Windows 2000 Professional


1. Mary, a user, calls the company Help Desk to ask for instructions on configuring the multi-monitor support for Windows 2000 Pro. After asking some basic questions of the make and model of the machine, you determine that Mary has one AGP Video Adapter and one ISA Video Adapter. What instruction set would you give to Mary to allow her to use multi-monitor?

A. Replace the AGP Video Adapter with another ISA Video Adapter, then use Control Panel to complete the configuration.
B. Replace the ISA Video Adapter with either an AGP or PCI Video adapter, then use Control Panel to complete the configuration.
C. Inform Mary she cannot use multi-monitor capabilities, and then abandon any further effort.
D. Inform Mary she must replace the AGP Video Adapter and ISA Video Adapter with two PCI devices in order to use multi-monitor.

>> !
Answer: B


2. Jeff, who uses a Windows 2000 Pro laptop, speaks both English (United States) and Italian (Italy). Jeff requires his Windows 2000 Pro laptop to give him the ability create documents in either language. The Windows 2000 Pro laptop has English as the default language. What configuration is not required to allow Jeff to create documents in Italia.

A. The language/character set for Italian must be installed/added to the Windows 2000 Pro laptop.
B. The keyboard layout for the Italian must be added as an input language.
C. English must be removed in order to support the Italian language.
D. Jeff has to enable a "hot key" switch to change from the English keyboard layout to the Italian keyboard layout.

>> !
Answer: C


3. You are attempting to use Microsoft's Remote Installation Services to deploy 1,000 Windows 2000 Pro clients. Prior to conducting the massive rollout of these clients to your company, you have setup a test lab to deploy Windows 2000 Pro to the three hardware platforms your company supports on the desktop.
You have already set up and configured the necessary supporting services for Remote Installation Services. In addition, you have created the necessary Windows 2000 Pro-based client disk images, formatted the image volume with NTFS, and shared the image volume. Upon conducting your tests, you observe that two of your three hardware platforms are able to connect to the Remote Installation Services Server and install the correct Windows 2000 Pro image. The last of the hardware platforms, a clone, is unable to connect to the Remote Installation Services server. What factor(s) is mostly likely causing the problem?

A. The Network Adapter installed in the clone does not meet the Net PC specification or have PXE ROM enabled.
B. The clone machine does not have the minimum free space required of 685MB to support the installation of Windows 2000 Pro.
C. The System Preparation Tool (sysprep.exe) was run without the -pnp switch.
D. The Windows 2000 Pro candidate platform is unable is unable to resolve the name for the Remote Installation Services Server in the WINS Server, nor locate the Remote Installation Services Server in the Active Directory.

>> !
Answer: A


4. You are preparing to install Remote Installation Services to help automate the installation of 500 Windows 2000 Pro machines. What are the services that must be configured prior to the installation of Remote Installation Services? (Choose all that apply)

A. WINS Server
B. DNS Server
C. A shared, NTFS-formatted volume
D. Active Directory Server
E. DHCP Server

>> !
Answer: B, D & E


5. You are a Project Consultant working for ZRF Consulting Inc. You have been assigned to plan the migration efforts of a client that has a mix of different operating systems and hardware platforms. The desktop operating systems include Unix, Windows 3.x, Windows 9x, NT 3.51, and NT 4.0 Workstations. You have already determined all hardware available is sufficient to install Windows 2000 Pro. You also need to ensure that the pre-installed applications will continue to operate correctly upon completion of the client upgrades.

Below are listed potential migration paths for each of the aforementioned desktop operating systems. Which of the following client-upgrade paths are possible? (Choose all that apply)

A. Unix: Use either a CD- or network-based installation using WinNT.EXE to upgrade directly to Windows 2000 Pro.
B. Windows 3.x: Use either a CD- or network-based installation using WindowsNT.EXE to upgrade directly to Windows 2000 Profess
C. Windows 95/98: Use either a CD- or network-based installation using WinNT32.EXE to upgrade directly to Windows 2000 Pro
D. NT 3.51: Use either a CD- or network-based installation using WinNT32.EXE to upgrade to NT 4.0, then use the Windows 2000 Pro version of WinNT32.EXE to upgrade to Windows 2000 Pro.
E. NT 4.0: Use either a CD- or network-based installation using WinNT32.EXE to upgrade directly to Windows 2000 Pro

>> !
Answer: C, D & E


6. You are a Help Desk Admin for ZILEX Company. You receive a work order to install and onfigure a Windows 2000 Pro desktop for a new employee. The hardware specifications are as follows:

128MB RAM PIII/500MHz processor
Two FAT-formatted hard drives, each with 8GB of storage
Network adapter installed that meets the Net PC specification
DOS is the installed operating system

A Network Administrator at ZILEX Company has setup two distribution servers, named DSTRBServer and Win2KSRC, where the source files for Windows 2000 Pro are available for network installations. You will need to connect to this distribution server and initiate the installation of Windows 2000 Pro. Which of the following command line structures will allow you to successfully initiate the Windows 2000 Pro installation process?

A. WinNT32.EXE /s:\\DSTRBServer\i386 /s:\\Win2KSRC\i386 /u:unatten
B. WinNT.EXE /s:\\DSTRBServer\i386 /s:\\Win2KSRC\i386 /u:unattend.
C. WinNT32.EXE /s:\\DSTRBServer\i386 /s:\\Win2KSRC\i386 /unattend:
D. WinNT.EXE /s:\\DSTRBServer\i386 /s:\\Win2KServer\i386 /unattend:un

>> !
Answer: B


7. You are attempting to upgrade your Windows 98 desktop to Windows 2000 Pro. In addition to completing the upgrade process, you want to minimize the amount of time you will remain unproductive. The source files for Windows 2000 Pro have been copied to your local hard drive. Which of the following processes will best allow you to upgrade to Windows 2000 Pro and continue working as much as possible?

A. Run WinNT32.EXE /unattend:unattend.txt from the Start\Run pr
B. Run WinNT32.EXE, then answer all of the questions presented via the installation wizard.
C. Restart your computer in DOS, run WinNT.EXE /unattend:unatte
D. Restart your computer in DOS, run WinNT.EXE, then answer all of the questions presented via the installation wizard

>> !
Answer: A


8. What components are necessary in your environment to use a RIS Server to install Windows 2000?

A. A server with DHCP, and DNS installed and running.
B. RIS must be installed on a shared NTFS volume.
C. A server with DNS and ADS installed and running.
D. A server with DHCP,DNS, and AD installed and running.
E. RIS must be installed on a shared volume.

>> !
Answer: B & D


9. You are planning to upgrade your NT 4.0 domain environment to a Windows 2000 Server domain environment. As a result, you plan on first upgrading the PDC:s to Windows 2000 Domain Controllers. After completing this upgrade process, you will then initiate a migration to upgrade all of the NT 4.0 BDC:s to Windows 2000 Domain Controllers. Prior to executing your Domain Controller migration strategy, you synchronize a NT 4.0 BDC with the PDC and remove the PDC from the production network. To allow for administration of the existing network while you conduct your test, you promote the BDC to a PDC. You then run the WinNT32.EXE setup program to upgrade the NT 4.0 PDC to a Windows 2000 Domain Controller. During the installation process, you receive an error message: "INACCESSIBLE_BOOT_DEVICE." What must you check in order to prevent this error from repeating as you upgrade the other NT 4.0 Domain Controller machines?

A. Determine if there were any serial cables that were connected to a UPS device.
B. Determine if there are any non-Plug and Play Industry Standard Architecture devices.
C. Determine if there were changes made to the NT 4.0 Domain Controller Registry by the Windows 2000 setup program during the attempted upgrade.
D. Determine if the there were any virus scanners or other client software that interfered with the attempted upgrade.

>> !
Answer: B


10. Listed below are a series of potential file system conversion paths. The goal is to perform a conversion from one file system to another, without losing any of the data already present on the partition to be converted. Which of the following file system conversion paths will accomplish this goal? (Choose all that apply)

A. Use "convert.exe c: /fs:ntfs" to convert from FAT to NTFS
B. Use "convert.exe c: /fs:fat32" to convert from FAT to FAT32
C. Use "convert.exe c: /fs:fat" to convert from NTFS to FAT
D. Use "convert.exe c: /fs:ntfs" to convert from FAT32 to NTFS

>> !
Answer: A & D


11. What minimal pieces of information are required in order to connect a Windows 2000 Pro client to a TCP/IP based network print device? (Choose all that apply)

A. Name or IP Address of the TCP/IP based network printer
B. Port Number
C. The type of Network Interface Card/Connection the network print device is using
D. SNMP Community Name

>> !
Answer: A & B


12. You are the administrator for a company named XYZ Engineering. Recently, XYZ Engineering upgraded their NT 4.0 PDC:s and BDC:s of the XYZEngineering Domain to Windows 2000 Server Domain Controllers. The new Domain name is XYZEngineering.org. The existing Workstation:s used by the employees are a mix of Windows 2000 Pro, NT 4.0 Workstation:s, and Windows 95/98 desktops. Although the goal of XYZ Engineering is to eventually phase out all NT 4.0 Workstation:s and Windows 95/98 desktops, budgetary constraints have forced the administrators to manage this mixed environment until next year.

The IT Management staff wants to begin controlling the appearance of all employee desktops regardless of the desktop operating system in use. As a result, the IT management staff is relying on you to curtail the use of Registry editing tools, deny network browsing capabilities, and identify which Windows applications are able to run on all Windows 2000 Pro, NT 4.0, and Windows 95/98 Workstation:s by utilizing the strengths of system policy capabilities of Windows 2000 Server. What must you do to enforce the directives of the IT Management staff?

A. Do nothing. NT 4.0 and Windows 95/98 system policies will work by default as they are converted in the upgrade process from the NT 4.0 PDCs and BDCs.
B. Implement a Group Policy that will defines the IT Management staff's directives for all Windows 2000 Pro, NT 4.0, and Windows 95/98 Workstation:s.
C. Use the Group Policy capabilities of Windows 2000 Server to enforce the IT Management staff's directives for the Windows 2000 Pro Workstation:s. Use the PolEdit.exe utility provided with Windows 2000 Server to create system policies specific to NT 4.0 and Windows 95/98 desktops.
D. Use the PolEdit.exe utility provided with Windows 2000 Server to create one policy file for the Windows 2000 Pro Workstation:s, one policy file for the NT 4.0 Workstation:s, and one policy file for the Windows 9x machines.

>> !
Answer: D


13. You are the back up administrator for a company called XYZ Aircraft. Ralph, the primary administrator, is on vacation for the next week and has asked you to provide coverage in his absence. XYZ Aircraft uses a Windows 2000 Network comprised of two Windows 2000 Server Domain Controllers configured for a Domain called XYZAircraft.org. Ralph has ensured that you have the User Right to "Manage auditing and security" on the Windows 2000 Server Domain Controllers and for the "Users" container. Also, Ralph has enabled "Account Object Access" to include both "Audit successful attempts" and "Audit failed attempts" to the users container. Over the next week, Ralph has assigned you the responsibility to monitor the security logs for success and failures of the "Read All Properties" permission to user objects in the Active Directory database. On the first day, even though users are logging onto the Windows 2000 Network and accessing resources successfully, you do not observe any "Read All Properties" success messages in Event Viewer. In the "Auditing Entry for Users" dialog box, which entries should you select for auditing? (Choose all that apply)

A. Read All Properties Successful
B. Read All Properties Failed
C. List Contents Successful
D. List Contents Failed

>> !
Answer: A & B


14. You have installed a network version of MS Office installed on a Windows 2000 Application Server. The drive is formatted as NTFS. Share permissions for the folder are as follows:

Administrators: Full Control
Power Users: Full Control
Accounting: Change
Users: Read

NTFS permissions for the folder are as follows:

Accounting: Read & Execute
Users: Read & Execute
Administrators: Full Control
Power Users: Read
Fred: Full Control

Fred proceeds to log on to the Windows 2000 Application Server and access the shared folder locally. Fred is a member of the Accounting and Users security groups. What are Fred's effective permissions to the content stored in that folder?

A. Full Control
B. Change
C. Read & Execute
D. Read

>> !
Answer: A


15. When installing Windows 2000 Pro on a system that already has Windows installed on a 5GB C: drive, what type of filesystem can the C: drive be to allow a dual-boot configuration?

A. FAT32
B. HPFS
C. NTFS
D. FAT
E. CDFS

>> !
Answer: A


16. What command would you use to install Windows 2000 Pro onto a new system using an unattended installation script called unattend.txt?

A. Winnt32 /ua:unattend.txt
B. Winnt /u:unattend.txt
C. Winnt /a /r:unattend.txt
D. Winnt32 /a /r:unattend.txt
E. Winnt32 /u:unattend.txt

>> !
Answer: B


17. When installing Windows 2000 Pro on a system you would like to configure the system for local file and folder security, which filesystems could you choose?

