Windows 2000 Server


1. Which of the following automated install methods will allow an upgrade installation of Windows 2000 server?

A. Syspart
B. Sysprep
C. SMS
D. Bootable CD

>> !
Answer: C


2. When setting up your distribution server, you must create a subfolder that contains new or updated files for installing mass storage device drivers and hardware abstraction layers (HALs). This subfolder should be named:

A. \I386\$OEM$\Textmode
B. \I386\$OEM$\$$
C. \I386\$OEM$\$1
D. \I386\$OEM$\$1\Sysprep

>> !
Answer: A


3. You would like to automate the installation of your new network of 300 clients. One of the members of your network administration team has suggested you use RIS. You have decided to research the requirements for installing the clients via RIS. Your colleague tells you that all of your clients are remote boot capable and PXE compliant. He also tells you that all the existing servers on the network are DDNS capable. Which of the following must you confirm are available on the network before the RIS installations can proceed? (Choose all that apply)

A. DHCP
B. WINS
C. Active Directory
D. RIS Server
E. NAT Server

>> !
Answer: A, C & D


4. You are discussing RIS installations with a group of colleagues. They are unsure how RIS actually works. One of your colleagues has outlined the events that are part of the installation process, but his order is a little off. Place the events that are listed below in their correct order.

1. DNS is used to locate a domain controller
2. the bootstrap image copies all installation files to the local drive
3. the client locates a RIS server with an LDAP call
4. DHCP is used to assign an IP and DNS configuration information
5. an installation script is used to perform an unattended installation
6. the remote boot protocol is used to connect to the RIS service
7. the client locates a DNS

A. 4, 7, 6, 2, 5, 3, 1
B. 4, 7, 1, 3, 6, 2, 5
C. 4, 6, 2, 5, 3, 7, 1
D. 4, 7, 3, 6, 2, 5, 1
E. 3, 4, 7, 1, 6, 2, 5

>> !
Answer: B


5. You are the administrator of a 1200-node network. Recently, your department was increased by 300 people. Over the weekend, you wired the user stations and placed the new systems in each user's cubicle. Today, you want to install 300 systems using an unattended answer file and shared distribution folder.

Goals:
Configure an automated setup file that can be run on client systems.
Create a distribution share for Windows 2000 installation.
Use the automated setup file to install your systems.
Automate application installation after Windows 2000 installation over the network.

Proposed Solution:
You create an unattended answer file with Setup Manager. You copy the Windows 2000 installation files to a central server and share the folder to which those files were copied. You copy the unattended answer file to the central share. Then, you use SysPrep on the client systems to download your installation and automate application installation.

Which goals are achieved by this proposed solution? (Choose all that apply)

A. Configure an automated setup file that can be run on client.
B. Create a distribution share for Windows 2000 installation.
C. Use the automated setup file to install your systems.
D. Automate application installation after Windows 2000 installation over the network.

>> !
Answer: A & B


6. YCorp has hired you as a consultant to help install 300 Windows 2000 Srv:s on their 25,000 node network. The company has already hired a team study the network and an installation task list has been created. The distribution and placements of the servers has already been decided as shown in the table below:

Location Number of servers OS types Number of clients
Koh Samui 2 Windows NT 30 Workstation 4.0
Penang 2 Windows NT 30 Server 4.0
Narita 100 Mix of Windows NT 10000 4.0 Server and Windows NT 3.51

Server Songtan 45 Mix of Windows NT 2440 4.0 Workstation and Windows NT 4.0 Server
Mallersdorf 25 Windows 98 and 1800 Windows 95
Utrecht 100 Windows NT 4.0 10000
Server Flagstaff 26 Mix of Windows NT 700 4.0 Server and Windows 98

Which of the following operating systems will be able to upgrade instead of requiring a fresh installation?

A. Windows 95
B. Windows 98
C. Windows NT 4.0 Workstation
D. Windows NT 4.0 Server
E. Windows NT 3.51 Server

>> !
Answer: D & E


7. JCorp has hired your network consulting team to upgrade 300 NT Server 4.0 systems to Windows 2000 Server. You have been tasked with identifying potential problems with the installation. Your first mission was to collect data about the hardware configurations of the 300 systems that the company has ordered. You sent three members of your team out to five different rooms to gather that information. From the information your team collected, you produced the table below:

Location Number of Systems Hardware Configuration
Room 157: 15 Pentium 150MHz 16MB of RAM 700MB of free disk space
Room 157: 75 Pentium 100MHz 32MB of RAM 1.5GB of free disk space
Room 143: 90 Pentium 60MHz 96MB of RAM 200MB of free disk space
Room 169: 20 Pentium 166MHz 256MB of RAM 3GB of free hard disk space
Room 112: 50 Pentium 333MHz 1GB of RAM 1TB of free disk space
Room 113: 40 Pentium 1.5GHz 2GB of RAM 1.5TB of free disk space
Room 192: 10 Pentium 333MHz 1GB of RAM 500MB of free disk space

Which rooms have systems that will require hardware upgrades before Windows 2000 Server can be installed?

A. Room 157
B. Room 143
C. Room 169
D. Room 112
E. Room 192

>> !
Answer: A, B & E


8. You have been asked to upgrade 7,500 systems for GlobalXOrg, a company with 250 offices worldwide. You are briefing a group of system engineers about performing upgrades in the various locations. You have advised them that they should check the hardware compatibility list before attempting to upgrade mission critical servers. However, you want to give them a quick way to check the hardware compatibility using the Windows 2000 Server CD-ROM via the WINNT.EXE file. Of the switches listed below, which one is a valid WINNT32.EXE switch for checking the hardware of the system you are going to upgrade?

A. /checkupgradeonly
B. /systemcheck
C. /drivescan
D. /bootcheck
E. /hardwaretest

>> !
Answer: A


9. You work for a large computer vendor that needs to pre-configure laptops with Windows 2000 installations, including application packages. You have 7,000 identical systems to configure and ship by the end of the week. You know that it wouldn't be possible for you to set up and install each of these systems manually. You have the tools for drive duplication, but you want the users to have to enter their own personal information when they boot their computers the first time.

Goals:
Configure your master computer. Use SysPrep on the master system. Automate Windows 2000 and related application installation. Duplicate the master computer's hard disk. Configure a system that will ask for basic user settings when booted.

Proposed Solution:
You plan to take the first of 7,000 computers and install Windows 2000 via the CD-ROM drive. Then, you will install all of the custom applications that you require. You will use Setup Manager to create a sysprep.inf file and save that file under C:\sysprep. Then, you will run SysPrep on the system.

Which of the following are accomplished by the proposed solution? (Choose all that apply)

A. Configure your master computer
B. Use SysPrep to configure a master system
C. Automate Windows 2000 and related application installation on the 7,000 systems
D. Duplicate the master computer's hard disk
E. Configure a system that will ask for basic user settings when booted

>> !
Answer: A, B & E


10. Which command allows you to use the /syspart switch for installing Windows 2000 Server?

A. winnt
B. winnt32
C. setup
D. net run

>> !
Answer: B


11. Which of the following operating systems cannot be directly upgraded to Windows 2000 Server?

A. Windows NT 3.51 Server
B. Windows NT 4.0 Server
C. Windows NT 3.5 Server
D. Novell 4.12 Server

>> !
Answer: C & D


12. Windows 2000 Datacenter Server supports multiple processors. Up to how many processors will it support?

A. 2
B. 4
C. 8
D. 16
E. 32

>> !
Answer: E


13. Which version of Windows 2000 includes Windows Clustering and load balancing? (Choose all that apply)

A. Windows 2000 Professional
B. Windows 2000 Server
C. Windows 2000 Advanced Server
D. Windows 2000 Datacenter Server

>> !
Answer: C & D


14. To create the setup disks for installing Windows 2000, which command is used?

A. Winnt /b
B. Winnt32 /b
C. Makeboot
D. Sys /a:
E. Setup /b

>> !
Answer: C


15. How do you install Recovery Console on a computer that has a mirrored volume?

A. Using Control Panel, Add/Remove Programs, add Recovery Console to the first part of the mirror. The information will be copied to the mirror.
B. Using Control Panel, Add/Remove Programs, add Recovery Console to both partitions where the mirror exists.
C. Break the mirror, then install the Recovery Console using x:\I386\winnt32.exe /cmdcons. After the Recovery Console is installed, you can re-establish the mirrored volume.
D. Do it as part of the preinstallation package.

>> !
Answer: C


16. How do you add the Recovery Console to existing installations of Windows 2000?

A. Control Panel, Add/Remove Programs
B. Control Panel, Administrative Tools
C. Start, Run x:I386\Winnt32.exe /cmdcons
D. Command Prompt, reccons -x

>> !
Answer: C


17. Examine the following information: CN=George Doe, CN=Users, DC=international, DC=msft This is an example of:

A. A distinguished name
B. A relative distinguished name
C. A user principal name
D. A GUID

>> !
Answer: A


18. You are the administrator of an OU with an FQDN of acct.branch1.corpx.com. You know that corporate policy is to limit roaming user profile sizes to 30 MB. However, you have recently noticed that user profile sizes are exceeding 30 MB even though account settings are mapping them to a server in your OU. You have checked your GPO and your limit user profiles setting is not configured, so that the corporate settings are flowing through. You have called the administrator of corpx.com and he tells you that the user profile limit is still in place, but that "no override" is not set for the policy. What is the most likely problem?

A. user profiles are not shared
B. the server isn't using an NTFS partition
C. block policy inheritance is configured at corpx.com
D. roaming user profiles are not enabled

>> !
Answer: C


19. Which of the following is NOT a command you can use with Recovery Console?

A. Copy
B. Disable
C. Fixmbr
D. Edit

>> !
Answer: D


20. When installing Windows 2000 Advanced Server, which of the following are optional components that can be chosen during the installation process? (Choose all that apply)

A. Certificate Services
B. IIS
C. Remote Storage
D. Terminal Services
E. Script Debugger

>> !
Answer: A, B, C, D & E


21. Windows 2000 introduces a new Windows installer package. This package is called:

A. Setup.exe
B. .msi
C. .ins
D. .win

>> !
Answer: B

Windows Installer introduces a new installer package which replaces the setup.exe file with a file called .msi.


22. Which of the advanced startup options will not work on a Windows 2000 Domain Controller?

A. Restore Mode
B. Enable Boot Logging
C. Safe Mode with Networking
D. Debugging Mode

>> !
Answer: C


23. To use the Recovery Console, you must know the password for the local Administrator account, for which you will be prompted on execution. Once the logon has been verified, what do you have access to on the hard disk?

