/ Forside/ Teknologi / Operativsystemer / MS Windows / Spørgsmål
Login
Glemt dit kodeord?
Brugernavn

Kodeord


Reklame
Top 10 brugere
MS Windows
#NavnPoint
Klaudi 75853
o.v.n. 67550
refi 58409
tedd 45557
Manse9933 45149
molokyle 40687
miritdk 38357
briani 27239
BjarneD 26414
10  pallebhan.. 24310
hjælp til microsoft sertifisering (70-21~
Fra : e.p.
Vist : 1070 gange
1 point
Dato : 04-10-02 00:01

Jeg prøvede at oprette nedenstående som tip.....men den melder konstant om fejl....men jeg vil gerne dele det med andre....så nu kommer det som et spørgsmål

hmm....jeg kan heller ikke lave det som et spørgsmål.....så prøver jeg at poste det som et indlæg

 
 
Kommentar
Fra : e.p.


Dato : 04-10-02 00:03

Det kan jeg heller ikke....der er ellers "kun" 42 sider !!!

så må jeg prøve at dele det op

Kommentar
Fra : e.p.


Dato : 04-10-02 00:04

Er man under under uddannelse til MCSE - MCSA - MCP eller andre microsoft certifiseringer skal man op i 70-210 (windows 2000 proffesionel)
Nedenstående er gamle spørgsmål fra testen. Mange fra min "klasse" inkl. mig selv har haft et godt udbytte af disse...

KRYDS LIGE FINGRE FOR MIG.....JEG SKAL TIL PRØVE IMORGEN (fredag 3 oktober 2002)

MCSE - Spørgsmål

1.You want to upgrade 100 computers from Windows 98 to Windows 2000 Professional. You use setup manager to create the unattended.txt file. The hardware on each computer is configured identically. You upgrade 10 of the computers. You notice that the monitors on the 10 computers go blank after Windows 2000 Professional loads. You restart one of the computers in Safe Mode, and find that the monitor appears to be working. Which change should you make to unattend.txt to configure your video settings correctly?
To answer, click the appropriate line on the Unattend.txt-notepad screen.

Answer: Click on the Vrefresh=150

Explanation: The video adapter’s refresh rate defines the number of times that the screen must be rewritten per second. The higher the resolution, the larger the number of dots that have to be written in every refresh cycle. Video adapters and monitors have a default refresh rate of 60 Hz. This is setting guaranteed to work on most
modern video adapter and monitors, even with the standard video adapter driver is installed. Not all video adapters and monitors support a refresh rate of above 80 Hz. When the refresh rate is not supported, the monitor goes blank or the image becomes distorted.


2. You need to install Windows 2000 Professional on a new computer in your network. You use the setup manager wizard to configure a fully automated installation script file. You begin an unattended
installation and leave the office. When you return, the installation has reached the GUI-mode setup and you see the following error
message “Unattended setup is unable to continue because a setup parameter specified by your system administrator or computer manufacturer is missing or invalid.” You need to complete the installation. What must you do?

A. In the unattended section of the answer file, set the OemPreinstall property to Yes.
B. In the NetBinding section of the answer file, specify the enable variable.
C. In the UserData section of the answer file, specify the ProductID variable
D. In the GUIUnattended section of the answer file set the OemSkipWelcome property to 1.

Answer: C

Explanation: For a fully unattended installation to complete, the ProductID or product registration key, must be specified in the UserData section of the answer file. The syntax of this key is ProductId = "XXXXX-XXXXXXXXXX-XXXXX-XXXXX". If this key is missing the error message is returned.
Incorrect Answers:
A: The OemPreinstall property is used to determine whether a special subdirectory, \$OEM$, should be copied to the hard drive and certain sections used during setup. This is an optional property and does not affect the success of an unattended installation.
B: The Netbindings section of the answer file refers to communication channels between various network components. This section would not generate the error message as the Netbindings section can be used
to specify communication between network components on the target computer once Windows 2000 Professional has been installed on the computer.
D: The OemSkipWelcome property is used to specify whether the Windows Welcome Screen should be displayed when the system boots during the installation process. This is an optional setting that does not require user interaction during the installation process and has no effect on
the success of an unattended installation of Windows 2000 Professional.

3. You are the administrator of your company's network. The network is configured as shown in the
exhibit. .


You want to install Windows 2000 Professional on 10 non-PXE-compliant computers on the marketing segment of your network. The 10 computers do not have operating systems installed. You attempt to load the computers by using an existing RIS image that is on the RIS server. You find
that the 10 computers cannot connect to the RIS server. You verify that existing client computers on the network can connect to network servers, including the RIS server. You then check the network servers and find that the Windows NT Server 4.0 computer running WINS has stopped responding due to hard disk failure. You want to enable the computers to connect to the RIS server.
What should you do? (Choose two)

A. Repair and restart the WINS server.
B. Repair the WINS server and upgrade the server to Windows 2000 Server.
C. Configure the Active Directory server to run DHCP.
D. Configure the static entry in WINS that points to the RIS server.
E. Create and use the RIS boot disk.
F. Run RIPrep.exe to create a non-PXE-compliant startup disk.

Answer: C, E

Explanation: A RIS installation requires the presence of a DHCP server, and either a WINS server or a DNS server running Active Directory. The DHCP server is required for the automatic distribution of IP addresses
while the WINS server or a DNS server is used for NetBIOS to IP address name resolution. A WINS server is required for compatibility with computer systems, such as Windows 98, that cannot make use of the DNS
server. Clients with Non-PXE compliant network cards cannot be booted over the network and therefore require a RIS boot disk to be able to connect to the RIS server. A boot disk can be created by using the RBFG.EXE utility.
Incorrect answers:
A: In Windows 2000 the DNS server is responsible for name resolution. The WINS server was a feature of Windows NT 4.0 and has been superceded by DNS. In a Windows 2000 environment, the WINS server
is used to support computers that cannot make use of Active Directory and DNS. In this scenario there are no computers that cannot connect to Active Directory and DNS. Therefore the RIS service requires Active Directory and DNS and not WINS.
B: In Windows 2000 the DNS server is responsible for name resolution. The WINS server was a feature of Windows NT 4.0 and has been superceded by DNS. In a Windows 2000 environment, the WINS server is used to support computers that cannot make use of Active Directory and DNS. In this scenario there are no computers that cannot connect to Active Directory and DNS. Therefore the RIS service requires Active Directory and DNS and not WINS.
D: A static entry for the RIS server can be created on the DNS server. In a Windows 2000 environment, the WINS server is used to support computers that cannot make use of Active Directory and DNS. There is
thus no need for a static entry for the RIS server on the WINS server.
F: Riprep.exe is used to launch the RIPrep Wizard. It is not used to create non-PXE-compliant startup disks. The RBFG.EXE is used to create startup or boot disk.

4. You are the administrator of a Windows 2000 Professional computer that has a shared printer. Several departments in your company use the shared printer. The Sales department frequently prints multiple-page presentation graphics, which take a long time to print. Users in other departments who have short messages to print must wait an unnecessary long time for their jobs to print. You want to improve the efficiency of printing for all users who use the shared printer. You want to
accomplish this with the least amount of administrator effort.
What should you do?

A. Configure the priority of the printer to 50. Add a new printer, and set the priority to 1. For the new printer, deny print permission for users in the Sales department.
B. Configure the priority of the printer to 50. Add a new printer, and set the priority to 95. For the new printer, deny print permissions for users in the Sales department.
C. Monitor the print queue, and raise the priority of all print jobs that are sent by users who are not members of the Sales department.
D. Delete the old printer. Add a new printer, and set the priority to a higher value. Pause the print queue only when graphic intensive print jobs are printing.

Answer: B

Explanation: Printer priority is used to determine which printer is the preferred printer. The highest printer priority is 99 and the lowest is 1. When a print job is sent through the network the printer with the highest priority is used if it is not already busy with another print job. If it is busy printing, the print job is moved to the printer with the next highest priority. In this scenario we need to dedicate a printer for use by the departments other than the Sales department, as it is the other departments that have the problem. We therefore require a new printer and should deny print permissions for users in the Sales department on the new printer. We will want the other departments to make use of the new printer before they make use of the old printer. We therefore need to specify a higher priority for the new printer. This will ensure that the other departments’ print jobs are sent to the new computer first. Only when the new computer is already busy will the print job be sent to the old printer.
Incorrect Answers:
A: Specifying a priority of 1 for the new computer will give the new printer a lower priority than the existing printer. All print jobs will thus be sent to the old printer before it is sent to the new printer. This will not be beneficial for the Sales department as the Sales department is denied access to the new printer.
C: It is not possible to specify a priority level on the basis of individual print jobs. Printer priority can only be specified when more than one printer is employed on a network.
D: This proposed solution only uses one printer and requires the administrator to manually pause print jobs
so as to give certain print jobs higher priority. This would require an enormous amount of administrative effort and is therefore not the best solution.

5. Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named ShareA. You want to respond to the user’s problem as quickly as possible by using an administrative tool.
However, you cannot remember the server location of ShareA. What should you do?

A. Use Windows explorer to display the file paths of your shared folders.
B. Use storage in computer management to view logical drive properties.
C. Use event viewer in computer management to search for shared folder error messages.
D. Use System tools in computer management to display the file paths of your shared folders.

Answer: D

Explanation: The System tools component of Computer Management Console can used to locate shared folders. The Computer Management Console can be accessed through the Administrative Tools applet on the Control Panel. In the Computer Management Console, expand System Tools, expand Shared Folders and then open Shares to display all shared folders.
Incorrect Answers:
A: Windows Explorer does not show the location of shared folders in one place. To locate shared folders through Windows Explorer, we would need to check each directory and subdirectory for a shared folder icon.
B: Logical Drives properties is used to display the capacity of the local logical drives on the local computer and the security permissions that have been granted on the logical dive. It does not show any shared
folders in Storage.
C: The Event viewer is used to view log and error messages generated by Windows 2000. It cannot be used to show information on shares as it does not log any information concerning shared folders.

6. Your Windows 2000 Professional computer is configured to support two monitors. You install a DOSbased application on your computer. The application uses the Windows 2000 Professional default settings
Autoexec.nt and Config.nt. Your primary and secondary video adapters are both set to 16-bit color, 1024x 768 resolutions, and default refresh rates. You create a shortcut for the DOS-application on the secondary monitor and use the default PIF settings. You attempt to run the DOS-based application on the primary monitor. The application opens, but the display area is scrambled. You then attempt to run the DOS-based application on the secondary monitor. The application does not open. Both monitors function correctly when you run Windows-based
applications. What should you do?

A. Change the color setting for both video adapters to 256 colors. Reconfigure the shortcut properties to run the DOS-based application in full-screen mode.
B. Change the refresh rate setting to optimal for both video adapters. Reconfigure the PIF settings for the DOS-based application to start in the window.
C. Change the drivers for the secondary video adapter from WDM-compliant drivers to DOS drivers. Reconfigure the PIF settings to run the DOS-based application in full-screen mode.
D. Update the drivers for the primary video adapter. Change the secondary video adapter to use 640 x 480 resolution and 256 colors.

Answer: A

Explanation: Some legacy DOS applications can only run in 256 color mode. We should therefore set the video adapter to 256 colors. Furthermore, if a DOS application fails to display on a secondary monitor, one possible solution would be to set the DOS application to run in full-screen mode.
Incorrect answers:
B: The video adapter’s refresh rate defines the number of times that the screen must be rewritten per second. This has no bearing on the DOS application because the display would be faulty for Windows based programs as well if the video adapter does not support the specified refresh rate. Changing the refresh rate will thus not solve the problem.
C: Windows 2000 works with WDM-compliant drivers. Replacing the WDM-compliant drivers with DOS drivers could affect the performance of the entire Windows 2000 operating system and could thus make matters worse.
D: The drivers on the primary video adapter are working since there is no display problem in Windows based programs. There is thus no need to replace the video adapter’s drivers.

