Windows 2000 Accelerated1. As you blow the third layer of dust off the top of the case, you realize even though the server is loaded with Windows 2000, this old boy has been a round for awhile. You check the disk subsystem and, sure enough, it is all EIDE. No wonder the access times are so slow.You decide to proceed with the upgrade to SCSI. You install the card and four drives. When you reboot, Windows does not automatically detect the hardware. You know that the card is not on the Hardware Compatibility List (HCL). What two things can you do to get the controller installed and working properly? A. Open SCSI from Control Panel. Use the wizard to add the new SCSI controller by using the drivers provided by the manufacturer. B. Open System from Control Panel. Add the new SCSI controller by using the drivers provided by the manufacturer. C. Open Add/Remove Hardware from Control Panel. Use the wizard to add the new SCSI controller by using the drivers provided by the manufacturer. D. Run the manufacturer's installation program to install the driver for the controller.
2. Doesn't it seem like the same old problems just keep coming around again and again. Here's one for you. You have a system board with a built in NIC (remember when this used to be a built in modem?). You are tired of 4Mbs Token Ring and decide to install a new 10/100 Ethernet card (remember when this was 14.4Kbs modem?). Needless to say the devices conflict and the new device doesn't work. What can you do about this? A. Use Device Manager to reconfigure the resource allotment of the integrated NIC. B. Use Device Manager to reconfigure the resource allotment of the new NIC. C. Disable the integrated NIC (usually in BIOS today, remember back when you had to disable the modem with a jumper on the system board?). OK, so we're giving you this one for old time's sake. If you've been around this long, you've earned it. If not just pick one of the wrong answers to make us old timers feel better will you please? D. Remove the drivers for the integrated card using Driver Manager.
3. Expletives just aren't enough this time and banging on the equipment isn't producing results either. You have screwed up worse than just about anyone in history. Judas, Brutus, Nixon, the drummer who dropped out of the Beatles just before they took off - all amateurs. You see, you just ran a script, without testing it on a non-production server first, that REALLY messed up the Active Directory schema. To make matters worse, it replicated out before you realized how bad the damage was. Did I mention that it is seven in the morning, on Monday, and that any moment now users are going to be coming into work and will start pounding the server with logon requests?Let's recap shall we? That's right, you ran an untested script that completely fouled up the Active Directory schema just before business hours at the beginning of the week. Fortunately you have last night's backup which completed successfully. How can you restore the schema so that it is just like it was last night when it still worked? A. Reboot one of your domain controllers in Directory Services Restore Mode. Restore the System State data from last night's backup and reboot the computer. B. Reboot one of your domain controllers in Directory Services Restore Mode. Restore the System State data from last night's backup. Run ntdsutil.exe and reboot the computer. C. Reboot one of your domain controllers into the Recovery Console and enter Active Directory Repair Mode. Restore the System State data from last night's backup and reboot the computer. D. Reboot one of your domain controllers into the Recovery Console and enter Active Directory Repair Mode. Restore the System State data from last night's backup. Run ntdsutil.exe and reboot the computer.
4. As you might imagine, we secretly monitor everyone's test scores in a perpetual search for new geniuses to join our company. We were so impressed with yours that we hired you. You now work for TBT and are currently working as our DNS administrator.Because of our massive success we have over 20 webservers. All of them contain the exact same content and should answer to www.thebestests.com. However, you notice that only one of the 20 servers is currently answering requests sent to that name. To be honest, we have been a little busy and never really noticed. People would complain about it being slow and we would just buy another server. Why did you really think we have 20 servers?Horrified, you look at us and say that what we really need is load balancing. You tell us there are two simple things you can do in DNS that will ensure that all of our servers are load balanced. What are they? A. Go into Properties for our DNS server in the DNS console and enable Round Robin. B. Go into Properties for our DNS server in the DNS console and enable Forwarding. C. Buy a really expensive hardware solution. D. Make sure each of the webservers have a Host (A) record in DNS that maps www.thebestests.com to its IP address. E. Make sure each of the webservers have an alias record in DNS that maps www.thebestests.com to the server's actual Host (A) record.
5. Your CIO has mandated disk quotas for all employees. While playing roulette last night he decided that no user should need more than 33 (RED) megabytes of disk space. You ask him how much he lost on 33 Red but he is strangely silent, and not especially nice.Needless to say you and your fellow administrators feel that you should be excluded from this policy and allowed to use as much disk space as you want. Since you're the one implementing the limit and no one else knows how to check up on what you're doing, you figure what the heck. You are all members of the BusinessAdmin group. How will you configure the quota for everyone else while ensuring that you are excluded from them? (Choose all that apply) A. In the properties of the drive, Enable quota management. Check the box next to Deny disk space to users exceeding quota limit and set the default quota limit to 33MB. B. Add a new quota entry for each of the administrators' accounts that you wish to exclude. Select the radio button next to Do not limit disk usage for this entry on each quota entry. C. Add a new quota entry for each of the administrators' accounts that you wish to exclude. Set the account's quota limit to 0. D. In the properties of the drive, Enable quota management. Clear the check box next to Deny disk space to users exceeding quota limit and set the default quota limit to 33MB. E. Add a new quota entry for the BusinessAdmin group that you wish to exclude. Select the radio button next to Do not limit disk usage for this entry on each quota entry.
6. The computer that will become your new Windows 2000 Terminal Services box has finally arrived. You didn't think you would ever see the day. You smile as you remember all of the emails and personal folders you had to read through to get enough blackmail, er, I mean research information to justify the purchase. Both the new and old servers support hot swappable disks. You have installed Windows 2000 and are ready to go on the new computer. You want to move the spanned volume that has all the user data on it from the old server to the new server. The volume consists of five physical drives and uses drive letter F:. The letter F: is available on the new system, and five drive bays are open on it as well. How will you move the spanned volume and ensure that the same drive letter is used on the new machine for the volume while maximizing the uptime of both systems? A. You will move the hard drives from the old server to the new server. You will then rescan the disks on both servers. B. You will move the hard drives from the old server to the new server. You will then rescan the disks on the new server. C. You will move the hard drives from the old server to the new server. You will then rescan the disks on the old server. D. You will power down both servers and move the hard drives from the old server to the new server. You will then rescan the disks on the old server.
7. Tomorrow is your birthday. You've scheduled yourself off and plan to go fishing. Leaving your pager and cell phone in your desk drawer, you head for the door. Your junior network administrator catches you in the parking lot and tells you that one of the drives on the database server has failed. You consider swearing him to secrecy and leaving, but just then the CEO and his son, the Senior VP of Lucky Heredity, pull in after finishing 18 holes at the club. The CEO wants to know what's up. Off you go to the server room. It turns out that the drive that failed is part of a spanned volume. You do nightly backups and can restore the data that it contained. You replace the drive with a new one. What do you need to do to make this restore happen? A. You need to restore the data from the disk that failed to the new disk using Windows Backup. B. You need to mark the new disk to be included in the spanned volume and reboot the server. C. You need to rescan the disks and extend the volume to include the new disk, then restore the data from the disk that failed to the new disk using Windows Backup. D. You need to rescan the disks and remove the spanned volume. Then make a new spanned volume that includes the disk you just installed and format the volume. Finally, you need to restore the data from backup using Windows Backup.
8. Who would have guessed that the "occasional travel" mentioned by the company when they hired you meant that occasionally you only had to travel four, instead of six, days a week. The money is great, but your spouse is none too happy about the fact that they never see you any more. The company has promised you that they will be hiring a junior administrator for you to support the Chicago office, but right now your time is still divided between there and the home office in Indianapolis.Up until now, you have used LMHOSTS files for NetBIOS name resolution on your network. The company is doing very well and even though the network is mostly comprised of Windows 2000 systems, you feel that it is time to install WINS. You decide to draw up a series of targets for your WINS implementation project before you begin. For fault tolerance purposes, you determine that you should install two WINS servers in each location. Because you will not be there as often, you want the two servers in Chicago to replicate their databases after each new client reservation to ensure their databases are as consistent as possible. This is not an issue in your home base of Indianapolis, so you decide that the WINS servers there should only synchronize with each other every hour. Every four hours, you would like the changes that have occurred on the WINS servers at each location to be synchronized. Which three of the following will you select to implement your design goals? A. Make each of the servers in Chicago push/pull partners with each of the servers in Indianapolis and configure them with a replication interval of one hour. B. Make the servers in Chicago push/pull replication partners and set the number of changes before replication to 1. C. Make the servers in Indianapolis push/pull replication partners and configure them with a replication interval of one hour. D. Make the servers in Chicago push replication partners and set the replication interval to 0. E. Make one of the servers in Chicago push/pull partners with one of the servers in Indianapolis and configure them with a replication interval of one hour.
9. To be honest, you are not real sure if it was a promotion or not. On the one hand, last week your job title was technology associate and this week it is network administrator. On the other hand, you are being sent to an office in a remote part of Alaska where your company has an oil pipeline.You arrive on site and find that your primary server has a mirrored volume created on it. During a routine check you determine that the status of the volume is Failed Redundancy and that one of the disks is listed as Missing. You look up the relevant support document and it says to attempt to reactivate the disk, but after doing so its status doesn't change. What do you need to do to restore the mirrored volume? A. Replace the failed disk and then select the Repair Mirror option. B. Replace the failed disk and add back the mirror using the new disk. C. Replace the failed disk and reboot. D. Replace the failed disk and use the rpmirror.exe command to regenerate the mirror using the new disk.
10. "And make it snappy," you hear as you leave the office. You know that your boss has no real sense of time, and snappy in his world is a range from one to fifteen minutes. You hate the word snappy and choose for it to mean fifteen minutes. He has asked you to make some changes to the security settings in one of the Group Policy Objects (GPO) on the network and to make sure that the policy is refreshed at a "snappy" interval for computers that are currently up on the network. What will you do, fourteen minutes from now? A. You will make the other changes to the GPO and configure the Group Policy refresh interval for Active Directory servers. B. You will make the other changes to the GPO and configure the Group Policy refresh interval for logged on users. C. You will create a batch script that will run the gpo.exe /refresh command on the computers in the network. You will then use the Task Scheduler to run the command in the context of an administrative account. D. You will make the other changes to the GPO and configure the Group Policy refresh interval for computers.
11. One of the cool things about having a DVD drive and headphones is you can use your workstation to keep up with the latest movies. Just when the flick you've chosen is starting to get good, a user in one of your organizational units (OU) calls and says they are having trouble with their mouse. You send a tech to investigate the problem and he discovers the computer was not using the latest version of the mouse driver. The tech logged on as a domain administrator, installed the driver on user's computer and rebooted. When the tech logged back on as the user, the mouse still did not function properly and a little research showed that the previous driver was still installed. What do you tell this tech to do to resolve the problem? A. You tell the tech to reinstall the mouse driver while logged in as the user. B. You tell the tech to make the user a member of the local administrators group. C. You tell the Tech to alter the security policy for the OU to warn and allow the installation to override local security defaults. D. You tell the Tech to alter the security policy for the OU to not warn or allow the installation to override local security defaults.
12. Sometimes you think you should have gone into sales. Even though the company has decided to stay with Windows NT 4.0 through next year, you have heard that Windows 2000 can be configured as a killer gaming platform so, of course, you want it on your workstation. Because the rest of the company will still be using Windows NT for the foreseeable future, you have to convince your boss Cristine to let you install it. Using reverse psychology, you tell her how much you're dreading having to learn W2K and what a pain it would be to have to setup a dual boot(on your workstation. Since the only satisfaction she ever seems to squeeze out of her pathetic existence is when she is making your life miserable, she orders you to install Windows 2000 on your workstation immediately! What do you need to do to your current system before installing Windows 2000? A. Ensure that you have at least 3GB of free disk space on the drive you will be installing the Windows 2000 system files on. B. Make sure that Service Pack 4 is installed. C. Make sure that Service Pack 3 is installed. D. Defragment the drive you are going to install the Windows 2000 system files on.
13. You are trying your best to migrate the programmers to Windows 2000 Professional from Windows 98. The programmers hit management with a list of "concerns" that, while mostly bogus were enough to stop you in your tracks. You both know that the only real concern is how their favorite games will work on Windows 2000. It is bad enough these guys get paid so much, can come into work half naked and even let their pets roam around the office. You wonder why you chose to go into system engineering, these programmers really seem to have it made.A compromise is struck and you agree to allow the systems to dual boot. You need to make sure that all files are accessible regardless of the file system that the user is booted into, and that disk performance is optimized. What will you do to address these issues? A. Format the programmers' computers with a FAT32 partition. B. Format the programmers' computers with a FAT16 partition. C. Use a dynamic NTFS volume on the programmers' systems. D. Use a basic NTFS volume on the programmers' systems.
