Windows 2000 Professional1. Mary, a user, calls the company Help Desk to ask for instructions on configuring the multi-monitor support for Windows 2000 Pro. After asking some basic questions of the make and model of the machine, you determine that Mary has one AGP Video Adapter and one ISA Video Adapter. What instruction set would you give to Mary to allow her to use multi-monitor? A. Replace the AGP Video Adapter with another ISA Video Adapter, then use Control Panel to complete the configuration. B. Replace the ISA Video Adapter with either an AGP or PCI Video adapter, then use Control Panel to complete the configuration. C. Inform Mary she cannot use multi-monitor capabilities, and then abandon any further effort. D. Inform Mary she must replace the AGP Video Adapter and ISA Video Adapter with two PCI devices in order to use multi-monitor.
2. Jeff, who uses a Windows 2000 Pro laptop, speaks both English (United States) and Italian (Italy). Jeff requires his Windows 2000 Pro laptop to give him the ability create documents in either language. The Windows 2000 Pro laptop has English as the default language. What configuration is not required to allow Jeff to create documents in Italia. A. The language/character set for Italian must be installed/added to the Windows 2000 Pro laptop. B. The keyboard layout for the Italian must be added as an input language. C. English must be removed in order to support the Italian language. D. Jeff has to enable a "hot key" switch to change from the English keyboard layout to the Italian keyboard layout.
3. You are attempting to use Microsoft's Remote Installation Services to deploy 1,000 Windows 2000 Pro clients. Prior to conducting the massive rollout of these clients to your company, you have setup a test lab to deploy Windows 2000 Pro to the three hardware platforms your company supports on the desktop. You have already set up and configured the necessary supporting services for Remote Installation Services. In addition, you have created the necessary Windows 2000 Pro-based client disk images, formatted the image volume with NTFS, and shared the image volume. Upon conducting your tests, you observe that two of your three hardware platforms are able to connect to the Remote Installation Services Server and install the correct Windows 2000 Pro image. The last of the hardware platforms, a clone, is unable to connect to the Remote Installation Services server. What factor(s) is mostly likely causing the problem? A. The Network Adapter installed in the clone does not meet the Net PC specification or have PXE ROM enabled. B. The clone machine does not have the minimum free space required of 685MB to support the installation of Windows 2000 Pro. C. The System Preparation Tool (sysprep.exe) was run without the -pnp switch. D. The Windows 2000 Pro candidate platform is unable is unable to resolve the name for the Remote Installation Services Server in the WINS Server, nor locate the Remote Installation Services Server in the Active Directory.
4. You are preparing to install Remote Installation Services to help automate the installation of 500 Windows 2000 Pro machines. What are the services that must be configured prior to the installation of Remote Installation Services? (Choose all that apply) A. WINS Server B. DNS Server C. A shared, NTFS-formatted volume D. Active Directory Server E. DHCP Server
5. You are a Project Consultant working for ZRF Consulting Inc. You have been assigned to plan the migration efforts of a client that has a mix of different operating systems and hardware platforms. The desktop operating systems include Unix, Windows 3.x, Windows 9x, NT 3.51, and NT 4.0 Workstations. You have already determined all hardware available is sufficient to install Windows 2000 Pro. You also need to ensure that the pre-installed applications will continue to operate correctly upon completion of the client upgrades. Below are listed potential migration paths for each of the aforementioned desktop operating systems. Which of the following client-upgrade paths are possible? (Choose all that apply) A. Unix: Use either a CD- or network-based installation using WinNT.EXE to upgrade directly to Windows 2000 Pro. B. Windows 3.x: Use either a CD- or network-based installation using WindowsNT.EXE to upgrade directly to Windows 2000 Profess C. Windows 95/98: Use either a CD- or network-based installation using WinNT32.EXE to upgrade directly to Windows 2000 Pro D. NT 3.51: Use either a CD- or network-based installation using WinNT32.EXE to upgrade to NT 4.0, then use the Windows 2000 Pro version of WinNT32.EXE to upgrade to Windows 2000 Pro. E. NT 4.0: Use either a CD- or network-based installation using WinNT32.EXE to upgrade directly to Windows 2000 Pro
6. You are a Help Desk Admin for ZILEX Company. You receive a work order to install and onfigure a Windows 2000 Pro desktop for a new employee. The hardware specifications are as follows: 128MB RAM PIII/500MHz processor Two FAT-formatted hard drives, each with 8GB of storage Network adapter installed that meets the Net PC specification DOS is the installed operating system A Network Administrator at ZILEX Company has setup two distribution servers, named DSTRBServer and Win2KSRC, where the source files for Windows 2000 Pro are available for network installations. You will need to connect to this distribution server and initiate the installation of Windows 2000 Pro. Which of the following command line structures will allow you to successfully initiate the Windows 2000 Pro installation process? A. WinNT32.EXE /s:\\DSTRBServer\i386 /s:\\Win2KSRC\i386 /u:unatten B. WinNT.EXE /s:\\DSTRBServer\i386 /s:\\Win2KSRC\i386 /u:unattend. C. WinNT32.EXE /s:\\DSTRBServer\i386 /s:\\Win2KSRC\i386 /unattend: D. WinNT.EXE /s:\\DSTRBServer\i386 /s:\\Win2KServer\i386 /unattend:un
7. You are attempting to upgrade your Windows 98 desktop to Windows 2000 Pro. In addition to completing the upgrade process, you want to minimize the amount of time you will remain unproductive. The source files for Windows 2000 Pro have been copied to your local hard drive. Which of the following processes will best allow you to upgrade to Windows 2000 Pro and continue working as much as possible? A. Run WinNT32.EXE /unattend:unattend.txt from the Start\Run pr B. Run WinNT32.EXE, then answer all of the questions presented via the installation wizard. C. Restart your computer in DOS, run WinNT.EXE /unattend:unatte D. Restart your computer in DOS, run WinNT.EXE, then answer all of the questions presented via the installation wizard
8. What components are necessary in your environment to use a RIS Server to install Windows 2000? A. A server with DHCP, and DNS installed and running. B. RIS must be installed on a shared NTFS volume. C. A server with DNS and ADS installed and running. D. A server with DHCP,DNS, and AD installed and running. E. RIS must be installed on a shared volume.
9. You are planning to upgrade your NT 4.0 domain environment to a Windows 2000 Server domain environment. As a result, you plan on first upgrading the PDC:s to Windows 2000 Domain Controllers. After completing this upgrade process, you will then initiate a migration to upgrade all of the NT 4.0 BDC:s to Windows 2000 Domain Controllers. Prior to executing your Domain Controller migration strategy, you synchronize a NT 4.0 BDC with the PDC and remove the PDC from the production network. To allow for administration of the existing network while you conduct your test, you promote the BDC to a PDC. You then run the WinNT32.EXE setup program to upgrade the NT 4.0 PDC to a Windows 2000 Domain Controller. During the installation process, you receive an error message: "INACCESSIBLE_BOOT_DEVICE." What must you check in order to prevent this error from repeating as you upgrade the other NT 4.0 Domain Controller machines? A. Determine if there were any serial cables that were connected to a UPS device. B. Determine if there are any non-Plug and Play Industry Standard Architecture devices. C. Determine if there were changes made to the NT 4.0 Domain Controller Registry by the Windows 2000 setup program during the attempted upgrade. D. Determine if the there were any virus scanners or other client software that interfered with the attempted upgrade.
10. Listed below are a series of potential file system conversion paths. The goal is to perform a conversion from one file system to another, without losing any of the data already present on the partition to be converted. Which of the following file system conversion paths will accomplish this goal? (Choose all that apply) A. Use "convert.exe c: /fs:ntfs" to convert from FAT to NTFS B. Use "convert.exe c: /fs:fat32" to convert from FAT to FAT32 C. Use "convert.exe c: /fs:fat" to convert from NTFS to FAT D. Use "convert.exe c: /fs:ntfs" to convert from FAT32 to NTFS
11. What minimal pieces of information are required in order to connect a Windows 2000 Pro client to a TCP/IP based network print device? (Choose all that apply) A. Name or IP Address of the TCP/IP based network printer B. Port Number C. The type of Network Interface Card/Connection the network print device is using D. SNMP Community Name
12. You are the administrator for a company named XYZ Engineering. Recently, XYZ Engineering upgraded their NT 4.0 PDC:s and BDC:s of the XYZEngineering Domain to Windows 2000 Server Domain Controllers. The new Domain name is XYZEngineering.org. The existing Workstation:s used by the employees are a mix of Windows 2000 Pro, NT 4.0 Workstation:s, and Windows 95/98 desktops. Although the goal of XYZ Engineering is to eventually phase out all NT 4.0 Workstation:s and Windows 95/98 desktops, budgetary constraints have forced the administrators to manage this mixed environment until next year. The IT Management staff wants to begin controlling the appearance of all employee desktops regardless of the desktop operating system in use. As a result, the IT management staff is relying on you to curtail the use of Registry editing tools, deny network browsing capabilities, and identify which Windows applications are able to run on all Windows 2000 Pro, NT 4.0, and Windows 95/98 Workstation:s by utilizing the strengths of system policy capabilities of Windows 2000 Server. What must you do to enforce the directives of the IT Management staff? A. Do nothing. NT 4.0 and Windows 95/98 system policies will work by default as they are converted in the upgrade process from the NT 4.0 PDCs and BDCs. B. Implement a Group Policy that will defines the IT Management staff's directives for all Windows 2000 Pro, NT 4.0, and Windows 95/98 Workstation:s. C. Use the Group Policy capabilities of Windows 2000 Server to enforce the IT Management staff's directives for the Windows 2000 Pro Workstation:s. Use the PolEdit.exe utility provided with Windows 2000 Server to create system policies specific to NT 4.0 and Windows 95/98 desktops. D. Use the PolEdit.exe utility provided with Windows 2000 Server to create one policy file for the Windows 2000 Pro Workstation:s, one policy file for the NT 4.0 Workstation:s, and one policy file for the Windows 9x machines.
