发信人: netdance()
整理人: reynolds(2001-08-27 17:11:41), 站内信件
|
2000 dump:70-215 Install& Admin 2000 Server
Install& Admin 2000 Server
Consolidated
215
This dump has 3 sections. Each section has 40-50 questions.
====================================================================== =
1.You are an administrator of your company's network. You want to perf orm routine upgrades on your Windows 2000 Server computer. You use you r nonadministrator user account in the domain to log on to the server.
You want to update all of the critical system files and patched on the server in the shortest possible time. What should you do?
A. Run Windows Update.
B. Run System File Checker.
C. Log on as an Administrator and run Windows Update.
D. Log on as an Administrator and run System File Checker.
2. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sha ring to connect to the Internet.
A new employee named David Johnson is configuring a Windows 2000 Serve r computer as a file server. When David uses Windows update for the fi rst time and select Product Update, he receives an error message stati ng that access is denied.
David need to be able to update the file by using his account. What sh ould you do?
A. Configure the settings for Internet Connecting Sharing to allow POP 3 access.
B. Configure the settings for Internet Connecting Sharing to allow SMT P access.
C. Give David's user account administrator privileges on the Windows 2 000 Server computer.
D. Instruct David to log on as a domain administrator on the Windows 2 000 Server computer.
3. You install a second modem on a Windows 2000 Server computer config ured with Routing and Remote Access. Dial-in users report that they ar e unable to connect to the server by using this new modem.
What can you do to help find out the cause of the problem? (Choose Thr ee.)
A. Use the Diagnostics tab in Phone and Modem Options in Control Panel to query the modem.
B. Use device Manager to identify any port resource conflicts.
C. Use the Routing and Remote Access snap-in to find out whether the p orts for both modems are operational.
D. From a command prompt, run the Net Config Server command.
E. From a command prompt, run the Net Statistics command.
F. Use Regedit32 to view the Error Control value in the HKEY_LOCAL_MAC HINE\System\CurrentControlSet\Services\RemoteAccess Key.
4. Your Windows 2000 Server computer uses a non-Plug and Play ISA mode m configured to use IRQ 5. You add a PCI modem and restart the compute r. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5.
You want to resolve the problem. What should you do?
A. Use Device Manager to change the IRQ for the original modem to IRQ 9.
B. Use Device Manager to change the IRQ for the original modem to IRQ 10.
C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plu g and Play devices.
D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Pl ug and Play devices.
5. You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorr ect driver was installed during the installation of the modem.
You attempt to remove the modem by using Phone and Modem Options in Co ntrol Panel. After each attempt to remove the modem by using this meth od, the computer stops responding.
You restart the computer again. You must install the correct driver fo r the modem as quickly as possible.
What should you do?
A. Use the Add/Remove Hardware wizard to uninstall the modem.
Restart the server.
B. Shut down the server, remove the modem card, and restart the server .
Shut down the server again, insert the modem card, and restart the ser ver.
C. Delete all references to modems in the registry.
D. Run the Modem troubleshooter and remove the modem when prompted.
Restart the server.
6. Your Windows 2000 Server computer includes an integrated 10-MB Ethe rnet adapter. You are replacing the integrated adapter with a new 100- MB Ethernet adapter.
You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating th at the new adapter is missing or is not working.
What should you do to resolve the problem?
A. Create a new hardware profile.
B. Use Device Manager to remove the integrated 10-MB Ethernet adapter.
C. Use Device Manager to disable the integrated 10-MB Ethernet adapter .
D. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder.
7. You are a member of the Enterprise Admins group at Trey Research. Y ou create and share a printer named HPColorL2 on a Windows 2000 Server computer named pserver.treyresearch.local. You grant Print permission only to the Domain Local group named CompanySales. Later, you add a n ew child domain named london.treyresearch.local.
Clair Hector is a member of the global group named LondonSales in the london.treyresearch.local domain. Clair reports that she is unable to send a print job to the HPColorL2 printer.
You want all members of the LondonSales group to be able to print to t he HPColorL2 printer. What should you do?
A. Add the LondonSales group to the CompanySales group.
B. Add the CompanySales group to the LondonSales group.
C. Change the CompanySales group to a universal group.
D. Change the LondonSales group to a universal group.
8. You are the network administrator of the litware.com domain. LitWar e, Inc., has its main office in Dallas and branch office in New York, Phoenix, and Seattle. A Windows 2000 Server computer named web1.litwar e.com is running Internet Information Service (IIS). This computer is located in the same office.
Web developers in Dallas, New York, Phoenix, and Seattle need to updat e each of the Web sites and virtual directories located on web1.litwar e.com. Different updates will be occurring simultaneously. You want to ensure that each developer can use Microsoft FrontPage to update the sites successfully and to manage content changes.
What should you do?
A. Run the fpremadm command to install the server extensions for IIS o n web1.litware.com.
Configure the server extensions for each web site.
B. Run the fpsrvadm command to install the server extensions for IIS o n web1.litware.com.
Configure the server extensions for each Web site.
C. Install the server extensions for IIS on web1.litware.com by select ing Upgrade Extensions from All Tasks menu in IIS.
Configure the server extensions for each Web site.
D. Configure the server extensions for each Web site by selecting Conf igure Server Extensions from the All Tasks menu in IIS.
Configure the server extensions to allow each developer update access for each Web site.
9. You are the administrator of a Windows 2000 Server computer named S erver1. You create a Distribute file system (Dfs) root named Public. Y ou add a shared folder named Docs as a Dfs node under the root.
The share permissions and NTFS permissions for Public and Docs are sho wn in the following table.
Folder Share permissions NTFS permissions
Public Everyone: Read
Domain Admins: Full Control Everyone: Read
Docs User: Read
Domain Admins: Full Control Training: Full Control
Domain Admins: Full Control
A user named Maria is a member of the Users and Training user groups. When Maria attempts to save the file \\Server1\Public\Docs\memo.doc, s he receives the following error message: "Access denied."
You want Maria to be able to change and delete all files in the Docs f older. You do not want her to have more access than necessary.
What should you do?