14. You check the clock. Amazing! You might actually make it home in time to have dinner with your long suffering spouse. You are right in the middle of a Remote Installation Services (RIS) deployment and up until now everything has been going great. All of the computers use the same hardware and are PXE compliant. You might even get out early enough to stop at the local video store. All of a sudden your hopes fade. You knew this was too good to be true. For some reason, the last half of the computers are not able to install Window 2000 Professional. What can you do to remedy the problem? A. Prestage the remaining computers in Active Directory. B. Prestage the remaining computers in RIS. C. Add additional IP addresses to the DHCP scope. D. Boot the remaining computers from a RIS startup disk.
15. You have recently been fired from a systems administrator job at a large company. Through social engineering you gain access to a client computer on the network. Bent on revenge, you attempt to connect from your Windows NT 4.0 Workstation to one of the Windows 2000 computers on the network that you know contains highly confidential information. Much to your surprise, you find that you cannot make the connection.As it turns out the new systems administrator put a security measure in place to make sure that Windows 2000 computers could only communicate with other Windows 2000 computers. Other systems such as Windows NT, 98 and 95 can no longer connect to Windows 2000 systems. How did the administrator accomplish this? A. The administrator used the hisecws.inf security template file to alter the default security settings by importing it with the Security Configuration and Analysis tool. B. The administrator used the hisecprof.inf security template file to alter the default security settings by importing it with the Security Configuration and Analysis tool. C. The administrator used the Security Configuration and Analysis tool to alter the default security settings on the system by setting the "Allow connection to Windows 2000 systems only option". D. The administrator used the Security Configuration and Analysis tool to alter the default security settings on the system by setting the "Do not allow connection to Pre-Windows 2000 systems option".
16. You've finally made it. All of your hard work has paid off. An office with a door instead of cubicle. A staff of eager techs to satisfy your every whim. With any luck you'll never see another end user again. Yes sir, you've pulled yourself up by your own boot straps and, with a little help from a few slightly questionable emails you happened to discover in the CEO's inbox, you are the new CIO. As your First official act, you decide that it is high time that you had your own killer laptop. So, you order one for around $9,500.00 that even comes with a docking station. Once you get everything all set up, you decide to put the ISA SCSI adapter from your old system into the docking station. You start the computer but Windows 2000 Professional does not detect the new hardware. You try to use the Add/Remove hardware wizard to detect the adapter but this does not work either. What can you do to get Windows to detect the adapter? A. Add the drivers manually using the Add/Remove Hardware wizard. B. Enable ISA PNP in the system BIOS. C. Download the latest Windows 2000 Update from Microsoft. D. Add the drivers manually using winmsd.exe.
17. You aren't the administrator of a Windows 2000 network, but you seem to be the only one who knows what the heck is going on. Your pitiful salary is dwarfed by that of your do-nothing, know-nothing systems administrator. A perfect example of this occurred recently when the systems administrator that your company hired put in a SCSI card and tape drive on one of the servers.Things seemed to go smoothly enough. The drive was detected and installed automatically by Windows 2000. However, that night during a routine reboot the computer would not load the operating system. You tried it several more times with no luck. Naturally, your highly paid systems administrator had no clue. What did you do to fix the problem? A. You rebooted the computer using the Safe Mode Command Prompt and disabled the SCSI card driver by using the disable command. B. You rebooted the computer using the Safe Mode and used the GUI to repair the problem. C. You rebooted the computer using the Recovery Console and disabled the SCSI card driver by using the "device disable" command. D. You rebooted the computer using the Recovery Console and disabled the SCSI card driver by using the "disable" command.
18. At the CEO's request, you have been compiling a series of files that contain password lists for all of the company's servers. You tried to explain what a bad idea this was, only to have him request that it be placed on a network share where other administrators could access it. You decide to stop pleading your case because you fear the next thing out of his mouth might be a request to post the lists on the bulletin board in the break room.Every computer on your network runs Windows 2000 and you are concerned that an administrator with a laptop that has offline files enabled might access the share and inadvertently take a copy home with them. How can you prevent this from happening? A. Disable file caching for the files on the network share by using Windows 2000 Explorer. B. In the properties of the share, deny the Everyone group Read permission. C. In the properties of the share, deny the Everyone group the Allow file caching permission. D. Disable offline files by using Windows 2000 Explorer.
19. You're a sales guy. You can sell ice to Eskimos and sand to Arabs. The last thing you ever want to be is like those weird little guys who hang around the server room. You get the willies just thinking about it. All of them are pale as ghosts, lack any muscle tone and probably couldn't hit a fairway wood if their life depended on it. Now, as if a desktop computer wasn't hard enough to figure out, the company has issued you a laptop. And, you have to depend on those little geeks to keep you working. It has both a standard network connection and a dial-up connection, which frightens you. The laptop is configured to use offline files and some of your project's files are absolutely huge. You don't want to grow old waiting for them to synchronize while you are using your dial-up connection. When you are on the road, you will be using your dial-up connection frequently to get your email and calendar changes. How can you ensure that your larger files are not synchronized automatically when you connect to the network with your dial-up connection? A. Set the Synchronization Settings to manual for all files. B. Set the Synchronization Settings to only sync your files when you connect to the network with a LAN connection. C. Set the Synchronization Settings to only sync the project files when you are connected to the network with a LAN connection. Configure the sync of personal files for both LAN and dial-up connections. D. Set the Synchronization Settings to manual sync for the project files. Configure the sync of personal files for both LAN and dial-up connections.
20. "Change Control? What's that?" you ask the IS Manager. "It's a committee which approves any production changes. Everyone, even consultants, have to have their proposed changes reviewed by them. Here is the form you have to fill out." Rolling your eyes, you go back to your desk to fill out the form. When you get to the committee meeting, you realize that Change Control is really just a place for egotistic know-nothings to exercise meaningless power by nitpicking people's projects. After reviewing your changes, everyone but the senior member signs off. "What was your problem again?" You grind your teeth since it is right in front of his nose, but you repeat that you have just upgraded all of the Windows NT 4.0 Workstations to Windows 2000. Before the upgrade a number of system policy settings, such as minimum password length, were applied to the systems locally. After the upgrade, the policies were not working. "Oh, and how can you fix that?" Sitting on your hands so you won't choke him, you reply: A. You can use the secedit.exe /a to configure a local Security Policy for the machine. B. You can use the Local Computer Policy to configure a local Security Policy for the machine. C. You can edit the registry manually on the machines to enforce the policy by using the spol key. D. You can automate editing of the registry on the machines to enforce the policy by using the spol key and a batch file.
21. Your boss recently read an article on the benefits of using smart cards and decided that it was the way to go for dial-up authentication. As you are sitting in his office you ponder how nice it must be to be able to make decisions that cause other people endless hours of work and yet not have your 6-hour days and 2-hour lunches impacted.You leave his office thinking that he has probably read more about smart cards than you have. You do your research, order the necessary equipment, etc. Finally the day comes to configure the users' laptops for smart card authentication. Your remote access server already supports certificate authentication. You install a smart card reader on your test laptop and configure it with the correct drivers. What else needs to be done to enable smart card support on the laptop? A. You need to set one of the user's dial-up connections to use the Extensible Authentication Protocol (EAP) and choose the smart card device for authentication. B. You need to set one of the user's dial-up connections to use the Extensible Authentication Protocol (EAP) and choose the server based certificate that the smart card device will use for authentication. C. You need to set one of the user's dial-up connections to use the Extensible Authentication Protocol (EAP) and choose the "Accept any physical authentication including smart cards" option in the properties of the connection. D. You need to set one of the user's dial-up connections to use certificate based authentication and choose the smart card device for authentication.
22. You work at a top national lab. One of the rocket scientists calls you over because his Windows 2000 system is performing poorly. You check the system out. It is a PIII 450 with 64 MB of RAM and 100MB of free space on the disk drive. "Rocket scientist huh," you think to yourself as the guy continues to press you for answers as to why his system is slow. What can you do to help him? (Choose all that apply) A. Configure all Win32 programs to share a single memory space. B. Enable the disk performance counters. C. Run a disk analysis. If recommended defragment the disk drive using Disk Defragmenter. D. Run Disk Cleanup to get rid of temporary and other unnecessary files.
23. You are sitting at a recruiting table at the local college. So far you haven't had any luck. The Army and Air Force on either side of you seem to be getting all the visits. You start announcing that your company doesn't require pushups or getting up at 4a.m. At this point the Army recruiter comes over to your table and you think you're in deep doo doo. Instead he relates a problem he is having with one of the Windows 2000 computers on the network at their table. It seems that a different recruiter last night used the Encrypting File System (EFS) on all of the forms he created in Microsoft Word. Today's recruiter needs to get at them. He copied them over into his folder but cannot open them. He just keeps getting an "Access Denied" message. After talking to the college's systems administrator, who isn't sure what to do, you tell the administrator to fix the problem in what way? A. You tell him to log on using an account that is a member of the server operators group and decrypt the files for the nice soldier. B. You tell him to take ownership of the files, give himself the Decrypt permission and decrypt the files for the nice soldier. C. You tell him to log on as the Recovery Agent and decrypt the files for the nice soldier. D. You explain that the only way to decrypt the files is to log on using the other recruiter's account.
24. Try as he might, your boss just could not get a hold of the nighttime systems administrator last night when he noticed that the webserver was unavailable. Wasn't he surprised when the two of you came walking in just as he had beat out the last of his friends in the First Person Shooter (FPS) they were all playing on the corporate network. Wasn't he even more surprised when security came back for him after they had finished escorting his friends out of the building.This morning, one of the operators was promoted to the nighttime administrator position. The night administrator's account had a great deal of specific user rights and permission assignments associated with it. You want to make sure that the new night administrator has the same rights and permissions that the old one had, and that the previous administrator has no access to the network. What is the easiest way to accomplish this? A. Rename the night administrator's account to the new administrator's username. Change the password on the account. B. Copy the night administrator's account and name the new account using the new administrator's username. Delete the old administrator's account. C. Create a new account for the new night administrator and assign it all the same rights and permissions. Delete the old administrator's account. D. Allow the new night administrator to use the builtin administrator account. E. Copy the night administrator's account and name the new account using the new administrator's username. Disable the old administrator's account. F. Create a new account for the new night administrator and assign it all the same rights and permissions. Disable the old administrator's account.
25. You downloaded a printer driver from HP's website but every time you try to install it on the person's computer you get the following error message: "Error 11 - Cannot install printer driver." You always use this driver when installing this printer and cannot quite figure it out. You decide to try and configure the user's computer to check for driver integrity and to allow you to install the printer driver. How will you do this? A. By configuring driver signing to display a message before allowing an unsigned driver to be installed. B. By configuring driver signing not to block the installation of unsigned drivers. C. By creating the printer manually at the command line using the configure printer command. D. By creating the printer manually at the command line using the install printer command.
26. You work for Moo Goo Gai LAN. It's a networking consulting company AND a Chinese restaurant. You have a late night order from the systems administrator of a local insurance company for some cashew chicken and the solution to the following problem: She is installing her first Windows 2000 Professional machines on her Windows NT network. The network has several different subnets and only uses the TCP/IP protocol. She wants the new Windows 2000 Professional computers to have no problems resolving NetBIOS names to TCP/IP addresses. What answer do you print out to insert into the fortune cookie? A. Manually add entries to the ARP cache. B. Place a WINS server on the network and configure the clients to use WINS. C. Place a DNS server on the network and configure the clients to use DNS. D. Manually add entries to the DNS Resolver cache.
27. Your father invites you to visit him at his new home in Phoenix. When you get there you can't help but notice his killer new computer system, and how few of the accessories that came with it are hooked up. After a few hours of idle chit-chat, you feel the call. You notice a type of USB camera that you have always wondered about and set about installing it.You plug in the camera and his Windows 2000 system tries to find the driver. It cannot and prompts you for the manufacturer's CD that has the drivers on it. You know that they are not certified by Microsoft but install them anyway. When you reboot the system the keyboard fails to respond. You noticed that it, too, is a USB device. All this time, in fact all of the time, the financial news channel is on in the background. All of a sudden, the market starts dropping and your father bolts for the computer to quickly get out of some of his investment positions. Fear grips his face as he realizes that you have messed up his system and he can't make his trades. You need to get this computer back up quick and make sure that it will prevent uncertified drivers from being installed. What two things will you do to save your father's retirement and your place in his will? A. Enable driver signing. B. Enable driver blocking. C. Reboot in safe mode. Use Driver Manager to replace the camera drivers you provided with certified drivers. D. Reboot in safe mode. Use Device Manager to replace the camera drivers you provided with certified drivers.
