

MCQOPTIONS
Saved Bookmarks
This section includes 61 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What shouldyou do? |
A. | nstall Active Directory on the server |
B. | elect Basic Authentication check box |
C. | lear the Allow Anonymous Connection check box |
D. | isable the IUSE_inta user account on Intra |
E. | lear the Allow IIS to Control Password check box |
Answer» D. isable the IUSE_inta user account on Intra | |
2. |
You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to theprinterfromWindowsNT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do? |
A. | opy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs |
B. | opy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator |
C. | hange the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000 |
D. | opy the Windows NT 4.0 printer drivers to the WinntSystem32 pri liter sdri vers folder on the Windows 2000 print server |
E. | one of above |
Answer» D. opy the Windows NT 4.0 printer drivers to the WinntSystem32 pri liter sdri vers folder on the Windows 2000 print server | |
3. |
Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved? |
A. | Compress the files in her home folder to save disk space |
B. | Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level |
C. | Move some of the files from her home folder to the IN_PROGRESS shared folder |
D. | Remove files from her home folder until the total uncompressed file size is less than 100 MB |
Answer» E. | |
4. |
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do? |
A. | Use Computer Management to stop and restart the Server service |
B. | Use Computer Management to stop and restart the Workstation service |
C. | Use Task Manager to end any related child processes |
D. | Use Task Manager to end and automatically restart the Explorer.exe process |
Answer» D. Use Task Manager to end and automatically restart the Explorer.exe process | |
5. |
Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_6r_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do? |
A. | Restart the computer by using the last known good menu option |
B. | Perform an emergency repair and select fast repair, restart the computer |
C. | Restart the computer in the safe mode, remove the driver and restart the computer |
D. | Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver |
Answer» E. | |
6. |
You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do? |
A. | On the second partition, create a shared folder named Temp |
B. | In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk |
C. | Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new partition |
D. | Add a second hard disk. Delete the contents of the SystemrootYTemp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the SystemrootYTemp folder |
Answer» E. | |
7. |
Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem? |
A. | Create a new hardware profile |
B. | Use Device Manager to remove the integrated 10-MB Ethernet adapter |
C. | Use Device Manager to disable the integrated 10-MB Ethernet adapter |
D. | Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder |
Answer» D. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder | |
8. |
You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do? |
A. | Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume |
B. | Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume |
C. | Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command |
D. | Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility |
Answer» B. Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume | |
9. |
You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain. What should you do? |
A. | On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server |
B. | On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers |
C. | Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows2000 domain as the existing Windows NT domain |
D. | Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart the Windows NT PDC on the network and demote it to a BDC |
Answer» B. On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers | |
10. |
You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server? |
A. | Install Network Monitor on Monitor 1 |
B. | Install Network Monitor on Application Server |
C. | Configure the network monitor ECP port something for TCP |
D. | Configure the network monitor EDP port something for UDP |
Answer» D. Configure the network monitor EDP port something for UDP | |
11. |
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first? |
A. | Replace the third disk and restart the server. Use Disk Management to repair the volume |
B. | Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk |
C. | Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume |
D. | Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition |
Answer» C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume | |
12. |
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next? |
A. | Replace Disk 1 and restart the computer. The mirror will automatically regenerate |
B. | Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1 |
C. | Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer |
D. | Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror |
Answer» C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer | |
13. |
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption? |
A. | CHAP |
B. | MS-CHAP v2 |
C. | PAP |
D. | SPAP |
Answer» C. PAP | |
14. |
You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application? |
A. | End the task named Application |
B. | End the Application.exe process |
C. | End the Application.exe process tree |
D. | End both the Explorer.exe process and the Application.exe process |
Answer» D. End both the Explorer.exe process and the Application.exe process | |
15. |
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do? |
A. | Move the intranet server to the client segment of the network |
B. | Move the proxy server to the server segment of the network |
C. | Configure each client computer to bypass the proxy server for local addresses |
D. | Configure each client computer to use port 81 for the proxy server |
Answer» D. Configure each client computer to use port 81 for the proxy server | |
16. |
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do? |
A. | Add the APP1 and APP2 instances to the processor time counter for the process object |
B. | Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object |
C. | Add only the NTVDM instance for the percent processor time counter for the process object |
D. | Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object |
Answer» E. | |
17. |
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do? |
A. | Apply a less restrictive custom security template to DC1 |
B. | Apply a less restrictive custom policy to Windows NT domain controller |
C. | Ensure the Windows 2000 domain is configured in the mixed mode |
D. | Ensure the Windows 2000 domain is configured to run in the native mode |
Answer» B. Apply a less restrictive custom policy to Windows NT domain controller | |
18. |
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first? |
A. | Replace the third disk and restart the server. Use disk Management to repair the volume |
B. | Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk |
C. | Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume |
D. | Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition |
