63. You got an inkling you were in trouble when they called you to corporate headquarters to spearhead a new, very high profile project. The first clue, they put you up at the Bates Motel. You haven't showered in weeks. The project is a killer and will be a career maker or breaker. You have been assigned the role of project lead for the enterprise wide conversion to Windows 2000 at a Fortune 50 company. The company has one domain worldwide with hundreds of domain controllers in service. The CTO has mandated that none of the existing servers will be used as the first Windows 2000 domain controller. Instead, they have ordered one beast of a new box from a major computer manufacturer. How will you install Windows 2000 on it and make it the first Active Directory domain controller?

A. First, you will install the server as a Windows NT 4.0 BDC for the company's domain. You will then promote the server to the PDC and upgrade it to Windows 2000.
B. You will permanently remove the current PDC from the network. You will then install Windows 2000 on the new server and use dcpromo.exe to upgrade it to a domain controller for the existing domain.
C. First, you will install the server as a Windows NT 4.0 PDC for the company's domain. Next, demote the previous PDC to a BDC. Finally, upgrade the new server to Windows 2000.
D. You will install Windows 2000 on the server and have it join the domain. Then you will run dcpromo.exe to upgrade the server to a domain controller. In server manager on the current PDC, you will select the new server, and select Promote to Primary Domain Controller.

>> !
Answer: A

When upgrading the domain services of a network from Windows NT to Windows 2000 the first computer that must be upgraded is the Primary Domain Controller (PDC). In this case, the existing PDC will not be used as the first Windows 2000 domain controller because a new system has been ordered. This does not change the fact that the PDC must be upgraded first.When the new box arrives, it should be installed as a Windows NT Backup Domain Controller (BDC).
Once installed as a BDC, the server should be promoted to become the domain's PDC. Once it is the PDC, it should be upgraded to Windows 2000. As part of the upgrade process, all of the user and group accounts will be migrated from Windows NT directory services into Active Directory.Windows 2000 Help, Search for the articles entitled: Planning the order of server upgrades; and Upgrading a domain by upgrading domain controllers first.


64. "Don't do it." "Yeah, I wouldn't do it chief." "Definitely not big guy." You click the button anyway and explain, "Look, fellas, it has to get done." "You really shouldn't have done that chief," one of them says in response.The voices in your head normally are not THIS strong and unified. You wonder if you have just made a terrible mistake. Still you don't see how you had any choice. Cristine, one of your employees, needed access to the Exchange server to do some light configuration tasks in your absence.She is a member of the Supervisors group. The Supervisors group does not have administrative access to the server. Another group, the Server Administrators does. A week later you come back from vacation and find that an unauthorized service pack install has been done on the server, and that the Exchange databases are totally corrupt. What did you do before leaving that you now regret?

A. You removed Cristine from all groups and made her account a security equivalent to the administrator account.
B. You made Cristine a mail administrator.
C. You removed Cristine from all groups and made her account a security equivalent to your account.
D. You made Cristine a member of the Server Administrators group.

>> !
Answer: D

In Windows 2000, groups are the recommended method of assigning specific levels of access to users. In this case a group already exists that has the required access level that the user will need to perform some administrative tasks. Accordingly, all that is necessary to give them the access permissions they need is to add their account to the group.Windows 2000 Help, Search for the article entitled: Local Users and Groups overview.


65. You try to offset your enormous IT salary with charity work in hopes that your time can be written off your taxes. One of the places you volunteer at is your church. It only has one computer, a Windows 2000 Professional system you installed recently.You have added the church's pastor to the Administrators group. Much to your dismay, other members of the church staff report that they think the pastor has been going through and looking at all their files. Some users have even reported changed files.You decide that you had better remove the pastor from the administrators group. However, he has been helping you out by administering the printers and performing backups. How can you set the computer up so that he can continue to perform these tasks but not snoop around and change other people's files?

A. Take the pastor's account out of the local Administrators group. Add his account to the Server Operator and Backup Operator local groups.
B. Take the pastor's account out of the local Administrators group. Add his account to the Power Users local group.
C. Take the pastor's account out of the local Administrators group. Add his account to the Backup Operators and Power Users local groups.
D. Use NTFS permissions to lock the pastor out of all files except his own. Configure auditing to pop up a message box that says, "This is GOD. I'm watching you and am very disappointed," if he tries to access a file or folder that he does not have access to.

>> !
Answer: C

Members of the Administrators builtin local group can always take ownership of files and folders. If a user can take ownership they can also assign themselves permissions to view the files. Therefore, the user must be removed from the Administrators local group to prevent them from viewing other user's data.The Power Users builtin local group will provide the user with the ability to do everything mentioned in the question except perform backups. The easiest way to allow the user to perform backups is to also add him or her to the Backup Users builtin local group.Windows 2000 Help, Search for the article entitled: Builtin and predefined groups.


66. You have always wondered if it is possible to make network traffic go so fast that you could hear it whiz by in the cable. With this goal in mind you set about modifying the registry to make it happen. You modify the size of your TCP window size. You also remove several keys from the registry size that you feel are the catalytic converter of the TCP/IP stack, there only to slow it down. Much to your horror, when you reboot the computer it locks up at the logon screen. What is the best way to fix this?

A. Reboot the system and use the Last Known Good Configuration.
B. Boot from the CD and select the Repair option. Go into the Recovery Console and launch regedt32.exe. Put the keys back that you deleted.
C. Boot from the CD and select the Repair option. Go into the Recovery Console and use regcompare.exe.
D. Boot into safe mode and stop and restart the server service.

>> !
Answer: A

The Last Known Good Configuration makes it possible to restore Windows 2000 to a previously working configuration. If you've made changes to the registry or to device drivers during the previous logon session, those changes can be rolled back prior to your next logon. The current system settings are copied over to the Last Known Good Configuration information after a successful logon. Because of this, it is very important that you do not log in again if you suspect that you have a configuration error.
Instead, reboot the system and log in using the Last Known Good Configuration profile. This will restore the settings to the state they were in the last time you successfully logged into the computer, which was before you made the changes during your last logon session.Windows 2000 Help, Search for the articles entitled: Tools and techniques; and To start Windows 2000 using the last known good configuration.


67. After another night of fighting, you realize that your spouse will never understand that sometimes you need to go into the office at 2a.m. to fix a network problem. As if the nice clothes, nice house, nice toys and nice cars weren't reason enough. Sheesh!Then it hits you. If you could just dial in from home, you could do your work and pass it off as an extra-long, midnight bathroom visit. Your spouse is used to that. The next day you get it all configured and boy does it pay off that evening. The CEO (who never seems to go home) pages you with a printing problem. You dial into the network and quickly determine the print spool on his computer is on a drive that is low on space. You need to move it from drive C: to drive D:. How will you tell him to do this on the phone?

A. You will tell him to open the Print Server Properties dialog box and change the location of the spool folder to any path on drive D: that currently exists.
B. You will tell him to open the Print Server Properties dialog box and change the location of the spool folder to a new path on drive D:.
C. You will tell him to place a pointer in the file system where the current print spool is located that redirects all files to drive D:.

>> !
Answer: A

By default the print spool in Windows 2000 is located at %SystemRoot%\System32\Spool\Printers. This is the same share that has all of the system files on it. Over time it is possible that space on this drive can be reduced and the spool might need to be moved to a new partition with more free space available for storing print jobs.The spool location can be changed by opening the Printers folder from Start => Settings =>Printers. On the File menu, select Server Properties and click the Advanced tab. In the Spool Folder text box, enter the new path you want to use, then Stop and Start the Spooler service.Windows 2000 Help, Search for the articles entitled: Setting the location of the spool folder; and To change the spool folder location.


68. How disappointing! You had just gotten the email back from the Smithsonian that they would love to have the old printer (named AcctgPrinter on the network) that bookkeeping has been using for the last couple of hundred years. They were going to put it between an Atari 64 and an old Magnavox "Odyssey" console in their collection of still functional, odd and unusual early 20th century electronic equipment. Unfortunately this morning AcctgPrinter, which was attached to the AcctgPrint server died a horrible death that involved, among other things, a small fire and some second and third degree burns. To make matters worse, several key documents are still waiting in the queue to print to the printer. You would like to redirect those documents and all future documents that are sent to \\AcctgPrint\AcctgPrinter to \\SalesPrint\SalesPrinter. You do not want users to have to reconfigure their computers to have this happen. What can you do?

A. In the properties of SalesPrinter, add a port with a path set to \\SalesPrint\AcctgPrinter.
B. In the properties of AcctgPrinter, add a port with a path set to \\SalesPrint\SalesPrinter.
C. Remove the AcctgPrinter share from the network.
D. In the properties of SalesPrinter, add a port with a path set to \\AcctgPrint\AcctgPrinter.

>> !
Answer: B

You can redirect print jobs from one printer to another printer in Windows 2000. This is accomplished by adding a new local port and pointing the port to the UNC name of the printer you wish to redirect the jobs to. The printer you are redirecting the jobs to should use the same driver as the original printer, and must be shared on the network. You must have the Manage Printers permission on each printer to accomplish this task.Windows 2000 Help, Search for the article entitled: To transfer documents to another printer.


69. Maybe it was all of the X-File episodes, but lately your motto has been, "Trust No One." After all, just because you're paranoid doesn't mean they're not out to get you. After extensive browsing of TextFiles.Com, you decide others shouldn't view the documents you have saved. You are running Windows 2000 Server because of all the network monitoring you do. You store your files within your home folder on the NTFS partition that has EFS enabled. They should be fairly safe, you think, although you are a tad worried after coming back from this year's DefCon. You decide that you would like to be able to review the information contained in those files after you log off the system and take your laptop home. So, you enable offline files on your computer. When you get home you discover that your files are not available offline. What else do you need to do the next time you are in the office so that your files will be available to you when you are not connected to the network?

A. You need to make copies of the files and store them in the local SYSVOL folder on your Windows 2000 Professional machine. Windows 2000 File Replication Service (FRS) will then keep them synchronized.
B. You need to select to make all of the files available offline.
C. You need to copy the files you want to be available offline to the briefcase icon on the Windows 2000 desktop.
D. You need to manually sync all offline files.

>> !
Answer: B

The offline files option in Windows 2000 allows a user to continue to work on documents that are located on a network share, even when the computer is no longer connected to the network. The local computer will cache a copy of the file from the network share. If the user changes the file while they are working offline, the changes will be synchronized with the original file when the computer comes back onto the network.The files and folders that a user needs to use offline need to be specified. All shared folders and files are not automatically available offline. Once specified, the most recent copies of the file are copied from the network share when the user logs off and synchronized when the user logs back on.Windows 2000 Help, Search for the articles entitled: Offline Files overview; To make a file or folder available offline; and Offline Files for mobile users.