A. Add Maria to the Domain Admins group.
B. Add Maria to the local Administrators group.
C. Set the share permissions for the Public folder to grant Maria Full Control permission.
D. Set the share permissions for the Docs folder to grant Maria Change permission.
E. Set the NTFS permissions for the Public folder and is subobjects to grant Maria Modify permission.
F. Set the NTFS permissions for the Docs folder and its subobjects to grant Maria Full Control permission.
10. You are the administrator of a Windows 2000 Server computer. A fol der named HR-Data on the system partition of the server is shared on t he network as HR-Data. The owner of the HR-Data folder is Administrato rs.
The share permissions and NTFS permissions are shown in the following table.
Share permissions NTFS permissions
Everyone: FULL Control Domain Admins: Read
Katrin: Full Control
Katrin creates a file in the HR-Data folder. She sets the NTFS permiss ions for the file to list only herself on the access control list, wit h Full Control permission. Katrin then leaves on vacation and cannot b e contacted.
Later, you discover that the file contains sensitive information and m ust be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions of other files in t he HR-Data folder. You want your actions to have the least possible im pact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the fi le.
What should you do?
A. Grant yourself Full Control permission for only the HR-Data folder and not its files and subobjects.
Delete the file.
Then remove Full Control permission for the HR-Data folder.
B. Take ownership of the HR-Data folder.
When prompted, take ownership of existing files.
Grant yourself Full Control permission for the file.
Delete the file.
C. Take ownership of the file.
Grant yourself Modify permission for the file.
Delete the file.
D. Grant yourself Modify permission for the HR-Data folder and its sub objects.
Delete the file.
Then remove Modify permission for the HR-Data folder.
11. Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Prof essional. The network includes Windows 2000 Server computers and UNIX servers.
User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network.
You have a high-capacity print device that is attached to one of the U NIX servers. The UNIX computer uses the LPR printing protocol, and it' s IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers .
What should you do?
A. Install Microsoft Print Services for Unix on PrintServ.
Create a network printer on users' computers, and specify that the pri nter URL is LPR://10.1.1.99/GIANT.
B. Install Microsoft Print Services for Unix on users' Computers.
Share this printer and connect to it from users' computers.
C. Create a network printer on PrintServ, and specify that the printer name is \\10.1.1.99\GIANT.
Share this printer and connect to it from users' computers.
D. Create a local printer on PrintServ.
Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT.
Share this printer and connect to it from users' computers.
12. You are the administrator of a Windows 2000 Server network at Blue Sky Airlines. You configure a server named print10.marketing.blueskya irlines.local as a print server at the Los Angeles site. You create an d share a variety of printers on the server for use by employees in th e marketing.blueskyairlines.local domain.
You want to review the configured properties of all of the shared prin ters on the print10.marketing.blueskyairlines.local server. You want t o perform this review from a Windows 2000 Professional computer at the London site of Blue Sky Airlines.
What should you do?
A. Use your Web browser to connect to http://print10.marketing.bluesky airlines.local/printers/.
B. Use your Web browser to connect to http://print10.blueskyairlines.l ocal/printers/.
C. Run the net view \\print10 command.
D. Run the net view \\print10.blueskyairlines.com command.
13. You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the I ntern group. Both groups are in the same domain.
On the intranet server, the Administration group is placed in the Secu rity group, and the Intern group is placed in the Nonsecurity group. T he Security group is then granted Full Control permission for the Sale s virtual directory.
Nate needs to update new sales information that is located on the Sale s virtual directory. What should you do so that Nate can perform this task?
A. Enable Anonymous access for the intranet server.
B. Enable Anonymous access for the Sales virtual directory.
C. Remove Nate from the Intern group.
D. Make Nate a member of the Security group.
14. Your network contains NetWare 4.0 Servers. You have successfully i nstalled Client Service for NetWare on Windows 2000 Professional compu ters, and Gateway Service for NetWare on Windows 2000 Server Computers .
You recently added a new Windows 2000 Server computer to the network a nd installed Gateway Service for NetWare on it. However, the server is unable to connect to any NetWare servers.
What should you do on the new Windows 2000 Server computer to resolve this problem?
A. Enable NWLink NetBIOS.
B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use the correct Ethernet frame type.
C. Install RIP routing for IPX.
D. Install the SAP Agent.
15. You are the administrator of a Windows 2000 Server network that ru ns in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer.
Your Windows 2000 Professional client computers can print to the new p rinter successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the di alog box shown in the exhibit.
You want the printer driver to be installed automatically on the Windo ws NT Workstation computers. What should you do?
A. Copy the Windows NT 4.0 Printer Drivers to the Netlogon shared fold ers on all Windows NT Server 4.0 computers still configured as BDCs.
B. Copy the Windows NT 4.0 printer drivers to the Netlogon shared fold er on the PDC emulator
C. Change the sharing options on the printer to install additional dri vers for Windows NT 4.0 or Windows 2000.
D. Copy the Windows NT 4.0 printer drivers to the Winnt\System32\print ers\drivers folder on the Windows 2000 print server.
16. You are the administrator of the Windows 2000 Server network shown in the exhibit.
Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Mi crosoft Proxy Server. These users must enter their proxy server user n ames and passwords to connect to the proxy server, to the Internet, an d to your local intranet server.
The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server .
you want all users to be able to connect to the intranet server withou t entering a separate user name and password. What should you do?
A. Move the intranet server to the client segment of the network.
B. Move the proxy server to the server segment of the network.
C. Configure each client computer to bypass the proxy server for local addresses.
D. Configure each client computer to use port 81 for the proxy server.
17. You want to upgrade a Windows NT Server 4.0 computer named Server3 4 to Windows 2000 Server. Server34 is a member server in a Windows 200 0 domain named marketing.fabrikam.local. The domain runs in native mod e.
You want to change the role of Server 34 from a member server to a dom ain controller in the same domain. What should you do? (Choose two.)
A. Reinstall Windows NT Server 4.0 on Server 34 in the same WINNT fold er, and make Server 34 a BDC in the marketing domain.