7. You are the administrator of the corp.arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers.
A user named Katrin in the Sales organizational unit reports that her mouse is not working correctly. You logon to the domain from Katrin’s computer by using a domain administrative account. You use Device Manager to display current information for the mouse drivers. You discover that Katrin’s computer is using an older version of the mouse driver. You have a current driver by the manufacturer of mouse. You install the current driver by the usage of Device Manager and restart the computer. You test the mouse and it is still not functioning correctly. You check the problem and see that previous
driver is still installed. You want to be able to install the correct mouse driver. What should you do?

A. Set the Sales OU policy for security to warn and allow the installation to override the local security defaults.
B. Set the domain policy for security to block but allow the installation to override local and Sales OU security defaults.
C. Set the local computer policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults.
D. Disable, plug and play on Katrin’s computer. Restart the computer and manually setup the system resources for the mouse.

Answer: A

Explanation: Setting the OU security policy to warn will allow Katrin to install the mouse driver. The OU policy will override any security policy that has been set at local, site and domain level. The policy hierarchy from lowest is local, site, domain, OU. The OU policies override local, site and domain policies.
Incorrect answers:
B: Setting the security policy at the domain level to block will not solve the problem as there is an existing policy which blocks the installation of the drivers. This policy setting must be overridden. This can bedone by setting the policy at the highest, i.e., OU, level.
C: Local computer policies cannot override the domain or the Sales OU security defaults. Therefore the policy that is blocking the installation of the drivers will remain in effect. This will thus not solve the problem.
D: The installation of the mouse drivers is being blocked by a security policy. Disabling plug and play will not change the security policy in Windows and will not permit the installation of the drivers. By
disabling plug and play, we would be required to make available the system resources that the mouse would use, however, the policy that is blocking the installation of the mouse driver will still prevent the
drivers from being installed.

8. You are administering a Windows 2000 Professional, single Pentium II 400Mhz processor computer. You need to install a new accounting software application. The software manufacturer recommends that you
use a dual-processor configuration. First, you install a second identical processor in your computer. You need to ensure that you will be able to install the new software. What should you do next?

A. Update the HAL to support multiple processors.
B. In Device Manager, disable the direct memory access controller.
C. Use the Add/Remove Hardware Wizard to detect and install the driver for the new processor.
D. Reinstall Windows 2000 Professional to support a multi-processor configuration.

Answer: A

Explanation: The Hardware Abstraction Layer (HAL) must be updated using the Device Manager to support multiple processors. To update the HAL open the System applet in the Control Panel, expand Computer, rightclick Advanced Configuration and Power Interface (ACPI) PC (or similar), select Properties, select Driver Tab, then select Update Driver. The Update Device Driver Wizard starts and can be used to update the HAL.
Incorrect answers:
B: Disabling the direct memory access controller will not help to support the second processor. It will likely make the computer run slower.
C: The HAL cannot be updated through the Add/Remove Hardware Wizard, as it already exists on the computer. The Add/Remove Hardware Wizard is used to add new hardware or to remove existing hardware. It is not used to update drivers. Device Manager is used to update the HAL.
D: It is not necessary to reinstall Windows 2000. Instead the Device Manager can be used to update the HAL.

9. Your Windows 2000 Professional computer has 50 MB of free disk space on drive C and 500 MB free disk space on drive D. Print jobs are failing because the available space on C is inadequate. You want printer to be able to use the space on drive D. What should you do?

A. From the print server properties dialog box, change the location of the spool folder to any existing file path on drive D.
B. From the printer properties dialogue box, use advanced settings to change the location of the spool folder to D:\WinNT\System32\spools\printers.
C. Copy the C:\WinNT\System32\spool\printers folder to the D:\WinNT\system32\spool\printers folder.
D. Mount drive C as a subdirectory on the drive D.

Answer: A

Explanation: The location of the spool folder can be specified on the Advanced tab of the Print Server properties dialog box. To change the spool folder location open the Printers folder, open File menu, select
Server Properties, select Advanced tab, enter the path and the name of the new default spool folder for this print server, and then click Close.
Incorrect answers:
B: The Advanced tab of the Printer Properties dialog box does not contain the location of the spool folder. It is thus not possible to change the location of the spool folder in the Advanced tab of the Printer Properties dialog box.
C: Copying the Spool folder to another hard drive will not change the location of the Spool folder as the location of the spool folder is specified on the Print Server. To change the location of the spool folder we would have to specify a new location for the spool folder on the Advanced tab of the Print Server properties dialog box.
D: This is not the correct procedure for mounting a folder. The folder must be mounted to a disk and not a disk to a folder.

10. You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.
A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message; “Access denied.” You want the manager to be able to access the files. What should you do?

A. Grant the manager NTFS Full control permission to the files.
B. Grant the manager NTFS Take Ownership permission to the files.
C. Log on to the network as a Recovery Agent. Decrypt the files for the manager.
D. Log on to the network as a member of the Backup Operators Group. Decrypt the files for the manager.

Answer: C

Explanation: An encrypted file on an EFS partition can only be decrypted by the owner of file or by the Recovery agent.
Incorrect Answers:
A: Granting the manager NTFS Full control permission of the files will not enable the manager to decrypt
the files, as an encrypted file can only be decrypted by the owner of file or by the Recovery agent.
B: Granting the manager NTFS Take Ownership permission of the files will not enable the manager to decrypt the files, as an encrypted file can only be decrypted by the owner of file or by the Recovery agent.
D: A member of the Backup Operators Group can only restore encrypted files from backup. They cannot decrypt encrypted files. Only the owner of file or a Recovery agent can decrypt an encrypted file.

12. Your Windows 2000 Professional computer contains a single hard disk configured as a single partition. You want to move a folder named Sales under a folder named CORP on your computer. You want the files in the Sales folder to remain compressed after moving the folder. You want the files in the CORP folder to remain uncompressed. You want to ensure that files are recoverable in case of any disk problems. You also want to move the files with the least amount of administrative effort.
What should you do?

A. Copy the Sales folder to the Corp folder. Do nothing further.
B. Backup the Sales folder. Move the Sales folder to the CORP folder.
C. Compress the CORP folder then copy the Sales folder to the CORP folder.
D. Move the Sales folder to a second computer then move the Sales folder to the CORP folder.

Answer: B

Explanation: The contents of the Sales folder should be backed up so that files would be recoverable in case of disk problems. We could the move the Sales folder to the CORP folder, as the files will remain compressed since the folder is moved within a single partition. The general rules on copying and moving compressed files and folder are: files and folders copied within a NTFS volume and between NTFS volumes inherits the compression state of the target folder; files and folders moved between NTFS volumes inherits the compression state of the target folder; and files and folders moved within an NTFS volume retain the original compression state of the file or folder.
Incorrect Answers:
A: A folder copied within a NTFS partition will inherit the compression state of the target folder. This will result in the Sales folder inheriting the uncompressed state of the CORP folder since the target folder is uncompressed. Furthermore, we are also required to ensure that the folder contents are recoverable in the event of a system failure. This solution does not make provision
for the recovery of the folder.
C: A folder copied within a NTFS partition will inherit the compression state of the target folder. This will result in the Sales folder losing its compressed state since the target folder is uncompressed.
Compressing the CORP folder is also not a viable solution, as the scenario explicitly requires us to retain the uncompressed state of the files in the CORP folder. Furthermore, we are also required to ensure that the folder contents are recoverable in the event of a system failure. This solution does not make provision for the recovery of the folder.
D: Files and folders that are moved between NTFS partitions inherit the compression state of the target folder. Therefore the Sales folder might lose its compression state. Furthermore, moving the Sales folder
twice is unnecessary as this will not ensure recoverability of the files in the Sales folder.

13. You are creating a dial-up connection on your Windows 2000 portable computer to connect to your customer’s dial-up server. You are not sure which type of server your customer is using for dial-up connections. You want to ensure that your dial-up connection authentication is secure and that your logon information is not sent in plain text. You view the Advanced Security Settings dialog box as shown in the exhibit.


Which option or options should you disable in the Advanced Security Settings dialog box? (Choose all that apply)

A. Unencrypted password (PAP)
B. Shiva Password Authentication Protocol (SPAP)
C. Challenge Handshake Authentication Protocol (CHAP)
D. Microsoft CHAP (MS-CHAP)
E. Microsoft CHAP Version 2 (MS-CHAP v2)
F. For Microsoft CHAP based protocols.

Answer: A

Explanation: PAP is the least complicated authentication protocol and sends passwords in plain text. Passwords are thus not encrypted passwords. This authentication protocol is used when a more secure means of authentication cannot be negotiated between two computers. We should therefore disable PAP to ensure that login information is not sent in plain text.
Incorrect answers:
B: SPAP does not support data encryption. Instead it uses a reversible encryption authentication mechanism.
C: CHAP was designed to overcome the problem of sending passwords in plain text and encrypts the authentication process by using a challenge-respond method of authentication known as Message Digest
5.
D: MS-CHAP is an improvement of CHAP and uses a similar challenge-response method of authentication.
E: MS-CHAP v2 provides more advanced and improved features than CHAP and MS-CHAP. It uses mutual authentication, stronger data encryption keys and different encryption keys for sending and receiving data.
F: All CHAP protocols use an encryption mechanism in the authentication process.

14. Your company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP
protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message, “Request timed out ” Next, you try to ping 127.0.0.1 and receive the same error message. What must you do?

A. Configure a different TCP/IP address.
B. Enable DHCP in the TCP/IP properties.
C. Enable DNS in the TCP/IP properties.
D. Configure the network adapter to run at 100 Mbps only.
E. Replace the network adapter.

Answer: E

Explanation: The 127.0.0.1 IP address is a loop back address that creates a connection with the local computer via the network adapter. As the same error message was received when pinging the loop back address, a faulty network adapter card on the local computer is indicated. We therefore need to replace the network adapter card
on the local computer.
Incorrect answers:
A: The TCP/IP protocol settings have been configured to be the same as those held with the original network adapter card. Therefore the problem is not related to the IP address. Furthermore, the 127.0.0.1
IP address is a loop back address that creates a connection with the local computer via the network adapter. As the same error message was received when pinging the loop back address, a faulty network adapter card on the local computer is indicated. We therefore need to replace the network adapter card on the local computer.
B: The TCP/IP protocol settings have been configured to be the same as those held with the original network adapter card. Therefore the problem is not related to the TCP/IP properties specified in the
network configuration. Furthermore, the 127.0.0.1 IP address is a loop back address that creates a connection with the local computer via the network adapter. As the same error message was received when pinging the loop back address, a faulty network adapter card on the local computer is indicated. We therefore need to replace the network adapter card on the local computer.
C: The TCP/IP protocol settings have been configured to be the same as those held with the original network adapter card. Therefore the problem is not related to the TCP/IP properties specified in the
network configuration. Furthermore, the 127.0.0.1 IP address is a loop back address that creates a connection with the local computer via the network adapter. As the same error message was received when pinging the loop back address, a faulty network adapter card on the local computer is indicated. We therefore need to replace the network adapter card on the local computer.
D: 10/100 network adapters are designed to detect and adjust to the speed of the network. There is thus no need to configure a 10/100 network card to run at 100 Mbps. Furthermore, the 127.0.0.1 IP address is a loop back address that creates a connection with the local computer via the network adapter. As the same error message was received when pinging the loop back address, a faulty network adapter card on the local computer is indicated. We therefore need to replace the network adapter card on the local computer.