70. Sleep deprivation can become a way of life, especially in the IT field. You've been up so long that the same people who clocked in with you yesterday are clocking in again. You've been up all night with a server problem. Aren't the lights on the hubs flashing in an interesting pattern?Just as you start to break the ends off of toothpicks to use as props to keep your eyes open, one of the early birds approaches you and says they are having trouble accessing a share on the server you were working on last night. You know you messed around with the permissions and figure you might have set them wrong. You can't remember your own name at the moment much less the file system path to the share, what is a quick and easy way to find it?

A. Use Share Manager in the Computer Management console.
B. Use My Network Places, enable the Display File System Path option.
C. Use Share Manager in the Accessories, System Tools folder on the Start menu.
D. Use System Tools in the Computer Management console.

>> !
Answer: D

The file system path for a share can be located by going to Start => Programs => Administrative Tools => Computer Management. In the Computer Management console, expand Shared Folders and select Shares. The right pane will display a list of all shares with their associated file system paths.Windows 2000 Help, Search for the article entitled: To manage properties of a shared folder.


71. You are sitting next to a Microsoft employee on the bus going from your hotel to the convention. You usually try to avoid eye contact with anyone wearing a Microsoft golf shirt until you determine if they're marketing or tech. The guy strikes up a conversation with you about Windows 2000 and mentions that he hasn't rebooted his laptop in months. You laugh and assume he's another marketing guy making claims that can't be backed up. He goes on to explain a new feature in Windows 2000 that actually saves the contents of memory to the hard drive before the computer powers off. Then, when the system is turned back on, the system returns to the exact state it was in before you powered down."Wow," you actually hear yourself say out loud. Later that evening when you got back to the hotel, you configure your system to use the feature. Now, it has been a good month or so since you powered down your system as well. The best part is that it really saves on battery life because it makes the power down and power up events much faster. You have even managed to configure your computer to do this when you pressed the power switch. How did you do this?

A. You configured the Standby option.
B. You configured the Power Down option.
C. You configured the Hibernation option.
D. You dreamed it all up, even Microsoft can't come up with something this cool.

>> !
Answer: C

Hibernation is enabled on the Hibernation tab from Power Options in Control Panel. Hibernation saves the user's current working environment (the entire contents of RAM) to the hard disk and then powers down the computer. When the user powers the system back up, their session is restored including any open windows, documents, etD. just as they left it when they selected to hibernate the system.It is much faster to place a system into hibernation between uses then it is to fully shut down a system and boot it back up. The options a user has for hibernation mode will depend on what the system supports. One option that might be available on the user's system is to enter hibernation when the power button is pressed. Another option is to enter hibernation when a laptop's lid is closed.Windows 2000 Help, Search for the articles entitled: To manually put your computer into hibernation; To automatically put your computer into hibernation; and Managing power on a portable computer.


72. Carl the caveman recently decided to join the modern era and installed Windows 2000 Professional. Today, he poked his head out of his cave just long enough to install a sound card. When he rebooted his system, it would not load Windows. By the time you found him, the computer had already received a few whacks with his club. You say, "Club bad, safe mode good," and show him how to boot into safe mode. What now?

A. Open the case and remove the sound card.
B. At the command prompt type Disable Sound.
C. Enable Driver Signing.
D. Use Computer Management to disable the sound card driver.
E. Let Carl give it another whack for good measure.

>> !
Answer: D

The only obvious change that you have made to your system is the sound card driver that was added. It is logical to assume that it is the problem since the computer hasn't booted properly since that driver was installed. Because the system will boot into Windows 2000 Safe Mode, you can use the GUI tools provided by Windows to disable the driver. Safe Mode is a Windows 2000 boot mode that disables all but the most necessary devices and services needed to start the computer in order to perform troubleshooting.From Start => Programs => Administrative Tools select Computer Management. Under the System Tools menu, select Device Manager. Expand Sound, video and game controllers and right click the device. From the context menu that appears select either Disable or Uninstall.Windows 2000 Help, Search for the articles entitled: Computer Management overview; and Device Manager overview.


73. Some bonehead installed an application that uses detailed logging to the system partition of your main Windows 2000 server. The hard drive in the system has two partitions, and the second partition is mostly empty. You cannot afford the down time necessary to move the application, and the application itself does not allow you to change the path it logs to. Currently it logs to C:\logs. What can you do to resolve this issue?

A. You can add another hard disk, create a partition on it, format the partition, and mount it as F:. Then, create a logs folder on drive F: and place a shortcut to it on C:\.
B. You can delete everything from the C:\logs folder, then add another hard disk, create a partition on it, format the partition, and mount it as a subfolder of the C:\logs folder.
C. You can add another hard disk, create a partition on it, format the partition, and mount it as the C:\logs folder.
D. You can delete everything from the C:\logs folder, then add another hard disk, create a partition on it, format the partition, and mount it as the C:\logs folder.

>> !
Answer: D

Windows 2000 supports mounting partitions to empty folders on other disk drives. The empty folder is called a mount point. For instance, two empty folders can be created on Disk 0. Partitions can be created on Disks 1 and 2. Rather than, or in addition to, being assigned drive letters each of these partitions can be mounted in one of the empty folders. When a user accesses the folder, they are actually being redirected to the partition it points to without knowing it. Disks configured this way are assigned drive paths instead of drive letters. Disks that are configured using drive paths can also be assigned a drive letter. In such cases, the disks are accessible from both the folder they are mounted in, and by accessing a drive letter in explorer.In this case, you would use the C:\logs folder as the mount point. Remember that the mount point must be an empty folder, which is why all log files must be deleted out of it first.Windows 2000 Help, Search for the articles entitled: Using NTFS mounted drives.


74. Who would have thought it? You would have never guessed that there would be such a huge market for plastic toilets that dispensed corny advice when you pulled the handle. Your company has experienced rapid growth recently and has decided to add all new computers to a new, second, subnet. You are installing Windows 2000 on the first computer on that subnet. During the installation, you accept all defaults.All network services, including DHCP, DNS, WINS, and Active Directory are located on the other subnet. When your new computer reboots after installation, you learn that you cannot access the network. You run IPCONFIG and learn that your IP address is 169.254.12.165 with a subnet mask of 255.255.0.0 and no default gateway. You double check the scope that you configured on the DHCP server for this subnet and see that it is configured correctly and activated. What two things can you do that would ensure that this new computer could gain access to network resources? (Choose two)

A. Have all routers be configured to route BOOTP broadcast frames.
B. Have all routers be configured to route broadcast frames sent to Port 2231.
C. Install a computer with a DHCP Relay Agent on the older segment.
D. Install a computer with a DHCP Relay Agent on the new segment.

>> !
Answer: A & D

DHCP clients obtain their address leases by using broadcasts. Because broadcasts often cannot pass over routers, they usually are not able to travel from one network segment to another. A DHCP client cannot obtain an address lease from a DHCP server that is on another network segment unless the routers support DHCP or BOOTP broadcasts or a DHCP relay agent is installed on the client's subnet. DHCP relay agents are configured with the address of a DHCP server. When they detect a client on their network segment that is attempting to obtain a DHCP address lease, they contact the DHCP server on behalf of the client to obtain addressing information. Once the addressing information has been obtained from the DHCP server, it is passed along to the client. The DHCP relay agent must be located on the same network as the client in order for it to hear and respond to DHCP client requests. It is not necessary to have a relay agent on the same network segment as a DHCP server.Windows 2000 Help, Search for the article entitled: DHCP Relay Agent; Supporting BOOTP clients; Understanding relay agents; and BOOTP and DHCP.


75. You had a job in college as a janitor for the NSA so your company assumed that makes you qualified for the new security administrator position. Somehow you just don't feel that the three months of training you went though, five years ago, on inspecting toilet paper for written notes that might be classified information has prepared you for the job.Nonetheless, here you are and you need to add a custom registry entry to a Group Policy Object (GPO) for security purposes. Needless to say, you want to expend as little effort as possible doing it. What will you do?

A. Make and add an .adm template to the GPO.
B. Make and add a .wmt file to the GPO.
C. Make and add a .wmi file to the GPO.
D. Make and add an .adt file to the GPO.

>> !
Answer: A

In group policy, Administrative Templates contain registry-based policy information for users and computers. This includes Group Policy settings for the operating system, but also for other programs as well.The steps to use group policy to apply registry information to users are very simple. First, establish a Group Policy Object (GPO) to hold the settings. Next, associate that GPO with the level of active directory that holds the accounts you want affected. To apply the settings to everyone in an OU, assign the GPO at the OU level. To apply the settings to everyone at a site, assign the GPO at the site level. To apply the GPO to everyone in the domain, assign the GPO at the domain level. Once you have the GPO in place, you need to create the Administrative Template (.adm) file and add it to the GPO.Windows 2000 Help, Search for the articles entitled: Administrative Templates; Advanced topic: Creating custom .adm files; The role of Administrative Templates; and To add or remove an Administrative Template (.adm file).


76. Just once you'd like to sit in on a corporate board meeting. You would love to hear exactly how they rationalize never upgrading any equipment or software while giving themselves huge bonuses. On second thought, maybe you picked the wrong career path. The board of directors has a pretty good gig working for themselves. Your company wants to use Windows 2000 Terminal Services to make an application available to users at Windows 3.11, 95, 98, NT and 2000 computers. The IS staff needs to be able to take control of, and/or view users sessions in order to support the application. How will you enable this?

A. At the Terminal Server, you will grant the IS group the Interact with users remote desktop right in the Remote Desktop Protocol (RDP) settings.
B. At the Terminal Server, you will grant the IS group Full Control permission to the Remote Desktop Protocol (RDP).
C. You will install Citrix MetaFrame 1.8 and use the shadowing feature.
D. This cannot be done using Terminal Services. You must install Systems Management Server (SMS) to enable this level of support functionality.

>> !
Answer: B

A person attempting to remotely view or control a user's session must have the permissions to do so. This can be accomplished by giving the user or a group that they belong to Full Control or the Remote Control special access permission in the settings of an RDP connection object. It is usually best not to give someone Full Control because it will enable them to act as an administrator for all terminal services users that are using the RDP connection object. In this case, however, it is the only answer option that will work.In addition to having the required permissions, the user account of the person to be remote controlled must be configured to allow remote control. This is typically set on a user by user basis, however it can be overridden at the connection level for all users if desired. If overridden at the connection level, all users that connect to a given RDP connection object will have the same remote control settings.Windows 2000 Help, Search for the articles entitled: Managing permissions on connections; Full control; and Terminal Services Configuration overview.


