

MCQOPTIONS
This section includes 4320 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
1. |
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do? |
A. | Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server |
B. | Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server |
C. | Delete all references to modems in the registry |
D. | Run the Modem troubleshooter and remove the modem when prompted. Restart the server |
E. | None of above |
Answer» B. Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server | |
2. |
You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific Client-Server application to run on, because the application gets very slow returning query data. You want to have the fastest possible access for the Client-Server App to the HDD's. Which Raid should you apply? |
A. | RAID0 |
B. | RAID1 |
C. | RAIDS |
D. | RAID2 |
E. | None of above |
Answer» B. RAID1 | |
3. |
Your network is configured as shown in the exhibit. "Engineering! and Salesl have DHCP installed up them." All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Salesl and Sales2. The engineering department uses another subnet and has servers named Engineeringl and Engineering2. Salesl and Engineeringl are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Salesl and Engineeringl to support client computers on each other's subnets. What should you do? |
A. | Set the router option in the DHCP Scopes to 192.168.2.1 for Engineeringl and 192.168.1.1 for Salesl |
B. | On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol |
C. | On Engineering2 and Sales2, install and configure the DHCP Relay Agent service |
D. | Configure Engineering2 and Sales2 as DHCP servers without any scopes |
E. | None of above |
Answer» D. Configure Engineering2 and Sales2 as DHCP servers without any scopes | |
4. |
How can you recreate the PTR record in your Windows 2000 DNS server from you Windows 2000 client? |
A. | Run ipconfig /registerdns from the client |
B. | Run ipconfig all /registerdns from the DNS server |
C. | Start the DNS Dynamic service on your client computer |
D. | Create a host file with the #DYNAMIC command on the client computer |
E. | None of above |
Answer» B. Run ipconfig all /registerdns from the DNS server | |
5. |
You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection.to the remote location? |
A. | NAT does not allow for remote networking |
B. | L2TP does not work with Windows 2000 computers |
C. | You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted |
D. | You have not configured the NAT server to translate the IP Security packets |
E. | None of above |
Answer» D. You have not configured the NAT server to translate the IP Security packets | |
6. |
You install Internet Information Services 5.0 on a computer running Windows 2000 Server. You create two new department web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales web site while a developer updates the contents of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive? |
A. | The user will be redirected to an alternate default page for the Sales site's home directory |
B. | The user will be redirected to the Default Web site home page |
C. | The user will receive a 403.2 -Read Access Forbidden error message |
D. | The user will receive a 404 - File Not Found error message |
E. | None of above |
Answer» C. The user will receive a 403.2 -Read Access Forbidden error message | |
7. |
You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with a single NTFS partition. You use a third-party tool to add a new partition to the disk. When you restart the server, you received the following error message: "Windows 2000 could not start because the following file is missing or corrupt: system32 ntoskrnl.exe. Please re-install a copy of the above file." What should you do to resolve the problem? |
A. | Start the computer by using the Recovery Console. Run System File Checker |
B. | Start the computer by using the Recovery Console. Modify the Partition parameter in the operating system path in C: Boot.ini |
C. | Start the emergency repair process. Choose the option to repair system files |
D. | Start the computer in safe mode with command prompt. Modify the Partition parameter in the operating system path in C: boot.ini |
E. | None of above |
Answer» C. Start the emergency repair process. Choose the option to repair system files | |
8. |
You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server. What should you do? |
A. | Install the Windows 2000 Resource Kit |
B. | Install Windows critical update notification |
C. | Configure system file checker to notify the branch offices |
D. | Configure Windows file protection to notify the branch offices |
E. | None of above |
Answer» C. Configure system file checker to notify the branch offices | |
9. |
You install the Routing and Remote Access service on a Windows 2000 Server computer in your network. Your network is not directly connected to the Internet and uses the private IP address range 192.168.0.0. When you use Routing and Remote Access to dial in to the server, your computer connects successfully, but you are unable to access any resources. When you try to piiig servers by using their IP addresses, you receive the following message: "Request timed out." When you run the ipconfig command, it shows that your dial-up connection has been given the IP address 169.254.75.182. What should you do to resolve the problem? |
A. | Configure the remote access server with the address of a DHCP server |
B. | Authorize the remote access server to receive multiple addresses from a DHCP server |
C. | Configure the remote access server to act as a DHCP Relay Agent |
D. | Ensure that the remote access server is able to connect to a DHCP server that has a scope for its subnet |
E. | None of above |
Answer» E. None of above | |
10. |
You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task? |