B. Use Server Manager on Server34 and promote Server34 to a PDC for th e marketing domain.
C. Upgrade Server34 to Windows 2000 Server.
D. Run the Active Directory Installation wizard to make Server34 a dom ain controller in the marketing.fabrikam.local domain.
E. Run the Active Directory Installation wizard to convert Server34 to a domain controller in the fabrikam.local domain.
18. You are the administrator of a routed Windows 2000 network. The ne twork includes 25 Windows 2000 Server computers. You want to install a new Windows 2000 Server computer as the first computer on a new route d segment.
You configure the existing DHCP server with a scope that is valid for the new routed segment. During the installation of the new Windows 200 0 Server, you specify that the server should obtain its IP address fro m an existing DHCP server.
After you complete the installation, you open My Network Places. You s ee the new server but no other computers. You run the ipconfig command and find that the new server's assigned IP address is 169.254.1.200, with a 16-bit subnet mask and no default gateway address.
You want to resolve the problem so that you can see other computers on the routed network. What can you do? (Choose two.)
A. Configure all of the routers to route BOOTP broadcast frames.
B. Configure the default gateway to the TCP/IP properties of the new s erver.
C. Add the IP address for the default gateway to the TCP/IP properties of the new server.
D. Add a DHCP Relay Agent computer to the new routed segment.
E. Add a WINS server to the new routed segment.
19. You are the administrator of a network that consists of a single W indows NT 4.0 domain. The network contains five Windows NT Server doma in controllers and 1,000 Windows NT Workstation client computers.
You want to install Windows 2000 Server on a new computer. You want th e new computer to act as a domain controller in the existing domain.
What should you do?
A. On the new computer, install Windows NT Server 4.0 and designate th e computer as a BDC in the existing domain.
Promote the computer to the PDC of the domain.
Upgrade the computer to Windows 2000 Server.
B. On the new computer, install Windows NT Server 4.0 and designate th e computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain.
Upgrade the computer to Windows 2000 Server.
Use Active Directory Sites and Services to force synchronization of th e domain controllers.
C. Shut down the PDC of the existing Windows NT domain from the networ k.
On the new computer, install Windows 2000 Server, and then run the Act ive Directory Installation wizard to install Active Directory, specify ing the same NetBIOS name for the Windows 2000 domain as the existing Windows NT domain.
D. Shut down the PDC of the existing Windows NT domain from the networ k.
On the new computer, install Windows 2000 Server, and then run the Act ive Directory Installation wizard to install Active Directory as a rep lica in the existing Windows NT domain.
Promote the new computer to the PDC of the domain.
Restart the Windows NT PDC on the network and demote it to a BDC.
20. You plan to install Windows 2000 Server on 10 new computers on you r company's network. These servers will provide file and print service s to departments within the company. The computers have identical hard ware and will use the same software configuration.
You plan to use a centralized copy of the Windows 2000 installation fi les, which are stored on an existing Windows 2000 Server computer.
Which three actions should you take to install Windows 2000 Server on the new computer? (Choose three.)
A. Create a set of installation boot disks by using Makeboot.exe.
B. Create an MS-DOS network boot disk.
C. Create an Unattend.txt file by using Setup Manager.
Create a UDF file that identifies the names of the new computers.
D. Create a UDF file by using setup manager.
Create an Unattend.txt file that identifies the names of the new compu ters.
E. Begin the installation process by running the Winnt command with th e /S, /U, and /udf switches.
F. Begin the installation process by running Winnt32 command with the /s, /unattend, and /udf switches.
21. You are the administrator of a network that consists of Windows 20 00 Server computers and Windows 2000 Professional computers.
You want to configure the deployment of the most recent Windows 2000 s ervice pack so that users of the Windows 2000 Professional computers r eceive the service pack automatically when they log on to the domain.
What should you do?
A. Create a Microsoft Windows installer package for the service pack.
Configure RIS to use the package.
B. Create a Microsoft Windows Installer package for the service pack.
Configure the package in a Group Policy.
C. Create a Microsoft Windows Installer package for the service pack.
Configure the package in the Local Computer Policy.
D. Place the service pack in a Distributed file system (Dfs).
22. Your network consists of numerous domain within a LAN, plus remote location that is configured as another domain within the tree. Each d omain contains several organizational units (OUs). The remote domain i s connected to the main office network by a 56-Kbps connection, as sho wn in the exhibit.
The remote location is running a previous service pack for Windows 200 0, and the LAN is running the most recent service pack.
You want to configure a Group Policy for the remote location so that u sers can repair a problem with a service pack system file. You also wa nt to reduce the traffic on the LAN and ease administration of the Gro up Policies. You want to retain the domain administrator's access to t he Group Policy configuration.
What should you do?
A. Configure a Group Policy for each OU in the west.litware.com domain .
Configure a service pack software package for each Group Policy.
B. Configure a Group Policy for each OU in the litware.com domain.
Configure a service pack software package for each Group Policy.
C. Configure a Group Policy for the west.litware.com domain.
Configure a service pack software package for the Group Policy.
D. Configure a Group Policy for the litware.com domain.
Configure a service pack software package for the Group Policy.
23. You install and run a third-party 32-bit application named Applica tion on your Windows 2000 Server computer. After several days. the app lication stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent.
You end the application. However, you see that the CPU on the server i s still at 100 percent. Task Manager shows no other applications runni ng. You then examine the Processes page in Task Manager and confirm th at the Application.exe process is no longer running.
You want to return the CPU usage to its normal range. What should you do?
A. Use Computer Management to stop and restart the Server service.
B. Use Computer Management to stop and restart the Workstation service .
C. Use Task Manager to end any related child processes.
D. Use Task Manager to end and automatically restart the Explorer.exe process.
24. You install a new multiple-process database application named Appl ication on your Windows 2000 Server computer. Two days later, users be gin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that y ou need to restart the application.
What should you do before you restart the application?
A. End the task named Application.
B. End the Application.exe process.
C. End the Application.exe process tree.
D. End both the Explorer.exe process and the Application.exe process.
25. Your Windows 2000 Server computer uses a SCSI adapter that is not included on the current Hardware Compatibility List (HCL). You install an updated driver for the SCSI adapter.