A. NTFS
B. FAT32
C. FAT64
D. FAT
E. CDFS

>> !
Answer: A


18. Which of the following are valid uses of the Setup Manager? (Choose all that apply)

A. RAS Scripts
B. Unattend.txt files
C. RIS scripts
D. Sysprep Installation scripts
E. Winnt.inf files

>> !
Answer: B, C & D


19. What dialog box is used to lock a workstation or to allow users to change their password?

A. User Tools dialog box
B. User Manager dialog box
C. Administrative dialog box
D. Security dialog box
E. User Security dialog box

>> !
Answer: D


20. You are installing a number of Windows 2000 Professional workstations at your company. One of these machine has two network interface cards installed, and you will be installing NWLink to allow the Windows 2000 Pro machine to communicate with a database server running Service Advertising Protocol (SAP) applications. What two configuration parameters must be configured to ensure successful communication over NWLink?

A. Unique Internal Network Numbers
B. NetBios Scope ID
C. Host Headers
D. Frame Types

>> !
Answer: A & D


21. Company TMA has just purchased 150 new Workstation:s; all workstations have the same hardware configuration, and all devices are on the hardware compatibility list. What deployment option can you use in this situation? (Choose all that apply)

A. Setup Manager and create an Unattend.txt answer file.
B. Setup Manager to duplicate the hard drives in the systems.
C. Setup Manager and create a RIS image Then use RIS to install the Systems.
D. Setup Manager to clone machine to machine.
E. Setup Manager and create a SysPrep script Then duplicate the systems.

>> !
Answer: A, C & E


22. On a Windows 2000 Pro desktop, you have a single hard drive installed to support the operating system, applications, and other files. You are looking to partition the disk to provide volumes that will allow you to logically organize the data you will keep on the computer. In addition, you need to be able to dual-boot your machine between Windows 2000 Pro and Windows 98. How many Primary partitions, maximum, can you have on the one physical disk?

A. 1 partition
B. 2 partitions
C. 3 partitions
D. 4 partitions
E. Unlimited partitions

>> !
Answer: D


23. What are the networking components that are installed with the default installation of Windows 2000 Pro?

A. File and Print Sharing for Microsoft Networks
B. Client for Microsoft Networks
C. Internet Connection Sharing
D. Internet Protocol Stack

>> !
Answer: A, B & D


24. What command would you use to install Windows 2000 Pro onto the D: drive of a system with a 4GB C: drive and a 2GB D:?

A. Winnt /t:d
B. Winnt32 /s:d
C. Winnt /s:d
D. Winnt32 /a:d
E. Winnt /e:d

>> !
Answer: A


25. Of the following built-in groups, which group(s) have the ability to restore backup in the event existing data becomes corrupted?

A. Administrators
B. Users
C. Backup Operators
D. Replicator

>> !
Answer: A & C


26. Which of the following are valid Windows 2000 Pro hardware requirements? (Choose all that apply)

A. 650MB of free hard drive space
B. Pentium 133 MHz or higher
C. 1.6GB of free hard drive space
D. 32MB of RAM
E. 64MB of RAM

>> !
Answer: A, B & E


27. Which of the following filesystem types are supported by Windows 2000? (Choose all that apply)

A. LDS
B. FAT
C. HPFS
D. FAT32
E. NTFS

>> !
Answer: B, D & E


28. When installing Windows 2000 from a bootable CD, how would you use an unattended answer file?

A. During the install, choose the option to use an unattended answer file.
B. Create a Winnt.sif file and copy it to the CD.
C. Create a Winnt.sif file and copy it to the Hard Drive.
D. Create a Winnt.sif file and copy it to a floppy, and leave it in the A: drive.
E. Use the Winnt.exe /u:unattended option during the install.

>> !
Answer: D


29. What is the Sysprep.exe command used for?

A. To prepare an unattended answer file for future installations.
B. To prepare the system to be duplicated.
C. To prepare the system to be configured as a Domain Controller.
D. To prepare the system to be formatted.
E. To prepare the system to be installed.

>> !
Answer: B


30. What utilities could be used to help in the installation of Multiple Windows 2000 Pro systems in a large organization?

A. SysPrep.exe
B. Answer file
C. RAS
D. RIS
E. Disk Duplication Software

>> !
Answer: A, B, D & E


31. When using the RIS setup Wizard, the RIS software is installed, the Windows 2000 Pro installation files are copied to the server, and what else is done for you? (Choose all that apply)

A. The client installation setup steps for system startup are configured.
B. The client installation wizard pages for system startup are configured.
C. *.sif files are created for you.
D. Unattend.txt answer files are created for you.
E. The cloned image that the RIS install will use are configured.

>> !
Answer: B & C


32. When installing Windows 2000 Pro, what new features make it easier to install?

A. Plug-and-Play support
B. Windows Driver Model
C. Automatic Driver Update
D. Add/Remove Hardware Wizard
E. Automatic Service Pack Upgrader

>> !
Answer: A, B & D


33. How would you install Windows 2000 Pro on a machine with an unsupported CD-ROM drive?

A. Copy the CD software to the hard drive and then install.
B. Boot from the CD.
C. Create the setup diskettes and install from the diskettes.
D. Create a boot disk to start the install.

>> !
Answer: A


34. When troubleshooting an installed version of Windows 2000, what tools could possibly be used?

A. Event Viewer
B. User Manager
C. Troubleshooters in Help
D. Compatibility Tool
E. Server Manager

>> !
Answer: A, C & D


35. What computer management utilities are available with Windows 2000 Pro?

A. Windows Installer
B. Control Panel
C. Zero Administration Kit
D. ZEN Works
E. Computer Management

>> !
Answer: A, B & E


36. When installing Windows 2000 Pro at an organization that needs to install 500 workstations with the same configuration, what tools are provided that could simplify this process?

A. ZERO Effect Installer
B. System Preparation Tool
C. System Installer Utility
D. Duplication software
E. RIS

>> !
Answer: B, D & E


37. Before duplicating a system, you should always run the ______?

A. Network Management Tool
B. System Preparation Tool
C. Computer Management Tool
D. Network Identification Utility

>> !
Answer: B


38. You have a new workstation with a 10GB hard drive that you would like to create into two partitions and set up with Windows 2000 and Windows 98. How would you have to configure the drives?

A. C: - 2GB NTFS partition, D: - 8GB FAT partition
B. C: - 5GB NTFS partition, D: - 5GB FAT32 partition
C. C: - 5GB FAT32 partition, D: - 5GB NTFS partition
D. C: - 5GB NTFS partition, D: - 5GB FAT partition
E. C: - 8GB FAT partition, D: - 2GB NTFS partition

>> !
Answer: C


39. When installing Windows 2000 Pro on a multi-boot system, what factors concerning multi-boot should you keep in mind? (Choose all that apply)

A. The amount of RAM in the system
B. The amount of free space on the hard disk
C. The format type of the system partition
D. The location of the system files
E. The version of the other operating system

>> !
Answer: B & C


40. How would you change the virtual memory settings in a Windows 2000 Pro system?

A. Control Panel -> Virtual Memory
B. Control Panel -> System Properties -> Advanced Tab -> Virtual Memory
C. Computer Management -> System Properties -> Virtual Memory
D. Control Panel -> System Properties -> Virtual Memory
E. Control Panel -> Advanced Tab -> Virtual Memory

>> !
Answer: B


41. What is the default paging file size on a Windows 2000 Pro system with 64MB of RAM installed.

A. 96MB
B. 64MB
C. 32MB
D. 128MB
E. 80MB

>> !
Answer: A


42. When you are viewing your devices in Computer Management, a new device that was just installed shows up with a stop sign instead of a normal icon. Why?

A. The device drivers cannot be located and loaded.
B. The device's hardware settings conflict with another device and/or it is disabled.
C. The device is disabled.
D. The device drivers have not be installed correctly.

>> !
Answer: B


43. When testing the TCP/IP configuration of a machine with that is configured as IP address 192.168.15.72, subnet mask 255.255.255.0, and default gateway of 192.168.15.1, what would be valid commands to test the connection?

A. Ping 192.168.15.1
B. Ping 192.168.15.72
C. Ping 127.0.0.1
D. None of the options are correct
E. All the options are correct.

>> !
Answer: A


44. When testing the TCP/IP configuration of a machine that is configured with an IP address 192.168.15.72, a subnet mask 255.255.255.0, and a blank default gateway, the administrator notices that it cannot access a server at IP address 192.168.16.58. Why?

A. The machines are on different networks.
B. The subnet mask is incorrect.
C. The server is down.
D. The IP address is incorrect.
E. It could be a cabling problem.

>> !
Answer: A


45. When viewing your devices in Computer Management, a new device that was just installed shows up with a exclamation point instead of a normal icon. Why?

A. The device is incorrectly configured, or the driver files are missing.
B. The device is working properly, just disabled.
C. The device has been configured with settings that conflict with another Device.
D. The device is of an unknown type.
E. The status of the device is unknown.

>> !
Answer: A


46. Users of the Windows 2000 Pro desktops at your company are complaining they are unable to change the "Path" System Environment Variables. They want to prevent having to memorize the entire folder path to run applications installed on their computers. What is the likely cause of user not being able to modify System Environment Variables?

A. The user is not a member of the Local Administrator group on the Windows 2000 Pro desktop.
B. Windows 2000 Pro automatically configures System Environment Variables, and only the operating system can modify these variables.
C. An autoexec.bat file exists that overwrites the System Environment Variable at each restart of a Windows 2000 Pro machine.
D. No Answer is Correct.

>> !
Answer: A


47. You are the File/Print Administrator for a company called KUNI Inc. You have 300 traveling sales representatives who spend most of their time at client sites. Once per week, the sales representatives download all marketing and product material from a shared folder named sample on the Windows 2000 Server. Theses sales representatives will slightly alter the content for their different client meetings. The shared folder caching configuration set to "Manual caching for documents." Many of the salespeople complain that it takes too long to download the documents they require. What could you do to help speed up the process of downloading of content to the sales representatives laptops?

A. Allow only 15 users at a time to connect to the shared folder concurrently. Have users select all of the documents to cache.
B. Keep the settings as the currently exist.
C. Allow only 15 users at a time to connect to the shared folder, named sample, concurrently. Reconfigure the caching settings to "Automatic Caching for Documents."
D. Re-share the sample folder 2 more times (sample2 & 3). Allow 100 users at a time to connect to the three respective shares. Have users select all of the documents to cache manually.

>> !
Answer: C


48. You are the network administrator for a company named BFQ Architects. The networking topology installed at BFQ Architects is a Star-Bus Hybrid Topology. Company employees require Internet access in order to conduct research on their client's companies. In order to support all 2,000 employees, the previous network administrator company configured routing environment as follows:

The network has three segments:
192.26.33.0/24, 192.45.27.0/24 and 192.33.101.0/24
The Internet connection is 6.0.0.0/24
Routing tables are configured as only having the directly attached network segments.
The default gateways for clients are pointing to a local gateway.

Employees whose machines are connected to 192.26.33.0/24 segment are complaining that they are unable to gain access to the Internet.
Employees whose machines are connected to segments 192.45.27.0/24 & 192.33.101.0/24 are able to successfully connect to the Internet.
Employees on segment 192.26.33.0/24 are able to communicate with hosts on segments 192.45.27.0/24 and 192.33.101.0/24.
Employees on segments 192.45.27.0/24 and 192.33.101.0/24 are able to communicate with hosts on 192.26.33.0/24; however hosts on segment 6.0.0.0/24 are not.

Why are employees on segment 192.26.33.0/24 unable to connect to the Internet?

A. All of the hosts in the above network are using different Subnet Masks that make all network client requests are to be sent to the remote networks via the Default Gateways.
B. Hosts on segment 6.0.0.0/24 do not have a Default Gateway configured to return responses back to clients on the 192.26.33.0/24 network segment.
C. The network configuration is using a default gateway routing solution.
D. The router configuration above includes routing table entries that have incorrect subnet masks associated with each network segment.

>> !
Answer: C


49. You are the administrator of a Windows 2000 Network that supports 200 employees. The employees are using Windows 2000 Pro for their desktop computers. In order to support the network traffic created by these users and maintain a fast response time for network service requests, you have configured the physical layout of the network into 3 separate segments. These three separate segments are attached to a single, multi-homed Windows 2000 Advanced Server machine acting as a router.

An employee in the marketing department on segment one is complaining he is unable to run the accounting application that is installed on the AcctWin2K Windows 2000 Application Server on Segment 3. All other employees on segment two are able to run the accounting application.

