Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computer Certification > MCSE > Questions Relating to Administering Windows 2000 Server

Reply
Thread Tools

Questions Relating to Administering Windows 2000 Server

 
 
Marco Gonzalez
Guest
Posts: n/a
 
      09-14-2004
I need your help as soon as possible.

Thanks for your time and consideration




1) Jerry works in a small environment which will require
only one Windows 2000 Server. The current platform is
LINUX Red Hat 6.0. Jerry would like to perform this
installation across the network. Jerry has configured a
Samba share containing the \I386 directory files and
installed the network client on the target computer. Jerry
runs winnt /s and points it to the share. Setup returns an
error "Failure of dependency service to start." What
should Jerry do to resolve this situation?

A) Jerry should replace the network adapter and/or the
network cable and attempt installation again.

B) Jerry should contact the Linux Administrator and
request a restart of Samba.

C) Jerry should recopy the \I386 directory and make sure
all the files are there and not corrupted.

D) Jerry should replace the hard drive as it probably
failed.

E) Jerry should try again later if the network is down.








2) Sarah has been attempting to install Windows 2000
Server for two days. She consistently gets the following
error, "Error loading operating system." She has run f
disk multiple times using various partition
configurations. In order to rule out hardware issues, she
has swapped a known good UDMA-100 40 GB hard drive for her
UDMA-100 33 GB hard drive. She has also swapped the UDMA-
100 cable four times. Windows 2000 Server will not
install. What may be causing the problem?



A) Sarah must use PC 133, CAS-2 memory. The RAM and
processor are obviously incompatible.



B) Sarah must run winnt using the /noreboot switch. This
will halt the reboot step in the installation process and
allow him to troubleshoot the error using the Disk Manager
snap-in from the Administrator menu.



C) Sarah has checked the cables and hard drives. They seem
to be good, so the jumpers or BIOS settings for the drive
configuration are most likely incorrect.



D) Sarah must run winnt using the /syspart: C switch. This
will copy all the files to the hard drive, provide the
correct settings for setup to proceed past the reboot
phase.



E) Sarah must replace the UDMA-100 hard drive with a
standard IDE drive. Windows 2000 Server does not support
UDMA-100 at this time.







3) Exactly how many processors does Windows 2000 Server
support?



A) 2, asymmetrically

B) 4, symmetrically
C) 2, symmetrically

D) 4, asymmetrically

E) 8, symmetrically or asymmetrically





4) Sally is attempting to install Windows 2000 Server in a
small legal firm. The computer, a Pentium II 333, 256 MB
of RAM, 8x CD-ROM, and an 800 MB hard drive, has been a
solid performer for the past 2 years and produced no
errors. During the ScanDisk phase of setup Sally receives
an error, "Setup has been aborted. Please remove any disks
and press any key to restart." What should Sally do to
resolve the situation?



A) Sally should change out the CD-ROM. Windows 2000 Server
requires a minimum 16x CD-ROM to perform an installation.



B) Sally should check the RAM. She probably has a bad DIMM.



C) Sally should upgrade her hard drive to 1GB minimum, 2
GB if that is possible. Windows 2000 Server requires a
minimum of 1 GB of hard drive space.



D) Sally should have specified the correct path to the
\I386 directory.



E) Sally should partition the hard drive, copy the \I386
directory, and attempt the install from the hard drive.








5) Andrew wants to install Windows 2000 Server on a
Pentium III 933 with 256 MB of RAM, and a 40 GB hard
drive. However, he does not want to sit while setup runs,
as he has other work which also needs to be completed.
Andrew loads the setup disk in the CD-ROM, drive D,
partitions the hard drive using a small primary DOS
partition, and copies the file Andrew.txt there. He
changes to drive D:\ and invokes the command \I386\winnt32
\ /s:d:\I386 /unattend:c:\Andrew.txt. What should happen
when Andrew returns in about an hour?



A) He will need to continue with the GUI stage of
installation.



B) Setup should be waiting for user input.



C) Andrew will need to remove the CD, and restart and then
configure Windows 2000 Server.



D) Andrew will need to add the relevant network
information.



E) Andrew will see an error.








6) What function does Sysprep.exe serve during the
installation of Windows 2000 Server?



I. It can be used to automate installation.

II. It guarantees duplicate SIDS by adding unique hardware
identifiers.

III. It adds a mini-setup Wizard to the image file which
will run when the computer is started for the first time
after installation is complete.



