发信人: songfongling(rrdn)
整理人: reynolds(2001-12-18 09:03:12), 站内信件
|
Q 41 You have very little space left on your D: drive formatted as NTFS. You compressed a large number of files, and the space now seems enough for another 100 compressed files. When you tried to copy these compressed files from the C: drive to the D: drive, however, you again got an insufficient disk space error message. What could be the reason?
A. The files that you are moving should be put in a separate folder and then compressed.
B. You should have moved the files instead of copying.
C. There should be enough space for the files in uncompressed form.
D. The compression did not work properly. You need to compress the files again.
ANSWER:
C: There should be enough space for the files in uncompressed form. When you copy or move compressed files to an NTFS folder, the space requirements are calculated on the basis of their uncompressed size.
Q42 You have completed managing the NTFS permissions for your folder, and you do not want to allow other NTFS permissions to propagate to this folder. In other words, if you change the NTFS permissions for its parent folder, you don't want those changes to affect this folder. What setting must you clear?
A. On the Access Control Settings Properties sheet, clear the reset permissions on all child objects and enable the "Propagation of inheritable permissions" check box.
B. Do nothing; the default setting prevents propagation of permissions to your object.
C. On the Access Control Settings Properties sheet, clear the "Allow permissions from parent object to propagate to this object" check box.
D. This is not possible.
ANSWER:
C: "Allow inheritable permissions from parent to propagate to this object" is selected by default, so you must clear this option to no longer accept permissions from parent objects.
A and B are incorrect; they are not the default selection. D is incorrect because this selection is possible.
Q43 One of the computers running Windows 2000 Professional is being shared as a file server in a company that produces graphics advertisements for its clients. The computer houses many large graphics files created by designers. Of late, the users are experiencing slow disk access problems. How can you defragment the hard disk in order to improve disk access problem?
A. Install a third-party defragmentation tool.
B. Use Disk Defragmenter from the Disk Management console.
C. Connect the drive from a Windows 98 computer and run the Defragmentation tool.
D. It is not possible to defragment the disk.
ANSWER:
B: The Disk Defragmentation utility is included with the Windows 2000 Professional operating system. This can be used to analyze and defragment heavily used disks that show performance degradation while accessing the disks for read-write operations.
A is incorrect because no third-party defragmentation tool is required. C is not appropriate because it is not possible to defragment the drives on a Windows 2000 computer from Windows 98. D is incorrect because it is possible to defragment a disk.
Q44 How can an application determine the number of processors installed on a Windows 2000 computer if it wanted to run itself on a particular processor?
A. The version of Windows 2000 installed will be determined by the number of processors installed.
B. The application can choose which processor to use when it starts.
C. The application has no reason to detect or manage the number of processors installed, since the Windows 2000 kernel handles scheduling of applications on the processors.
D. Applications must always be run on whatever processor is available.
ANSWER:
C: Since it is the Windows 2000 kernel that brokers all access to the processor(s), there is no reason for an application to need to detect the number of processors. An application, whether through its configuration or through Task Manager, can be set to run on a preferred processor, but that access is still brokered by the kernel.
A is incorrect. While there is an upper limit on the number of processors supported by a particular version of Windows 2000, there is no guarantee that the maximum number of processors is actually being used. Windows 2000 Professional, Server, Advanced Server, and Datacenter Server can all be run on a single processor. B is incorrect because that access is brokered by the kernel and not directly by the application. D is incorrect because an application can be configured for preferred access to a particular processor.
Q45 Mary has a computer that is running Windows 2000 Professional on a 10GB hard drive. It has two partitions: drive C is 4GB FAT32, and drive D is 6GB NTFS. She wants to upgrade the partition C into a dynamic disk using disk administrator. How can she do it?
A. She needs to convert the C drive to an NTFS partition.
B. She needs to upgrade the entire disk to a dynamic disk
C. She must ensure that the C drive has 1MB free space at the beginning
D. Dynamic disks are supported only in Windows 2000 Server.
ANSWER:
B: Mary needs to upgrade the entire disk to a dynamic disk. A single disk can be either a basic disk or a dynamic disk. It is not possible to have both configurations in a single disk.
A is incorrect, as the upgrade operation is independent of the current file system used on the disk. C is incorrect, as the requirement of 1MB of free space is needed at the end of the disk, not at the beginning. D is incorrect because dynamic disks are supported only in Windows 2000.
Q46 Your computer in the office has large disk capacity and is running Windows 2000. You share the computer with other users who store their files in this computer. You have noticed that some of the users are overusing the disk space by storing unnecessary personal picture files. How can you set a limit on the amount of disk space used by each user?