When you start the computer, you receive the following STOP error:
"INACCESSIBLE_BOOT_DEVICE." Which two procedures can you use to resolv e the problem? (Choose two.)
A. Start the computer in safe mode.
Reinstall the old driver for the SCSI adapter.
B. Start the computer by using a Windows 2000 bootable floppy disk.
Reinstall the old driver for the SCSI adapter.
C. Start the computer by using the Windows 2000 Server CD-ROM.
Perform an emergency repair.
Reinstall the old driver for the SCSI adapter.
D. Start the computer by using the Recovery Console.
Run System File Checker.
Restart the computer.
Reinstall the old driver for the SCSI adapter.
E. Start the computer by using the Recovery Console.
Copy the old driver for the SCSI adapter to the system volume and to C :\NTbootdd.sys.
Restart the computer.
26. A Windows 2000 Server computer named Server1 is a file server on y our network. Server1 runs numerous 16-bit applications. One of the app lications, named App1, stops responding, causing all of the other 16-b it applications to stop responding.
You want to isolate App1 for monitoring and troubleshooting purpose. W hat can you do? (Choose all that apply.)
A. Create a batch file that starts App1 by running the start command w ith the /separate switch.
Use this batch file to start App1.
B. Create a shortcut to App1, and select the Run in separate memory sp ace option in the shortcut properties.
Use this shortcut to start App1.
C. In the properties for File and Printer Sharing for Microsoft Networ ks, select the Maximize data throughput for file sharing option button .
D. In the properties for File and Printer Sharing for Microsoft Networ ks, select the Balance option button.
27. You want to improve the TCP transmission speed of a Windows 2000 S erver computer. You also want to remove an unused registry key.
You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove th e unused key. You restart the computer, but the computer stops respond ing before the logon screen appears.
You want to return the computer to its previous configuration. What sh ould you do?
A. Restart the computer in safe mode.
Then restart the computer again.
B. Restart the computer by using the Recovery Console.
Run the Fixboot c: command, and then run the Exit command.
C. Restart the computer by using the Recovery Console.
Run the enable winlogon service_auto_start command, and then run the E xit command.
D. Restart the computer by using the last known good configuration.
28. You install a new server application on your Windows 2000 Server c omputer. Response times fail to meet user specifications. You want to use the Process page in Task Manager to find out whether the response time of new application would improve by the addition of one or more p rocessors.
Which two columns should you select to view? (Choose two.)
To answer, click the two appropriate check boxes in the Select Columns dialog box. (Note: The default settings have been changed.)
29. You are the administrator of a Windows 2000 Server computer. The s erver has a single hard disk with a single NTFS partition.
You use a third-party tool to add a new partition to the disk. When yo u restart the server, you received the following error message: "Windo ws 2000 could not start because the following file is missing or corru pt: \system32\ntoskrnl.exe. Please re-install a copy of the above file ."
What should you do to resolve the problem?
A. Start the computer by using the Recovery Console.
Run System File Checker.
B. Start the computer by using the Recovery Console.
Modify the Partition parameter in the operating system path in C:\Boot .ini
C. Start the emergency repair process.
Choose the option to repair system files.
D. Start the computer in safe mode with command prompt.
Modify the Partition parameter in the operating system path in C:\boot .ini.
30. You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full b ackups of each domain controller.
You run a script to make changes to account information in Active Dire ctory. As a result of errors in the script, the incorrect user account s are modified. Active Directory replication then replicates the chang es to the other two domain controllers.
You want to revert Active Directory to the version that was backed up the previous day. What should you do?
A. On a single domain controller, use Windows Backup to restore the Sy stem State data.
Shut down and restart the computer.
B. Shut down and restart a single domain controller in directory servi ces restore mode.
Use Windows Backup to restore the System State data.
Run the Ntdsutil utility.
Restart the computer.
C. Shut down and restart a single domain controller by using the Recov ery Console.
Use Windows Backup to restore the System State data.
Exit the Recovery Console.
Restart the computer.
D. Shut down and restart each domain controller by using the Recovery Console.
Use Windows Backup to restore the Sysvol folder.
Exit the Recovery Console.
Restart the computer.
31. You are the administrator of the contoso.local domain. You organiz e the domain into organization units (OUs) as shown in the exhibit.
You configure the Local Security Options and other setting for the Def ault Domain Policy object. You enable a local security option policy t o display a logon message each time a user attempts to log on.
Suzan Fine, the administrator of the Florida OU, wants to configure a different logon message for the Orlando OU without changing the other Local Security Options.
What should Suzan do?
A. Create a new Group Policy object (GPO) in the Orlando OU with the a ppropriate logon message.
Block policy inheritance for the new GPO.
B. Create a new Group Policy object (GPO) in the Florida OU with the a ppropriate logon message.
Set the option not to override for the new GPO.
C. Create a new Group Policy object (GPO) in the Orlando OU with the a ppropriate logon message.
Enable policy inheritance for the new GPO.
D. Create two new Group Policy objects (GPOs) in the Miami and Orlando OUs.
Configure the GPO for the Orlando OU with the appropriate logon messag e for the Orlando OU.
Place the GPO for the Orlando OU at the top of the priority list.
32. Your company has a human resources (HR) manager named Sean Chai. H e keeps your company's confidential HR files in a shared folder. to in crease the security of the HR files, Sean set the folder to encrypt th e files.
Sean leaves the company without resetting the permissions and encrypti on settings for the HR files. The files must be made accessible to the new HR manager.
Which two actions should you take to allow this access? (Choose two.)
A. Set the file permissions on the HR files to allow access to the new manager.
B. Back up the shared folder to tape and restore the files to a differ ent folder.
C. Log on as an administrator and remove the encryption attribute from the HR files.
D. Log on as the new manager, connect to the shared folder, and run th e cipher /e /s . command.
E. Configure the new manager's account to be an Encrypted Data Recover y Agent for Sean's account.
33. You are the administrator responsible for security and user deskto p settings on your network. You need to configure a custom registry en try for all users. You want to add the custom registry entry into a Gr oup Policy object (GPO) with the least amount of administrative effort .