15. You install Windows 2000 Professional on your computer. Your computer has a built in 33.6 kbps modem. You install a 56-kbps ISA-based modem. When the installation is complete, you notice that the 56-Kbps modem is not functioning. You use computer management to view the modems for your computer. Device Manager shows that the 33.6 Kbps modem and the 56Kbps modem are conflicting with each other. You want to configure Windows 2000 Professional to use only the 56Kbps modem.
What should you do? To answer, click the select and place button and then drag the designated actions to the appropriate
action box for each modem in the diagram. (Note: Both boxes must be filled. If a box does not require a specified action, use No action required.)


Answer: Drag Disable Using Device Manager to PLACE2, Drag No Action Needed to PLACE1

Explanation: The two modems are having a system resource conflict. The 33.6 Kbps modem will not be used any longer and has been replaced by the 56 Kbps modem. We can therefore disable the 33.6 Kbps modem using
the Device Manager setting on the Hardware tab of the System component of the Control Panel. By disabling the built-in 33.6 Kbps modem, it will no longer compete for system resources. The system resources would thus be available for the 56 Kbps modem and it will then work correctly. No action thus needs be taken on the 56 Kbps modem.
Incorrect answers:
Installing the 56 Kbps into another slot will not solve the problem as the 33.6 Kbps modem will still compete for system resources. The 33.6 Kbps modem also cannot be moved to another slot nor can it be removed as it is built-in on the motherboard. We can therefore only disable the 33.6 Kbps modem.

16. You are configuring five computers for Windows NT Workstation 4.0 and Windows 2000 Professional. Each computer has an 8 GB hard disk.
You configure the hard disk on each computer to have two 4 GB partitions. Windows NT Workstation is installed on drive C, Windows 2000 Professional on drive D. In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work
files on the disk. You restart your computer and load Windows NT Workstation. You notice that users can save files to drive D.
You want to prevent users from saving the files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system. What should you do?

A. Use Windows 2000 Professional to configure drive D as a dynamic partition.
B. Use Windows 2000 Professional to enable encrypting file system on drive D.
C. Use Windows NT workstation to configure NTFS permissions on drive D to deny the users write permission.
D. Reinstall Windows NT Workstation after configuring disk quotas.

Answer: C

Explanation: We can use NTFS permissions to prevent users from saving files to a specific drive, partition or folder. NTFS permissions can be set on Windows NT computers that use the NTFS file system. Setting the
NTFS permissions to deny users write permissions will prevent the users from saving work files on the disk.
Incorrect answers:
A: Windows NT users cannot use dynamic partitions, as dynamic partitions are a storage feature that has been introduced with Window 2000. Thus, configuring drive D as a dynamic partition will prevent the
Windows NT Workstation users from using the disk. However, the Windows 2000 Professional users will still be able to make use of the drive and to store files on the drive.
B: The Encrypting File System (EFS) is a file and folder security mechanism used to prevent unauthorized users from accessing encrypted files. This does not prevent users from saving files on the disk. It only prevents them from opening and reading encrypted files.
D: Reinstalling Windows NT will not prevent users in Windows 2000 to save files on disk D. As the installation process does not have an option to prevent users from saving files to specified locations.

17. You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:
• Enable users in both departments to access their own files from the network
• Enable users in the accounting department to view the legal accounting department’s documents
• Prevent users in the legal department from being able to view the accounting department’s documents
• Enable managers within the company to access and modify both the accounting and the legal department’s files

You take the following actions:
• Create two shared folders named Accounting and Legal
• Create three groups named Accounting, Legal, and Management
• Allow the accounting group modify permission on the Accounting folder
• Allow the legal group modify permissions on the legal folders.
• Allow the management group modify permission on both the accounting and legal folders.
Which result or results do these actions produce? (Choose all that apply)

A. Users in both departments can access to their own files from the network.
B. Users in the accounting department can view the legal accounting department’s documents.
C. Users in the legal department cannot view the accounting department’s documents.
D. Company managers can access and modify both department’s files.

Answer: A, C, D

Explanation: Three groups have been created based on the three departments. This allows us the ability to grant permissions to files and folders on a departmental basis. We have granted the Accounting group permission on the Accounting folder and the Legal group modify permissions on the Legal folders. Therefore these two groups have access only to the folders that pertain to their departments and cannot view the files or folders that pertain to the other department. In addition, we have granted the Managers group modify permissions on both the accounting and legal folders. The company managers can therefore access and modify the files of both departments.
Incorrect answers:
B: To gain access to the Legal folder the Accounting department must be granted permissions to those folders. They have not been granted any permission on the Legal department documents and therefore
they cannot access the Legal folders.

18. You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created
in the office on the company network. Prior to logging off the network and leaving the office, Peter enables offline files. Peter calls you from home and reports that copies of his folders and files on the
network are not available on his portable computer. What should you instruct Peter to do?

A. Enable file and print sharing. Peter will be able to access his files at home immediately.
B. Synchronize all offline files. Peter will be able to access his files at home immediately.
C. At the office, make all files available offline. Peter will be able to access his files the next time he logs off the network.
D. At the office, create a shortcut to the Offline Files folder. Peter will be able to access his files the next time he logs off the network.

Answer: C

Explanation: To use files and folders offline the files and folders must be synchronized. This entails the copying of files onto the portable computer when the user logs off from the network. This will enable the user to access and work with the files offline. When the user logs on to the server again, the files that had been altered offline must be copied onto the server to overwrite the outdated files on the server.
Incorrect Answers:
A: File and print sharing pertains to the sharing of resources over the network. It does not pertain to using
files offline.
B: The synchronization of files is dependant on the user requesting the availability of offline files beinglogged on to the network as file synchronization is applied on the basis of a user account. Therefore
Peter must be logged on to the network.
D: Offline file synchronization can be applied on folders and files and not on shortcuts to folders.

19. Five of your company's employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When
the employees are working outside of the office, they use the portable computers without network connectivity.
You have just installed wireless PC card network adapters in the portable computers so that the employees can access the network when they are in the conference rooms in the office building.
You need to configure the portable computers for optimum performance in all of the working environments. What should you do?

A. Configure the wireless PC card network adapters to use DHCP to obtain their IP addresses.
B. Configure three different hardware profiles on each portable computer.
C. Configure the wireless PC Card network adapters to use Automatic Private IP Addressing when they
cannot detect a DHCP server.
D. Instruct each employee to unplug the wireless PC card network adapter whenever the portable computer is attached to a network-enabled docking station.

Answer: B

Explanation: To ensure the optimal performance in all three networking environments, we should create three separate hardware profiles that the users can choose from under different network environments. We should create a profile to be used when the portable computer is docked at the office; another profile for when the portable computer is not docked in the office but uses the wireless PC card network adapters; and a third profile for when the portable computers are used in the filed and are not connected to the network. Incorrect answers:
A: Configuring the wireless PC card network adapters to use DHCP to obtain their IP addresses will not optimize the network performance of the portable computer in a varying network environment. We need to create separate profiles that will load only the appropriate drivers and network protocols.
C: Configuring the wireless PC Card network adapters to use Automatic Private IP Addressing when they cannot detect a DHCP server will not optimize the network performance of the portable computer in a
varying network environment. We need to create separate profiles that will load only the appropriate drivers and network protocols. Furthermore, when the wireless PC Card network adapters uses
Automatic Private IP Addressing it will only be able to communicate with other computers that are also using Automatic Private IP Addressing.
D: Unplugging the wireless PC card network adapter whenever the portable computer is attached to a network-enabled docking station will not optimize the network performance of the portable computer in
a varying network environment. We need to create separate profiles that will load only the appropriate drivers and network protocols

20. You installed an updated device driver for a zip drive on a Windows 2000 Professional computer. You restart the computer. During the startup process, the computer stops responding. You then restart the computer in the Safe Mode. During the startup process, the computer stops responding again. You suspect the new device driver is causing the problem. You want to resolve the problem so that the computer starts successfully. What should you do? (Select all that apply)

A. Use the listsvc command to disable the zip device driver.
B. Use the disable command to disable the zip device driver.
C. Select Recovery Console from the repair menu.
D. Select the debug mode from the Windows 2000 advanced options menu.
E. Insert emergency repair disk.
F. Specify the path to the recovery file on the hard disk.
G. Start the computer by using the Windows 2000 Professional CD-ROM.

Answer: B, C, G

Explanation: The Recovery Console is a command-line interface that can be used to access a hard disk of a Windows 2000 computer system. It can be accessed from the Windows 2000 Professional installation CD-ROM
and can be used to repair an installation of Windows 2000 Professional by repairing the registry or by disabling a device driver or service. To repair an installation of Windows 2000 Professional by disabling a device driver, boot the computer from the Windows 2000 Professional installation CD-ROM. On the Welcome to Setup screen, press R to open the Repair Options screen, and press C to activate the Recovery Console. If we are unsure of the name of the device driver that is causing the problem we can type ‘listsvc’ to obtain a list of the
device drivers that currently installed on the computer. Then use the DISABLE command to the disable the Zip device driver. Finally, type ‘exit’ and press enter to restart the computer.
Incorrect answers:
A: We can type ‘listsvc’ to obtain a list of the device drivers that currently installed on the computer if we are unsure of the name of the device driver that is causing the problem. However, the listsvc command
does not disable a device. We must use the DISABLE command to the disable the device driver.
D: Debug mode is a special mode used by software developers. It is used to debug programs and is one of the Safe Mode options. It cannot be used to disable device drivers.
E: The emergency repair disk (ERD) is a floppy disk that is used to repair a Windows 2000 installation. It contains autoexec.nt, config.nt and setup.log. It does not contain a copy of the registry and cannot be
used to disable a device driver.
F: Recovery files are not used as part of the recovery process. Instead the Recovery Console should be used, as the Recovery Console allows us to disable device drivers.


Kommentar
Fra : e.p.


Dato : 04-10-02 00:06

21. You want to configure your Windows 2000 Professional portable computer to use offline files. The files that you want to access offline include a large project file and some smaller personal files.
Your portable computer is configured to connect to the network by using the dial up connection at scheduled times during day to automatically download your e-mail messages. You do not want to synchronize the project file when you connect to the network using the dial-up connection. What you should do?

A. Configure the synchronization settings to perform a quick synchronization.
B. Configure the synchronization settings to ask you before synchronizing items.
C. Configure the synchronization settings to synchronize the project file only when using the LAN connection. Set synchronization for the personal files for both the LAN connection and your dial-up
connection.
D. Set the synchronization settings to synchronize the project file only when you log off the network. Set synchronization for the personnel files for both the LAN and dialup connection for logging on and logging off.

Answer: C

Explanation: With Windows 2000 it is possible to have different synchronization settings for every network connection. In this case one synchronization setting can be used for the LAN connection and another
synchronization setting can be used for the dial-up connection.
Incorrect answers:
A: There is no quick synchronization in Windows 2000. Quick synchronization could possibly denote automatic synchronization. This would not solve the problem though since automatic synchronization on
the dial-up connection is not desired.
B: To ask the user before synchronization would not be a workable solution since a requirement is that the computer automatically should download e-mail messages during at a scheduled basis.
D: The computer will log off the network when it uses the dial-up connection. This will cause a synchronization of the project file on the dial-up connection. This is contrary to the requirement.