77. One administrator, 250 locations. Well, not quite but that's what it feels like sometimes. Because of the workload, you frequently have to delegate some of your responsibilities to users at offices that are too far away to travel to regularly. One such user is at an office that connects to the Internet by using Internet Connection Sharing. The former "network helper" at that location was just transferred and this new guy volunteered for the task. The first task you assign him is to run Windows Update for the local file server. He does as instructed but receives a message stating that access was denied. What will you tell him to do so that he can successfully run Windows Update?

A. You will tell him to log on using your administrator account.
B. You will have him configure Internet Connection Sharing to allow the LDAP protocol.
C. You will grant him local administrative privileges on the server.
D. You will configure the server to allow the user to log on locally.

>> !
Answer: C

When Windows Update is run, it contacts Microsoft over the Internet and allows an administrator to download the latests help files, drivers, system files, and patches for their Windows 2000 based computer. The local system can be scanned for outdated files and updated using the Product Updates section of the Windows Update feature. You must be logged on as a user with administrative authority for the system in order to run Windows Update.Windows 2000 Help, Search for the articles entitled: To update your system files using Windows Update; Downloads and the latest Help files; and Using Windows Update.


78. One day they'll have DSL available locally or maybe you'll get rich enough to afford your own T-1. Until then you decide to add a second modem to your system. Your old modem is an ISA modem. It does not have Plug and Play (PnP) technology built into it. Your new modem, however, is a PCI based PnP modem. When you restart the computer the modems do not work properly. You look in Device Manager and see that they are both trying to use IRQ 5. What can you do to fix this problem?

A. Configure the computer's BIOS (also known as CMOS) to reserve IRQ 11 for devices that do not use Plug and Play.
B. Change the IRQ for the older modem to 11 using Device Manager.
C. Configure the computer's BIOS (also known as CMOS) to reserve IRQ 5 for devices that do not use Plug and Play.
D. Change the IRQ for the new modem to 11 using Device Manager.

>> !
Answer: C

By default Windows 2000 attempts to detect Plug and Play devices that are in the computer. If a device uses ISA technology it is unlikely that it is a Plug and Play device. Windows 2000 will most likely not detect a non-Plug and Play device. If Windows 2000 does not detect the device, it may very well consider any resources that it is using to be available for use by another device.In this case, you are installing another device that is Plug and Play compatible. The device is being installed using system resources that conflict with the non-Plug and Play device because Windows 2000 does not realize that the resources are already in use. The solution to this problem is to make the resources in use by the non-Plug and Play card unavailable for Plug and Play configuration in the system's BIOS (also called CMOS). This will force Windows 2000 to consider the resources as unavailable for Plug and Play configuration. Windows 2000 Help, Search for the articles entitled: To install a non-Plug and Play device; Taking an optional device inventory; Hardware overview; To install a device; and Plug and Play overview.


79. You can't count how many times you've walked through a company and thought, these folks have no idea what they are in for. You are a technology assessment specialist for a consulting company that specializes in buyouts. Nothing pleases you more than a job well done where thousands of people get fired in the name of "synergy". In fact you love the word. You love every form of the word, especially "synergistic".The nature of your work requires you to access systems in a number of different offices. You do not carry a laptop, instead you log on to available systems wherever you can find them. Because of this you need access to your files from any location. You are also frequently required to store very sensitive information in your folders and need to protect the information from prying eyes. What will you do?

A. You will configure your account with a roaming profile and run secpol.exe to enable the maximum amount of security for your account.
B. You will configure your account with a roaming profile and make sure you use a password that is eight characters or longer.
C. You will configure your account to have a roaming profile and enable the encryption attribute for your folders.
D. You will configure your account to have a roaming profile and use PGP to encrypt the information in your folders.

>> !
Answer: C

Encrypting File System (EFS) is new in Windows 2000. It is used to encrypt files and folders that are stored on NTFS volumes, either locally or on Windows 2000 servers. EFS is designed to protect sensitive data from unauthorized access. Even if someone is given access permissions to an encrypted file, they cannot view it unless the correct decryption key is associated with their user account. Each file is encrypted not only with the key of the user, but also with the key of a recovery agent. Because of this, the person who is designated as the recovery agent can logon, decrypt the file and turn it over to another user in unencrypted form.Windows 2000 Help, Search for the articles entitled: File encryption overview; and Data encryption and decryption.


80. You have spent the day pulling your hair out while trying to make one of your existing Windows 2000 servers into a print server. You installed a second printer on LPT2 but now cannot print to the device. It worked fine earlier. LPT2 is not a Plug and Play port. The only change you made was installing a second network adapter in the system. You view device manager and see that the new network adapter is using IRQ5 and is conflicting with another device. What do you need to do to fix this?

A. At the server, you need to edit the BIOS (also known as CMOS) settings and reserve IRQ10 for non Plug and Play devices.
B. At the server, use Device Manager to change the resource allocation of LPT2 to IRQ1.
C. At the server, use Device Manager to change the resource allocation of the second network adapter to IRQ1.
D. At the server, you need to edit the BIOS (also known as CMOS) settings and reserve IRQ5 for non Plug and Play devices.

>> !
Answer: D

By default Windows 2000 attempts to detect Plug and Play devices that are in the computer. If a device uses ISA technology it is unlikely that it is a Plug and Play device. Windows 2000 will most likely not detect a non-Plug and Play device. If Windows 2000 does not detect the device, it may very well consider any resources that it is using to be available for use by another device.In this case, you are installing another device that is Plug and Play compatible. The device is being installed using system resources that conflict with the non-Plug and Play device because Windows 2000 does not realize that the resources are already in use. The solution to this problem is to make the resources in use by the non-Plug and Play card unavailable for Plug and Play configuration in the system's BIOS (also called CMOS). This will force Windows 2000 to consider the resources as unavailable for Plug and Play configuration. Windows 2000 Help, Search for the articles entitled: To install a non-Plug and Play device; Taking an optional device inventory; Hardware overview; To install a device; and Plug and Play overview.


81. You would have thought you would have known better by now. The first rule of keeping a network functioning: If you've got kids who know their stuff and are willing to work cheap, don't do anything to make them mad. What do you care what the kids do in the middle of the night as long as they get their work done? Especially when you're only paying them two bucks above minimum wage. What possessed you to tell all of your overnight trolls that you wanted them to lay off shooter games during company time. You should have known kids that sharp were only working here because you have a T-3. So, here you are installing Windows 2000 onto a high-end graphics workstation instead of delegating the task. The workstation has a SCSI controller that is not on the Windows 2000 Hardware Compatibility List (HCL). You make it through the text mode portion of setup without incident and reboot. Instead of beginning the graphical portion of the setup process, you get the following error:INACCESSIBLE_BOOT_DEVICEWhat two things must you do to successfully install Windows 2000 on this computer? (Choose all that apply)

A. Begin setup again by booting from the Windows 2000 CD-ROM.
B. Boot the computer using a DOS floppy disk that contains the driver and copy the driver over to the new computer.
C. Boot the computer using a Windows 98 boot disk that contains the driver and copy the driver over to the new computer.
D. Provide a driver for the adapter from a floppy disk.

>> !
Answer: A & D

A custom SCSI driver can be installed early in the setup process by pressing F6. Watch the lower part of the screen during the early setup process. A prompt will appear asking the user to select F6. The F6 key is used to let Windows 2000 know that you wish to specify custom mass storage drivers. The F5 key can also be pressed at this point. It is used to specify a custom Hardware Abstraction Layer (HAL) from floppy.Windows 2000 Help, Search for the article entitled: To start Setup and provide a mass storage driver or a HAL file.


82. Amazing. You finally got the approval from the bean counters for some mission critical software. You're feeling so lucky you go out and buy $20 worth of Powerball tickets. When your numbers don't hit, you reluctantly go back to work. You want to deploy and update your key office productivity software package on all Windows 2000 computers the next time a user logs into the domain. How will you do this?

A. You will use a Windows Installer package for the upgrade and assign the package to a startup script.
B. You will use a Windows Installer package for the upgrade and assign the package to a local group policy on each computer in the domain.
C. You will use a Windows Installer package for the upgrade and assign the package to a local computer policy on each computer in the domain.
D. You will use a Windows Installer package for the upgrade and assign the package to a group policy that affects all users.

>> !
Answer: D

There are two different ways to make applications available to users through Group Policy, publishing and assigning. You can publish applications for users when they log on. Published applications do not appear on the start menu. They appear in Add/Remove Programs in Control Panel and can be installed by users from there. In addition, document invocation can also be used to install and launch the program. For instance, if a user clicks on a .GIF file, and a program has been published that will display the .GIF file type, the program will be installed and then launched with the .GIF file displayed.Assigned applications can have an icon for them placed in the Start menu. The actual programs that are associated with the icons are not installed until the first time a user double clicks them. In addition, document invocation will work for assigned applications just as it did for published applications.In addition to assigning applications for users, you can also assign applications to computers. When you do, the computer will automatically install the software (usually at the next boot up) and make it available for the users who are authorized to use it on the computer.
Software that has been deployed by being published or assigned can be upgraded by using group policy. By assigning a new version of the program to users as an update, you can specify whether the upgrade is required or not. If you specify that it is required, the program will be automatically updated the next time that the users logs on and attempts to use it.Windows 2000 Help, Search for the articles entitled: Software Installation; Windows Installer overview; and To upgrade applications.


83. "Cool," you exclaim as you look at the server. "This is one of those new 8 way (eight processor) models isn't it?" you ask. You've been wanting to put Windows 2000 on one of these babies and see how it performs. It turns out that the computer is so specialized that the manufacturer had to create and ship a custom Hardware Abstraction Layer (HAL) with it. How will you install Windows 2000 and ensure it is configured to use this custom HAL?

A. You will install the HAL during the text mode part of the Windows 2000 setup procedure.
B. You will use Add/Remove Hardware in Control Panel to add the HAL after installation.
C. You will install the HAL during the graphical part of the Windows 2000 setup procedure.
D. You will press F11 at the beginning of the install. You will then specify and install the HAL.
E. You will copy it over after the installation using Windows 2000 Explorer and reboot the system.
F. You will copy it over after the installation using xcopy.exe from the command prompt and reboot the system.

>> !
Answer: A

A custom HAL file can be installed early in the setup process by pressing F5. It is specified at the same point as a custom mass storage controller would be. Watch the lower part of the screen during the early setup process. A prompt will appear asking the user to select F6. The F6 key is used to let Windows 2000 know that you wish to specify custom mass storage drivers. However while this is on the screen F5 can be pressed and the user will be asked to supply a custom HAL from floppy.Windows 2000 Help, Search for the article entitled: To start Setup and provide a mass storage driver or a HAL file.


