Windows 2000 Server1. Which of the following automated install methods will allow an upgrade installation of Windows 2000 server? A. Syspart B. Sysprep C. SMS D. Bootable CD
2. When setting up your distribution server, you must create a subfolder that contains new or updated files for installing mass storage device drivers and hardware abstraction layers (HALs). This subfolder should be named: A. \I386\$OEM$\Textmode B. \I386\$OEM$\$$ C. \I386\$OEM$\$1 D. \I386\$OEM$\$1\Sysprep
3. You would like to automate the installation of your new network of 300 clients. One of the members of your network administration team has suggested you use RIS. You have decided to research the requirements for installing the clients via RIS. Your colleague tells you that all of your clients are remote boot capable and PXE compliant. He also tells you that all the existing servers on the network are DDNS capable. Which of the following must you confirm are available on the network before the RIS installations can proceed? (Choose all that apply) A. DHCP B. WINS C. Active Directory D. RIS Server E. NAT Server
4. You are discussing RIS installations with a group of colleagues. They are unsure how RIS actually works. One of your colleagues has outlined the events that are part of the installation process, but his order is a little off. Place the events that are listed below in their correct order. 1. DNS is used to locate a domain controller 2. the bootstrap image copies all installation files to the local drive 3. the client locates a RIS server with an LDAP call 4. DHCP is used to assign an IP and DNS configuration information 5. an installation script is used to perform an unattended installation 6. the remote boot protocol is used to connect to the RIS service 7. the client locates a DNS A. 4, 7, 6, 2, 5, 3, 1 B. 4, 7, 1, 3, 6, 2, 5 C. 4, 6, 2, 5, 3, 7, 1 D. 4, 7, 3, 6, 2, 5, 1 E. 3, 4, 7, 1, 6, 2, 5
5. You are the administrator of a 1200-node network. Recently, your department was increased by 300 people. Over the weekend, you wired the user stations and placed the new systems in each user's cubicle. Today, you want to install 300 systems using an unattended answer file and shared distribution folder. Goals: Configure an automated setup file that can be run on client systems. Create a distribution share for Windows 2000 installation. Use the automated setup file to install your systems. Automate application installation after Windows 2000 installation over the network. Proposed Solution: You create an unattended answer file with Setup Manager. You copy the Windows 2000 installation files to a central server and share the folder to which those files were copied. You copy the unattended answer file to the central share. Then, you use SysPrep on the client systems to download your installation and automate application installation. Which goals are achieved by this proposed solution? (Choose all that apply) A. Configure an automated setup file that can be run on client. B. Create a distribution share for Windows 2000 installation. C. Use the automated setup file to install your systems. D. Automate application installation after Windows 2000 installation over the network.
6. YCorp has hired you as a consultant to help install 300 Windows 2000 Srv:s on their 25,000 node network. The company has already hired a team study the network and an installation task list has been created. The distribution and placements of the servers has already been decided as shown in the table below: Location Number of servers OS types Number of clients Koh Samui 2 Windows NT 30 Workstation 4.0 Penang 2 Windows NT 30 Server 4.0 Narita 100 Mix of Windows NT 10000 4.0 Server and Windows NT 3.51 Server Songtan 45 Mix of Windows NT 2440 4.0 Workstation and Windows NT 4.0 Server Mallersdorf 25 Windows 98 and 1800 Windows 95 Utrecht 100 Windows NT 4.0 10000 Server Flagstaff 26 Mix of Windows NT 700 4.0 Server and Windows 98 Which of the following operating systems will be able to upgrade instead of requiring a fresh installation? A. Windows 95 B. Windows 98 C. Windows NT 4.0 Workstation D. Windows NT 4.0 Server E. Windows NT 3.51 Server
7. JCorp has hired your network consulting team to upgrade 300 NT Server 4.0 systems to Windows 2000 Server. You have been tasked with identifying potential problems with the installation. Your first mission was to collect data about the hardware configurations of the 300 systems that the company has ordered. You sent three members of your team out to five different rooms to gather that information. From the information your team collected, you produced the table below: Location Number of Systems Hardware Configuration Room 157: 15 Pentium 150MHz 16MB of RAM 700MB of free disk space Room 157: 75 Pentium 100MHz 32MB of RAM 1.5GB of free disk space Room 143: 90 Pentium 60MHz 96MB of RAM 200MB of free disk space Room 169: 20 Pentium 166MHz 256MB of RAM 3GB of free hard disk space Room 112: 50 Pentium 333MHz 1GB of RAM 1TB of free disk space Room 113: 40 Pentium 1.5GHz 2GB of RAM 1.5TB of free disk space Room 192: 10 Pentium 333MHz 1GB of RAM 500MB of free disk space Which rooms have systems that will require hardware upgrades before Windows 2000 Server can be installed? A. Room 157 B. Room 143 C. Room 169 D. Room 112 E. Room 192
8. You have been asked to upgrade 7,500 systems for GlobalXOrg, a company with 250 offices worldwide. You are briefing a group of system engineers about performing upgrades in the various locations. You have advised them that they should check the hardware compatibility list before attempting to upgrade mission critical servers. However, you want to give them a quick way to check the hardware compatibility using the Windows 2000 Server CD-ROM via the WINNT.EXE file. Of the switches listed below, which one is a valid WINNT32.EXE switch for checking the hardware of the system you are going to upgrade? A. /checkupgradeonly B. /systemcheck C. /drivescan D. /bootcheck E. /hardwaretest
9. You work for a large computer vendor that needs to pre-configure laptops with Windows 2000 installations, including application packages. You have 7,000 identical systems to configure and ship by the end of the week. You know that it wouldn't be possible for you to set up and install each of these systems manually. You have the tools for drive duplication, but you want the users to have to enter their own personal information when they boot their computers the first time. Goals: Configure your master computer. Use SysPrep on the master system. Automate Windows 2000 and related application installation. Duplicate the master computer's hard disk. Configure a system that will ask for basic user settings when booted. Proposed Solution: You plan to take the first of 7,000 computers and install Windows 2000 via the CD-ROM drive. Then, you will install all of the custom applications that you require. You will use Setup Manager to create a sysprep.inf file and save that file under C:\sysprep. Then, you will run SysPrep on the system. Which of the following are accomplished by the proposed solution? (Choose all that apply) A. Configure your master computer B. Use SysPrep to configure a master system C. Automate Windows 2000 and related application installation on the 7,000 systems D. Duplicate the master computer's hard disk E. Configure a system that will ask for basic user settings when booted
10. Which command allows you to use the /syspart switch for installing Windows 2000 Server? A. winnt B. winnt32 C. setup D. net run
11. Which of the following operating systems cannot be directly upgraded to Windows 2000 Server? A. Windows NT 3.51 Server B. Windows NT 4.0 Server C. Windows NT 3.5 Server D. Novell 4.12 Server
12. Windows 2000 Datacenter Server supports multiple processors. Up to how many processors will it support? A. 2 B. 4 C. 8 D. 16 E. 32
13. Which version of Windows 2000 includes Windows Clustering and load balancing? (Choose all that apply) A. Windows 2000 Professional B. Windows 2000 Server C. Windows 2000 Advanced Server D. Windows 2000 Datacenter Server
14. To create the setup disks for installing Windows 2000, which command is used? A. Winnt /b B. Winnt32 /b C. Makeboot D. Sys /a: E. Setup /b
15. How do you install Recovery Console on a computer that has a mirrored volume? A. Using Control Panel, Add/Remove Programs, add Recovery Console to the first part of the mirror. The information will be copied to the mirror. B. Using Control Panel, Add/Remove Programs, add Recovery Console to both partitions where the mirror exists. C. Break the mirror, then install the Recovery Console using x:\I386\winnt32.exe /cmdcons. After the Recovery Console is installed, you can re-establish the mirrored volume. D. Do it as part of the preinstallation package.