22. You install a SCSI adapter and a SCSI tape drive on your Windows 2000 Professional computer. You start the computer and Windows 2000 Professional detects and installs drivers for the new SCSI devices.
Later the same day, you restart your computer. During the startup process, the computer stops loading Windows 2000 Professional. You then restart the computer and it stops again. You want to enable your Windows 2000 Professional computer to start successfully. What should you do?

A. Start the computer in Safe Mode. Enable driver signing.
B. Start the computer in Safe Mode. Use Device Manager to remove the SCSI tape device.
C. Start the computer by using the Recovery Console. Repair the Master Boot Record by using the fixmbr command.
D. Start the computer by using the Recovery Console. Disable the SCSI adapter device driver by using the disable command.

Answer: B

Explanation: There are a number of solutions to take when attempting to remove a newly installed device that is preventing a computer from starting. The first solution is to restart the computer using the Last Known Good Configuration. This will load the last hardware and registry configuration that was automatically saved by Windows 2000 on the last successful start up of Windows 2000. The second solution is restarting the computer in Safe Mode and using Device Manager to remove the device. A third solution is to use the Recovery Console. This should be used it the computer cannot start up in Safe Mode. As the option to restart the computer using the Last Known Good Configuration is not listed as an option, the best answer is to use Safe Mode and use
Device Manager to disable the device driver.
Incorrect answers:
A: Although starting in Safe Mode is part of a possible solution, enabling driver signing is not, as the device driver has already been installed. The device driver should instead be disabled.
C: The fixmbr utility is used to repair the master boot record on the hard drive. It is not used to remove a device driver that has been installed onto the operating system. It is thus not relevant to this scenario.
D: Although the Recovery Console can be used to disable the device driver, it is not the preferred solution, as it requires more administrative effort and authority than removing the device drivers in Safe Mode.

23. You are the administrator of a Windows 2000 Professional computer. You schedule a task to run after 15 minutes. One hour later, the task still has not run. You notice that your Event Viewer system log has the following error message; "The task scheduler service failed to start due to following error. The service did not start due to login
failure." You want to run the scheduler task again. What should you do before restarting the task scheduler service?

A. Set the task scheduler service to log on using a local system account
B. Set the task scheduler service to allow the service to interact with the desktop
C. Restart the remote producer call (RPC) service.
D. Log off and then log on to an account in power users group.

Answer: A

Explanation: Task Scheduler service must be set to log on using the Local System Account and not a user account. The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security principal to log on as a service, as a way of establishing a security context. The Local System account on the Windows computer always retains the right to log on as a service. Any service that runs under a separate account must be granted this right.
Incorrect Answers:
B: The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security principal to log on as a service, as a way of establishing a security context. The Local System account on
the Windows computer always retains the right to log on as a service. Any service that runs under a separate account must be granted this right. Allowing the service to interact with the desktop will not
grant the service the required rights.
C: The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security principal to log on as a service, as a way of establishing a security context. The Local System account on
the Windows computer always retains the right to log on as a service. Any service that runs under a separate account must be granted this right. Restarting the remote producer call (RPC) service will not
grant the service the required rights.
D: The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security principal to log on as a service, as a way of establishing a security context. The Local System account on
the Windows computer always retains the right to log on as a service. Any service that runs under a separate account must be granted this right. Log off and then log on to an account in power users group
will not grant the service the required rights as no user account or user group account can be granted the ‘Log as a service’ right.

24. A user named Tom reports that applications on his Windows 2000 Professional computer are running slowly. You notice that Tom’s computer has 64 MB of RAM and 100 MB free disk space. Which method
can you use to improve performance? (Choose all that apply)

A. Add Tom to the power users group.
B. Set the total paging file to 75 percent of physical memory.
C. Perform a disk analysis, and use the disk defragmenter, if recommended.
D. Use disk cleanup to delete temporary files and unnecessary program files.
E. Ensure that the performance options Window is optimized for background services.

Answer: C, D

Explanation: The system in this scenario is showing symptoms of running out of disk space. The Disk Cleanup utility can be use to free some disk space. It’s also a good idea to defragment the hard drive as a hard drive which is close to its maximum capacity can become fragmented fast.
Incorrect Answers:
A: Adding a user to a group will not improve system performance. Users and user groups have an impact on network performance and not system performance.
B: The recommended setting of the page file is 1.5 times the physical memory, not 75%.
E: On a Windows 2000 Professional computer the performance options should be optimized for Applications not Background services.

25. You are the administrator of your company's network. You attempt to install a printer driver on a Windows 2000 computer for a user Linda.
You receive the following error message: “Error 11-Cannot install printer driver.” The driver was originally downloaded from the printer manufacturer’s web site. You have successfully
used the driver in the past on their Windows 2000 Professional computers. You want to configure Linda’s computer to check for driver integrity and to allow you to install this printer driver.
What should you do?

A. Configure driver signing to display a message before installing an unsigned driver.
B. Configure driver signing to ignore File Signature Verification. Create a Local Computer Policy to enable Windows file protection.
C. Use the Add Printer driver wizard to install the driver. Create a local computer policy to enable Windows file protection.
D. Use the print troubleshooter. Configure the computer to prevent the installation of unsigned drivers.

Answer: A

Explanation: The error message in this scenario indicates that the Driver Signing option, File Signature Verification, is set to Block. Therefore the unsigned driver has to be installed. Changing the File Signature Verification to Warn will allow the installation of the device driver. It will also show a warning message when
we try to install an unsigned driver. The warning message also contains an option to install the unsigned drivers anyway. These settings are set in the Driver Signing settings on the Hardware tab of the System applet on the Control Panel.
Incorrect Answers:
B: The Driver Signature verification can be set to ignore File Signature Verification. However, Windows File Protection protects the integrity of the Windows system files. It does not check driver signings when new drivers are installed.
C: When any attempt is made to install new device drivers, Windows 2000 checks the File Signature policy. Thus, when using the Add Printer driver wizard the File Signature policy is checked. Furthermore, Windows File Protection protects the integrity of the Windows system files. It does not check any device drivers.
D: The print troubleshooter cannot be used to prevent installation of unsigned drivers.

26. Users report that some shortcuts on the start menu of their Windows 2000 Professional computers are hidden. They want to access their shortcuts without having to click a scroll arrow. How must you configure the client computers to always display all Start menu shortcuts?

A. In the folder options dialog box, clear the enable web content check box in My Desktop Properties.
B. In the display properties dialog box, clear the transaction effects for menus and tool tips check box.
C. In the folder options dialog box, clear the hide file extensions for known file types check box.
D. In the Taskbar and Start Menu Properties dialog box, clear the Use Personalized Menus check box.

Answer: D

Explanation: Personalized Menus keeps the Programs menu clean by hiding items that have not been used recently, while retaining the accessibility of all the other programs. When Personalized Menus is enabled, Windows 2000 keeps track of which programs are used, and hides the programs that have not been used 070 - 210
Leading the way in IT testing and certification tools, www.testking.com
- 32 - recently. The Start Menu Properties dialog box is accessed by clicking the Start button, selecting Settings, and then selecting Taskbar and Start menu.
Incorrect Answers:
A: Disabling the web content check box in My Desktop properties only affects the desktop setting. It does not affect the Start Menu property.
B: Transaction effects for menus and tool tips is a visual effect, which is used when you open menus. It does not affect the Start Menu property.
C: Showing file extensions of known file types will not influence the Start Menu property.

27. You are the administrator of your company’s network. Your company is based in Russia and conducts the majority of its business in Russian. Users in your company create, view, and edit documents in
English (US), French, and Spanish to communicate with vendors internationally. Users run the Russian localized edition of Windows 2000 Professional on their desktop and portable computers. A user named Katrin wants to create word processing documents in both English and
Spanish by using Notepad in Windows 2000 Professional. She requests your assistance in enabling English and Spanish on her computer.
What should you do?

A. Instruct Katrin to select the desired input locale for either English or Spanish within Notepad.
B. Instruct Katrin to select the input locale indicator on the taskbar and select either English or Spanish.
C. Instruct Katrin to use Regional Options in Control Panel to add input Locales and keyboard layouts/IME
for both English and Spanish.
D. Create a Local Computer Policy for Katrins computer to include both English and Spanish.

Answer: C

Explanation: Multiple input languages can be enabled on a Windows 2000 computer. An additional input language can be enabled by clicking on the Regional Options applet in Control Panel, selecting the Input Locale tab, then pressing the Add button, and selecting the desired input language from the drop down list. Incorrect answers:
A: The input locale cannot be changed from within Notepad. The input locale for the languages must be added before they can be selected from the task bar.
B: The input locale indicator cannot be used to switch languages unless the computer has been configured to use another language.
D: The local Computer policy cannot be configured to include both English and Spanish. It could be used to allow Katrin to use Multilingual support.

28. You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for Internet connectivity. You create a VPN connection and are able
to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.
What must you do so that you can access the Internet?

A. Configure the ISDN connection to use SLIP instead of PPP.
B. Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.
C. Clear the Use default gateway on remote network checkbox.
D. Install and configure the SAP Agent service.

Answer: C

Explanation: If the connection is using the default gateway on the remote network, it will be able to access computers on the remote network but it will not be able to access Internet.
Incorrect answers:
A: SLIP is a legacy protocol. It can only be used on servers. It enables a remote connection from a Windows 2000 Server to a Unix server, which cannot handle PPP.
B: Internet Connections Sharing would enable the sharing of this connection at the client side. It will not help to solve the problem of Internet connectivity.
C SAP is a distance-vector-based advertising protocol commonly used on IPX internetworks to advertise services and their locations. RRAS also provides the ability to configure static SAP services and SAP
service filters. SAP service filters reduce unneeded SAP traffic from being sent of RRAS connection. Installing and configuring a SAP Agent service is thus not appropriate to this scenario.

29. You are the administrator of a Windows 2000 network. You install Windows 2000 Professional on a new computer and configure the TCP/IP settings to have a static IP address. While testing network connectivity from the new computer, you discover an error in the DNS server address that is configured in the TCP/IP settings. You configure the correct DNS server address, which is 10.1.1.5. However, you are still unable to successfully connect to network resources by name.
You run the IPconfig/all command. The results indicate that the DNS server address is now configured as 0.0.0.0
You need to ensure that the computer can connect to network resources by name. What should you do?

A. Stop and restart the DNS client service.
B. Add 10.1.1.5 to the DNS server list on the TCP/IP advanced properties tab.
C. Add an A (host) record for the computer to the DNS server’s zone file.
D. Configure your DHCP server to have a DNS server address of 10.1.1.5.

Answer: A

Explanation: In this scenario the client computer does not have the correct information in its local DNS cache. There are two ways to solve this problem. We could use ipconfig /flushdns to reset the DNS cache, or we could stop and restart the DNS client service.
Incorrect answers:
B: The correct DNS address is already configured. When we enter a preferred DNS Server IP address, this address is automatically added in the DNS server list on the TCP/IP Advanced properties tab. The DNS
Server list is used to add more than 2 DNS servers.
C: The client cannot find the DNS server. Adding an A (host) record for the client computer would only help other computer to find the client computer but will not enable the client to find the DNS server.
This solution is thus not appropriate to the problem in this scenario.
D: The client computer has a static IP address and does not use a DHCP server to for IP configuration information. Therefore, changing the DNS server’s IP address in the DHCP is in appropriate.

30. From your Windows 2000 Professional computer, you need to map drive G to the default administrative share on drive C of a server named AppSrv. What can you do to map the drive?

A. Run the net share C$=G:\ command.
B. Run the net use G: \\AppSrv\C$ command.
C. Browse to AppSrv in Windows Explorer, and map drive G to the C$ share.
D. Browse to AppSrv in My Network Places, and map drive G to the C$ share.