What should you do?
A. Configure an ADM template and add the template to the GPO.
B. Configure an INF policy and add the policy to the GPO.
C. Configure a Microsoft Windows Installer package and add the package to the GPO.
D. Configure RIS to include the registry entry.
34. Your company has a senior manager named Paul West. Paul uses compu ters in two different offices. Paul's home folder is stored on a serve r named UserServer.
Paul works with many files that are highly confidential. Paul keeps th ese files in a folder named Confidential in his home folder. You need to maximize the security of the Confidential folder. You also want Pau l to be able to access the folder from computers in each office.
What should you do?
A. Obtain a signing and sealing certificate from a certificate server for Paul's account, and install the certificate on the computers that Paul uses.
B. Log on at UserServer as the administrator, connect to Paul's home f older, and set the encryption attribute.
C. Configure Paul's account to have a roaming user profile, and instru ct Paul to use folder properties to set the encryption attribute for h is folders.
D. Add the cipher /e /s . command to Paul's logon script.
35. You install the Routing and Remote Access service on a Windows 200 0 Server computer in your network. Your network is not directly connec ted to the Internet and uses the private IP address range 192.168.0.0.
When you use Routing and Remote Access to dial in to the server, your computer connects successfully, but you are unable to access any resou rces. When you try to ping servers by using their IP addresses, you re ceive the following message: "Request timed out." When you run the ipc onfig command, it shows that your dial-up connection has been given th e IP address 169.254.75.182.
What should you do to resolve the problem?
A. Configure the remote access server with the address of a DHCP serve r.
B. Authorize the remote access server to receive multiple addresses fr om a DHCP server.
C. Configure the remote access server to act as a DHCP Relay Agent.
D. Ensure that the remote access server is able to connect to a DHCP s erver that has a scope for its subnet.
36. Your company's network includes Windows 3.1 client computers, Wind ows 95 client computers, and Windows 2000 Professional client computer s. The company's manufacturing facilities run 24 hours per day.
The company has developed its own 32-bit application that collects inf ormation from the manufacturing process so that workers on one shift c an find out that was manufactured during the previous shift. The compa ny wants to make the application available on all of the client comput ers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Servi ces.
The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application.
What should you do to enable the IP department to control users' sessi ons?
A. Configure the Terminal server to run in Remote Administration mode.
B. Grant the IT department Full Control permission to the Remote Deskt op Protocol (RDP) on the Terminal server.
C. Add the members of the IT department to the Power Users group on th e Terminal server.
Use third-party software to enable remote control of users' sessions.
37. Your network contains 10 domain controllers, 10 member servers, an d approximately 1,000 client computers. All the servers run Windows 20 00 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client com puters use file sharing to grant access to files stored locally.
The network has 10 subnets and uses TCP/IP as the only network protoco l. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers m ust be able to register and resolve addresses if a server fails.
How should you configure the DNS servers?
A. Configure one server with a standard primary zone for the domain, a nd configure at least one server with standard secondary zone.
B. Configure one server with a standard primary zone for the domain, a nd configure at least one server with an Active Directory integrated p rimary zone.
C. Configure one server with an Active directory integrated primary zo ne for the domain, and configure at least one server with a standard s econdary zone.
D. Configure at least two servers with Active Directory integrated pri mary zones for the domain.
E. Configure at least two servers with standard primary zones for the domain.
38. Your network is configured as shown in the exhibit.
All the servers are Windows 2000 Server computers that use TCP/IP as t he only network protocol. The sales department uses one subnet and has servers names Sales1 and Sales2. The engineering department uses anot her subnet and has servers names Engineering1 and Engineering2.
Sales1 and Engineering1 are configured to act as DHCP servers. The rou ter that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay.
You want to allow Sales1 and Engineering1 to support client computers on each other's subnets. What should you do?
A. Ser the router option in the DHCP Scopes to 192.168.2.1 for Enginee ring1 and 192.168.1.1 for Sales1.
B. On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol.
C. On Engineering2 and Sales2, install and configure the DHCP Relay Ag ent service.
D. Configure Engineering2 and Sales2 as DHCP servers without any scope s.
39. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers.
Users report that when they try to connect to the Terminal server, the y receive the following error message: "The local policy of this syste m does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully.
You want users to be able to log on to the Terminal server. What shoul d you do?
A. Grant the users the right to log on as a service.
B. Grant the users the right to log on locally.
C. Grant the users the right to log on over the network.
D. Copy the users' profiles to the Terminal server.
E. Copy the users' home folders to the Terminal server.
40. Your company has a main office and 50 branch offices. The main off ice has a private network with 1,000 computers. Each branch office has a private network with between 10 and 20 computers and a 56-Kbps conn ection to the Internet.
The company plans to use the Network Address Translation (NAT) feature of Routing and Remote Access to provide each office with access to th e Internet. When you test this configuration, you discover that connec tions cannot be made to sites by using fully qualified domain names. H owever, connections can be made to these sites by using their IP addre sses.
You want to be able to make connections by using fully qualified domai n names. What should you do?
A. Configure the computers on each of the branch office networks with the address of a WINS server.
B. Configure the computers on each of the branch office networks with the address of a DNS server on the Internet.
C. Configure a filter on the NAT servers to pass DNS packets.
D. Create a host file on each of the NAT servers.
41. You are installing a new computer names Svr2.justtogs.com on your Windows 2000 network. Part of the network is shown in the exhibit.
You want to enter the appropriate TCP/IP addresses for the subnet mask and the default gateway for Svr2.justtogs.com.
Which subnet mask and default gateway should you use?
To answer, drag the appropriate addresses to the appropriate boxes in the Internet Protocol (TCP/IP) Properties dialog box.
42. You are the administrator of a Windows 2000 Server computer that h as one hard disk. This computer runs a custom application that writes a large cumber of small temporary files in a single directory to suppo rt request from client computers.
To improve performance of the application, you add three new 100-GB SC SI disks to the server to hold these temporary files. You want to ensu re that the application can use all 300 GB of space with a single driv e letter. You also want to ensure the fastest possible performance whe n writing the temporary files.