A. Set disk quotas for each user.
B. Deny the Write permissions when the space is overused.
C. Use the Disk Clean-up tool to filter unnecessary files.
D. There is no option in Windows 2000 Professional to limit disk space.
ANSWER:
A: In order to limit the use of shared disks by specific users, you may use Disk Management to enable disk quotas on a per-user basis. If you right-click on a disk and select Properties, you will find a tab for Quotas that can be used to set disk quotas.
B is incorrect because denying Write permissions will not solve the problem. Besides this, you need to monitor the disk space usage. C is not a valid choice, as the disk Clean-up tool cannot help in limiting disk usage; it is used to check the disk for bad sectors and fix them. D is incorrect because Disk Management in Windows 2000 can monitor and limit disk space usage and set quotas for users.
Q47 Simone is an IT administrator. She is trying to see Jean-Paul's attempts to access a certain folder. She turns on auditing, and sets auditing to log everything she possibly can. She checks the log a week later, and finds that only the last day's worth of activity is in the log. What happened, and what should she do?
A. The log is limited in size and older material is being deleted; she should reduce the number of objects being audited.
B. The log is limited in size and older material is being deleted; she should turn off full logging.
C. An intruder has altered the log; she should reduce the number of Administrators.
D. An intruder has altered the log; she should audit the Security Log itself.
ANSWER:
A: The log is running out of room; she should only audit the folder in question.
B is impossible to do (there is no "full logging" option.) C and D do not follow necessarily, since an intruder who gained access to the log probably wouldn't delete so unsubtly, and if he did, neither solution would be a good one: C because it is not necessarily the Administrator account that the intruder is accessing through, and D because the intruder would be able to delete the Security Log auditing if he had access to the Security Log.
Q48 You need to send out virus updates to each user on the network. You have already created the Installer package that performs the update. Which method would you use to deploy this application?
A. Assign it to all users
B. Publish it to all users
C. Assign it to all computers
D. Publish it to all computers
ANSWER:
C: Assigning a package as part of Group Policy means that that package must be run. Assigning it to a computer means that the installation will be performed in the background and will be available to all users on that computer. Since the virus updates are required applications to keep your network secure, you should assign the update to all computers, ensuring that the update is available to all users no matter which computer they sign on to.
A and B are incorrect because the virus updates need to be applied to each computer, not each user. If the virus update was made available to each user, and if those users frequently signed on to multiple computers, then each new computer that a user would sign on to would receive the virus updates. D is incorrect because applications can only be published to users, not computers.
Q49 When performing an unattended installation of Windows 2000 on an Intel-based machine with a blank hard disk, what command would you use?
A. WINNT32 /A:UNATTEND.TXT
B. WINNT /A:UNATTEND.TXT
C. WINNT32 /UNATTEND:UNATTEND.TXT
D. WINNT /UNATTEND:UNATTEND.TXT
ANSWER:
D: WINNT /UNATTEND:UNATTEND.TXT is the command to use to install Windows 2000 on a blank disk.
A and B are incorrect because the /a switch is used to enable accessibility options. C is incorrect because WINNT32 /UNATTEND:UNATTEND.TXT is the command and syntax you would use if you were performing an upgrade.
Q50 Bill wants to set up a local IPSec policy on his Windows 2000 computer so that when he makes a connection to a secured server, it will connect via Kerberos authentication. He also wants to make the connection even if the server does not have security implemented. How can he do this?
A. He sets the local IPSec policy to "Server" within the IP Security dialog box.
B. He sets the local IPSec policy to "Secure Server" within the IP Security dialog box.
C. The IPSec policy must be set on a domain controller for the entire site that his computer resides in.
D. The IPSec policy does not allow this, and a custom policy must be set up.
ANSWER:
B: When setting up a network client to use IPSec, the "Client (Respond Only)" IPSec will allow the network client to use IPSec for network communications if the server requests IPSec. If the server does not request IPSec, then the client and server can communicate using non-IPSec protected communications.
A is incorrect because we are setting up a network client in this case. The "Server (Request Security)" IPSec policy is used on network servers in order for the servers to ask for network security from those machines that can respond by using IPSec. If the client is not able to support IPSec, the server will allow unprotected communications between the client and server. C is incorrect because IPSec policy on the domain controller will only affect communications with the domain controller. D is incorrect because the "Client (Respond Only)" policy will work in this situation, and you do not need to configure a custom IPSec policy.
---- ======================
人 人 电 脑
http://rrdn.363.net
email:[email protected]
====================== |
|