84. The CEO, after receiving a warning from the legal department about a pending EEO complaint, stuck his head in Human Resources and shouted, "We need more people here with nose rings and tattoos on their faces." Much to your good fortune you had walked in the door and started filling out an application just moments before. The HR drone interviewing you looks at the stud in your left nostril and tattoo of a flying dragon on your left cheek and asks, "When can you start?"The company didn't really care what your skills were when they hired you because of your appearance, however it has turned out that you are a pretty darn good security consultant. Recently you applied the highly secure domain controller template to the main TBT Active Directory server, TBTDC1. At the time, that seemed fine. You also renamed the server to WARGODS. That seemed less fine, but people were too fascinated by your latest nose ring to remember to bring it up when you were around. TBT has two domains, one runs Windows 2000 and the other runs Windows NT. Ever since you applied that security template users in the Windows NT network haven't been able to access resources on WARGODS. What do you need to do to fix the situation?

A. On the WARGODS server, apply a less restrictive security template.
B. On the WARGODS server, apply a less restrictive Security Policy Object (SPO).
C. Verify the trusts between the two domains by using Active Directory Domains and Trusts.
D. Verify the trusts between the two domains by using trstver.exe at the command prompt.

>> !
Answer: A

Security templates are provided by Microsoft to assist administrators in applying the level of security they desire to the Windows 2000 computer they are responsible for. The templates can be applied as is, or modified by an administrator before being applied.One such template is Hisecdc.inf. It is one of the most secure templates provided by Microsoft. The highly secure template for domain controllers is set to require maximum network protection for traffic between computers running Windows 2000. Domain controllers configured with the highly secure template can only communicate with other Windows 2000 computers. They are not able to communicate with computers running Windows 95, 98 or Windows NT.Windows 2000 Help, Search for the article entitled: Predefined security templates.


85. On days like this, you earn your impressive salary. You stroll into the server room and see your entire staff staring at monitors and scratching their heads. You are running a mixed network. All of your servers are Windows 2000 based, but only half of your client systems are. The other half of your clients are Windows NT 4.0 Workstation based.Your Windows NT client systems are having problems connecting to TBTSRV1, a Windows 2000 based file server. All clients on the network are configured to use TBTWINSDNS, a Windows 2000 server that doubles as both a WINS and a DNS server. TBTSRV1 uses statically assigned addressing. You examine the TCP/IP property settings and discover that TBTSRV1 is configured to dynamically register with the DNS server and that it also is configured to use the DNS server for name resolution. Its IP address, Subnet Mask, and Default Gateway settings all appear correct. On the WINS tab, you note that NetBIOS over TCP/IP is disabled. What do you tell your baffled staff they need to do to resolve this communication problem?

A. On the WINS tab, select the NetBIOS setting from the DHCP server radio button. In the WINS addresses section, add the address of the WINS server in use by clients on the network.
B. On the WINS tab, select the NetBIOS setting from the DHCP server radio button.
C. On the WINS tab, select the Enable NetBIOS over TCP/IP radio button. In the WINS addresses section, add the address of the WINS server in use by clients on the network.
D. Add a LMHOSTS file to the server that has the address of the WINS server in it. On the WINS tab, select to Enable LMHOSTS lookup.

>> !
Answer: C

Windows 2000 uses DNS as its default name resolution protocol. Windows NT, however, uses WINS. Both DNS and WINS are technologies that help computers translate user friendly computer names into IP addresses. Because the Windows 2000 server is not configured as a WINS client, it is not registered with the WINS server. Windows NT clients will not be able to find a server that is not located on the same subnet as the client if it is not registered in WINS or listed in their local LMHOSTS file. No mention is made here of clients having a local LMHOSTS file. In addition to registering with a WINS server, Microsoft warns that Windows 2000 based computers may not be able to communicate successfully with non-Windows 2000 based computers if NetBIOS over TCP/IP is not enabled.Windows 2000 Help, Search for the articles entitled: To configure TCP/IP to use WINS; Advanced configuration.


86. Let's face it, in life you have winners and losers. Well, your network has a segment for each. Each segment has a number of clients and servers located on it, including an Active Directory server, a DNS server, and a DHCP server. Clients normally obtain addressing information from their local DHCP server. You want to enable users to be able to obtain addressing information from either DHCP server. The router is not RFC1542 compliant. How can you accomplish this?

A. Configure a server on each subnet to act as a DHCP Relay Agent. Point the Relay Agent to the DHCP server on the same subnet.
B. Configure each DHCP server to use conjunctive scopes. Configure each with the other DHCP server as its partner.
C. Configure a server on each subnet to act as a DHCP Relay Agent. Point the Relay Agent to the DHCP server on the other subnet.
D. Configure each DHCP server to use shared scopes. Configure each with the other DHCP server as its partner.

>> !
Answer: C

DHCP clients obtain their address leases by using broadcasts. Because broadcasts often cannot pass over routers, they usually are not able to travel from one network segment to another. A DHCP client cannot obtain an address lease from a DHCP server that is on another network segment unless the routers support DHCP or BOOTP broadcasts or a DHCP relay agent is installed on the client's subnet. DHCP relay agents are configured with the address of a DHCP server. When they detect a client on their network segment that is attempting to obtain a DHCP address lease, they contact the DHCP server on behalf of the client to obtain addressing information. Once the addressing information has been obtained from the DHCP server, it is passed along to the client. The DHCP relay agent must be located on the same network as the client in order for it to hear and respond to DHCP client requests. It is not necessary to have a relay agent on the same network segment as a DHCP server.Windows 2000 Help, Search for the articles entitled: DHCP Relay Agent; Supporting BOOTP clients; Understanding relay agents; and BOOTP and DHCP.


87. You have just switched jobs and joined a new company. After a week of prodding and probing in the server room you discover that users on your new network cannot browse network resources on segments other than their own. Apparently the last network administrator told the users that it was not possible to configure the network to allow them to access other segments. And, they bought it without a whimper! If these users are that passive, you figure you've got a job for life.You check the network and determine that each segment has its own WINS server and that clients are configured to use the WINS server on their local segment. The WINS servers seem to be functioning properly. What can you do to ensure that clients can browse resources on any network segment?

A. Implement LMHOSTS files on all clients.
B. Implement LMHOSTS files on all clients and servers.
C. Configure all WINS clients to use a singe WINS server.
D. Set up the WINS servers to replicate their databases to each other by configuring them as replication partners of each other.

>> !
Answer: D

On a local subnet, name resolution can be accomplished with broadcasts. Name resolution across subnets and network browsing across subnets relies on non-broadcast methods of name resolution. The two dominant forms of non-broadcast name resolution on Windows networks are LMHOSTS files and WINS.A WINS server maintains a dynamic database that maps IP addresses to NetBIOS names. When a client boots up on a WINS network, it registers its NetBIOS names and IP address with the WINS server. In order to do this, it needs to have been configured with the IP address of at least one WINS server. A computer will only register with one WINS server. Two or more WINS servers can be configured for the client to use, but they will only be tried if the first WINS server cannot be found.Once they have registered, WINS clients can look up other computers and the resources they have available in WINS. They can also use WINS to resolve NetBIOS names into IP addresses. For example, if a WINS client is trying to communicate with a server named server1, it can look up the IP address of server1 in the WINS database. Once the WINS client has the IP address it can begin direct communication with server1.WINS servers can be configured to replicate their databases. In essence this takes two or more individual WINS databases and ensures that each database contains the information in all of the databases. Because clients only use one WINS server (unless that server becomes unavailable), they only have access to the records in that server. Database replication ensures that each of the WINS servers has all of the records in it that a client may need.Windows 2000 Help, Search for the article entitled: Configuring WINS replication.


88. You are on the first vacation you have taken in three years. As you gently sip your margarita and watch your family frolic in the pool, you are jolted back to reality when your pager goes off. It seems that the WINS server back in your office has failed and disrupted most network communication. For a moment you think to yourself "How unfortunate that the pager accidentally fell into the pool earlier in the week". But, alas, responsibility takes hold and you drive into the office.When you arrive you are greeted like a returning war hero. The office is in total chaos and you are their only hope. Hum, might be a good day to ask for that salary increase.
You decide to wait and see if you can actually fix the problem first before asking for more money. You quickly realize that the WINS server has suffered severe hardware failure that appears to have damaged the system board, disk drives, and network adapter. You replace the defective components and restore the server and WINS database from last week's backup. With visions of the pool, your family, and a few more dollars in your pay envelope you head for the door when a user stops to tell you that she cannot browse any segment on the network except for hers. You check around and determine that other users are having the same problem. What else needs to be done so that you can get back to your vacation?

A. Call tech support and ask where the "any key" is.
B. Stop and restart the WINS service on the server.
C. At the command prompt, run the NBTSTAT -RR command on the clients.
D. Initiate the Verify Database Consistency command in WINS on the server.

>> !
Answer: C

WINS records expire. A database that is one week old will be just beyond the default expiration period for records. It is very likely that there are not many records left in the WINS database that are still valid. Because of this, the best course of action to take is to manually force the clients to release and refresh their WINS records. This is accomplished by using the nbtstat.exE.RR command.Verify database consistency is disabled by default in WINS. It is only used when there is more than one WINS server on the network and the WINS servers are configured as replication partners. It is designed to ensure that records that have been replicated from foreign WINS servers to the local database are still valid. When it is enabled up to 30,000 records in the WINS server's local database are checked each day against copies of the records stored at the WINS server listed as the owner for each record. It is not relevant here because there is only one WINS server on the network.Windows 2000 Help, Search for the article entitled: To enable periodic consistency checking of the WINS databaseFor a listing of nbtstat.exe commands, go to the command prompt and type nbtstat.5


89. Your staff keeps getting younger as you age exponentially. Most of them think "DOS" is Spanish for "Two" and Novell is a French romance novel. Your network consists of a single network segment with a connection to the Internet. The network is mixed and includes Windows 2000 and NT 4.0 clients. All clients are members of a single domain. The network consists of both NetWare and Windows 2000 servers.You do not have many NetWare servers left. To make it easier for the children you have to baby-sit, you have decided to uninstall the NetWare redirector from the client systems. To provide access to the remaining NetWare based resources, you have installed a Windows 2000 server with two network adapters and Gateway Service for NetWare (GSNW) installed. You want one adapter in the machine to only be used in communication between Microsoft Windows based clients and the server. You open up the Local Area Connection Properties dialog box. Which options should you enable on the adapter? (Choose all that apply)

A. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.
B. Client for Microsoft Networks.
C. File and Printer Sharing for Microsoft Networks.
D. NWLink NetBIOS.
E. Network Monitor Driver.
F. Internet Protocol (TCP/IP).