A) I

B) I and II
C) I and III

D) All of the above

E) None of the above








7) John has made the decision to upgrade his facility to
Windows 2000 Server. His current Server is running Windows
3.51 with Citrix MetaFrame. He assumes the hardware
configuration exceed the minimum requirements. John
successfully upgrades the server to Windows 2000. However,
when he reboots, he notices that his settings are not
correct and Citrix MetaFrame has disappeared. What should
John do to recover this?



A) John should uninstall Windows 2000. This will reinstate
his original settings.



B) John will need to reinstall Citrix MetaFrame on his
server. Windows 2000 Server does not support a clean
upgrade. He disregarded the warning message during setup.



C) John will need to map a share to the directory that
contains Citrix MetaFrame. All his settings were saved in
a .tmp file.



D) John should restore from backup. This will restore his
original network settings as well as map a directory to
Citrix MetaFrame.



E) John should rename the \I386 directory to \Citrix.







Windows 2000 Server will upgrade and preserve settings
from which of the following operating systems?

I. Windows NT 3.51 Server

II. Windows NT 4.0 Server

III. Windows NT 4.0 Terminal ServerI

IV. Windows NT 4.0 Enterprise Edition

V. Windows NT 4.0 Workstation



A) I, II, and III

B) II and IV

C) II, III, IV, and V
D) All of the above

E) None of the above







9) Jerry has completed a successful installation of
Windows 2000 Server. He would like this server to become
the Primary Domain Controller in an environment that
includes 5 other servers. What command must he issue to
complete this step?



A) Jerry must issue the command promote from the command
prompt.



B) There is no command issued. Jerry must click Start,
Programs, Administrators Tools, Server Manager, and then
access the promote command from the toolbar.



C) Jerry must issue the command dcpromo from the command
prompt.



D) Jerry should have selected that option during the
network installation phase of setup.



E) Jerry should do nothing. Windows 2000 Server is the
Primary Domain Controller by default.








10) When installing Windows 2000 Server, exactly how many
stages of setup exist, according to Microsoft's White
Paper release?



A) 1

B) 2

C) 3
D) 4
E) 5





11) Windows 2000 Server requires how many partitions to
complete setup successfully?



A) 1
B) 2

C) 3

D) 4
E) None







12) With what new technology did Windows 2000 Server
replace Windows NT 4.0 Server Incorporated Directory
Replication Services?



A) Nothing, with the advent of Windows 2000 Server, there
was no need for Directory replication as it now happens
automatically.



B) Windows 2000 Server incorporates a new technology
called File Replication Service, which is fault tolerant
and is easier to administer than its predecessor.



C) Windows 2000 File Management Service. In this, all
passwords and profiles are stored, an image is created,
and replicated every 15 minutes automatically each time a
new account is created.



D) Windows 2000 Server handles replication through Active
Directory Services. Replication occurs every 3 hours and
automatically when a new account is created.



E) Windows 2000 Server continues to use Directory
Replication Services. Replication occurs every 15 minutes
by default, and automatically when a new server is
installed on the network.







13) What is required to secure files and folders which
have been configured for Web Services?



A) IIS must be running on the server where the folders are
to be shared. The access permissions must be set read,
write, script source access, and directory browsing.
Application permissions must be set none, scripts and
execute.



B) SMS 2.0 Server must be installed and running. Create a
share and name it Browsing Files. Point Web Services must
be pointed to that share.



C) The files must be password protected and placed in a
share folder under the IIS directory.



D) There is no way to secure these files.



E) The files must be created under the Administrator
account.








14) Regina has a copy of Windows 2000 Server on a Jaz 1.0
GB drive. She runs winnt from the \I386 directory. Setup
reaches 84% and fails. Assuming she has exceeded the
hardware requirements, and all of the hardware is known to
be good. What can she do to recover from this failure?



A) Regina should rerun the installation with the /noreboot
switch to ensure Windows 2000 Server does not attempt
another reboot.



B) Nothing. Setup can only run from a CD-ROM, the hard
drive, or a network share.



C) Regina should run ScanDisk to determine whether the
files are corrupted.



D) Regina should check the connection between the Jaz
drive and the computer to confirm the connection was not
broken.



E) Regina should rerun the installation using the /ox
switch. This invokes setup from across the network.








15) Joan wants to see what the current compression rate is
on the \I386 file on her Windows 2000 Server. Which
command should she issue to accomplish this?


A) Joan should run the command "compact C:\I386" from the
command prompt.