The addressing scheme for the network is as follows:

3 segments
1 Windows 2000 server multihomed with 3 NICs
1 client on segment 2, 1 account server on segment 3.
IP address for client is for segment 2, subnet mask
Should show 192.26.34.26 255.255.254.0
IP address for server is correct.
Should show 192.26.35.200 255.255.255.0
Default gateway is correct for both client and server
Should show 192.26.33.1 and 192.26.35.1 respectively

Upon running the ROUTE PRINT command, you view the routing table as follows:

192.26.33.0 255.255.255.0 192.26.33.1 (segment1)
192.26.34.0 255.255.255.0 192.26.34.1 (segment2)
192.26.35.0 255.255.255.0 192.26.35.1 (segment3)

Why is the client on segment two unable to gain access to the accounting application?

A. The server is configured with the incorrect Subnet Mask and cannot return a response to the client's request.
B. The router is incorrectly configured to pass network traffic from segment 2 to segment 32.
C. The network interface card on the server is configured with the incorrect Default Gateway and cannot return a response to the client's request.
D. The client's subnet mask is configured incorrectly.

>> !
Answer: D


50. Mary is a Senior Consultant working with XYZ company. She has been assigned to help plan the TCP/IP networking scheme for ABC Company. Currently, ABC Company has 20 branch offices each with two network segments per branch. Each of the 20 branches is connected back to the ABC Corporate Office, in Chicago in order to facilitate data replication between the local branch client databases and the master client database. The ABC Corporate Office currently has an IT network segment, a Research and Development network segment, a Sales and Marketing network segment, and a Finance network segment.

The largest of these network segments currently supports 450 users. ABC Company is forecasting tremendous growth over the next five years. They expect that the current network segment count will grow to a maximum of 77 networks. The largest of the network segments is expected to support 1,000 networked devices.

The goal of ABC Company is to use a single base network number to create the correct number of IP network addresses to associate to each network segment. Mary has been charged with completing this task and has secured an IP network address of 132.64.0.0/16 from an Internet Service Provider. Which IP network number(s) below based on this number will support both the future number of network segments and the growth in the number of hosts per segment?

A. 132.64.0.0/24 255 supports 254 networks, supports 254 hosts per network
B. 132.64.0.0/23 254 supports 126 networks, supports 510 hosts per network
C. 132.64.0.0/22 252 supports 62 networks, supports 1022 hosts per network
D. 132.64.0.0/21 248 supports 30 networks, supports 2046 hosts per network
E. No Answer is Correct

>> !
Answer: E


51. While configuring the TCP/IP configuration parameters of your Windows 2000 Pro machine, you view the following TCP/IP properties:

IP Address: 192.123.0.25
Subnet Mask: 255.255.255.0
Default Gateway: 192.123.2.1
Preferred DNS Server: 192.123.0.10
Alternate DNS Server: 192.123.2.26
Which of the following statements are true?

A. This TCP/IP client will be able to communicate with the Primary DNS Server for hostname resolution.
B. This TCP/IP client will be able to communicate with the Default Gateway.
C. This TCP/IP client will be able to communicate with the Alternate DNS Server for hostname resolution.
D. This TCP/IP client will be able to communicate with all TCP/IP hosts on the same TCP/IP network.

>> !
Answer: A & D


52. Your Windows 2000 Server based network does not presently have a DNS Server installed for hostname resolution. There is an Intranet Web Server that hosts company newsletter, which you must review on a daily basis. As a result, you configure your hosts file, in the C:\Winnt\system32 \drivers\etc directory with the following entries to allow you to browse the Intranet Web Server named HRWebServer:

127.0.0.1 localhost
10.0.0.26 DigitalCompany.com
192.132.26.10 HRWebServer
192.132.26.200 HRWebServer

The network administrator has already assigned you the necessary permissions to gain access to the content hosted on the HRWebServer. When you attempt to browse HRWebServer using Internet Explorer, you receive a warning that the server could not be found. You use the ping utility to ping 192.132.26.10 and receive 4 request timed out messages. You again use the ping utility to ping 192.132.26.200 and receive 4 positive reply messages. What is preventing you from displaying the home page of the HRWebServer?

A. Your machine has the incorrect Subnet Mask configured to communicate with the HRWebServer.
B. Your HOSTS file is resolving the HRWebServer hostname to the incorrect IP Address.
C. Your network administrator has assigned the incorrect permissions to the home/default page of the HRWebServer.
D. Your machine has the incorrect Default Gateway assigned.

>> !
Answer: B


53. ABC Company has over 250 remote users who gain access to both public and private company information via the Internet. As the IT Security Specialist for ABC Company, you are concerned that the number of remote users is creating unacceptable security risks to the ABC Company's networks. Your plans are to provide secure remote access to network resources while minimizing the costs of implementation. You decide to implement Virtual Private Network connections on all laptops using the L2TP protocol. What is the benefit(s) of implementing the L2TP protocol?

A. You are able to ensure data integrity through the use of IP Security encryption and MPPE encryption.
B. You can solely focus your efforts on IP Internetwork communications.
C. You do not have to worry about L2TP protocol support on the part of your ISP.
D. L2TP VPNs will allow your remote users to securely gain access to network resource across the Internet, regardless of those resources being "served up" on TCP/IP, IPX/SPX, or NetBEUI machines.

>> !
Answer: C & D


54. You are considering which of the Remote Access Protocols that can be used with Windows 2000 to implement on your network. Which of the following statements about the various Remote Access Protocols are true?

A. SLIP transmits authentication passwords only as clear text.
B. L2TP uses MPPE encryption.
C. PPTP supports header compression.
D. PPP supports tunnel authentication.

>> !
Answer: A & C


55. You have a small home office set up to support two laptop computers. One of these laptops has both a PC Card and Modem. The PC Card uses a cross-over cable to communicate directly with the second laptop, which only has a PC Card for network communications. In order to avoid purchasing a new Modem for the second laptop, you decide to implement connection sharing by enabling the Internet Connection Sharing capabilities. You accept the default configuration of "Enable on-demand dialing.

When you attempt to connect to the Internet from the second laptop (the one without a modem), the first laptop dials your Internet Service Provider and you successfully are able to surf the WWW. However, you are unable to connect to your favorite FTP download sites to retrieve the latest patches and upgrades to Windows 2000 Pro. What is causing the problem?

A. The default settings for Internet Connection Sharing do not automatically configure crossover cable support for retrieving content from the first laptop to the second laptop.
B. The default settings for Internet Connection Sharing filter out inbound packets using FTP.
C. The default settings for Internet Connection Sharing do not have the appropriate shared application settings configured for FTP.
D. The default settings for the Internet Connection Sharing do not have the appropriate service configured for FTP.

>> !
Answer: D


56. You are the Network Analyst for DTW Company. You have implemented a small departmental LAN that has two segments. The router used to pass traffic back and forth between the two networks is a multi-homed Windows 2000 Server. The two networks connected to this server are 220.125.26.0/24 and 220.125.27.0/24. The correct routing table entries are automatically established.

A client machine on the 220.125.26.0/24 network has an IP address of 220.125.26.100/24 and is configured to use a default gateway of 220.125.26.1. This client machine is attempting to connect to an FTP Server on the 220.125.27.0/24 network that has an IP address of 220.125.27.200/16. The FTP Server is configured with a default gateway of 220.125.27.1. When the client machine attempts to connect to the FTP Server, the client receives "request timed out" errors. What is the reason the client and server are unable to communicate?

A. The FTP Server is unable to return TCP acknowledgements to the remote network.
B. The FTP Server is unable to reach its default gateway.
C. The client is unable to reach its default gateway.
D. The client is unable to return TCP acknowledgements to the remote network.

>> !
Answer: A


57. What are some of the benefits of configuring a Windows 2000 Pro machine using NTFS?

A. Disk Quotas and File Encryption
B. Dual Boot Configuration support
C. Increased application stability
D. Active Directory Services support

>> !
Answer: A


58. What is the correct syntax to connect to a printer across the Internet, assuming that all of the necessary software and connections are in place?

A. \\servername\sharedprintername
B. \\servername\printers\sharedprintername
C. http://servername/sharedprintername
D. http://servername/printers

>> !
Answer: C


59. You are the administrator of a company named XYZ Corporation. The company network consists of five Windows 2000 Server Domain Controllers, 10 Windows 2000 Server:s operating as either file, print, or application servers, and 500 Windows 2000 Pro Workstation. The Executive Standards committee has established that users must have three opportunities to log on to the network before their user accounts are locked out for a mandatory 30-minute time interval. All users must use unique passwords that have a minimum length of 12 characters and must be able to change their own passwords. In addition, the administrator must assign all initial passwords for all users.

As the administrator, you want to verify that every user account you create is able to successfully log on to the Windows 2000 Network, so you want to ensure that users must use an administrator-defined password for a set length of time before they can change it. What must you configure in order for you, the administrator, to test the user account logons before the users are able to change their passwords?

A. Minimum password length
B. Maximum password age
C. Enforce password history
D. Store password using reversible encryption for all users in the domain
E. Minimum password age.

>> !
Answer: E


60. With auditing enabled, what log would you view with Event Viewer in order to determine whether the users on your network are able to successfully logon to your network?

A. Application Log
B. Security Log
C. System Log
D. Setup Log

>> !
Answer: B


61. Of the following permissions, which one is not a standard NTFS permission that could be assigned to users or groups for Folder/File access?

A. Full Control
B. Change
C. Read
D. Write
E. Read & Execute

>> !
Answer: B


62. You are the Network Administrator for ZDWR Corporation. ZDWR Corp. currently is using a Windows 2000 Active Directory environment to support all logon authentications, and to facilitate ease of locating company resources like shared folders and printers. There are a total of 25 desktops at the company.

You are in the process of installing the last Windows 2000 Pro desktop into the Windows 2000 Active Directory domain when you receive an error message stating that the desktop machine could not connect to the domain controller. All of the remaining 24 users are able to logon to the network and locate resources in the Active Directory Database. There are no duplicate computer names in use on the network. Which of the following could be the cause of the problem? (Choose all that apply)

A. The Windows 2000 Prol machine unable to communicate with a DNS Server.
B. The Windows 2000 Active Directory Domain Controller is offline.
C. The Windows 2000 Pro network adapter and protocol settings are incorrectly configured.
D. The Windows 2000 Pro IP address is incorrectly configured.

>> !
Answer: C & D


63. Your company network consists of both Windows 95/98 and Windows NT 4.0 desktops. You want to take advantage of the centralized administration and resource location capabilities of Windows 2000 Active Directory domains. As a result, you implement a Windows 2000 Active Directory domain with two Windows 2000 Domain Controllers. You also upgrade all of the Windows NT 4.0 desktops to Windows 2000 Professional, but for some older, proprietary applications that will not run on Windows 2000 Pro, you will maintain a small percentage of Windows 95/98 desktops.

Users of the Windows 95/98 desktops soon begin to inundate the helpdesk with claims they are unable to locate resources in the Active Directory Database. None of the Windows 2000 Pro machines experience this problem. What is causing the network complication?

A. The hardware configured on the Windows 95/98 desktops are incompatible with Windows 2000 Network Operating Systems.
B. Only Distributed File System support is allowed for Windows 95/98 desktops that participate in a Windows 2000 Domain environment.
C. The appropriate client software is not installed by default.
D. Windows 95/98 are not supported in running in a Windows 2000 Active Directory Domain environment.

>> !
Answer: C


64. You are the Network Administrator for a Financial Reporting Firm named FRM Associates. Due to the highly sensitive nature of the data collected and reported daily, company policy requires that all compensation documents be encrypted to thwart any attempts to steal documents off of the network operating systems. As a result, the Windows 2000 File Server has encryption enabled for the "compensation" folder where all compensation documents are stored. This setting apply to all of the child folders and files of the compensation folder. The disk storage space available is running low. As a result, you decide to compress the compensation folder, because this folder contains a large number of text files where you would be able to gain the largest rate of compression. When you configure compression on the compensation folder, which of the following statements would be considered true? (Choose all that apply)

A. You will be able to maintain the company's policy of encrypting all compensation documents and data.
B. You will be able to compress the folder and its immediate child files, but not encrypt them.
C. You will be offered the opportunity to decrypt and then compress the child folders and files of the compensation folder.
D. You will be offered the opportunity to display compressed folders and files in an alternate color.

>> !
Answer: B & C


65. Alice is the Marketing Director of MKTG Company. She uses a proprietary graphics package installed on a shared Windows 2000 Pro desktop to create the marketing collateral used to support the sales team. The graphics files average about 2MB each in size. The network administrator has had recurring problems with the majority of employees at MKTG Company consuming large amounts of disk space on this shared machine. In order to ensure ample disk space is available for every user, the network administrator enables Disk Quotas, and limits each employee to 10MB of space.