A. All files and folders that the local administrator would have access to.
B. The entire system, registry, administrative settings and disk information.
C. %SystemRoot%, %Windir%, %SystemRoot%\Cmdcons and its subfold
D. %SystemRoot%\Cmdcons and its subfolders.

>> !
Answer: C


24. You need to repair a Windows 2000 installation. Which processes can you use to do this?

A. Emergency Repair Process
B. Recovery Console
C. Emergency Console
D. Repair and Replace Process

>> !
Answer: A & B


25. In order to share folders on a system in a Windows 2000 domain, you must be a member of one of the following groups: (Choose all that apply)

A. Administrators
B. Power Users
C. Server Operators
D. File Systems Operators

>> !
Answer: A & C


26. When configuring applications for terminal services, when do you use the "change user" command?

A. When a single-user application is going to be used in conjunction with terminal services.
B. When installing the application uses another method than a setup program.
C. When the user-specific registry settings are not being propagated as needed.
D. When a single-user application has to be used in a multi-user environment.

>> !
Answer: B


27. What is an application compatibility script used for?

A. To configure a single-user application to run in multi-user mode.
B. To make an application that normally would not run on Windows 2000 run with Windows 2000 Terminal Services.
C. To modify an application to function better in a multi-user environment.
D. To test the compatibility of an application in a terminal services environment.

>> !
Answer: C


28. Which of the following statements are true regarding applications in a Terminal Services environment?

A. Applications that do not run on Windows 2000 will not run in a multi-user environment on Terminal server.
B. Windows-based 32-bit applications run more efficiently than 16-bit applications.
C. Applications that normally would not run on Windows 2000 may be configured to run on Terminal server.
D. 16-bit applications can reduce the number of users supported by as much as 40%.

>> !
Answer: A, B & D


29. Which of the following single master operations roles are forest-wide? (Choose all that apply)

A. Schema master
B. Domain naming master
C. RID master
D. PDC emulator
E. Infrastructure master

>> !
Answer: A & B


30. You wish to add a printer that uses the TCP/IP protocol. Using the Add Printer Wizard, what do you do to create this printer?

A. Add Port, LPR Port
B. Add Port, Standard TCP/IP Port
C. Create New Port, LPR Port
D. Create New Port, Standard TCP/IP Port

>> !
Answer: D


31. To control settings for all documents on a printer, a user must have which permission?

A. Print
B. Manage Documents
C. Manage Printers
D. Full Control

>> !
Answer: B


32. To share a printer, a user must have which permission?

A. Print
B. Manage Documents
C. Manage Printers
D. Full Control

>> !
Answer: C


33. One of your Windows 2000 Srv:s hard drives has crashed. The crash didn't affect the system files, but the server - appsrv1.domx.com - was hosting several shared applications for your network. There is another Windows 2000 Srv named filesrv2.domx.com on the network that is being used as an application server and also as a file storage location for users in your graphics design dept. The graphics design users had file storage limits of 500MB each and all other users were limited to 2MB because they were expected to store their files on appsrv1.domx.com. You decide to move the graphics design files from the D drive to the C drive of filesrv2.domx.com. You then move the hard disk with partition D from filesrv2.domx.com to appsrv1.domx.com. Finally, you replace the D drive in filesrv2.com with a smaller drive that still has ample room for the graphics design users. Soon you find that many users cannot save files on appsrv1.domx .com and the graphics design users are exceeding their space limits. What happened? (Choose all that apply)

A. the disk quotas stored in the registry became corrupted
B. the disk quotas stored on the file system moved with the hard disks
C. in moving the hard drive from one system to the other the system became the owner of all files
D. the new volume installed in filesrv2.domx.com is not limited by the quotas set on the previous hard drive
E. disk quotas do not apply on application servers

>> !
Answer: A & E


34. Your Windows 2000 Server is configured as follows:

Processor Intel Pentium II 350 MHz
Disk 0 1 partition FAT32 file system
Disk 1 1 partition FAT16 file system
Paging file Initial size 128 MB Located on Disk 0 Maximum size 256 MB
NIC 3 COM 10/100 Ethernet

A new corporate policy has dictated that all systems have file encryption and user level security enabled. You want to lose as little data as possible in making this conversion. Which of the following must be completed on your system to meet the requirement?

A. Disk 0 must be converted to NTFS
B. Disk 0 must be reformatted to NTFS
C. Disk 1 must be converted to FAT32
D. Disk 1 must be reformatted to NTFS
E. Disk 1 must be converted to NTFS

>> !
Answer: A


35. You are running a consulting service for a large multinational bank. The bank has real-time bit-by-bit backup systems for mission-critical information. You are running configuring a small group of Web servers for online banking information for customers. The company wants you to configure systems that respond to customer queries quickly, but also have a level of fault tolerance to protect data locally - even though the data is also backed up. You want to provide both fault tolerance and rapid disk read access for your network clients, which of the following is the best option?

A. RAID 5
B. Mirroring
C. Duplexing
D. Striping
E. duplication

>> !
Answer: D


36. You are installing a new modem in your Windows 2000 Srv to support dial-in clients. Before you install the modem you read that it is set to use COM3. You review your system settings and you see that COM1 and COM2 are already in use. Which of the following default IRQ settings is the default for COM3, but is already in use? (Choose all that apply)

A. IRQ 1
B. IRQ 2
C. IRQ 3
D. IRQ 4
E. IRQ 5

>> !
Answer: B & E


37. You have configured 75 Windows 2000 Srv:s in the last two weeks. Each Windows 2000 Srv has a fault tolerant implementation of the system and boot partitions via disk mirroring through the operating system. The disk mirror is between Disk0 and Disk1 on each server. Disk0 is the primary active partition and contains the original installation of the operating system. Just as you finished the 75th server, you receive a report that the first server you installed has a failed drive. The administrator of that system has called to say he didn't notice the problem until he tried to restart the system. He received the error message upon reboot. Assuming that Disk1 is still operational, what will you require in order to recover the failed disk mirror?

A. the Windows 2000 Server CD-ROM
B. a new hard disk similar to the one that failed
C. tape backups
D. two new hard disks to replace the failed mirror
E. a fault tolerance boot disk

>> !
Answer: B


38. You installed two Web servers for a company that provides pay-for-content Web services. The company wanted to ensure that each server had fault tolerance in the event that a hard disk failed on the system. They installed five hard disks on each computer, and you configured a disk mirror on Disk0 and Disk1, then you created a stripe set with parity using the remaining three hard disks (Disk2, Disk3, and Disk4). Several months after installing these systems you receive a call that one of the hard disks has failed on Web_1, which was the first Web server you installed. The Web developer who reports the problem says that it is Disk4 that failed. He says that he didn't notice it immediately, until he did a system review and saw that the memory utilization was far above normal for the amount of traffic that the Web server was receiving. Then, he noticed that Disk4 had failed and called you. What will you need in order to correct the problem?

A. the Windows 2000 Server CD-ROM
B. a new hard disk similar to the one that failed
C. tape backups
D. three new hard disks to replace the failed set
E. a fault tolerance boot disk

>> !
Answer: A


39. Which of the following methods can be used for clean installations of Windows 2000 Srv on computers that have dissimilar hardware?

A. Syspart
B. Sysprep
C. SMS
D. Bootable CD

>> !
Answer: B


40. The mirror set that you have migrated from NT 4.0 to Windows 2000 has failed. Because it was migrated, it is on a basic disk. The status of the mirror set is "Failed Redundancy" and the status of the disk is "online." What should you do? (Choose all that apply)

A. Replace the failed basic disk with a dynamic disk and use Repair Volume.
B. Replace the failed basic disk with another basic disk and use Repair Volume.
C. If the status does not change to "Healthy," replace both disks and restore from backup.
D. If the status does not change to "Healthy," choose "Regenerate Mirror."

>> !
Answer: B, C & D


41. You have been monitoring the paging file on one of your Windows 2000 Srv:s and you notice that it is getting used quite a bit. Although you have ordered more memory for the server, you are told that it will be several weeks before you will get the additional memory. Assume that you cannot add any hardware to your current system, but you still want to improve performance. Your system is configured as follows:

Paging file location: C drive
Paging file initial size setting: 256 MB
Paging file observed average: 510 MB
Paging file maximum size setting: 1024 MB
%systemroot% location: C drive
Number of physical disks on server: 3
Partitions on Disk 0 C
Partitions on Disk 1 D
Partitions on Disk 2 E

Of the following options, which will improve the performance of the paging file on the above server? (Choose all that apply)

A. configure a RAID 5 stripe set with parity and place the page file on the stripe set
B. configure a RAID 0 stripe set on the D and E drives and place the paging file on that drive
C. move the paging file away from the system files
D. increase the initial paging file size
E. reduce the initial paging file size

>> !
Answer: A, B & E


42. You have several applications that run on your Windows 2000 Server to support network users. You have created a stripe set with parity to support your users and increase performance while protecting their data. You have also optimized throughput for application sharing. However, now you want to ensure that a Win32 financial application (FINAP.EXE) runs at a higher priority than the other applications on your server. Which of the following commands would run the financial application at a higher priority others on your system? (Choose all that apply)

A. START FINAP.EXE /HIGH
B. START FINAP.EXE /REALTIME
C. START FINAP.EXE /SEPARATE
D. START FINAP.EXE /MAX
E. START FINAP.EXE /ABOVENORMAL

>> !
Answer: A & E


43. Your network administration team is having a meeting on the status of the network. One of the administrators says that the Windows 2000 Server named XFILE is no longer running efficiently. Another administrator says that she thinks the system should have a RAID 5 drive array like the other applications servers. Your job is to confirm or deny that request based on a System Monitor report that is to be conducted over the next week. You have decided to monitor 24 hours per day for seven days to create your report. Which of the following objects and counters help you determine whether a RAID 5 configuration will improve performance? (Choose all that apply)

A. PhyscialDisk Avg. Disk Queue Length
B. Server Bytes Total/sec
C. Thread % Processor Time
D. Processor % Processor Time
E. PhysicalDisk % Disk Time

>> !
Answer: C & E


44. You are in charge of three different Windows 2000 Servers on your network. Each server provides file and printer sharing to Windows 2000 Professional clients. Lately, you have noticed that users are complaining about the performance of one of the servers. You suspect it is because that server is being used more than the other servers are to answer client requests. Which of the following objects and counters should you monitor on each server to make this determination? (Choose all that apply)

A. Redirector - Server Reconnects
B. System - System Calls/sec
C. Server Work Queues - Total Operations/sec
D. UDP - Datagrams/sec
E. Server - Bytes Total/sec

>> !
Answer: A, C & E


45. Your Windows 2000 Srv has recently run into a boot problem. You have attempted to use the Last Known Good configuration, but without success. The ERD you have created doesn't seem to be working either. You suspect that the Master Boot Record has been corrupted or modified by another user. At this point, you realize that the recovery console is probably your best option. Which of the following are valid methods for accessing the recovery console?