A. | Enable Anonymous access for the intranet server |
B. | Enable Anonymous access for the Sales virtual directory |
C. | Remove Nate fmm the Intern group |
D. | Make Nate a member of the Security group |
E. | None of above |
Answer» E. None of above | |
11. |
You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks? |
A. | Convert all three disks to dynamic disks. Create a striped volume |
B. | Convert all three disks to dynamic disks. Create a RAID-5 volume |
C. | Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1 |
D. | Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks |
E. | None of above |
Answer» B. Convert all three disks to dynamic disks. Create a RAID-5 volume | |
12. |
You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do? |
A. | Extend the span volume to include the new disk, rescan the disk |
B. | Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data |
C. | Re scan the disk, format the span volume. Use windows back up to restore the data |
D. | Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data |
E. | Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data |
Answer» F. | |
13. |
You have configured a Group Policy Object (GPO) for the marketing oranization unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do? |
A. | Add the Managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy |
B. | Add the Managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the Group Policy |
C. | Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Deny the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to deny the ability to run system Control Policy Panel. Give the original GPO a higher priority than the new GPO |
D. | Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Disable the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the original GPO a higher priority than the new GPO |
E. | None of above |
Answer» E. None of above | |
14. |
You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full backups of each domain controller. You run a script to make changes to account information in Active Directory. As a result of errors in the script, the incorrect user accounts are modified. Active Directory replication then replicates the changes to the other two domain controllers. You want to revert Active Directory to the version that was backed up the previous day. What should you do? |
A. | On a single domain controller, use Windows Backup to restore the System State data. Shut down and restart the computer |
B. | Shut down and restart a single domain controller in directory services restore mode. Use Windows Backup to restore the System State data. Run the Ntdsutil utility. Restart the computer |
C. | Shut down, and restart a single domain controller by using the Recovery Console. Use Windows Backup to restore the System State data. Exit the Recovery Console. Restart the computer |
D. | Shut down and restart each domain controller by using the Recovery Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery Console. Restart the computer |
E. | None of above |
Answer» C. Shut down, and restart a single domain controller by using the Recovery Console. Use Windows Backup to restore the System State data. Exit the Recovery Console. Restart the computer | |
15. |
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do? |
A. | Ensure that the log type is set to W3C |
B. | Change the log rollover property in the website's logging properties |
C. | Change the time zone setting in the time properties on the web server |
D. | Configure the time service on the web server to use local system account |
E. | None of above |
Answer» C. Change the time zone setting in the time properties on the web server | |
16. |
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do? |
A. | Configure an ADM template and add the template to the GPO |
B. | Configure,an INF policy and add the policy to the GPO |
C. | Configure a Microsoft Windows Installer package and add the package to the GPO |
D. | Configure RIS to include the registry entry |
E. | None of above |
Answer» B. Configure,an INF policy and add the policy to the GPO | |
17. |
Which of the following command is used to access an SMB share on a Linux system? |
A. | NFS |
B. | SMD |
C. | smbclient |
D. | smbserver |
E. | None of the above |
Answer» D. smbserver | |
18. |
Which of the following command is used to see the services running in NFS server? |
A. | rpcinfo |
B. | serverinfo |
C. | NFSinfo |
D. | infserv |
E. | None of the above |
Answer» B. serverinfo | |
19. |
What protocol(s) is(are) allowed a user to retrieve her/his mail from the mail server to her/his mail reader? |
A. | POP3 |
B. | FTP |
C. | MAP |
D. | All of the above |
E. | None of the above |
Answer» B. FTP | |
20. |
What project is currently developing X server support? |
A. | XFree86 Project, Inc. |
B. | RHAD Labs |
C. | GNOME Project |
D. | All of the above |
E. | None of the above |
Answer» B. RHAD Labs | |
21. |
Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do? |
A. | Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/ GIANT |
B. | Install Microsoft Print Services for Unix on users* Computers. Create a network printer, and specify that the printer name is 10.1.1.99 GIANT |
C. | Create a network printer on PrintServ, and specify that the printer name is 16.1.1.99 GIANT. Share this printer and connect to it from users computers |
D. | Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers |
E. | None of above |
Answer» E. None of above | |
22. |
What command is used with vi editor to replace text from cursor to right |
A. | S |
B. | s |
C. | R |
D. | r |
E. | None of the above |
Answer» D. r | |
23. |
What command is used to list contents of directories? |
A. | tar |
B. | dir |
C. | lp |
D. | ls |
E. | None of the above |
Answer» E. None of the above | |
24. |
What command is used with vi editor to append text at end of line? |
A. | I |
B. | i |
C. | a |
D. | A |