13. You are the back up administrator for a company called XYZ Aircraft. Ralph, the primary administrator, is on vacation for the next week and has asked you to provide coverage in his absence. XYZ Aircraft uses a Windows 2000 Network comprised of two Windows 2000 Server Domain Controllers configured for a Domain called XYZAircraft.org. Ralph has ensured that you have the User Right to "Manage auditing and security" on the Windows 2000 Server Domain Controllers and for the "Users" container. Also, Ralph has enabled "Account Object Access" to include both "Audit successful attempts" and "Audit failed attempts" to the users container. Over the next week, Ralph has assigned you the responsibility to monitor the security logs for success and failures of the "Read All Properties" permission to user objects in the Active Directory database. On the first day, even though users are logging onto the Windows 2000 Network and accessing resources successfully, you do not observe any "Read All Properties" success messages in Event Viewer. In the "Auditing Entry for Users" dialog box, which entries should you select for auditing? (Choose all that apply) A. Read All Properties Successful B. Read All Properties Failed C. List Contents Successful D. List Contents Failed
14. You have installed a network version of MS Office installed on a Windows 2000 Application Server. The drive is formatted as NTFS. Share permissions for the folder are as follows: Administrators: Full Control Power Users: Full Control Accounting: Change Users: Read NTFS permissions for the folder are as follows: Accounting: Read & Execute Users: Read & Execute Administrators: Full Control Power Users: Read Fred: Full Control Fred proceeds to log on to the Windows 2000 Application Server and access the shared folder locally. Fred is a member of the Accounting and Users security groups. What are Fred's effective permissions to the content stored in that folder? A. Full Control B. Change C. Read & Execute D. Read
15. When installing Windows 2000 Pro on a system that already has Windows installed on a 5GB C: drive, what type of filesystem can the C: drive be to allow a dual-boot configuration? A. FAT32 B. HPFS C. NTFS D. FAT E. CDFS
16. What command would you use to install Windows 2000 Pro onto a new system using an unattended installation script called unattend.txt? A. Winnt32 /ua:unattend.txt B. Winnt /u:unattend.txt C. Winnt /a /r:unattend.txt D. Winnt32 /a /r:unattend.txt E. Winnt32 /u:unattend.txt
17. When installing Windows 2000 Pro on a system you would like to configure the system for local file and folder security, which filesystems could you choose? A. NTFS B. FAT32 C. FAT64 D. FAT E. CDFS
18. Which of the following are valid uses of the Setup Manager? (Choose all that apply) A. RAS Scripts B. Unattend.txt files C. RIS scripts D. Sysprep Installation scripts E. Winnt.inf files
19. What dialog box is used to lock a workstation or to allow users to change their password? A. User Tools dialog box B. User Manager dialog box C. Administrative dialog box D. Security dialog box E. User Security dialog box
20. You are installing a number of Windows 2000 Professional workstations at your company. One of these machine has two network interface cards installed, and you will be installing NWLink to allow the Windows 2000 Pro machine to communicate with a database server running Service Advertising Protocol (SAP) applications. What two configuration parameters must be configured to ensure successful communication over NWLink? A. Unique Internal Network Numbers B. NetBios Scope ID C. Host Headers D. Frame Types
21. Company TMA has just purchased 150 new Workstation:s; all workstations have the same hardware configuration, and all devices are on the hardware compatibility list. What deployment option can you use in this situation? (Choose all that apply) A. Setup Manager and create an Unattend.txt answer file. B. Setup Manager to duplicate the hard drives in the systems. C. Setup Manager and create a RIS image Then use RIS to install the Systems. D. Setup Manager to clone machine to machine. E. Setup Manager and create a SysPrep script Then duplicate the systems.
22. On a Windows 2000 Pro desktop, you have a single hard drive installed to support the operating system, applications, and other files. You are looking to partition the disk to provide volumes that will allow you to logically organize the data you will keep on the computer. In addition, you need to be able to dual-boot your machine between Windows 2000 Pro and Windows 98. How many Primary partitions, maximum, can you have on the one physical disk? A. 1 partition B. 2 partitions C. 3 partitions D. 4 partitions E. Unlimited partitions
23. What are the networking components that are installed with the default installation of Windows 2000 Pro? A. File and Print Sharing for Microsoft Networks B. Client for Microsoft Networks C. Internet Connection Sharing D. Internet Protocol Stack
24. What command would you use to install Windows 2000 Pro onto the D: drive of a system with a 4GB C: drive and a 2GB D:? A. Winnt /t:d B. Winnt32 /s:d C. Winnt /s:d D. Winnt32 /a:d E. Winnt /e:d
25. Of the following built-in groups, which group(s) have the ability to restore backup in the event existing data becomes corrupted? A. Administrators B. Users C. Backup Operators D. Replicator
26. Which of the following are valid Windows 2000 Pro hardware requirements? (Choose all that apply) A. 650MB of free hard drive space B. Pentium 133 MHz or higher C. 1.6GB of free hard drive space D. 32MB of RAM E. 64MB of RAM
27. Which of the following filesystem types are supported by Windows 2000? (Choose all that apply) A. LDS B. FAT C. HPFS D. FAT32 E. NTFS
28. When installing Windows 2000 from a bootable CD, how would you use an unattended answer file? A. During the install, choose the option to use an unattended answer file. B. Create a Winnt.sif file and copy it to the CD. C. Create a Winnt.sif file and copy it to the Hard Drive. D. Create a Winnt.sif file and copy it to a floppy, and leave it in the A: drive. E. Use the Winnt.exe /u:unattended option during the install.
29. What is the Sysprep.exe command used for? A. To prepare an unattended answer file for future installations. B. To prepare the system to be duplicated. C. To prepare the system to be configured as a Domain Controller. D. To prepare the system to be formatted. E. To prepare the system to be installed.
30. What utilities could be used to help in the installation of Multiple Windows 2000 Pro systems in a large organization? A. SysPrep.exe B. Answer file C. RAS D. RIS E. Disk Duplication Software
31. When using the RIS setup Wizard, the RIS software is installed, the Windows 2000 Pro installation files are copied to the server, and what else is done for you? (Choose all that apply) A. The client installation setup steps for system startup are configured. B. The client installation wizard pages for system startup are configured. C. *.sif files are created for you. D. Unattend.txt answer files are created for you. E. The cloned image that the RIS install will use are configured.
32. When installing Windows 2000 Pro, what new features make it easier to install? A. Plug-and-Play support B. Windows Driver Model C. Automatic Driver Update D. Add/Remove Hardware Wizard E. Automatic Service Pack Upgrader
33. How would you install Windows 2000 Pro on a machine with an unsupported CD-ROM drive? A. Copy the CD software to the hard drive and then install. B. Boot from the CD. C. Create the setup diskettes and install from the diskettes. D. Create a boot disk to start the install.
34. When troubleshooting an installed version of Windows 2000, what tools could possibly be used? A. Event Viewer B. User Manager C. Troubleshooters in Help D. Compatibility Tool E. Server Manager
35. What computer management utilities are available with Windows 2000 Pro? A. Windows Installer B. Control Panel C. Zero Administration Kit D. ZEN Works E. Computer Management
36. When installing Windows 2000 Pro at an organization that needs to install 500 workstations with the same configuration, what tools are provided that could simplify this process? A. ZERO Effect Installer B. System Preparation Tool C. System Installer Utility D. Duplication software E. RIS
37. Before duplicating a system, you should always run the ______? A. Network Management Tool B. System Preparation Tool C. Computer Management Tool D. Network Identification Utility
38. You have a new workstation with a 10GB hard drive that you would like to create into two partitions and set up with Windows 2000 and Windows 98. How would you have to configure the drives? A. C: - 2GB NTFS partition, D: - 8GB FAT partition B. C: - 5GB NTFS partition, D: - 5GB FAT32 partition C. C: - 5GB FAT32 partition, D: - 5GB NTFS partition D. C: - 5GB NTFS partition, D: - 5GB FAT partition E. C: - 8GB FAT partition, D: - 2GB NTFS partition
39. When installing Windows 2000 Pro on a multi-boot system, what factors concerning multi-boot should you keep in mind? (Choose all that apply) A. The amount of RAM in the system B. The amount of free space on the hard disk C. The format type of the system partition D. The location of the system files E. The version of the other operating system
40. How would you change the virtual memory settings in a Windows 2000 Pro system? A. Control Panel -> Virtual Memory B. Control Panel -> System Properties -> Advanced Tab -> Virtual Memory C. Computer Management -> System Properties -> Virtual Memory D. Control Panel -> System Properties -> Virtual Memory E. Control Panel -> Advanced Tab -> Virtual Memory
41. What is the default paging file size on a Windows 2000 Pro system with 64MB of RAM installed. A. 96MB B. 64MB C. 32MB D. 128MB E. 80MB
42. When you are viewing your devices in Computer Management, a new device that was just installed shows up with a stop sign instead of a normal icon. Why? A. The device drivers cannot be located and loaded. B. The device's hardware settings conflict with another device and/or it is disabled. C. The device is disabled. D. The device drivers have not be installed correctly.
43. When testing the TCP/IP configuration of a machine with that is configured as IP address 192.168.15.72, subnet mask 255.255.255.0, and default gateway of 192.168.15.1, what would be valid commands to test the connection? A. Ping 192.168.15.1 B. Ping 192.168.15.72 C. Ping 127.0.0.1 D. None of the options are correct E. All the options are correct.