A. run winnt32 /cmdcons
B. run rconsole
C. boot from the Windows 2000 CD and then choose to repair your installation
D. run rdisk from a Windows 2000 command prompt
E. boot from the boot floppies and press R when prompted

>> !
Answer: A


46. An application exception has occurred and Dr. Watson has generated a log file. How can you view the file?

A. The application log
B. The system log
C. The security log
D. The event log

>> !
Answer: B


47. When running in safe mode, which of the following components are not available under System Information?

A. System Summary
B. Hardware Resources
C. Components
D. Software Environment
E. Internet Explorer 5

>> !
Answer: D


48. You wish to check whether or not a driver has been loaded, and run System Information. Under which subcategory should you check for the status of a driver?

A. System Summary
B. Hardware Resources
C. Components
D. Software Environment
E. Internet Explorer 5

>> !
Answer: C


49. You have been receiving complaints from a client that printing from his Outlook client is extremely slow. You examine the situation and discover that his Outlook client is configured for multiple languages. How do you resolve this printing problem?

A. Restrict the printing from Outlook client to single language.
B. Increase the spool directory on the client computer.
C. Install multiple languages on the print server.
D. Change the print requirements to print directly to server, without spooling.

>> !
Answer: C


50. How are disk quotas tracked under Windows 2000?

A. Per user, total disk space allowed
B. Per group membership, total disk space allowed
C. Per user, total disk space per volume
D. Per group membership, total disk space per volume

>> !
Answer: C


51. Your network administration team wants to use quotas to manage the size of the desktops of roaming users. The group has been discussing various ways of doing this, and several solutions have been proposed. You are aware that several of the suggestions will not work because of the limitations of the Windows 2000 quota management service. The most recent suggestion is to perform the following:

1. Allow users to logon from different systems on the network
2. Configure roaming profiles to be stored on a central server and volume
3. Locate the desktop folder inside each profile and set it to the specified size limit
4. Limit administrators to 200MB desktops and all other users to 100MB desktops

Which aspects of the most recent proposal require revision?

A. 1 only
B. 2 only
C. 3 and 4 only
D. 2 and 4 only
E. 1 and 4 only

>> !
Answer: B


52. Fran, one the network administrators on your team, asked users to compress their when storing them on your Windows 2000 Srv about two weeks ago. As far as you know, all of the users complied with the request because you checked on it last week and the file space in use dropped considerably. A few days ago, you asked several users to encrypt their sensitive files. Today, Fran told you that several of the users did not have all of their files compressed and she asked you to verify this with the users. You notice that the list of names includes all of the users that you asked to encrypt their sensitive files. Which of the following explains this event? (Choose all that apply)

A. users accidentally decompressed their files during encryption
B. encrypted files cannot be compressed
C. disk quotas are enabled
D. the files are on a FAT16 partition
E. the files are on a FAT32 partition

>> !
Answer: B & D


53. Several of the users on your network need to have security set on their files. Each Windows 2000 user stores their sensitive files locally and the systems are physically secured. However, you want to ensure that they are able to encrypt their files on their local system. Each user's system is identical and has the following configuration:

Partition Type FAT32, RAM 64MB
File Compression Enabled for all sensitive files
Processor Intel Pentium II / 350
Network interface 3Com 10/100 adapters

Which of the following must you do to ensure that these systems will be able to protect their sensitive data with EFS? (choose all correct answers)

A. upgrade RAM
B. change partitions to NTFS
C. upgrade processors
D. disable file compression on encrypted files
E. replace network adapter

>> !
Answer: C


54. A consulting firm that you are not affiliated with has established a network backup plan that involves a series of incremental, differential, and full backups. The plan the consulting firm created is shown in the table below

Sunday Differential
Monday Incremental
Tuesday Differential
Wednesday Full
Thursday Differential
Friday Incremental
Saturday Differential

Today is Sunday and the company that is using that backup plan just called. They inform you that the network crashed one hour ago and they need to restore their data from backup. The Sunday backup has not been run yet. You had them fax the backup schedule and you have determined that it will take a total of ______ tapes to restore their system.

A. 1 tape
B. 2 tapes
C. 3 tapes
D. 4 tapes
E. 5 tapes

>> !
Answer: A


55. You have configured a central Windows 2000 Srv that is servicing 500 clients. The Windows 2000 Srv maintains home directories for the users. The hard disk that you have been using in the system is a 4GB IDE drive (basic disk) that is formatted with the NTFS5 file system. Although the drive has plenty of space for the users home directories because disk quotas limit the size of each user's space on the drive, you need to add space to the drive. However, the drive is completely out of disk space. If you add a second physical disk (4GB) to the Windows 2000 Srv, how can you increase the available space on the drive maintaining the home directories?

A. format the drive, mount the drive to a new folder created on the first drive
B. do not format the drive and extend the first drive with the partition of the second drive
C. format the drive and extend the first drive with the partition of the second.
D. partition the new drive with NTFS and then format it to NTFS, then extend the first drive

>> !
Answer: D


56. You have configured 25 folders for users in your department on your local Windows 2000 Srv. All of your clients have compressed their folders. A few days ago, you added a new hard drive to your Windows 2000 Srv and you would like to move the user's folders to the other drive. The new drive is formatted with the NTFS file system. You create a new parent directory called home, but you do not configure any special options or enable compression. However, all of the user files you are moving to the new drive are compressed. After you transfer the files to the new partition you discover that they are all uncompressed. Why did this happen? (Choose all that apply)

A. you transferred the files with CSVDE
B. you transferred the files with movetree
C. you transferred the files with LDIFDE
D. whenever you copy or move files between partitions they inherit their security and compression attributes
E. whenever you move files, the compression attribute changes to the opposite setting.

>> !
Answer: B, C & D


57. Which file systems does Windows 2000 support?

A. HPFS
B. FAT
C. FAT32
D. NTFS
E. DOS

>> !
Answer: A & B


58. Which of the following is stored on the host computer on a standalone Dfs? (Choose all that apply)

A. The Dfs Root
B. The topology
C. The shared folders
D. The data

>> !
Answer: A, B & C


59. Only client computers running Dfs software can access Dfs resources. Which of the following operating systems include Dfs client software?

A. 2000 Pro
B. NT 4.0 Wks
C. Windows 98
D. Windows 95
E. DOS

>> !
Answer: C


60. On a domain-based Dfs, where is the topology stored?

A. On the host computer
B. On the domain controllers
C. In Active Directory
D. On the synchronized computer

>> !
Answer: D


61. How are permissions applied in Dfs?

A. Dfs folders have unique share and NTFS permissions that must be assigned at the time Dfs is configured.
B. Dfs root folders have unique share and NTFS permissions that must be assigned at the time Dfs is configured. All subfolders under the root have the permissions of the root folder.
C. First level folders must have share and permissions assigned at the time Dfs is configured. All subfolders under the first level folder will, by default, inherit the permissions of the parent folder, but may be configured to suit administrative need.
D. Dfs does not use unique share and NTFS permissions. The permissions assigned to the share where Dfs points are the permissions that are applied.

>> !
Answer: B


62. While monitoring a client, you note that every time the client wishes to access a Dfs link, it queries the Dfs server about the location. This happens every time, even if the client had already established a connection to the link a short time before. Why is this happening?

A. The link is not statically mapped.
B. The link's cache referral has been set to 0.
C. The original link has failed and fault tolerance is in effect.
D. The replica was not found.

>> !
Answer: C


63. How many replicas can each DFS link have?

A. 64
B. 16
C. 32
D. Unlimited
E. 8

>> !
Answer: E


64. Using dynamic storage, what is the limit of volumes you can create on one disk?

A. You cannot create volumes using dynamic storage
B. 1 volume
C. 16 volumes
D. 32 volumes
E. unlimited volumes

>> !
Answer: B


65. You wish to view the changes you have made to the drive letters in Disk Management. Which command do you use to do this?

A. Commit Changes Now
B. Refresh
C. Rescan Disks
D. Confirm and View

>> !
Answer: C


66. You wish to convert your disk from basic to dynamic. How do you do this?

A. By using the "convert" command at the command prompt.
B. By using the "covert now" command in the Disk Administrator.
C. By using the "upgrade to dynamic disk" command in Disk Administrator.
D. By using the "upgrade" command at the command prompt.

>> !
Answer: D


67. You wish to covert your drive back to basic form from dynamic, while retaining all information on the disk. How do you do this?

A. Use the "revert" command at the command prompt.
B. Use the "revert to basic disk" command in Disk Administrator.
C. Back up all information, use the "revert to basic disk" command in Disk Administrator, and restore the information after completion.
D. There is no practical way to revert to basic after converting to dynamic.

>> !
Answer: A


68. A simple volume and a partition seem to represent similar use of disk space. What are the differences?

A. A simple volume does not have the size limitations of a partition.
B. A simple volume can be formatted FAT 32, while a partition cannot
C. A simple volume can span multiple disks, a partition cannot
D. A simple volume is fault tolerant, a partition is not

>> !
Answer: A


69. Which file formatting system or systems will allow you to extend a simple volume?

A. NTFS
B. FAT
C. FAT32
D. VFAT
E. HPFS

>> !
Answer: C


70. What is the maximum number of disks that can be used when creating a spanned volume?

A. 1 disk
B. 16 disks
C. 32 disks
D. unlimited disks

>> !
Answer: A


71. When you migrate a server from NT 4.0 to Windows 2000, what happens to the volume sets created on NT 4.0? (Choose all that apply)

A. They are converted to volume sets on basic disks.
B. They are converted to volume sets on dynamic disks.
C. They are converted to partitions to basic disks.
D. They are not retained and must be restored from backup.

>> !
Answer: A, C & D


72. If a user has reached his disk quota allowance, and the disk quota is set to prevent further disk space, what must he or she do to obtain more space? (Choose all that apply.)

A. Delete some files.
B. Compress some files.
C. Have another user take ownership of some files.
D. Have the administrator increase the quota allowance.

>> !
Answer: C


73. A user is running a machine that is set to dual boot between NT 4.0 and Windows 2000. He has reached his disk quota limit for data storage. What effect will this have when he boots under NT 4.0?

A. He will be unable to boot into Windows NT 4.0 because there is insufficient disk space.
B. He will be unable to see the files as NTFS is different under NT 4.0.
C. He will be able to exceed the disk quota limit.
D. It will have no effect whatsoever.