>> !
Answer: B, C & F

The three components which are required in order for a Windows 2000 computer to share and access information on a Windows 2000 network are a common protocol, the server service and a Microsoft redirector. In Windows 2000 the default protocol is TCP/IP, the server service is installed as File and Printer Sharing for Microsoft Networks, and the redirector that is used to access Microsoft servers is called Client for Microsoft Networks.Windows 2000 Help, Search for the articles entitled: Client for Microsoft Networks; File and Printer Sharing for Microsoft Networks; and Configuring a network or dial-up connection.


90. Human Resources couldn't understand why you were upset. HR thought a 3% cost of living adjustment was more than fair, most departments only received a 2% raise this year. You begged. You pleaded. You even tried to explain to them how competitive the local job market was and that you really didn't want to rebuild the company's IT staff from scratch, again. "Don't worry," the ever perky Cristine in HR said. "We have a Job Fair scheduled next month. I'm sure there will be tons of people there who will find our starting salary and benefit package very interesting." Interesting wasn't the right word. Laughable, ridiculous, insanely low all come to mind. So, you're sitting at a Job Fair talking to the only two people within a five state radius who didn't walk away from your table doubled over laughing. You have to hire one of them so you decide to give them a problem to solve. To your great surprise, the one with railroad spikes in his blue hair got it right.
Your network consists of several domains, all in the same forest. The forest has three trees: na.thebestests1.comasia, thebestests2.comeurope, thebestests3.com. Beneath each of these is a standardized administrative domain structure that includes domains for Sales, Engineering, and Accounting. The Engineering domain in each tree has additional child domains called Development and IT. You are working on applying a service pack to some software used by the IT staffs in the na.thebestests1.com and europe.thebestests3.com trees. You plan on using a group policy to deploy and maintain the service pack. You have configured a Windows Installer package for the service pack. You don't want to deal with a lot of cross-domain traffic during the deployment. What do you need to do to configure the group policy?

A. Add the Windows Installer package to a group policy and apply the group policy to the engineering.na.thebestests1.com and engineering.europe.thebestests3.com domains.
B. Add the Windows Installer package to a group policy and apply the group policy to the it.engineering.na.thebestests1.com and it.engineering.europe.thebestests3.com domains.
C. Add the Windows Installer package to a group policy and apply the group policy to the na.thebestests1.com and europe.thebestests3.com domains.
D. Add the Windows Installer package to a group policy and apply the group policy to the sites that house the it.engineering.na.thebestests1.com and it.engineering.europe.thebestests3.com domains.

>> !
Answer: B

Service packs and other applications can be made available for automatic installation over the network by using group policy. This typically involves using a Windows Installer package file. This file instructs Windows 2000 in how to properly download and install the application. Every Windows 2000 computer has a service called Windows Installer. Software installations with group policy often involve the use of the Windows Installer service on the local computer. An application installed using a Windows Installer package can query it to determine whether an installed application has missing or corrupt files. If that turns out to be the case, Windows Installer will repair the application by replacing the files that are missing or corrupt. Group policies are stored and replicated at the domain level. You can link from one domain to a policy in another domain, however it will cause cross domain traffic. Because of this it is best to create two separate but identical group policies in each of the two domains, and then link each policy directly to its domain. Windows 2000 Help, Search for the articles entitled: Software Installation; Windows Installer overview; and Best PracticesThere is more than one Best Practices article in Windows 2000 Help. This file is located under Group Policy.


91. Bless all of the software and hardware companies. If not for these wonderful folks with their never ending stream of "improvements", and all of the new problems they create, you'd probably have to go find real work. Every couple of years they come out with all new stuff and you end up trashing the hardware and software that 3 years earlier was state of the art. Talk about job security. The only downside is that sometimes they actually expect you to make the software work with the hardware you already have. This was one of those occasions. You are using group policy to configure a mixed Windows NT and 2000 network. The domain runs in native mode. All computers have been placed in the Computers organizational unit (OU), and all users have been placed in the CorpUsers OU. You have applied a Group Policy Object (GPO) to the CorpUsers OU that restricts a number of environmental options such as their ability to change their wallpaper. You have also removed My Computer from the desktop and given them custom start menus. These settings were applied fine on the Windows 2000 clients, but have not worked at all on the Windows NT computers. You want the settings to apply to the Windows NT systems as well. What will you do?

A. You will use the group policy snap-in to enable the Windows NT extensions for group policy.
B. You will use the group policy snap-in to extend the group policy extensions to support Windows NT.
C. You will create a Windows NT policy file and configure it to include the restrictions. You will then place the file in the NetLogon share of the PDC emulator (Winnt\Sysvol\Sysvol).
D. You will create a Windows NT policy file and configure it to include the restrictions. You will then place the file in the NetLogon share of the PDC emulator (Winnt\Sysvol\Sysvol\thebestests.com\Scripts).

>> !
Answer: D

In Windows 2000, user restrictions are typically accomplished by using Group Policy. Windows NT uses a different technology known as system policies to lock down what a user can and cannot do. Because users of Windows 2000 systems are having the restrictions successfully applied to them, it is reasonable to assume that group policy is functioning properly. People that use the Windows NT computers will not have group policy applied to them. They will require a system policy file. System policy files should be saved in the NetLogon share of the PDC emulator. NetLogon is the share name for the Winnt\Sysvol\Sysvol\thebestests.com\Scripts folder.Windows 2000 Help, Search for the articles entitled: Group Policy overview; System Policy and System Policy Editor; To create a new policy for a domain; and The role of System Policy Editor.


92. "BECAUSE WE'RE SPECIAL!" the CEO yells at the top of his lungs as he pounds on the desk. You take a step back because you're sure the vein in his head is going to pop and you really do not want to get a stain on your favorite Grateful Dead T-shirt. "Yes sir," you say as you continue backing out of the room. Note to self: never ask the CEO why he needs a high priority printer for the managers again.You configure the high priority printer, add the Managers group to it, and give them access to print. You don't want anyone besides the Managers, Print Operators, Server Operators and Administrators to be able to print to the printer. You look at the ACL and it includes the above groups, as well as the Everyone and CREATOR OWNER groups. What two things can you do to ensure that only the Managers, Print Operators, Server Operators, and Administrators groups can print? (Choose all that apply)

A. You can delete the Everyone group from the ACL.
B. You can select the Deny print permission for the Everyone group.
C. You can delete the CREATOR OWNER group.
D. For the CREATOR OWNER group entry in the ACL, you can clear all the permissions checkboxes.
E. For the Everyone group entry in the ACL, you can clear all the permissions checkboxes.
F. You can select the Deny print permission for the CREATOR OWNER group.

>> !
Answer: A & E

By default, members of the Everyone group have permission to print to any printer that is shared from a Windows 2000 computer. In order to ensure that only specific groups or users are allowed to print to a shared Windows 2000 printer one of two actions must be taken. One option is to remove the Everyone group from the Access Control List (ACL) for the printer. A second option is to allow the group to remain in the ACL, but to remove all permissions that have been assigned to them.Windows 2000 Help, Search for the article entitled: Assigning printer permissions.


93. Anyone who thinks change is good has never been a network administrator. Just when you think you might get home in time to finally see one of your kid's soccer games, your ISP brings a new router online. Hoping against hope you pray that all you will have to do is reconfigure your DHCP scope options to reflect the new router address. You try it, then hold your breath. Within minutes, your phone starts ringing. The guys in sales can't access the net. Checking your watch, you see that it's 3:30 p.m. and you are a bit surprised there is still anyone in the sales department this late. After a bit of investigation you discover that anyone with a reserved address is a having the same problem. All of the client machines are running Windows 2000 Professional. You had configured your network to run DHCP to automate the TCP/IP function and you configured your DNS server information at the scope level. That has all gone into the toilet. What two things do you need to do to fix this problem? (Choose all that apply)

A. Run IPCONFIG /RELEASE from each client.
B. Run IPCONFIG /RENEW from each client.
C. Create a global level DHCP option that includes the new router address.
D. For each address reservation, configure the options to include the updated router information.

>> !
Answer: B & D

Address reservations can have specific options that apply to them. If these client level options are in use, they must be changed. Options assigned at the client reservation level override options assigned at the scope level.By default clients will seek to refresh their lease automatically at 50% of the address lease time. To make changes that are made to the lease effective immediately, you must use the ipconfig.exe /renew command. The /renew switch forces the clients to renew their lease. This renewal process will also update the client with any changes made to their address lease, including changes in configured options such as their default router.Windows 2000 Help, Search for the articles entitled: Using client reservations; and To verify, release, or renew a client address lease.


94. Jeff, who uses a Windows 2000 Professional laptop, speaks both English (United States) and Italian (Italy). Jeff requires his Windows 2000 Professional laptop to give him the ability create documents in either language. The Windows 2000 Professional laptop has English as the default language. What configuration is not required to allow Jeff to create documents in Italian?

A. The language/character set for Italian must be installed/added to the Windows 2000 Professional laptop.
B. The keyboard layout for the Italian must be added as an input language.
C. English must be removed in order to support the Italian language.
D. Jeff has to enable a "hot key" switch to change from the English keyboard layout to the Italian keyboard layout.

>> !
Answer: C

Windows 2000 Professional provides the ability to install and support multiple languages simultaneously (both for display of inbound communication and the creation of content).


95. Mary, a user, calls the company Help Desk to ask for instructions on configuring the multi-monitor support for Windows 2000 Professional. After asking some basic questions of the make and model of the machine, you determine that Mary has one AGP Video Adapter and one ISA Video Adapter. What instruction set would you give to Mary to allow her to use multi-monitor?

A. Replace the AGP Video Adapter with another ISA Video Adapter, then use Control Panel to complete the configuration.
B. Replace the ISA Video Adapter with a PCI Video adapter, then use Control Panel to complete the configuration.
C. Inform Mary she cannot use multi-monitor capabilities, and then abandon any further effort.
D. Inform Mary she must replace the AGP Video Adapter and ISA Video Adapter with two PCI devices in order to use multi-monitor capabilities.

>> !
Answer: B

Multi-monitor supports only AGP and PCI slot video cards. Although answer "Inform Mary she must replace the AGP Video Adapter and ISA Video Adapter with two PCI devices in order to use multi-monitor capabilities" would also work to provide multi-monitor support, it is unduly expensive; moreover it implies that AGP video cards do not support multi-monitor.