How should you configure the three disks?
A. Convert all three disks to dynamic disks.
Create a striped volume.
B. Convert all three disks to dynamic disks.
Create a RAID-5 volume.
C. Create a single volume on each of the three disks.
Format each volume as NTFS.
Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1.
D. Create a single volume on Disk 1.
Format the volume as NTFS.
Extend the volume to create a spanned volume that includes the space o n all three disks.
43. Your Windows 2000 Server computer contains a stripe ser with parit y on a four-disk array. You convert the strip set with parity to a dyn amic RAID-5 volume.
Six months later, users report that disk access on the server is slowe r than it had been on the previous day, You use Disk Management and di scover that the status of the third disk in the array is Missing.
You want to recover the failed RAID-5 volume. What should you do first ?
A. Replace the third disk and restart the server.
Use disk Management to repair the volume.
B. Ensure that the third disk is attached to the server and has power.
Use Disk Management to reactivate the disk.
C. Ensure that the third disk is attached to the server and has power.
Use Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the ne w disk.
Restart the computer and allow Windows 2000 to automatically repair th e volume on the extended partition.
44. You are the administrator of a Windows 2000 server computer. The s erver has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the Systemroot\Te mp folder.
There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the pat h to the log file. You want to run the application on your server.
What should you do?
A. On the second partition, create a shared folder named Temp.
B. In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk.
C. Add a second hard disk.
Create and format a partition from the free space on the second hard d isk.
Create a Temp folder on the new partition.
Mount the system partition as the Temp folder on the new partition.
D. Add a second hare disk.
Delete the contents of the Systemroot\Temp folder.
Create and format a partition from the free space on the second hard d isk.
Mount the partition as the Systemroot\Temp folder.
45. You install your boot volume on volume C on your Windows 2000 Serv er computer. You mirror volume C on dynamic Disk 1.
Two years later, during routing server maintenance, you open Disk Mana gement and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing.
You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy.
What should you do next?
A. Replace Disk 1 and restart the computer. The mirror will automatica lly regenerate.
B. Remove the mirror on Disk 1, replace the disk, and then add back th e mirror to the new Disk 1.
C. Replace Disk 1 and copy all data from volume C to a new NTFS primar y partition on the new Disk 1. Restart the computer.
D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror.
46. You install the boot volume D on your Windows 2000 Server computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1.
One year later, during routing server maintenance, you open Disk Manag ement and find that the status of volume D is Failed Redundancy. The s tatus of Disk 1 is Online (Errors). A symbol with an exclamation point appears in the graphical view of the disk.
You want to return the status of the boot volume to Healthy. What can you do? (Choose two.)
A. Break the mirror, delete the volume on Disk 1, and re-create the mi rror.
B. Replace Disk 1, copy the data from the boot volume to the new disk, and then use Disk Management to rescan the disks.
C. Replace Disk 1, Ensure that the new disk is a basic disk, and repai r the volume.
D. Reactivate the mirror on Disk 1.
E. Convert Disk 1 to a basic disk, and reconvert it to a dynamic disk.
47. Five Lakes Publishing has a Windows 2000 network serving 200 users . A server names User_srv is used to hold users' files. User_srv is co nfigured with a single, large NTFS volume. Every user has a home folde r on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared.
The network administrator at Five Lakes Publishing configured disk quo tas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled.
When a user named Amy Jones attempts to save a chapter of a new book t o her home folder on the server, she receives the following error mess age: "The disk is full or too many files are open."
What should Amy do o allow this document to be saved? (Choose all that apply.)
A. Compress the files in her home folder to save disk space.
B. Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the qu ota level.
C. Move some of the files from her home folder to the IN_PROGRESS shar ed folder.
D. Remove files from her home folder until the total uncompressed file size is less than 100 MB.
48. You upgrade a Windows NT Server 4.0 computer to Windows 2000 Serve r. The computer has two hard disks. The system and boot partitions are located on two primary partitions on Disk 0. Both partitions are mirr ored on Disk 1.
One month later, Disk 1 fails. You replace the disk with a disk taken from another Windows 2000 computer. When you try to repair the fault-t olerant volumes by using Disk Management, you find that the Repair Vol ume option is unavailable.
You want to repair the mirror set. What can you do? (Choose two.)
A. Delete all volumes on Disk 1.
Change Disk 1 back to a basic disk.
Repair the fault-tolerant volumes on Disk 0.
B. Create two new volumes on Disk 1.
Copy all the data from the two disk partitions on Disk 0 to the two vo lumes on Disk 1.
C. Break the mirror set.
Convert Disk 0 to a dynamic disk.
Create a mirror on Disk 1.
D. Create a single volume on Disk 1.
Copy all the data from Disk 0 to the single volume.
Convert Disk 0 to a dynamic disk.
49. Trey Research has a Windows 2000 Server computer named User_srv. T his computer has a RAID-5 controller. The RAID array is configured as two partitions. Drive C is a 2-GB partition that holds the operating s ystem and paging file. Drive D is a 30-GB partition that will hold the home folders for 200 users.
Trey Research employs 10 scientists. The user accounts for scientists are members of a group named Scientists. The scientists use a data cap ture application that generates files that can be lager than 100 MB.
Trey Research wants to use disk quotas. Ordinary users should be allow ed to store a maximum of 75 MB of data is their home folder. The stora ge for users in the Scientists group should not be limited by quotas.
What should you do to configure this disk quota scheme? (Choose two.)
A. Enable quota management on drive D.
Select the Deny disk space to users exceeding quota limit Check box.
Set the default quota limit to 75 MB.
B. Create a Scientist template account.
Create a new quota entry for this account.
Select the Do not limit disk usage for this entry option button.
C. Create new quota entries for the 10 scientists' user accounts.
Select the Do not limit disk usage for this entry option button.
D. Enable quota management on drive D.
Select the Deny disk space to users exceeding quota limit check box.
Select the Do not limit disk usage option button for the default quota limit.
E. Create a Scientist template account.
Create a quota entry for this account.
Set the quota limit to 30 GB.