28. Being the technoid you are, you have your home setup with the best cast-off equipment your company could afford. Those 10 token-ring MAUs aren't the best printer stand, but they sure look impressive. Your spouse really likes the massive line printer now that it is covered with plants. And that Bay ARN leftover from the Cisco conversion adds just the right toucH - However, not all is bliss in your dream home.Recently you've taken home a laptop with a docking station. The laptop is old and barely runs Windows 2000 Professional. You've installed a SCSI PC card in the laptop that you use to support another recent acquisition, a scanner. You want to get the most out of your battery performance when you are not connected to the docking station, and make sure the drivers for the SCSI adapter do not load. How do you configure the system to support these goals? A. Undock the laptop and boot it up. Once in Windows, disable the SCSI PC card for the docked profile. B. Undock the laptop and boot it up. Once in Windows, remove the SCSI PC card from the current profile using Services. C. Undock the laptop and boot it up. Once in Windows, remove the SCSI PC card from the current profile using Computer Management. D. Undock the laptop and boot it up. Once in Windows, disable the SCSI PC card for the current profile.
29. Who would have thought having the CIO walk in on you at 2 a.m., finding you in nothing but a pair of shorts with a can of Jolt cola and a burning cigarette on top of one of the servers would be a blessing. But here you are, starting up your own network gaming company. I mean, every night administrator in the country is a hard core gamer, right? So there has to be a market for this, right? You are starting with 20 workstations and decide to use Windows 2000 Professional as your OS. You install your First Person Shooter, IRC and a Massively Multiplayer 3D game as the local administrator on the first machine. You soon realize that you are going to want the kids to logon to the network so you can track (and charge for) their usage. You figure that each person will want his or her own profile. You configure the profile directory path in the user accounts as \\gameserver1\profiles\%username%. When the first user attempts to log on to the network, they get an error message that says: "Windows cannot locate your roaming profile and is attempting to log you on with your local profile. Changes to the profile will not be propagated to the server. Detail - The network name cannot be found."What can you do to ensure that roaming profiles work correctly for your customers? A. Manually create the folders on the server. B. Share the profile directory on the network. C. Make sure that you type %USERNAME% in all caps. D. Do not use %USERNAME%.
30. Life can be so unfair. You work as a tech for a major multinational company. As usual, you are jealous of the workstations that the scientists in the R&D department of the company are getting. These guys get treated like royalty while in other sections of the company you are still supporting Windows 3.1.This quarter, they are receiving new MPS compliant computers that are running Windows 2000 Professional and have dual 800MHz processors, 2GB of RAM and SCSI hardware based RAID 5 in them. You just hope that you can sneak one of last quarter's machines to your desk without anyone noticing after switching them out.The R&D department uses a number of heavy programs including CAD, Mathmatica, and high-end graphics programs. Their applications run the gambit from Win32 to Win16 and DOS based. After you install the new machines, users report that they are not noticing any difference in performance for their Win 16 based programs. You want these users to see a significant improvement in the performance of their new machines when compared with their previous models. How can you accomplish this? A. Create shortcuts to that run the Win16 based programs in a separate memory space. B. Install MPS compliant drivers for the second processor on all machines. C. Replace the Win16 based applications with Win32 applications. D. Run msmps.exe to upgrade all systems to enable the multiple processor features of Windows 2000 Professional.
31. You have recently upgraded all of your client systems from Windows NT 4.0 to Windows 2000 Professional. Users in one department are reporting that since the upgrade they can no longer run one of their applications. The department manager, an old crank who has fought every upgrade including moving from cave wall drawings to pencils and paper, decided to use this opportunity to make "them young whippersnappers" look bad. Instead of waiting a few minutes and giving the IT department a chance to fix the problem, he sent his entire staff home. Then he sent a handwritten note to senior management - he hasn't mastered word processing or email either - explaining his actions.About 11.29 seconds later your phone rang. It was the CIO wanting to know what in the world was going on. The CIO gave you clarity of purpose and about 10 minutes to fix the problem, or else. The systems are using the default security settings. All users are members of the local Users group and no group memberships have changed since the upgrade. What needs to be done so that these people can use the application? A. Use the Security Configuration and Analysis tool to determine what the problem is and apply any necessary changes to each workstation to ensure that the application can run properly. B. On all computers in the department add the user accounts of the departmental personnel to the local Power Users group. C. On all computers in the department add the local Users group to the local Administrators group. D. All computers in the department need to have the Compatws.inf security template applied to them. You decide to use secedit.exe to apply the policy.
32. Cristine should have given him that raise and not been so mean. He was a good systems administrator, but now he's gone and Cristine, his former boss, is sitting at his desk on a Sunday night with no one to help her. If he only knew, he'd be laughing for sure. She starts sobbing, as usual. Suddenly, a programmer who had been working a few cubicles down yells at her "shut up and check the help!" Brilliant! These tech guys are simply brilliant! She can't help but think that maybe he could be her new administrator since he knows so much! She scans help for the following problem. The former administrator had scheduled a task to run on his Windows 2000 computer, but it is not being completed successfully. Other tasks are executing without problems. The faltering task is critical and executes an MMC snap-in that configures a number of items on various computers in the network.When she launches a blank MMC manually and adds the snap-ins she has no problem completing the task. What does she need to do to make the scheduled task complete successfully? A. In Scheduled Tasks, have the task run under the security context of her account. B. Change the account the Task Scheduler service uses to her account. C. Make sure the Task Scheduler service is started. D. Stop and restart the Task Scheduler service.
33. It's been years since you ran over the CIO's dog, but you fear it has come back to haunt you again. Right in the middle of last night's defragmentation, your building experienced a power outage. When the SQL server powered back up it displayed a message stating that it had a bad or missing operating system. As he strokes the frame around the picture on his desk of the dog you maimed, the CIO informs you that he expects it up and running in ten minutes. What do you do? A. Reboot the server using the Windows 2000 CD-ROM and use the Recovery Console to repair the boot partition files. B. Reinstall the server and then recover it from the last backup. C. Boot the server from a DOS floppy and run FDISK.EXE /MBRFIX. D. Reboot the server using the Windows 2000 CD-ROM and use the Recovery Console to repair the master boot record.
34. "I don't understand. One plus one equals two." The user just keeps saying it over and over again as you try to explain what the problem is. The person is trying to copy an NTFS compressed file to a floppy disk. The file is 2.16MB when uncompressed but only 1.1MB when compressed. Clearly this is one of those cases where it will be easier to fix the problem yourself rather then try to explain the solution. What can you do to get the file on a floppy for him? A. Use a third party compression utility to compress the file, then copy it to the floppy. B. Format the floppy with NTFS and enable compression. Copy the file to the disk. C. Format the floppy with NTFS and move the file to the disk. D. Span the file across 2 floppy disks using the Windows 2000 Span Disk utility.
35. Your answering machine goes off and it is your junior systems administrator. He has misplaced the standard practices guidebook again. He is installing several new systems on the network tonight and needs to know how to configure them. With one icy glare your wife makes it clear that if you answer the phone you are going to have a very cold evening/week/month. You opt to ignore his call and just fix them in the morning.Your network uses TCP/IP and NetBIOS name resolution for connection to resources on its various subnets. Your junior cohort has configured the TCP/IP address and subnet mask on all of the systems. What two additional TCP/IP properties should you configure to ensure the systems are fully functional on the network? A. The DNS server address. B. The RIS server address. C. The default gateway address. D. The WINS server address.
36. "What's wrong with using the actual URL," you ask as the CIO. She tells you that she wants internal company personnel to be able to access the company website by simply being able to type in its name (webtests). The request sounds simple enough, the problem is the company has two domains: lucy.thebestests.com and ricky.thebestests.com. You silently think to yourself that if you get one more technically illiterate, MBA toting boss you are going to take your stock options and open a coffeehouse. The web server is in the lucy domain while most users are in the ricky domain. How can you enable users in ricky.thebestests.com to access webtests.lucy.thebestests.com by simply typing http://webtests into their browser? A. On the users' computers, add lucy.thebestests.com to the Domain Suffix Search Order. B. On the webserver, add ricky.thebestests.com to the Domain Suffix Search Order. C. On the users' computers, add ricky.thebestests.com to the Domain Suffix Search Order. D. On the webserver, add lucy.thebestests.com to the Domain Suffix Search Order.
37. It is the best of times. It is the worst of times. The good part, you're making a boatload of cash as a network administrator. The bad part, with the release of Windows 2000 you're working your butt off. You have recently upgraded all of the computers on your network to Windows 2000. Your network is only running TCP/IP. You want all computers to use DNS for name resolution. You also want all computers to be able to continue to register and resolve IP addresses if one of the DNS servers fails. The network has 15 Active Directory domain controllers spread across 7 subnets. Three of the domain controllers have DNS installed on them. How will you configure the DNS servers on your network? A. You will create a Standard Primary zone on one of the DNS servers and Standard Secondary zones on the other 2 DNS servers. B. You will create an Active Directory Integrated zone on one of the DNS servers and Standard Secondary zones on the other 2 DNS servers. C. You will create a Standard Primary zone on all three servers. D. You will create Active Directory Integrated zones on at least two of the three DNS servers.
38. Your kids understand computers, but your spouse is an unholy terror at the keyboard. It is bad enough that you have to spend your whole day fixing user errors at work, you don't want to have to spend a lot of time doing it when you get home as well. You would like to configure your Windows 2000 home computer to automatically back up its configuration and repair information on a regular basis. How can you do this? A. By using a third party backup program to schedule a regular backup of the System State data. B. By using a third party backup program to schedule a regular backup of the registry and boot files. C. By using the Windows 2000 Backup program to schedule a regular backup of the System State data. D. By using the Windows 2000 Backup program to schedule a regular backup of the registry and boot files.
39. You work in a 10/100 switched environment and your administrative workstation has a built in 10Mbps NIC. Recently, you got hammered in the latest shooter game by that new kid they hired to work the help desk. The kid can't possibly be better than you, so you figure that you must have lost because he had a 100Mbps NIC. You decided to take money out of the "Repair and Maintenance" account and order yourself a new 100Mbps card to put in your machine. The NIC arrived today and you put it in, but it did not function properly. You viewed Device Manager and saw that it is conflicting with the other NIC card in your machine. You had hoped to have two working network adapters in your machine, but given the choice you would much prefer that the 100Mbps card worked. What should you do? A. Reboot to the Recovery Console and remove the driver for the 10Mbps adapter. B. Use Device Manager to set priorities for the two cards. Give the 100Mbps card the highest priority in the system. C. Use Driver Manager to remove the driver for the 10Mbps network interface card. D. Use Device Manager to disable the 10Mbps network interface card's device.
40. Your dad just got a new laptop. Did I mention that he hates computers? Hate might be an understatement. His new laptop came with Windows 2000 Professional on it and is driving him absolutely nuts. It is APM compliant and when he tries to shut it down, the Windows 2000 shutdown screen remains on the display and it stays powered up. The poor guy cannot even get it to shut off using the power button! What can you do to help? A. Reboot the computer. Enter BIOS setup and enable APM support. Save BIOS on exit and reboot. B. Reboot the computer. Open Power Options in Control Panel and enable APM support. Reboot again. C. Reboot the computer. Enter BIOS setup and disable APM support. Save BIOS on exit and reboot. D. Reboot the computer. Open Power Options in Control Panel and disable APM support. Reboot again.
41. You went into the network consulting field with dollar signs in your eyes. Somehow during the job interview they failed to mention that you would be spending your first two years with the firm in Russia, much less Siberia. You can't remember ever being so cold, and you really miss your family and friends back in the States.The company you work for does business all over the world. Being based in Russia, they run the Russian version of Windows 2000 Professional, however they also do business in most major Western languages. One of the users needs to create a document in both English and German. You are assigned to help her configure her system for the task. What do you do? A. You have her use the input locale indicator on the taskbar to select between the languages she needs. B. You have her use the Regional Options in Control Panel to add the English and German keyboard layouts/IME. C. You have her use the Regional Options in Control Panel to add the English and German input locales and keyboard layouts/IME. D. You have her use the Regional Options in Control Panel to add the English and German input locales.
42. You have managed to convince your husband that even the slightest wrong keystroke could result in utter disaster on your home computer. So far it has worked and kept him from snooping around where he doesn't belong. You figure as soon as he figures out how to program a universal remote, you'll consider giving him more end user lessons.Your home computer runs Windows 2000 Professional. It has a single hard drive that is formatted using NTFS. Your husband asks you to help him move a compressed folder from the root of drive C, and make it a subfolder of another folder that is not compressed. He wants the files to stay compressed and is very paranoid about something happening to the files during the move process. No doubt that paranoia stems mostly from the mind games you have played with him regarding the computer. What will you do to help him? A. You will back up the folder using Windows 2000 Backup and then move the folder to its new location using the compmove command at the command prompt. B. You will back up the folder using Windows 2000 Backup and then move the folder to its new location. C. You will back up the folder using Windows 2000 Backup and then copy the folder to its new location using Windows 2000 Explorer. D. You will back up the folder using Windows 2000 Backup and then copy the folder to its new location using the xcopy command from the command prompt.
