

MCQOPTIONS
This section includes 4320 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
51. |
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again. |
A. | Set the CrashonAuditFail registry key to 0 |
B. | Set the Security Log to overwrite events as needed |
C. | Delete the Liscense Trial registry key |
D. | Increase the size of the security log |
E. | Save the security log to a file, and clear it every morning |
Answer» B. Set the Security Log to overwrite events as needed | |
52. |
You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do? |
A. | Convert both to dynamic disks |
B. | Create an empty extended partition on new disk |
C. | Create a single unformatted primary partition on new array |
D. | Format new disk array as a single NTFS primary partition |
E. | Format the new disk array as a single NTFS logical drive in an extended partition |
Answer» B. Create an empty extended partition on new disk | |
53. |
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do? |
A. | Move the intranet server to the client segment of the network |
B. | Move the proxy server to the server segment of the network |
C. | Configure each client computer to bypass the proxy server for local addresses |
D. | Configure each client computer to use port 81 for the proxy server |
E. | None of above |
Answer» D. Configure each client computer to use port 81 for the proxy server | |
54. |
You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do? |
A. | Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package |
B. | Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy |
C. | Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy |
D. | Place the service pack in a Distributed file system (Dfs) |
E. | None of above |
Answer» C. Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy | |
55. |
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption? |
A. | CHAP |
B. | MS-CHAP v2 |
C. | PAP |
D. | SPAP |
E. | None of above |
Answer» C. PAP | |
56. |
You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do? |
A. | During the text mode portion of the Windows 2000 setup install the customized HAL |
B. | After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition |
C. | After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup |
D. | After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL |
E. | None of above |
Answer» B. After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition | |
57. |
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do? |
A. | Add the APP1 and APP2 instances to the processor time counter for the process object |
B. | Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object |
C. | Add only the NTVDM instance for the percent processor time counter for the process object |
D. | Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object |
E. | None of above |
Answer» E. None of above | |
58. |
Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_6r_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do? |
A. | Restart the computer by using the last known good menu option |
B. | Perform an emergency repair and select fast repair, restart the computer |
C. | Restart the computer in the safe mode, remove the driver and restart the computer |
D. | Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver |
E. | None of above |
Answer» E. None of above | |
59. |
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first? |
A. | Replace the third disk and restart the server. Use disk Management to repair the volume |
B. | Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk |
C. | Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume |
D. | Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition |
E. | None of above |
Answer» C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume | |
60. |
How can you assign an application to one processor exclusively? |
A. | Right click on application executable, select properties and select assign processor |
B. | Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor |
C. | Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor |
D. | Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor |
E. | None of above. |
Answer» C. Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor | |
61. |
You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do? |
A. | On the second partition, create a shared folder named Temp |
B. | In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk |
C. | Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new partition |
D. | Add a second hard disk. Delete the contents of the SystemrootYTemp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the SystemrootYTemp folder |
E. | None of above |
Answer» E. None of above | |
62. |
You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain. What should you do? |
A. | On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server |
B. | On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers |
C. | Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows2000 domain as the existing Windows NT domain |
D. | Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart the Windows NT PDC on the network and demote it to a BDC |
E. | None of above |
Answer» B. On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers | |
63. |
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next? |
A. | Replace Disk 1 and restart the computer. The mirror will automatically regenerate |
B. | Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1 |
C. | Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer |
D. | Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror |
E. | None of above |
Answer» C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer | |
64. |
You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do? |
A. | Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive |
B. | Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen |
C. | Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers |
D. | Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers |
E. | None of above |
Answer» C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers | |
65. |
Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem? |
A. | Create a new hardware profile |
B. | Use Device Manager to remove the integrated 10-MB Ethernet adapter |
C. | Use Device Manager to disable the integrated 10-MB Ethernet adapter |
D. | Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot system32 Driver Cache folder |
E. | None of above |
Answer» D. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot system32 Driver Cache folder | |
66. |
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do? |
A. | Apply a less restrictive custom security template to DC1 |