16. How do you add the Recovery Console to existing installations of Windows 2000? A. Control Panel, Add/Remove Programs B. Control Panel, Administrative Tools C. Start, Run x:I386\Winnt32.exe /cmdcons D. Command Prompt, reccons -x
17. Examine the following information: CN=George Doe, CN=Users, DC=international, DC=msft This is an example of: A. A distinguished name B. A relative distinguished name C. A user principal name D. A GUID
18. You are the administrator of an OU with an FQDN of acct.branch1.corpx.com. You know that corporate policy is to limit roaming user profile sizes to 30 MB. However, you have recently noticed that user profile sizes are exceeding 30 MB even though account settings are mapping them to a server in your OU. You have checked your GPO and your limit user profiles setting is not configured, so that the corporate settings are flowing through. You have called the administrator of corpx.com and he tells you that the user profile limit is still in place, but that "no override" is not set for the policy. What is the most likely problem? A. user profiles are not shared B. the server isn't using an NTFS partition C. block policy inheritance is configured at corpx.com D. roaming user profiles are not enabled
19. Which of the following is NOT a command you can use with Recovery Console? A. Copy B. Disable C. Fixmbr D. Edit
20. When installing Windows 2000 Advanced Server, which of the following are optional components that can be chosen during the installation process? (Choose all that apply) A. Certificate Services B. IIS C. Remote Storage D. Terminal Services E. Script Debugger
21. Windows 2000 introduces a new Windows installer package. This package is called: A. Setup.exe B. .msi C. .ins D. .win
22. Which of the advanced startup options will not work on a Windows 2000 Domain Controller? A. Restore Mode B. Enable Boot Logging C. Safe Mode with Networking D. Debugging Mode
23. To use the Recovery Console, you must know the password for the local Administrator account, for which you will be prompted on execution. Once the logon has been verified, what do you have access to on the hard disk? A. All files and folders that the local administrator would have access to. B. The entire system, registry, administrative settings and disk information. C. %SystemRoot%, %Windir%, %SystemRoot%\Cmdcons and its subfold D. %SystemRoot%\Cmdcons and its subfolders.
24. You need to repair a Windows 2000 installation. Which processes can you use to do this? A. Emergency Repair Process B. Recovery Console C. Emergency Console D. Repair and Replace Process
25. In order to share folders on a system in a Windows 2000 domain, you must be a member of one of the following groups: (Choose all that apply) A. Administrators B. Power Users C. Server Operators D. File Systems Operators
26. When configuring applications for terminal services, when do you use the "change user" command? A. When a single-user application is going to be used in conjunction with terminal services. B. When installing the application uses another method than a setup program. C. When the user-specific registry settings are not being propagated as needed. D. When a single-user application has to be used in a multi-user environment.
27. What is an application compatibility script used for? A. To configure a single-user application to run in multi-user mode. B. To make an application that normally would not run on Windows 2000 run with Windows 2000 Terminal Services. C. To modify an application to function better in a multi-user environment. D. To test the compatibility of an application in a terminal services environment.
28. Which of the following statements are true regarding applications in a Terminal Services environment? A. Applications that do not run on Windows 2000 will not run in a multi-user environment on Terminal server. B. Windows-based 32-bit applications run more efficiently than 16-bit applications. C. Applications that normally would not run on Windows 2000 may be configured to run on Terminal server. D. 16-bit applications can reduce the number of users supported by as much as 40%.
29. Which of the following single master operations roles are forest-wide? (Choose all that apply) A. Schema master B. Domain naming master C. RID master D. PDC emulator E. Infrastructure master
30. You wish to add a printer that uses the TCP/IP protocol. Using the Add Printer Wizard, what do you do to create this printer? A. Add Port, LPR Port B. Add Port, Standard TCP/IP Port C. Create New Port, LPR Port D. Create New Port, Standard TCP/IP Port
31. To control settings for all documents on a printer, a user must have which permission? A. Print B. Manage Documents C. Manage Printers D. Full Control
32. To share a printer, a user must have which permission? A. Print B. Manage Documents C. Manage Printers D. Full Control
33. One of your Windows 2000 Srv:s hard drives has crashed. The crash didn't affect the system files, but the server - appsrv1.domx.com - was hosting several shared applications for your network. There is another Windows 2000 Srv named filesrv2.domx.com on the network that is being used as an application server and also as a file storage location for users in your graphics design dept. The graphics design users had file storage limits of 500MB each and all other users were limited to 2MB because they were expected to store their files on appsrv1.domx.com. You decide to move the graphics design files from the D drive to the C drive of filesrv2.domx.com. You then move the hard disk with partition D from filesrv2.domx.com to appsrv1.domx.com. Finally, you replace the D drive in filesrv2.com with a smaller drive that still has ample room for the graphics design users. Soon you find that many users cannot save files on appsrv1.domx .com and the graphics design users are exceeding their space limits. What happened? (Choose all that apply) A. the disk quotas stored in the registry became corrupted B. the disk quotas stored on the file system moved with the hard disks C. in moving the hard drive from one system to the other the system became the owner of all files D. the new volume installed in filesrv2.domx.com is not limited by the quotas set on the previous hard drive E. disk quotas do not apply on application servers
34. Your Windows 2000 Server is configured as follows: Processor Intel Pentium II 350 MHz Disk 0 1 partition FAT32 file system Disk 1 1 partition FAT16 file system Paging file Initial size 128 MB Located on Disk 0 Maximum size 256 MB NIC 3 COM 10/100 Ethernet A new corporate policy has dictated that all systems have file encryption and user level security enabled. You want to lose as little data as possible in making this conversion. Which of the following must be completed on your system to meet the requirement? A. Disk 0 must be converted to NTFS B. Disk 0 must be reformatted to NTFS C. Disk 1 must be converted to FAT32 D. Disk 1 must be reformatted to NTFS E. Disk 1 must be converted to NTFS
35. You are running a consulting service for a large multinational bank. The bank has real-time bit-by-bit backup systems for mission-critical information. You are running configuring a small group of Web servers for online banking information for customers. The company wants you to configure systems that respond to customer queries quickly, but also have a level of fault tolerance to protect data locally - even though the data is also backed up. You want to provide both fault tolerance and rapid disk read access for your network clients, which of the following is the best option? A. RAID 5 B. Mirroring C. Duplexing D. Striping E. duplication
36. You are installing a new modem in your Windows 2000 Srv to support dial-in clients. Before you install the modem you read that it is set to use COM3. You review your system settings and you see that COM1 and COM2 are already in use. Which of the following default IRQ settings is the default for COM3, but is already in use? (Choose all that apply) A. IRQ 1 B. IRQ 2 C. IRQ 3 D. IRQ 4 E. IRQ 5
37. You have configured 75 Windows 2000 Srv:s in the last two weeks. Each Windows 2000 Srv has a fault tolerant implementation of the system and boot partitions via disk mirroring through the operating system. The disk mirror is between Disk0 and Disk1 on each server. Disk0 is the primary active partition and contains the original installation of the operating system. Just as you finished the 75th server, you receive a report that the first server you installed has a failed drive. The administrator of that system has called to say he didn't notice the problem until he tried to restart the system. He received the error message upon reboot. Assuming that Disk1 is still operational, what will you require in order to recover the failed disk mirror? A. the Windows 2000 Server CD-ROM B. a new hard disk similar to the one that failed C. tape backups D. two new hard disks to replace the failed mirror E. a fault tolerance boot disk
38. You installed two Web servers for a company that provides pay-for-content Web services. The company wanted to ensure that each server had fault tolerance in the event that a hard disk failed on the system. They installed five hard disks on each computer, and you configured a disk mirror on Disk0 and Disk1, then you created a stripe set with parity using the remaining three hard disks (Disk2, Disk3, and Disk4). Several months after installing these systems you receive a call that one of the hard disks has failed on Web_1, which was the first Web server you installed. The Web developer who reports the problem says that it is Disk4 that failed. He says that he didn't notice it immediately, until he did a system review and saw that the memory utilization was far above normal for the amount of traffic that the Web server was receiving. Then, he noticed that Disk4 had failed and called you. What will you need in order to correct the problem? A. the Windows 2000 Server CD-ROM B. a new hard disk similar to the one that failed C. tape backups D. three new hard disks to replace the failed set E. a fault tolerance boot disk
39. Which of the following methods can be used for clean installations of Windows 2000 Srv on computers that have dissimilar hardware? A. Syspart B. Sysprep C. SMS D. Bootable CD
40. The mirror set that you have migrated from NT 4.0 to Windows 2000 has failed. Because it was migrated, it is on a basic disk. The status of the mirror set is "Failed Redundancy" and the status of the disk is "online." What should you do? (Choose all that apply) A. Replace the failed basic disk with a dynamic disk and use Repair Volume. B. Replace the failed basic disk with another basic disk and use Repair Volume. C. If the status does not change to "Healthy," replace both disks and restore from backup. D. If the status does not change to "Healthy," choose "Regenerate Mirror."