Alice requires at least 50MB of disk space on the shared desktop. Given the current configuration, what is the best way for Alice to have 50MB of disk space set aside without allowing all of the other users to gain access to more disk space?

A. Clear the deny disk space to users exceeding quota limit check box.
B. Modify the "Limit Disk Space to" on the Quota Property page to 50MB, then add an entry for all other users via the Quota Entries button that limits them to 10 MB each.
C. Add an entry for Alice via the Quota Entries button that sets her disk storage limit to 50MB.
D. Disable quota management.

>> !
Answer: C


66. BTWX Company relies on each of its employees to create content via MS Office applications and share this information across the network. As a result, each user must be able to create shared folders on their own Windows 2000 Pro machines. On one Windows 2000 Pro machine, named Win2Kprof, you create a local user account for Fred.

Fred uses his local account to run the MS Office applications. Furthermore, Fred is able to create new folders, save and delete files, and assign permissions to other users and groups to files system resources. However, Fred is unable to make his resources available across the network. How can you allow Fred to make his resources across the network without jeopardizing administrative privileges?

A. Create a shared folder for Fred on a Windows 2000 Server and have him copy his content to the share. Then assign permissions to the users who require access to these files.
B. Add Fred to the Administrators Group.
C. Add Fred to the Power Users Group.
D. Add Fred to the Backup Operators Group.

>> !
Answer: C


67. You are setting up the Windows 2000 printing environment permissions for your department. Which of the following statements about printing permissions is true?

A. The Print permission enables users to share a printer.
B. The Manage Printers permission enables users to control job settings for all documents.
C. The Manage Documents permission enables users to connect to a printer.
D. The Manage Documents permission enables users to change printer permissions.

>> !
Answer: D


68. Jennifer is an employee of a company called XYZ Dimensions Inc. located in Chicago. Jennifer is currently using a stand-alone Windows 2000 Pro Workstation, named JennyW2KP, to use a locally installed graphics editing application. As the administrator, you are going to add JennyW2KP to the Windows 2000 Domain, named XYZDimensions.edu, which currently consists of one Windows 2000 Server Domain Controller and four Windows 2000 Pro workstations.

Before adding JennyW2KP to the XYZDimensions.edu Domain, you use the Local Group Policy MMC snap-in on JennyW2KP and configure the account lockout policy to lock out Jennifer's local user account after three bad logon attempts. Afterwards, you configure the Default Domain Controllers Policy to lockout Jennifer's Domain Account after two bad logon attempts.

What will be Jennifer's result if she attempts to logon to the Windows 2000 Network using her Domain Logon account and providing an invalid password both times? Select the correct answer.

A. She will be allowed three more logon attempts to the Windows 2000 Network because the Local Group Policy and Default Domain Controllers Policy cumulatively allow her five bad logon attempts.
B. Jennifer will be allowed one more logon attemp to the Windows 2000 Pro machine because the Local Group Policy allows her three bad logon attempts.
C. Jennifer will be locked out of the Windows 2000 Network for a configured amount of time designated by the administrator.
D. Jennifer will be allowed one more logon to the Windows 2000 Network because the Local Group Policy overrides the Group Policy.

>> !
Answer: A


69. You are the Active Directory Administrator for a company named XYZ Consulting. The company network has been configured with one Windows 2000 Server Domain Controller, named SOHOServer, that will maintain all user, group, and computer accounts. The Domain name is Australia.com. There are 25 Windows 2000 Pro Workstation:s in this Domain that are used by XYZ Consulting company's employees for network access to shared resources on SOHOServer. To ensure that you are the only user with Full Control to all objects in the Active Directory database, you to decide implement an audit policy to monitor the success or failure of using this Active Directory permission.

Using the MMC-Active Directory Users and Computers for the Australia.com Domain, you modify the Default Domain Policy by editing its properties. Specifically, you navigate to the Group Policy tab in the Australia.com properties dialog box, modify the property "Computer Configuration\Windows Settings\Local Policies\Audit Policy\Audit Account Management," and clear the "Exclude this setting from configuration" checkbox. You also select the "Audit successful attempts" and "Audit failed attempts" checkbox.

Three days later, you are reviewing the Security Log using Event Viewer and observe success and failures messages for Modify, Write, and Read Permissions for all users. However, there are no success or failure messages for any of the changes you have made to the Active Directory Service Database with Full Control permissions. What is the reason for these results? (Choose all that apply)

A. The Default Domain Policy, User Rights settings do not grant the administrators the "Manage auditing and security log" right.
B. The Default Domain Controllers Policy does not allow the auditing of successes and failures.
C. The security log default filter settings do not display any Success of Failure Audit messages.
D. The default auditing permissions for the user account Active Directory container does not have Full Control "Successful" or "Failed" selected for inclusion in the auditing policy.

>> !
Answer: B & D


70. Charlie is the administrator for a company named XYZ Stamp Co. and is in charge of maintaining and securing all Windows 2000 Server:s. XYZ has one Windows 2000 Server, named DCLogonPrime, configured as a Domain Controller, and two Windows 2000 Server:s configured as file/print servers, named HdrServer1and ProfServer2. All employees have home directories setup on HdrServer1 where they are able to store personal files. All employees' home folders are stored on an NTFS partition and were created by Charlie using the \\HdrServer1\users\%username% value in the user account Home directory field on the "Profile" property tab.

Due to the growth of XYZ Stamp Co., Charlie observes a sustained CPU/Processor utilization rate of 86% during peak times of usage. In addition, XYZ's Help Desk has received an increasing number of support calls reporting error messages when attempting to Logon to the Windows 2000 Network.

In order to alleviate the recurring problem, Charlie must convert the HdrServer1 Server to a Windows 2000 Domain Controller Server. In order to start this process, Charlie must first move all employees' home folders from HdrServer1 to ProfServer2.

The permissions for the Home Folders on HdrServer1 are as follows:

C:\ is an NTFS partition C:\users\ Shared Permissions:
users: Full Control
administrators: Full Control
backup operators: Full Control
account operators: Full Control

NTFS Permissions:
administrators: explicit Modify
account operators: explicit Modify
backup operators: explicit Read & Execute,
List Folder Contents, and Read users: explicit List Folder Contents
For C:\users\, NTFS Permissions are Full Control for the specific employee.

The permissions for the destination server are as follows:

D:\ is an NTFS partition D:\ Shared permissions:
default administrators: Full Control

NTFS permissions: administrators: explicit Full Control
server operators: explicit Full Control
backup operators: explicit Read
users: explicit List Folder Contents

What are the share and NTFS permissions of the moved home folders on the destination server?

A. The D:\users folder will be shared with Full Control for the users, administrators, backup operators and account operators. The modified NTFS permissions for the d:\users folder will be administrators and account operators: Read & Execute, List Folder Contents, and Read; NTFS permissions for backup operators, and List Folder Contents NTFS permissions for users. D:\users\employee# will have explicit NTFS Full Control permissions for the respective user accounts.
B. The D:\users folder will not be shared. The modified NTFS permissions for the d:\users folder will be administrators and account operators: Read & Execute, List Folder Contents and Read; NTFS permissions for backup operators, and List Folder Contents NTFS permissions for users. D:\users\employee# will have explicit NTFS Full Control permissions for the respective user accounts.
C. The D:\users folder will be shared with Full Control for the administrators. The NTFS permissions for D:\users and D:\users\employee# will be Full Control for administrators and server operators, Read for backup operators, and List Folder Contents for users.
D. The D:\users folder will not be shared. NTFS Permissions for D:\users and D:\users\employee# will be Full Control for administrators and server operators, Read for backup operators, and List Folder Contents for users.

>> !
Answer: D


71. You are the new administrator at a company named XYZ SlipStream Communications. You have been placed in charge of all production servers throughout your enterprise. Among these servers are two Windows 2000 Server Domain Controllers, one Windows 2000 Server used for File and Print Services, one Windows 2000 Server used to host a database, and one Windows 2000 Server configured as the Web site for XYZ SlipStream Communications (www.XYZ_SlipStream.com) using IIS 5.0. The Windows 2000 Server configured as the web site is name WebServerProd.

Frank, the CEO of XYZ SlipStream Communications, has mandated "always up" availability of the Web site to customers and employees alike. As a result, the Content Provider and Web Development Departments are unable to make direct changes to the content on the production server without interrupting their work.

To support their efforts, you decide to replicate the content to a new Windows 2000 Server, named WebServerTest, that will act as a testing and staging server for the Content Provider and Web Development Departments. The content from the production Web server, WebServerProd, is stored on an NTFS partition, and will be replicated to a folder on the WebServerTest Server which also users an NTFS partition.

Permissions on WebServerProd D:\ is an NTFS partition
For D:\inetpub\
administrators: explicit Full Control
server operators: explicit Full Control
Content Providers: explicit Modify
Web Development: explicit Modify
users: explicit List Folder Contents

For D:\inetpub\wwwroot
administrators: inherited Full Control
server operators: inherited Full Control
Content Providers: inherited Modify
Web Development: inherited Modify
users: inherited List Folder Contents

For D:\inetpub\wwwroot\*.*
administrators: inherited Full Control
server operators: inherited Full Control
Content Providers: inherited Modify
Web Development: inherited Modify
users: inherited List Folder Contents

Permissions on WebServerTest
D:\ is an NTFS partition
For D:\inetpub\
administrators: explicit Full Control
backup operators: explicit Full Control

For D:\inetpub\wwwroot\
administrators: inherited Full Control
backup operators: inherited Full Control
users: explicit Read

Upon copying all files from the WebServerProd D:\inetpub\wwwroot\ folder to the WebServerTest D:\inetpub\wwwroot\ folder, employees of the Content Provider and Web Development Departments complain that they are unable to change any of the content on the WebServerTest. Why are the employees experiencing difficulties?

A. Employees from the Content Provider and Web Development Departments are assigned explicit Read permissions as a result of the copy.
B. Employees from the Content Provider and Web Development Departments do not have any explicit permissions to the copied content. Read access is provided as a result of the "users" having explicit Read NTFS permissions. None of the original permissions were maintained.
C. Employees from the Content Provider and Web Development Departments have NTFS Modify permissions.
D. Employees from the Content Provider and Web Development Departments need to log off and log back on to the Windows 2000 Network in order to create a new access control token with permissions that will allow them to Modify the copied content.

>> !
Answer: B


72. What information is required for a user to log on to a computer?

A. Active Directory Preferred Server
B. Active Directory Operations Manager
C. Password
D. Username
E. First Name

>> !
Answer: C & D


73. Can Windows 2000 Professional support multiple video adapters?

A. Yes
B. No

>> !
Answer: A


74. How many total video adapters are supported in a Windows 2000 Pro workstation?

A. 1 video adapter
B. 2 video adapters
C. 5 video adapters
D. 10 video adapters
E. Unlimited video adapters, based on hardware limitations

>> !
Answer: D


75. If the paging file size is too low on your computer what error might you see on the system?

A. Windows - Temporarily out of Swap File Space
B. Windows - Virtual Memory Too Low
C. Windows - This program has performed an Illegal Operation and will be Shut Down
D. Dr. Watson - Out of Virtual Memory Space
E. Windows - Out of Swap File Space

>> !
Answer: B


76. You are starting the multiple display configuration for several of the computers in the Graphic department. All computers have Windows 2000 Pro system installed. Whach Windows 2000 utility are you going to use for the configuration process?

A. Control Panel -> Services
B. Control Panel -> Display properties
C. Control Panel -> Video properties
D. Control Panel -> Devices
E. Control Panel -> System properties

>> !
Answer: B


77. Cynthia is the assistant network administrator for a company named XYZ Airlines. Jeff is the network administrator who has installed and configured the existing Windows 2000 network, which contains three Windows 2000 Server:s configured as Domain Controllers. One Windows 2000 Domain Controller is located at each of XYZ Airlines' three terminals to provide fast authentication of employees to the network. At the Chicago Terminal, Jeff setup an additional Windows 2000 Server, named FlghtResv, on which he installed the flight reservation application to be used by employees at all XYZ Airlines' employees at each of the three terminals.

FlghtResv has a single hard drive configured with the NTFS file system. The flight reservation application was installed into the C:\apps\flightreservation folder. Jeff assigned the following NTFS permissions to the "flightreservation" folder: Administrators have explicit Full Control permissions, Jeff has explicit Full Control permissions, and Users have Read & Execute permissions.

Jeff is unexpectedly called out of town and leaves instructions for Cynthia to complete the configuration of the flight reservation application. He tells her, "Unless the application is shared across the network, the flight reservation representatives will not be able to use the application and XYZ Airlines will lose customers and money. I've already configured the permissions necessary to allow the users to use the application and for all administrators to make changes and updates to the flight reservation application as necessary. Keep these permissions and make the application available across the network."