44. When testing the TCP/IP configuration of a machine that is configured with an IP address 192.168.15.72, a subnet mask 255.255.255.0, and a blank default gateway, the administrator notices that it cannot access a server at IP address 192.168.16.58. Why? A. The machines are on different networks. B. The subnet mask is incorrect. C. The server is down. D. The IP address is incorrect. E. It could be a cabling problem.
45. When viewing your devices in Computer Management, a new device that was just installed shows up with a exclamation point instead of a normal icon. Why? A. The device is incorrectly configured, or the driver files are missing. B. The device is working properly, just disabled. C. The device has been configured with settings that conflict with another Device. D. The device is of an unknown type. E. The status of the device is unknown.
46. Users of the Windows 2000 Pro desktops at your company are complaining they are unable to change the "Path" System Environment Variables. They want to prevent having to memorize the entire folder path to run applications installed on their computers. What is the likely cause of user not being able to modify System Environment Variables? A. The user is not a member of the Local Administrator group on the Windows 2000 Pro desktop. B. Windows 2000 Pro automatically configures System Environment Variables, and only the operating system can modify these variables. C. An autoexec.bat file exists that overwrites the System Environment Variable at each restart of a Windows 2000 Pro machine. D. No Answer is Correct.
47. You are the File/Print Administrator for a company called KUNI Inc. You have 300 traveling sales representatives who spend most of their time at client sites. Once per week, the sales representatives download all marketing and product material from a shared folder named sample on the Windows 2000 Server. Theses sales representatives will slightly alter the content for their different client meetings. The shared folder caching configuration set to "Manual caching for documents." Many of the salespeople complain that it takes too long to download the documents they require. What could you do to help speed up the process of downloading of content to the sales representatives laptops? A. Allow only 15 users at a time to connect to the shared folder concurrently. Have users select all of the documents to cache. B. Keep the settings as the currently exist. C. Allow only 15 users at a time to connect to the shared folder, named sample, concurrently. Reconfigure the caching settings to "Automatic Caching for Documents." D. Re-share the sample folder 2 more times (sample2 & 3). Allow 100 users at a time to connect to the three respective shares. Have users select all of the documents to cache manually.
48. You are the network administrator for a company named BFQ Architects. The networking topology installed at BFQ Architects is a Star-Bus Hybrid Topology. Company employees require Internet access in order to conduct research on their client's companies. In order to support all 2,000 employees, the previous network administrator company configured routing environment as follows: The network has three segments: 192.26.33.0/24, 192.45.27.0/24 and 192.33.101.0/24 The Internet connection is 6.0.0.0/24 Routing tables are configured as only having the directly attached network segments. The default gateways for clients are pointing to a local gateway. Employees whose machines are connected to 192.26.33.0/24 segment are complaining that they are unable to gain access to the Internet. Employees whose machines are connected to segments 192.45.27.0/24 & 192.33.101.0/24 are able to successfully connect to the Internet. Employees on segment 192.26.33.0/24 are able to communicate with hosts on segments 192.45.27.0/24 and 192.33.101.0/24. Employees on segments 192.45.27.0/24 and 192.33.101.0/24 are able to communicate with hosts on 192.26.33.0/24; however hosts on segment 6.0.0.0/24 are not. Why are employees on segment 192.26.33.0/24 unable to connect to the Internet? A. All of the hosts in the above network are using different Subnet Masks that make all network client requests are to be sent to the remote networks via the Default Gateways. B. Hosts on segment 6.0.0.0/24 do not have a Default Gateway configured to return responses back to clients on the 192.26.33.0/24 network segment. C. The network configuration is using a default gateway routing solution. D. The router configuration above includes routing table entries that have incorrect subnet masks associated with each network segment.
49. You are the administrator of a Windows 2000 Network that supports 200 employees. The employees are using Windows 2000 Pro for their desktop computers. In order to support the network traffic created by these users and maintain a fast response time for network service requests, you have configured the physical layout of the network into 3 separate segments. These three separate segments are attached to a single, multi-homed Windows 2000 Advanced Server machine acting as a router. An employee in the marketing department on segment one is complaining he is unable to run the accounting application that is installed on the AcctWin2K Windows 2000 Application Server on Segment 3. All other employees on segment two are able to run the accounting application. The addressing scheme for the network is as follows: 3 segments 1 Windows 2000 server multihomed with 3 NICs 1 client on segment 2, 1 account server on segment 3. IP address for client is for segment 2, subnet mask Should show 192.26.34.26 255.255.254.0 IP address for server is correct. Should show 192.26.35.200 255.255.255.0 Default gateway is correct for both client and server Should show 192.26.33.1 and 192.26.35.1 respectively Upon running the ROUTE PRINT command, you view the routing table as follows: 192.26.33.0 255.255.255.0 192.26.33.1 (segment1) 192.26.34.0 255.255.255.0 192.26.34.1 (segment2) 192.26.35.0 255.255.255.0 192.26.35.1 (segment3) Why is the client on segment two unable to gain access to the accounting application? A. The server is configured with the incorrect Subnet Mask and cannot return a response to the client's request. B. The router is incorrectly configured to pass network traffic from segment 2 to segment 32. C. The network interface card on the server is configured with the incorrect Default Gateway and cannot return a response to the client's request. D. The client's subnet mask is configured incorrectly.
50. Mary is a Senior Consultant working with XYZ company. She has been assigned to help plan the TCP/IP networking scheme for ABC Company. Currently, ABC Company has 20 branch offices each with two network segments per branch. Each of the 20 branches is connected back to the ABC Corporate Office, in Chicago in order to facilitate data replication between the local branch client databases and the master client database. The ABC Corporate Office currently has an IT network segment, a Research and Development network segment, a Sales and Marketing network segment, and a Finance network segment. The largest of these network segments currently supports 450 users. ABC Company is forecasting tremendous growth over the next five years. They expect that the current network segment count will grow to a maximum of 77 networks. The largest of the network segments is expected to support 1,000 networked devices. The goal of ABC Company is to use a single base network number to create the correct number of IP network addresses to associate to each network segment. Mary has been charged with completing this task and has secured an IP network address of 132.64.0.0/16 from an Internet Service Provider. Which IP network number(s) below based on this number will support both the future number of network segments and the growth in the number of hosts per segment? A. 132.64.0.0/24 255 supports 254 networks, supports 254 hosts per network B. 132.64.0.0/23 254 supports 126 networks, supports 510 hosts per network C. 132.64.0.0/22 252 supports 62 networks, supports 1022 hosts per network D. 132.64.0.0/21 248 supports 30 networks, supports 2046 hosts per network E. No Answer is Correct
51. While configuring the TCP/IP configuration parameters of your Windows 2000 Pro machine, you view the following TCP/IP properties: IP Address: 192.123.0.25 Subnet Mask: 255.255.255.0 Default Gateway: 192.123.2.1 Preferred DNS Server: 192.123.0.10 Alternate DNS Server: 192.123.2.26 Which of the following statements are true? A. This TCP/IP client will be able to communicate with the Primary DNS Server for hostname resolution. B. This TCP/IP client will be able to communicate with the Default Gateway. C. This TCP/IP client will be able to communicate with the Alternate DNS Server for hostname resolution. D. This TCP/IP client will be able to communicate with all TCP/IP hosts on the same TCP/IP network.
52. Your Windows 2000 Server based network does not presently have a DNS Server installed for hostname resolution. There is an Intranet Web Server that hosts company newsletter, which you must review on a daily basis. As a result, you configure your hosts file, in the C:\Winnt\system32 \drivers\etc directory with the following entries to allow you to browse the Intranet Web Server named HRWebServer: 127.0.0.1 localhost 10.0.0.26 DigitalCompany.com 192.132.26.10 HRWebServer 192.132.26.200 HRWebServer The network administrator has already assigned you the necessary permissions to gain access to the content hosted on the HRWebServer. When you attempt to browse HRWebServer using Internet Explorer, you receive a warning that the server could not be found. You use the ping utility to ping 192.132.26.10 and receive 4 request timed out messages. You again use the ping utility to ping 192.132.26.200 and receive 4 positive reply messages. What is preventing you from displaying the home page of the HRWebServer? A. Your machine has the incorrect Subnet Mask configured to communicate with the HRWebServer. B. Your HOSTS file is resolving the HRWebServer hostname to the incorrect IP Address. C. Your network administrator has assigned the incorrect permissions to the home/default page of the HRWebServer. D. Your machine has the incorrect Default Gateway assigned.
53. ABC Company has over 250 remote users who gain access to both public and private company information via the Internet. As the IT Security Specialist for ABC Company, you are concerned that the number of remote users is creating unacceptable security risks to the ABC Company's networks. Your plans are to provide secure remote access to network resources while minimizing the costs of implementation. You decide to implement Virtual Private Network connections on all laptops using the L2TP protocol. What is the benefit(s) of implementing the L2TP protocol? A. You are able to ensure data integrity through the use of IP Security encryption and MPPE encryption. B. You can solely focus your efforts on IP Internetwork communications. C. You do not have to worry about L2TP protocol support on the part of your ISP. D. L2TP VPNs will allow your remote users to securely gain access to network resource across the Internet, regardless of those resources being "served up" on TCP/IP, IPX/SPX, or NetBEUI machines.
54. You are considering which of the Remote Access Protocols that can be used with Windows 2000 to implement on your network. Which of the following statements about the various Remote Access Protocols are true? A. SLIP transmits authentication passwords only as clear text. B. L2TP uses MPPE encryption. C. PPTP supports header compression. D. PPP supports tunnel authentication.