Answer: B

Explanation: The root of each volume on a hard disk is automatically shared, and the share name is the drive letter appended with a dollar sign ($). The appended dollar sign causes the share to be hidden. One method of mapping a share to a logical drive is to open the command prompt and type the command: NET USE devicename \\computername\sharename. In this scenario this translates to the command: net use G: \\AppSrv\C$
Incorrect Answers:
A: The net share command is used to create shares not to connect to existing shares on another computers in the network.
C: It is not possible to browse to the administrative share C$ on AppSrv since this is a hidden share.
D: It is not possible to browse to the administrative share C$ on AppSrv since this is a hidden share.

31. You are using Windows Installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes an organizational unit (OU) named Sales. A Group Policy object
(GPO) is created for the Sales OU. The software deployment of the application is unsuccessful. During the deployment, some users in the Sales OU report that the installation is aborting with random errors
midway through the installation process. The remaining users in the Sales OU report that the software is installing, but is giving them general protection fault errors.
What should you do?
A. Repackage and redeploy the application’s .msi file to the Sales OU.
B. Repackage and redeploy the application’s .mst file to the Sales OU.
C. Redeploy the application by using the Group Policy object (GPO) for the Sales OU.
D. Restart Windows Installer on all computers in the Sales OU. Then redeploy the application’s .zap file to
the Sales OU.

Answer: A

Explanation: It seems likely that the software package in this scenario is not a native Windows Installer package, since there are multiple errors in the installation process. Repackaged application (.msi) files could be used to repackage applications that do not have a native Windows Installer package (.msi).
Incorrect answers:
B: .mst files cannot be used to deploy an application. .mst files are used to transform .msi files at the time of assignment or publication.
C: There is no problem with the GPO in this scenario, as the software installation actually finishes on some computers. The installation files need to be repackaged and redeployed.
D: The .zap file of an application is the original setup.exe program. Redeploying the .zap file would result in exactly the same sort of problems since no changes have been made in the deployment strategy.

32. You are delegated administrative control of the administration organizational unit. The administration OU has 12 Window 2000 Professional computers that were recently purchased. Each computer has a Fax Modem. Each computer has the fax service installed with default values and settings. A user named Helene reports that she can use Microsoft Word 2000 to send faxes, but she cannot receive
any faxes by using the fax printer. She also informs you that she cannot reconfigure the fax service on her computer.
You want to reconfigure fax service correctly. You want to accomplish this with least amount of administrative effort. You logon to Helene’s computer by using local administrator account. What should
you do next?

A. Use Fax service management to start the fax service, and configure the fax service to start automatically.
B. Use fax service manger to select the fax management service, and enable the device to receive faxes.
C. Use fax in control panel to reinstall the fax service, and configure the fax services to receive faxes.
D. Use fax in control panel to add a fax printer, and configure the fax print device to receive faxes.

Answer: B

Explanation: To configure a fax device to receive faxes first open the Fax Service Management Console from the Control Panel select the Fax applet, choose the Advanced Tab, select Fax Service Management Console,
open Devices, right-click on the Fax device, select Properties then select Enable receive.
Incorrect answers:
A: The Fax Service is already running since Helene is able to send faxes. Therefore, configuring the fax service to start automatically will not change anything in this scenario.
C: There is no need to reinstall the fax service, as Helene is able to send faxes. Instead we should use the fax service management to enable the existing fax device to receive faxes.
D: There is no need to add a fax printer. Instead we should use the fax service management to enable the existing fax device to receive faxes.

33. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install an ISA-based SCSI adapter in your docking station. You insert your computer into the docking station and start the computer. The SCSI adapter is not detected during the startup process. You start Add/Remove hardware wizard. When the wizard process is finished, the SCSI adapter is not listed. You want to allow Windows 2000 Professional to detect SCSI adapter. What should you do?

A. Restart the Add/Remove hardware wizard. Manually add SCSI adapter driver.
B. Restart the computer in Safe Mode. Restart Add/Remove Hardware wizard to detect the SCSI adapter.
C. Configure Windows 2000 Professional to use driver signing.
Restart the Add/Remove Hardware wizard to detect the SCSI adapter.
D. Copy the SCSI adapter drivers to WinNT\driver CACHE\i386 folder. Restart the Add/Remove Hardware wizard to detect SCSI adapter.

Answer: A

Explanation: When the automated detection of hardware through the use of the Add/Remove hardware wizard fails, the hardware must be installed manually by selecting the Have Disk option. The information on the disk
provided by the hardware manufacturer can then be used to install the hardware.

Incorrect answers:
B: Safe Mode is used to resolve Windows start up problems and runs with the minimum number of standard device drivers required to load the operating system. It is not used to install new devices.
C: Driver signing is a software setting designed to protect the operating system from conflicts that could arise from the installation of untested, and therefore unsigned, drivers. Furthermore, Windows 2000 in configured to use driver signing by default and the driver signing policy only comes into effect during the installation of the hardware. It would therefore not aid in the detection of new hardware.
D: The problem is not that Windows cannot find the drivers for the SCSI device. Windows cannot detect the hardware. Copying the driver onto the hard drive will not help to detect hardware. Furthermore, the
Add/Remove hardware wizard has a Have Disk option, which can be used to locate the hardware drivers on the disk.

34. You are the administrator of your company’s network. A user named Lilly prints dozens of documents daily from her Windows 2000 Professional computer. Lilly reports that she receives a dialog box
announcing that each print job she sends has printed successfully.
Lilly’s default printer is a shared printer that is connected to Windows 2000 Server computer. She wants to have this notification turned off because she has so many documents. What should you do?

A. In the server properties of the printer system folder, clear the Notify when remote documents are printed option.
B. In the server properties of the printers system folder, clear the notify computer, not user, when remote documents are printed option.
C. In the default printer properties, select the Ports tab, and clear the Enable bidirectional support option.
D. In the default printer properties, select the Advanced tab, and clear the advanced printing features option.

Answer: A

Explanation: To turn off the notification that a print job has printed successfully we must clear the “Notify when remote documents are printed” option on the Advanced tab of the Print Sever properties. The Print Server properties can be accessed via the File menu in the Printers folder.
Incorrect answers:
B: This option specifies whether the notification should be sent to the computer or the user. By clearing this setting the notification will be sent to the user. We do not want this notification to be sent. Therefore we should clear the “Notify when remote documents are printed” option.
C: Disabling the bidirectional support option will prevent the print device from communicating with the printer on the server. The printer will still be sending notification messages to users of the printer. The bidirectional support option should be enabled so that the print device could report printer problems such low toner etc.
D: The advanced printing features option concerns metafile spooling and options such Page Order, Booklet Printing, and Pages Per sheet. Disabling this option will not disable the notification of print jobs.

35. You are the administrator of your company's network. A use named Michael has limited dexterity, which prevents him from using a standard keyboard to complete his daily computing tasks. You want to
configure his Windows 2000 Professional computer to use the appropriate accessibility options. You logon to Michael’s computer by using Michael’s user account, which is a member of local users
group. You configure the stickykeys, filterkeys and togglekeys options. You then log off. Michael logs on to the computer by using this user account. Michael is able to use the accessibility option that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off. What should you do?

A. Use Accessibility Options in control panel to reconfigure accessibility idle time settings.
B. Use Accessibility Options in control panel to enable the filterkeys option to reconfigure the time setting.
C. Use Utility Manager to configure the accessibility options to start automatically when Windows 2000 Professional loads.
D. Use Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and save the settings.

Answer: A

Explanation: By choosing Accessibility Options in Control Panel, then selecting the General tab, you are able to increase the idle time settings. By doing this Michael would be able to return before the accessibility features automatically are turned off. The Accessibility Options can be found by clicking on the Start Menu, on Accessories, and then on Accessibility.
Incorrect Answers:
B: Filter Keys settings cannot be used to reconfigure accessibility idle time settings.
C: We have configured the accessibility settings and logged off. Michael then logged on and the accessibility settings were still in effect. Therefore the problem does not occur when Michael logs on to
the computer, it occurs when the computer has been idle for some time. Therefore increasing the idle time before the option is set off would solve Michael’s problem.
D: We cannot use the Utility Manager to increase the accessibility ideal time setting. The Utility Manager is used to start, stop the Magnifier, the Narrator and the On-Screen Keyboard. The Utility manager can also start these program automatically when Windows Starts or when the Utility Manager starts.

36. From your Windows 2000 Professional computer, you need to print from a 16-bit accounting application to a network printer named Printer02. Printer02 is attached to a print server named PrtSrv. The
accounting application allows you to print only to a local LTP port.
You currently have two printers attached to your local LPT1 and LPT2 ports. You need to be able to print to the network printer and to both local printers. You install the driver for the network printer on
your computer. What must you do next to enable printing on the network printer?

A. Create a new local printer port named PrtSrv\Printer02, and configure the printer to use the new port.
B. Create a new local printer port named PrtSrv\Printer02. In the properties for the new port, select the option to print directly to the printer. Configure the printer to use the new port.
C. Run the net use Lpt3 \\PrtSrv\Printer02 command.
D. Run the net print\\PrtSrv\Printer02 command.

Answer: C

Explanation: The net use command is the only method available for accessing a network printer from client computers that are running 16-bit DOS applications.
Incorrect Answers:
A: Legacy 16-bit DOS programs cannot use new local printer ports. They can only use the LPT1, LPT2, LPT3 or LPT4 ports. Those ports have to be used with the net use command.
B: Legacy 16-bit DOS programs cannot use new local printer ports. They can only use the LPT1, LPT2, LPT3 or LPT4 ports. Those ports have to be used with the net use command.
D: Net print displays or controls print jobs and print queues. It is not used to perform the actual printing.

37. You install Windows 2000 Professional on a computer named Client2. The network configuration is shown in the exhibit. .


You connect to the shared resources on ServerE daily. Today, you cannot connect to ServerE. Heather can connect to ServerE successfully from her computer. You ping ServerE to find out the nature of the problem as shown in the Ping results exhibit.



You verify that all of the servers are connected to the network and are running correctly. What is the most likely cause of the problem?

A. The router configuration.
B. The WINS configuration on Client2.
C. The WINS configuration on ServerE.
D. The default gateway setting on Client2.

Answer: A

Explanation: The servers on the various network segments can communicate with servers on the same network segment. Therefore the problem must lay with the router configuration, as communication across the router is not successful.
Incorrect Answers:
B: In the exhibit we see "Reply from 10.10.164.3: Destination host unreachable". This shows the Client2 communicates with the Router, which is the Default Gateway. So the WINS configuration on Client2 is
not the cause of the problem. C: Heather, who is on the same subnet as ServerE, is able to communicate with ServerE. Therefore there is
no WINS configuration problem on ServerE. D: Client2 does communicate with the Default Gateway (the Router in this case). We see this in the exhibit: the replies from 10.10.164.3

38. You install Windows 2000 Professional on your computer at home. You create a new dial-up connection to connect to your company's remote access server. You configure the connection to use both of your external modems and to use Multilink to bind the modems together.
You start the dial-up connection to connect to the remote access server. You notice that only one of the modems is connected to the remote access server. What should you do?

A. Configure the dial-up connection to use a SLIP connection.
B. Configure the company's remote access server to accept Multilink connections.
C. Replace your modems with new modems that support Multilink.
D. Grant your user account Multilink permission on the company's remote access server.

Answer: B

Explanation: To use multilink modems, multilink must be enabled at the client and at the server. In the scenario the multilink is enabled at the client only. We therefore need to enable it at the server as well.
Incorrect answers:
A: SLIP is a legacy protocol. It can only be used on Servers. It enables a remote connection from a Windows 2000 Server to a UNIX server, which cannot handle PPP.
C: Multilink is a feature of Windows 2000, it’s not a feature of modems. All modems can be used in a Multilink connection.
D: There is no such thing as a Multilink permission in Windows 2000.