Cynthia opens the Computer Management utility pointing to the FlghtResv Server. As Cynthia progresses through the new share wizard that will make the c:\apps\flightreservation folder and application available across the network, Cynthia sees a dialog box with the following choices:

1. Keep current permissions
2. I have Full Control, everyone else has Read permissions
3. Everyone has Full Control permissions

Cynthia selects "I have Full Control and everyone else has Read permissions." What are the effects of Cynthia's actions?

A. The Administrators Group and Jeff will have Full Control Permissions and Users Group will have Read & Execute Permissions.
B. The Administrators Group and Cynthia will have Full Control Permissions and the Everyone Group will have Read permissions.
C. Jeff will have Full Control Permissions and the Users Group will have Read permissions.
D. Cynthia will have Full Control Permissions and the Everyone Group will have Read permissions.

>> !
Answer: D


78. You are the Group Policy Administrator of a company named XYZ Vision Software. The company has installed a single Windows 2000 Server Domain Controller, named DCServer2K, to create a Domain called XYZ_Software.Dev. The 25 employees of XYZ Vision Software use Windows 2000 Pro Workstation:s as the standard desktop.

Three of the employees of XYZ Vision Software will be assisting you create shared resources for users on the Windows 2000 Server Domain Controller; however these three employees must not be able to create any shared resources on any of the Windows 2000 Prol Workstation:s. You decide to implement Group Policies to allow Ralph, Mary, and Fred the right to create permanent shared objects.

The default Active Directory structure remains intact. Under the XYZ_Software.Dev Domain node in the MMC - Active Directory Users and Computers, you see the default containers of Builtin, Computers, Domain Controllers, and Users. You modify the Default Domain Policy on the Domain node by clearing the "Exclude from future configurations and analysis" checkbox and add the user accounts for Ralph, Mary and Fred for the right to "Create permanent shared objects". You then modify the Default Domain Controllers Policy by selecting the Block Inheritance Check box, clearing the "Exclude from future configurations and analysis" checkbox, and adding Ralph, Mary, and Fred the right to "Create permanent shared objects." What will Ralph, Mary, and Fred be able to accomplish with the above configuration?

A. Ralph, Mary, and Fred will be able to create Shared folders and printers on all Windows 2000 Pro Workstation:s. They will not be able to create any Shared folders or printers on the Windows 2000 Server Domain Controller, DCServer2K, because you have blocked inheritance of Group Policies.
B. Ralph, Mary, and Fred will not be able to create any Shared folders or printers on either the Windows 2000 Pro Workstation:s or Windows 2000 Server Domain Controller, DCServer2K, because the Group Policies are not synchronized between the XYZ_Software.Dev node and Domain Controllers Container.
C. Ralph, Mary, and Fred will be able to create Shared folders and printers on all of the Windows 2000 Pro Workstation:s and on the Windows 2000 Server Domain Controller, DCServer2K.
D. Ralph, Mary, and Fred will not be able to create Shared folders and printers on any of the Windows 2000 Pro Workstation:s; however they will be able to create Shared folders and printers on the Windows 2000 Server Domain Controller, DCServer2K.

>> !
Answer: C


79. Windows 2000 Pro has been selected as the desktop of choice. In an effort to maintain consistency of application support, you implement a policy of yearly creating a new image for desktop computers that will have applications installed that the HelpDesk will officially support. A specific component of this policy is that users are not allowed to install any additional hardware devices or drivers that are not digitally signed. However, your HelpDesk is receiving an increasing amount of support calls for hardware device drivers that are preventing users Windows 2000 Pro desktops from running correctly. As a result, you need to further restrict the ability of users to install device drivers. What do you need to configure on all of the Windows 2000 Pro machines in order to accomplish this goal?

A. Configure Driver Signing Options to display a message before installing an unsigned file by using the MMC Snap in for Computer Management (Local) on each Windows 2000 Pro desktop.
B. Configure Driver Signing Options to prevent installation of unsigned files by using the MMC Snap in for Device Manager.
C. Configure Driver Signing Options to Prevent installation of unsigned files by using the System Application in Control Panel.
D. Leave the default settings for Driver Signing Options.

>> !
Answer: C


80. You are the Remote-User Network Support engineer for BDG Company. The Chief Executive Officer has purchased a new laptop that he uses when on the road and has a docking station with a Network Interface Adapter and ZIP drive attached when he works in his office. The laptop is running Windows 2000 Pro. You must configure two separate hardware profiles in order to support the docked and undocked states of the Windows 2000 Pro laptop. You log on to the Windows 2000 Pro laptop, as an administrator, while the machine is undocked.

You then proceed to open Control Panel, launch the System configuration tool, and open the Hardware Profiles configuration Window. You copy the existing hardware profile to a new profile. After changing the new hardware profile to reflect a "docked" setting, you close out of the Hardware Profiles configuration Window and immediately use Device Manager to Disable the Modem and built-in Network Interface Adapter of the Windows 2000 Pro laptop. You then log off of the Windows 2000 Pro laptop and return it to the CEO. Later in the day, the CEO calls you from home to report that he is neither able to dial into the company network nor connect his laptop to the small Local Area Network he has at home. You confirm that he had selected the "Undocked" option during system power up. What do you believe is causing the problem?

A. The CEO did not shut down and restart his machine to update the Windows 2000 Pro registry.
B. The CEO did not provide the correct user name and password when he dialed the RAS Server of BDG Company.
C. You configured the Docked Profile to reflect an "undocked" setting.
D. When you made changes in the state of the Modem and Network Interface Adapter with Device Manager, you accidentally disabled them from running in the Undocked Hardware Profile.

>> !
Answer: D


81. What factors are important to remember when configuring two video adapters on a Windows 2000 Pro computer?

A. Switch the order of the adapters on the motherboard to match the system.
B. Confirm that the correct video drivers are being used.
C. Activate the device in Display Properties.
D. Check the status of the devices in the Device Manager.
E. Windows 2000 Professional doesn't support multiple video adapters.

>> !
Answer: A, B, C & D


82. You are the network administrator for a company named SATYR Network Communications Inc. You have set up a Windows 2000 print Server on an Intel-based computer. There is a print device that is connected to the Windows 2000 print Server, and is shared for all users on the network. The necessary print permissions have been configured. The network consists of clients running Windows 2000 Pro, NT 4.0 Workstation:s and Windows 98 on Intel platforms, NT 4.0 Workstation:s on Alpha platforms, and Macintosh computers. What is the correct configuration of the printing environment to support this diverse grouping of clients?

A. Do nothing. The default configuration of the Windows 2000 Print Server on an Intel platform natively supports all of the clients.
B. Install the Windows 98 drivers on the Windows 2000 Print Server. Install the appropriate printer driver on the each of the Macintosh computers.
C. Install the NT 4.0 Alpha, NT 4.0 Intel, and Windows 98 Intel Drivers on the Windows 2000 Print Server. Install the appropriate printer driver on each of the Macintosh computers.
D. Install the NT 4.0 Alpha, NT 4.0 Intel, Windows 98 Intel, and Macintosh printer drivers on the Windows 2000 Print Server.
E. No Answer is Correct

>> !
Answer: E


83. What does a signature on a device driver mean?

A. That the driver manufacturer placed information about the device.
B. That the driver has been compressed.
C. That the driver has been digitally signed.
D. That the driver has been encrypted for protection.
E. That the driver has been enforced by the Internet Society Architecture Board.

>> !
Answer: C


84. Where do you configure the system to not allow the installation of unsigned driver files?

A. Add/Remove Programs, Driver signing option
B. System Properties, Driver signing option
C. Hardware Profiles, Driver signing option
D. Device Manager, Driver signing option
E. Services, Driver signing option

>> !
Answer: D


85. Where do you configure the system to allow the installation of all files, regardless of whether it is a signed or an unsigned driver files?

A. Add/Remove Programs, Driver signing option
B. Hardware Profiles, Driver signing option
C. System Properties, Driver signing option
D. Device Manager, Driver signing option
E. Services, Driver signing option

>> !
Answer: D


86. Where do you configure the system to warn the administrator before installing an unsigned driver file?

A. Services, Driver signing option
B. Device Manager, Driver signing option
C. Add/Remove Programs, Driver signing option
D. System Properties, Driver signing option
E. Hardware Profiles, Driver signing option

>> !
Answer: B


87. What two utilities does Windows 2000 provide to troubleshoot device driver signatures?

A. SigFind
B. SigVerif
C. DriveSig
D. FileSig
E. SFC

>> !
Answer: B & E


88. What command would you execute to scan all the protected files on the system immediately and replace incorrect ones with the correct files?

A. SFC /scanimmediate /yes
B. SFC /scannow /quiet
C. SFC /enable
D. SFC /scanonce /quiet
E. SFC /scannow /yes

>> !
Answer: B


89. When creating hardware profiles in Windows 2000, what type of devices can be disabled or enabled?

A. Network Adapters only
B. All devices
C. Video displays
D. Modems
E. Sound cards

>> !
Answer: B


90. While attempting to adjust the video settings for your workstation, your screen goes black. How could you attempt to fix this?

A. Boot the system in Safe Mode
B. There is nothing you can do; just log on and attempt to fix the problem
C. Boot the system with the Enable VGA Mode
D. Boot the system with the Last Know Good Configuration
E. Boot the system in the Network Enable Mode

>> !
Answer: C


91. What is the System Monitor: Processor: %Processor Time utilization threshold where you should consider replacing the Processor with a faster processor or adding another processor?

A. A Processor: %Processor Time spike of 80%
B. A sustained Processor: %Processor Time utilization of 75%
C. A Processor: %Processor Time spike of 95%
D. A sustained Processor: %Processor Time utilization of 80%

>> !
Answer: D


92. Which is the best System Monitor object to check to determine if an application is causing your Windows 2000 application server to respond sluggishly to any client request for service (running an application; establishing a file session)?

A. System
B. Processor
C. Physical Disk
D. Process
E. Thread

>> !
Answer: D


93. Of the following Microsoft Windows 2000 Pro or Server tools, which ones are able to display network connection data for troubleshooting purposes?

A. NETSTAT
B. NBTSTAT
C. TASK MANAGER
D. System Monitor
E. NETWORK MONITOR

>> !
Answer: A, B, D & E


94. After assigning manual TCP/IP address to workstations, the administrator notices that one of the workstations isn't working properly on the network, after running IPCONFIG /ALL on the machine, the administrator notices that the IP address is 0.0.0.0. Why?

A. That address is already in use
B. The Administrator entered the information in wrond
C. The machine has not fully initialized the IP address yet
D. The network is down
E. The cable is unplugged from the machine

>> !
Answer: A


95. For a workstation to successfully communicate on a network, the workstation must have at least the following configured on it?

A. Network Adapter Card
B. Common Protocol
C. Network Bindings
D. TCP/IP Address
E. DNS Server Address

>> !
Answer: A, B & C


96. You have a valid Internet IP address for your Windows 2000 Professional computer on the Local Area Network (LAN) in Charlotte. You need to access the corporate LAN in Princeton, New Jersey, which has a Remote Access Server with the IP address 202.133.14.10. What method should you use to create this connection?

A. A dial-up connection to the Internet Access Provider.
B. A Direct Cable Connection to the RAS server in Charlotte which has on-demand dialing.
C. A dial-up connection to the RAS server in Princeton.
D. A Virtual Private Network (VPN) to 202.133.14.10.

>> !
Answer: D

If you can reach hosts on the Internet, for example with your web browser, then you can create a VPN with a RAS server in another location without using a modem. Your corporation has already put the infrastructure in place for your computer to access 202.133.14.10. A dial-up connection to the Internet Access Provider (ISP) is necessary if you are required to reach the Internet via modem and get your computer a valid Internet IP address. A direct cable connection does not refer to a LAN's wiring closet connections. It is a short cable that physically connects two computers by cable. While it is feasible to connect this way to a RAS server that can demand-dial to the Princeton server, it is not necessary since you have a valid Internet IP address. You could use dial-up to the RAS server in Princeton if you did not have the corporate infrastructure to support you. You would use this, for example, to dial from home to the RAS server in Princeton.


97. You have a Windows 2000 Professional computer with an erratic mouse. The arrow or I-beam will not stay where you place it on the screen. You have removed the ball and cleaned the contacts and the ball. You have closed all programs but the one you are currently using, including the virus checker. What should you do next?

A. Uninstall the mouse driver and install it again.
B. Try another mouse on this computer.
C. Try this computer's mouse on another computer.
D. Run the virus checker to learn if it has affected the mouse driver.