96. You are attempting to use Microsoft's Remote Installation Services to deploy 1,000 Windows 2000 Professional clients. Prior to conducting the massive rollout of these clients to your company, you have setup a test lab to deploy Windows 2000 Professional to the three hardware platforms your company supports on the desktop. You have already set up and configured the necessary supporting services for Remote Installation Services. In addition, you have created the necessary Windows 2000 Professional-based client disk images, formatted the image volume with NTFS, and shared the image volume. Upon conducting your tests, you observe that two of your three hardware platforms are able to connect to the Remote Installation Services Server and install the correct Windows 2000 Professional image. The last of the hardware platforms, a clone, is unable to connect to the Remote Installation Services server. What factor(s) is mostly likely causing the problem?

A. The Network Adapter installed in the clone does not meet the Net PC specification or have PXE ROM enabled.
B. The clone machine does not have the minimum free space required of 685MB to support the installation of Windows 2000 Professional.
C. The System Preparation Tool (sysprep.exe) was run without the -pnp switch.
D. The Windows 2000 Professional candidate platform is unable is unable to resolve the name for the Remote Installation Services Server in the WINS Server, nor locate the Remote Installation Services Server in the Active Directory.

>> !
Answer: A

There are three types of configurations with which the deployment of Windows 2000 Professional will work: 1) Network Interface cards that meet the NetPC specification, 2) Network Interface cards that have PXE ROM enabled, and 3) a network startup disk that has the correct Network Adapter drivers and configuration files that will allow a connection to the RIS Server.


97. You are a Help Desk Administrator for ZILEX Company. You receive a work order to install and configure a Windows 2000 Professional desktop for a new employee. The hardware specifications are as follows: 128MB RAM PIII/500MHz processor Two FAT-formatted hard drives, each with 8GB of storage Network adapter installed that meets the Net PC specification DOS is the installed operating system A Network Administrator at ZILEX Company has setup two distribution servers, named DSTRBSRV and WIN2KSRC, where the source files for Windows 2000 Professional are available for network installations. You will need to connect to this distribution server and initiate the installation of Windows 2000 professional. Which of the following command line structures will allow you to successfully initiate the Windows 2000 Professional installation process?

A. WINNT32.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRC\i386 /u:unattend.txt
B. WINNT.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRC\i386 /u:unattend.txt
C. WINNT32.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRC\i386 /unattend:unattend.txt
D. WINNT.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRV\i386 /unattend:unattend.txt

>> !
Answer: B

WINNT32.EXE can only be used to initiate an installation of Windows 2000 Professional if a 32-bit operating system is in use (specifically, Windows 95/98, Windows NT 3.5x, and Windows NT 4.0). The "/unattend" switch can only be used with WINNT32.EXE


98. You are a Project Consultant working for ZRF Consulting Inc. You have been assigned to plan the migration efforts of a client that has a mix of different operating systems and hardware platforms. The desktop operating systems include Unix, Windows 3.x, Windows 95/98, Windows NT 3.51, and Windows NT 4.0 Workstations. You have already determined all hardware available is sufficient to install Windows 2000 Professional. You also need to ensure that the pre-installed applications will continue to operate correctly upon completion of the client upgrades. Below are listed potential migration paths for each of the aforementioned desktop operating systems. Which of the following client-upgrade paths are possible? (Choose all that apply)

A. Unix: Use either a CD-based or network-based installation using WINNT.EXE to upgrade directly to Windows 2000 Professional.
B. Windows 3.x: Use either a CD-based or network-based installation using WINNT.EXE to upgrade directly to Windows 2000 Professional.
C. Windows 95/98: Use either a CD-based or network-based installation using WINNT32.EXE to upgrade directly to Windows 2000 Professional.
D. Windows NT 3.51: Use either a CD-based or network-based installation using WINNT32.EXE to upgrade to Windows NT 4.0, then use the Windows 2000 Professional version of WINNT32.EXE to upgrade to Windows 2000 Professional.
E. Windows NT 4.0: Use either a CD based or network based installation using WINNT32.EXE to upgrade directly to Windows 2000 Professional.

>> !
Answer: C, D & E

For answer "Unix: Use either a CD-based or network-based installation using WINNT.EXE to upgrade directly to Windows 2000 Professional.," there is no migration/upgrade path from Unix to Windows 2000 Professional. You would have to reformat the machine and start over from scratch. For answer "Windows 3.x: Use either a CD-based or network-based installation using WINNT.EXE to upgrade directly to Windows 2000 Professional.," in order to migrate Windows 3.x to Windows 2000 Professional, you would need first need to upgrade the machine to Windows 95/98, then upgrade to Windows 2000 Professional. For answer "Windows NT 3.51: Use either a CD-based or network-based installation using WINNT32.EXE to upgrade to Windows NT 4.0, then use the Windows 2000 Professional version of WINNT32.EXE to upgrade to Windows 2000 Professional.," although this upgrade path is possible, you are actually able to migrate directly from Windows NT 3.51 to Windows 2000 Professional. No intermediate migration/upgrade from Windows NT 3.51 to Windows NT 4.0 is required.


99. You are planning to upgrade your Windows NT 4.0 domain environment to a Windows 2000 Server domain environment. As a result, you plan on first upgrading the Primary Domain Controllers to Windows 2000 Domain Controllers. After completing this upgrade process, you will then initiate a migration to upgrade all of the Windows NT 4.0 Backup Domain Controllers to Windows 2000 Domain Controllers. Prior to executing your Domain Controller migration strategy, you synchronize a Windows NT 4.0 Backup Domain Controller with the Primary Domain Controller and remove the Primary Domain Controller from the production network. To allow for administration of the existing network while you conduct your test, you promote the Backup Domain Controller to a Primary Domain Controller. You then run the WINNT32.EXE setup program to upgrade the Windows NT 4.0 Primary Domain Controller to a Windows 2000 Domain Controller. During the installation process, you receive an error message the reads "INACCESSIBLE_BOOT_DEVICE." What must you check in order to prevent this error from repeating as you upgrade the other Windows NT 4.0 Domain Controller machines?

A. Determine if there were any serial cables that were connected to a UPS device.
B. Determine if there are any non-Plug and Play Industry Standard Architecture devices.
C. Determine if there were changes made to the Window NT 4.0 Domain Controller Registry by the Windows 2000 setup program during the attempted upgrade.
D. Determine if the there were any virus scanners or other client software that interfered with the attempted upgrade.

>> !
Answer: B

During the upgrade process, Windows 2000 Professional attempts to take advantage of Plug and Play (automatic) configuration of all hardware on the machine. Since ISA devices are not able to report to Windows 2000 their hardware requirements (DMA, IRQ, etc.), Windows 2000 may actually assign resources required for these devices to Plug and Play devices installed in the machine. As a result, it is imperative that you reserve the hardware requirements for ISA devices in the system BIOS.


100. Listed below are a series of potential file system conversion paths. The goal is to perform a conversion from one file system to another, without losing any of the data already present on the partition to be converted. Which of the following file system conversion paths will accomplish this goal? (Choose all that apply)

A. Use "convert.exe c: /fs:ntfs" to convert from FAT to NTFS
B. Use "convert.exe c: /fs:fat32" to convert from FAT to FAT32
C. Use "convert.exe c: /fs:fat" to convert from NTFS to FAT
D. Use "convert.exe c: /fs:ntfs" to convert from FAT32 to NTFS

>> !
Answer: A & D

Remember for the exam that you cannot convert from FAT to FAT32 and you cannot convert from NTFS to FAT or FAT32. To convert a partition, you simply use the convert.exe command line utility, psecifiy the drive letter, and then specify the file system you wish to convert to by using the /fs switch. Windows 2000 can only convert to NTFS partitions.


101. What minimal pieces of information are required in order to connect a Windows 2000 Professional client to a TCP/IP based network print device? (Choose all that apply)

A. Name or IP Address of the TCP/IP based network printer
B. Port Number
C. The type of Network Interface Card/Connection the network print device is using
D. SNMP Community Name

>> !
Answer: A & B

TCP/IP-based network printers have a host IP Address and a port associated with them. You will need to use both when configuring a Windows 2000 client to use a TCP/IP-based network printer.


102. You have installed a network version of Microsoft Office installed on a Windows 2000 Application Server. The drive is formatted as NTFS. Share permissions for the folder are as follows: Administrators = Full Control Power Users = Full Control Accounting = Change Users = Read NTFS permissions for the folder are as follows: Accounting = Read & Execute Users = Read & Execute Administrators = Full Control Power Users = Read Fred = Full Control Fred proceeds to log on to the Windows 2000 Application Server and access the shared folder locally. Fred is a member of the Accounting and Users security groups. What are Fred's effective permissions to the content stored in that folder?

A. Full Control
B. Change
C. Read & Execute
D. Read

>> !
Answer: A

Because the user is authenticating locally, and not attaching to the resource across the network via the share, the user does not dynamically become part of the special Network group. This means no shared permissions are evaluated in the presented scenario. Fred dynamically becomes a member of the special Interactive group and only the NTFS permissions are evaluated to determine the level of access that Fred will receive. Fred, as a member of the Accounting and Users groups, receives Read & Execute permissions; however, because Fred is also assigned the Full Control permission directly, the group permissions add up with the Read & Execute permissions to equal Full Control.


103. You are the back up administrator for a company called XYZ Aircraft. Ralph, the primary administrator, is on vacation for the next week and has asked you to provide coverage in his absence. XYZ Aircraft uses a Windows 2000 Network comprised of two Windows 2000 Server Domain Controllers configured for a Domain called XYZAircraft.org. Ralph has ensured that you have the User Right to "Manage auditing and security" on the Windows 2000 Server Domain Controllers and for the "Users" container. Also, Ralph has enabled "Account Object Access" to include both "Audit successful attempts" and "Audit failed attempts" to the users container. Over the next week, Ralph has assigned you the responsibility to monitor the security logs for success and failures of the "Read All Properties" permission to user objects in the Active Directory database. On the first day, even though users are logging onto the Windows 2000 Network and accessing resources successfully, you do not observe any "Read All Properties" success messages in Event Viewer. In the "Auditing Entry for Users" dialog box, which entries should you select for auditing? (Choose all that apply)

A. Read All Properties Successful
B. Read All Properties Failed
C. List Contents Successful
D. List Contents Failed

>> !
Answer: A & B

Read Permissions Successful/Failed does not refer to a user viewing/reading their user account properties, but rather the permissions they and other users have to the users object. List Contents was not part of the auditing instructions from Ralph.