B. | Apply a less restrictive custom policy to Windows NT domain controller |
C. | Ensure the Windows 2000 domain is configured in the mixed mode |
D. | Ensure the Windows 2000 domain is configured to run in the native mode |
E. | None of above |
Answer» B. Apply a less restrictive custom policy to Windows NT domain controller | |
67. |
Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved? |
A. | Compress the files in her home folder to save disk space |
B. | Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level |
C. | Move some of the files from her home folder to the IN_PROGRESS shared folder |
D. | Remove files from her home folder until the total uncompressed file size is less than 100 MB |
E. | None of above |
Answer» E. None of above | |
68. |
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first? |
A. | Replace the third disk and restart the server. Use Disk Management to repair the volume |
B. | Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk |
C. | Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume |
D. | Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition |
E. | None of above |
Answer» C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume | |
69. |
You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server? |
A. | Install Network Monitor on Monitor 1 |
B. | Install Network Monitor on Application Server |
C. | Configure the network monitor ECP port something for TCP |
D. | Configure the network monitor EDP port something for UDP |
E. | Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance |
Answer» D. Configure the network monitor EDP port something for UDP | |
70. |
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do? |
A. | Use Computer Management to stop and restart the Server service |
B. | Use Computer Management to stop and restart the Workstation service |
C. | Use Task Manager to end any related child processes |
D. | Use Task Manager to end and automatically restart the Explorer.exe process |
E. | None of above |
Answer» D. Use Task Manager to end and automatically restart the Explorer.exe process | |
71. |
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do? |
A. | Configure a client computer to use only TCP/IP for the connections to the remote access server |
B. | Configure the client computer to use a defined IPX network address for the connection to the remote access servers |
C. | Configure the remote access server to allow IPX based remote access demand dial connections |
D. | Configure the remote access server to disable multi-link connection |
E. | None of above |
Answer» E. None of above | |
72. |
You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do? |
A. | Enable the background refresh settings to use the default group policy refresh date |
B. | Enable the asynchronous group policy application settings |
C. | Enable and configure the group policy refresh interval for domain controller |
D. | Enable and configure the group policy refresh interval for computers |
E. | None of above |
Answer» E. None of above | |
73. |
Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers? |
A. | Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone |
B. | Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone |
C. | Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone |
D. | Configure at least two servers with Active Directory integrated primary zones for the domain |
E. | Configure at least two servers with standard primary zones for the domain |
Answer» E. Configure at least two servers with standard primary zones for the domain | |
74. |
You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do? |
A. | Configure the settings for Internet Connecting Sharing to allow POP3 access |
B. | Configure the settings for Internet Connecting Sharing to allow SMTP access |
C. | Give David's user account administrator privileges on the Windows 2000 Server computer |
D. | Instruct David to log on as a domain administrator on the Windows 2000 Server computer |
E. | None of above |
Answer» D. Instruct David to log on as a domain administrator on the Windows 2000 Server computer | |
75. |
You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do? |
A. | Grant the users the right to log on as a service |
B. | Grant the users the right to log on locally |
C. | Grant the users the right to log on over the network |
D. | Copy the users' prpfiles to the Terminal server |
E. | Copy the users' home folders to the Terminal server |
Answer» C. Grant the users the right to log on over the network | |
76. |
How can you add Amit, a new user, to your system? |
A. | Using useradd |
B. | Using adduser |
C. | Using linuxconf |
D. | All of the above |
E. | None of the above |
Answer» E. None of the above | |
77. |
What does GNU stand for? |
A. | GNU's not Unix |
B. | Greek Needed Unix |
C. | General Unix |
D. | General Noble Unix |
E. | None of the above |
Answer» B. Greek Needed Unix | |
78. |
How many networks and nodes per network, are allowed by the Class B network? |
A. | 127 networks and 16,777,216 nodes per network |
B. | 16,384 networks and 65,534 nodes per network |
C. | 2,097,152 networks and 254 nodes per network |
D. | All of the above |
E. | None of the above |
Answer» C. 2,097,152 networks and 254 nodes per network | |
79. |
Which of the following NIS clients, finds and stores information about an NIS domain and server? |
A. | ypwhich |
B. | ypbind |
C. | ypcat |
D. | yppoll |
E. | None of the above |
Answer» C. ypcat | |
80. |
What command is used to remove jobs from the print queue? |
A. | lpq |
B. | lpr |
C. | lprm |
D. | lpc |
E. | None of the above |
Answer» D. lpc | |
81. |
Which of the following server is used with the BIND package? |
A. | httpd |
B. | shttp |
C. | dns |
D. | named |
E. | None of the above |
Answer» E. None of the above | |
82. |
What port does squid listen, by default? |
A. | 4322 |
B. | 2314 |
C. | 7334 |
D. | 3128 |
E. | None of the above |
Answer» E. None of the above | |
83. |
Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do? |
A. | Add the applications service accounts to the Domain Administrator Group |
B. | Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy |
C. | Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy |
D. | Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy |
E. | None of above |
Answer» D. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy | |
84. |
Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only. What should you do? |
A. | Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy |
B. | Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy |
C. | Set a Group Policy on all OUs containing computer accounts to enable the passwords must meet complexity requirements policy |