55. You have a small home office set up to support two laptop computers. One of these laptops has both a PC Card and Modem. The PC Card uses a cross-over cable to communicate directly with the second laptop, which only has a PC Card for network communications. In order to avoid purchasing a new Modem for the second laptop, you decide to implement connection sharing by enabling the Internet Connection Sharing capabilities. You accept the default configuration of "Enable on-demand dialing. When you attempt to connect to the Internet from the second laptop (the one without a modem), the first laptop dials your Internet Service Provider and you successfully are able to surf the WWW. However, you are unable to connect to your favorite FTP download sites to retrieve the latest patches and upgrades to Windows 2000 Pro. What is causing the problem? A. The default settings for Internet Connection Sharing do not automatically configure crossover cable support for retrieving content from the first laptop to the second laptop. B. The default settings for Internet Connection Sharing filter out inbound packets using FTP. C. The default settings for Internet Connection Sharing do not have the appropriate shared application settings configured for FTP. D. The default settings for the Internet Connection Sharing do not have the appropriate service configured for FTP.
56. You are the Network Analyst for DTW Company. You have implemented a small departmental LAN that has two segments. The router used to pass traffic back and forth between the two networks is a multi-homed Windows 2000 Server. The two networks connected to this server are 220.125.26.0/24 and 220.125.27.0/24. The correct routing table entries are automatically established. A client machine on the 220.125.26.0/24 network has an IP address of 220.125.26.100/24 and is configured to use a default gateway of 220.125.26.1. This client machine is attempting to connect to an FTP Server on the 220.125.27.0/24 network that has an IP address of 220.125.27.200/16. The FTP Server is configured with a default gateway of 220.125.27.1. When the client machine attempts to connect to the FTP Server, the client receives "request timed out" errors. What is the reason the client and server are unable to communicate? A. The FTP Server is unable to return TCP acknowledgements to the remote network. B. The FTP Server is unable to reach its default gateway. C. The client is unable to reach its default gateway. D. The client is unable to return TCP acknowledgements to the remote network.
57. What are some of the benefits of configuring a Windows 2000 Pro machine using NTFS? A. Disk Quotas and File Encryption B. Dual Boot Configuration support C. Increased application stability D. Active Directory Services support
58. What is the correct syntax to connect to a printer across the Internet, assuming that all of the necessary software and connections are in place? A. \\servername\sharedprintername B. \\servername\printers\sharedprintername C. http://servername/sharedprintername D. http://servername/printers
59. You are the administrator of a company named XYZ Corporation. The company network consists of five Windows 2000 Server Domain Controllers, 10 Windows 2000 Server:s operating as either file, print, or application servers, and 500 Windows 2000 Pro Workstation. The Executive Standards committee has established that users must have three opportunities to log on to the network before their user accounts are locked out for a mandatory 30-minute time interval. All users must use unique passwords that have a minimum length of 12 characters and must be able to change their own passwords. In addition, the administrator must assign all initial passwords for all users. As the administrator, you want to verify that every user account you create is able to successfully log on to the Windows 2000 Network, so you want to ensure that users must use an administrator-defined password for a set length of time before they can change it. What must you configure in order for you, the administrator, to test the user account logons before the users are able to change their passwords? A. Minimum password length B. Maximum password age C. Enforce password history D. Store password using reversible encryption for all users in the domain E. Minimum password age.
60. With auditing enabled, what log would you view with Event Viewer in order to determine whether the users on your network are able to successfully logon to your network? A. Application Log B. Security Log C. System Log D. Setup Log
61. Of the following permissions, which one is not a standard NTFS permission that could be assigned to users or groups for Folder/File access? A. Full Control B. Change C. Read D. Write E. Read & Execute
62. You are the Network Administrator for ZDWR Corporation. ZDWR Corp. currently is using a Windows 2000 Active Directory environment to support all logon authentications, and to facilitate ease of locating company resources like shared folders and printers. There are a total of 25 desktops at the company. You are in the process of installing the last Windows 2000 Pro desktop into the Windows 2000 Active Directory domain when you receive an error message stating that the desktop machine could not connect to the domain controller. All of the remaining 24 users are able to logon to the network and locate resources in the Active Directory Database. There are no duplicate computer names in use on the network. Which of the following could be the cause of the problem? (Choose all that apply) A. The Windows 2000 Prol machine unable to communicate with a DNS Server. B. The Windows 2000 Active Directory Domain Controller is offline. C. The Windows 2000 Pro network adapter and protocol settings are incorrectly configured. D. The Windows 2000 Pro IP address is incorrectly configured.
63. Your company network consists of both Windows 95/98 and Windows NT 4.0 desktops. You want to take advantage of the centralized administration and resource location capabilities of Windows 2000 Active Directory domains. As a result, you implement a Windows 2000 Active Directory domain with two Windows 2000 Domain Controllers. You also upgrade all of the Windows NT 4.0 desktops to Windows 2000 Professional, but for some older, proprietary applications that will not run on Windows 2000 Pro, you will maintain a small percentage of Windows 95/98 desktops. Users of the Windows 95/98 desktops soon begin to inundate the helpdesk with claims they are unable to locate resources in the Active Directory Database. None of the Windows 2000 Pro machines experience this problem. What is causing the network complication? A. The hardware configured on the Windows 95/98 desktops are incompatible with Windows 2000 Network Operating Systems. B. Only Distributed File System support is allowed for Windows 95/98 desktops that participate in a Windows 2000 Domain environment. C. The appropriate client software is not installed by default. D. Windows 95/98 are not supported in running in a Windows 2000 Active Directory Domain environment.
64. You are the Network Administrator for a Financial Reporting Firm named FRM Associates. Due to the highly sensitive nature of the data collected and reported daily, company policy requires that all compensation documents be encrypted to thwart any attempts to steal documents off of the network operating systems. As a result, the Windows 2000 File Server has encryption enabled for the "compensation" folder where all compensation documents are stored. This setting apply to all of the child folders and files of the compensation folder. The disk storage space available is running low. As a result, you decide to compress the compensation folder, because this folder contains a large number of text files where you would be able to gain the largest rate of compression. When you configure compression on the compensation folder, which of the following statements would be considered true? (Choose all that apply) A. You will be able to maintain the company's policy of encrypting all compensation documents and data. B. You will be able to compress the folder and its immediate child files, but not encrypt them. C. You will be offered the opportunity to decrypt and then compress the child folders and files of the compensation folder. D. You will be offered the opportunity to display compressed folders and files in an alternate color.
65. Alice is the Marketing Director of MKTG Company. She uses a proprietary graphics package installed on a shared Windows 2000 Pro desktop to create the marketing collateral used to support the sales team. The graphics files average about 2MB each in size. The network administrator has had recurring problems with the majority of employees at MKTG Company consuming large amounts of disk space on this shared machine. In order to ensure ample disk space is available for every user, the network administrator enables Disk Quotas, and limits each employee to 10MB of space. Alice requires at least 50MB of disk space on the shared desktop. Given the current configuration, what is the best way for Alice to have 50MB of disk space set aside without allowing all of the other users to gain access to more disk space? A. Clear the deny disk space to users exceeding quota limit check box. B. Modify the "Limit Disk Space to" on the Quota Property page to 50MB, then add an entry for all other users via the Quota Entries button that limits them to 10 MB each. C. Add an entry for Alice via the Quota Entries button that sets her disk storage limit to 50MB. D. Disable quota management.
66. BTWX Company relies on each of its employees to create content via MS Office applications and share this information across the network. As a result, each user must be able to create shared folders on their own Windows 2000 Pro machines. On one Windows 2000 Pro machine, named Win2Kprof, you create a local user account for Fred. Fred uses his local account to run the MS Office applications. Furthermore, Fred is able to create new folders, save and delete files, and assign permissions to other users and groups to files system resources. However, Fred is unable to make his resources available across the network. How can you allow Fred to make his resources across the network without jeopardizing administrative privileges? A. Create a shared folder for Fred on a Windows 2000 Server and have him copy his content to the share. Then assign permissions to the users who require access to these files. B. Add Fred to the Administrators Group. C. Add Fred to the Power Users Group. D. Add Fred to the Backup Operators Group.
67. You are setting up the Windows 2000 printing environment permissions for your department. Which of the following statements about printing permissions is true? A. The Print permission enables users to share a printer. B. The Manage Printers permission enables users to control job settings for all documents. C. The Manage Documents permission enables users to connect to a printer. D. The Manage Documents permission enables users to change printer permissions.
68. Jennifer is an employee of a company called XYZ Dimensions Inc. located in Chicago. Jennifer is currently using a stand-alone Windows 2000 Pro Workstation, named JennyW2KP, to use a locally installed graphics editing application. As the administrator, you are going to add JennyW2KP to the Windows 2000 Domain, named XYZDimensions.edu, which currently consists of one Windows 2000 Server Domain Controller and four Windows 2000 Pro workstations. Before adding JennyW2KP to the XYZDimensions.edu Domain, you use the Local Group Policy MMC snap-in on JennyW2KP and configure the account lockout policy to lock out Jennifer's local user account after three bad logon attempts. Afterwards, you configure the Default Domain Controllers Policy to lockout Jennifer's Domain Account after two bad logon attempts. What will be Jennifer's result if she attempts to logon to the Windows 2000 Network using her Domain Logon account and providing an invalid password both times? Select the correct answer. A. She will be allowed three more logon attempts to the Windows 2000 Network because the Local Group Policy and Default Domain Controllers Policy cumulatively allow her five bad logon attempts. B. Jennifer will be allowed one more logon attemp to the Windows 2000 Pro machine because the Local Group Policy allows her three bad logon attempts. C. Jennifer will be locked out of the Windows 2000 Network for a configured amount of time designated by the administrator. D. Jennifer will be allowed one more logon to the Windows 2000 Network because the Local Group Policy overrides the Group Policy.