43. Ok so maybe it's picky, but nothing drives you crazier than users downloading drivers off the Internet and installing them on their machines. Mostly because it means that you often have to go out and put the old one back on to get the system back up and running.As much as you have trouble believing it, one of your users has just called and actually asked for your help with installing such a driver. The guy actually came right out and said that he didn't want it to cause you any problems. You consider picking up a small gift for him on your way to his desk as a token of your thanks. When you get to his desk, what can you do to ensure that the driver he installed is compatible with Windows 2000? A. You can use File Signature Verification to ensure that the driver has a Microsoft digital signature and not install the driver if it does not have one. B. You can use the Microsoft Signature Verifier to ensure that the driver has a Microsoft digital signature and not install the driver if it does not have one. C.- You can use winmsd.exe to ensure that the driver has a Microsoft digital signature and not install the driver if it does not have one. D. You can ensure that the user downloaded the driver directly from Microsoft's website. If they didn't, do not install the driver.
44. It's bad enough you have to work in the office next to all of those network guys. They kind of scare you. They speak in a weird tongue only they seem to understand. No matter what time, day or night, weekday or weekend, they're always in the office. Now, the network administrator has chosen to redirect everyone's My Documents folder to each user's home folder. You are concerned that it will not always be accessible because you use a laptop and will not always be connected to the network. What two steps can you perform to make sure that you can always access all of your files in My Documents regardless of whether or not you are connected to the network? A. Enable offline files in Windows 2000 Explorer. B. Enable offline files using Offline File Manager. C. Alter the properties of your home folder to be available offline using Windows 2000 Explorer. D. Mark your home folder as available offline using Offline File Manager.
45. Being inherently lazy, you're always looking for the path of least resistance. You need to upgrade all of the computers in your domain from Windows 95 to Windows 2000 Professional. You have used setup manager to create an unattended text install script called unattended.txt. When you test the script, you discover that the monitors are blanking out after the machines install and boot to Windows 2000. If you start the system in safe mode it works fine. Which line do you change in your script file to ensure that the screen does not blank out? A. Xresolution under the [Display] heading B. Yresoulution under the [Display] heading C. Vrefresh under the [Display] heading D. BitsPerPel under the [Display] heading
46. Your coworker actually manages to keep a straight face as he actually gets your boss, Cristine, to believe that he was here all night installing Windows 2000 on the new systems. Yeah, sure, he went around and installed every system one at a time from scratch. You know this guy, he's the king of the late night gaming circuit. Judging by the number of empty Mountain Dew cans on his desk, most of the time he spent away from his desk last night no doubt involved trips to the bathroom.You snoop around a little and notice that one of the older servers has a new share on it. As it turns out the share houses the install files for the same operating system that your coworker was installing last night. You suspect that he was installing from the network, probably in an automated fashion. What three actions do you suspect he was using? A. You suspect that he created an unattended.sif file since all the computers were identical. B. You suspect that he created and used a DOS boot disk. C. You suspect that he created an unattended.txt file since all the computers were identical. D. You suspect that he used the winnt32.exe command with the /s, /unattend and /udf switches. E. You suspect that he used the winnt.exe command with the /s, /u and /udf switches.
47. "If an Active Directory tree falls in the forest, does it make a ..." Before you can finish your thought, your deep meditation is interrupted by the ringing of your support phone. You are a little upset because you feel that you were very close to a state of true Windows understanding and enlightenment. "What do you want," you snap as you answer the phone. So much for enlightenment.One of the junior administrators explains the situation. It is clear that she knows that she woke you up, again. She tells you that she is working at one of the servers that was upgraded from Windows NT 4.0 to Windows 2000. The system has three hard disks. Both the system and boot partitions are located on the first drive. The data from that drive is mirrored to the third drive in the system. The first drive in the system failed and she replaced it with another drive that she had in her bag. The other drive came from a Windows 2000 computer but when she tries to repair the volume the Repair Volume option is not available. What two different options do you provide her with for repairing the volume so you can return to your quest for oneness with Microsoft? A. On the new disk, the first drive in the system, delete all existing volumes. Then convert the disk back to a basic disk and repair the mirror volume. B. Break the mirror set and create a new mirror. C. Break the existing mirror set, then make the third disk in the system a dynamic disk. Create a new mirror. D. On the new disk, the first drive in the system, delete all existing volumes. And repair the mirror volume.
48. They finally let you hire a personal assistant. He is a younger version of yourself. He dresses like you, cuts his hair like you and at times even talks like you. Things are going great until you overhear one of the help desk clowns call your assistant "Mini Me". To show them he wasn't hired strictly for his good looks you gave the staff, including your assistant, the following problem to solve. Being brilliant (maybe "Mini Me" isn't such a bad name) your assistant was the first to get the correct answer. - Two domains: thebestests.com and nevada.thebestests.com.- Shared printer in the thebestests.com domain that members of the Writers domain local group can access.- Your account in the nevada.thebestests.com domain, which is a member of the CoolEmployees global security group.- You need to be able to print to the shared printer. How does he tell you to make it happen? A. He tells you to add the CoolEmployees group to the Writers group. B. He tells you to add the Writers group to the CoolEmployees group. C. He tells you to run addgroup.exe at the command prompt to add your user account directly into the Writers group. D. He tells you to convert the Writers group into a global group and to run addgroup.exe at the command prompt to add your user account directly into the Writers group. E. He tells you, "A man as handsome as yourself shouldn't worry about such trivial things."
49. "Wow check out this thing," your junior technician says to you while you are working in the server room. The "thing" he refers to is a SCSI card that might just be as old as he is. "I'll bet I could really give this system a boost by installing an updated driver," he says as he walks out of the room.The server runs Windows 2000 and when he comes back he tells you that the adapter isn't on the Windows 2000 Hardware Compatibility List (HCL), but that he did find an updated Windows 2000 driver for it on the manufacturer's website.When he reboots the system after replacing the driver he gets the following blue screen (GPF - STOP) error: "INACCESSIBLE_BOOT_DEVICE." What two things can he do to fix the problem? A. Reboot the computer and log in using the Last Known Good Configuration Profile. B. Boot the computer into the Safe Mode command prompt. Copy the old driver for the adapter to the system volume and to Ntbootdd.sys. Reboot. C. Boot the computer from the Windows 2000 CD and perform the emergency repair procedure. Then, reinstall the previous driver for the adapter. D. Boot the computer to the Recovery Console. Copy the old driver for the adapter to the system volume and to Ntbootdd.sys. Reboot.
50. It's not like you swerved to hit the darn car. You couldn't help the fact that it was right there in the middle of road. Maybe if you had a fewer number of shots of Everclear this wouldn't have happened. You can't help but think that life just isn't fair. You have been a loyal employee of this company for over 4 and a half months. You deserve more than this. Besides, with the bonuses the CIO makes, he can afford another Ferrari.As you finally make it down to your new office in the boiler room, you can't help but notice the sign on your door with your new title: Printer Tech. It's enough to make a grown man cry. You look at the list of tasks awaiting you on your desk and the first one is a killer. You are to configure a print server named printers.thebestests.com as a print server in the Nevada offices, and install and share a number of printers from the server.Employees from all over the state will be using the printer, including users from the following domains: reno.thebestests.com and lv.thebestests.com. You travel to all of the offices and won't always be at the print server to check on the status of the attached printers. You suspect that it would be a very good idea for you to spend as much time away from HQ as possible for awhile. How will you be able to monitor the shared printers while you are away from the server? A. By using the web and connecting to the server with the following URL: http://printers.thebestests.com/printers B. By using the web and connecting to the server with the following URL: http://printers.thebestests.com C. By using the web and connecting to the server with the following URL: http://printers.thebestests.com/shares/printers D. By using the web and connecting to the server with the following URL: http://www.thebestests.com/printers
51. "Hmmm," you say looking over the tech's shoulder. She is trying to monitor the performance of all applications running on the user's machine. The user has several 32-bit applications and three 16-bit applications open. One of the three 16-bit applications is configured to run in a separate memory space.The tech had no problem setting up System Monitor to view the Process:% Processor Time performance counters of the 32-bit applications but cannot seem to find the 16-bit ones to add to the chart. What do you tell her? A. You tell her to look for and add the ntvdm instance of the % Processor Time counter for the Process object, and to select the sub-instances for the three applications. B. You tell her to disable the 16-bit application filter from the Action menu. C. You tell her to enable the 16-bit application filter from the Action menu. D. You tell her to look for and add the ntvdm and ntvdm#2 instances of the % Processor Time counter for the Process object.
52. You made the fatal error of letting your boss know you had once taken a Citrix class. Your company wants to use Windows 2000 Terminal Services to make an application available to users at Windows 3.11, 95, 98, NT and 2000 computers. He figures Citrix is close enough to terminal services in Windows 2000, so guess who gets the project? The application is used for call tracking in the sales department and runs 24 hours per day. Data that the application collects is available to all shifts. The company wants the users to be able to shut down their computers at the end of their shifts but still allow the application to run on the Terminal Server. A. Configure the Remote Desktop Protocol (RDP) on the server to override user settings. B. Configure the Remote Desktop Protocol (RDP) on the server to override user settings. Also, set the End disconnected sessions setting to Never. C. Configure the Remote Desktop Protocol (RDP) on the server to override user settings. Also, set the End disconnected sessions setting to When Logging Out. D. Install Citrix MetaFrame on top of the Windows 2000 server that is running Terminal Services. Publish the program.
53. "Daddy," you can hear the tears in her voice as she rounds the corner to your room, "it did it again." "I'm sorry sweetie," you say as you get up to take a look. Sure enough the darn thing locked up again. You think back and realize that the problems must have started when you installed that new modem. It was a Plug and Play device and Windows 2000 detected it and installed a driver for it with no problem, but since then things just haven't been right. You reboot the computer, get back on the Internet and download an updated driver. What you do next? A. Open Device Manager and go to the Properties dialog box for the modem. Click the Update Driver button. B. Open System Manager, delete the current driver and reboot the system. On reboot when Windows 2000 detects the modem, specify the new driver. C. Open Driver Manager and go to the Properties dialog box for the modem. Click the Update Driver button. D. Open Driver Manager, delete the current driver and reboot the system. On reboot when Windows 2000 detects the modem, specify the new driver.
54. Rubbing your eyes and yawning, you realize you must have nodded off. It's been awhile since you've had to pull an all nighter. You are installing a bunch of new Windows 2000 Professional clients on the network. You have a Windows 2000 network with Active Directory, DNS and WINS servers. The systems that are being installed are PXE compliant so you decide to use Remote Installation Services (RIS) to perform the install. You create the image, upload it to the server and boot the new systems. For some reason they fail to connect to the RIS server. Existing clients have no problem connecting to the RIS server. You promised your boss and all of the department heads that this little upgrade wouldn't cause any disruptions. People are going to start arriving for work in less than two hours. What can you do to resolve the problem? A. Disable PXE support in BIOS. B. Install a DHCP server on the network. C. Boot the computers from a PXE compliant RIS boot disk. D. Boot the computers from a DOS boot disk with the MS-DOS network client on it.
55. Yesterday you were a travel agent. Today you are the new full time administrator of the organizational unit (OU) for the local travel office you work in. Welcome to the IT business! Hope you like reading a lot of really boring books.The OU for the office has been delegated to you. For your first task, the home office assigns you the job of redirecting the My Documents folder on users' computers to use a network share. Specifically, the same network share that they use for their home folder. The users' home folders are located under the path \\server2\users. How will you accomplish this? A. Use a new Group Policy Object (GPO) to redirect the My Documents folder. Point it to the path: \\server2\users. B. Use the properties of My Computer on each of the systems you administer. On the General tab select the Move button. In the Browse for Folder dialog box that appears, select the new location and click OK. C. Use a new Group Policy Object (GPO) to redirect the My Documents folder. Point it to the path: \\server2\users\%username%. D. Use the properties of My Documents on each of the systems you administer. On the General tab select the Move button. In the Browse for Folder dialog box that appears, select the new location and click OK.
56. You are sick and tired of surfing the Internet through your lousy 56K connection. Work has a T1 and a modem bank so you decide to install two more modems in your computer and have a couple of extra phone lines installed. Why pay to connect at 56K though your ISP when you can connect at 150K+ through work for free! You install the modems and configure Multilink, however when you dial out only one modem connects to the remote access server at work. What do you need to do to claim your bandwidth? A. Install Multilink drivers for your modems. B. Configure Multilink on the remote access server at work. C. Configure your dial-up networking settings to disable LCP extensions. D. Configure your dial-up networking settings to disable hardware handshaking.
57. You knew the upgrade wasn't going to be easy. Your clients truly span the ages. Some are PXE compliant, some are not. You decide to use Remote Installation Services (RIS) to deploy your Windows 2000 Professional clients. You create your RIS image, upload it to the server, and boot all of your systems.The computers that are not PXE compliant cannot connect to the RIS server. What needs to be done to ensure that they can connect and download an image? A. You need to make a non-PXE compliant startup disk using the Rbfg.exe utility. B. You need to make a non-PXE compliant startup disk using the RIPrep.exe utility. C. You need to make a non-PXE compliant startup disk using the RIPBoot.exe utility. D. You need to use a DOS boot disk with network support and use it to connect to the RIS server.