39. You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit. .
You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.


What should you do to be able to access FTP sites?

A. Add Port 21 to the TCP Ports section.
B. Add Port 138 to the TCP Ports section.
C. Add Port 21 to the IP Ports section.
D. Add Port 138 to the IP Ports section.

Answer: A

Explanation: The FTP protocol uses the TCP port 21. In the exhibit the UDP port 21 has been incorrectly added instead of the TCP port.
Incorrect answers:
B: The FTP protocol uses Port 21 not Port 138.
C: The port 21 should be added at a TCP port 21. Not as a UDP port or as an IP protocol. IP is also a network protocol and not a port.
D: The FTP protocol uses TCP port 21 not Port 138. IP is also a network protocol and not a port.


Kommentar
Fra : e.p.


Dato : 04-10-02 00:08

40. You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary applications on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?

A. Set the permissions on the application to execute.
B. Add the application to the urn key in the registry.
C. Apply the Securews.inf security template on the users’ computers.
D. Apply the Compatws.inf security template on the users’ computers.

Answer: D

Explanation: The Compatws.inf template relaxes access controls for the Users group and is therefore well suited for Windows 2000 clients that need compatibility with older applications.
Incorrect answers:
A: The file permissions of the application file cannot be the problem since the application worked before the upgrade and the upgrade process does not change any file permissions on applications.
B: There is no urn key in the registry to which applications can be added.
C: The Securews.inf template would put even more restriction on the users. It would not help the user’s to run their application.


41. You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer. You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?

A. Rename Mark’s user account to Eric and change the account password.
B. Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.
C. Create Eric’s account by copying Marks account. Delete Mark’s account.
D. Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

Answer: A

Explanation: A user account and the permission and rights attached to them can easily be transferred to another user by renaming the account and changing the password. By renaming Mark’s user account and by changing the password, Eric will have the same rights and permissions as Mark had and Mark will not be able to use his old account. This provides the solution with least administrative effort.
Incorrect Answers:
B: Copying Mark’s profile to Eric’s account will not give Eric the permissions Mark had. Instead Eric will have the same desktop and hardware profile.
C: Every user account has a unique Security Identifier (SID). When Mark’s account is copied the resulting account, Eric’s account, will not have the same permissions.
D: This solution will meet the requirements of this scenario, however, it is not the solution with the least administrative effort. Therefore this is not the best solution. The best solution would be to rename Marks account and change the password. This would provide Eric with the same rights and permission that Mark had and would not require us to do any additional administrative work on Eric’s account.

42. Your Windows 2000 Professional computer belongs to the contoso.com domain. You need to encrypt a compressed file named c:\data. You successfully encrypt the file but discover that it is not longer
compressed. What is the most likely cause of this problem?

A. A group policy is preventing the compression of encrypted files.
B. The file is stored on a FAT32 partition.
C. Only members of the administrators and the power users groups can compress and encrypt files.
D. Encrypted files cannot be compressed.

Answer: D

Explanation: A compressed file cannot be encrypted and an encrypted file cannot be compressed. If we encrypt a compressed file, the file will first be uncompressed and then encrypted. It will no longer be compressed and neither will we be able to compress it once it has been encrypted.
Incorrect answers:
A: There is no Group Policy that prevents compression of encrypted files. A file can either be encrypted or compressed, but not both.
B: The FAT32 file system does not support compression or encryption.
C: Any user with appropriate file permissions, and not only administrators or power users, are able to compress and encrypt files.

43. You are the administrator of your company’s network. The dial-up server on your network is configured to support certificate authentication. A user names Tom wants to use smart card authentication on his Windows 2000 Professional portable computer. You verify that the Toms computer has a PC card smart card reader and the appropriate
driver installed. You give to Tom a smart card to use. What else should you do to enable smart card authentication on Tom’s computer?

A. Configure a dial-up connection to use EAP. Select the smart card device for authentication.
B. Configure a dial-up connection to use SPAP. Select the smart card device for authentication.
C. Configure a dial-up connection to use certificate authentication. Enable the users credentials for authentication.
D. Configure a dial-up connection to connect to a private network through the Internet. Enable L2TP to create a virtual private network (VPN) tunnel.

Answer: A

Explanation: Extensible Authentication Protocol (EAP) is an extension to PPP and works with dial-in, PPP and L2TP clients. The authentication methods used by EAP include smart cards.
Incorrect answers:
B: SPAP cannot be used for smart card authentication. Only EAP can be used for smart card authentication.
C: Only EAP, and not other certificate authentication methods, can be used for smart card authentication.
D: To be able to create a VPN tunnel the dial-up server must be configured for L2TP server. This has not been done in the scenario and is therefore inappropriate.

44. You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.
After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications. What should you do?

A. Add each user account to the Power Users group on that user’s computer.
B. Configure the financial and credit applications to run as services on the computers in the accounting department.
C. Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.
D. Use the computer management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

Answer: C

Explanation: The Compatws.inf template relaxes access controls for the Users group and is therefore well suited for Windows 2000 clients that need compatibility with older applications.
Incorrect Answers:
A: Adding each user account to the Power Users group might allow them to use the application but this will give the user accounts too much administrative rights. This is therefore not a good solution.
B: Applications cannot, in general, be configured to run as services. Only services can log as services.
D: The computer management console cannot be used to configure memory spaces for applications.

45. You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in research department. The computer contains highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?

A. Use security configuration and analysis to import the Hisecws.inf security template file to modify the default security settings.
B. Use security templates to create a security template file and import the security settings to modify the default security settings.
C. Use the local computer policy to disable the access this computer from the network option.
D. Use Secedit.exe to reconfigure the computer default security settings to not allow anonymous access to the computer.

Answer: A

Explanation: The Hisecws.inf, the highly secure template, is used to require maximum protection for network traffic and protocols used between computers running Windows 2000. As a result, such computers configured with a highly secure template can only communicate with other Windows 2000 computers. They will not be able to communicate with computers running Windows 95, Windows 98, or Windows NT.
Incorrect answers:
B: It is possible to make the appropriate changes to the security template manually but this is a daunting administrative task. It would be easier to use a predefined security template.
C: The Windows 2000 computers must be able to access each other. We therefore cannot disconnect the local computer form the network.
D: Anonymous access is not handled by the security settings. It is handled by enabling or disabling the Guest account, and by giving or restricting permissions to the Everyone group. Disabling anonymous access, by disabling the Guest account and removing permissions from the Everyone group, would differentiate between Windows 2000 computers and downlevel Windows systems.
51. You need to install Windows 2000 Professional on 35 new computers on the company LAN. First, you create a distribution folder on the network server. Then you create a network boot disk to install Windows 2000 Professional from the distribution folder. Now you need to create a batch file, which the network boot disk will execute to start the installation. You must specify a source path and temporary drive for the installation files. You also need to install the accessibility options within the batch file. The batch file must execute a
hardware-specific application to run after the GUI-mode Setup has completed.
Which command must you specify in the batch file?
A. Z:\i386\winnt/s:z:\i386/t:d/a/e:z:\hardware\setup.exe
B. Z:\i386\winnt/s:z:\i386/rwinnt.tmp/a/e:z:\hardware\setup.exe
C. Z:\i386\winnt32/s:z:\i386/tempdrive:d/cmd:z\hardware\setup.exe
D. Z:\i386\winnt32/s:z:\i386/cmdcons:z:\hardware\setup/makelocalsource

Answer: A

Explanation: Winnt must be used to start the installation process from a boot diskette. The /t:d switch specifies that the D drive should be used to contain temporary setup files; the /a switch specifies an installation with accessibility options; and the /e[:command] switch specifies a command to be executed at the end of Setup’s
GUI mode.
Incorrect answers:
B: This command does not specify the drive should be used to contain temporary setup files. To specify a temp drive the /t switch must be used. The /r switch specifies an optional folder that must be installed on the hard drive.
C: Winnt32 is a 32-bit application and can only be used from inside a Windows environment and not after starting the computer by means of a boot diskette. A computer can only be booted into DOS mode from a boot disk, and DOS mode cannot use 32-bit applications.
D: Winnt32 is a 32-bit application and can only be used from inside a Windows environment and not after starting the computer by means of a boot diskette. A computer can only be booted into DOS mode from
a boot disk, and DOS mode cannot use 32-bit applications.

46. You are creating a shared Internet connection on your Windows 2000 Professional computer. You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet. What should you do? (Choose all that apply)
A. Configure your shared Internet connection to disable LCP extensions.
B. Configure your shared Internet connection to disable on-demand dialing.
C. Create an Internet connection sharing application type for HTTP to use remote server for port 25.
D. Create an Internet connection sharing application type for HTTP to use remote servers port 80.
E. Create the Internet connection sharing application type for FTP to use remote server port 21.
F. Create an Internet connection sharing application type for FTP to use remote server port 72.

Answer: D, E

Explanation: HTTP traffic uses TCP port 80 and FTP traffic uses TCP port 21 for session control and port 20 for data transfer. Therefore, by enabling TCP port 80 and TCP port 21 only HTTP and FTP traffic will be allowed. All other network traffic will not be allowed.

Incorrect answers:
A: LCP extensions are used in the context of RRAS and PPP. It is not used to prevent or allow any specific type of network traffic.
B: Disabling on-demand dialing on the shared Internet connection will not prevent network traffic. It will only prevent ICS clients to initiate an Internet connection.
C: HTTP uses TCP port 80, not TCP port 25. FTP also does not use TCP port 25. It uses TCP ports 20
answer 21. SMTP uses TCP port 25.
F: Neither FTP or HTTP uses port 72.

47. You have implemented the Hisecws.inf security template on all the Windows 2000 Professional client computers in your network.
A user has received a driver and utility software for an internal SCSI controller in his computer. He uses the manufacturer-provided CD to install the driver and the utility. He restarts the computers and reports that the internal SCSI controller is not working correctly. You discover that the driver is not installed correctly. What should you do?
A. Disable the security template. Reconfigure the driver signing option. Install the driver. Enable the security template
B. Reconfigure the driver signing option. Disable the security template. Install the driver. Enable the security template.
C. Run the Sigverif command. Reconfigure the driver signing option. Install the driver
D. Run the Sigverif command. Disable the security template. Install the driver. Enable the security template
E. Run the Sfc/cancel command. Install the driver. Run the Sfc/enable command

Answer: A

Explanation: To reinstall the correct drivers, the security template must first be disabled. This will allow us to alter the driver signings policy, which we would reconfigure to either Ignore or Warn. This allows us to install the unsigned the drivers. Once the correct drivers have been installed we must reapply the security template.

Incorrect answers:
B: The Hisecws.inf template does not allow any reconfiguration of the driver signing option. The security template must be disabled before the driver signing option is reconfigured.
C: Sigverif cannot be used to configure the driver signing option. The File Signature Verification utility (Sigverif) is used to find unsigned device drivers. Sigverif allows us to view the file's name, its location, its modification date, its type, and its version number.
D: Sigverif cannot be used to disable the security template. The File Signature Verification utility (Sigverif) is used to find unsigned device drivers. Sigverif allows us to view the file's name, its location, its modification date, its type, and its version number

48. You want to prevent a Windows 2000 Professional computer named Payroll5 from communicating on your network with Windows NT 4.0, Windows 95, and Windows 98 computers. You want to enable the
payroll5 computer to communicate on your network with other Windows 2000 computers only. What should you do?
A. Close all NetBIOS ports in the advanced TCP/IP options of Payroll5.
B. Import the Hisecws.inf security template to payroll5.
C. Disable access this computer from network in the local security policy settings for payroll5.
D. Clear all WINS client settings on payroll5.