69. You are the Active Directory Administrator for a company named XYZ Consulting. The company network has been configured with one Windows 2000 Server Domain Controller, named SOHOServer, that will maintain all user, group, and computer accounts. The Domain name is Australia.com. There are 25 Windows 2000 Pro Workstation:s in this Domain that are used by XYZ Consulting company's employees for network access to shared resources on SOHOServer. To ensure that you are the only user with Full Control to all objects in the Active Directory database, you to decide implement an audit policy to monitor the success or failure of using this Active Directory permission. Using the MMC-Active Directory Users and Computers for the Australia.com Domain, you modify the Default Domain Policy by editing its properties. Specifically, you navigate to the Group Policy tab in the Australia.com properties dialog box, modify the property "Computer Configuration\Windows Settings\Local Policies\Audit Policy\Audit Account Management," and clear the "Exclude this setting from configuration" checkbox. You also select the "Audit successful attempts" and "Audit failed attempts" checkbox. Three days later, you are reviewing the Security Log using Event Viewer and observe success and failures messages for Modify, Write, and Read Permissions for all users. However, there are no success or failure messages for any of the changes you have made to the Active Directory Service Database with Full Control permissions. What is the reason for these results? (Choose all that apply) A. The Default Domain Policy, User Rights settings do not grant the administrators the "Manage auditing and security log" right. B. The Default Domain Controllers Policy does not allow the auditing of successes and failures. C. The security log default filter settings do not display any Success of Failure Audit messages. D. The default auditing permissions for the user account Active Directory container does not have Full Control "Successful" or "Failed" selected for inclusion in the auditing policy.
70. Charlie is the administrator for a company named XYZ Stamp Co. and is in charge of maintaining and securing all Windows 2000 Server:s. XYZ has one Windows 2000 Server, named DCLogonPrime, configured as a Domain Controller, and two Windows 2000 Server:s configured as file/print servers, named HdrServer1and ProfServer2. All employees have home directories setup on HdrServer1 where they are able to store personal files. All employees' home folders are stored on an NTFS partition and were created by Charlie using the \\HdrServer1\users\%username% value in the user account Home directory field on the "Profile" property tab. Due to the growth of XYZ Stamp Co., Charlie observes a sustained CPU/Processor utilization rate of 86% during peak times of usage. In addition, XYZ's Help Desk has received an increasing number of support calls reporting error messages when attempting to Logon to the Windows 2000 Network. In order to alleviate the recurring problem, Charlie must convert the HdrServer1 Server to a Windows 2000 Domain Controller Server. In order to start this process, Charlie must first move all employees' home folders from HdrServer1 to ProfServer2. The permissions for the Home Folders on HdrServer1 are as follows: C:\ is an NTFS partition C:\users\ Shared Permissions: users: Full Control administrators: Full Control backup operators: Full Control account operators: Full Control NTFS Permissions: administrators: explicit Modify account operators: explicit Modify backup operators: explicit Read & Execute, List Folder Contents, and Read users: explicit List Folder Contents For C:\users\ The permissions for the destination server are as follows: D:\ is an NTFS partition D:\ Shared permissions: default administrators: Full Control NTFS permissions: administrators: explicit Full Control server operators: explicit Full Control backup operators: explicit Read users: explicit List Folder Contents What are the share and NTFS permissions of the moved home folders on the destination server? A. The D:\users folder will be shared with Full Control for the users, administrators, backup operators and account operators. The modified NTFS permissions for the d:\users folder will be administrators and account operators: Read & Execute, List Folder Contents, and Read; NTFS permissions for backup operators, and List Folder Contents NTFS permissions for users. D:\users\employee# will have explicit NTFS Full Control permissions for the respective user accounts. B. The D:\users folder will not be shared. The modified NTFS permissions for the d:\users folder will be administrators and account operators: Read & Execute, List Folder Contents and Read; NTFS permissions for backup operators, and List Folder Contents NTFS permissions for users. D:\users\employee# will have explicit NTFS Full Control permissions for the respective user accounts. C. The D:\users folder will be shared with Full Control for the administrators. The NTFS permissions for D:\users and D:\users\employee# will be Full Control for administrators and server operators, Read for backup operators, and List Folder Contents for users. D. The D:\users folder will not be shared. NTFS Permissions for D:\users and D:\users\employee# will be Full Control for administrators and server operators, Read for backup operators, and List Folder Contents for users.
71. You are the new administrator at a company named XYZ SlipStream Communications. You have been placed in charge of all production servers throughout your enterprise. Among these servers are two Windows 2000 Server Domain Controllers, one Windows 2000 Server used for File and Print Services, one Windows 2000 Server used to host a database, and one Windows 2000 Server configured as the Web site for XYZ SlipStream Communications (www.XYZ_SlipStream.com) using IIS 5.0. The Windows 2000 Server configured as the web site is name WebServerProd. Frank, the CEO of XYZ SlipStream Communications, has mandated "always up" availability of the Web site to customers and employees alike. As a result, the Content Provider and Web Development Departments are unable to make direct changes to the content on the production server without interrupting their work. To support their efforts, you decide to replicate the content to a new Windows 2000 Server, named WebServerTest, that will act as a testing and staging server for the Content Provider and Web Development Departments. The content from the production Web server, WebServerProd, is stored on an NTFS partition, and will be replicated to a folder on the WebServerTest Server which also users an NTFS partition. Permissions on WebServerProd D:\ is an NTFS partition For D:\inetpub\ administrators: explicit Full Control server operators: explicit Full Control Content Providers: explicit Modify Web Development: explicit Modify users: explicit List Folder Contents For D:\inetpub\wwwroot administrators: inherited Full Control server operators: inherited Full Control Content Providers: inherited Modify Web Development: inherited Modify users: inherited List Folder Contents For D:\inetpub\wwwroot\*.* administrators: inherited Full Control server operators: inherited Full Control Content Providers: inherited Modify Web Development: inherited Modify users: inherited List Folder Contents Permissions on WebServerTest D:\ is an NTFS partition For D:\inetpub\ administrators: explicit Full Control backup operators: explicit Full Control For D:\inetpub\wwwroot\ administrators: inherited Full Control backup operators: inherited Full Control users: explicit Read Upon copying all files from the WebServerProd D:\inetpub\wwwroot\ folder to the WebServerTest D:\inetpub\wwwroot\ folder, employees of the Content Provider and Web Development Departments complain that they are unable to change any of the content on the WebServerTest. Why are the employees experiencing difficulties? A. Employees from the Content Provider and Web Development Departments are assigned explicit Read permissions as a result of the copy. B. Employees from the Content Provider and Web Development Departments do not have any explicit permissions to the copied content. Read access is provided as a result of the "users" having explicit Read NTFS permissions. None of the original permissions were maintained. C. Employees from the Content Provider and Web Development Departments have NTFS Modify permissions. D. Employees from the Content Provider and Web Development Departments need to log off and log back on to the Windows 2000 Network in order to create a new access control token with permissions that will allow them to Modify the copied content.
72. What information is required for a user to log on to a computer? A. Active Directory Preferred Server B. Active Directory Operations Manager C. Password D. Username E. First Name
73. Can Windows 2000 Professional support multiple video adapters? A. Yes B. No
74. How many total video adapters are supported in a Windows 2000 Pro workstation? A. 1 video adapter B. 2 video adapters C. 5 video adapters D. 10 video adapters E. Unlimited video adapters, based on hardware limitations
75. If the paging file size is too low on your computer what error might you see on the system? A. Windows - Temporarily out of Swap File Space B. Windows - Virtual Memory Too Low C. Windows - This program has performed an Illegal Operation and will be Shut Down D. Dr. Watson - Out of Virtual Memory Space E. Windows - Out of Swap File Space
76. You are starting the multiple display configuration for several of the computers in the Graphic department. All computers have Windows 2000 Pro system installed. Whach Windows 2000 utility are you going to use for the configuration process? A. Control Panel -> Services B. Control Panel -> Display properties C. Control Panel -> Video properties D. Control Panel -> Devices E. Control Panel -> System properties
77. Cynthia is the assistant network administrator for a company named XYZ Airlines. Jeff is the network administrator who has installed and configured the existing Windows 2000 network, which contains three Windows 2000 Server:s configured as Domain Controllers. One Windows 2000 Domain Controller is located at each of XYZ Airlines' three terminals to provide fast authentication of employees to the network. At the Chicago Terminal, Jeff setup an additional Windows 2000 Server, named FlghtResv, on which he installed the flight reservation application to be used by employees at all XYZ Airlines' employees at each of the three terminals. FlghtResv has a single hard drive configured with the NTFS file system. The flight reservation application was installed into the C:\apps\flightreservation folder. Jeff assigned the following NTFS permissions to the "flightreservation" folder: Administrators have explicit Full Control permissions, Jeff has explicit Full Control permissions, and Users have Read & Execute permissions. Jeff is unexpectedly called out of town and leaves instructions for Cynthia to complete the configuration of the flight reservation application. He tells her, "Unless the application is shared across the network, the flight reservation representatives will not be able to use the application and XYZ Airlines will lose customers and money. I've already configured the permissions necessary to allow the users to use the application and for all administrators to make changes and updates to the flight reservation application as necessary. Keep these permissions and make the application available across the network." Cynthia opens the Computer Management utility pointing to the FlghtResv Server. As Cynthia progresses through the new share wizard that will make the c:\apps\flightreservation folder and application available across the network, Cynthia sees a dialog box with the following choices: 1. Keep current permissions 2. I have Full Control, everyone else has Read permissions 3. Everyone has Full Control permissions Cynthia selects "I have Full Control and everyone else has Read permissions." What are the effects of Cynthia's actions? A. The Administrators Group and Jeff will have Full Control Permissions and Users Group will have Read & Execute Permissions. B. The Administrators Group and Cynthia will have Full Control Permissions and the Everyone Group will have Read permissions. C. Jeff will have Full Control Permissions and the Users Group will have Read permissions. D. Cynthia will have Full Control Permissions and the Everyone Group will have Read permissions.