>> !
Answer: A

You may have a corrupted mouse driver if you closed all other applications and the problem persists. Substitution of hardware is an excellent troubleshooting tool. It would be a lot faster, however, to try reinstalling the mouse driver because you may have to shutdown one or both computers to use substitution. Viruses are always a troubleshooting option. Erratic mouse behavior is a common hardware problem and it is not approached as a virus attack.


98. You have a Windows 95 computer with a Pentium 100, 64 MB of RAM, 2 GB of hard disk space, and a CD-ROM. The network adapter is not PXE boot ROM-compliant. You want this computer to use Dfs as that will be a standard for everyone on the upgraded network. What should you do to enable Dfs on this machine?

A. Create a remote installation boot disk by running rbfg.exe. Upgrade the system to Windows 2000 Professional from the network installation source.
B. Use the PCI empty slot to add a new PXE boot ROM-compliant network adapter, set the BIOS to start from the network adapter card, and upgrade to Windows 2000 Professional.
C. Install Internet Explorer (IE) 4.01 or later and enable the Active Desktop component. Install the Directory Service Client.
D. Create the four boot floppies to run startup and use the CD-ROM drive to finish the upgrade to Windows 2000 Professional because this CD-ROM is too old to be a bootable device.

>> !
Answer: C

The computer must support Active Directory directory services with Directory Service Client. But, before you can install the client, you must install a version of IE that provides Active Desktop. You cannot upgrade this computer to Windows 2000 Professional; the processor doesn't meet the minimum requirement of 166 MHz. It is possible to upgrade a system by booting with the simulated PXE boot ROM and access the installation files from a network server; however, this computer's hardware doesn't meet the minimum upgrade requirements. Adding a new PXE boot ROM-Compliant network adapter describes a way to do a remote installation of Windows 2000 Professional with a bootable network adapter. This computer cannot meet the minimum hardware requirements of a 2000 upgrade, however, without upgrading the processor first. Again, an upgrade by any method is impossible unless the processor is replaced. The boot floppies are needed when your CD-ROM drive is not bootable.


99. You have an Active Directory network with DHCP and DNS services in place. You want all new Windows 2000 Professional computers to have automatic IP addresses assigned. How do you do this?

A. In the Local Area Connection Properties sheet, highlight the TCP/IP protocol and click the Properties button. The General tab allows you to obtain an IP address automatically.
B. From a Command Prompt window, run ipconfig, configure for automatic addressing, and set the lease time.
C. In the Local Area Connection Properties sheet, highlight the TCP/IP protocol and click the Properties button. The General tab allows you to select to use the DNS server by typing in its address.
D. Disable the Automatic Private IP Addressing in the Registry for each adapter this computer has installed.

>> !
Answer: A

When you choose to obtain an IP address automatically from the General tab in the Properties of the TCP/IP protocol, you have enabled the client to get an IP address from the DHCP server. DNS does not hand out IP addresses, however you may also need to designate the DNS address if you are using this service. Automatic Private IP addressing is only a problem (and therefore needs disabling) if you anticipate that your DHCP server may go off line and no backup is available. The automatic would assign a private address if the computer's lease expired and the computer could not find another DHCP server. Ipconfig is great for releasing and renewing IP addresses if you have DHCP on your network. It is not a utility for configuring automatic IP addressing, however.


100. You have installed Windows 2000 Professional, but now the SuperVGA monitor's adapter does not have all the configuration settings that you set before the upgrade. It is also missing the tabs you are accustomed to using with this adapter in the Control Panel. What should you do?

A. Verify the signature of your driver using Device Manager. It is possible your good driver is corrupted.
B. Get the manufacturer's adapter device driver. Often these have added extensions that the Microsoft Windows 2000 Professional does not provide. You need to install it instead of the driver that was installed during Windows 2000 setup.
C. In Device Manager, under Monitors, use the Properties sheet to view the manufacturer's legacy extensions.
D. From Device Manager, run the Troubleshooter. It will help you find the legacy driver.

>> !
Answer: B

Whenever the drivers that come with the operating system are too general, you can check with the manufacturer to see if one is available for your hardware. Device Manager will show you which devices have problems. It will not show you advanced features of device drivers that were overwritten during setup of a new operating system. Device Manager has a Troubleshooter. It is commonly used for devices that have problems, not for revealing previous drivers. You can see the digital signer of the installed driver in Device Manager using the Driver tab. Use this technique when the problem is harder to isolate. The problem introduced in this question is very straightforward. You lost extensibility provided by the manufacturer.


101. You have established an infrared link with your office partner's laptop. Both computers are running Windows 2000 Professional. When are you able to send files from Word and from Visio on your laptop to her laptop?

A. A data connection must be established using the icon on the desktop or the context menu in Explorer where the files are listed.
B. A data connection must be established for each program using the Control Panel Wireless Link icon.
C. A data connection must be established for Word from within the application's Send to and another established for Visio from within its Send to.
D. A data connection must be established from within each application using the Save As option and naming the target computer's folder.

>> !
Answer: A

Once a wireless link is established, it can be used by multiple programs. The data connection is established by clicking the wireless link icon, naming the files to send, and then click Send. You do not have to create multiple links for data transfer.


102. You have offline folders on two different file servers. The Project1 folder is on Server1, and the Project2 folder is on Server2. Project1 is almost finished, and you no longer want to synchronize files each night when you go home with your laptop; but you don't want to disable the offline folder Project1. What should you do?

A. Use the Synchronization Manager in Explorer, Tools, Synchronize. For the Project1 folder, click the box for Ask me before synchronizing the items on the Logon/Logoff tab. Choose the LAN for your network connection.
B. Using Explorer, set the Manual Caching for Documents option on the Project1 folder.
C. Use the On Idle tab of the Synchronization Manager to turn off synchronization of the Project1 folder during idle times.
D. In the Folder Options of Explorer on your laptop, use the Offline Files tab to Enable Reminders. When prompted, at either LAN connection or remote connection, you have the option of refusing the synchronization.

>> !
Answer: A

By choosing the LAN as the network connection and by requesting a prompt, you will only be asked about Project1 folder when you are on the faster connection at the office. If you happen to dial-up your LAN from home, it won't prompt you about synchronization because you will be on another network connection. By getting a prompt at work while on the LAN, you'll have an opportunity to occasionally update this folder. If you are the administrator who is configuring the caching options for the Project1 folder and you are also the laptop user, you still would not wish to change the caching options that affect other users, so the Manual Caching for Documents is not the preferred method for limiting synchronization.
Turning off synchronization for On Idle won't really prevent the synchronization during LAN connections, either locally or remotely, if you have any type of settings in the Logon/Logoff area. The Folder Options are good for setting up your laptop and the file server to use offline folders. It is not an appropriate place to fine tune your synchronization, even with the Enable reminders option.


103. You have reinstalled Windows 2000 Professional after a failed installation. The second installation completed, but now you cannot connect to the domain controller. You know that the domain controller and the DNS server are both running. You have checked your network adapter settings and the transport protocol is correct. What should you do?

A. Make sure the computer name (for NetBIOS) is unique on the network.
B. Delete this computer's account on the domain controller, recreate it, and then, from this workstation, rejoin the domain.
C. Make sure the network adapter has the correct transceiver type.
D. Make sure all hardware is on the Hardware Compatibility List (HCL).

>> !
Answer: B

You will delete the computer account on the domain controller because you want to clear up the unique identifier for this computer. When you did the second installation, the ID for the account may have been confused. Deleting the account, recreating the account and then getting the workstation to rejoin the domain should clear things up. The transceiver of a network adapter refers to the infrared eye if you are using infrared for the connection. On a traditional adapter card the transceiver can be onboard or external. If it has both, one or the other must be selected. Use this troubleshooting process if a dependency service fails to start. Check the Hardware Compatibility List (HCL) again if you cannot get the computer to start up. It is important to check the uniqueness of the local computer name as NetBIOS still plays a part in the Windows 2000 network. This would be a correct troubleshooting solution if you had an error about Failure of dependency service to start.


104. You have ten symmetric multiprocessing (SMP) systems with a new hardware abstraction layer (HAL) file recently supplied by your computer manufacturer as part of hardware upgrade support for these computers. You also have an inventory of various types of 10/100 network adapters. You want to use sysprep.exe to prepare a master image for Windows 2000 Professional for these computers. What must you do before you can use the System Preparation Tool?

A. Create an answer file using Setup Manager wizard and include the [Networking] section with a InstallDefaultComponents = Yes line to manage the various network adapters.
B. Prepare a sysprep.inf file that will provide the new HAL file when the Mini-Setup wizard detects the hardware. Create a destination files folder for the HAL file.
C. Find out if the disk drive controllers for the target computers are the same as the one you are preparing the master image on.
D. Obtain the network driver interface specification (NDIS) drivers for these network adapter cards.

>> !
Answer: C

The two hardware components that must be identical for a successful sysprep operation are the hardware abstraction layer (HAL) and the hard disk controller device driver. You no longer need to specify or provide the NDIS file. When a network adapter is detected, the support files are provided by the operating system. The Mini-Setup wizard will detect the network adapter with Plug-and-Play on the target computers. An answer file is for unattended installations and not a requirement for this question. The new HAL file will be provided as you setup the master computer with Windows 2000 Professional, not during an unattended installation using an answer file.


105. You have three users in your company who require multiple language support on their Windows 2000 Professional computers. The computers already have English. You want to add French, and you see it as a choice in the Regional Options. You do not see the Slavic Languages, however. One of the users will use Czech. What do you need to do?

A. Use the Input Method Editors to customize Regional Options. Select Czech for keyboard layout.
B. Install the Baltic language group using the Windows 2000 Professional CD.
C. Use the Import Locale tab of the Regional Options to select Czech.
D. Change the local Group Policy for each computer to enable access to the multiple languages for these users.

>> !
Answer: B

The languages are provided in groups such as Central Europe, Baltic, Western Europe and US. If you do not see your language, use the setup disk to install a new group. The Input Locale tab lets you further refine your language choice by giving you the differences within a specific language. For example, there is a US variation of the English language. Local Group Policy can be used to manage languages by computer. Remember, however, that security groups cannot be used on local Group Policy to filter Group Policy objects. The Input Method Editors are added with keyboard layouts when you add an input locale.


106. You have trained mobile users to use offline folders. A user reports to the Help Desk that she cannot find a file she created yesterday while working at home. Which scenario is most likely the cause of her lost file?

A. She changed the default settings when configuring Offline folders and files on the Offline Files tab. Today she is looking for the file on the network share.
B. She saved the file in a folder on her hard drive that is not configured for Offline caching.
C. She lost the file permanently before it was ever saved to hard disk during a system failure so Offline caching was not yet in effect.
D. Her cached file was saved to the network share when she logged on, but another user who has delete permissions for the folder deleted the file.

>> !
Answer: A

If the default to synchronize files before logging off was disabled, then she will not have this file on the network folder the next day. Had she saved the file on her hard drive, her application would still be pointing to the location of this recent file. It is not likely that the file was deleted by a peer because only in a share folder where work is shared would you allow users to have delete permission. Her file would most likely be in her own folder on the network since it is an offline folder.


107. You have two Plug and Play modems in your Windows 2000 Professional computer. You want to be sure the application is using the faster modem when an inexperienced user is working this week on your computer. What should you do?

A. Deny the user access rights to the slower modem within Local Computer Policy.
B. Disable the slower modem because this is a temporary arrangement.
C. Use the Add/Remove Hardware wizard to remove the driver for the slower modem.
D. Set the default modem within the application the user will be working in.

>> !
Answer: B

Since the modems are Plug and Play, you can change the registry settings just by disabling the one modem. The driver will not be available when the computer starts up. You do not have to remove the driver since the modem is plug and play. Setting defaults within an application means the user could easily change the settings. One of the criteria was to choose a method the user will not be prompted to change. Access privileges are set for working resources. Setting policy for temporary situations is probably not a good idea anyway.


108. You have two volumes of dynamic storage on your Windows 2000 Professional computer. You need to restore the boot volume to correct some corrupt files. You aren't sure how widespread the file corruption problem is. Which data will you select to restore?

A. A backup job
B. A backup set
C. Individual folders
D. Individual files

>> !
Answer: B

You have created separate volumes to make restoration easier. Notice that the number of physical disks is not pertinent to the answer choice. You can divide a single hard disk into two volumes if you are using dynamic storage to make backup and restoring easier. When you have separate volumes on a backup job, the files and folders that were backed up on each volume is referred to as a backup set. It is possible to restore individual files and folders; the problem specifies restoring the volume. A backup job that includes two volumes will have two backup sets.


109. You have Web server services running on the Internet Connection Sharing (ICS) computer in your branch office. Next, you implement auditing on this Windows 2000 Professional computer. The security log shows no events, success, or failure after two days. You check that you enabled Audit object access. You check that you enabled auditing for specific files and folders. You reboot the computer. Still, no events are logged. What do you need to do?