Answer» C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume | |
19. |
You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do? |
A. | Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive |
B. | Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen |
C. | Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers |
D. | Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers |
Answer» C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers | |
20. |
You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do? |
A. | Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package |
B. | Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy |
C. | Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy |
D. | Place the service pack in a Distributed file system (Dfs) |
Answer» C. Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy | |
21. |
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again. |
A. | Set the CrashonAuditFail registry key to 0 |
B. | Set the Security Log to overwrite events as needed |
C. | Delete the Liscense Trial registry key |
D. | Increase the size of the security log |
Answer» B. Set the Security Log to overwrite events as needed | |
22. |
You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem? |
A. | Convert the disk that contains the shared folders to a dynamic disk |
B. | Convert the partition that contains the shared folders to NTFS |
C. | Defragment the disk that contains the shared folders |
D. | Move the paging file to the partition that contains the shared folders |
Answer» D. Move the paging file to the partition that contains the shared folders | |
23. |
You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do? |
A. | Enable the background refresh settings to use the default group policy refresh date |
B. | Enable the asynchronous group policy application settings |
C. | Enable and configure the group policy refresh interval for domain controller |
D. | Enable and configure the group policy refresh interval for computers |
Answer» E. | |
24. |
Your network contains NetWare 4.0 Servers. You have successfully installed Client Service for NetWare on Windows 2000 Professional computers, and Gateway Service for NetWare on Windows 2000 Server Computers. You recently added a new Windows 2000 Server computer to the network and installed Gateway Service for NetWare on it. However, the server is unable to connect to any NetWare servers. What should you do on the new Windows 2000 Server computer to resolve this problem? |
A. | Enable NWLink NetBIOS |
B. | Configure the NWLink IPX/SPX/ NetBIOS Compatible Transport Protocol to use the correct Ethernet frame type |
C. | Install RIP routing for IPX |
D. | Install the SAP Agent |
Answer» C. Install RIP routing for IPX | |
25. |
You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific Client-Server application to run on, because the application gets very slow returning query data. You want to have the fastest possible access for the Client-Server App to the HDD's. Which Raid should you apply? |
A. | RAID0 |
B. | RAID1 |
C. | RAIDS |
D. | RAID2 |
Answer» B. RAID1 | |
26. |
You have configured a Group Policy Object (GPO) for the marketing oranization unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do? |
A. | Add the Managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the Group Policy |
B. | Add the Managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the Group Policy |
C. | Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Deny the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to deny the ability to run system Control Policy Panel. Give the original GPO a higher priority than the new GPO |
D. | Create a second GPO in the OU. Add the Managers group to the access control list. Allow the managers group to apply the Group Policy. Disable the Authenticated Users group permission to read and apply the Group Policy. Configure the new GPO to allow access to My Network Places. Give the original GPO a higher priority than the new GPO |
Answer» E. | |
27. |
Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do? |
A. | Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/ GIANT |
B. | Install Microsoft Print Services for Unix on users* Computers. Create a network printer, and specify that the printer name is \\10.1.1.99\GIANT |
C. | Create a network printer on PrintServ, and specify that the printer name is \\16.1.1.99\GIANT. Share this printer and connect to it from users computers |
D. | Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers |
Answer» E. | |
28. |
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do? |
A. | Configure an ADM template and add the template to the GPO |
B. | Configure,an INF policy and add the policy to the GPO |
C. | Configure a Microsoft Windows Installer package and add the package to the GPO |
D. | Configure RIS to include the registry entry |
Answer» B. Configure,an INF policy and add the policy to the GPO | |
29. |
Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do? |
A. | Add the applications service accounts to the Domain Administrator Group |
B. | Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy |
C. | Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy |
D. | Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy |
Answer» D. Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy | |
30. |
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do? |
A. | Install Active Directory on the server |
B. | Select Basic Authentication check box |
C. | Clear the Allow Anonymous Connection check box |
D. | Disable the IUSE_inta user account on Intra |
Answer» D. Disable the IUSE_inta user account on Intra | |
31. |
You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do? |
A. | Grant the users the right to log on as a service |
B. | Grant the users the right to log on locally |
C. | Grant the users the right to log on over the network |
D. | Copy the users' prpfiles to the Terminal server |
Answer» C. Grant the users the right to log on over the network | |
32. |
You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do? |
A. | Extend the span volume to include the new disk, rescan the disk |
B. | Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data |
C. | Re scan the disk, format the span volume. Use windows back up to restore the data |
D. | Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data |
Answer» E. | |
33. |
Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5. You want to resolve the problem. What should you do? |
A. | Use Device Manager to change the IRQ for the original modem to IRQ 9 |
B. | Use Device Manager to change the IRQ for the original modem to IRQ 10 |
C. | Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices |
D. | Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices |
Answer» D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices | |
34. |
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do? |
A. | Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server |
B. | Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server |
C. | Delete all references to modems in the registry |
D. | Run the Modem troubleshooter and remove the modem when prompted. Restart the server |
Answer» B. Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server | |
35. |
Your computer has a mirrored volume and you wish to now install the Recovery Console for future troubleshooting. How do you do this? |