104. You are the administrator for a company named XYZ Engineering. Recently, XYZ Engineering upgraded their Windows NT 4.0 Primary Domain Controllers and Backup Domain Controllers of the XYZEngineering Domain to Windows 2000 Server Domain Controllers. The new Domain name is XYZEngineering.org. The existing workstations used by the employees are a mix of Windows 2000 Professional, Windows NT 4.0 Workstations, and Windows 95/98 desktops. Although the goal of XYZ Engineering is to eventually phase out all Windows NT 4.0 Workstations and Windows 95/98 desktops, budgetary constraints have forced the administrators to manage this mixed environment until next year. The IT Management staff, however, wants to begin controlling the appearance of all employee desktops regardless of the desktop operating system in use. As a result, the IT management staff is relying on you to curtail the use of Registry editing tools, deny network browsing capabilities, and identify which Windows applications are able to run on all Windows 2000 Professional, Windows NT 4.0, and Windows 95/98 workstations by utilizing the strengths of system policy capabilities of Windows 2000 Server. What must you do to enforce the directives of the IT Management staff? Select the best answer.

A. Do nothing. Windows NT 4.0 and Windows 95/98 system policies will work by default as they are converted in the upgrade process from the Windows NT 4.0 PDCs and BDCs.
B. Implement a Group Policy that will defines the IT Management staff's directives for all Windows 2000 Professional, Windows NT 4.0, and Windows 95/98 workstations.
C. Use the Group Policy capabilities of Windows 2000 Server to enforce the IT Management staff's directives for the Windows 2000 Professional workstation. Use the PolEdit.exe utility provided with Windows 2000 Server to create system policies specific to Windows NT 4.0 and Windows 95/98 desktops.
D. Use the PolEdit.exe utility provided with Windows 2000 Server to create one policy file for the Windows 2000 Professional workstations, one policy file for the Windows NT 4.0 workstations, and one policy file for the Windows 95/98 machines.

>> !
Answer: C

Group Policies have registry settings that are unique to Windows 2000 Professional Machines. For Windows NT 4.0 Workstations and Windows 95/98, the PolEdit.exe utility provided by Windows 2000 Server has templates with settings specific to these two desktop operating systems (winnt.adm and windows.adm, respectively).


105. Of the following built-in groups, which group(s) have the ability to restore backup in the event existing data becomes corrupted? (Choose all that apply)

A. Administrators
B. Users
C. Backup Operators
D. Replicator

>> !
Answer: A & C

Only two local groups have the ability to restore data by default on a Windows 2000 Professional computer: Administrators and Backup Operators.


106. On a Windows 2000 Professional desktop, you have a single hard drive installed to support the operating system, applications, and other files. You are looking to partition the disk to provide volumes that will allow you to logically organize the data you will keep on the computer. In addition, you need to be able to dual-boot your machine between Windows 2000 Professional and Windows 98. How many Primary partitions, maximum, can you have on the one physical disk?

A. 1 partition
B. 2 partitions
C. 3 partitions
D. 4 partitions
E. Unlimited partitions

>> !
Answer: D

A single disk will allow up to 4 primary partitions. If you need more than 4 partitions and are not using a specialized hardware disk controller card, you should configure an extended partition and then break the extended partition into multiple additional drive letters.


107. What are the networking components that are installed with the default installation of Windows 2000 Professional? (Choose all that apply)

A. File and Print Sharing for Microsoft Networks
B. Client for Microsoft Networks
C. Internet Connection Sharing
D. Internet Protocol Stack

>> !
Answer: A, B & D

By default, Windows 2000 installs the Client for Microsoft Netowrks, File and Print Sharing for Microsoft Networks, and the TCP/IP protocol.


108. You are installing a number of Windows 2000 Professional workstations at your company. One of these machine has two network interface cards installed, and you will be installing NWLink to allow the Windows 2000 Professional machine to communicate with a database server running Service Advertising Protocol (SAP) applications. What two configuration parameters must be configured to ensure successful communication over NWLink? (Choose all that apply)

A. Unique Internal Network Numbers
B. NetBios Scope ID
C. Host Headers
D. Frame Types

>> !
Answer: A & D

NWLink requires internal network numbers to associate with the local machine when transferring data. Also the correct Frame Type is required in order to properly communicate on the network. Windows 2000 is configured to Auto Detect the Frame Type automatically.


109. Which of the following are valid Windows 2000 Professional hardware requirements? (Choose all that apply)

A. 650MB of free hard drive space
B. Pentium 133 MHz or higher
C. 1.6GB of free hard drive space
D. 32MB of RAM
E. 64MB of RAM

>> !
Answer: A, B & E

Study Session 2 Windows 2000 Professional will require 64MB of RAM, a Pentium 133MHz or higher, a 2GB hard disk with at least 650MB of free hard drive space, a network adapter, and a video display adapter and monitor capable of VGA or better.


110. Which of the following filesystem types are supported by Windows 2000? (Choose all that apply)

A. LDS
B. FAT
C. HPFS
D. FAT32
E. NTFS

>> !
Answer: B, D & E

Study Session 2 Microsoft Windows 2000 will support and use the following filesystems, NTFS, FAT, and FAT32. NTFS was created with NT and is still the preferred filesystem for securing your data files. With NTFS, you can create a partition that allows for file and folder security, disk compression, disk quotas, and file encryption. Those features are not supported on a FAT or FAT32 partition. When creating a partition that is less than 2GB in size and formatting it with FAT, FAT will be put on it. If the partition is larger than 2GB and formatted with FAT, it will actually be formatted with FAT32.


111. What command would you use to install Windows 2000 Professional onto a new system using an unattended installation script called unattend.txt?

A. winnt32 /ua:unattend.txt
B. winnt /u:unattend.txt
C. winnt /a /r:unattend.txt
D. winnt32 /a /r:unattend.txt
E. winnt32 /u:unattend.txt

>> !
Answer: B

Study Session 2 The winnt utility is used because it is a new system without an operating system on it. The /u switch is used for the unattended installation script. When choosing between the winnt.exe and winnt32.exe utilities, winnt.exe can be run only on a DOS-based machine, while winnt32.exe can be run only from a Win32 session. The /u option allows you to select an unattended installation script.


112. What command would you use to install Windows 2000 Professional onto the D: drive of a system with a 4GB C: drive and a 2GB D:?

A. winnt /t:d
B. winnt32 /s:d
C. winnt /s:d
D. winnt32 /a:d
E. winnt /e:d

>> !
Answer: A

Either the winnt.exe or winnt32.exe could be used for the setup; it would just depend on the configuration of the system. The /t option allows you to select the partition on which to put the temporary files and then the systems files.


113. When installing Windows 2000 from a bootable CD, how would you use an unattended answer file?

A. During the install, choose the option to use an unattended answer file.
B. Create a winnt.sif file and copy it to the CD.
C. Create a winnt.sif file and copy it to the Hard Drive.
D. Create a winnt.sif file and copy it to a floppy, and leave it in the A: drive.
E. Use the winnt.exe /u:unattended option during the install.

>> !
Answer: D

If you are installing Windows 2000 from a bootable CD, the system will look for a winnt.sif file on a floppy in the floppy drive. This file is created with the Setup Manager when you select the No; this answer file will be used to install from a CD. Only if this file is created in the correct fashion will this option work.


114. What is the Sysprep.exe command used for?

A. To prepare an unattended answer file for future installations.
B. To prepare the system to be duplicated.
C. To prepare the system to be configured as a Domain Controller.
D. To prepare the system to be formatted.
E. To prepare the system to be installed.

>> !
Answer: B

Sysprep.exe (System Preparation Tool) is used to prepare the system to be duplicated. Sysprep will remove the security identifiers (SIDs) and other specific information for the user or computer. Once duplicated, the systems will create a new unique SID and ask for other computer and user specific information.


115. What utilities could be used to help in the installation of Multiple Windows 2000 Professional systems in a large organization? (Choose all that apply)

A. SysPrep.exe
B. Answer file
C. RAS
D. RIS
E. Disk Duplication Software

>> !
Answer: A, B, D & E

SysPrep.exe (System Preparation Tool) can be used to prepare the systems to be duplicated with disk duplication software. Also an Answer file can help in the installation of multiple machines from a distribution server. RIS (Remote Installation Server) can allow for unattended network installation with the need for remote boot diskettes or local CDs. RAS would not be helpful in attempting the installation of systems. Sysprep.exe (System Preparation Tool) is used to prepare the system to be duplicated. Sysprep will remove the security identifiers (SIDs) and other specific information for the user or computer. Once duplicated, the systems will create a new unique SID and ask for other computer and user specific information.


116. When installing Windows 2000 Professional on a system that already has Windows installed on a 5GB C: drive, what type of filesystem can the C: drive be to allow a dual-boot configuration?

A. FAT32
B. HPFS
C. NTFS
D. FAT
E. CDFS

>> !
Answer: A

The filesystem would need to be FAT32 to allow for Windows 98 to be able to access it and also allow Windows 2000 to access it as well. And because the partition size is larger than 2GB, it would have to be FAT32 not FAT. Microsoft Windows 2000 will support and use the following filesystems, NTFS, FAT, and FAT32. NTFS was created with NT and is still the preferred filesystem for securing your data files. With NTFS, you can create a partition that allows for file and folder security, disk compression, disk quotas, and file encryption. Those features are not supported on a FAT or FAT32 partition. When creating a partition that is less than 2GB in size and format it with FAT, FAT will be put on it. If the partition is larger than 2GB, and formatted with FAT, it will actually be formatted with FAT32.


117. When installing Windows 2000 Professional on a system you would like to configure the system for local file and folder security, which filesystems could you choose?

A. NTFS
B. FAT32
C. FAT64
D. FAT
E. CDFS

>> !
Answer: A

NTFS allows the administrator to configure the system for features that were not available in other operating systems; disk quotas, disk compression, file encryption, and file and folder level security are all available with NTFS and not available in FAT or FAT32. Microsoft Windows 2000 will support and use the following filesystems, NTFS, FAT, and FAT32. NTFS was created with NT and is still the preferred filesystem for securing your data files. With NTFS, you can create a partition that allows for file and folder security, disk compression, disk quotas, and file encryption. Those features are not supported on a FAT or FAT32 partition. When creating a partition that is less than 2GB in size and formatting it with FAT, FAT will be put on it. If the partition is larger than 2GB and formatted with FAT, it will actually be formatted with FAT32.


118. Which of the following are valid uses of the Setup Manager? (Choose all that apply)

A. RAS Scripts
B. Unattend.txt files
C. RIS scripts
D. Sysprep Installation scripts
E. Winnt.inf files

>> !
Answer: B, C & D

The Setup Manager is included with the Resource Kit for Windows 2000; it is used to create the answer files for Unattended installation of Windows 2000. It can also be used to create the Sysprep Installation scripts, as well as RIS scripts.