>> !
Answer: B


74. The admin has set up the disk quota state as "disk quota tracked." What effect does this have?

A. This is the default state; performance is not affected by disk quotas.
B. Quota usage changes are tracked, but quota limits are not enforced.
C. Quota usage changes are tracked and quota limits are enforced.
D. Quote usage changes are tracked, quota limits are enforced, and users are notified when they are reaching quota limits.

>> !
Answer: D


75. You have a 1GB drive and 100 users. You wish to allocate 100mb of space to each user under disk quotas. What happens?

A. You are unable to do this.
B. You modify the registry under KEY_LOCAL_MACHINE\System\CurrentControlSet\Control.
C. You run the command diskall.exe -d.
D. Disk quotas do not prevent the administrator from allocating more than the actual space.

>> !
Answer: C


76. Under Windows 2000, what is the maximum partition size for a FAT16 volume?

A. 1024MB
B. 2048MB
C. 4095MB
D. no limitation

>> !
Answer: A


77. On a volume with fewer than 32,680 sectors, using the format command under disk administrator, how is it formatted? (Choose all that apply)

A. FAT12
B. FAT16
C. FAT32
D. NTFS

>> !
Answer: B, C & D


78. You have configured your local network with IP addresses from 10.0.0.1 through 10.40.0.1. You want to give your internal clients Internet access via NAT. Your Windows 2000 Srv has an internal and external adapter with a demand-dial connection and RRAS. Which of the following must still be completed in order to enable NAT on the Server? (Choose all that apply)

A. reassign all internal addresses to a private IP range
B. load the NAT protocol
C. associate NAT with the local interface
D. associate NAT with the Internet interface
E. bind a second IP address to the Server's interface and configure one IP address as internal and the other as external

>> !
Answer: A, B, D & E


79. Your LAN has 75 internal clients and 25 external clients. Some of the external clients must make secure connections across a VPN. The clients have already been configured to support VPN communications and the internal Windows 2000 Srv has been configured to support that VPN. Which of the following types of encryption and encapsulation does Windows 2000 support? (Choose all that apply)

A. MD4
B. RC4 with EAP-TLS
C. PGP
D. GRE
E. L2TP over IPSec

>> !
Answer: A & C


80. Your network security group is discussing a WAN link between a host in Atlanta, GA with IP address 192.168.1.1 and a host in New York, NY with IP address 192.168.1.79. The clients are connected via a T1 line through a telephone carrier. Your group is considering several security options, including PPTP. There seems to be confusion over the types of encryption that a Windows 2000 PPTP connection can support. Which of the following types of encryption are available in Windows 2000 for PPTP connections?

A. 40-bit RC4 cipher
B. 64-bit RC4 cipher
C. 128-bit RC4 cipher
D. CIFS
E. SMB

>> !
Answer: D


81. You are configuring a Windows 2000 Srv with NAT via ICS. The clients on the network are all running Windows 2000 Pro. The network you are working on uses an IP address range of 172.16.0.1 through 172.16.0.254, which were manually assigned. After ICS is installed, none of the internal clients can access the Windows 2000 Srv. Which of the following is the most likely problem? (Choose the best answer)

A. a private IP address range must be used.
B. the server must be upgraded to a domain controller.
C. the DNS proxy services cannot contact the ISP.
D. the Windows 2000 Server with NAT is no longer on the same network as the internal clients.
E. AUTODHCP has failed.

>> !
Answer: E


82. Your organization is using a domain tree with multiple domains. There are a total of five domains in your domain tree. HQCorp was the first domain online and it is the root domain. NCorp was the second domain controller and the first child of HQCorp. The other child domains are SCorp, ECorp, and WCorp. Assuming that no one has changed the default operations master roles, where would you find the schema master and domain naming master? (Choose the best answer)

A. On each domain controller.
B. HQCorp would be the schema master and NCorp would be the domain naming master.
C. HQCorp would be the domain naming master and NCorp would be the schema master.
D. HQCorp would be the schema master and each domain controller would be its own domain naming master.
E. On HQCorp would perform both the domain naming master and schema operations master roles.

>> !
Answer: D


83. The ABC Corporation has implemented three networks using an internal addressing scheme. The headquarters segment uses IP addresses on the 192.168.0.0/24 network and the two remote sites use IP address ranges 192.168.1.0/24 and 192.168.2.0/24 respectively. Each segment has its own domain. The headquarters domain is called HQDom and the remote site domains are called Site1Dom and Site2Dom. Each remote location is connected to the HQDom via 56K WAN connections. Users from Site1Dom and Site2Dom are complaining that they cannot log on and that they are unable to perform network searches for objects. Based on these complaints, which of the following Proposed solutions is appropriate? (Choose the best answer.)

A. Add a domain naming master to each of the remote sites
B. Add a schema master to each of the remote sites
C. Add a RID master to HQDom, Site1Dom, and Site2Dom.
D. Create a GCS on each of the remote sites
E. Create a PPTP connection between the remote sites and the HQDom

>> !
Answer: C


84. The network you are working on uses a private IP address 192.168.1.0 with a 27 bit subnet mask. The Windows 2000 srv you are troubleshooting has two network cards. One is using the IP address of 192.168.1.33, connected to three UNIX systems, and the other is using 192.168.1.65, connected to three Windows 2000 Pro systems. The Windows 2000 system is unable to communicate with two of the UNIX systems to which it connects with the 192.168.1.33 network card. The first UNIX host is using IP address 192.168.1.32 with mask 255.255.255.224 and the second is using IP address 192.168.1.63 with mask 255.255.255.224. Both UNIX hosts are using 192.168.1.33 as their default gateway. Why is the Windows 2000 Srv unable to communicate with these two systems? (Choose the best answer.)

A. DNS name resolution is not configured correctly
B. the UNIX hosts are using an incorrect subnet mask
C. the UNIX hosts are using invalid IP addresses
D. the Windows 2000 Server is using an invalid IP address
E. the default gateways are set incorrectly

>> !
Answer: A


85. Your Windows 2000 domain is operating in mixed mode because you still have some NT 4.0 domains on the network. Explicit one-way trusts have been formed between where the NT 4.0 domains trust the Windows 2000 domains. There are three different subnets between 192.168.5.0, 192.168.6.0, and 192.168.7.0 all using 24-bit subnet masks.

A Cisco router connects the three networks and has interfaces of 192.168.5.1, 192.168.6.1, and 192.168.7.1. The Windows 2000 domain controllers occupy the 192.168.5.0 and 192.168.6.0 networks using valid IP ranges within those networks. The NT 4.0 domains are using valid IP addresses within the 192.168.7.0 network - all hosts on that network are using a default gateway of 192.168.7.1. You are trying to share some resources from a Windows 2000 Member Srv that is part of domain5.local domain. The Windows 2000 Server's IP address is 192.168.5.27. The network administrator that is trying to grant access to the NT 4.0 clients says she is unable to find the appropriate accounts. What is the problem? (Choose all that apply)

A. the Windows 2000 domain must be configured to trust the NT 4.0 domain
B. the NT clients are using the wrong default gateway
C. trusts cannot be utilized between Windows 2000 and NT
D. trusts cannot traverse different subnets
E. the Windows 2000 Srv is using an incorrect IP address

>> !
Answer: B & E


86. A network administration team is installing five new Windows 2000 Srv:s to support users on your network. The existing network uses DHCP to configure client addresses, but all servers must have statically configured addresses according to company policy. Review the network configuration as shown in the table below:

Network Router Interface Number of hosts
192.168.1.16/28
192.168.1.17 13
192.168.1.32/28 192.168.1.33 10
192.168.1.48/28
192.168.1.49 13
192.168.1.64/28 192.168.1.65 12

The network administration team decides to install two Windows 2000 Srv:s on 192.168.0.48, which is the most heavily used subnet. The team also decides to add one Windows 2000 Srv on each of the rest of the subnets. The Windows 2000 Srv configurations that the team has agreed upon are as follows:

Server Name On network Default Gateway
spec1.corp.net 192.168.1.16 192.168.1.17
spec2.corp.net 192.168.1.32 192.168.1.33
spec3.corp.net 192.168.1.48 192.168.1.49
spec4.corp.net 192.168.1.48 192.168.1.65
spec5.corp.net 192.168.1.64 192.168.1.65

Based on the implementation plan, which of the following problems will the team encounter? (choose all correct answers)

A. incorrect default gateway for spec5.corp.net
B. incorrect default gateway for spec4.corp.net
C. incorrect IP address on subnet 192.168.1.16
D. incorrect IP address on subnet 192.168.1.32
E. incorrect IP address on subnet 192.168.1.48

>> !
Answer: C


87. X Corp has a 2,500 node network with 200 NT 4.0 Wks clients. There are still two NT 4.0 BDCs online to support downlevel clients. The company is using a single domain model with the root domain named xcorp.local. There are five domain controllers supporting the operation. The operations master roles are divided among the servers as follows:

Domain Controller

Name FSMO Role(s)
dc1.xcorp.local Schema master and domain naming master
dc2.xcorp.local RIDmaster
dc3.xcorp.local PDC emulator
dc4.xcorp.local Infrastructure master
dc5.xcorp.local None

People at the NT 4.0 Wks:s tell you that they are being locked out of their terminals because they couldn't change their passwords successfully before they expired. Which domain controller would you suspect might be offline or inaccessible? (Choose all that apply)

A. dc1.xcorp.local
B. dc2.xcorp.local
C. dc3.xcorp.local
D. dc4.xcorp.local
E. dc5.xcorp.local

>> !
Answer: A, B, C & E


88. You are configuring a NAT server, and you are about to configure the static inbound ports. You have an internal NNTP, SMTP, POP3, and Web server that you want external clients and servers to be able to contact. For which well-known ports must you configure UDP/TCP port and IP address pairs?

A. 25
B. 110
C. 119
D. 23
E. 80

>> !
Answer: D


89. You have just installed a new DHCP server on a Windows 2000 member server to provide addresses on the network. You notice that clients are not able to lease addresses from the server, even though it has the proper scope configurations for the network. You can ping the DHCP server by IP address and server name from each segment on the network and the routers are RFC 1542 compliant. What is the most likely problem?