78. You are the Group Policy Administrator of a company named XYZ Vision Software. The company has installed a single Windows 2000 Server Domain Controller, named DCServer2K, to create a Domain called XYZ_Software.Dev. The 25 employees of XYZ Vision Software use Windows 2000 Pro Workstation:s as the standard desktop. Three of the employees of XYZ Vision Software will be assisting you create shared resources for users on the Windows 2000 Server Domain Controller; however these three employees must not be able to create any shared resources on any of the Windows 2000 Prol Workstation:s. You decide to implement Group Policies to allow Ralph, Mary, and Fred the right to create permanent shared objects. The default Active Directory structure remains intact. Under the XYZ_Software.Dev Domain node in the MMC - Active Directory Users and Computers, you see the default containers of Builtin, Computers, Domain Controllers, and Users. You modify the Default Domain Policy on the Domain node by clearing the "Exclude from future configurations and analysis" checkbox and add the user accounts for Ralph, Mary and Fred for the right to "Create permanent shared objects". You then modify the Default Domain Controllers Policy by selecting the Block Inheritance Check box, clearing the "Exclude from future configurations and analysis" checkbox, and adding Ralph, Mary, and Fred the right to "Create permanent shared objects." What will Ralph, Mary, and Fred be able to accomplish with the above configuration? A. Ralph, Mary, and Fred will be able to create Shared folders and printers on all Windows 2000 Pro Workstation:s. They will not be able to create any Shared folders or printers on the Windows 2000 Server Domain Controller, DCServer2K, because you have blocked inheritance of Group Policies. B. Ralph, Mary, and Fred will not be able to create any Shared folders or printers on either the Windows 2000 Pro Workstation:s or Windows 2000 Server Domain Controller, DCServer2K, because the Group Policies are not synchronized between the XYZ_Software.Dev node and Domain Controllers Container. C. Ralph, Mary, and Fred will be able to create Shared folders and printers on all of the Windows 2000 Pro Workstation:s and on the Windows 2000 Server Domain Controller, DCServer2K. D. Ralph, Mary, and Fred will not be able to create Shared folders and printers on any of the Windows 2000 Pro Workstation:s; however they will be able to create Shared folders and printers on the Windows 2000 Server Domain Controller, DCServer2K.
79. Windows 2000 Pro has been selected as the desktop of choice. In an effort to maintain consistency of application support, you implement a policy of yearly creating a new image for desktop computers that will have applications installed that the HelpDesk will officially support. A specific component of this policy is that users are not allowed to install any additional hardware devices or drivers that are not digitally signed. However, your HelpDesk is receiving an increasing amount of support calls for hardware device drivers that are preventing users Windows 2000 Pro desktops from running correctly. As a result, you need to further restrict the ability of users to install device drivers. What do you need to configure on all of the Windows 2000 Pro machines in order to accomplish this goal? A. Configure Driver Signing Options to display a message before installing an unsigned file by using the MMC Snap in for Computer Management (Local) on each Windows 2000 Pro desktop. B. Configure Driver Signing Options to prevent installation of unsigned files by using the MMC Snap in for Device Manager. C. Configure Driver Signing Options to Prevent installation of unsigned files by using the System Application in Control Panel. D. Leave the default settings for Driver Signing Options.
80. You are the Remote-User Network Support engineer for BDG Company. The Chief Executive Officer has purchased a new laptop that he uses when on the road and has a docking station with a Network Interface Adapter and ZIP drive attached when he works in his office. The laptop is running Windows 2000 Pro. You must configure two separate hardware profiles in order to support the docked and undocked states of the Windows 2000 Pro laptop. You log on to the Windows 2000 Pro laptop, as an administrator, while the machine is undocked. You then proceed to open Control Panel, launch the System configuration tool, and open the Hardware Profiles configuration Window. You copy the existing hardware profile to a new profile. After changing the new hardware profile to reflect a "docked" setting, you close out of the Hardware Profiles configuration Window and immediately use Device Manager to Disable the Modem and built-in Network Interface Adapter of the Windows 2000 Pro laptop. You then log off of the Windows 2000 Pro laptop and return it to the CEO. Later in the day, the CEO calls you from home to report that he is neither able to dial into the company network nor connect his laptop to the small Local Area Network he has at home. You confirm that he had selected the "Undocked" option during system power up. What do you believe is causing the problem? A. The CEO did not shut down and restart his machine to update the Windows 2000 Pro registry. B. The CEO did not provide the correct user name and password when he dialed the RAS Server of BDG Company. C. You configured the Docked Profile to reflect an "undocked" setting. D. When you made changes in the state of the Modem and Network Interface Adapter with Device Manager, you accidentally disabled them from running in the Undocked Hardware Profile.
81. What factors are important to remember when configuring two video adapters on a Windows 2000 Pro computer? A. Switch the order of the adapters on the motherboard to match the system. B. Confirm that the correct video drivers are being used. C. Activate the device in Display Properties. D. Check the status of the devices in the Device Manager. E. Windows 2000 Professional doesn't support multiple video adapters.
82. You are the network administrator for a company named SATYR Network Communications Inc. You have set up a Windows 2000 print Server on an Intel-based computer. There is a print device that is connected to the Windows 2000 print Server, and is shared for all users on the network. The necessary print permissions have been configured. The network consists of clients running Windows 2000 Pro, NT 4.0 Workstation:s and Windows 98 on Intel platforms, NT 4.0 Workstation:s on Alpha platforms, and Macintosh computers. What is the correct configuration of the printing environment to support this diverse grouping of clients? A. Do nothing. The default configuration of the Windows 2000 Print Server on an Intel platform natively supports all of the clients. B. Install the Windows 98 drivers on the Windows 2000 Print Server. Install the appropriate printer driver on the each of the Macintosh computers. C. Install the NT 4.0 Alpha, NT 4.0 Intel, and Windows 98 Intel Drivers on the Windows 2000 Print Server. Install the appropriate printer driver on each of the Macintosh computers. D. Install the NT 4.0 Alpha, NT 4.0 Intel, Windows 98 Intel, and Macintosh printer drivers on the Windows 2000 Print Server. E. No Answer is Correct
83. What does a signature on a device driver mean? A. That the driver manufacturer placed information about the device. B. That the driver has been compressed. C. That the driver has been digitally signed. D. That the driver has been encrypted for protection. E. That the driver has been enforced by the Internet Society Architecture Board.
84. Where do you configure the system to not allow the installation of unsigned driver files? A. Add/Remove Programs, Driver signing option B. System Properties, Driver signing option C. Hardware Profiles, Driver signing option D. Device Manager, Driver signing option E. Services, Driver signing option
85. Where do you configure the system to allow the installation of all files, regardless of whether it is a signed or an unsigned driver files? A. Add/Remove Programs, Driver signing option B. Hardware Profiles, Driver signing option C. System Properties, Driver signing option D. Device Manager, Driver signing option E. Services, Driver signing option
86. Where do you configure the system to warn the administrator before installing an unsigned driver file? A. Services, Driver signing option B. Device Manager, Driver signing option C. Add/Remove Programs, Driver signing option D. System Properties, Driver signing option E. Hardware Profiles, Driver signing option
87. What two utilities does Windows 2000 provide to troubleshoot device driver signatures? A. SigFind B. SigVerif C. DriveSig D. FileSig E. SFC
88. What command would you execute to scan all the protected files on the system immediately and replace incorrect ones with the correct files? A. SFC /scanimmediate /yes B. SFC /scannow /quiet C. SFC /enable D. SFC /scanonce /quiet E. SFC /scannow /yes
89. When creating hardware profiles in Windows 2000, what type of devices can be disabled or enabled? A. Network Adapters only B. All devices C. Video displays D. Modems E. Sound cards
90. While attempting to adjust the video settings for your workstation, your screen goes black. How could you attempt to fix this? A. Boot the system in Safe Mode B. There is nothing you can do; just log on and attempt to fix the problem C. Boot the system with the Enable VGA Mode D. Boot the system with the Last Know Good Configuration E. Boot the system in the Network Enable Mode
91. What is the System Monitor: Processor: %Processor Time utilization threshold where you should consider replacing the Processor with a faster processor or adding another processor? A. A Processor: %Processor Time spike of 80% B. A sustained Processor: %Processor Time utilization of 75% C. A Processor: %Processor Time spike of 95% D. A sustained Processor: %Processor Time utilization of 80%
92. Which is the best System Monitor object to check to determine if an application is causing your Windows 2000 application server to respond sluggishly to any client request for service (running an application; establishing a file session)? A. System B. Processor C. Physical Disk D. Process E. Thread
93. Of the following Microsoft Windows 2000 Pro or Server tools, which ones are able to display network connection data for troubleshooting purposes? A. NETSTAT B. NBTSTAT C. TASK MANAGER D. System Monitor E. NETWORK MONITOR
94. After assigning manual TCP/IP address to workstations, the administrator notices that one of the workstations isn't working properly on the network, after running IPCONFIG /ALL on the machine, the administrator notices that the IP address is 0.0.0.0. Why? A. That address is already in use B. The Administrator entered the information in wrond C. The machine has not fully initialized the IP address yet D. The network is down E. The cable is unplugged from the machine
95. For a workstation to successfully communicate on a network, the workstation must have at least the following configured on it? A. Network Adapter Card B. Common Protocol C. Network Bindings D. TCP/IP Address E. DNS Server Address
96. You have a valid Internet IP address for your Windows 2000 Professional computer on the Local Area Network (LAN) in Charlotte. You need to access the corporate LAN in Princeton, New Jersey, which has a Remote Access Server with the IP address 202.133.14.10. What method should you use to create this connection? A. A dial-up connection to the Internet Access Provider. B. A Direct Cable Connection to the RAS server in Charlotte which has on-demand dialing. C. A dial-up connection to the RAS server in Princeton. D. A Virtual Private Network (VPN) to 202.133.14.10.