41. You have been monitoring the paging file on one of your Windows 2000 Srv:s and you notice that it is getting used quite a bit. Although you have ordered more memory for the server, you are told that it will be several weeks before you will get the additional memory. Assume that you cannot add any hardware to your current system, but you still want to improve performance. Your system is configured as follows: Paging file location: C drive Paging file initial size setting: 256 MB Paging file observed average: 510 MB Paging file maximum size setting: 1024 MB %systemroot% location: C drive Number of physical disks on server: 3 Partitions on Disk 0 C Partitions on Disk 1 D Partitions on Disk 2 E Of the following options, which will improve the performance of the paging file on the above server? (Choose all that apply) A. configure a RAID 5 stripe set with parity and place the page file on the stripe set B. configure a RAID 0 stripe set on the D and E drives and place the paging file on that drive C. move the paging file away from the system files D. increase the initial paging file size E. reduce the initial paging file size
42. You have several applications that run on your Windows 2000 Server to support network users. You have created a stripe set with parity to support your users and increase performance while protecting their data. You have also optimized throughput for application sharing. However, now you want to ensure that a Win32 financial application (FINAP.EXE) runs at a higher priority than the other applications on your server. Which of the following commands would run the financial application at a higher priority others on your system? (Choose all that apply) A. START FINAP.EXE /HIGH B. START FINAP.EXE /REALTIME C. START FINAP.EXE /SEPARATE D. START FINAP.EXE /MAX E. START FINAP.EXE /ABOVENORMAL
43. Your network administration team is having a meeting on the status of the network. One of the administrators says that the Windows 2000 Server named XFILE is no longer running efficiently. Another administrator says that she thinks the system should have a RAID 5 drive array like the other applications servers. Your job is to confirm or deny that request based on a System Monitor report that is to be conducted over the next week. You have decided to monitor 24 hours per day for seven days to create your report. Which of the following objects and counters help you determine whether a RAID 5 configuration will improve performance? (Choose all that apply) A. PhyscialDisk Avg. Disk Queue Length B. Server Bytes Total/sec C. Thread % Processor Time D. Processor % Processor Time E. PhysicalDisk % Disk Time
44. You are in charge of three different Windows 2000 Servers on your network. Each server provides file and printer sharing to Windows 2000 Professional clients. Lately, you have noticed that users are complaining about the performance of one of the servers. You suspect it is because that server is being used more than the other servers are to answer client requests. Which of the following objects and counters should you monitor on each server to make this determination? (Choose all that apply) A. Redirector - Server Reconnects B. System - System Calls/sec C. Server Work Queues - Total Operations/sec D. UDP - Datagrams/sec E. Server - Bytes Total/sec
45. Your Windows 2000 Srv has recently run into a boot problem. You have attempted to use the Last Known Good configuration, but without success. The ERD you have created doesn't seem to be working either. You suspect that the Master Boot Record has been corrupted or modified by another user. At this point, you realize that the recovery console is probably your best option. Which of the following are valid methods for accessing the recovery console? A. run winnt32 /cmdcons B. run rconsole C. boot from the Windows 2000 CD and then choose to repair your installation D. run rdisk from a Windows 2000 command prompt E. boot from the boot floppies and press R when prompted
46. An application exception has occurred and Dr. Watson has generated a log file. How can you view the file? A. The application log B. The system log C. The security log D. The event log
47. When running in safe mode, which of the following components are not available under System Information? A. System Summary B. Hardware Resources C. Components D. Software Environment E. Internet Explorer 5
48. You wish to check whether or not a driver has been loaded, and run System Information. Under which subcategory should you check for the status of a driver? A. System Summary B. Hardware Resources C. Components D. Software Environment E. Internet Explorer 5
49. You have been receiving complaints from a client that printing from his Outlook client is extremely slow. You examine the situation and discover that his Outlook client is configured for multiple languages. How do you resolve this printing problem? A. Restrict the printing from Outlook client to single language. B. Increase the spool directory on the client computer. C. Install multiple languages on the print server. D. Change the print requirements to print directly to server, without spooling.
50. How are disk quotas tracked under Windows 2000? A. Per user, total disk space allowed B. Per group membership, total disk space allowed C. Per user, total disk space per volume D. Per group membership, total disk space per volume
51. Your network administration team wants to use quotas to manage the size of the desktops of roaming users. The group has been discussing various ways of doing this, and several solutions have been proposed. You are aware that several of the suggestions will not work because of the limitations of the Windows 2000 quota management service. The most recent suggestion is to perform the following: 1. Allow users to logon from different systems on the network 2. Configure roaming profiles to be stored on a central server and volume 3. Locate the desktop folder inside each profile and set it to the specified size limit 4. Limit administrators to 200MB desktops and all other users to 100MB desktops Which aspects of the most recent proposal require revision? A. 1 only B. 2 only C. 3 and 4 only D. 2 and 4 only E. 1 and 4 only
52. Fran, one the network administrators on your team, asked users to compress their when storing them on your Windows 2000 Srv about two weeks ago. As far as you know, all of the users complied with the request because you checked on it last week and the file space in use dropped considerably. A few days ago, you asked several users to encrypt their sensitive files. Today, Fran told you that several of the users did not have all of their files compressed and she asked you to verify this with the users. You notice that the list of names includes all of the users that you asked to encrypt their sensitive files. Which of the following explains this event? (Choose all that apply) A. users accidentally decompressed their files during encryption B. encrypted files cannot be compressed C. disk quotas are enabled D. the files are on a FAT16 partition E. the files are on a FAT32 partition
53. Several of the users on your network need to have security set on their files. Each Windows 2000 user stores their sensitive files locally and the systems are physically secured. However, you want to ensure that they are able to encrypt their files on their local system. Each user's system is identical and has the following configuration: Partition Type FAT32, RAM 64MB File Compression Enabled for all sensitive files Processor Intel Pentium II / 350 Network interface 3Com 10/100 adapters Which of the following must you do to ensure that these systems will be able to protect their sensitive data with EFS? (choose all correct answers) A. upgrade RAM B. change partitions to NTFS C. upgrade processors D. disable file compression on encrypted files E. replace network adapter
54. A consulting firm that you are not affiliated with has established a network backup plan that involves a series of incremental, differential, and full backups. The plan the consulting firm created is shown in the table below Sunday Differential Monday Incremental Tuesday Differential Wednesday Full Thursday Differential Friday Incremental Saturday Differential Today is Sunday and the company that is using that backup plan just called. They inform you that the network crashed one hour ago and they need to restore their data from backup. The Sunday backup has not been run yet. You had them fax the backup schedule and you have determined that it will take a total of ______ tapes to restore their system. A. 1 tape B. 2 tapes C. 3 tapes D. 4 tapes E. 5 tapes
55. You have configured a central Windows 2000 Srv that is servicing 500 clients. The Windows 2000 Srv maintains home directories for the users. The hard disk that you have been using in the system is a 4GB IDE drive (basic disk) that is formatted with the NTFS5 file system. Although the drive has plenty of space for the users home directories because disk quotas limit the size of each user's space on the drive, you need to add space to the drive. However, the drive is completely out of disk space. If you add a second physical disk (4GB) to the Windows 2000 Srv, how can you increase the available space on the drive maintaining the home directories? A. format the drive, mount the drive to a new folder created on the first drive B. do not format the drive and extend the first drive with the partition of the second drive C. format the drive and extend the first drive with the partition of the second. D. partition the new drive with NTFS and then format it to NTFS, then extend the first drive
56. You have configured 25 folders for users in your department on your local Windows 2000 Srv. All of your clients have compressed their folders. A few days ago, you added a new hard drive to your Windows 2000 Srv and you would like to move the user's folders to the other drive. The new drive is formatted with the NTFS file system. You create a new parent directory called home, but you do not configure any special options or enable compression. However, all of the user files you are moving to the new drive are compressed. After you transfer the files to the new partition you discover that they are all uncompressed. Why did this happen? (Choose all that apply) A. you transferred the files with CSVDE B. you transferred the files with movetree C. you transferred the files with LDIFDE D. whenever you copy or move files between partitions they inherit their security and compression attributes E. whenever you move files, the compression attribute changes to the opposite setting.