58. A user wakes you up from your afternoon nap by telling you that one of your servers is responding very slowly. You mumble, "It's just old," and go back to sleep with the phone receiver still in your lap. You wake up completely refreshed around 4 p.m. and grab your coat as you head for the door.Just as you get to your car you remember the call and it dawns on you that the problem is on one of your new Windows 2000 servers. You momentarily consider returning to the office and having a look at the problem. "What was I thinking," you say to yourself as you head home. The next morning you decide to check it out first thing after lunch. It turns out that the RAID 5 volume shows the status of the fourth disk in the array as Missing. You poke around a bit more with Disk Manager but don't see anything else wrong. What will you do next to resolve the situation? A. Make sure the fourth disk drive is plugged into the server and powered up. Select and restore the drive in Disk Manager. B. Make sure the fourth disk drive is plugged into the server and powered up. Select and reactivate the drive in Disk Manager. C. Make sure the fourth disk drive is plugged into the server and powered up. Break and recreate the RAID 5 volume in Disk Manager. D. Make sure the fourth disk drive is plugged into the server and powered up. Reboot the server.
59. Oh WAH! Like a great man once said, "There's nothing wrong with a network that the elimination of users couldn't fix." Brilliant man. Definitely ahead of his time. Yesterday, users complained when they couldn't get their email. WAH! Today they are complaining one of your file servers is running a little slow when they access their home folders. WAH! WAH! WAH!You decide to take a look at the server in question. It is a Windows 2000 box with tons of processor and memory. The disk size is adequate and formatted with FAT32. You check the network logs and see that there has been no increase in usage since you put the server in a year ago. What can you do to speed up user access to files? A. Upgrade the drive to NTFS5 and make it a dynamic disk. B. Upgrade the drive to HPFS and make it a dynamic disk. C. Defragment the drive. D. Compress the drive.
60. Get around, get around, you get around. You are the lone ranger. A masked administrator driving your trusty Ford Pinto to your company's offices all over town. Every now and then you run into a therapist that tries to convince you to remove the mask because, they say (usually with a snicker), driving a Pinto is nothing to be ashamed of. You've opted to keep the mask.Not being the swiftest cowboy in the west, you keep a file of passwords for all of the systems at the various offices. You keep the password file in a folder called, you guessed it, "Passwords" in your home folder. You want to ensure that the information stored in this folder is secure and that you can access it from every office you visit during the day. All offices are connected to the same network and are using the same Windows 2000 domain. What can you do? A. Select the PGPEncryption attribute in the properties of the Passwords folder. B. You can have your account use an administrative profile and select the encryption attribute in the properties of the Passwords folder. C. Select the encryption attribute in the properties of the Passwords folder. D. You can have your account use an administrative user profile and select the PGPEncryption attribute in the properties of the Passwords folder.
61. You cannot count how many TV's you have put a bullet in since the Microsoft antitrust trial. Why? Because you live in mixed server hell! You can't imagine that any other vendor could get you out of it except Microsoft and now fear that all hope is lost.Your latest problem occurred today when you put in a new Windows 2000 server and installed Gateway Services for NetWare (GSNW). For some reason, it cannot communicate with the NetWare 4 servers on your network. Your current Windows 2000 (GSNW) servers communicate fine with the NetWare servers on your network. What do you need to do to this new server to get it up and running properly? A. Reconfigure frame type on the NWLink protocol so that it uses 802.11. B. Reconfigure frame type on the NWLink protocol so that it uses the correct Ethernet frame type. C. Enable IPX Rip multicasting. D. Uninstall GSNW. Install Client Service for NetWare (CSNW). Then Reinstall GSNW.
62. It has been so slow recently in the server room that it was one of those rare days where you went looking for problems instead of them finding you. One of the computers you are responsible for runs a transactional database system. The system uses log files and writes many of them to disk. The files are generally on the system for only a few minutes before they are deleted. After monitoring this computer for a period of time, you learn that the disk subsystem is a significant performance bottleneck. You purchase and install a new SCSI adapter and four new 50GB disks. You are preparing to setup the disks and you want to make sure that all 200GB of space is available through a single drive letter. You also want to optimize the disk configuration for speed. What do you do? A. You convert each of the disks to dynamic disks and make a striped volume. B. You make a striped set. C. You convert each of the disks to dynamic disks and make a RAID 5 volume. D. You convert each of the disks to dynamic disks and make a spanned volume.
63. You got an inkling you were in trouble when they called you to corporate headquarters to spearhead a new, very high profile project. The first clue, they put you up at the Bates Motel. You haven't showered in weeks. The project is a killer and will be a career maker or breaker. You have been assigned the role of project lead for the enterprise wide conversion to Windows 2000 at a Fortune 50 company. The company has one domain worldwide with hundreds of domain controllers in service. The CTO has mandated that none of the existing servers will be used as the first Windows 2000 domain controller. Instead, they have ordered one beast of a new box from a major computer manufacturer. How will you install Windows 2000 on it and make it the first Active Directory domain controller? A. First, you will install the server as a Windows NT 4.0 BDC for the company's domain. You will then promote the server to the PDC and upgrade it to Windows 2000. B. You will permanently remove the current PDC from the network. You will then install Windows 2000 on the new server and use dcpromo.exe to upgrade it to a domain controller for the existing domain. C. First, you will install the server as a Windows NT 4.0 PDC for the company's domain. Next, demote the previous PDC to a BDC. Finally, upgrade the new server to Windows 2000. D. You will install Windows 2000 on the server and have it join the domain. Then you will run dcpromo.exe to upgrade the server to a domain controller. In server manager on the current PDC, you will select the new server, and select Promote to Primary Domain Controller.
64. "Don't do it." "Yeah, I wouldn't do it chief." "Definitely not big guy." You click the button anyway and explain, "Look, fellas, it has to get done." "You really shouldn't have done that chief," one of them says in response.The voices in your head normally are not THIS strong and unified. You wonder if you have just made a terrible mistake. Still you don't see how you had any choice. Cristine, one of your employees, needed access to the Exchange server to do some light configuration tasks in your absence.She is a member of the Supervisors group. The Supervisors group does not have administrative access to the server. Another group, the Server Administrators does. A week later you come back from vacation and find that an unauthorized service pack install has been done on the server, and that the Exchange databases are totally corrupt. What did you do before leaving that you now regret? A. You removed Cristine from all groups and made her account a security equivalent to the administrator account. B. You made Cristine a mail administrator. C. You removed Cristine from all groups and made her account a security equivalent to your account. D. You made Cristine a member of the Server Administrators group.
65. You try to offset your enormous IT salary with charity work in hopes that your time can be written off your taxes. One of the places you volunteer at is your church. It only has one computer, a Windows 2000 Professional system you installed recently.You have added the church's pastor to the Administrators group. Much to your dismay, other members of the church staff report that they think the pastor has been going through and looking at all their files. Some users have even reported changed files.You decide that you had better remove the pastor from the administrators group. However, he has been helping you out by administering the printers and performing backups. How can you set the computer up so that he can continue to perform these tasks but not snoop around and change other people's files? A. Take the pastor's account out of the local Administrators group. Add his account to the Server Operator and Backup Operator local groups. B. Take the pastor's account out of the local Administrators group. Add his account to the Power Users local group. C. Take the pastor's account out of the local Administrators group. Add his account to the Backup Operators and Power Users local groups. D. Use NTFS permissions to lock the pastor out of all files except his own. Configure auditing to pop up a message box that says, "This is GOD. I'm watching you and am very disappointed," if he tries to access a file or folder that he does not have access to.
66. You have always wondered if it is possible to make network traffic go so fast that you could hear it whiz by in the cable. With this goal in mind you set about modifying the registry to make it happen. You modify the size of your TCP window size. You also remove several keys from the registry size that you feel are the catalytic converter of the TCP/IP stack, there only to slow it down. Much to your horror, when you reboot the computer it locks up at the logon screen. What is the best way to fix this? A. Reboot the system and use the Last Known Good Configuration. B. Boot from the CD and select the Repair option. Go into the Recovery Console and launch regedt32.exe. Put the keys back that you deleted. C. Boot from the CD and select the Repair option. Go into the Recovery Console and use regcompare.exe. D. Boot into safe mode and stop and restart the server service.
67. After another night of fighting, you realize that your spouse will never understand that sometimes you need to go into the office at 2a.m. to fix a network problem. As if the nice clothes, nice house, nice toys and nice cars weren't reason enough. Sheesh!Then it hits you. If you could just dial in from home, you could do your work and pass it off as an extra-long, midnight bathroom visit. Your spouse is used to that. The next day you get it all configured and boy does it pay off that evening. The CEO (who never seems to go home) pages you with a printing problem. You dial into the network and quickly determine the print spool on his computer is on a drive that is low on space. You need to move it from drive C: to drive D:. How will you tell him to do this on the phone? A. You will tell him to open the Print Server Properties dialog box and change the location of the spool folder to any path on drive D: that currently exists. B. You will tell him to open the Print Server Properties dialog box and change the location of the spool folder to a new path on drive D:. C. You will tell him to place a pointer in the file system where the current print spool is located that redirects all files to drive D:.
68. How disappointing! You had just gotten the email back from the Smithsonian that they would love to have the old printer (named AcctgPrinter on the network) that bookkeeping has been using for the last couple of hundred years. They were going to put it between an Atari 64 and an old Magnavox "Odyssey" console in their collection of still functional, odd and unusual early 20th century electronic equipment. Unfortunately this morning AcctgPrinter, which was attached to the AcctgPrint server died a horrible death that involved, among other things, a small fire and some second and third degree burns. To make matters worse, several key documents are still waiting in the queue to print to the printer. You would like to redirect those documents and all future documents that are sent to \\AcctgPrint\AcctgPrinter to \\SalesPrint\SalesPrinter. You do not want users to have to reconfigure their computers to have this happen. What can you do? A. In the properties of SalesPrinter, add a port with a path set to \\SalesPrint\AcctgPrinter. B. In the properties of AcctgPrinter, add a port with a path set to \\SalesPrint\SalesPrinter. C. Remove the AcctgPrinter share from the network. D. In the properties of SalesPrinter, add a port with a path set to \\AcctgPrint\AcctgPrinter.
69. Maybe it was all of the X-File episodes, but lately your motto has been, "Trust No One." After all, just because you're paranoid doesn't mean they're not out to get you. After extensive browsing of TextFiles.Com, you decide others shouldn't view the documents you have saved. You are running Windows 2000 Server because of all the network monitoring you do. You store your files within your home folder on the NTFS partition that has EFS enabled. They should be fairly safe, you think, although you are a tad worried after coming back from this year's DefCon. You decide that you would like to be able to review the information contained in those files after you log off the system and take your laptop home. So, you enable offline files on your computer. When you get home you discover that your files are not available offline. What else do you need to do the next time you are in the office so that your files will be available to you when you are not connected to the network? A. You need to make copies of the files and store them in the local SYSVOL folder on your Windows 2000 Professional machine. Windows 2000 File Replication Service (FRS) will then keep them synchronized. B. You need to select to make all of the files available offline. C. You need to copy the files you want to be available offline to the briefcase icon on the Windows 2000 desktop. D. You need to manually sync all offline files.
70. Sleep deprivation can become a way of life, especially in the IT field. You've been up so long that the same people who clocked in with you yesterday are clocking in again. You've been up all night with a server problem. Aren't the lights on the hubs flashing in an interesting pattern?Just as you start to break the ends off of toothpicks to use as props to keep your eyes open, one of the early birds approaches you and says they are having trouble accessing a share on the server you were working on last night. You know you messed around with the permissions and figure you might have set them wrong. You can't remember your own name at the moment much less the file system path to the share, what is a quick and easy way to find it? A. Use Share Manager in the Computer Management console. B. Use My Network Places, enable the Display File System Path option. C. Use Share Manager in the Accessories, System Tools folder on the Start menu. D. Use System Tools in the Computer Management console.
71. You are sitting next to a Microsoft employee on the bus going from your hotel to the convention. You usually try to avoid eye contact with anyone wearing a Microsoft golf shirt until you determine if they're marketing or tech. The guy strikes up a conversation with you about Windows 2000 and mentions that he hasn't rebooted his laptop in months. You laugh and assume he's another marketing guy making claims that can't be backed up. He goes on to explain a new feature in Windows 2000 that actually saves the contents of memory to the hard drive before the computer powers off. Then, when the system is turned back on, the system returns to the exact state it was in before you powered down."Wow," you actually hear yourself say out loud. Later that evening when you got back to the hotel, you configure your system to use the feature. Now, it has been a good month or so since you powered down your system as well. The best part is that it really saves on battery life because it makes the power down and power up events much faster. You have even managed to configure your computer to do this when you pressed the power switch. How did you do this? A. You configured the Standby option. B. You configured the Power Down option. C. You configured the Hibernation option. D. You dreamed it all up, even Microsoft can't come up with something this cool.