A. Routers are filtering communications over Port 23
B. WINS records are incorrect
C. DNS records are incorrect
D. You have not authorized the DHCP server
E. The exclusion range has not been set

>> !
Answer: B


90. Your network originally had 250 IP hosts with dynamically assigned IP addresses. These clients are using IP addresses from 192.168.1.1 - 192.168.1.254 with subnet mask 255.255.255.0. Recently, another group of systems had to be added to your physical network, but they were to have different IP addresses from 192.168.2.1 through 192.168.2.254. The two logical networks do not need to communicate, but you want to be able to use a single DHCP server to service both sets of clients. How should you configure the DHCP server to handle this configuration? (Choose all that apply)

A. create a scope with addresses 192.168.1.0 and another with 192.168.2.0
B. create a superscope with addresses 192.168.1.0 and 192.168.2.0
C. create a multicast scope
D. create a scope with addresses 192.168.1.0 and exclude addresses with 192.168.2.0
E. create a scope with address 192.168.0.0 and exclude addresses of 192.168.1.0 and 192.168.2.0

>> !
Answer: A & C


91. You run a network with 1500 clients. On that network there are three UNIX servers running DNS. Your DNS administrators do not want to abandon the DNS servers, but they have agreed to use the DNS servers as a backup to your Windows 2000 DNS server. You have just installed a DHCP server on another Windows 2000 Server, but you haven't configured that system yet.

Goals:
To integrate the Windows 2000 DNS Server and UNIX DNS servers
To allow the DHCP Server to update DNS server
To allow Windows 2000 clients to update the DNS server
To prevent unauthorized clients from updating the server

Proposed Solution:
Install DNS on the Windows 2000 Srv. Configure the DNS server with a Standard Primary zone. Enable dynamic updates. Configure the Windows 2000 DNS to send secondary zone updates to the UNIX DNS servers.

Which of the following will be provided by the proposed solution?

A. To integrate the Windowsdows 2000 DNS Server and UNIX DNS servers
B. To allow the DHCP Server to update DNS server
C. To allow Windows 2000 clients to update the DNS server
D. To prevent unauthorized clients from updating the server

>> !
Answer: C


92. You are enabling an internal Web site for users to visit. You are using HTTP because all systems have Web browsers, but not all can use NetBIOS share syntax. You want to make it possible for clients to see your files and folders for shares on which you don't have a default document. Which of the following types of access must you enable to allow this? (Choose all that apply)

A. Script source access
B. Write
C. Directory browsing
D. Read
E. Execute

>> !
Answer: B, C & E


93. You are running a mixed network of Windows 2000 and NT systems. The NT PDC has been replaced with a Windows 2000 domain controller and all of the necessary trust relationships have been configured. However, your clients do not support dynamic update, so you have installed a DHCP server to provide updates on behalf of your legacy clients. You are currently using a Standard Primary DNS domain with dynamic updates enabled. You want to enable Secure Dynamic Updates to increase security, but still allow your legacy clients to register their resource records in DNS. Which of the following tasks must you complete to ensure that your clients will be able to register their names and you will be able to enable secure dynamic updates? (Choose all that apply)

A. Upgrade all of your clients to Windows 2000
B. Authorize your DHCP server
C. Change your zone to Active Directory integrated
D. Create a standard secondary zone
E. Enable Updates for DNS Clients that Do Not Support Dynamic Updates on the DHCP server

>> !
Answer: B, C & E


94. You have a number of users who log on to the company’s Windows 2000-based network from their homes. They report that, even with 56 Kbps modems, it is very slow to log on to the system. What should you do to help improve the logon process?

A. Set up a special database on the server with their home phone number and modem speed, so it does not have to search for the information.
B. Set up PPTP on their computers to increase initial throughput.
C. Configure their computers to use the server-stored versions of their user profiles, rather than using the locally-stored copy of the profiles.
D. Configure their computers to use the locally-stored copies of their profiles, rather than getting them from the server.

>> !
Answer: D

Using the locally-stored version of the user profile will save time when logging on by dial-up, because their workstation at home will not have to download their profiles from the server. Solutions that involve downloading information from the server add logon time while information is downloading. PPTP (Point-to-Point Tunneling Protocol) is used to "piggy-back" data packets of non-native format across networks (e.g., sending NetWare packets across a network that uses TCP/IP exclusively). It is mainly used in secure connections to send encrypted data that is "wrapped' like a Point-to-Point Protocol (PPP) packet. This process is referred to as encapsulation. You do not need to set up a database of information about each user’s connection. The connection information is determined by the server when a client computer attempts to connect to the server.


95. You have added RAM to a member server. The member server is at a remote location. You want to know if the file system cache is tuned optimally after adding this new memory. What should you do?

A. Monitor the Memory: System Cache Resident Bytes and adjust the Server Optimization setting on the member server if too much memory is being used for file sharing.
B. Archive the Event Viewer logs on the member server and analyze the compiled System information for all Warnings. Manually set the paging file size based on the log results.
C. Set the Performance Logs and Alerts on the member server to record Logical Disk: % Free Space and Logical Disk: % Disk Time counter values. Adjust the Server Optimization setting based on your results.
D. Set the Performance Logs and Alerts counters on the member server to record Paging File: % Usage and Paging File: Usage Peak. Manually set the paging file size based on the log results.

>> !
Answer: A

The secret to effective monitoring is to use the correct counters. All data is interesting but not pertinent to your needs. The System Cache Resident Bytes counter for Memory will support your decision to adjust the memory usage for Server Optimization by going to the Local Area Connection, Properties, File and Printer Sharing for Microsoft Networks. The pagefile size determines virtual memory while file system cache is an area of physical memory.


96. You have already created an unattended answer file using Setup Manager with ten computers named. Before you begin the installations, you are asked if you can include three more computers. What will be required for you to include more computers in the unattended installation over the network?

A. Edit the winnt.sif file with Notepad.
B. Edit the unattend.bat file with Notepad.
C. Edit the unattend.udf file with Notepad.
D. Edit the unattend.txt file with Notepad.

>> !
Answer: C

The .udf file is used when multiple computers are installed with variations in setup answers. The .txt file is the answer file for unattended installations. The .bat file facilitates an installation using winnt32 with switches. A .sif file is used for the bootable CD-ROM installation.


97. You have been editing the registry with Regedt32, and now you are unable to get the server to boot up. What should you try first for a quick system restoration?

A. Power on the computer, hit the F8 key and select Last Known Good Configuration.
B. Power on the computer and hit the F8 key to access Safe Mode.
C. Use your Emergency Repair Disk (ERD) to boot and restore core system files.
D. In Recovery Console, set the path to the floppy drive where you have a backup of the core system files. Use the copy command to restore the files to the hard drive.

>> !
Answer: A

Your first option for recovery is the Last Known Good Configuration because you know that the registry was just altered. Safe Mode is appropriate if you know a device driver or software was just added and now the system won't start up. It allows you to remove the problem driver, server, or software so the system will start. The Recovery Console is a necessary task if you do not have a Last Known Good Configuration that works. You are required in this case to restore a good copy of core system files. The Windows 2000 Setup floppy disks can get the system started so you can use the Recovery Console. The ERD can help repair system files but it does not replace damaged files and it is computer-specific.


98. You have decided to use a vendor-supplied hardware driver that is not digitally signed. You are preparing for unattended server installations. How do you prepare for using non-signed drivers in an unattended session to avoid interactive warnings?

A. Flag this specific driver in the Txtsetup.oem specified in the [OEMBootFiles] section of the answer file.
B. In the [Unattended] section of the answer file, add DriverSigningPolicy = Ignore.
C. On the installation source server, on the System Properties Hardware tab, click the Driver Signing button and choose the Ignore radio button. After the unattended installations are complete, return the setting to the default.
D. In the driver subdirectory of the distribution folder, modify this vendor-supplied driver's .inf file where it references the catalog file.

>> !
Answer: B

You must use the answer file to indicate there is a non-signed driver so the setup will continue without interaction from a keyboard. The [OEMBootFiles] section is the wrong place to make the setting in the answer file. Manual settings, other than within the answer file, are incorrect.


99. You have four different distribution shares on your network for Windows 2000 server installations. A new service pack was just announced. What should you do to make the service pack available for future installations?

A. Copy the layout.inf, dosnet.inf and txtsetup.sif files to each distribution share.
B. Copy the service pack's driver.cab to the distribution share, as well as layout.inf, dosnet.inf, and txtsetup.sif.
C. Use sysdiff /diff to apply the service pack to each share.
D. Use update /slip to apply the service pack to each share.

>> !
Answer: D

You can simplify the installation of Service Packs by upgrading the files in each of your shares. Each computer receives only the latest files during installation. The individual files cannot be manually copied to the distribution shares; they are placed there during the update. The sysdiff utility installs Windows by using difference files; it does not install Service Packs.


100. You have six physical disks, disks 0-5, attached to a computer running Windows 2000 Server: Disk 0 contains drive C:, which has the Windows 2000 system files. Disk 1 contains drive D:, which has the Windows 2000 boot files. Disks 2-5 comprise a stripe set with parity. For best performance, where should you place the page file?

A. Place the page file on drive D.
B. Place the page file on drive C.
C. Place the page file on the stripe set with parity.
D. Create a page file on both the stripe set with parity and on drive C.

>> !
Answer: A

Microsoft advises that you should not place a page file on a stripe set with parity. Therefore, you have only two disks on which you could possibly place the page file. You should place a paging file on the disk with the lowest amount of disk activity. The disk with the Windows 2000 system files (the boot partition) is used almost constantly in the operation of the system. In this question, the Windows NT system files are on drive C:. Thus, the best place for the paging file in this instance is on drive D. NOTE: This can be confusing! The SYSTEM PARTITION contains the BOOT FILES that the computer boots from (in the root directory of the drive). The BOOT FILES (NTLDR, NTDETECT.COM, BOOT.INI, and BOOTSECT.DOS) must always be on the Active partition (called the SYSTEM PARTITION). The BOOT PARTITION is where the WINNT folder (the folder containing the Windows 2000 PROGRAM FILES) is located. It contains the SYSTEM FILES (%systemroot%), and can be on a primary partition or a logical drive in an extended partition on a basic disk.


101. You have upgraded your NT 4.0 primary domain controller (PDC) to Windows 2000 Advanced Server. You want the security to be equivalent to the other domain controllers (DCs) in your network, which will get clean installations. What must you do?

A. Evaluate the templates provided, based on the level of security your network needs, modify your selection as needed and import it into the Group Policy Object (GPO) linked to the DC organizational unit (OU).
B. Using the Group Policy snap-in modify the default domain policy and apply it at domain level.
C. Offline, modify a security template from the \%SystemRoot%\Security\Templates folder to match your network security requirements. Apply the template to each Windows 2000 DC in your network.
D. Import the basic configuration template to the Security Settings area of the Computer Configuration offline. Next, prepare the settings you require for your network in a new template and then apply that template to all your network Windows 2000 DCs.

>> !
Answer: D

Only the upgraded server needs the Basic template applied to make it equivalent to the clean-installed servers. Then you can make the modifications to the security settings your network requires on a new template and apply it, knowing that all servers started out with the same settings.