57. Which file systems does Windows 2000 support? A. HPFS B. FAT C. FAT32 D. NTFS E. DOS
58. Which of the following is stored on the host computer on a standalone Dfs? (Choose all that apply) A. The Dfs Root B. The topology C. The shared folders D. The data
59. Only client computers running Dfs software can access Dfs resources. Which of the following operating systems include Dfs client software? A. 2000 Pro B. NT 4.0 Wks C. Windows 98 D. Windows 95 E. DOS
60. On a domain-based Dfs, where is the topology stored? A. On the host computer B. On the domain controllers C. In Active Directory D. On the synchronized computer
61. How are permissions applied in Dfs? A. Dfs folders have unique share and NTFS permissions that must be assigned at the time Dfs is configured. B. Dfs root folders have unique share and NTFS permissions that must be assigned at the time Dfs is configured. All subfolders under the root have the permissions of the root folder. C. First level folders must have share and permissions assigned at the time Dfs is configured. All subfolders under the first level folder will, by default, inherit the permissions of the parent folder, but may be configured to suit administrative need. D. Dfs does not use unique share and NTFS permissions. The permissions assigned to the share where Dfs points are the permissions that are applied.
62. While monitoring a client, you note that every time the client wishes to access a Dfs link, it queries the Dfs server about the location. This happens every time, even if the client had already established a connection to the link a short time before. Why is this happening? A. The link is not statically mapped. B. The link's cache referral has been set to 0. C. The original link has failed and fault tolerance is in effect. D. The replica was not found.
63. How many replicas can each DFS link have? A. 64 B. 16 C. 32 D. Unlimited E. 8
64. Using dynamic storage, what is the limit of volumes you can create on one disk? A. You cannot create volumes using dynamic storage B. 1 volume C. 16 volumes D. 32 volumes E. unlimited volumes
65. You wish to view the changes you have made to the drive letters in Disk Management. Which command do you use to do this? A. Commit Changes Now B. Refresh C. Rescan Disks D. Confirm and View
66. You wish to convert your disk from basic to dynamic. How do you do this? A. By using the "convert" command at the command prompt. B. By using the "covert now" command in the Disk Administrator. C. By using the "upgrade to dynamic disk" command in Disk Administrator. D. By using the "upgrade" command at the command prompt.
67. You wish to covert your drive back to basic form from dynamic, while retaining all information on the disk. How do you do this? A. Use the "revert" command at the command prompt. B. Use the "revert to basic disk" command in Disk Administrator. C. Back up all information, use the "revert to basic disk" command in Disk Administrator, and restore the information after completion. D. There is no practical way to revert to basic after converting to dynamic.
68. A simple volume and a partition seem to represent similar use of disk space. What are the differences? A. A simple volume does not have the size limitations of a partition. B. A simple volume can be formatted FAT 32, while a partition cannot C. A simple volume can span multiple disks, a partition cannot D. A simple volume is fault tolerant, a partition is not
69. Which file formatting system or systems will allow you to extend a simple volume? A. NTFS B. FAT C. FAT32 D. VFAT E. HPFS
70. What is the maximum number of disks that can be used when creating a spanned volume? A. 1 disk B. 16 disks C. 32 disks D. unlimited disks
71. When you migrate a server from NT 4.0 to Windows 2000, what happens to the volume sets created on NT 4.0? (Choose all that apply) A. They are converted to volume sets on basic disks. B. They are converted to volume sets on dynamic disks. C. They are converted to partitions to basic disks. D. They are not retained and must be restored from backup.
72. If a user has reached his disk quota allowance, and the disk quota is set to prevent further disk space, what must he or she do to obtain more space? (Choose all that apply.) A. Delete some files. B. Compress some files. C. Have another user take ownership of some files. D. Have the administrator increase the quota allowance.
73. A user is running a machine that is set to dual boot between NT 4.0 and Windows 2000. He has reached his disk quota limit for data storage. What effect will this have when he boots under NT 4.0? A. He will be unable to boot into Windows NT 4.0 because there is insufficient disk space. B. He will be unable to see the files as NTFS is different under NT 4.0. C. He will be able to exceed the disk quota limit. D. It will have no effect whatsoever.
74. The admin has set up the disk quota state as "disk quota tracked." What effect does this have? A. This is the default state; performance is not affected by disk quotas. B. Quota usage changes are tracked, but quota limits are not enforced. C. Quota usage changes are tracked and quota limits are enforced. D. Quote usage changes are tracked, quota limits are enforced, and users are notified when they are reaching quota limits.
75. You have a 1GB drive and 100 users. You wish to allocate 100mb of space to each user under disk quotas. What happens? A. You are unable to do this. B. You modify the registry under KEY_LOCAL_MACHINE\System\CurrentControlSet\Control. C. You run the command diskall.exe -d. D. Disk quotas do not prevent the administrator from allocating more than the actual space.