72. Carl the caveman recently decided to join the modern era and installed Windows 2000 Professional. Today, he poked his head out of his cave just long enough to install a sound card. When he rebooted his system, it would not load Windows. By the time you found him, the computer had already received a few whacks with his club. You say, "Club bad, safe mode good," and show him how to boot into safe mode. What now? A. Open the case and remove the sound card. B. At the command prompt type Disable Sound. C. Enable Driver Signing. D. Use Computer Management to disable the sound card driver. E. Let Carl give it another whack for good measure.
73. Some bonehead installed an application that uses detailed logging to the system partition of your main Windows 2000 server. The hard drive in the system has two partitions, and the second partition is mostly empty. You cannot afford the down time necessary to move the application, and the application itself does not allow you to change the path it logs to. Currently it logs to C:\logs. What can you do to resolve this issue? A. You can add another hard disk, create a partition on it, format the partition, and mount it as F:. Then, create a logs folder on drive F: and place a shortcut to it on C:\. B. You can delete everything from the C:\logs folder, then add another hard disk, create a partition on it, format the partition, and mount it as a subfolder of the C:\logs folder. C. You can add another hard disk, create a partition on it, format the partition, and mount it as the C:\logs folder. D. You can delete everything from the C:\logs folder, then add another hard disk, create a partition on it, format the partition, and mount it as the C:\logs folder.
74. Who would have thought it? You would have never guessed that there would be such a huge market for plastic toilets that dispensed corny advice when you pulled the handle. Your company has experienced rapid growth recently and has decided to add all new computers to a new, second, subnet. You are installing Windows 2000 on the first computer on that subnet. During the installation, you accept all defaults.All network services, including DHCP, DNS, WINS, and Active Directory are located on the other subnet. When your new computer reboots after installation, you learn that you cannot access the network. You run IPCONFIG and learn that your IP address is 169.254.12.165 with a subnet mask of 255.255.0.0 and no default gateway. You double check the scope that you configured on the DHCP server for this subnet and see that it is configured correctly and activated. What two things can you do that would ensure that this new computer could gain access to network resources? (Choose two) A. Have all routers be configured to route BOOTP broadcast frames. B. Have all routers be configured to route broadcast frames sent to Port 2231. C. Install a computer with a DHCP Relay Agent on the older segment. D. Install a computer with a DHCP Relay Agent on the new segment.
75. You had a job in college as a janitor for the NSA so your company assumed that makes you qualified for the new security administrator position. Somehow you just don't feel that the three months of training you went though, five years ago, on inspecting toilet paper for written notes that might be classified information has prepared you for the job.Nonetheless, here you are and you need to add a custom registry entry to a Group Policy Object (GPO) for security purposes. Needless to say, you want to expend as little effort as possible doing it. What will you do? A. Make and add an .adm template to the GPO. B. Make and add a .wmt file to the GPO. C. Make and add a .wmi file to the GPO. D. Make and add an .adt file to the GPO.
76. Just once you'd like to sit in on a corporate board meeting. You would love to hear exactly how they rationalize never upgrading any equipment or software while giving themselves huge bonuses. On second thought, maybe you picked the wrong career path. The board of directors has a pretty good gig working for themselves. Your company wants to use Windows 2000 Terminal Services to make an application available to users at Windows 3.11, 95, 98, NT and 2000 computers. The IS staff needs to be able to take control of, and/or view users sessions in order to support the application. How will you enable this? A. At the Terminal Server, you will grant the IS group the Interact with users remote desktop right in the Remote Desktop Protocol (RDP) settings. B. At the Terminal Server, you will grant the IS group Full Control permission to the Remote Desktop Protocol (RDP). C. You will install Citrix MetaFrame 1.8 and use the shadowing feature. D. This cannot be done using Terminal Services. You must install Systems Management Server (SMS) to enable this level of support functionality.
77. One administrator, 250 locations. Well, not quite but that's what it feels like sometimes. Because of the workload, you frequently have to delegate some of your responsibilities to users at offices that are too far away to travel to regularly. One such user is at an office that connects to the Internet by using Internet Connection Sharing. The former "network helper" at that location was just transferred and this new guy volunteered for the task. The first task you assign him is to run Windows Update for the local file server. He does as instructed but receives a message stating that access was denied. What will you tell him to do so that he can successfully run Windows Update? A. You will tell him to log on using your administrator account. B. You will have him configure Internet Connection Sharing to allow the LDAP protocol. C. You will grant him local administrative privileges on the server. D. You will configure the server to allow the user to log on locally.
78. One day they'll have DSL available locally or maybe you'll get rich enough to afford your own T-1. Until then you decide to add a second modem to your system. Your old modem is an ISA modem. It does not have Plug and Play (PnP) technology built into it. Your new modem, however, is a PCI based PnP modem. When you restart the computer the modems do not work properly. You look in Device Manager and see that they are both trying to use IRQ 5. What can you do to fix this problem? A. Configure the computer's BIOS (also known as CMOS) to reserve IRQ 11 for devices that do not use Plug and Play. B. Change the IRQ for the older modem to 11 using Device Manager. C. Configure the computer's BIOS (also known as CMOS) to reserve IRQ 5 for devices that do not use Plug and Play. D. Change the IRQ for the new modem to 11 using Device Manager.
79. You can't count how many times you've walked through a company and thought, these folks have no idea what they are in for. You are a technology assessment specialist for a consulting company that specializes in buyouts. Nothing pleases you more than a job well done where thousands of people get fired in the name of "synergy". In fact you love the word. You love every form of the word, especially "synergistic".The nature of your work requires you to access systems in a number of different offices. You do not carry a laptop, instead you log on to available systems wherever you can find them. Because of this you need access to your files from any location. You are also frequently required to store very sensitive information in your folders and need to protect the information from prying eyes. What will you do? A. You will configure your account with a roaming profile and run secpol.exe to enable the maximum amount of security for your account. B. You will configure your account with a roaming profile and make sure you use a password that is eight characters or longer. C. You will configure your account to have a roaming profile and enable the encryption attribute for your folders. D. You will configure your account to have a roaming profile and use PGP to encrypt the information in your folders.
80. You have spent the day pulling your hair out while trying to make one of your existing Windows 2000 servers into a print server. You installed a second printer on LPT2 but now cannot print to the device. It worked fine earlier. LPT2 is not a Plug and Play port. The only change you made was installing a second network adapter in the system. You view device manager and see that the new network adapter is using IRQ5 and is conflicting with another device. What do you need to do to fix this? A. At the server, you need to edit the BIOS (also known as CMOS) settings and reserve IRQ10 for non Plug and Play devices. B. At the server, use Device Manager to change the resource allocation of LPT2 to IRQ1. C. At the server, use Device Manager to change the resource allocation of the second network adapter to IRQ1. D. At the server, you need to edit the BIOS (also known as CMOS) settings and reserve IRQ5 for non Plug and Play devices.
81. You would have thought you would have known better by now. The first rule of keeping a network functioning: If you've got kids who know their stuff and are willing to work cheap, don't do anything to make them mad. What do you care what the kids do in the middle of the night as long as they get their work done? Especially when you're only paying them two bucks above minimum wage. What possessed you to tell all of your overnight trolls that you wanted them to lay off shooter games during company time. You should have known kids that sharp were only working here because you have a T-3. So, here you are installing Windows 2000 onto a high-end graphics workstation instead of delegating the task. The workstation has a SCSI controller that is not on the Windows 2000 Hardware Compatibility List (HCL). You make it through the text mode portion of setup without incident and reboot. Instead of beginning the graphical portion of the setup process, you get the following error:INACCESSIBLE_BOOT_DEVICEWhat two things must you do to successfully install Windows 2000 on this computer? (Choose all that apply) A. Begin setup again by booting from the Windows 2000 CD-ROM. B. Boot the computer using a DOS floppy disk that contains the driver and copy the driver over to the new computer. C. Boot the computer using a Windows 98 boot disk that contains the driver and copy the driver over to the new computer. D. Provide a driver for the adapter from a floppy disk.
82. Amazing. You finally got the approval from the bean counters for some mission critical software. You're feeling so lucky you go out and buy $20 worth of Powerball tickets. When your numbers don't hit, you reluctantly go back to work. You want to deploy and update your key office productivity software package on all Windows 2000 computers the next time a user logs into the domain. How will you do this? A. You will use a Windows Installer package for the upgrade and assign the package to a startup script. B. You will use a Windows Installer package for the upgrade and assign the package to a local group policy on each computer in the domain. C. You will use a Windows Installer package for the upgrade and assign the package to a local computer policy on each computer in the domain. D. You will use a Windows Installer package for the upgrade and assign the package to a group policy that affects all users.
83. "Cool," you exclaim as you look at the server. "This is one of those new 8 way (eight processor) models isn't it?" you ask. You've been wanting to put Windows 2000 on one of these babies and see how it performs. It turns out that the computer is so specialized that the manufacturer had to create and ship a custom Hardware Abstraction Layer (HAL) with it. How will you install Windows 2000 and ensure it is configured to use this custom HAL? A. You will install the HAL during the text mode part of the Windows 2000 setup procedure. B. You will use Add/Remove Hardware in Control Panel to add the HAL after installation. C. You will install the HAL during the graphical part of the Windows 2000 setup procedure. D. You will press F11 at the beginning of the install. You will then specify and install the HAL. E. You will copy it over after the installation using Windows 2000 Explorer and reboot the system. F. You will copy it over after the installation using xcopy.exe from the command prompt and reboot the system.
84. The CEO, after receiving a warning from the legal department about a pending EEO complaint, stuck his head in Human Resources and shouted, "We need more people here with nose rings and tattoos on their faces." Much to your good fortune you had walked in the door and started filling out an application just moments before. The HR drone interviewing you looks at the stud in your left nostril and tattoo of a flying dragon on your left cheek and asks, "When can you start?"The company didn't really care what your skills were when they hired you because of your appearance, however it has turned out that you are a pretty darn good security consultant. Recently you applied the highly secure domain controller template to the main TBT Active Directory server, TBTDC1. At the time, that seemed fine. You also renamed the server to WARGODS. That seemed less fine, but people were too fascinated by your latest nose ring to remember to bring it up when you were around. TBT has two domains, one runs Windows 2000 and the other runs Windows NT. Ever since you applied that security template users in the Windows NT network haven't been able to access resources on WARGODS. What do you need to do to fix the situation? A. On the WARGODS server, apply a less restrictive security template. B. On the WARGODS server, apply a less restrictive Security Policy Object (SPO). C. Verify the trusts between the two domains by using Active Directory Domains and Trusts. D. Verify the trusts between the two domains by using trstver.exe at the command prompt.
85. On days like this, you earn your impressive salary. You stroll into the server room and see your entire staff staring at monitors and scratching their heads. You are running a mixed network. All of your servers are Windows 2000 based, but only half of your client systems are. The other half of your clients are Windows NT 4.0 Workstation based.Your Windows NT client systems are having problems connecting to TBTSRV1, a Windows 2000 based file server. All clients on the network are configured to use TBTWINSDNS, a Windows 2000 server that doubles as both a WINS and a DNS server. TBTSRV1 uses statically assigned addressing. You examine the TCP/IP property settings and discover that TBTSRV1 is configured to dynamically register with the DNS server and that it also is configured to use the DNS server for name resolution. Its IP address, Subnet Mask, and Default Gateway settings all appear correct. On the WINS tab, you note that NetBIOS over TCP/IP is disabled. What do you tell your baffled staff they need to do to resolve this communication problem? A. On the WINS tab, select the NetBIOS setting from the DHCP server radio button. In the WINS addresses section, add the address of the WINS server in use by clients on the network. B. On the WINS tab, select the NetBIOS setting from the DHCP server radio button. C. On the WINS tab, select the Enable NetBIOS over TCP/IP radio button. In the WINS addresses section, add the address of the WINS server in use by clients on the network. D. Add a LMHOSTS file to the server that has the address of the WINS server in it. On the WINS tab, select to Enable LMHOSTS lookup.
86. Let's face it, in life you have winners and losers. Well, your network has a segment for each. Each segment has a number of clients and servers located on it, including an Active Directory server, a DNS server, and a DHCP server. Clients normally obtain addressing information from their local DHCP server. You want to enable users to be able to obtain addressing information from either DHCP server. The router is not RFC1542 compliant. How can you accomplish this? A. Configure a server on each subnet to act as a DHCP Relay Agent. Point the Relay Agent to the DHCP server on the same subnet. B. Configure each DHCP server to use conjunctive scopes. Configure each with the other DHCP server as its partner. C. Configure a server on each subnet to act as a DHCP Relay Agent. Point the Relay Agent to the DHCP server on the other subnet. D. Configure each DHCP server to use shared scopes. Configure each with the other DHCP server as its partner.