97. You have a Windows 2000 Professional computer with an erratic mouse. The arrow or I-beam will not stay where you place it on the screen. You have removed the ball and cleaned the contacts and the ball. You have closed all programs but the one you are currently using, including the virus checker. What should you do next? A. Uninstall the mouse driver and install it again. B. Try another mouse on this computer. C. Try this computer's mouse on another computer. D. Run the virus checker to learn if it has affected the mouse driver.
98. You have a Windows 95 computer with a Pentium 100, 64 MB of RAM, 2 GB of hard disk space, and a CD-ROM. The network adapter is not PXE boot ROM-compliant. You want this computer to use Dfs as that will be a standard for everyone on the upgraded network. What should you do to enable Dfs on this machine? A. Create a remote installation boot disk by running rbfg.exe. Upgrade the system to Windows 2000 Professional from the network installation source. B. Use the PCI empty slot to add a new PXE boot ROM-compliant network adapter, set the BIOS to start from the network adapter card, and upgrade to Windows 2000 Professional. C. Install Internet Explorer (IE) 4.01 or later and enable the Active Desktop component. Install the Directory Service Client. D. Create the four boot floppies to run startup and use the CD-ROM drive to finish the upgrade to Windows 2000 Professional because this CD-ROM is too old to be a bootable device.
99. You have an Active Directory network with DHCP and DNS services in place. You want all new Windows 2000 Professional computers to have automatic IP addresses assigned. How do you do this? A. In the Local Area Connection Properties sheet, highlight the TCP/IP protocol and click the Properties button. The General tab allows you to obtain an IP address automatically. B. From a Command Prompt window, run ipconfig, configure for automatic addressing, and set the lease time. C. In the Local Area Connection Properties sheet, highlight the TCP/IP protocol and click the Properties button. The General tab allows you to select to use the DNS server by typing in its address. D. Disable the Automatic Private IP Addressing in the Registry for each adapter this computer has installed.
100. You have installed Windows 2000 Professional, but now the SuperVGA monitor's adapter does not have all the configuration settings that you set before the upgrade. It is also missing the tabs you are accustomed to using with this adapter in the Control Panel. What should you do? A. Verify the signature of your driver using Device Manager. It is possible your good driver is corrupted. B. Get the manufacturer's adapter device driver. Often these have added extensions that the Microsoft Windows 2000 Professional does not provide. You need to install it instead of the driver that was installed during Windows 2000 setup. C. In Device Manager, under Monitors, use the Properties sheet to view the manufacturer's legacy extensions. D. From Device Manager, run the Troubleshooter. It will help you find the legacy driver.
101. You have established an infrared link with your office partner's laptop. Both computers are running Windows 2000 Professional. When are you able to send files from Word and from Visio on your laptop to her laptop? A. A data connection must be established using the icon on the desktop or the context menu in Explorer where the files are listed. B. A data connection must be established for each program using the Control Panel Wireless Link icon. C. A data connection must be established for Word from within the application's Send to and another established for Visio from within its Send to. D. A data connection must be established from within each application using the Save As option and naming the target computer's folder.
102. You have offline folders on two different file servers. The Project1 folder is on Server1, and the Project2 folder is on Server2. Project1 is almost finished, and you no longer want to synchronize files each night when you go home with your laptop; but you don't want to disable the offline folder Project1. What should you do? A. Use the Synchronization Manager in Explorer, Tools, Synchronize. For the Project1 folder, click the box for Ask me before synchronizing the items on the Logon/Logoff tab. Choose the LAN for your network connection. B. Using Explorer, set the Manual Caching for Documents option on the Project1 folder. C. Use the On Idle tab of the Synchronization Manager to turn off synchronization of the Project1 folder during idle times. D. In the Folder Options of Explorer on your laptop, use the Offline Files tab to Enable Reminders. When prompted, at either LAN connection or remote connection, you have the option of refusing the synchronization.
103. You have reinstalled Windows 2000 Professional after a failed installation. The second installation completed, but now you cannot connect to the domain controller. You know that the domain controller and the DNS server are both running. You have checked your network adapter settings and the transport protocol is correct. What should you do? A. Make sure the computer name (for NetBIOS) is unique on the network. B. Delete this computer's account on the domain controller, recreate it, and then, from this workstation, rejoin the domain. C. Make sure the network adapter has the correct transceiver type. D. Make sure all hardware is on the Hardware Compatibility List (HCL).
104. You have ten symmetric multiprocessing (SMP) systems with a new hardware abstraction layer (HAL) file recently supplied by your computer manufacturer as part of hardware upgrade support for these computers. You also have an inventory of various types of 10/100 network adapters. You want to use sysprep.exe to prepare a master image for Windows 2000 Professional for these computers. What must you do before you can use the System Preparation Tool? A. Create an answer file using Setup Manager wizard and include the [Networking] section with a InstallDefaultComponents = Yes line to manage the various network adapters. B. Prepare a sysprep.inf file that will provide the new HAL file when the Mini-Setup wizard detects the hardware. Create a destination files folder for the HAL file. C. Find out if the disk drive controllers for the target computers are the same as the one you are preparing the master image on. D. Obtain the network driver interface specification (NDIS) drivers for these network adapter cards.
105. You have three users in your company who require multiple language support on their Windows 2000 Professional computers. The computers already have English. You want to add French, and you see it as a choice in the Regional Options. You do not see the Slavic Languages, however. One of the users will use Czech. What do you need to do? A. Use the Input Method Editors to customize Regional Options. Select Czech for keyboard layout. B. Install the Baltic language group using the Windows 2000 Professional CD. C. Use the Import Locale tab of the Regional Options to select Czech. D. Change the local Group Policy for each computer to enable access to the multiple languages for these users.
106. You have trained mobile users to use offline folders. A user reports to the Help Desk that she cannot find a file she created yesterday while working at home. Which scenario is most likely the cause of her lost file? A. She changed the default settings when configuring Offline folders and files on the Offline Files tab. Today she is looking for the file on the network share. B. She saved the file in a folder on her hard drive that is not configured for Offline caching. C. She lost the file permanently before it was ever saved to hard disk during a system failure so Offline caching was not yet in effect. D. Her cached file was saved to the network share when she logged on, but another user who has delete permissions for the folder deleted the file.
107. You have two Plug and Play modems in your Windows 2000 Professional computer. You want to be sure the application is using the faster modem when an inexperienced user is working this week on your computer. What should you do? A. Deny the user access rights to the slower modem within Local Computer Policy. B. Disable the slower modem because this is a temporary arrangement. C. Use the Add/Remove Hardware wizard to remove the driver for the slower modem. D. Set the default modem within the application the user will be working in.
108. You have two volumes of dynamic storage on your Windows 2000 Professional computer. You need to restore the boot volume to correct some corrupt files. You aren't sure how widespread the file corruption problem is. Which data will you select to restore? A. A backup job B. A backup set C. Individual folders D. Individual files
109. You have Web server services running on the Internet Connection Sharing (ICS) computer in your branch office. Next, you implement auditing on this Windows 2000 Professional computer. The security log shows no events, success, or failure after two days. You check that you enabled Audit object access. You check that you enabled auditing for specific files and folders. You reboot the computer. Still, no events are logged. What do you need to do? A. You need to enable Audit privilege use at domain level in the Active Directory, which affects the local auditing. B. For each file or folder you wish to audit you should choose the group Everyone for the Auditing Entry, rather than the Users group. Everyone will include anyone who accesses these files over the network. You have no events logged because members of your domain who are part of the Users group have not attempted to access these objects. C. You need to set the Auditing policy at domain level in the Active Directory. D. You need to check Allow Inheritable Auditing Entries From Parent To Propagate To This Object.
110. You inherit a workstation running Windows 2000 Professional installed on a FAT32 drive. You want to audit access to the files now that the computer will be used for sensitive data. What step is necessary before auditing can be enabled? A. Use the convert d: /fs:ntfs command where d: is the drive you wish to convert. Allow the system to reboot when prompted. B. Use the ListFreeSpace.vbs /S computername /O filename command on the computer with the drive you wish to audit. C. Logged on with administrator privileges, enable the Audit Object Access in Local Policy area of the Computer Configuration. D. Logged on with administrator privileges, enable the Directory Service Access in Local Policy area of the Computer Configuration.
111. You have Windows 2000 Professional installed on a computer that three employees use. You want each of three users to have his own documents area that no one else can access. You create for each of the three users a shared folder of his own. You give only the owner user permission to use the folder. Later in the week, you are informed that User1's folder was modified while User1 was on vacation. What is wrong with your security configuration? A. Shared folder security only works when accessing the folder over the network. B. Domain authentication should be required at logon. C. Local computer policy must restrict the rights of the three users. D. You gave each share folder the same name under the users' Documents and Settings folders.
112. You install a second processor on a computer running Windows 2000 Professional. What step should you take to configure the computer to use the second processor? A. Use the Add/Remove Windows Components feature of Add/Remove Programs. B. Rerun the Windows 2000 Professional Setup program. C. Restart the computer to allow Windows 2000 to detect and configure the second processor. D. Use Device Manager to update the driver for the computer.
113. You install new speakers that connect by universal serial bus (USB) to your laptop that has been upgraded to Windows 2000 Professional. The install was unable to complete successfully. Where should you go to correct the problem? A. Run the Windows update to see if there are new drivers for your brand of speakers. B. Check the laptop's BIOS to see if USB is enabled. C. Check Device Manager for the speakers. Correct the settings for the interrupt. D. Begin the installation again, this time using Add/Remove Hardware Wizard in the Control Panel. Choose the option to provide the manufacturer's device driver.