A. You need to enable Audit privilege use at domain level in the Active Directory, which affects the local auditing.
B. For each file or folder you wish to audit you should choose the group Everyone for the Auditing Entry, rather than the Users group. Everyone will include anyone who accesses these files over the network. You have no events logged because members of your domain who are part of the Users group have not attempted to access these objects.
C. You need to set the Auditing policy at domain level in the Active Directory.
D. You need to check Allow Inheritable Auditing Entries From Parent To Propagate To This Object.

>> !
Answer: B

You want to gather auditing data on anyone who accesses your Web server's resources, not just the internal users, for whom you created domain accounts. Auditing is set on the physical computer, not at domain level. It cannot be done in Active Directory at the Local Computer Policy console either. You must also restart the computer once the auditing is configured. If you set the auditing on the Parent folder, then you need to allow inheritance to the child folders you are interested in auditing. The Allow Inheritable Auditing Entries From Parent To Propagate To This Object is checked by default. If yours is clear, you probably cleared it during audit configuration. Domain level settings do not affect the local computer auditing, so it would be wrong to enable Audit privilege use at domain level.


110. You inherit a workstation running Windows 2000 Professional installed on a FAT32 drive. You want to audit access to the files now that the computer will be used for sensitive data. What step is necessary before auditing can be enabled?

A. Use the convert d: /fs:ntfs command where d: is the drive you wish to convert. Allow the system to reboot when prompted.
B. Use the ListFreeSpace.vbs /S computername /O filename command on the computer with the drive you wish to audit.
C. Logged on with administrator privileges, enable the Audit Object Access in Local Policy area of the Computer Configuration.
D. Logged on with administrator privileges, enable the Directory Service Access in Local Policy area of the Computer Configuration.

>> !
Answer: A

Before you can use auditing of files and folders, you must be on an NTFS system. All answers referring to auditing as a solution miss the point that NTFS is the first requirement.


111. You have Windows 2000 Professional installed on a computer that three employees use. You want each of three users to have his own documents area that no one else can access. You create for each of the three users a shared folder of his own. You give only the owner user permission to use the folder. Later in the week, you are informed that User1's folder was modified while User1 was on vacation. What is wrong with your security configuration?

A. Shared folder security only works when accessing the folder over the network.
B. Domain authentication should be required at logon.
C. Local computer policy must restrict the rights of the three users.
D. You gave each share folder the same name under the users' Documents and Settings folders.

>> !
Answer: A

Three interactive users will be able to access each other's shared folders. Only by formatting the drive as NTFS will you be able to lock out other interactive users from each other's folders. Domain authentication can be required at log on, but will not affect shared folder access on the local drive. Local computer policy does not control access to shared folders. Generally, permissions are applied to objects such as resources and policy defines what users can do on a computer. The share folder under the Documents and Settings folder for each user will be in a unique path, it is true. However, the share name will have to be different. The system will give you an error message if you try and use a share name more than once. It will also give you the option to use the current share name for this folder instead of for the original one.


112. You install a second processor on a computer running Windows 2000 Professional. What step should you take to configure the computer to use the second processor?

A. Use the Add/Remove Windows Components feature of Add/Remove Programs.
B. Rerun the Windows 2000 Professional Setup program.
C. Restart the computer to allow Windows 2000 to detect and configure the second processor.
D. Use Device Manager to update the driver for the computer.

>> !
Answer: D

You should use Device Manager and update the driver from the properties of the current computer type object in the Computer category. This updates the Hardware Abstraction Layer from a single processor to a multi-processor version. Windows 2000 will not detect and configure the second processor automatically. You do not need to reinstall Windows 2000 Professional using the Setup program. The Add/Remove Windows Components feature of Add/Remove Programs does not allow you to add support for multiple processors.


113. You install new speakers that connect by universal serial bus (USB) to your laptop that has been upgraded to Windows 2000 Professional. The install was unable to complete successfully. Where should you go to correct the problem?

A. Run the Windows update to see if there are new drivers for your brand of speakers.
B. Check the laptop's BIOS to see if USB is enabled.
C. Check Device Manager for the speakers. Correct the settings for the interrupt.
D. Begin the installation again, this time using Add/Remove Hardware Wizard in the Control Panel. Choose the option to provide the manufacturer's device driver.

>> !
Answer: B

Since USB is Plug-and-Play, these installations usually perform without user interaction. However, if the BIOS on this laptop that has been upgraded does not support USB, you'll need to flash it. Get the new version from the laptop manufacturer. The speakers are Plug-and-Play so you don't need to manually adjust the interrupt settings. To do so defeats the automatic configuration abilities of Plug-and-Play. You should not use third-party drivers until you have tried the BIOS upgrade. Windows 2000 drivers are designed to make installations automatic and without user input. You should not consider Microsoft's new drivers as an option until you enable USB in the BIOS.


114. You install the Remote Installation Services (RIS) on a Windows 2000 Server. You configure the RIS server to deploy Windows 2000 Professional to client computers. One of the computers to which you plan to deploy Windows 2000 Professional has a network adapter card that does not have a Preboot Execution Environment (PXE) boot ROM. What should you do to provide an alternate method that uses a floppy disk or disks to deliver Windows 2000 Professional to that client from the RIS Server?

A. Use the Network Client Administrator utility to create a network installation startup disk.
B. Use the Setup Manager wizard to create a floppy disk that contains the remboot.sif answer file.
C. Use the makeboot utility to create setup disks.
D. Use the Remote Boot Disk Generator utility to create a startup disk.

>> !
Answer: D

The Remote Boot Disk Generator utility (rbfg.exe) should be used to create a remote installation startup disk. This startup disk simulates the PXE boot process. The makeboot utility is used to create setup disks that are used to boot a client computer and install Windows 2000 Professional from a CDROM drive local to the client. These setup disks are needed if the computer cannot be configured to boot from the CDROM drive. The Network Client Administrator utility is a Windows NT 4.0 utility that can be used to create a network installation startup disk. This disk can then be used to connect to a delivery server and install the software for a network client, such as the Microsoft Network Client v3.0 for MS-DOS and Windows. The Setup Manager wizard can be used to create a remboot.sif answer file to be used with RIS. However, this file alone on a floppy disk does not provide the ability for a client to contact an RIS server.


115. You install Windows 2000 Professional on a computer and select the Typical option for the network settings. You do not have a network adapter card, so you select the Microsoft Loopback Adapter. Later, you install a non-Plug and Play network adapter card in the computer and restart the computer to let Windows 2000 detect the card. Using Device Manager, you notice that the card is configured to use IRQ 10, the same IRQ as a non-Plug-and-Play sound card. You determine that IRQ 5 is not being used. You use Device Manager to modify the IRQ to 5 for the network adapter card. However, even after restarting the computer, you are not able to access the network. What other step must you take to enable access to the network?

A. Manually enter an IP address for the network adapter card.
B. Install the Client for Microsoft Networks.
C. Remove the Microsoft Loopback Adapter.
D. Reconfigure the network adapter card to use IRQ 5.

>> !
Answer: D

Using Device Manager to configure an IRQ for a device tells Windows 2000 what IRQ to use but does not reconfigure the card itself. Depending on the specific network adapter card, you either reset jumpers or switches on the card itself to configure the IRQ or you use a software configuration utility to configure the settings. Multiple network adapter card drivers can be installed, so you do not have to remove the Microsoft Loopback Adapter to enable access to the network. The Microsoft Loopback Adapter is a driver that is provided to allow you to configure networking services even if you do not have a network adapter card available.
If the non-Plug and Play network adapter card is configured to use the correct resources, the driver for the card is installed and configured properly, and the network protocols and services are bound to the card, the existence of the Microsoft Loopback Adapter will not prevent access to the network. Since the Typical option for network settings was selected during the installation of Windows 2000 Professional, the Client for Microsoft Networks should already be installed and the network adapter should be configured to obtain an address automatically. You do not need to configure the IP address manually.


116. You install Windows 2000 Professional on a computer in which a non-Plug and Play network adapter card is installed. The card is on the Hardware Compatibility List (HCL). When the installation is complete, you start Device Manager to view the installed devices. You notice that there is no category for Network Adapters in Device Manager. You also notice that the Other Devices category lists an ethernet controller whose icon is a yellow question mark with an exclamation mark in a yellow circle. What step should you take to install and configure the network adapter card?

A. Use the Add/Remove Windows Components feature of Add/Remove Programs.
B. Select Reinstall Driver from the Properties dialog box of Ethernet Controller in Device Manager.
C. Use Add/Remove Hardware in the Control Panel to add the correct driver for the network adapter card.
D. Use the Make New Connection icon in Network and Dial-up Connections.

>> !
Answer: B

You cannot configure a network adapter card driver until the Ethernet controller is enabled and no longer listed in the Other Devices category. You configure the Ethernet controller by selecting Reinstall Driver from the General tab of its Properties dialog box in Device Manager. This activates the Upgrade Device Driver wizard. You should allow the wizard to recommend a driver, and you may need to provide a floppy disk or CDROM from the network adapter card's vendor for the wizard to search for the correct driver. When the wizard completes, Device Manager will display a Network Adapters category and list the network adapter card in that category.
Once a network adapter card driver is installed and configured properly, a Local Area Connection icon for the card will be added automatically to Network and Dial-up Connections. You cannot manually add a local area connection. You cannot install a driver for a network adapter card by using the Add/Remove Hardware wizard without first enabling the ethernet controller. You will be able to install the drivers, but the drivers will not load. The Add/Remove Windows Components feature of Add/Remove Programs does not allow you to add support for network adapter cards or Ethernet controllers.


117. You install Windows 2000 Professional on a computer in your test lab on which Windows NT 4.0 Workstation was installed. During the installation, you create a new 2.5 GB partition and indicate that the partition should be formatted as FAT. You want to be able to boot back to Windows NT, so you indicate that the Windows 2000 system files should be installed on this new partition. After installation is complete and you boot the computer back to Windows NT, you discover that you cannot access the new partition from Windows NT. What is the most likely reason that you cannot access this partition?

A. Your Windows NT logon account does not have permission to access the new partition.
B. Setup formatted the partition as FAT32.
C. Setup converted the partition to Windows 2000 NTFS when you indicated that the partition should be used for the system files.
D. Windows NT cannot access a partition that is larger than 2 GB.

>> !
Answer: B

When Setup is used to create and format a partition, Setup will format a partition larger than 2 GB as FAT32, even if you indicate that it is to be formatted as FAT. Partitions larger than 2 GB are not supported by the FAT file system. Windows 2000 system files do not have to be on an NTFS partition, so Setup will not convert the partition to NTFS (version 5 is the Windows 2000-compatible version). If you have at least Service Pack 4 for Windows NT 4.0 installed, you will be able to access NTFS5-formatted partitions from your Windows NT 4.0 installation. Windows NT can access a partition that is larger than 2 GB. Permissions for your Windows NT account would only be a potential problem if the new partition was formatted as NTFS. Both for Windows NT 4.0 and Windows 2000, however, the default NTFS permissions for a new partition assign Full Control to the group Everyone.


118. You install Windows 2000 Professional on a computer. If you need to deploy a service pack for Windows 2000 Professional, what utility should you use to deploy the service pack?

A. Add/Remove Windows Components from Add/Remove Programs in the Control Panel
B. Windows Update from the Start menu
C. Windows Installer
D. The Update utility for the Service Pack with the /slip switch

>> !
Answer: D

Service Packs and Hot Fixes for Windows 2000 Professional can be installed using Windows Update if you can access the Internet from the computer to be updated. Windows Update can be activated from the Start Menu or from the Add New Programs choice in the Add/Remove Programs utility of the Control Panel. With Windows Update you can scan your computer for system files that are outdated and then update these files. A shared folder used to host the source files for the installation of Windows 2000 Professional can be updated with service pack files by using slipstreaming. You update the shared folder by using the update utility for the service pack with the /slip switch. Once the source files are updated, all future installations from the shared folder will incorporate the service pack updates, so users will not need to first install Windows 2000 Professional and then install the latest service pack.
The Add/Remove Windows Components choice in the Add/Remove Programs utility of the Control Panel allows you to install components that you did not include during the initial installation of Windows 2000 Professional. It also allows you to remove any components that are installed. It is not used to update components. If the source from which you are installing a new component has had the service pack applied via slipstreaming, you can install the most current files for the component when you add the new component. Windows Installer is used to install and manage applications.


119. You know that the processor is overwhelmed, and you already know that a single process is causing the problem. Where can you find out whether to purchase another processor or a faster processor?