87. You have just switched jobs and joined a new company. After a week of prodding and probing in the server room you discover that users on your new network cannot browse network resources on segments other than their own. Apparently the last network administrator told the users that it was not possible to configure the network to allow them to access other segments. And, they bought it without a whimper! If these users are that passive, you figure you've got a job for life.You check the network and determine that each segment has its own WINS server and that clients are configured to use the WINS server on their local segment. The WINS servers seem to be functioning properly. What can you do to ensure that clients can browse resources on any network segment? A. Implement LMHOSTS files on all clients. B. Implement LMHOSTS files on all clients and servers. C. Configure all WINS clients to use a singe WINS server. D. Set up the WINS servers to replicate their databases to each other by configuring them as replication partners of each other.
88. You are on the first vacation you have taken in three years. As you gently sip your margarita and watch your family frolic in the pool, you are jolted back to reality when your pager goes off. It seems that the WINS server back in your office has failed and disrupted most network communication. For a moment you think to yourself "How unfortunate that the pager accidentally fell into the pool earlier in the week". But, alas, responsibility takes hold and you drive into the office.When you arrive you are greeted like a returning war hero. The office is in total chaos and you are their only hope. Hum, might be a good day to ask for that salary increase. You decide to wait and see if you can actually fix the problem first before asking for more money. You quickly realize that the WINS server has suffered severe hardware failure that appears to have damaged the system board, disk drives, and network adapter. You replace the defective components and restore the server and WINS database from last week's backup. With visions of the pool, your family, and a few more dollars in your pay envelope you head for the door when a user stops to tell you that she cannot browse any segment on the network except for hers. You check around and determine that other users are having the same problem. What else needs to be done so that you can get back to your vacation? A. Call tech support and ask where the "any key" is. B. Stop and restart the WINS service on the server. C. At the command prompt, run the NBTSTAT -RR command on the clients. D. Initiate the Verify Database Consistency command in WINS on the server.
89. Your staff keeps getting younger as you age exponentially. Most of them think "DOS" is Spanish for "Two" and Novell is a French romance novel. Your network consists of a single network segment with a connection to the Internet. The network is mixed and includes Windows 2000 and NT 4.0 clients. All clients are members of a single domain. The network consists of both NetWare and Windows 2000 servers.You do not have many NetWare servers left. To make it easier for the children you have to baby-sit, you have decided to uninstall the NetWare redirector from the client systems. To provide access to the remaining NetWare based resources, you have installed a Windows 2000 server with two network adapters and Gateway Service for NetWare (GSNW) installed. You want one adapter in the machine to only be used in communication between Microsoft Windows based clients and the server. You open up the Local Area Connection Properties dialog box. Which options should you enable on the adapter? (Choose all that apply) A. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol. B. Client for Microsoft Networks. C. File and Printer Sharing for Microsoft Networks. D. NWLink NetBIOS. E. Network Monitor Driver. F. Internet Protocol (TCP/IP).
90. Human Resources couldn't understand why you were upset. HR thought a 3% cost of living adjustment was more than fair, most departments only received a 2% raise this year. You begged. You pleaded. You even tried to explain to them how competitive the local job market was and that you really didn't want to rebuild the company's IT staff from scratch, again. "Don't worry," the ever perky Cristine in HR said. "We have a Job Fair scheduled next month. I'm sure there will be tons of people there who will find our starting salary and benefit package very interesting." Interesting wasn't the right word. Laughable, ridiculous, insanely low all come to mind. So, you're sitting at a Job Fair talking to the only two people within a five state radius who didn't walk away from your table doubled over laughing. You have to hire one of them so you decide to give them a problem to solve. To your great surprise, the one with railroad spikes in his blue hair got it right. Your network consists of several domains, all in the same forest. The forest has three trees: na.thebestests1.comasia, thebestests2.comeurope, thebestests3.com. Beneath each of these is a standardized administrative domain structure that includes domains for Sales, Engineering, and Accounting. The Engineering domain in each tree has additional child domains called Development and IT. You are working on applying a service pack to some software used by the IT staffs in the na.thebestests1.com and europe.thebestests3.com trees. You plan on using a group policy to deploy and maintain the service pack. You have configured a Windows Installer package for the service pack. You don't want to deal with a lot of cross-domain traffic during the deployment. What do you need to do to configure the group policy? A. Add the Windows Installer package to a group policy and apply the group policy to the engineering.na.thebestests1.com and engineering.europe.thebestests3.com domains. B. Add the Windows Installer package to a group policy and apply the group policy to the it.engineering.na.thebestests1.com and it.engineering.europe.thebestests3.com domains. C. Add the Windows Installer package to a group policy and apply the group policy to the na.thebestests1.com and europe.thebestests3.com domains. D. Add the Windows Installer package to a group policy and apply the group policy to the sites that house the it.engineering.na.thebestests1.com and it.engineering.europe.thebestests3.com domains.
91. Bless all of the software and hardware companies. If not for these wonderful folks with their never ending stream of "improvements", and all of the new problems they create, you'd probably have to go find real work. Every couple of years they come out with all new stuff and you end up trashing the hardware and software that 3 years earlier was state of the art. Talk about job security. The only downside is that sometimes they actually expect you to make the software work with the hardware you already have. This was one of those occasions. You are using group policy to configure a mixed Windows NT and 2000 network. The domain runs in native mode. All computers have been placed in the Computers organizational unit (OU), and all users have been placed in the CorpUsers OU. You have applied a Group Policy Object (GPO) to the CorpUsers OU that restricts a number of environmental options such as their ability to change their wallpaper. You have also removed My Computer from the desktop and given them custom start menus. These settings were applied fine on the Windows 2000 clients, but have not worked at all on the Windows NT computers. You want the settings to apply to the Windows NT systems as well. What will you do? A. You will use the group policy snap-in to enable the Windows NT extensions for group policy. B. You will use the group policy snap-in to extend the group policy extensions to support Windows NT. C. You will create a Windows NT policy file and configure it to include the restrictions. You will then place the file in the NetLogon share of the PDC emulator (Winnt\Sysvol\Sysvol). D. You will create a Windows NT policy file and configure it to include the restrictions. You will then place the file in the NetLogon share of the PDC emulator (Winnt\Sysvol\Sysvol\thebestests.com\Scripts).
92. "BECAUSE WE'RE SPECIAL!" the CEO yells at the top of his lungs as he pounds on the desk. You take a step back because you're sure the vein in his head is going to pop and you really do not want to get a stain on your favorite Grateful Dead T-shirt. "Yes sir," you say as you continue backing out of the room. Note to self: never ask the CEO why he needs a high priority printer for the managers again.You configure the high priority printer, add the Managers group to it, and give them access to print. You don't want anyone besides the Managers, Print Operators, Server Operators and Administrators to be able to print to the printer. You look at the ACL and it includes the above groups, as well as the Everyone and CREATOR OWNER groups. What two things can you do to ensure that only the Managers, Print Operators, Server Operators, and Administrators groups can print? (Choose all that apply) A. You can delete the Everyone group from the ACL. B. You can select the Deny print permission for the Everyone group. C. You can delete the CREATOR OWNER group. D. For the CREATOR OWNER group entry in the ACL, you can clear all the permissions checkboxes. E. For the Everyone group entry in the ACL, you can clear all the permissions checkboxes. F. You can select the Deny print permission for the CREATOR OWNER group.
93. Anyone who thinks change is good has never been a network administrator. Just when you think you might get home in time to finally see one of your kid's soccer games, your ISP brings a new router online. Hoping against hope you pray that all you will have to do is reconfigure your DHCP scope options to reflect the new router address. You try it, then hold your breath. Within minutes, your phone starts ringing. The guys in sales can't access the net. Checking your watch, you see that it's 3:30 p.m. and you are a bit surprised there is still anyone in the sales department this late. After a bit of investigation you discover that anyone with a reserved address is a having the same problem. All of the client machines are running Windows 2000 Professional. You had configured your network to run DHCP to automate the TCP/IP function and you configured your DNS server information at the scope level. That has all gone into the toilet. What two things do you need to do to fix this problem? (Choose all that apply) A. Run IPCONFIG /RELEASE from each client. B. Run IPCONFIG /RENEW from each client. C. Create a global level DHCP option that includes the new router address. D. For each address reservation, configure the options to include the updated router information.
94. Jeff, who uses a Windows 2000 Professional laptop, speaks both English (United States) and Italian (Italy). Jeff requires his Windows 2000 Professional laptop to give him the ability create documents in either language. The Windows 2000 Professional laptop has English as the default language. What configuration is not required to allow Jeff to create documents in Italian? A. The language/character set for Italian must be installed/added to the Windows 2000 Professional laptop. B. The keyboard layout for the Italian must be added as an input language. C. English must be removed in order to support the Italian language. D. Jeff has to enable a "hot key" switch to change from the English keyboard layout to the Italian keyboard layout.
95. Mary, a user, calls the company Help Desk to ask for instructions on configuring the multi-monitor support for Windows 2000 Professional. After asking some basic questions of the make and model of the machine, you determine that Mary has one AGP Video Adapter and one ISA Video Adapter. What instruction set would you give to Mary to allow her to use multi-monitor? A. Replace the AGP Video Adapter with another ISA Video Adapter, then use Control Panel to complete the configuration. B. Replace the ISA Video Adapter with a PCI Video adapter, then use Control Panel to complete the configuration. C. Inform Mary she cannot use multi-monitor capabilities, and then abandon any further effort. D. Inform Mary she must replace the AGP Video Adapter and ISA Video Adapter with two PCI devices in order to use multi-monitor capabilities.
96. You are attempting to use Microsoft's Remote Installation Services to deploy 1,000 Windows 2000 Professional clients. Prior to conducting the massive rollout of these clients to your company, you have setup a test lab to deploy Windows 2000 Professional to the three hardware platforms your company supports on the desktop. You have already set up and configured the necessary supporting services for Remote Installation Services. In addition, you have created the necessary Windows 2000 Professional-based client disk images, formatted the image volume with NTFS, and shared the image volume. Upon conducting your tests, you observe that two of your three hardware platforms are able to connect to the Remote Installation Services Server and install the correct Windows 2000 Professional image. The last of the hardware platforms, a clone, is unable to connect to the Remote Installation Services server. What factor(s) is mostly likely causing the problem? A. The Network Adapter installed in the clone does not meet the Net PC specification or have PXE ROM enabled. B. The clone machine does not have the minimum free space required of 685MB to support the installation of Windows 2000 Professional. C. The System Preparation Tool (sysprep.exe) was run without the -pnp switch. D. The Windows 2000 Professional candidate platform is unable is unable to resolve the name for the Remote Installation Services Server in the WINS Server, nor locate the Remote Installation Services Server in the Active Directory.
97. You are a Help Desk Administrator for ZILEX Company. You receive a work order to install and configure a Windows 2000 Professional desktop for a new employee. The hardware specifications are as follows: 128MB RAM PIII/500MHz processor Two FAT-formatted hard drives, each with 8GB of storage Network adapter installed that meets the Net PC specification DOS is the installed operating system A Network Administrator at ZILEX Company has setup two distribution servers, named DSTRBSRV and WIN2KSRC, where the source files for Windows 2000 Professional are available for network installations. You will need to connect to this distribution server and initiate the installation of Windows 2000 professional. Which of the following command line structures will allow you to successfully initiate the Windows 2000 Professional installation process? A. WINNT32.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRC\i386 /u:unattend.txt B. WINNT.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRC\i386 /u:unattend.txt C. WINNT32.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRC\i386 /unattend:unattend.txt D. WINNT.EXE /s:\\DSTRBSRV\i386 /s:\\WIN2KSRV\i386 /unattend:unattend.txt
98. You are a Project Consultant working for ZRF Consulting Inc. You have been assigned to plan the migration efforts of a client that has a mix of different operating systems and hardware platforms. The desktop operating systems include Unix, Windows 3.x, Windows 95/98, Windows NT 3.51, and Windows NT 4.0 Workstations. You have already determined all hardware available is sufficient to install Windows 2000 Professional. You also need to ensure that the pre-installed applications will continue to operate correctly upon completion of the client upgrades. Below are listed potential migration paths for each of the aforementioned desktop operating systems. Which of the following client-upgrade paths are possible? (Choose all that apply) A. Unix: Use either a CD-based or network-based installation using WINNT.EXE to upgrade directly to Windows 2000 Professional. B. Windows 3.x: Use either a CD-based or network-based installation using WINNT.EXE to upgrade directly to Windows 2000 Professional. C. Windows 95/98: Use either a CD-based or network-based installation using WINNT32.EXE to upgrade directly to Windows 2000 Professional. D. Windows NT 3.51: Use either a CD-based or network-based installation using WINNT32.EXE to upgrade to Windows NT 4.0, then use the Windows 2000 Professional version of WINNT32.EXE to upgrade to Windows 2000 Professional. E. Windows NT 4.0: Use either a CD based or network based installation using WINNT32.EXE to upgrade directly to Windows 2000 Professional.