102. You implement a hardware RAID-5 solution using SCSI disk drives. One of the disk drives fails. When you replace the failed drive, the system cannot locate the new disk drive, even though it is the same make and model as the others in the RAID configuration. The system is able to locate the other disk drives in the RAID-5 set. What is the most likely reason that the system cannot locate the new drive?

A. The SCSI disk drive is not a Plug and Play device.
B. The SCSI ID of the drive conflicts with the SCSI ID of another device.
C. The SCSI cable length exceeds the maximum supported length.
D. The SCSI bus is not terminated properly.

>> !
Answer: B

In this scenario, the most likely reason that the new disk drive cannot be located is that the SCSI ID of the drive conflicts with the ID of another SCSI device. Many SCSI devices must have the SCSI ID set manually. Since the replacement drive is the same make and model as the failed drive, it is not likely that the SCSI cable length differs. Since the other drives can be located, the SCSI bus is terminated properly. Whether or not the disk drive is a Plug and Play device, the SCSI ID generally must be set manually.


103. You implement Internet Printing on a computer running Windows 2000 Server. When a user attempts to connect to a printer using Internet Explorer 4.0, what protocol will the client computer use first?

A. Hypertext Transport Protocol (HTTP)
B. Internet Printing Protocol (IPP)
C. Server Message Block (SMB)
D. Remote Procedure Call (RPC)

>> !
Answer: D

When a client computer attempts to connect to a printer using a web browser, it will try to use Remote Procedure Calls (RPC) first. If this is successful, the computer will communicate with the print server using RPC. RPC is faster and more efficient than other protocols. If the client computer cannot use RPC to communicate with the print server, it will use the Internet Printing Protocol (IPP) encapsulated in the Hypertext Transport Protocol (HTTP). The Server Message Block (SMB) protocol is used if a user creates a local port on the client computer and then redirects output to that port to a printer on a print server using the UNC path of the shared printer.


104. You install a new application on a computer running Terminal Services in Application Server Mode. Users of this application must have access to files stored on a computer running NetWare 4.11. TCP/IP is not installed on the computer running NetWare. What steps should you take to enable Terminal Services clients to access the computer running NetWare?

A. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.3.
B. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.2.
C. Add NWLink to the Local Area Connection of the Terminal Services server. Configure NWLink with frame type 802.2.
D. Add NWLink to the Local Area Connection of the Terminal Services server and to the Local Area Connection of the Terminal Services clients. Configure NWLink with frame type 802.3.

>> !
Answer: C

You should add NWLink only to the Local Area Connection of the Terminal Services server, since Terminal Services clients must use TCP/IP to communicate with the Terminal Services server. It is a good practice to limit the number of protocols installed on each computer, so you should not add NWLink to the Local Area Connection of the Terminal Services clients. NWLink is Microsoft's implementation of the protocol IPX/SPX. For NetWare version 3.11 and earlier, the frame type used is 802.3. For NetWare versions 3.12 and above, the frame type used is 802.2. Thus, you should configure NWlink with frame type 802.2. Frame type 802.2 is the default frame type configured if Windows 2000 detects multiple frame types on a network.


105. You install File Services for Macintosh on a computer running Windows 2000 Server. The computer is a member of a Windows 2000 domain. Which node in Local Security Policy should you use to configure clear-text password authentication for Macintosh clients who access this server using remote access?

A. Security Options
B. Lockout Policy
C. User Rights Assignments
D. Account Policies

>> !
Answer: D

You should use the Password Policies category in the Account Policies node to enable passwords to be stored using reverse encryption. You also use the Account Policies node to configure lockout policies and Kerberos policies. You use the Lockout Policy node to define the number of failed attempts that can be made to log on before an account is disabled and the time period after which the account will be enabled again. You use the User Rights Assignment node to configure which rights are enabled on a system and who is entitled to exercise these rights. You use the Security Options node to configure advanced rights and advanced auditing such as "Automatically log off users when logon time expires" and "Prevent users from installing printer drivers".


106. You install IIS 5.0 on a computer running Windows 2000 Server. You create two new departmental Web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales Web site while a developer updates the content of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive?

A. The user will be redirected to the Default Web site home page.
B. The user will receive a 404 - File Not Found error message.
C. The user will receive a 403.2 - Read Access Forbidden error message.
D. The user will be redirected to an alternate default page for the Sales site’s home directory.

>> !
Answer: A

When a Hypertext Transfer Protocol (HTTP) request is received from a browser for a site that is stopped, the Default Web site home page will be returned to the requester. Thus, the content of this home page should be appropriate for all web sites hosted on the IIS server. The user cannot be redirected to an alternate default page for the site’s home directory if the site is stopped. If a user requests a web page that does not exist for a web site that is running, the user will receive a 404 – File Not Found error message. You can customize the default error messages for IIS from the Custom Errors tab of the Properties dialog box of each web site or the Master Properties dialog box for the IIS server. A user will receive a 403.2 – Read Access Forbidden error message if the user tries to access a page for which the user does not have permission. This typically is a web page with NTFS permissions set that do not give permissions to this user or any group to which the user belongs.


107. You install IIS 5.0 on a computer that is running Windows 2000 Server. The computer is a member of your Active Directory domain. You plan to use the IIS online help to learn more about managing a Web server. What step must you take on the computer running IIS to enable you to use the search feature of online help?

A. Install Index Server 2.0.
B. Start the indexing service.
C. Publish the folder that contains the IIS help files in Active Directory.
D. Designate a partition or volume formatted with NTFS for the catalog file.

>> !
Answer: B

The Indexing Service in Windows 2000 replaces Index Server 2.0, which was available with IIS 4.0. The Indexing Service is installed with Windows 2000 Server but it is disabled by default. It must be enabled to index the contents of the online help for IIS so you can use the search feature. To enable the Indexing Service, open Computer Management, expand Services and Applications, and then start the Indexing Service from the context menu of the Indexing Service node. You do not need to publish the folder that contains the IIS 5 online help files in Active Directory. You do not need to store the catalog on a volume or partition formatted with NTFS.


108. You install Windows 2000 Server and IIS on a computer. You want to enable users to access the Default Web Site on this server using any common Web browser. You want to limit access to three of the virtual directories on the site to employees of your enterprise. What authentication method should you configure for these virtual directories?

A. Basic Authentication
B. Integrated Windows Authentication
C. Digest Authentication
D. Anonymous Authentication

>> !
Answer: A

You should configure the limited access virtual directories to use Basic Authentication, since it is the only authentication method supported by all web browsers. You need to have Internet Explorer 5.0 or newer when using Digest Authentication. Internet Explorer 2.0 or newer supports Integrated Windows Authentication. You can use Anonymous Authentication for the Default Web Site, but you should not use it for the limited access virtual directories.


109. You install Windows 2000 Server on a computer and make the computer a member of a Windows 2000 domain. Only users whose accounts are members of the local Administrators group of this computer are allowed to log on interactively. Each of four administrators logs on with an individual administrative account that is defined in Active Directory. These four users do not have administrative access to any other computers in the domain. You create a global group that contains only the user accounts for these administrators. You make the global group a member of this computer’s Administrators group and remove Domain Admins from the Administrators group. You install three custom applications on this computer. You would like to configure a desktop for the computer that contains shortcuts for these applications. You want all administrators of this computer to have the application shortcuts on their desktop the first time they log on interactively. You also want each administrator to be able to customize his desktop. You log on to this computer with your administrative account and configure the desktop with shortcuts for the system management applications. What step should you take to make these shortcuts available to all administrators with the least amount of administrative effort?

A. For each administrator, copy your profile to the folder %systemdrive%\Documents and Settings\, where is the user’s account name.
B. Define the path to your profile in the Profile tab of the Properties of each administrator’s user account in Active Directory.
C. Copy the profile for your account to the Default User profile.
D. Copy the profile for your account to the profile for the Administrators group.

>> !
Answer: C

You should copy the profile for your account to the Default User profile. When a user first logs on interactively at a computer, the user receives a copy of the profile defined for the Default User. This is copied to the folder %systemdrive%\Documents and Settings\, where is the user’s account name. A local profile is created for each user who logs on interactively to a computer, not for the group to which the user belongs. Profiles are not created for groups, so you cannot establish a profile for the Administrators group. Defining a path to your profile in the properties of each user account requires more administrative effort than copying the profile to the Default User profile. Also, changes made to the profile by any administrator will update your profile, so each user will not have a customized desktop. Copying your profile to the default location for each user’s profile requires more administrative effort than copying the profile to the Default User profile. The procedure defined in this scenario will not work if a user account is configured to use roaming profiles. If roaming profiles are in use, the Default profile is not used.


110. You install Windows 2000 Server on a computer. The computer has five disk drives, all configured as dynamic disks. You install the systemroot folder in a volume on one disk drive. You configure two pagefiles - one on the volume with the systemroot folder to use for system recovery and another on a volume on the second disk drive. You install a scanner on the computer. How should you configure the remaining three disk drives to provide maximum performance for scanning images?

A. Create a spanned volume using all three disk drives.
B. Create a striped volume using all three disk drives.
C. Create a RAID-5 volume using all three disk drives.
D. Mirror the volume containing the %systemroot% folder on one of the disk drives. Create a spanned volume using the other two disk drives.

>> !
Answer: B

The best performance will be achieved by creating a striped volume using the three remaining disk drives. This is not a fault-tolerant solution, but it does provide the best performance because data is written evenly across all the disks in the volume set. You do not increase performance when using a spanned volume, since Windows 2000 uses up the space available on one disk in a spanned volume before using space on another disk drive. Creating a RAID-5 volume gives you a fault-tolerant solution, but the overhead of calculating parity during write operations detracts from performance.


111. You install Windows 2000 Server on a computer. TCP/IP is the only networking protocol installed on the computer. The computer is configured as a DHCP client. When you restart the computer, you receive the message "One or more services failed to start." You log in and use Event Viewer to look at the system log. You notice that none of your network services started. What is the most likely reason these services did not start?

A. The network services are not configured to start automatically.
B. The network adapter card settings conflict with the settings for another device.
C. The computer could not contact a DHCP server.
D. The network cable is unplugged.

>> !
Answer: B

The most likely reason that none of the network services started is that the network adapter card settings conflict with the settings for another device on the system. Since network protocols and services are dependent on the network adapter card driver, the protocols and services will not initialize if the driver for the card is not loaded and initialized. The drivers for the network adapter card and the network protocols and services will load and initialize if the network cable is unplugged. If a computer cannot contact a DHCP server, the computer will use the Automatic Private IP Addressing (APIPA) feature of Windows 2000 and assign itself an address in the range of 169.254.0.0 to 169.254.255.255. By default, network services are configured to start automatically. Since Windows 2000 Server was recently installed, these values are most likely set to start automatically. If they were configured as disabled or for a manual start, you would not receive an error message when they fail to start.