Answer: B

Explanation: The Hisecws.inf is the security template that requires highest level of security and the maximum protection for network traffic and protocols used between computers running Windows 2000. As a result, computers configured with a highly secure template can only communicate with other Windows 2000 computers. They will not be able to communicate with computers running Windows 95, Windows 98, or
Windows NT.
Incorrect Answers:
A: Closing NetBIOS ports will affect Windows 2000 and downlevel Windows clients similarly. In other words it will affect the ability of all other computers to communicate with the computer.
C: Disabling the “Access this computer from network” setting would prevent all other computers, including Windows 2000 computers, from accessing the computer through the network.
D: Clearing the WINS client settings on payroll5 will not prevent Windows 95, Windows 98 or Windows NT computers from communicating with payroll5.

49. You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install
programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.
What should you do to accomplish these goals? (Choose all that apply)
A. Add Maria’s user account to the system group.
B. Add Maria’s user account to the interactive group.
C. Add Maria’s user account to the power user group.
D. Add Maria’s user account to the administrators group.
E. Add Maria’s user account to the Backup Operators group.            
Answer: C, E                        
Explanation: By adding Maria’s user account to the power user group Maria will inherit the ability to share resources and install programs that are conferred on members of the power user group. To grant Maria the ability to backup files she must be added to the Backup Operators group, which has the permissions to backup files. As a member of this group Maria will be able to backup files as she will inherit those rights by virtue of being a member of that group. Maria will not have permissions to read the users’ files as neither the power user
group nor the Backup Operators group has the permissions to read other users’ files.
Incorrect Answers:
A: The system group is a collection of the built-in groups. System groups do not have specific memberships that can be modified. We cannot thus add users to system groups.
B: The interactive group is a built-in group, which includes the user account of the user who is currently logged on to the computer. User accounts cannot be added to this built-in group.
D: Adding Maria’s user account to the administrators group would give her too much permissions and rights. She would be able to perform all the required functions but she will also be able to read other
users’ files.

50. A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is
located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties.
What should you do to enable the user to encrypt the folder?
A. Log on to her computer as an administrator, and then run the cipher/e command.
B. Instruct the user to run the chipper/e command.
C. Log on to her computer as an administrator, and then run the Secedit/enforce command.
D. Instruct the user to run the Secedit/enforce command.
E. Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.      
Answer: E                           
Explanation: Any ordinary user should be able to encrypt files as long as they have the appropriate permission to the files and the folder and as long as the file system supports file encryption. The only file system that supports file encryption is the NTFS file system. If this file system is not in use, the option to encrypt files will
not be shown. As no option for file encryption can be found, we can assume that the disk uses the FAT or FAT32 file system. This would need to be converted to NTFS to support file encryption. We would need to log on as an administrator and run Convert d:/FS:NTFS in the command prompt, which can be called by clicking on the start button, clicking on Run and the typing cmd in the dialog box. This allows us to convert the drive to the NTFS file system without affecting the data on the drive. We however cannot convert a drive back to FAT or
FAT32.
Incorrect answers:
A: Any user who has access to a file can encrypt the file. We therefore do not require administrative privileges to encrypt the file and thus we do not need to log on with the Administrator account.
B: Windows 2000 does not support a chipper command. It does support a cipher command. The Cipher /e command would encrypt files on an NTFS partition.
C: Secedit is used to apply security templates. The secedit command does not have a /enforce switch.
D: Secedit is used to apply security templates. The secedit command does not have a /enforce switch.

51. Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol. You need to connect the computers in the marketing department to the network.
What must you do?
A. Configure the NWLink frame type of the network adapters to be ethernet 802.3.
B. Configure the NWLink frame type of the network adapters to be ethernet II.
C. Replace the network adapters with 10/100 BNC adapters.
D. Replace the network adapters with 10/100 UTP network adapters.            
Answer: D.                        
Explanation: The hubs, switches and other network devices have been upgraded to 100Mbps. It thus seems likely that the 20 computers with network connection problems in this scenario are using 10Mbps network
adapters. These need to be upgraded to 100Mbit or to 10/100Mbit network adapters. Since the network is a category 5 Ethernet network the network adapters must also support UTP.
Incorrect answers:
A: The computers were working properly before the upgrade. The NWLink protocol can be used in 100Mbps network without any problems. Therefore changing the frame type will not solve the problem.
B: The computers were working properly before the upgrade. The NWLink protocol can be used in 100Mbps network without any problems. Therefore changing the frame type will not solve the problem.
C: A category 5 network uses UTP cabling not thinnet BNC connectors.

52. Your Windows 2000 Professional computer has a single Pentium II 400-Mhz processor, 64 MB of RAM, and E-IDE hard disk. You use your computer to design graphics ads for web sites and newspapers.
When you are working on multiple ads simultaneously, you notice that your computer responds very slowly. You are also experiencing long delays when loading color palettes and importing graphics.
You use system monitor to view your system performance as shown in the exhibit. . You want to improve the performance of your computer based on the performance results. What should
you do?


A. Increase the physical RAM in the computer to 128 MB.
B. Increase the processor priority level for your development application.
C. Add a second Pentium II 400-MHz processor.
D. Upgrade the hard disk to a SCSI-based hard disk.               
Answer: C                        
Explanation: The Processor: %Processor Time counter measures the time a processor takes to execute a nonidle thread. A Processor: %Processor Time count that is above 80% for extended periods of time indicates that the CPU is unable to handle the load placed on it and is the cause of a system bottleneck. The exhibit in this scenario shows that the Processor: %Processor Time counter is close to 100% most of the time and should upgraded. Replacing the processor with a fast one or adding a second processor, as is suggested here, will improve system performance.
Incorrect answers:
A: The Memory: Pages/sec counter is used to measure memory usage. In the exhibit this is represented by the green line and is well within acceptable limits. Insufficient RAM is therefore not the primary
problem in this scenario, the processor performance is.
B: The processor is at its limit. Giving the application higher priority won’t enable the processor to work any harder than it already is. The processor needs to be upgraded or an additional processor added to the system.
D: The Physical Disk: Ave. Disk Queue Length counter is used to measure hard disk performance. In the exhibit this is represented by the blue line and is well within acceptable limits. The primary problem in
this scenario is the processor performance not the disk subsystem.

53. You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network.
What should you do? (Chose two)
A. Use Windows Explorer to enable offline files.
B. Use Windows Explorer to create shortcut to access offline files folder as desktop.
C. Use Windows Explorer to configure the properties of your home folder to be available offline.
D. Use synchronization manager to configure your home folder to be available offline.
E. Create a shortcut in my network places to access your home folder.            
Answer: A, C                           
Explanation: To ensure that we can access all of our files in our My Documents folder when we are not connected to the network, we must enable caching at the server by using Windows Explorer. At the client computer we must connect to a network share and configure it to be available for off-line access.
Incorrect answers:
B: Shortcuts cannot be used to access offline files and folders.
D: The synchronization manager is used to manage synchronization not to configure folders to be available offline.
E: Creating a shortcut to your home folder will not make it available offline.

54. Your Windows 2000 Professional computer has 64 MB of RAM and two hard disk drives, drive C and drive D. Each hard disk has more than 500 MB of free disk space. Windows 2000 Professional is installed
on drive C. You frequently run two or more memory-intensive graphics applications simultaneously. You notice that access to drive C is much slower when you are using the graphic applications. You want to maximize disk performance. What should you do?
A. Configure the paging file on drive C to set the initial size of the virtual memory and a maximum size of the virtual memory to the 64 MB.
B. Configure the paging file on drive C to set the initial size of the virtual memory and a maximum size of the virtual memory to the 128 MB.
C. Move the paging file from drive C to drive D to set the initial size of virtual memory and the maximum size of virtual memory to 256 MB.
D. Move the paging file from drive C to drive D. Set the initial size of virtual memory to 56 MB and maximum size of virtual memory to 256 MB.               
Answer: C.                        
Explanation: If possible, the paging file should be placed on a different physical disk than the operating system. In this scenario the paging file should be placed on the D drive. The default size of a paging file is 1.5 times available RAM, in this scenario it should be 96MB. Sometimes it is beneficial to increase the default page
size, for example when using resource intensive applications.
Incorrect Answers:
A: The paging file should be placed on a different physical disk than the operating system. In this scenario the paging file should be placed on the D drive.
B: The paging file should be placed on a different physical disk than the operating system. In this scenario the paging file should be placed on the D drive.
D: The initial size of the paging file is incorrect as it should be 1.5 times the size of the available RAM. As the amount of RAM is 64 MB in this scenario, the paging file should be 96MB.


55.You are the administrator of your company’s network. You use your Windows 2000 Professional computer to transfer 20 large files. Each file is 100 MB in size. You want to copy the files from the UNIX
server in your branch office to a computer running Microsoft SQL server at the main office. When you copy the files by using Windows Explorer, the connection appears to time out and the file copy
is aborted. You suspect that you encountering a TCP/IP performance problem. Your network connection is shown in the Xircom LAN Properties dialog box in the exhibit.

You want to monitor the performance of TCP/IP on your computer. What should you do?
A. Install the network monitor agent. Use the performance console to view all the counters for the TCP object.
B. Install the network monitor agent. Use the performance console to view the fragmented datagrams/sec counter.
C. Install SNMP. Use the performance console to view all the counters for the TCP object.
D. Install simple TCP/IP services. Use the performance console to view the fragmentation failures counter.                        
Answer: C                        
Explanation: By installing Simple Network Management Protocol (SNMP) many new performance counters will be available. The counters for the TCP object can be used to monitor TCP/IP performance problems.
Incorrect answers:
A: SNMP, not network monitor, will install the counters for the TCP object. However, network monitor can be used to measure TCP/IP performance.
B: SNMP, not network monitor, will install the counters for the TCP object. However, network monitor can be used to measure TCP/IP performance.
D: Simple TCP/IP services includes DayTime, Echo, Quote of the Day, Discard and Character Generator. It is not used to install counters or to monitor the system.

109.You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a 400- Mhz Pentium III, and has 128 MB of RAM and a 10-GB hard disk. You are performing the installation
by using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates that your computer is
infected with a Master Boot Record virus.
What should you do before you continue the installation?
A. Remove the virus checker in Windows 98.
B. Disable the BIOS virus checker and restart the computer.
C. Run Fixmbr.Exe from the Windows 20000 Professional CD-ROM.
D. Modify the Boot.ini file to include a signature parameter on the ARC path of the system partition.      
Answer: B                           
Explanation: During the installation of Windows 2000, the setup program must make changes the boot sector. The BIOS virus checker interprets changes made to the boot sector as the result of a virus and prevents the computer from booting any further. We must therefore disable the BIOS virus checker.
Incorrect answers:
A: Removing the virus checker in Windows 98 before starting the upgrade process could increase the performance of the upgrade. However, it is the BIOS virus checker on the computer that is indicating
that the computer has a Master Boot Record virus. In this case the BIOS virus is the problem though.
C: We can fix a faulty master boot sector record by starting the Recovery Console and using the Fixmbr command. However, the master boot sector has not been corrupted in this scenario. The BIOS virus
checker has mistakenly detected a possible virus.
D: The Boot.ini points to the correct boot partitions on a dual boot system. It does not indicate a boot sectorvirus warning. The BIOS virus checker has mistakenly detected a boot sector virus and has generated
the warning.