114. You install the Remote Installation Services (RIS) on a Windows 2000 Server. You configure the RIS server to deploy Windows 2000 Professional to client computers. One of the computers to which you plan to deploy Windows 2000 Professional has a network adapter card that does not have a Preboot Execution Environment (PXE) boot ROM. What should you do to provide an alternate method that uses a floppy disk or disks to deliver Windows 2000 Professional to that client from the RIS Server? A. Use the Network Client Administrator utility to create a network installation startup disk. B. Use the Setup Manager wizard to create a floppy disk that contains the remboot.sif answer file. C. Use the makeboot utility to create setup disks. D. Use the Remote Boot Disk Generator utility to create a startup disk.
115. You install Windows 2000 Professional on a computer and select the Typical option for the network settings. You do not have a network adapter card, so you select the Microsoft Loopback Adapter. Later, you install a non-Plug and Play network adapter card in the computer and restart the computer to let Windows 2000 detect the card. Using Device Manager, you notice that the card is configured to use IRQ 10, the same IRQ as a non-Plug-and-Play sound card. You determine that IRQ 5 is not being used. You use Device Manager to modify the IRQ to 5 for the network adapter card. However, even after restarting the computer, you are not able to access the network. What other step must you take to enable access to the network? A. Manually enter an IP address for the network adapter card. B. Install the Client for Microsoft Networks. C. Remove the Microsoft Loopback Adapter. D. Reconfigure the network adapter card to use IRQ 5.
116. You install Windows 2000 Professional on a computer in which a non-Plug and Play network adapter card is installed. The card is on the Hardware Compatibility List (HCL). When the installation is complete, you start Device Manager to view the installed devices. You notice that there is no category for Network Adapters in Device Manager. You also notice that the Other Devices category lists an ethernet controller whose icon is a yellow question mark with an exclamation mark in a yellow circle. What step should you take to install and configure the network adapter card? A. Use the Add/Remove Windows Components feature of Add/Remove Programs. B. Select Reinstall Driver from the Properties dialog box of Ethernet Controller in Device Manager. C. Use Add/Remove Hardware in the Control Panel to add the correct driver for the network adapter card. D. Use the Make New Connection icon in Network and Dial-up Connections.
117. You install Windows 2000 Professional on a computer in your test lab on which Windows NT 4.0 Workstation was installed. During the installation, you create a new 2.5 GB partition and indicate that the partition should be formatted as FAT. You want to be able to boot back to Windows NT, so you indicate that the Windows 2000 system files should be installed on this new partition. After installation is complete and you boot the computer back to Windows NT, you discover that you cannot access the new partition from Windows NT. What is the most likely reason that you cannot access this partition? A. Your Windows NT logon account does not have permission to access the new partition. B. Setup formatted the partition as FAT32. C. Setup converted the partition to Windows 2000 NTFS when you indicated that the partition should be used for the system files. D. Windows NT cannot access a partition that is larger than 2 GB.
118. You install Windows 2000 Professional on a computer. If you need to deploy a service pack for Windows 2000 Professional, what utility should you use to deploy the service pack? A. Add/Remove Windows Components from Add/Remove Programs in the Control Panel B. Windows Update from the Start menu C. Windows Installer D. The Update utility for the Service Pack with the /slip switch
119. You know that the processor is overwhelmed, and you already know that a single process is causing the problem. Where can you find out whether to purchase another processor or a faster processor? A. In Task Manager, Processes tab, Columns view of Thread Count B. In System Monitor, histogram view, Processor(_Total)\% Processor Time C. In perfmon.msc, %Processor Time values for the System process D. In the Pviewer utility report of Thread(_Total)\Context Switches/sec
120. You installed Windows 2000 Professional on a laptop. Then you inserted the network PC Card so the system could recognize it, but it did not. What have you overlooked? A. A hardware profile was not created that includes the network adapter's driver. B. The PC Card socket driver and the network driver must both be Plug-and-Play. C. The Add/Troubleshoot option in Add/Remove Hardware Wizard was not run to validate the interrupts. D. Device Manager was not used to print a report of all device settings.
121. You notice that you have duplicate network drive mappings to a shared folder. After you increased the amount of disk space used for storing offline files on one drive, it is the same for both drive mappings. How should you disconnect one of the duplicate drive mappings? A. From Explorer, highlight the share, click Tools, and Disconnect Network Drive. B. From the Start button, click Run. Use the runas program to gain administrative privileges in Explorer and disconnect. C. From the Start button, click Run. Type the share name in the Open box. From Tools, choose Disconnect. D. From My Network Places icon, select the host server. Right-click the share, and choose Disconnect.
122. You plan to install Windows 2000 Professional on a laptop computer on which there is currently no operating system installed. You want to manually configure the IP address for the computer while running Setup. Which network settings option should you choose? A. Compact B. Typical C. Portable D. Custom
123. You log on as the local administrator of a computer running Windows 2000 Professional and create a new user account. You want to ensure that only an administrator can change the password for the account. However, the check box next to User cannot change password is not available. What must you do to enable this option? A. Clear the check box for Password never expires. B. Finish creating the account and then modify the password properties. C. Clear the check box for User must change password at next logon. D. Enable the account.
124. You make your statistical results available to everyone in the company in a shared folder on your Windows 2000 Professional computer that has an NTFS file system. You use the Everyone group to provide Full Control, which is the default. NTFS permissions are also set to the default. You make changes to the results daily, but individuals only reference the data occasionally. The scope of the project is changing. Now only a select number of employees will be allowed see the more confidential data. You do not want to create a new folder and move the complex tables. How do you change the role of your share folder to match the new restrictions? A. Create a new group and populate it with the members who will now be allowed to see the data. Remove the Everyone group for both Sharing and Security and add the new group with default permissions for both Sharing and Security. Old members will still have rights until their next logoff. Use cachemov.exe to remove offline folders from any users' hard disks that no longer have permission to the data. B. Change the Sharing and Security permissions to the shared folder for the Everyone group to deny. Create a new group and populate it with only the members who will now be allowed to see the data. Set the Sharing and Security permissions to allow them to read the data only. C. Create a new group and populate it with those members who need rights. Add the group to the folder's Sharing and Security Permissions lists and use the default permissions. Also add the Administrators group and give that group Full Control permissions in both Sharing and Security. Notify all members who have access to this folder of the change in share name. D. Change the location of the shared folder by moving it to your other hard disk. Permissions will be inherited from the new target parent folder. Notify all employees of the change in location and change in permissions for this share folder.
125. You log on using the local Administrator account to a computer running Windows 2000 Professional. You want to enable Advanced Power Management (APM) support. However, when you open the Power Options icon in the Control Panel, there is no APM tab. What is the most likely reason this tab is not available? A. The computer has a BIOS that is ACPI-compliant. B. APM is only valid for laptop computers. C. APM can only be enabled via Group Policy. D. APM must be enabled from the BIOS.
126. You upgrade a computer running Windows NT 4.0 Workstation to Windows 2000 Professional. The computer has one disk drive with three primary partitions and one extended partition. The extended partition is configured with five logical drives. One of the primary partitions is configured as drive E and formatted as NTFS. You convert the disk to a dynamic disk. You add another hard disk, convert it to a dynamic disk, and attempt to extend drive E to include 3 GB of the unallocated space on the new disk. However, you are not able to extend drive E. What is the most likely reason that drive E cannot be extended? A. A volume can only be extended on its original hard disk. B. You do not have one MB of free space on the original hard disk. C. Drive E is formatted with a pre-Windows 2000 version of NTFS. D. A volume that was originally created on a basic disk cannot be extended.
127. You manage six computers running Windows 2000 Professional for your department. Each computer is configured to automatically log on with the username and password of the primary user of the computer. You need to designate a different user account for the automatic logon of one of the computers. What utility should you use to designate a different account? A. Local Security Policy B. Group Policy C. Computer Management D. Users and Passwords icon in the Control Panel
128. You recently upgraded your computer to Windows 2000 Professional. You notice that the performance of your computer is slow when accessing network resources. Which setting can you use to easily change performance without monitoring network performance? A. Remove all Workstation Service bindings to your transport protocols. B. Use the Windows 2000 setup program to reinstall network protocols. The files may be corrupt. C. Use Advanced TCP/IP settings, Options tab, to disable all TCP/IP Filtering on the network adapter. D. Remove the bindings except for TCP/IP, and see if that improves network access to resources.
129. You purchase an infrared-ready printer to use it with your personal digital assistant (PDA) and your Windows 2000 Professional desktop computer. You also purchase an IrDA transceiver that connects to your desktop's serial port. How do you install and configure this transceiver? A. Enter setup mode for your computer and change the mode of the serial port to IrDA or Infrared. In Network and Dial-up Connections set up the wireless link by referencing the infrared port, which shows up after you attach the transceiver and startup the computer. B. Let Windows 2000 Professional's Plug and Play detect the transceiver. Use Device Manager to configure the properties of the device. C. Use the Add/Remove Hardware wizard to detect the device. Use Control Panel's Wireless Link icon to configure the device. D. Enter setup mode for your computer and change the mode of the serial port to IrDA or Infrared. Use the Add/Remove Hardware wizard to detect the device. Use Control Panel's Wireless Link icon to configure the device.
130. You occupy an office with someone who has a shared printer connected to his Windows 2000 Professional computer. You want to use it with your Windows 98 computer. You are both connected to an Active Directory network. How do you get connected to that local print device? A. Use the Add Printer wizard on your Windows 98 computer in the Printers folder. Make the connection by answering all the wizard's option questions for a network printer, and the printer driver will download to your computer. B. Ask your network administrator to add the printer object to the Active Directory. C. Use the URL of the Windows 2000 Professional computer, which is /printer, in your Internet Explorer (IE). D. From the Start button, choose Run and type \\. Double-click the printers folder from the listing. Double-click the Add Printer to initiate the Add printer wizard.
|