112. You install WINS on a computer running Windows 2000 Server. You then install Windows 2000 Professional on a client computer and configure that computer as a WINS client. However, you unintentionally assign a computer name to this client that is the same as an existing computer on a different subnet. The existing computer is also a WINS client. What is the first step the WINS server takes when the new computer attempts to register with the WINS server?

A. It rejects the request from the new client.
B. It sends a name query request to the computer that has the name registered.
C. It contacts its replication partners to verify if the computer that currently has the name registered is one of their clients.
D. It directs the client to register its name with the secondary WINS server.

>> !
Answer: B

The WINS server sends a name query request to the computer that currently has the name registered. If this client responds, the WINS server sends a negative name registration response to the new client. If the existing client does not respond, the WINS server updates its registration information and sends a positive response to the new client. The WINS server does not contact replication partners to verify the existing client and it does not direct the client to register with another WINS server.


113. You manage a computer running Windows 2000 Server and Exchange Server 5.5. You want to optimize the performance of the server. Which setting should you enable for the File and Printer Sharing for Microsoft Networks in the properties of the local area connection of the computer?

A. Minimize memory used
B. Balance
C. Maximize data throughput for file sharing
D. Maximize data throughput for network applications

>> !
Answer: D

File and Printer Sharing for Microsoft Networks is the equivalent of the Windows NT 4.0 server service. This service is responsible for responding to requests from network clients to access shared resources on a computer. The properties of this service allow you to determine how memory should be allocated for this service. When a computer is running applications that manage their own memory caching, you should select the setting "Maximize data throughput for network applications". Exchange Server and SQL Server are examples of this type of application. You should select the setting "Minimize memory used" if the computer serves a small number of clients, typically 10 or less. You should select the setting "Balance" if the computer is used both by an interactive user and by network clients for access to shared resources. You should select the setting "Maximize throughput for file sharing" if the computer is primarily a file and print server. This is the default setting for computers running Windows 2000 Server.


114. You manage a computer running Windows 2000 Server for your department. Both application data and the home folders of the users in the department are stored on this server. You implement a backup scheme for this computer. For each backup, the option Back Up Everything on My Computer is selected. Each Sunday evening, a normal backup is done. On Monday through Friday, a differential backup is done. Each Wednesday, a copy backup is done after the differential backup. The disk drive on which the home folders are stored is damaged one Thursday morning. You replace that disk drive. What step or steps should you take to restore the home folders in the shortest amount of time possible?

A. Restore the tape from the normal backup. Then, restore the tape from the copy backup that was done on Wednesday.
B. Restore the tape from the differential backup that was done on Wednesday.
C. Restore the tape from the normal backup. Then, restore the tape from the differential backup that was done on Wednesday.
D. Restore the tape from the copy backup that was done on Wednesday.

>> !
Answer: D

The tape from the copy backup should be used. Although a copy backup does not clear the archive marker, it does back up all selected files and folders. You could restore the tape from the normal backup and then the tape from the differential backup that was done on Wednesday. However, this would take longer than restoring the tape from the copy backup. Restoring the tape from the normal backup and then the tape from the copy backup would take too long. Also, if files had been deleted between the normal backup and the copy backup, they would be restored with this process. Restoring just the tape from Wednesday's differential backup would restore only those files that had changed since Sunday, not all of the files.


115. You manage a computer running Windows 2000 Server on which the IIS is installed. This is a stand-alone server. You need to manage access to content of four virtual directories on this server. What utility should you use to create the accounts and local groups needed to control access?

A. Internet Information Services Snap-In
B. Users and Passwords in Control Panel
C. Local Users and Computers in Computer Management
D. Local Security Policy in Administrative Tools

>> !
Answer: C

You use Local Users and Computers in Computer Management to create users and groups in the Security Accounts Management (SAM) database of a standalone server. Users and Passwords in Control Panel is not available on a computer running Windows 2000 Server. It is available on a computer running Windows 2000 Professional. You do not define accounts using the Internet Information Services Snap-In. You can use it to define which accounts or groups have Operator privileges on a web site. Local Security Policy in Administrative Tools is used to manage policies for accounts, auditing, user rights, public keys, and IP Security.


116. You manage a computer running Windows 2000 Server on which the IIS is installed. This is a stand-alone server. You plan to use Security Templates to secure the computer. Which two policies cannot be configured using Security Templates? (Choose all that apply)

A. IP Security Policies
B. Registry
C. File System
D. Public Key Policies
E. System Services
F. Account Policies

>> !
Answer: A & D

You cannot use Security Templates to configure Public Key Policies and IP Security Policies. You can use Security Templates to configure Account Policies, Local Policies, Event Log settings, Restricted Groups, and settings for System Services, the Registry, and the File System.


117. You manage a computer running Windows 2000 Server that hosts web services, a database, and email services for your enterprise. You want to ensure that the web services do not use a disproportionate amount of network resources for the computer. What feature of Internet Information Services (IIS) 5.0 should you use to ensure that network resources are available for the database and email services running on this computer?

A. Out-of-process Pooling
B. Process Throttling
C. Bandwidth Throttling
D. Socket Pooling

>> !
Answer: C

The Bandwidth Throttling feature of IIS 5.0 allows an administrator to throttle the amount of available bandwidth used for web services for individual network adapter cards. Use of this feature can help insure that network bandwidth is available for other services. The Process Throttling feature of IIS 5.0 allows an administrator to limit the amount of processor time used by web services. The Socket Pooling feature of IIS 5.0 allows web sites on a computer that are bound to different IP addresses but the same port number to share sockets. This helps to minimize the use of non-paged memory for web services. The Out-of-process Pooling feature of IIS 5.0 allows web applications to run in a process that is separate from the Inetinfo process. The Inetinfo process is the IIS server process. Using the Out-of-process Pooling feature helps to insure the reliability of the web services, and uses less memory than having each web application run in its own process.


118. You manage a computer running Windows 2000 Server that is configured as a print server. You need to give clients running UNIX the ability to use a network-interface print device that is managed by your server. What type of port should you configure on the server for these clients?

A. Standard TCP/IP Port
B. Line Printer Remote Port
C. Lanman Print Services Port
D. Local Port

>> !
Answer: B

UNIX clients use the Line Printer Remote (LPR) utility to communicate with a print server running the Line Printer Daemon (LPD) service. You install Print Services for Unix (using Add/Remove Programs) to configure a print server to respond to LPR requests. You then configure an LPR port for these clients. The standard TCP/IP port is used to manage network interface print devices that are configured to use TCP/IP. Although you can configure this port type to use LPR, this configuration allows the print server to communicate with the print device using the LPR protocol instead of the Raw protocol. This does not enable the print server to respond to LPR requests from clients. A Local port can be used to manage a device that is connected to a parallel or serial port on the print server. It can also be used to redirect printing to a shared printer on another print server but not to a network interface print device that is not currently managed by a print server. A Lanman print services port is used to support clients running LAN Manager.


119. You manage a computer running Windows 2000 Server that is located at a branch office of your enterprise. The server is being used for a critical project, so you want to be able to manage it both from the computer in your office and from a computer at home. You also want another network administrator to be able to manage the server both from the office and from home. You install Terminal Services in Remote Administration mode on the server. You install the Terminal Services client on the two computers that you use and on the two computers that your fellow network administrator uses. All of these computers are running Windows 98. How many Terminal Services client access licenses must you configure to support this environment?

A. No licenses are needed.
B. Four licenses - one license for each administrative computer.
C. Two licenses - one license for each administrative user account.
D. One license for the computer running Terminal Services.

>> !
Answer: A

When Terminal Services is installed on a computer in Remote Administration mode, no Terminal Services client access licenses are required. However, at most two Remote Administration connections can be active concurrently. Terminal Services client access licenses are needed when Terminal Services is running in Application Server mode. There must be one client access license for each concurrent connection. A Terminal services client access license is not required for users who connect to the Terminal Services computer from a computer running Windows 2000 Professional. There are two other options available when using Terminal Services in Application Server mode. An enterprise can purchase a Terminal Services Internet Connector License. This license allows up to 200 concurrent anonymous connections to a Terminal Services server. An enterprise can also purchase Work at Home Windows 2000 Terminal Services client access licenses for use on computers installed at the homes of employees.


120. You manage a computer running Windows 2000 Server. You install Gateway Service for NetWare on the computer and configure a gateway to a NetWare server. You want the Client for Microsoft Networks to use TCP/IP by default but to also use NWLink to access applications on the NetWare server. What step enables you to modify the bindings of the server's network adapter card to use TCP/IP first and NWLink second when using the Client for Microsoft Networks?

A. From Device Manager, access the properties of the network adapter card.
B. From Services in Computer Management, access the properties of the Workstation service.
C. From Network Connections in the Control Panel, access the properties of the Local Area Connection.
D. From Network Connections in the Control Panel, select Advanced Settings from the Advanced menu.

>> !
Answer: D

You use the Advanced Settings option in the Advanced menu of Network Connections to modify the binding order for protocols and services. You cannot modify the binding order from the properties of the Local Area Connection, the Workstation service, or the network adapter card.


121. You manage a Windows 2000 domain. The two domain controllers (DCs) for the domain are installed at the main office of your enterprise. One of the DCs is also a DNS server. You install Windows 2000 Server on a computer at the main office. When prompted to configure network settings, you choose Custom and manually configure an IP address. After completing the installation and installing software applications, you reconfigure the LAN connection’s TCP/IP properties to obtain an IP address automatically. You plan to install the computer at a branch office that is on a different subnet than the computers at the main office. The DHCP server at the branch office is configured with a scope that assigns an IP address, subnet mask, default gateway, and DNS server address with each lease. The DHCP server and the computer on which you install Windows 2000 Server both belong to the Windows 2000 domain. The DHCP server is authorized in Active Directory. When you start the computer running Windows 2000 server at the branch office and try to log on, you receive an error message that a DC cannot be located. What step should you take to insure that the server can locate a DC?

A. Configure a computer at the branch office as a DHCP relay agent.
B. Disable Automatic IP Addressing (APIPA) on that computer.
C. Convert the DNS zone for your domain to an Active Directory-Integrated zone.
D. In the TCP/IP properties of the Local Area Connection of the server, disable the option Use the following DNS server addresses.

>> !
Answer: D

When you select the option to obtain an IP address automatically in the Local Area Network connection’s TCP/IP properties, you should also disable the option Use the following DNS server addresses. Disabling this option enables the option Obtain DNS server address automatically, and allows the computer to obtain the DNS server address from a DHCP server. The option Use the following DNS server addresses is selected by default, but no DNS server addresses are added to the dialog box during installation. You do not need to convert the zone to an Active Directory-Integrated zone, even though the DNS service is installed on a domain controller. You do not need to configure a computer at the branch office as a DHCP relay agent because the DHCP server is at the branch office. You do not need to disable APIPA on that computer.