D. | Set a Group Policy on all OUs containing user accounts to enable the passwords must meet complexity requirements policy |
E. | None of above |
Answer» B. Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy | |
85. |
What layer of OSI determines the interface of the system with the user? |
A. | Session |
B. | Data-link |
C. | Application |
D. | Network |
E. | None of the above |
Answer» D. Network | |
86. |
What X-based tool is available for configuring the X Window system? |
A. | XConfigurator |
B. | XF86Setup |
C. | xf86config |
D. | All of the above |
E. | None of the above |
Answer» C. xf86config | |
87. |
Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do? |
A. | Configure a Group policy for the Domain that blocks all unsigned drivers |
B. | Configure a Group policy for the Default Domain Controller to block all unsigned drivers |
C. | Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers |
D. | Do nothing, this is the default setting |
E. | None of above |
Answer» D. Do nothing, this is the default setting | |
88. |
You configure your Windows 2000 Server as a print server. You install a second PnP Network adapter to improve the performance. The first adapter uses IRQ11, and the second adapter uses IRQ5. The server is now unable to print to print devices connected to a non-PnP LPT2 port adapter. You want to continue to use the print devices connected to your print server. What should you do? |
A. | Use device manager to change the IRQ for LPT1 to IRQ10 |
B. | Use device manager to change the IRQ for LPT2 to IRQ7 |
C. | Edit the CMOS setting of the servers BIOS to reserve IRQ7 for non-PnP devices |
D. | Edit the CMOS setting of the servers BIOS to reserve IRQ5 for non-PnP devices |
E. | None of above |
Answer» E. None of above | |
89. |
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do? |
A. | Restart the computer in safe mode. Then restart the computer again |
B. | Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command |
C. | Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command |
D. | Restart the computer by using the last known good configuration |
E. | None of above |
Answer» E. None of above | |
90. |
Your computer has a mirrored volume and you wish to now install the Recovery Console for future troubleshooting. How do you do this? |
A. | Reinstall Windows, this can only be applied during the installation |
B. | Break the mirror, run X: i386 winnt32.exe /cmdcons Reestablish the mirror |
C. | Run X: i386 winnt32.exe / cmdcons |
D. | Run the add and remove programs and add the recovery console |
E. | None of above |
Answer» C. Run X: i386 winnt32.exe / cmdcons | |
91. |
Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5. You want to resolve the problem. What should you do? |
A. | Use Device Manager to change the IRQ for the original modem to IRQ 9 |
B. | Use Device Manager to change the IRQ for the original modem to IRQ 10 |
C. | Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices |
D. | Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices |
E. | None Of above |
Answer» D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices | |
92. |
Your network contains NetWare 4.0 Servers. You have successfully installed Client Service for NetWare on Windows 2000 Professional computers, and Gateway Service for NetWare on Windows 2000 Server Computers. You recently added a new Windows 2000 Server computer to the network and installed Gateway Service for NetWare on it. However, the server is unable to connect to any NetWare servers. What should you do on the new Windows 2000 Server computer to resolve this problem? |
A. | Enable NWLink NetBIOS |
B. | Configure the NWLink IPX/SPX/ NetBIOS Compatible Transport Protocol to use the correct Ethernet frame type |
C. | Install RIP routing for IPX |
D. | Install the SAP Agent |
E. | None of above. |
Answer» C. Install RIP routing for IPX | |
93. |
What command is used to count the total number of lines, words, and characters contained in a file? |
A. | countw |
B. | wcount |
C. | wc |
D. | count p |
E. | None of the above |
Answer» D. count p | |
94. |
You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do? |
A. | Convert the disk to dynamic disk shut doWn and restart the server |
B. | Backup the data on the stripe volume and delete the stripe volume. Create a raidS volume on the four disks, restore the data to the new raid5 volume |
C. | Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down and restart the server. Restore the data to new mirror volumes |
D. | Backup the data on the stripe volume and delete the stripe |
E. | None of above |
Answer» C. Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down and restart the server. Restore the data to new mirror volumes | |
95. |
Your company's network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out that was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Services. The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application. What should you do to enable the IT department to control users' sessions? |
A. | Configure the Terminal server to run in Remote Administration mode |
B. | Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server |
C. | Add the members of the IT department to the Power Users group on the Terminal server |
D. | Use third-party software to enable remote control of users' sessions |
E. | None of above |
Answer» C. Add the members of the IT department to the Power Users group on the Terminal server | |
96. |
Which command is used to sort the lines of data in a file in reverse order |
A. | sort |
B. | sh |
C. | st |
D. | sort -r |
E. | None of the above |
Answer» E. None of the above | |
97. |
You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do? |
A. | Copy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs |
B. | Copy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator |
C. | Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000 |
D. | Copy the Windows NT 4.0 printer drivers to the Winnt System32 pri liter s dri vers folder on the Windows 2000 print server |
E. | None of above |
Answer» D. Copy the Windows NT 4.0 printer drivers to the Winnt System32 pri liter s dri vers folder on the Windows 2000 print server | |
98. |
What command is used with vi editor to delete a single character? |
A. | x |
B. | y |
C. | a |
D. | z |
E. | None of the above |
Answer» B. y | |
99. |
What hardware architectures are not supported by Red Hat? |
A. | SPARC |
B. | IBM-compatible |
C. | Alpha |
D. | Macintosh |
E. | None of the above |
Answer» E. None of the above | |
100. |
What command is used to remove the directory? |
A. | rdir |
B. | remove |
C. | rd |
D. | rmdir |
E. | None of the above |
Answer» E. None of the above | |