76. Under Windows 2000, what is the maximum partition size for a FAT16 volume? A. 1024MB B. 2048MB C. 4095MB D. no limitation
77. On a volume with fewer than 32,680 sectors, using the format command under disk administrator, how is it formatted? (Choose all that apply) A. FAT12 B. FAT16 C. FAT32 D. NTFS
78. You have configured your local network with IP addresses from 10.0.0.1 through 10.40.0.1. You want to give your internal clients Internet access via NAT. Your Windows 2000 Srv has an internal and external adapter with a demand-dial connection and RRAS. Which of the following must still be completed in order to enable NAT on the Server? (Choose all that apply) A. reassign all internal addresses to a private IP range B. load the NAT protocol C. associate NAT with the local interface D. associate NAT with the Internet interface E. bind a second IP address to the Server's interface and configure one IP address as internal and the other as external
79. Your LAN has 75 internal clients and 25 external clients. Some of the external clients must make secure connections across a VPN. The clients have already been configured to support VPN communications and the internal Windows 2000 Srv has been configured to support that VPN. Which of the following types of encryption and encapsulation does Windows 2000 support? (Choose all that apply) A. MD4 B. RC4 with EAP-TLS C. PGP D. GRE E. L2TP over IPSec
80. Your network security group is discussing a WAN link between a host in Atlanta, GA with IP address 192.168.1.1 and a host in New York, NY with IP address 192.168.1.79. The clients are connected via a T1 line through a telephone carrier. Your group is considering several security options, including PPTP. There seems to be confusion over the types of encryption that a Windows 2000 PPTP connection can support. Which of the following types of encryption are available in Windows 2000 for PPTP connections? A. 40-bit RC4 cipher B. 64-bit RC4 cipher C. 128-bit RC4 cipher D. CIFS E. SMB
81. You are configuring a Windows 2000 Srv with NAT via ICS. The clients on the network are all running Windows 2000 Pro. The network you are working on uses an IP address range of 172.16.0.1 through 172.16.0.254, which were manually assigned. After ICS is installed, none of the internal clients can access the Windows 2000 Srv. Which of the following is the most likely problem? (Choose the best answer) A. a private IP address range must be used. B. the server must be upgraded to a domain controller. C. the DNS proxy services cannot contact the ISP. D. the Windows 2000 Server with NAT is no longer on the same network as the internal clients. E. AUTODHCP has failed.
82. Your organization is using a domain tree with multiple domains. There are a total of five domains in your domain tree. HQCorp was the first domain online and it is the root domain. NCorp was the second domain controller and the first child of HQCorp. The other child domains are SCorp, ECorp, and WCorp. Assuming that no one has changed the default operations master roles, where would you find the schema master and domain naming master? (Choose the best answer) A. On each domain controller. B. HQCorp would be the schema master and NCorp would be the domain naming master. C. HQCorp would be the domain naming master and NCorp would be the schema master. D. HQCorp would be the schema master and each domain controller would be its own domain naming master. E. On HQCorp would perform both the domain naming master and schema operations master roles.
83. The ABC Corporation has implemented three networks using an internal addressing scheme. The headquarters segment uses IP addresses on the 192.168.0.0/24 network and the two remote sites use IP address ranges 192.168.1.0/24 and 192.168.2.0/24 respectively. Each segment has its own domain. The headquarters domain is called HQDom and the remote site domains are called Site1Dom and Site2Dom. Each remote location is connected to the HQDom via 56K WAN connections. Users from Site1Dom and Site2Dom are complaining that they cannot log on and that they are unable to perform network searches for objects. Based on these complaints, which of the following Proposed solutions is appropriate? (Choose the best answer.) A. Add a domain naming master to each of the remote sites B. Add a schema master to each of the remote sites C. Add a RID master to HQDom, Site1Dom, and Site2Dom. D. Create a GCS on each of the remote sites E. Create a PPTP connection between the remote sites and the HQDom
84. The network you are working on uses a private IP address 192.168.1.0 with a 27 bit subnet mask. The Windows 2000 srv you are troubleshooting has two network cards. One is using the IP address of 192.168.1.33, connected to three UNIX systems, and the other is using 192.168.1.65, connected to three Windows 2000 Pro systems. The Windows 2000 system is unable to communicate with two of the UNIX systems to which it connects with the 192.168.1.33 network card. The first UNIX host is using IP address 192.168.1.32 with mask 255.255.255.224 and the second is using IP address 192.168.1.63 with mask 255.255.255.224. Both UNIX hosts are using 192.168.1.33 as their default gateway. Why is the Windows 2000 Srv unable to communicate with these two systems? (Choose the best answer.) A. DNS name resolution is not configured correctly B. the UNIX hosts are using an incorrect subnet mask C. the UNIX hosts are using invalid IP addresses D. the Windows 2000 Server is using an invalid IP address E. the default gateways are set incorrectly
85. Your Windows 2000 domain is operating in mixed mode because you still have some NT 4.0 domains on the network. Explicit one-way trusts have been formed between where the NT 4.0 domains trust the Windows 2000 domains. There are three different subnets between 192.168.5.0, 192.168.6.0, and 192.168.7.0 all using 24-bit subnet masks. A Cisco router connects the three networks and has interfaces of 192.168.5.1, 192.168.6.1, and 192.168.7.1. The Windows 2000 domain controllers occupy the 192.168.5.0 and 192.168.6.0 networks using valid IP ranges within those networks. The NT 4.0 domains are using valid IP addresses within the 192.168.7.0 network - all hosts on that network are using a default gateway of 192.168.7.1. You are trying to share some resources from a Windows 2000 Member Srv that is part of domain5.local domain. The Windows 2000 Server's IP address is 192.168.5.27. The network administrator that is trying to grant access to the NT 4.0 clients says she is unable to find the appropriate accounts. What is the problem? (Choose all that apply) A. the Windows 2000 domain must be configured to trust the NT 4.0 domain B. the NT clients are using the wrong default gateway C. trusts cannot be utilized between Windows 2000 and NT D. trusts cannot traverse different subnets E. the Windows 2000 Srv is using an incorrect IP address
86. A network administration team is installing five new Windows 2000 Srv:s to support users on your network. The existing network uses DHCP to configure client addresses, but all servers must have statically configured addresses according to company policy. Review the network configuration as shown in the table below: Network Router Interface Number of hosts 192.168.1.16/28 192.168.1.17 13 192.168.1.32/28 192.168.1.33 10 192.168.1.48/28 192.168.1.49 13 192.168.1.64/28 192.168.1.65 12 The network administration team decides to install two Windows 2000 Srv:s on 192.168.0.48, which is the most heavily used subnet. The team also decides to add one Windows 2000 Srv on each of the rest of the subnets. The Windows 2000 Srv configurations that the team has agreed upon are as follows:
Based on the implementation plan, which of the following problems will the team encounter? (choose all correct answers) A. incorrect default gateway for spec5.corp.net B. incorrect default gateway for spec4.corp.net C. incorrect IP address on subnet 192.168.1.16 D. incorrect IP address on subnet 192.168.1.32 E. incorrect IP address on subnet 192.168.1.48
87. X Corp has a 2,500 node network with 200 NT 4.0 Wks clients. There are still two NT 4.0 BDCs online to support downlevel clients. The company is using a single domain model with the root domain named xcorp.local. There are five domain controllers supporting the operation. The operations master roles are divided among the servers as follows: Domain Controller
People at the NT 4.0 Wks:s tell you that they are being locked out of their terminals because they couldn't change their passwords successfully before they expired. Which domain controller would you suspect might be offline or inaccessible? (Choose all that apply) A. dc1.xcorp.local B. dc2.xcorp.local C. dc3.xcorp.local D. dc4.xcorp.local E. dc5.xcorp.local
88. You are configuring a NAT server, and you are about to configure the static inbound ports. You have an internal NNTP, SMTP, POP3, and Web server that you want external clients and servers to be able to contact. For which well-known ports must you configure UDP/TCP port and IP address pairs? A. 25 B. 110 C. 119 D. 23 E. 80
89. You have just installed a new DHCP server on a Windows 2000 member server to provide addresses on the network. You notice that clients are not able to lease addresses from the server, even though it has the proper scope configurations for the network. You can ping the DHCP server by IP address and server name from each segment on the network and the routers are RFC 1542 compliant. What is the most likely problem? A. Routers are filtering communications over Port 23 B. WINS records are incorrect C. DNS records are incorrect D. You have not authorized the DHCP server E. The exclusion range has not been set