99. You are planning to upgrade your Windows NT 4.0 domain environment to a Windows 2000 Server domain environment. As a result, you plan on first upgrading the Primary Domain Controllers to Windows 2000 Domain Controllers. After completing this upgrade process, you will then initiate a migration to upgrade all of the Windows NT 4.0 Backup Domain Controllers to Windows 2000 Domain Controllers. Prior to executing your Domain Controller migration strategy, you synchronize a Windows NT 4.0 Backup Domain Controller with the Primary Domain Controller and remove the Primary Domain Controller from the production network. To allow for administration of the existing network while you conduct your test, you promote the Backup Domain Controller to a Primary Domain Controller. You then run the WINNT32.EXE setup program to upgrade the Windows NT 4.0 Primary Domain Controller to a Windows 2000 Domain Controller. During the installation process, you receive an error message the reads "INACCESSIBLE_BOOT_DEVICE." What must you check in order to prevent this error from repeating as you upgrade the other Windows NT 4.0 Domain Controller machines? A. Determine if there were any serial cables that were connected to a UPS device. B. Determine if there are any non-Plug and Play Industry Standard Architecture devices. C. Determine if there were changes made to the Window NT 4.0 Domain Controller Registry by the Windows 2000 setup program during the attempted upgrade. D. Determine if the there were any virus scanners or other client software that interfered with the attempted upgrade.
100. Listed below are a series of potential file system conversion paths. The goal is to perform a conversion from one file system to another, without losing any of the data already present on the partition to be converted. Which of the following file system conversion paths will accomplish this goal? (Choose all that apply) A. Use "convert.exe c: /fs:ntfs" to convert from FAT to NTFS B. Use "convert.exe c: /fs:fat32" to convert from FAT to FAT32 C. Use "convert.exe c: /fs:fat" to convert from NTFS to FAT D. Use "convert.exe c: /fs:ntfs" to convert from FAT32 to NTFS
101. What minimal pieces of information are required in order to connect a Windows 2000 Professional client to a TCP/IP based network print device? (Choose all that apply) A. Name or IP Address of the TCP/IP based network printer B. Port Number C. The type of Network Interface Card/Connection the network print device is using D. SNMP Community Name
102. You have installed a network version of Microsoft Office installed on a Windows 2000 Application Server. The drive is formatted as NTFS. Share permissions for the folder are as follows: Administrators = Full Control Power Users = Full Control Accounting = Change Users = Read NTFS permissions for the folder are as follows: Accounting = Read & Execute Users = Read & Execute Administrators = Full Control Power Users = Read Fred = Full Control Fred proceeds to log on to the Windows 2000 Application Server and access the shared folder locally. Fred is a member of the Accounting and Users security groups. What are Fred's effective permissions to the content stored in that folder? A. Full Control B. Change C. Read & Execute D. Read
103. You are the back up administrator for a company called XYZ Aircraft. Ralph, the primary administrator, is on vacation for the next week and has asked you to provide coverage in his absence. XYZ Aircraft uses a Windows 2000 Network comprised of two Windows 2000 Server Domain Controllers configured for a Domain called XYZAircraft.org. Ralph has ensured that you have the User Right to "Manage auditing and security" on the Windows 2000 Server Domain Controllers and for the "Users" container. Also, Ralph has enabled "Account Object Access" to include both "Audit successful attempts" and "Audit failed attempts" to the users container. Over the next week, Ralph has assigned you the responsibility to monitor the security logs for success and failures of the "Read All Properties" permission to user objects in the Active Directory database. On the first day, even though users are logging onto the Windows 2000 Network and accessing resources successfully, you do not observe any "Read All Properties" success messages in Event Viewer. In the "Auditing Entry for Users" dialog box, which entries should you select for auditing? (Choose all that apply) A. Read All Properties Successful B. Read All Properties Failed C. List Contents Successful D. List Contents Failed
104. You are the administrator for a company named XYZ Engineering. Recently, XYZ Engineering upgraded their Windows NT 4.0 Primary Domain Controllers and Backup Domain Controllers of the XYZEngineering Domain to Windows 2000 Server Domain Controllers. The new Domain name is XYZEngineering.org. The existing workstations used by the employees are a mix of Windows 2000 Professional, Windows NT 4.0 Workstations, and Windows 95/98 desktops. Although the goal of XYZ Engineering is to eventually phase out all Windows NT 4.0 Workstations and Windows 95/98 desktops, budgetary constraints have forced the administrators to manage this mixed environment until next year. The IT Management staff, however, wants to begin controlling the appearance of all employee desktops regardless of the desktop operating system in use. As a result, the IT management staff is relying on you to curtail the use of Registry editing tools, deny network browsing capabilities, and identify which Windows applications are able to run on all Windows 2000 Professional, Windows NT 4.0, and Windows 95/98 workstations by utilizing the strengths of system policy capabilities of Windows 2000 Server. What must you do to enforce the directives of the IT Management staff? Select the best answer. A. Do nothing. Windows NT 4.0 and Windows 95/98 system policies will work by default as they are converted in the upgrade process from the Windows NT 4.0 PDCs and BDCs. B. Implement a Group Policy that will defines the IT Management staff's directives for all Windows 2000 Professional, Windows NT 4.0, and Windows 95/98 workstations. C. Use the Group Policy capabilities of Windows 2000 Server to enforce the IT Management staff's directives for the Windows 2000 Professional workstation. Use the PolEdit.exe utility provided with Windows 2000 Server to create system policies specific to Windows NT 4.0 and Windows 95/98 desktops. D. Use the PolEdit.exe utility provided with Windows 2000 Server to create one policy file for the Windows 2000 Professional workstations, one policy file for the Windows NT 4.0 workstations, and one policy file for the Windows 95/98 machines.
105. Of the following built-in groups, which group(s) have the ability to restore backup in the event existing data becomes corrupted? (Choose all that apply) A. Administrators B. Users C. Backup Operators D. Replicator
106. On a Windows 2000 Professional desktop, you have a single hard drive installed to support the operating system, applications, and other files. You are looking to partition the disk to provide volumes that will allow you to logically organize the data you will keep on the computer. In addition, you need to be able to dual-boot your machine between Windows 2000 Professional and Windows 98. How many Primary partitions, maximum, can you have on the one physical disk? A. 1 partition B. 2 partitions C. 3 partitions D. 4 partitions E. Unlimited partitions
107. What are the networking components that are installed with the default installation of Windows 2000 Professional? (Choose all that apply) A. File and Print Sharing for Microsoft Networks B. Client for Microsoft Networks C. Internet Connection Sharing D. Internet Protocol Stack
108. You are installing a number of Windows 2000 Professional workstations at your company. One of these machine has two network interface cards installed, and you will be installing NWLink to allow the Windows 2000 Professional machine to communicate with a database server running Service Advertising Protocol (SAP) applications. What two configuration parameters must be configured to ensure successful communication over NWLink? (Choose all that apply) A. Unique Internal Network Numbers B. NetBios Scope ID C. Host Headers D. Frame Types
109. Which of the following are valid Windows 2000 Professional hardware requirements? (Choose all that apply) A. 650MB of free hard drive space B. Pentium 133 MHz or higher C. 1.6GB of free hard drive space D. 32MB of RAM E. 64MB of RAM
110. Which of the following filesystem types are supported by Windows 2000? (Choose all that apply) A. LDS B. FAT C. HPFS D. FAT32 E. NTFS
111. What command would you use to install Windows 2000 Professional onto a new system using an unattended installation script called unattend.txt? A. winnt32 /ua:unattend.txt B. winnt /u:unattend.txt C. winnt /a /r:unattend.txt D. winnt32 /a /r:unattend.txt E. winnt32 /u:unattend.txt
112. What command would you use to install Windows 2000 Professional onto the D: drive of a system with a 4GB C: drive and a 2GB D:? A. winnt /t:d B. winnt32 /s:d C. winnt /s:d D. winnt32 /a:d E. winnt /e:d
113. When installing Windows 2000 from a bootable CD, how would you use an unattended answer file? A. During the install, choose the option to use an unattended answer file. B. Create a winnt.sif file and copy it to the CD. C. Create a winnt.sif file and copy it to the Hard Drive. D. Create a winnt.sif file and copy it to a floppy, and leave it in the A: drive. E. Use the winnt.exe /u:unattended option during the install.
114. What is the Sysprep.exe command used for? A. To prepare an unattended answer file for future installations. B. To prepare the system to be duplicated. C. To prepare the system to be configured as a Domain Controller. D. To prepare the system to be formatted. E. To prepare the system to be installed.
115. What utilities could be used to help in the installation of Multiple Windows 2000 Professional systems in a large organization? (Choose all that apply) A. SysPrep.exe B. Answer file C. RAS D. RIS E. Disk Duplication Software
116. When installing Windows 2000 Professional on a system that already has Windows installed on a 5GB C: drive, what type of filesystem can the C: drive be to allow a dual-boot configuration? A. FAT32 B. HPFS C. NTFS D. FAT E. CDFS
117. When installing Windows 2000 Professional on a system you would like to configure the system for local file and folder security, which filesystems could you choose? A. NTFS B. FAT32 C. FAT64 D. FAT E. CDFS
118. Which of the following are valid uses of the Setup Manager? (Choose all that apply) A. RAS Scripts B. Unattend.txt files C. RIS scripts D. Sysprep Installation scripts E. Winnt.inf files
119. Company TMA has just purchased 150 new workstations; all workstations have the same hardware configuration, and all devices are on the hardware compatibility list. What deployment option can you use in this situation? (Choose all that apply) A. Setup Manager and create an Unattend.txt answer file. B. Setup Manager to duplicate the hard drives in the systems. C. Setup Manager and create a RIS image Then use RIS to install the Systems. D. Setup Manager to clone machine to machine. E. Setup Manager and create a SysPrep script Then duplicate the systems.
120. What components are necessary to have in your environment to use a RIS server to install Windows 2000? (Choose all that apply) A. A server with DHCP, and DNS installed and running. B. RIS must be installed on a shared NTFS volume. C. A server with DNS and ADS installed and running. D. A server with DHCP,DNS, and AD installed and running. E. RIS must be installed on a shared volume.
121. When using the RIS setup Wizard, the RIS software is installed, the Windows 2000 Professional installation files are copied to the server, and what else is done for you? (Choose all that apply) A. The client installation setup steps for system startup are configured. B. The client installation wizard pages for system startup are configured. C. *.sif files are created for you. D. Unattend.txt answer files are created for you. E. The cloned image that the RIS install will use are configured.
122. When installing Windows 2000 Professional, what new features make it easier to install? (Choose all that apply) A. Plug-and-Play support B. Windows Driver Model C. Automatic Driver Update D. Add/Remove Hardware Wizard E. Automatic Service Pack Upgrader
123. How would you install a network-connected Windows 2000 Professional on a machine with an unsupported CD-ROM drive? A. Using the network, copy the installation software to the hard drive and then install. B. Boot from the CD. C. Create the setup diskettes and install from the diskettes. D. Create a boot disk to start the install.
124. When troubleshooting an installed version of Windows 2000, what tools could possibly be used? (Choose all that apply) A. Event Viewer B. User Manager C. Troubleshooters in Help D. Compatibility Tool E. Server Manager
125. What computer management utilities are available with Windows 2000 Professional? (Choose all that apply) A. Windows Installer B. Control Panel C. Zero Administration Kit D. ZEN Works E. Computer Management
126. What dialog box is used to lock a workstation or to allow users to change their password? A. User Tools dialog box B. User Manager dialog box C. Administrative dialog box D. Security dialog box E. User Security dialog box
127. When installing Windows 2000 Professional at an organization that needs to install 500 workstations with the same configuration, what tools are provided that could simplify this process? (Choose all that apply) A. ZERO Effect Installer B. System Preparation Tool C. System Installer Utility D. Duplication software E. RIS
128. Before duplicating a system, you should always run the ______? A. Network Management Tool B. System Preparation Tool C. Computer Management Tool D. Network Identification Utility
129. You have a new workstation with a 10GB hard drive that you would like to create into two partitions and set up with Windows 2000 and Windows 98. How would you have to configure the drives? A. C: - 2GB NTFS partition, D: - 8GB FAT partition B. C: - 5GB NTFS partition, D: - 5GB FAT32 partition C. C: - 5GB FAT32 partition, D: - 5GB NTFS partition D. C: - 5GB NTFS partition, D: - 5GB FAT partition E. C: - 8GB FAT partition, D: - 2GB NTFS partition
130. When installing Windows 2000 Professional on a multi-boot system, what factors concerning multi-boot should you keep in mind? (Choose all that apply) A. The amount of RAM in the system B. The amount of free space on the hard disk C. The format type of the system partition D. The location of the system files E. The version of the other operating system
|