119. Company TMA has just purchased 150 new workstations; all workstations have the same hardware configuration, and all devices are on the hardware compatibility list. What deployment option can you use in this situation? (Choose all that apply)

A. Setup Manager and create an Unattend.txt answer file.
B. Setup Manager to duplicate the hard drives in the systems.
C. Setup Manager and create a RIS image Then use RIS to install the Systems.
D. Setup Manager to clone machine to machine.
E. Setup Manager and create a SysPrep script Then duplicate the systems.

>> !
Answer: A, C & E

Using the Setup Manager, you could create an Unattended answer file that would allow the administrator to create boot diskettes, start the installation, and have the Unattended install the same configurations. Using the Setup Manager, you can also create a RIS image; then using the features of RIS, you could have the installation start when the Network card forces the boot to the network and the RIS server pushes the installation to the hard drive. Also using Setup Manager, you could create a Sysprep script. Then duplicate the system with a disk cloning software, and the script would execute. The Setup Manager is included with the Resource Kit for Windows 2000; it is used to create the answer files for Unattended installation of Windows 2000. It can also be used to create the Sysprep Installation scripts, as well as RIS scripts.


120. What components are necessary to have in your environment to use a RIS server to install Windows 2000? (Choose all that apply)

A. A server with DHCP, and DNS installed and running.
B. RIS must be installed on a shared NTFS volume.
C. A server with DNS and ADS installed and running.
D. A server with DHCP,DNS, and AD installed and running.
E. RIS must be installed on a shared volume.

>> !
Answer: B & D

Before installing RIS on a network, the network must already be running a DHCP server, a DNS server, and an Active Directory Server; without these components RIS will not work properly. Also because of the need for extra security in this type of environment, the Remote OS Installation Service does need to be installed on a NTFS volume with enough space free to hold all the Professional installation files, possibly multiple copies of it. Also this volume cannot be the same volume that holds the Windows 2000 system files. RIS (Remote OS Installation Services) is a Windows 2000 feature that automates the installation of Windows 2000 Professional. With RIS, an Administrator can install workstation over the network using a bootable network card that supports the PXE boot process. It is also possible to create a boot diskette to initialize the RIS installation. All the files necessary to perform an installation are copied to the RIS server, and once the installation starts, the workstation downloads the information locally. With the Setup Manager, it is possible to automate the installation even more by creating *.sif files that are answer files for the most commonly asked questions.


121. When using the RIS setup Wizard, the RIS software is installed, the Windows 2000 Professional installation files are copied to the server, and what else is done for you? (Choose all that apply)

A. The client installation setup steps for system startup are configured.
B. The client installation wizard pages for system startup are configured.
C. *.sif files are created for you.
D. Unattend.txt answer files are created for you.
E. The cloned image that the RIS install will use are configured.

>> !
Answer: B & C

RIS (Remote OS Installation Services) is a Windows 2000 feature that automates the installation of Windows 2000 Professional. With RIS, an Administrator can install workstation over the network using a bootable network card that supports the PXE boot process. It is also possible to create a boot diskette to initialize the RIS installation. All the files necessary to perform an installation are copied to the RIS server, and once the installation starts, the workstation downloads the information locally. With the Setup Manager, it is possible to automate the installation even more by creating *.sif files that are answer files for the most commonly asked questions.


122. When installing Windows 2000 Professional, what new features make it easier to install? (Choose all that apply)

A. Plug-and-Play support
B. Windows Driver Model
C. Automatic Driver Update
D. Add/Remove Hardware Wizard
E. Automatic Service Pack Upgrader

>> !
Answer: A, B & D

Plug-and-Play support is included to increase the number of devices that Windows 2000 will work with. Many newer devices support only Plug-and-Play mode, were not available to Windows NT 4.0, but can now be available to Windows 2000. WDM (Windows Driver Model) is included to allow drivers written for Windows 98 to be used in a Windows 2000 environment. Most likely, a driver written for Windows NT 4.0 will not work in Windows 2000, but a driver written for Windows 98 most likely will work. The Add/Remove Hardware Wizard is used to have the system attempt to detect a device that was recently added to the machine.


123. How would you install a network-connected Windows 2000 Professional on a machine with an unsupported CD-ROM drive?

A. Using the network, copy the installation software to the hard drive and then install.
B. Boot from the CD.
C. Create the setup diskettes and install from the diskettes.
D. Create a boot disk to start the install.

>> !
Answer: A

If you are attempting to install Windows 2000 on a system with an unsupported CD-ROM, it will not be possible to access the CD-ROM during the installation procedure. To successfully complete the installation procedure, it must be possible to access the appropriate files from a different location. Having the file located on the local hard drive would allow the installation to successfully access the data and complete the installation. An alternative is also to install Windows 2000 Professional using RIS. Setting up RIS can allow you to install Windows 2000 Professional across the network as long as you are using a NIC that supports PXE or is supported by the boot disk creation utility for RIS.


124. When troubleshooting an installed version of Windows 2000, what tools could possibly be used? (Choose all that apply)

A. Event Viewer
B. User Manager
C. Troubleshooters in Help
D. Compatibility Tool
E. Server Manager

>> !
Answer: A, C & D

When troubleshooting an installation of Windows 2000, you can use the Compatibility Tool, Troubleshooters in Help, the Event Viewer, and Advanced Start options. The Compatibility Tool is used to detect or warn about a possible problem with a application or driver that was written for a previous version of Windows and cannot be verified to work with Windows 2000. Within the Windows 2000 Help program is a section called Troubleshooters. This help will step an administrator through the process of a troubleshooting wizard. Event Viewer is available to display messages that the system is creating in the Event Log. Not only error messages, but warnings and informational messages are stored in the log. Advanced Start Options allow you to start Windows 2000 in a variety of ways: with some drivers loading, with no drivers loading, with generic video drivers, and without networks.


125. What computer management utilities are available with Windows 2000 Professional? (Choose all that apply)

A. Windows Installer
B. Control Panel
C. Zero Administration Kit
D. ZEN Works
E. Computer Management

>> !
Answer: A, B & E

Control Panel, Windows Installer, and Computer Management, all can be used to control and manage the Windows 2000 Professional system. Control Panel has all the available configuration options that can be set on a machine by machine. Within the Control Panel you can configure the video resolution, mouse acceleration, ports, startup parameters, and other things. Windows Installer is used to automate the installation of a software package to the Windows 2000 Professional system. With Installer you can create custom scripts to install software in any manner you want. Computer Management combines what used to be separate utilities for managing the system. With Computer Management you can manage remote or local computers. Event Viewer can now be viewed in Computer Management, as well as Disk Defragmenter, Disk Manager, and the indexing service.


126. What dialog box is used to lock a workstation or to allow users to change their password?

A. User Tools dialog box
B. User Manager dialog box
C. Administrative dialog box
D. Security dialog box
E. User Security dialog box

>> !
Answer: D

The Windows 2000 Security dialog box allows a user to lock the workstation, change their password, log off the computer, shut down the computer, and start the Task Manager utility. While the workstation is locked, the applications are still running and open, but the only way to access the station is to log back in as the original user or as an administrator.


127. When installing Windows 2000 Professional at an organization that needs to install 500 workstations with the same configuration, what tools are provided that could simplify this process? (Choose all that apply)

A. ZERO Effect Installer
B. System Preparation Tool
C. System Installer Utility
D. Duplication software
E. RIS

>> !
Answer: B, D & E

SysPrep.exe (System Preparation Tool) can be used to prepare the systems to be duplicated with disk duplication software. Also an answer file could help in the installation of multiple machines from a distribution server. RIS (Remote Installation Server) would allow for unattended network installation with the need for remote boot diskettes or local CDs. RAS would not be helpful in attempting the installation of systems. Sysprep.exe (System Preparation Tool) is used to prepare the system to be duplicated. Sysprep will remove the security identifiers (SIDs) and other specific information for the user or computer. Once duplicated, the systems will create a new unique SID and ask for other computer and user specific information.


128. Before duplicating a system, you should always run the ______?

A. Network Management Tool
B. System Preparation Tool
C. Computer Management Tool
D. Network Identification Utility

>> !
Answer: B

Sysprep.exe (System Preparation Tool) is used to prepare the system to be duplicated. Sysprep will remove the security identifiers (SIDs) and other specific information for the user or computer. Once duplicated, the systems will create a new unique SID and ask for other computer and user specific information.


129. You have a new workstation with a 10GB hard drive that you would like to create into two partitions and set up with Windows 2000 and Windows 98. How would you have to configure the drives?

A. C: - 2GB NTFS partition, D: - 8GB FAT partition
B. C: - 5GB NTFS partition, D: - 5GB FAT32 partition
C. C: - 5GB FAT32 partition, D: - 5GB NTFS partition
D. C: - 5GB NTFS partition, D: - 5GB FAT partition
E. C: - 8GB FAT partition, D: - 2GB NTFS partition

>> !
Answer: C

The C: drive for a multi-boot configuration would need to be either a FAT or FAT32 partition. If the partition is over 2GB, it would need to be FAT32. So only a 5GB FAT32 partition would work out of the examples.The filesystem would need to be FAT32 to allow for Windows 98 to be able to access it and also allow Windows 2000 to access it. And because the partition size is larger than 2GB, it would have to be FAT32 not FAT. Microsoft Windows 2000 will support and use the following filesystems, NTFS, FAT, and FAT32. NTFS was created with NT and is still the preferred filesystem for securing your data files. With NTFS, you can create a partition that allows for file and folder security, disk compression, disk quotas, and file encryption. Those features are not supported on a FAT or FAT32 partition. When creating a partition that is less than 2GB in size and formatting it with FAT, FAT will be put on it. If the partition is larger than 2GB and formatted with FAT, it will actually be formatted with FAT32.


130. When installing Windows 2000 Professional on a multi-boot system, what factors concerning multi-boot should you keep in mind? (Choose all that apply)

A. The amount of RAM in the system
B. The amount of free space on the hard disk
C. The format type of the system partition
D. The location of the system files
E. The version of the other operating system

>> !
Answer: B, C & D

The format of the system partition is important because all the operating systems on the workstation must be able to read the partition that they boot from. That partition is the system partition. Also, the amount of free space on the hard drives needs to be addressed to make sure there is enough room to accommodate all the operating systems. Knowing where the system files exist will prevent overwriting an operating system by accident. The other choices are also good things to be aware of, but they typically don't matter that much when it comes to configuring the multi-boot portion of the installation.