90. Your network originally had 250 IP hosts with dynamically assigned IP addresses. These clients are using IP addresses from 192.168.1.1 - 192.168.1.254 with subnet mask 255.255.255.0. Recently, another group of systems had to be added to your physical network, but they were to have different IP addresses from 192.168.2.1 through 192.168.2.254. The two logical networks do not need to communicate, but you want to be able to use a single DHCP server to service both sets of clients. How should you configure the DHCP server to handle this configuration? (Choose all that apply) A. create a scope with addresses 192.168.1.0 and another with 192.168.2.0 B. create a superscope with addresses 192.168.1.0 and 192.168.2.0 C. create a multicast scope D. create a scope with addresses 192.168.1.0 and exclude addresses with 192.168.2.0 E. create a scope with address 192.168.0.0 and exclude addresses of 192.168.1.0 and 192.168.2.0
91. You run a network with 1500 clients. On that network there are three UNIX servers running DNS. Your DNS administrators do not want to abandon the DNS servers, but they have agreed to use the DNS servers as a backup to your Windows 2000 DNS server. You have just installed a DHCP server on another Windows 2000 Server, but you haven't configured that system yet. Goals: To integrate the Windows 2000 DNS Server and UNIX DNS servers To allow the DHCP Server to update DNS server To allow Windows 2000 clients to update the DNS server To prevent unauthorized clients from updating the server Proposed Solution: Install DNS on the Windows 2000 Srv. Configure the DNS server with a Standard Primary zone. Enable dynamic updates. Configure the Windows 2000 DNS to send secondary zone updates to the UNIX DNS servers. Which of the following will be provided by the proposed solution? A. To integrate the Windowsdows 2000 DNS Server and UNIX DNS servers B. To allow the DHCP Server to update DNS server C. To allow Windows 2000 clients to update the DNS server D. To prevent unauthorized clients from updating the server
92. You are enabling an internal Web site for users to visit. You are using HTTP because all systems have Web browsers, but not all can use NetBIOS share syntax. You want to make it possible for clients to see your files and folders for shares on which you don't have a default document. Which of the following types of access must you enable to allow this? (Choose all that apply) A. Script source access B. Write C. Directory browsing D. Read E. Execute
93. You are running a mixed network of Windows 2000 and NT systems. The NT PDC has been replaced with a Windows 2000 domain controller and all of the necessary trust relationships have been configured. However, your clients do not support dynamic update, so you have installed a DHCP server to provide updates on behalf of your legacy clients. You are currently using a Standard Primary DNS domain with dynamic updates enabled. You want to enable Secure Dynamic Updates to increase security, but still allow your legacy clients to register their resource records in DNS. Which of the following tasks must you complete to ensure that your clients will be able to register their names and you will be able to enable secure dynamic updates? (Choose all that apply) A. Upgrade all of your clients to Windows 2000 B. Authorize your DHCP server C. Change your zone to Active Directory integrated D. Create a standard secondary zone E. Enable Updates for DNS Clients that Do Not Support Dynamic Updates on the DHCP server
94. You have a number of users who log on to the company’s Windows 2000-based network from their homes. They report that, even with 56 Kbps modems, it is very slow to log on to the system. What should you do to help improve the logon process? A. Set up a special database on the server with their home phone number and modem speed, so it does not have to search for the information. B. Set up PPTP on their computers to increase initial throughput. C. Configure their computers to use the server-stored versions of their user profiles, rather than using the locally-stored copy of the profiles. D. Configure their computers to use the locally-stored copies of their profiles, rather than getting them from the server.
95. You have added RAM to a member server. The member server is at a remote location. You want to know if the file system cache is tuned optimally after adding this new memory. What should you do? A. Monitor the Memory: System Cache Resident Bytes and adjust the Server Optimization setting on the member server if too much memory is being used for file sharing. B. Archive the Event Viewer logs on the member server and analyze the compiled System information for all Warnings. Manually set the paging file size based on the log results. C. Set the Performance Logs and Alerts on the member server to record Logical Disk: % Free Space and Logical Disk: % Disk Time counter values. Adjust the Server Optimization setting based on your results. D. Set the Performance Logs and Alerts counters on the member server to record Paging File: % Usage and Paging File: Usage Peak. Manually set the paging file size based on the log results.
96. You have already created an unattended answer file using Setup Manager with ten computers named. Before you begin the installations, you are asked if you can include three more computers. What will be required for you to include more computers in the unattended installation over the network? A. Edit the winnt.sif file with Notepad. B. Edit the unattend.bat file with Notepad. C. Edit the unattend.udf file with Notepad. D. Edit the unattend.txt file with Notepad.
97. You have been editing the registry with Regedt32, and now you are unable to get the server to boot up. What should you try first for a quick system restoration? A. Power on the computer, hit the F8 key and select Last Known Good Configuration. B. Power on the computer and hit the F8 key to access Safe Mode. C. Use your Emergency Repair Disk (ERD) to boot and restore core system files. D. In Recovery Console, set the path to the floppy drive where you have a backup of the core system files. Use the copy command to restore the files to the hard drive.
98. You have decided to use a vendor-supplied hardware driver that is not digitally signed. You are preparing for unattended server installations. How do you prepare for using non-signed drivers in an unattended session to avoid interactive warnings? A. Flag this specific driver in the Txtsetup.oem specified in the [OEMBootFiles] section of the answer file. B. In the [Unattended] section of the answer file, add DriverSigningPolicy = Ignore. C. On the installation source server, on the System Properties Hardware tab, click the Driver Signing button and choose the Ignore radio button. After the unattended installations are complete, return the setting to the default. D. In the driver subdirectory of the distribution folder, modify this vendor-supplied driver's .inf file where it references the catalog file.
99. You have four different distribution shares on your network for Windows 2000 server installations. A new service pack was just announced. What should you do to make the service pack available for future installations? A. Copy the layout.inf, dosnet.inf and txtsetup.sif files to each distribution share. B. Copy the service pack's driver.cab to the distribution share, as well as layout.inf, dosnet.inf, and txtsetup.sif. C. Use sysdiff /diff to apply the service pack to each share. D. Use update /slip to apply the service pack to each share.
100. You have six physical disks, disks 0-5, attached to a computer running Windows 2000 Server: Disk 0 contains drive C:, which has the Windows 2000 system files. Disk 1 contains drive D:, which has the Windows 2000 boot files. Disks 2-5 comprise a stripe set with parity. For best performance, where should you place the page file? A. Place the page file on drive D. B. Place the page file on drive C. C. Place the page file on the stripe set with parity. D. Create a page file on both the stripe set with parity and on drive C.
101. You have upgraded your NT 4.0 primary domain controller (PDC) to Windows 2000 Advanced Server. You want the security to be equivalent to the other domain controllers (DCs) in your network, which will get clean installations. What must you do? A. Evaluate the templates provided, based on the level of security your network needs, modify your selection as needed and import it into the Group Policy Object (GPO) linked to the DC organizational unit (OU). B. Using the Group Policy snap-in modify the default domain policy and apply it at domain level. C. Offline, modify a security template from the \%SystemRoot%\Security\Templates folder to match your network security requirements. Apply the template to each Windows 2000 DC in your network. D. Import the basic configuration template to the Security Settings area of the Computer Configuration offline. Next, prepare the settings you require for your network in a new template and then apply that template to all your network Windows 2000 DCs.
102. You implement a hardware RAID-5 solution using SCSI disk drives. One of the disk drives fails. When you replace the failed drive, the system cannot locate the new disk drive, even though it is the same make and model as the others in the RAID configuration. The system is able to locate the other disk drives in the RAID-5 set. What is the most likely reason that the system cannot locate the new drive? A. The SCSI disk drive is not a Plug and Play device. B. The SCSI ID of the drive conflicts with the SCSI ID of another device. C. The SCSI cable length exceeds the maximum supported length. D. The SCSI bus is not terminated properly.