A. In Task Manager, Processes tab, Columns view of Thread Count
B. In System Monitor, histogram view, Processor(_Total)\% Processor Time
C. In perfmon.msc, %Processor Time values for the System process
D. In the Pviewer utility report of Thread(_Total)\Context Switches/sec

>> !
Answer: A

Task Manager allows you to view the Thread Count of a process and determine whether it has single or multiple threads. For a multiple thread process, you will optimize with another processor. For a single thread process, you will optimize by purchasing a faster processor. The Task Manager Thread Count is an interim step. You will then collect data in System Monitor on the properties of the thread(s). The System Monitor histogram view will show you the processes using the CPU time and the percentage being consumed by each process. Use this step to determine if a single or multiple processes are monopolizing the processor. Perfmon.msc is the command line version of System Monitor. In Windows 2000, you no longer use the system object. You'll need to measure total processor time with the _Total instance of the Processor object. The syntax looks like this: Processor(_Total)%Processor Time.
Notice that NT's % Total Processor Time is now %Processor Time for Windows 2000. The Process Viewer (pviewer.exe ) utility, which you can install from on the Windows 2000 operating system CD, reports context switch data. A context switch occurs when the kernel switches the processor from one thread to another. The pviewer result shows processor time as 100% because idle time is included with user and privileged modes to total 100%. If you use System Monitor, however, you will see only the processor time actually used for user and privileged modes and no idle time.


120. You installed Windows 2000 Professional on a laptop. Then you inserted the network PC Card so the system could recognize it, but it did not. What have you overlooked?

A. A hardware profile was not created that includes the network adapter's driver.
B. The PC Card socket driver and the network driver must both be Plug-and-Play.
C. The Add/Troubleshoot option in Add/Remove Hardware Wizard was not run to validate the interrupts.
D. Device Manager was not used to print a report of all device settings.

>> !
Answer: B

The PC Card will be recognized as a Plug and Play device if its socket driver is also Plug and Play. You should run Add/Troubleshoot when there are problems with a device, but in this case, there is a standard Windows 2000 requirement to be met for network PC Cards. It is not necessary to print a report of all device settings unless you are trying to create documentation. A hardware profile can be made after the system recognizes the network adapter's driver, if you wish, but it is not a requirement for recognizing devices.


121. You notice that you have duplicate network drive mappings to a shared folder. After you increased the amount of disk space used for storing offline files on one drive, it is the same for both drive mappings. How should you disconnect one of the duplicate drive mappings?

A. From Explorer, highlight the share, click Tools, and Disconnect Network Drive.
B. From the Start button, click Run. Use the runas program to gain administrative privileges in Explorer and disconnect.
C. From the Start button, click Run. Type the share name in the Open box. From Tools, choose Disconnect.
D. From My Network Places icon, select the host server. Right-click the share, and choose Disconnect.

>> !
Answer: A

There are three ways you can map to a shared folder: by using the Map Network Drive wizard, the Run command, or locate the shared drive using My Network Places, which is the same as using Explorer, only it requires more effort. The correct answer illustrates that Explorer is a very direct way to reach all network resources you wish to manage, including mapping to and disconnecting from a share. Answers that are wrong either have steps out of order or refer to shares in a way that the operating system doesn't recognize.


122. You plan to install Windows 2000 Professional on a laptop computer on which there is currently no operating system installed. You want to manually configure the IP address for the computer while running Setup. Which network settings option should you choose?

A. Compact
B. Typical
C. Portable
D. Custom

>> !
Answer: D

The Custom network settings option must be chosen to manually configure an IP address. The Typical network settings option will configure the computer as a DHCP client. Compact and Portable are not available as Windows 2000 network setting options. They were available as installation options for Windows NT 4.0 Workstation. The Windows 2000 setup utility does not provide these installation options.


123. You log on as the local administrator of a computer running Windows 2000 Professional and create a new user account. You want to ensure that only an administrator can change the password for the account. However, the check box next to User cannot change password is not available. What must you do to enable this option?

A. Clear the check box for Password never expires.
B. Finish creating the account and then modify the password properties.
C. Clear the check box for User must change password at next logon.
D. Enable the account.

>> !
Answer: C

When a new account is created, by default the option User must change password at next logon is selected. When this is selected, the check boxes for User cannot change password and Password never expires are disabled. Clearing the check box for User must change password at next logon enables the other two check boxes. An account is enabled by default when you create it, so you do not have to enable an account before modifying its properties. Also, you do not have to finish creating the account before you can modify the password properties for the account.


124. You make your statistical results available to everyone in the company in a shared folder on your Windows 2000 Professional computer that has an NTFS file system. You use the Everyone group to provide Full Control, which is the default. NTFS permissions are also set to the default. You make changes to the results daily, but individuals only reference the data occasionally. The scope of the project is changing. Now only a select number of employees will be allowed see the more confidential data. You do not want to create a new folder and move the complex tables. How do you change the role of your share folder to match the new restrictions?

A. Create a new group and populate it with the members who will now be allowed to see the data. Remove the Everyone group for both Sharing and Security and add the new group with default permissions for both Sharing and Security. Old members will still have rights until their next logoff. Use cachemov.exe to remove offline folders from any users' hard disks that no longer have permission to the data.
B. Change the Sharing and Security permissions to the shared folder for the Everyone group to deny. Create a new group and populate it with only the members who will now be allowed to see the data. Set the Sharing and Security permissions to allow them to read the data only.
C. Create a new group and populate it with those members who need rights. Add the group to the folder's Sharing and Security Permissions lists and use the default permissions. Also add the Administrators group and give that group Full Control permissions in both Sharing and Security. Notify all members who have access to this folder of the change in share name.
D. Change the location of the shared folder by moving it to your other hard disk. Permissions will be inherited from the new target parent folder. Notify all employees of the change in location and change in permissions for this share folder.

>> !
Answer: C

Telling users "The share no longer exists" is easier for them to understand than "You no longer have rights to the share." Therefore, you should perform the following steps: Create a new group and populate it with those members who need rights. Add the group to the folder's Sharing and Security Permissions lists and use the default permissions. Also add the Administrators group and give that group Full Control permissions in both Sharing and Security. Notify all members who have access to this folder of the change in share name. Any answer that reduces users' permissions but leaves the share intact somewhere on the network falls into the category of "You no longer have rights to the share." The cachemov.exe utility allows you to move offline folders from the default root of the local hard disk, not remove them altogether.


125. You log on using the local Administrator account to a computer running Windows 2000 Professional. You want to enable Advanced Power Management (APM) support. However, when you open the Power Options icon in the Control Panel, there is no APM tab. What is the most likely reason this tab is not available?

A. The computer has a BIOS that is ACPI-compliant.
B. APM is only valid for laptop computers.
C. APM can only be enabled via Group Policy.
D. APM must be enabled from the BIOS.

>> !
Answer: A

If a computer has a BIOS that is compliant with the Advanced Configuration and Power Interface (ACPI), ACPI will automatically enable Advanced Power Management (APM). You cannot disable APM in this case, so the APM tab is disabled in Power Options. APM is available for both desktop and laptop computers. It does not have to be enabled from the BIOS or via Group Policy.


126. You upgrade a computer running Windows NT 4.0 Workstation to Windows 2000 Professional. The computer has one disk drive with three primary partitions and one extended partition. The extended partition is configured with five logical drives. One of the primary partitions is configured as drive E and formatted as NTFS. You convert the disk to a dynamic disk. You add another hard disk, convert it to a dynamic disk, and attempt to extend drive E to include 3 GB of the unallocated space on the new disk. However, you are not able to extend drive E. What is the most likely reason that drive E cannot be extended?

A. A volume can only be extended on its original hard disk.
B. You do not have one MB of free space on the original hard disk.
C. Drive E is formatted with a pre-Windows 2000 version of NTFS.
D. A volume that was originally created on a basic disk cannot be extended.

>> !
Answer: D

If a primary partition or logical drive is created on a basic disk and the disk is converted to a dynamic disk, the partitions and logical drives on the disk are converted to simple volumes. These simple volumes that were originally created on a basic disk cannot be extended. When Windows 2000 is installed on a computer running Windows NT 4.0 Workstation, any existing NTFS partitions and logical drives are updated to the Windows 2000 version of NTFS. One MB of free space must be available on a basic disk before it is converted to a dynamic disk, not after it is converted. A volume can be extended to include available free space on another hard disk. Once this is done, the volume becomes a spanned volume rather than a simple volume.


127. You manage six computers running Windows 2000 Professional for your department. Each computer is configured to automatically log on with the username and password of the primary user of the computer. You need to designate a different user account for the automatic logon of one of the computers. What utility should you use to designate a different account?

A. Local Security Policy
B. Group Policy
C. Computer Management
D. Users and Passwords icon in the Control Panel

>> !
Answer: D

In the Users and Passwords icon in the Control Panel, you can take the following steps to change the user account that will be used to automatically log on to the computer: Select the option Users must enter a username and password to use this computer. Select apply. Clear the option Users must enter a username and password. Select apply. You will be prompted for the user account and password that should be used to automatically log on to the computer. Group Policy, Computer Management, and Local Security Policy cannot be used to make this configuration change. The Local Users and Groups node of Computer Management can be used to create new users and groups and to modify the properties of users and groups. Group Policy is used to manage a number of configuration settings for the local computer. Local Security Policy is a node in Group Policy that is used to manage configuration settings that secure a computer. Local Security Policy can also be activated from the Administrative Tools folder.


128. You recently upgraded your computer to Windows 2000 Professional. You notice that the performance of your computer is slow when accessing network resources. Which setting can you use to easily change performance without monitoring network performance?

A. Remove all Workstation Service bindings to your transport protocols.
B. Use the Windows 2000 setup program to reinstall network protocols. The files may be corrupt.
C. Use Advanced TCP/IP settings, Options tab, to disable all TCP/IP Filtering on the network adapter.
D. Remove the bindings except for TCP/IP, and see if that improves network access to resources.

>> !
Answer: D

Your previous operating system version may have multiple network protocols bound to the adapter. Windows 2000 only needs TCP/IP unless you are accessing NetWare servers, in which case you'll need NWLINK. Windows 2000 handles binding dependent network components such as Workstation Service. This is transparent to the user and even the administrator. Corrupt files will cause specific non-performance rather than slowed performance. The default for TCP/IP Filtering is to Permit All (there is no filtering by default).


129. You purchase an infrared-ready printer to use it with your personal digital assistant (PDA) and your Windows 2000 Professional desktop computer. You also purchase an IrDA transceiver that connects to your desktop's serial port. How do you install and configure this transceiver?

A. Enter setup mode for your computer and change the mode of the serial port to IrDA or Infrared. In Network and Dial-up Connections set up the wireless link by referencing the infrared port, which shows up after you attach the transceiver and startup the computer.
B. Let Windows 2000 Professional's Plug and Play detect the transceiver. Use Device Manager to configure the properties of the device.
C. Use the Add/Remove Hardware wizard to detect the device. Use Control Panel's Wireless Link icon to configure the device.
D. Enter setup mode for your computer and change the mode of the serial port to IrDA or Infrared. Use the Add/Remove Hardware wizard to detect the device. Use Control Panel's Wireless Link icon to configure the device.

>> !
Answer: C

The transceiver attached to a serial port can only be detected by a manual Add/Remove Hardware wizard. Plug and Play cannot detect the external infrared device. Only configure the serial port as infrared within Setup mode if the device is internal. Doing this for an external device will disable the serial port. The wireless link icon appears when an infrared device is within range of your device. A wireless connection is in effect when the two devices are ready to transmit data using the Wireless Link program or a third party program.


130. You occupy an office with someone who has a shared printer connected to his Windows 2000 Professional computer. You want to use it with your Windows 98 computer. You are both connected to an Active Directory network. How do you get connected to that local print device?

A. Use the Add Printer wizard on your Windows 98 computer in the Printers folder. Make the connection by answering all the wizard's option questions for a network printer, and the printer driver will download to your computer.
B. Ask your network administrator to add the printer object to the Active Directory.
C. Use the URL of the Windows 2000 Professional computer, which is /printer, in your Internet Explorer (IE).
D. From the Start button, choose Run and type \\. Double-click the printers folder from the listing. Double-click the Add Printer to initiate the Add printer wizard.

>> !
Answer: A

You must have permission to access this printer. If the printer is shared, by default Everyone can connect to the printer by using this method: Use the Add Printer wizard on your Windows 98 computer in the Printers folder. Make the connection by answering all the wizard's option questions for a network printer and the printer driver will download to your computer. The printer can be found by browsing. It does not have to be an object in Active Directory. You cannot access this local print device using the Internet or intranet because you are not on a Windows 2000 computer. If you access the print server from the Run command box, you will be given a Logon failure message because you don't have rights on the Windows 2000 computer.