E. | None of the above |
Answer» E. None of the above | |
25. |
What command is used to copy directory structures in and out? |
A. | copy |
B. | cp - p |
C. | cpio |
D. | cp |
E. | None of the above |
Answer» D. cp | |
26. |
In OSI network architecture, the dialogue control and token management are responsible of |
A. | data link layer |
B. | transport layer |
C. | network layer |
D. | session layer |
E. | None of the above |
Answer» E. None of the above | |
27. |
In which tcp_wrappers file can you specify to allow all connections from all hosts? |
A. | /etc/hosts.allow |
B. | /etc/hosts.deny |
C. | /etc/hosts |
D. | /etc/tcp.conf |
E. | None of the above |
Answer» B. /etc/hosts.deny | |
28. |
What command is used to display the characteristics of a process? |
A. | au |
B. | ps |
C. | du |
D. | pid |
E. | None of the above |
Answer» C. du | |
29. |
What command is not used to list the files chap01, chap02 and chap04? |
A. | ls chap* |
B. | ls chap[124] |
C. | ls - x chap0[124] |
D. | ls chap0[124] |
E. | None of the above |
Answer» C. ls - x chap0[124] | |
30. |
What does FSF stand for? |
A. | Free Software File |
B. | File Server First |
C. | First Serve First |
D. | Free Software Foundation |
E. | None of the above |
Answer» E. None of the above | |
31. |
Which of the following is a valid format for mounting a CD-ROM drive? |
A. | mount -t iso9660 /dev/cdrom / mnt/cdrom |
B. | mount /dev/cdrom |
C. | mount /mnt/cdrom |
D. | All of the above |
E. | None of the above |
Answer» E. None of the above | |
32. |
What command do you use to create Linux file systems? |
A. | fdisk |
B. | mkfs |
C. | fsck |
D. | mount |
E. | None of the above |
Answer» C. fsck | |
33. |
Which of the following command can you execute to count the number of lines in a file? |
A. | lc |
B. | wc - l |
C. | cl |
D. | count |
E. | None of the above |
Answer» C. cl | |
34. |
What command is used to sort the lines of data in a file in alphabetical order? |
A. | sort - r |
B. | st |
C. | sh |
D. | sort |
E. | None of the above |
Answer» E. None of the above | |
35. |
What command is used with vi editor to save file and remain in the editing mode? |
A. | x |
B. | q! |
C. | :w |
D. | :q |
E. | None of the above |
Answer» D. :q | |
36. |
What command is used with vi editor to move back to the beginning of a word? |
A. | w |
B. | e |
C. | a |
D. | b |
E. | None of the above |
Answer» E. None of the above | |
37. |
What sign is used to back up over typing errors in vi? |
A. | ! |
B. | $ |
C. | # |
D. | |
E. | @None of the above |
Answer» D. | |
38. |
What sign is used to erase or kill an entire line you have typed and start you are on a new line (but not display a new prompt)? |
A. | ! |
B. | $ |
C. | # |
D. | |
E. | @None of the above |
Answer» E. @None of the above | |
39. |
Which of the following is not a communication command? |
A. | grep |
B. | |
C. | mesg |
D. | write |
E. | None of the above |
Answer» B. mail | |
40. |
What command is used with vi editor to search a pattern in the forward direction? |
A. | ?? |
B. | // |
C. | ? |
D. | / |
E. | None of the above |
Answer» E. None of the above | |
41. |
What command is used to add printing jobs to the queue? |
A. | lpd |
B. | lpr |
C. | lpq |
D. | lpc |
E. | None of the above |
Answer» C. lpq | |
42. |
What file specifies the order in which to use specified name services? |
A. | /etc/services |
B. | /etc/nsorder |
C. | /etc/nsswitch.conf |
D. | /etc/hosts |
E. | None of the above |
Answer» D. /etc/hosts | |
43. |
How many primary partitions can exist on one drive? |
A. | 16 |
B. | 4 |
C. | 2 |
D. | 1 |
E. | None of the above |
Answer» C. 2 | |
44. |
How could you install the file ipchains-1.3.9-5.i386.rpm? |
A. | rpm -qip ipchains |
B. | rpm -Uvh ipchains |
C. | rpm -i ipchains* .i386.rpm |
D. | rpm -e ipchains-1.3.9-5.i386.rpm |
E. | None of the above |
Answer» D. rpm -e ipchains-1.3.9-5.i386.rpm | |
45. |
What service is used to translate domain names to IP addresses? |
A. | NFS |
B. | SMB |
C. | NIS |
D. | DNS |
E. | None of the above |
Answer» E. None of the above | |
46. |
Which of the following command is used to create a Linux installation boot floppy? |
A. | mkboot disk |
B. | bootfp disk |
C. | ww and rawwrite |
D. | dd and rawrite |
E. | None of the above |
Answer» E. None of the above | |
47. |
You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem? |
A. | Convert the disk that contains the shared folders to a dynamic disk |
B. | Convert the partition that contains the shared folders to NTFS |
C. | Defragment the disk that contains the shared folders |
D. | Move the paging file to the partition that contains the shared folders |
E. | None of above |
Answer» D. Move the paging file to the partition that contains the shared folders | |
48. |
You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application? |
A. | End the task named Application |
B. | End the Application.exe process |
C. | End the Application.exe process tree |
D. | End both the Explorer.exe process and the Application.exe process |
E. | None of above |
Answer» D. End both the Explorer.exe process and the Application.exe process | |
49. |
You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do? |
A. | Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume |
B. | Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume |
C. | Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command |
D. | Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility |
E. | None of above |
Answer» B. Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume | |
50. |
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do? |
A. | Install Active Directory on the server |
B. | Select Basic Authentication check box |
C. | Clear the Allow Anonymous Connection check box |
D. | Disable the IUSE_inta user account on Intra |
E. | Clear the Allow IIS to Control Password check box |
Answer» D. Disable the IUSE_inta user account on Intra | |