103. You implement Internet Printing on a computer running Windows 2000 Server. When a user attempts to connect to a printer using Internet Explorer 4.0, what protocol will the client computer use first? A. Hypertext Transport Protocol (HTTP) B. Internet Printing Protocol (IPP) C. Server Message Block (SMB) D. Remote Procedure Call (RPC)
104. You install a new application on a computer running Terminal Services in Application Server Mode. Users of this application must have access to files stored on a computer running NetWare 4.11. TCP/IP is not installed on the computer running NetWare. What steps should you take to enable Terminal Services clients to access the computer running NetWare? A. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.3. B. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.2. C. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.2. D. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3.
105. You install File Services for Macintosh on a computer running Windows 2000 Server. The computer is a member of a Windows 2000 domain. Which node in Local Security Policy should you use to configure clear-text password authentication for Macintosh clients who access this server using remote access? A. Security Options B. Lockout Policy C. User Rights Assignments D. Account Policies
106. You install IIS 5.0 on a computer running Windows 2000 Server. You create two new departmental Web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales Web site while a developer updates the content of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive? A. The user will be redirected to the Default Web site home page. B. The user will receive a 404 - File Not Found error message. C. The user will receive a 403.2 - Read Access Forbidden error message. D. The user will be redirected to an alternate default page for the Sales site’s home directory.
107. You install IIS 5.0 on a computer that is running Windows 2000 Server. The computer is a member of your Active Directory domain. You plan to use the IIS online help to learn more about managing a Web server. What step must you take on the computer running IIS to enable you to use the search feature of online help? A. Install Index Server 2.0. B. Start the indexing service. C. Publish the folder that contains the IIS help files in Active Directory. D. Designate a partition or volume formatted with NTFS for the catalog file.
108. You install Windows 2000 Server and IIS on a computer. You want to enable users to access the Default Web Site on this server using any common Web browser. You want to limit access to three of the virtual directories on the site to employees of your enterprise. What authentication method should you configure for these virtual directories? A. Basic Authentication B. Integrated Windows Authentication C. Digest Authentication D. Anonymous Authentication
109. You install Windows 2000 Server on a computer and make the computer a member of a Windows 2000 domain. Only users whose accounts are members of the local Administrators group of this computer are allowed to log on interactively. Each of four administrators logs on with an individual administrative account that is defined in Active Directory. These four users do not have administrative access to any other computers in the domain. You create a global group that contains only the user accounts for these administrators. You make the global group a member of this computer’s Administrators group and remove Domain Admins from the Administrators group. You install three custom applications on this computer. You would like to configure a desktop for the computer that contains shortcuts for these applications. You want all administrators of this computer to have the application shortcuts on their desktop the first time they log on interactively. You also want each administrator to be able to customize his desktop. You log on to this computer with your administrative account and configure the desktop with shortcuts for the system management applications. What step should you take to make these shortcuts available to all administrators with the least amount of administrative effort? A. For each administrator, copy your profile to the folder %systemdrive%\Documents and Settings\, where is the user’s account name. B. Define the path to your profile in the Profile tab of the Properties of each administrator’s user account in Active Directory. C. Copy the profile for your account to the Default User profile. D. Copy the profile for your account to the profile for the Administrators group.
110. You install Windows 2000 Server on a computer. The computer has five disk drives, all configured as dynamic disks. You install the systemroot folder in a volume on one disk drive. You configure two pagefiles - one on the volume with the systemroot folder to use for system recovery and another on a volume on the second disk drive. You install a scanner on the computer. How should you configure the remaining three disk drives to provide maximum performance for scanning images? A. Create a spanned volume using all three disk drives. B. Create a striped volume using all three disk drives. C. Create a RAID-5 volume using all three disk drives. D. Mirror the volume containing the %systemroot% folder on one of the disk drives. Create a spanned volume using the other two disk drives.
111. You install Windows 2000 Server on a computer. TCP/IP is the only networking protocol installed on the computer. The computer is configured as a DHCP client. When you restart the computer, you receive the message "One or more services failed to start." You log in and use Event Viewer to look at the system log. You notice that none of your network services started. What is the most likely reason these services did not start? A. The network services are not configured to start automatically. B. The network adapter card settings conflict with the settings for another device. C. The computer could not contact a DHCP server. D. The network cable is unplugged.
112. You install WINS on a computer running Windows 2000 Server. You then install Windows 2000 Professional on a client computer and configure that computer as a WINS client. However, you unintentionally assign a computer name to this client that is the same as an existing computer on a different subnet. The existing computer is also a WINS client. What is the first step the WINS server takes when the new computer attempts to register with the WINS server? A. It rejects the request from the new client. B. It sends a name query request to the computer that has the name registered. C. It contacts its replication partners to verify if the computer that currently has the name registered is one of their clients. D. It directs the client to register its name with the secondary WINS server.
113. You manage a computer running Windows 2000 Server and Exchange Server 5.5. You want to optimize the performance of the server. Which setting should you enable for the File and Printer Sharing for Microsoft Networks in the properties of the local area connection of the computer? A. Minimize memory used B. Balance C. Maximize data throughput for file sharing D. Maximize data throughput for network applications
114. You manage a computer running Windows 2000 Server for your department. Both application data and the home folders of the users in the department are stored on this server. You implement a backup scheme for this computer. For each backup, the option Back Up Everything on My Computer is selected. Each Sunday evening, a normal backup is done. On Monday through Friday, a differential backup is done. Each Wednesday, a copy backup is done after the differential backup. The disk drive on which the home folders are stored is damaged one Thursday morning. You replace that disk drive. What step or steps should you take to restore the home folders in the shortest amount of time possible? A. Restore the tape from the normal backup. Then, restore the tape from the copy backup that was done on Wednesday. B. Restore the tape from the differential backup that was done on Wednesday. C. Restore the tape from the normal backup. Then, restore the tape from the differential backup that was done on Wednesday. D. Restore the tape from the copy backup that was done on Wednesday.
115. You manage a computer running Windows 2000 Server on which the IIS is installed. This is a stand-alone server. You need to manage access to content of four virtual directories on this server. What utility should you use to create the accounts and local groups needed to control access? A. Internet Information Services Snap-In B. Users and Passwords in Control Panel C. Local Users and Computers in Computer Management D. Local Security Policy in Administrative Tools
116. You manage a computer running Windows 2000 Server on which the IIS is installed. This is a stand-alone server. You plan to use Security Templates to secure the computer. Which two policies cannot be configured using Security Templates? (Choose all that apply) A. IP Security Policies B. Registry C. File System D. Public Key Policies E. System Services F. Account Policies
117. You manage a computer running Windows 2000 Server that hosts web services, a database, and email services for your enterprise. You want to ensure that the web services do not use a disproportionate amount of network resources for the computer. What feature of Internet Information Services (IIS) 5.0 should you use to ensure that network resources are available for the database and email services running on this computer? A. Out-of-process Pooling B. Process Throttling C. Bandwidth Throttling D. Socket Pooling
118. You manage a computer running Windows 2000 Server that is configured as a print server. You need to give clients running UNIX the ability to use a network-interface print device that is managed by your server. What type of port should you configure on the server for these clients? A. Standard TCP/IP Port B. Line Printer Remote Port C. Lanman Print Services Port D. Local Port
119. You manage a computer running Windows 2000 Server that is located at a branch office of your enterprise. The server is being used for a critical project, so you want to be able to manage it both from the computer in your office and from a computer at home. You also want another network administrator to be able to manage the server both from the office and from home. You install Terminal Services in Remote Administration mode on the server. You install the Terminal Services client on the two computers that you use and on the two computers that your fellow network administrator uses. All of these computers are running Windows 98. How many Terminal Services client access licenses must you configure to support this environment? A. No licenses are needed. B. Four licenses - one license for each administrative computer. C. Two licenses - one license for each administrative user account. D. One license for the computer running Terminal Services.