56.You are installing Windows 2000 Professional on a computer named client2. The network is configured as shown in the exhibit. .
Your network uses TCP/IP as the only network protocol. You configure Client2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.13.1, and a WINS Server address of 10.10.13.10. ServerB is configured with TCP/IP. ServerB is the network WINS server.
You cannot connect to shared resources on ServerB and ServerC by using UNC names. You want Client2 to be able to connect to ServerB and ServerC.


What should you do?
A. Configure Client2 to use a default gateway of 10.10.20.1.
B. Configure Client2 to use a TCP/IP address of 10.10.13.234.
C. Install a WINS server on the same segment as Client2.
D. Install and configure a DNS server, and configure Client2 to use the DNS server service.      
Answer: A                           
Explanation: The exhibit indicates that Client2 has an incorrect default gateway setting, the gateway setting should be 10.10.13.1 and not 10.10.20.1 as can be seen in the exhibit.
Incorrect answers:
B: There is no need to change the TCP/IP address of Client2. This will not enable Client2 to connect to ServerB. We should instead configure Client2 with the correct the default gateway.
C: It is not necessary to install a WINS server on the same segment as Client2. Client2 would be able to reach the WINS server on the other segment if the default gateway setting was configured correctly.
Furthermore, adding a WINS server to the segment that Client2 is on will not enable Client2 to connect to ServerB.
D: Client2 is already configured for WINS therefore DNS is not required as WINS and DNS are both responsible for name resolution. And both can be used by Windows 2000 Professional.

57.You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company's network and is not accessible from the internet.
Your company's network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company's VPN
server. After the connection is successfully established, you run the net view\\server1 command and receive the following error ‘the server is inaccessible or could not be found?
You need to access the shared files on server 1. What should you do?
A. Stop and then start the TCP/IP NetBIOS helper service on your computer.
B. Stop and then start the DNS client service on your computer.
C. Add a HOSTS entry for server1 to your computer.
D. Add a LMHOSTS entry for server1 to your computer.               
Answer: D                           
Explanation: By adding a LMHOST entry for server1 the home computer will be able to access the Server by
using its NetBIOS name.
Incorrect answers:
A: Stopping and starting the TCP/IP NetBIOS service will not solve the problem in this scenario.
B: The name Server1 is a NetBIOS name not a DNS name. Therefore, stopping and then restarting the DNS client service will not solve the problem in this scenario.
C: HOST files map DNS entries, but Server1 is not a DNS name it is a NetBIOS name. Therefore we do not require HOST entries for Server1 on our computer.

58.You need to install Windows 2000 Professional on 35 new computers on your company's network. You also need to install the Recovery Console during the installation. You create a distribution folder and copy the Windows 2000 Professional support folder to the network
server. Then you create a network boot floppy disk to install Windows 2000 Professional from the distribution folder. You need to create a batch file, which the network boot disk will execute to start the installation. Which command must you specify in the batch file?
A. Winnt32 /cmd:z:\i386\winnt/a
B. Winnt32/cmd:z:\support\tools\setup.exe
C. Winnt/e:z:\i386\winnt/cmdcons
D. Winnt/e:z:\support\tools\setup.exe                  
Answer: C                        
Explanation: The installation of Windows 2000 comprises of stages. The first stage is the Setup Program, which runs in text mode. During this stage the hard drive is checked and prepared for the installation and the files required for the Setup Wizard are copied to the hard drive. This stage ends with a reboot and is followed by the Setup Wizard, the second stage, which runs in graphical mode. Windows Networking is installed during the third phase and ends with another reboot. This is followed by the final phase, which completes the Setup by installing the start menu items and the registry components; saving the configuration, removing temporary setup files and rebooting the system.
The switch /e specify that the Windows 2000 Setup program must run a command after the final stage of the installation of Windows 2000 is finished. The parameter winnt/cmdcons specifies that the command must install the Recovery Console onto the hard drive.
Incorrect answers:
A: As the boot floppy operates in dos mode, we cannot use 32 bit applications such as Winnt32.
Furthermore, Winnt32 does not support a /cmd switch.
B: As the boot floppy operates in dos mode, we cannot use 32 bit applications such as Winnt32.
Furthermore, Winnt32 does not support a /cmd switch. The setup path specified in this parameter points to the Windows 2000 Support Tools that are intended for use in diagnosing and resolving Windows
2000 computer problems. The installation files for the Recovery Console are located in the i386 folder on the Windows 2000 Professional CD and is initiated by specifying the /cmdcons switch with the winnt.exe command. It is not necessary to include the .exe file extension in the command, as Windows will check for an executable file with the name winnt.
D: The setup path specified in this parameter points to the Windows 2000 Support Tools that are intended for use in diagnosing and resolving Windows 2000 computer problems. The installation files for the
Recovery Console are located in the i386 folder on the Windows 2000 Professional CD and is initiated by specifying the /cmdcons switch with the winnt.exe command. It is not necessary to include the .exe file extension in the command, as Windows will check for an executable file with the name winnt.

59.You are the administrator of your company’s network. You want to deploy a Windows 2000 Professional service pack to 10 computers in the developmental Organizational Unit. You create a Windows 2000 installer package file for the service pack. You use the package files to
successfully install the service pack to other computers in the domain. You assign the package file to the development Organizational Unit. After the installation you notice that the service pack was not installed on any of the 10 computers. You want to ensure that the service pack is successfully installed on the computers in the development Organizational Unit. What should you do?
A. Use computer management to start the Windows installer service on all the computers in the Development Organizational Unit
B. Use the local administrator account to log on to the computers in the Development Organizational Unit. Then redeploy the service pack to the computer in the Development Organizational Unit.
C. Run Windows installer to repair the package file. Then redeploy the service pack to the computers in the Development Organizational Unit.
D. Add the user accounts from the Development Organizational Unit to a DACL. Grant the user accounts read permission to the service pack deployment directory.            
Answer: D                        
Explanation: Before users can access resources on Windows 2000, they must be assigned the appropriate permissions to those resources. In this scenario the user from the Development OU needs to be assigned read permission to the deployment directory, which is an object, to be able to start the installation process. Objects, such as the deployment directory, use a DACL (discretionary access control list) to check whether users or groups have been allowed or denied permissions to the object that they are attempting to access. Therefore, the
user accounts of the Development OU must be added to a DACL.
Incorrect answers:
A: This is not the most likely problem. The most likely problem is that the user account does not have appropriate permissions on the service pack deployment directory.
B: Assigned software does not need to be installed with any special user account. There is thus no need to log on with the local administrator account.
C: As the package was installed successfully on other computers in the domain, the problem does not lie with the installation package. Instead it lies with the Development OU’s lack of the appropriate permissions to access the deployment directory.

60.You are preparing to install Windows 2000 Professional on 75 new computers. You want to create a Standard installation image to use on all the new computers. The computers have several different configurations of hard disks and hardware components. You install Windows 2000 Professional and other standard software on one of the computers. You log on to the computer using the local administrator account. You configure the standard applications and customize the desktop settings you intend to deploy. You run the setup manager and create a Sysprep.inf file. You copy Sysprep.exe and Setupcl.exe to the
C:\Sysprep folder. You run Sysprep.exe and run your third party disk imaging software. You copy the image to the several test computers and restart the computers. When the installation is complete, you find that some of the computers do not function at all. You also find that the desktop settings do not appear as you have configured them on the original computer. You want to correct the imaging process and ensure that all computers have the same standard desktop.
What should you do? (CHOOSE TWO)
A. Copy sysprep.inf to C:\sysprep folder.
B. Copy the administrator profile to default user profile, then grant permissions to the Everyone group to use the profile.
C. Include the -pnp parameter for sysprep.exe when you rerun that utility.
D. Include the -nosidgen parameter for sysprep.exe when you rerun that utility.         
Answer: B, C                        
Explanation:
B: A user profile is automatically created and maintains the desktop configuration for each user's desktop on the local Windows 2000 computer. This user profile is created when the user logs on to a computer for the first time. An administrator profile, which maintains the administrators desktop configuration is created during the Windows 2000 Professional installation. In this scenario the administrator profile, must be copied and used as the Default User profile, which is applied to all users. As all users are automatically placed in the Everyone user group, the Everyone user group must be granted permission to access this profile.
C: Because the computers that Windows 2000 Professional will be installed onto have different hardware configurations, a full plug and play detection must be done during the installation process. This can be accomplished by including the -pnp parameter to the sysprep.exe utility, as this parameter causes the plug and play detection utility to be used.
Incorrect answers:
A: When the installation is complete, you find that some of the computers do not function at all and that the desktop settings do not appear as they have been configured on the original computer. This indicates that the sysprep installation was done on some of the computers. Therefore there is no need to copy the sysprep.inf file to the C:\Sysprep folder. Had it been required, the installation of all the computers also would have failed.
D: The -nosidgen is only used on the initial computer where the clone image was made. It instructs the installation program not to generate the system information that is unique to each installation of
Windows 2000 Professional. This parameter is not used here during the installation of Windows 2000Professional on the target computers. It is therefore not relevant to this scenario.

61.You install Windows 2000 Professional on 10 computers that have Video Capture Cards installed. A user named Lilly reports that her video capture card is not functioning correctly. She wants to use her video capturing software to capture video frames, but she cannot view the video output. You use the Device Manager to view the hardware settings on Lilly’s Computer as shown in the exhibit.


You want Lilly to be able to capture the video frames by using the video capture card. What should you do?
A. Use system in control panel to enable the device.
B. Use Device Manager to update the driver for the device.
C. Move the video capture card to a different PCI slot   
D. Uninstall the device and disable plug and play detection for the device         
Answer: B                        
Explanation: Windows has detected the device (the device with the ? in the exhibit) but the correct device driver has not been installed. The Device Manager can be used to install the correct device driver.
Incorrect answers:
A: The device has already been enabled. However, Windows 2000 requires the correct driver for the device. The wrong driver is currently installed.
C: Moving the device to another PCI slot will not solve the problem in this scenario. The device has already been installed however, Windows 2000 requires the correct driver for the device. The wrong driver is currently installed.
D: If you disable Plug and Play the system will not be able to find new devices.

Kommentar
Fra : e.p.


Dato : 04-10-02 12:00

bestået

Kommentar
Fra : dk


Dato : 04-10-02 12:31

puha dada den var lang..........

tillykke

Accepteret svar
Fra : strarup

Modtaget 1 point
Dato : 04-10-02 17:13

Hej E.P.

tillykke...

umiddelbart ka' man blive medlem her, og så også få indsigt i dokumentet... -->
http://www.cert21.com/82907127.htm

der er også lidt her... -->
http://www.itpasszone.com/freequestion/free702101.htm

umiddelbart har de den til at ligge her... -->
http://www.certyourself.com/70210.shtml
hvor man ka' downloade den i PDF format... -->
http://www.certyourself.com/win2kprostudyguide.htm
(http://www.certyourself.com/70-210CY.pdf)

LabMice.net har også en del relateret til den... -->
http://www.labmice.net/MCSE/exam70210/
har også et link hvor den ka' downloades...

mvh.

Strarup

Godkendelse af svar
Fra : e.p.


Dato : 14-01-03 02:11

Tak for svaret strarup.
                        

Du har følgende muligheder
Eftersom du ikke er logget ind i systemet, kan du ikke skrive et indlæg til dette spørgsmål.

Hvis du ikke allerede er registreret, kan du gratis blive medlem, ved at trykke på "Bliv medlem" ude i menuen.
Søg
Reklame
Statistik
Spørgsmål : 177422
Tips : 31962
Nyheder : 719565
Indlæg : 6407882
Brugere : 218876

Månedens bedste
Årets bedste
Sidste års bedste