50. You share a folder on a Windows 2000 Server computer for users in your company's London office. You place several subfolders in the Lond on folder as shown in the exhibit.
The Marketing-2 folder is compressed. You want to move some files from the Research folder into Marketing-2, and you want to make sure that the files are compressed when you move them. However, you do not want to compress the remaining files in Research.
What should you do?
A. Move each of the files from Research to Marketing-2.
B. Copy the files from Research to Marketing-2, and then delete the or iginal files.
C. Compress Research, apply changes to the folder only, and then move the files from Research to Marketing-2.
D. Encrypt Marketing-2, move the files from Research to Marketing-2, a nd then decrypt Marketing-2.
51. You are the administrator of a Windows 2000 Server network. You co nfigure two sites: one for your New York office and one for your Paris office. You configure two organization units (OUs) names New York and Paris. In each of these OUs, you create subordinate OUs named Sales, Marketing, and Research. You place user accounts, stand-alone member s ervers, and Windows 2000 Professional computers in their appropriate s ubordinate OUs.
You suspect that someone is trying to log on to your domain by guessin g user account names and passwords. You want to fine out which compute rs are being used for these logon attempts.
What should you do?
A. Edit the Default Domain Controllers Policy object to audit director y services access failures.
B. Edit the Default Domain Policy object to audit account logon failur es.
C. Edit the New York OU and Paris OU Group Policy objects (GPOs) to au dit logon failures.
D. Edit the Group Policy object (GPO) of each subordinate OU to audit directory service access failures.
Some pics could not be sent with the submitting tool.
Wish you all good luck.
===================================================================
1. You wish to audit the activity of the accounting department's share folder for file and subfolder deletion. The share folder is on a Wind ows 2000 server. What steps will you take to activate this security me asure?
A. Enable auditing of the Directory Service Access event in Local Poli cies node of the Computer Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit.
B. Enable auditing of the Delete Subfolders and Files in the Security tab of the domain object's property sheet.
C. Enable Audit Object Access event in Local Policies node of the Comp uter Configuration. Enable auditing of the Delete Subfolders and Files for each folder you wish to audit.
D. Enable auditing of the Delete Subfolders and Files in the property sheet of the share in Explorer.
2. You install a new application on a computer running Terminal Servic es in Application Server Mode. Users of this application must have acc ess to files stored on a computer running Netware 4.11. TCP/IP is not installed on the computer running NetWare. What steps should you take to enable Terminal Services clients to access the computer running Net Ware?
A. Add NWLink to the Local Area Connection of the Terminal Services se rver. Configure NWLink with frame type 802.2
B. Add NWLink to the Local Area Connection of the Terminal Services se rver, and to the Local Area Connection of the Terminal Services client s. Configure NWLink with frame type 802.2
C. Add NWLink to the Local Area Connection of the Terminal Services se rver. Configure NWLink with frame type 802.3
D. Add NWLink to the Local Area Connection of the Terminal Services se rver, and to the Local Area Connection of the Terminal Services client s. Configure NWLink with frame type 802.3
3. You have decided to use a vendor-supplied hardware driver that is n ot digitally signed. You are preparing for unattended server installat ions. How do you prepare for using non-signed drivers in an unattended session to avoid interactive warnings?
A. On the installation source server, on the System Properties Hardwar e tab, click the Driver Signing button and choose the Ignore radio but ton, After the unattended installations are complete, return the setti ng to default.
B. In the [Unattended] section of the answer file,
add DriverSigningPolicy =Ignore
C. Flag this specific driver in the Txtsetup.oem specified in the [OEM BootFiles] section of the answer file.
D. In the driver subdirectory of the distribution folder, modify this vendor-supplied driver's .inf file where it references the catalog fil e.
4. Your enterprise has clients running Windows 95, Windows 98, and NT Workstation 4.0. You need to manage their System Policy from your Wind ows 2000 network until they are each upgraded. How will you set up the ir existing policies on the new Windows 2000 domain controller?
A. Leave the .pol files on a downlevel server, and manually configure it to replicate the System Policy files to the Windows 2000 network se rvers.
B. Place the .pol files of each type of workstation in the Netlogon sh are of a Windows 2000 domain controller
C. Include in each workstation's logon script a mapping to Netlogon sh are of the domain controller where the .pol files of each type of work station reside.
D. Get the Adminpak.msi installed onto each type of workstation, and c reate new .pol files. Place the 3 new .pol files in the scripts subdir ectory of the domain controller.
5. You enable the Routing and Remote Access Service (RRAS) on a comput er running Windows 2000 Server. You configure the computer as a RAS se rver. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between th e RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authen tication and data encryption?
A. CHAP
B. MS-CHAP v2
C. PAP
D. SPAP
6. You need to reinstall Windows 2000 Server on a domain controller, b ecause the operating system is damaged. How can you get the Active Dir ectory to automatically copy domain information to this new installati on?
A. Remove all existing references to the old domain controller using n tdsutil.exe. Reinstall Windows 2000 server, and do an authoritative re store of the state data.
B. Remove all existing references to the old domain controller using S ites and Services snap-in. Reinstall Windows 2000 server, reinstall Ac tive Directory with the wizard to promote the server to a domain contr oller.
C. Remove all existing references to the old domain controller using S ites and Services snap-in. After the reinstalling Windows 2000 server and Active Directory, do a nonauthorative restore of \%SystemRoot%\Rep air\Regback from tape
D. Remove all existing references to the old domain controller using n tdsutil.exe. Reinstall Windows 2000 server, reinstall Active Directory with the wizard, and promote the server to a domain controller.
7. You replace the network adapter card on a computer running Windows 2000 Server that you manage. The new card uses a different driver than the original network adapter card. What utility should you use to ins ure that the device driver for the original card is removed from your hard disk?
A. Add/Remove Programs
B. Device Manager
C. Network and Dial-Up Connections
D. Add/Remove Hardware wizard
8. You are creating an unattended answer file with Setup Manager. You type the name of your downlevel domain, Contoso, in the Workgroup opti on box, rather than selecting the domain name option. You will use thi s answer file to install Windows 2000 Server on ten computers. How wil l this impact your rollout when these servers join the upgraded domain , Contoso.com?