A. | Reinstall Windows, this can only be applied during the installation |
B. | Break the mirror, run X:\i386\winnt32.exe /cmdcons Reestablish the mirror |
C. | Run X:\i386\winnt32.exe / cmdcons |
D. | Run the add and remove programs and add the recovery console |
Answer» C. Run X:\i386\winnt32.exe / cmdcons | |
36. |
You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with a single NTFS partition. You use a third-party tool to add a new partition to the disk. When you restart the server, you received the following error message: "Windows 2000 could not start because the following file is missing or corrupt: \system32\ntoskrnl.exe. Please re-install a copy of the above file." What should you do to resolve the problem? |
A. | Start the computer by using the Recovery Console. Run System File Checker |
B. | Start the computer by using the Recovery Console. Modify the Partition parameter in the operating system path in C:\Boot.ini |
C. | Start the emergency repair process. Choose the option to repair system files |
D. | Start the computer in safe mode with command prompt. Modify the Partition parameter in the operating system path in C:\boot.ini |
Answer» C. Start the emergency repair process. Choose the option to repair system files | |
37. |
You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do? |
A. | Configure the settings for Internet Connecting Sharing to allow POP3 access |
B. | Configure the settings for Internet Connecting Sharing to allow SMTP access |
C. | Give David's user account administrator privileges on the Windows 2000 Server computer |
D. | Instruct David to log on as a domain administrator on the Windows 2000 Server computer |
Answer» D. Instruct David to log on as a domain administrator on the Windows 2000 Server computer | |
38. |
Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do? |
A. | Configure a Group policy for the Domain that blocks all unsigned drivers |
B. | Configure a Group policy for the Default Domain Controller to block all unsigned drivers |
C. | Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers |
D. | Do nothing, this is the default setting |
Answer» D. Do nothing, this is the default setting | |
39. |
You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks? |
A. | Convert all three disks to dynamic disks. Create a striped volume |
B. | Convert all three disks to dynamic disks. Create a RAID-5 volume |
C. | Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1 |
D. | Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks |
Answer» B. Convert all three disks to dynamic disks. Create a RAID-5 volume | |
40. |
You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do? |
A. | During the text mode portion of the Windows 2000 setup install the customized HAL |
B. | After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition |
C. | After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup |
D. | After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL |
Answer» B. After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition | |
41. |
You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection.to the remote location? |
A. | NAT does not allow for remote networking |
B. | L2TP does not work with Windows 2000 computers |
C. | You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted |
D. | You have not configured the NAT server to translate the IP Security packets |
Answer» D. You have not configured the NAT server to translate the IP Security packets | |
42. |
You configure your Windows 2000 Server as a print server. You install a second PnP Network adapter to improve the performance. The first adapter uses IRQ11, and the second adapter uses IRQ5. The server is now unable to print to print devices connected to a non-PnP LPT2 port adapter. You want to continue to use the print devices connected to your print server. What should you do? |
A. | Use device manager to change the IRQ for LPT1 to IRQ10 |
B. | Use device manager to change the IRQ for LPT2 to IRQ7 |
C. | Edit the CMOS setting of the servers BIOS to reserve IRQ7 for non-PnP devices |
D. | Edit the CMOS setting of the servers BIOS to reserve IRQ5 for non-PnP devices |
Answer» E. | |
43. |
Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers? |
A. | Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone |
B. | Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone |
C. | Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone |
D. | Configure at least two servers with Active Directory integrated primary zones for the domain |
Answer» E. | |
44. |
You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do? |
A. | Convert both to dynamic disks |
B. | Create an empty extended partition on new disk |
C. | Create a single unformatted primary partition on new array |
D. | Format new disk array as a single NTFS primary partition |
Answer» B. Create an empty extended partition on new disk | |
45. |
You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task? |
A. | Enable Anonymous access for the intranet server |
B. | Enable Anonymous access for the Sales virtual directory |
C. | Remove Nate fmm the Intern group |
D. | Make Nate a member of the Security group |
Answer» E. | |
46. |
How can you assign an application to one processor exclusively? |
A. | Right click on application executable, select properties and select assign processor |
B. | Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor |
C. | Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor |
D. | Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor |
Answer» C. Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor | |
47. |
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do? |
A. | Ensure that the log type is set to W3C |
B. | Change the log rollover property in the website's logging properties |
C. | Change the time zone setting in the time properties on the web server |
D. | Configure the time service on the web server to use local system account |
Answer» C. Change the time zone setting in the time properties on the web server | |
48. |
You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server. What should you do? |
A. | Install the Windows 2000 Resource Kit |
B. | Install Windows critical update notification |
C. | Configure system file checker to notify the branch offices |
D. | Configure Windows file protection to notify the branch offices |
Answer» C. Configure system file checker to notify the branch offices | |
49. |
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do? |
A. | Restart the computer in safe mode. Then restart the computer again |
B. | Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command |
C. | Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command |
D. | Restart the computer by using the last known good configuration |
Answer» E. | |
50. |
You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do? |
A. | Copy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs |
B. | Copy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator |
C. | Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000 |
D. | Copy the Windows NT 4.0 printer drivers to the Winnt\System32\ pri liter s\dri vers folder on the Windows 2000 print server |
Answer» D. Copy the Windows NT 4.0 printer drivers to the Winnt\System32\ pri liter s\dri vers folder on the Windows 2000 print server | |