122. You manage a computer running Windows 2000 Server. You create a folder named DATA on a volume that is formatted as FAT32. You set these share permissions: The user account Tom is assigned the Read permission. The local group DataUpdate is assigned the Change permission. The local group DataManage is assigned the Full Control permission. The local group DataLimited is denied the Full Control permission. The user account Tom is assigned to the global group Acct. Acct is a member of DataUpdate and DataManage. The user account Tom is also assigned to the global group Clerks. Clerks is a member of DataLimited. What is Tom’s effective permission for the folder DATA when he accesses it from his computer running Windows 2000 Professional?

A. No access
B. Read
C. Full Control
D. Change

>> !
Answer: A

If the Full Control permission for a shared folder is denied to a user or to a group to which the user belongs, the user will not be able to access the shared folder. Selecting deny for the Full Control permission also enables deny for the Read and Change permissions. Without the Read permission, a user cannot view the contents of a shared folder. If a user or a group to which a user belongs has not been denied access, the user’s effective permission is the combination of the permissions assigned to the user and to all the groups to which the user belongs. Thus, the least restrictive of the permissions applies. NTFS permissions are more granular than share permissions. With NTFS, you could deny a specific permission to a user while granting another permission. For example, you could deny the Read permission while allowing the Write permission.


123. You manage a computer running Windows 2000 Server. After installing Windows 2000 Server, you run the command winnt32 /cmdcons. Later, the master boot record on this computer is corrupted. What procedure can you use to repair the master boot record when you restart the system?

A. Select the recovery console option from the startup menu.
B. Start the computer from the Windows 2000 Server CD-ROM and choose the repair option.
C. Press F8 to select the Advanced Startup Options. Select Safe Mode.
D. Press F8 to select the Advanced Startup Options. Select Last Known Good Configuration.

>> !
Answer: B

You must start the computer from the Windows 2000 Server CD-ROM and choose the repair option. Then, you press C to start the Recovery Console and use the fixmbr command to repair the master boot record. When the master boot record is corrupt, the startup menu cannot be displayed. The master boot record cannot be repaired from either Safe Mode or by using the Last Known Good Configuration.


124. You manage a computer running Windows NT Server 4.0 that is a file and print server. Your system and boot partitions are mirrored using Windows NT disk mirroring, and the system is protected by an Uninterruptible Power Supply (UPS). Both partitions are formatted with FAT. The system partition is 300 MB, and the boot partition is 1500 MB. The system has 128 MB of RAM. You perform a full backup of the system. Rather than upgrading the system from Windows NT, you plan to do a fresh installation of Windows 2000 Server. What steps should you take before you start the installation on this computer? (Choose all that apply)

A. Convert the boot partition to NTFS.
B. Disable the mirror.
C. Extend the boot partition to 2000 MB.
D. Increase the RAM to 256 MB.
E. Disconnect the UPS device.

>> !
Answer: B & E

You should disable the mirror. You can reestablish the mirror after you complete the installation. You should also disconnect the UPS device because the Windows 2000 setup process attempts to detect devices connected to serial ports and may not detect the UPS device properly. You can reconfigure the UPS to work with Windows 2000 after completing the installation. The RAM does not need to be increased to 256 MB. The minimum amount of RAM required is 64 MB for up to 5 clients. The recommended minimum amount for a file and print server is 128 MB. You should use System Monitor to determine if this is adequate to support the system load. The boot partition does not have to be converted to NTFS nor does it need to be extended. A partition cannot be extended unless it is formatted with NTFS. If the computer will be a domain controller, you must have a partition that is formatted as NTFS to support the shared system volume (sysvol). This is usually stored on the boot partition, but can be stored in a separate partition.


125. You manage a computer running Windows 2000 Server. The server has two disk drives, both configured as dynamic disks. Disk 0 contains one partition, drive C, the system and boot partition. Drive C is mirrored to Disk 1. When you start Disk Management, you notice that the status of Drive C is listed as Failed Redundancy (At Risk). The status of Disk 1 is Missing. What steps should you take to replace the failed member of the mirrored volume with a new disk?

A. Use the Remove Mirror option from the context menu of Drive C on Disk 0 in Disk Management. Replace Disk 1 with another disk drive. Convert the new Disk 1 to a dynamic disk. Use the Add Mirror option from the context menu of Drive C in Disk Management.
B. Remove Disk 1. Use the Repair Volume option from the context menu of Drive C in Disk Management. Replace Disk 1 with another disk drive. Use the Add Mirror option from the context menu of Drive C in Disk Management.
C. Use the Break Mirror option from the context menu of Drive C on Disk 0 in Disk Management. Replace Disk 1 with another disk drive. Start the system in safe mode. Use the Resynchronize Mirror option from the context menu of Drive C in Disk Management.
D. Remove Disk 1. Use the Repair Volume option from the context menu of Drive C in Disk Management. Replace Disk 1 with another disk drive. Use the Resynchronize Mirror option from the context menu of Drive C in Disk Management.

>> !
Answer: A

When the status of a disk drive is Missing, the system cannot access the drive. You must use the Remove Mirror option to break the mirror, replace the failed disk drive, convert the new drive to a dynamic disk, and then use the Add Mirror option to recreate the mirror. The Repair Volume option is not used when the status of a disk drive is Missing. You do not need to start the system in Safe Mode to replace the failed member of a mirrored volume. You cannot use the Break Mirror option if one of the drives in the mirrored volume is not functional.


126. You manage a Windows 2000 domain. You want to ensure that the clocks on all computers in the domain are synchronized. In which node of the Security Settings Snap-In can you configure this option?

A. Account Policies\Account Lockout Policy
B. Account Policies\Kerberos Policy
C. Account Policies\Password Policy
D. Local Policy\Security Options

>> !
Answer: B

You can configure this option by using the setting "Maximum tolerance for computer clock synchronization" in the Account Policies\Kerberos Policy node. You use the Password Policy node to define settings such as the minimum password length, password expiration time, and password history. You use the Account Lockout Policy to define settings such as the number of failed logon attempts that will trigger a lockout and the time after which a lockout will expire. You use Security Options to manage advanced auditing and user rights.


127. You manage a computer running Windows 2000 Server. You create a file in a folder on an NTFS partition of the computer. You configure the following NTFS permissions for the file: Authenticated Users - Read & Execute, Read Accounting - Full Control Jack - Deny Write Accounting is a local group. Jack is a member of the group Accounting. What is Jack’s effective permission(s) for the file?

A. Full Control.
B. Read & Execute, Read.
C. No access.
D. Cannot be determined - it depends on the parent folder permissions.

>> !
Answer: B

Jack’s effective permissions are Read & Execute and Read. As a member of the group Accounting, he has Full Control. However, since he is denied the Write permission, and a Deny overrides an Allow, he cannot modify the file. He can still read or execute the file. Unlike NTFS permissions in Windows NT 4.0, you can deny a specific permission for a group or user, but allow other permissions. In Windows NT 4.0, designating No Access to a file for a user takes precedence over any other permissions assigned to groups to which the user belongs. In Windows 2000, denying a specific permission does not affect other permissions that are allowed. The effective NTFS permissions for a user are the combination of permissions assigned to the user and to all groups to which the user belongs. File permissions take precedence over permissions assigned to the parent folder of the file. If a specific permission is denied for the user or any groups to which the user belongs, the user will be blocked from using that permission.


128. You manage a Windows 2000 domain. The DNS service is installed on two computers running Windows 2000 Server, a domain controller (DCA) and a member server (MS). DCA is a primary name server. MS is a secondary name server. You convert the forward lookup zone and reverse lookup zone to Active Directory-integrated zones. Which computers can respond to DNS queries from clients?

A. Only the domain controller DCA.
B. The domain controller DCA and the member server MS.
C. Only the domain controllers for the domain.
D. All domain controllers for the domain and the member server MS.

>> !
Answer: B

Only the computers on which the DNS service is installed can respond to DNS queries. In this scenario, both DCA and MS can respond to requests. A member server can be a secondary DNS server even with Active Directory-Integrated zones configured. DCA can be configured as a master server for MS. When a DNS zone is converted to an Active Directory-Integrated zone, the zone data is stored in Active Directory and is replicated to all domain controllers in the domain. A domain controller that is also a DNS server reads the zone data from Active Directory and can use a standard zone transfer to transfer it to a secondary DNS server. Domain controllers on which the DNS service is not installed do not respond to DNS queries.


129. You manage a Windows 2000 domain that includes 50 client computers running Windows NT Workstation 4.0. You have a system policy that manages the desktops of users on these computers. Your enterprise recently implemented Exchange Server 5.5, and you are planning the rollout of Outlook 2000 to the client machines. You want to manage the Outlook 2000 configuration settings from your system policy. What steps can you take to configure the settings for Outlook 2000 in the system policy?

A. In System Policy Editor, add the .adm file that is delivered with Outlook 2000 to the list of templates. Open a new system policy. Import the existing system policy. Configure the settings for Outlook 2000. Save the new system policy as ntconfig.pol, and overwrite the existing policy.
B. In System Policy Editor, add the .adm file that is delivered with Outlook 2000 to the list of templates. Open the existing system policy. Configure the settings for Outlook 2000. Save the system policy.
C. Open a new system policy in System Policy Editor. Import the .adm file that is delivered with Outlook 2000. Configure the settings for Outlook 2000. Save the new system policy as ntconfig.pol, and overwrite the existing policy.
D. Open the existing system policy in System Policy Editor. Import the .adm file that is delivered with Outlook 2000. Configure the settings for Outlook 2000. Save the system policy.

>> !
Answer: B

You can add the Outlook 2000 template file to System Policy Editor, then open the existing system policy, configure the settings, and save the file. You cannot import an existing policy into a new policy You cannot add a template or import a template with System Policy Editor after you open a policy file.


130. You manage three domain controllers (DCs) for a Windows 2000 domain. The copy of Active Directory on one DC becomes corrupt. You start the computer in Directory Service Restore Mode. In addition to the Active Directory, what other information can you restore only when in this mode?

A. Registry Files
B. System Boot Files
C. Sysvol Directory Files
D. Certificate Services Database

>> !
Answer: C

Both the Sysvol Directory and the Active Directory can only be restored while in Directory Service Restore Mode. Registry files, system boot files, and the Certificate Services database can be restored by using the restore operation of the Backup utility whether or not the system is in Directory Service Restore Mode.