A. The workgroup computers must join the new Active Directory as membe r servers before being promoted with dcpromo.
B. The computers of this unattended installation can join the domain f rom their current workgroup status with the identical name.
C. The workgroup computers can become application servers and can cont inue to authenticate as workgroup members with the advantage of quicke r browsing, since the name is identical.
D. The computers installed with this unattended answer file cannot be promoted to domain controllers.
9. You create two primary partitions and one extended partition on a b asic disk of a computer running Windows 2000 Server. The disk has 10Mb of unallocated space. You create 3 logical drives in the extended par tition. You format one of the logical drives (drive G) as NTFS, and us e it for the home directory of users. You determine that you need addi tional space allocated to this logical drive. You have 3Gb of unalloca ted space available on a second disk drive on that computer.
What can you do to increase the amount of storage available in that lo gical drive?
A. Convert both disks to dynamic disks. Extend the simple volume that was the original logical drive by using that volume and unallocated sp ace from the second disk drive.
B. Create a new partition or volume on the second disk drive. Create a new folder on G. Mount the new partition or volume to that folder.
C. Extend drive G by creating a volume set using the logical drive and unallocated space from the second disk drive.
D. Create a new partition or volume on the second disk drive and mount it to the folder in which home directories reside.
10. You have been editing the registry with Regedt32, and now you are unable to get the server to boot up. What should you try for a quick s ystem restoration?
A. Power on the computer and hit the F8 key to access Safe Mode.
B. Power on the computer, hit the F8 key, and select Last Known Good c onfiguration.
C. Use your Emergency Repair Disk (ERD) to boot and restore core syste m files.
D. Use your Emergency Recovery Disk (ERD) to boot and restore core sys tem files.
E. In Recovery Console, set the path to the floppy drive where you hav e a backup of the core system files. Use the copy command to restore t he files to the hard drive.
11. You are attempting to install a Plug and Play modem in a server. T he modem appears to be working when you install it, but later it fails . You attempt several more times to reinstall the modem, but it contin ues to fail. What should you do?
A. Use the Add/Remove Hardware program to troubleshoot a device. You w ill select the modem from the list, and the Hardware Troubleshooter wi ll start.
B. Install the modem in another computer to see if it has the same fai lure. If not, reinstall it in the first computer, and use the manufact urer's most current driver when Windows 2000 prompts for file location .
C. Start the computer in safe mode and remove the device driver for th e modem. Restart the computer in normal mode, and let Windows 2000 fin d a device driver of it's own choice, even if it isn't exactly a match .
D. Use the Add/Remove Hardware program to remove the modem driver. Pow er down the computer. Let Windows 2000 find a device driver of it's ow n choice.
12. You create a new DFS root on ServerHR, a computer running Windows 2000 Server, that is a member of DomCorp, a Windows 2000 domain. You a dd three DFS links to the new DFS root. You select the DFS root, and c lick on the Action Menu to add a replica of the root. The menu option New Root Replica is disabled. What is the most likely reason that this option is disabled?
A. Directory Replication is not available.
B. The DFS root is a Stand-Alone DFS root
C. The DFS root is not on a volume formatted as NTFS
D. A new root replica cannot be created after DFS links are added to a DFS root.
13. You want to delete a quota entry defined for a user's account on a drive D of a computer running Windows 2000 Server. What utility shoul d you use to locate the files owned by the user and move the files to a shared folder on another server?
A. Windows Explorer
B. Disk Management
C. DirUse
D. Active Directory Users and Computers
14. Your enterprise has purchased 100 new computers to be installed as additional servers running Windows 2000 Server. All machines have the same basic hardware configuration, except those which will additional ly need modems. Which automated process will perform the installations in the shortest amount of time?
A. Use the bootable CD-ROM feature of these new servers to deploy a cl ean installation. Create a Winnt.sif file on floppy disk for your spec ific configuration requirements.
B. Create an answer file with Setup Manager; create a distribution fol der, and add the OEM drivers for each type mode; run winnt32 with the Syspart switch on each target computer.
C. Use the bootable CD-ROM feature of these new servers to deploy a cl ean installation. Create an unattend.udf file on floppy disk for your specific configuration requirements.
D. Create a master computer including applications; run the sysprep to ol; create an image of the master; deploy the image to new computers.
15. You install Internet Information Services 5.0 on a computer runnin g Windows 2000 Server. You create two new department web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales web site while a developer up dates the contents of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive?
A. The user will be redirected to an alternate default page for the Sa les site's home directory.
B. The user will be redirected to the Default Web site home page.
C. The user will receive a 403.2 - Read Access Forbidden error message .
D. The user will receive a 404 - File Not Found error message
16. You want to install Windows 2000 Server using NTFS on a new comput er that currently has Windows 98 on a single 2Gb hard drive with a sin gle partition. The partition is the size of the hard drive, and format ted as FAT32. Which one of the following options for hard drive prepar ation is valid for this computer?
A. Install Windows 2000 over Windows 98, and run the Convert utility t o create a second partition for NTFS. Use secedit commands to apply th e default NTFS permissions to this converted file system.
B. Use the existing partition as the system partition for the Windows 2000 operating system, and create a second partition using the Disk Ma nagement Tool for NTFS after installation is complete.
C. Start the installation of Windows 2000 using the option to select t he system partition during the installation. Run the Convert utility t o create a second partition for NTFS, and apply the default NTFS permi ssions with secedit.
D. Repartition the hard drive, creating a partition size required for your Windows 2000 installation. Format it as NTFS, FAT32 or FAT16 duri ng installation. Leave the remaining hard disk space to be formatted b y the Disk Management Tool after installation.
17. You have already created an unattended answer file using Setup Man ager with 10 computers named. Before you begin the installations, you are asked if you can include three more computers. What will be requir ed for you to include more computers in the unattended installation ov er the network?
A. Edit the unattend.txt file with Notepad
B. Edit the unattend.udf file with Notepad
C. Edit the winnt.sif file with Notepad
D. Edit the unattend.bat file with Notepad
18 |
|