120. You manage a computer running Windows 2000 Server. You install Gateway Service for NetWare on the computer and configure a gateway to a NetWare server. You want the Client for Microsoft Networks to use TCP/IP by default but to also use NWLink to access applications on the NetWare server. What step enables you to modify the bindings of the server's network adapter card to use TCP/IP first and NWLink second when using the Client for Microsoft Networks? A. From Device Manager, access the properties of the network adapter card. B. From Services in Computer Management, access the properties of the Workstation service. C. From Network Connections in the Control Panel, access the properties of the Local Area Connection. D. From Network Connections in the Control Panel, select Advanced Settings from the Advanced menu.
121. You manage a Windows 2000 domain. The two domain controllers (DCs) for the domain are installed at the main office of your enterprise. One of the DCs is also a DNS server. You install Windows 2000 Server on a computer at the main office. When prompted to configure network settings, you choose Custom and manually configure an IP address. After completing the installation and installing software applications, you reconfigure the LAN connection’s TCP/IP properties to obtain an IP address automatically. You plan to install the computer at a branch office that is on a different subnet than the computers at the main office. The DHCP server at the branch office is configured with a scope that assigns an IP address, subnet mask, default gateway, and DNS server address with each lease. The DHCP server and the computer on which you install Windows 2000 Server both belong to the Windows 2000 domain. The DHCP server is authorized in Active Directory. When you start the computer running Windows 2000 server at the branch office and try to log on, you receive an error message that a DC cannot be located. What step should you take to insure that the server can locate a DC? A. Configure a computer at the branch office as a DHCP relay agent. B. Disable Automatic IP Addressing (APIPA) on that computer. C. Convert the DNS zone for your domain to an Active Directory-Integrated zone. D. In the TCP/IP properties of the Local Area Connection of the server, disable the option Use the following DNS server addresses.
122. You manage a computer running Windows 2000 Server. You create a folder named DATA on a volume that is formatted as FAT32. You set these share permissions: The user account Tom is assigned the Read permission. The local group DataUpdate is assigned the Change permission. The local group DataManage is assigned the Full Control permission. The local group DataLimited is denied the Full Control permission. The user account Tom is assigned to the global group Acct. Acct is a member of DataUpdate and DataManage. The user account Tom is also assigned to the global group Clerks. Clerks is a member of DataLimited. What is Tom’s effective permission for the folder DATA when he accesses it from his computer running Windows 2000 Professional? A. No access B. Read C. Full Control D. Change
123. You manage a computer running Windows 2000 Server. After installing Windows 2000 Server, you run the command winnt32 /cmdcons. Later, the master boot record on this computer is corrupted. What procedure can you use to repair the master boot record when you restart the system? A. Select the recovery console option from the startup menu. B. Start the computer from the Windows 2000 Server CD-ROM and choose the repair option. C. Press F8 to select the Advanced Startup Options. Select Safe Mode. D. Press F8 to select the Advanced Startup Options. Select Last Known Good Configuration.
124. You manage a computer running Windows NT Server 4.0 that is a file and print server. Your system and boot partitions are mirrored using Windows NT disk mirroring, and the system is protected by an Uninterruptible Power Supply (UPS). Both partitions are formatted with FAT. The system partition is 300 MB, and the boot partition is 1500 MB. The system has 128 MB of RAM. You perform a full backup of the system. Rather than upgrading the system from Windows NT, you plan to do a fresh installation of Windows 2000 Server. What steps should you take before you start the installation on this computer? (Choose all that apply) A. Convert the boot partition to NTFS. B. Disable the mirror. C. Extend the boot partition to 2000 MB. D. Increase the RAM to 256 MB. E. Disconnect the UPS device.
125. You manage a computer running Windows 2000 Server. The server has two disk drives, both configured as dynamic disks. Disk 0 contains one partition, drive C, the system and boot partition. Drive C is mirrored to Disk 1. When you start Disk Management, you notice that the status of Drive C is listed as Failed Redundancy (At Risk). The status of Disk 1 is Missing. What steps should you take to replace the failed member of the mirrored volume with a new disk? A. Use the Remove Mirror option from the context menu of Drive C on Disk 0 in Disk Management. Replace Disk 1 with another disk drive. Convert the new Disk 1 to a dynamic disk. Use the Add Mirror option from the context menu of Drive C in Disk Management. B. Remove Disk 1. Use the Repair Volume option from the context menu of Drive C in Disk Management. Replace Disk 1 with another disk drive. Use the Add Mirror option from the context menu of Drive C in Disk Management. C. Use the Break Mirror option from the context menu of Drive C on Disk 0 in Disk Management. Replace Disk 1 with another disk drive. Start the system in safe mode. Use the Resynchronize Mirror option from the context menu of Drive C in Disk Management. D. Remove Disk 1. Use the Repair Volume option from the context menu of Drive C in Disk Management. Replace Disk 1 with another disk drive. Use the Resynchronize Mirror option from the context menu of Drive C in Disk Management.
126. You manage a Windows 2000 domain. You want to ensure that the clocks on all computers in the domain are synchronized. In which node of the Security Settings Snap-In can you configure this option? A. Account Policies\Account Lockout Policy B. Account Policies\Kerberos Policy C. Account Policies\Password Policy D. Local Policy\Security Options
127. You manage a computer running Windows 2000 Server. You create a file in a folder on an NTFS partition of the computer. You configure the following NTFS permissions for the file: Authenticated Users - Read & Execute, Read Accounting - Full Control Jack - Deny Write Accounting is a local group. Jack is a member of the group Accounting. What is Jack’s effective permission(s) for the file? A. Full Control. B. Read & Execute, Read. C. No access. D. Cannot be determined - it depends on the parent folder permissions.
128. You manage a Windows 2000 domain. The DNS service is installed on two computers running Windows 2000 Server, a domain controller (DCA) and a member server (MS). DCA is a primary name server. MS is a secondary name server. You convert the forward lookup zone and reverse lookup zone to Active Directory-integrated zones. Which computers can respond to DNS queries from clients? A. Only the domain controller DCA. B. The domain controller DCA and the member server MS. C. Only the domain controllers for the domain. D. All domain controllers for the domain and the member server MS.
129. You manage a Windows 2000 domain that includes 50 client computers running Windows NT Workstation 4.0. You have a system policy that manages the desktops of users on these computers. Your enterprise recently implemented Exchange Server 5.5, and you are planning the rollout of Outlook 2000 to the client machines. You want to manage the Outlook 2000 configuration settings from your system policy. What steps can you take to configure the settings for Outlook 2000 in the system policy? A. In System Policy Editor, add the .adm file that is delivered with Outlook 2000 to the list of templates. Open a new system policy. Import the existing system policy. Configure the settings for Outlook 2000. Save the new system policy as ntconfig.pol, and overwrite the existing policy. B. In System Policy Editor, add the .adm file that is delivered with Outlook 2000 to the list of templates. Open the existing system policy. Configure the settings for Outlook 2000. Save the system policy. C. Open a new system policy in System Policy Editor. Import the .adm file that is delivered with Outlook 2000. Configure the settings for Outlook 2000. Save the new system policy as ntconfig.pol, and overwrite the existing policy. D. Open the existing system policy in System Policy Editor. Import the .adm file that is delivered with Outlook 2000. Configure the settings for Outlook 2000. Save the system policy.
130. You manage three domain controllers (DCs) for a Windows 2000 domain. The copy of Active Directory on one DC becomes corrupt. You start the computer in Directory Service Restore Mode. In addition to the Active Directory, what other information can you restore only when in this mode? A. Registry Files B. System Boot Files C. Sysvol Directory Files D. Certificate Services Database
|