B) Joan should double click on My Computer, C:\, and then
the \I386 file. The compression will be displayed at the
bottom of the pop-up window.



C) This cannot be done.



D) Joan should run Disk Manager, locate the file, right-
click on the \I386 directory, and select Properties.



E) Joan should run the command "diffile" from the command
prompt.







16) Mark has installed Windows 2000 Server in his office
of 7 employees. Since there are so few employees, Mark has
elected not to use DHCP. Mark does want to implement a
Virtual Private Network. How can he accomplish this
without configuring the DHCP Server?



A) Mark must use DHCP to accomplish this. There is simply
no way around it.



B) Mark must click on Start, then Control Panel, then
Network and Dial-up Connections. He must then Locate the
connection he wants to share, right-click on it and select
Properties. Under the Shared Access tab, he needs to check
the box beside "Share this Connection".



C) Mark must use a layer 3 switch and configure the
Virtual Private Network from there.



D) Mark must first install another network card. Then,
Mark must click on Start, then Control Panel, then Network
and Dial-up Connections. Locate the connection he wants to
share, right-click on it and select Properties. Under the
Shared Access tab, he needs to check the box beside "Share
this Connection." Mark may then plug the second network
card into a hub or switch and then add other computers. He
must then reboot each computer and configure Internet
access.



E) Mark must install a second network board and connect
that card to a hub or switch along with all the computers
with which he wishes to share Internet access.








17) What protocol does Windows 2000 use to communicate
with IBM Mainframes?



A) NWLink

B) TCP/IP
C) DLC

D) NetBeui

E) IPX/SPX








1 Active Directory cannot run without which Service?



A) DHCP

B) Windows 2000 File Replication Service

C) Domain Name Service
D) Network Services

E) Windows Management Instrumentation Service








19) Gerald would like to assess his network traffic, which
is aggregated or centralized, through his Windows 2000
Server. Assuming DHCP is installed, which tool should he
use to determine this information?



A) Gerald should go into the Accounts, select a user,
right-click, and click on the Properties tab. This is the
best and most efficient way to determine the average load
on the Server.



B) Gerald should use the new DHCP MMC console snap-in,
Enhanced Monitoring Service. This will not only provide
him with the needed information, it will also provide him
with graphical data he can present at meetings.



C) Gerald should use Server Manager to determine the total
traffic for his users.



D) Gerald should use a third-party software tool. Windows
2000 has no tool that will accomplish this task.



E) Gerald should use User Manager, and select Domain
Properties. He can find this information there.








20) Which service, in Windows 2000 Server, facilitates
intrusion detection of potentially conflicting network
addresses on the network?



A) Rouge DHCP Server Detection Service
B) Domain Name Service

C) Enhanced Monitoring Service

D) Option Class Support Service

E) Expanded Scope Support Service







21) What does Windows 2000 Server utilize to ensure File
Security?



A) Windows 2000 Server installs file security by default.
2000 isolates directory folders and auto secures them with
the password assigned to Administrator.



B) Windows 2000 Server utilizes the latest file allocation
table, FAT32, to ensure file level security.



C) Windows 2000 Server utilizes NTFS v.5 to ensure file
level security.



D) Windows 2000 Server utilizes Kerberos to ensure file
level security.



E) Windows 2000 Server utilizes NTFS v.4 to ensure file
level security.








22) What is the complete list of files that compose Active
Directory?



A) sysdiff.exe, compact.exe, ntuser.dat, and usr.exe



B) sysprep.exe, re1.log, res2.log, ntbackup.exe, and
ntds.dit



C) res1.log, res2.log, ntvdm.dit, and edb.chk



D) edb.log, edb.chk. res1.log, ntds.dit, and res2.log



E) users.dat, ntvdm.log, aduser.dll, and userenv.dll








23) Jennifer has finished installing Windows 2000 Server.
She would like to take advantage of the Active Directory.
DNS is being done through Windows 2000. She named the
server SERVER#1 in order to effect efficient management of
the domain iwantinternet.com. When she runs dcpromo, she
receives the following error, "Incorrect computer name."
What, if anything, can she do to resolve this situation?



A) Jennifer can do nothing until she installs a second
Primary Domain Controller. She must name that one
SERVER#2, and then she will be able to configure Active
Directory.



B) Jennifer can solve this problem by renaming the server
to SERVER1. Active Directory does not support the
character #.



C) Jennifer will need to create a CNAME called MyServer
for SERVER#1. She will then be able to install Active
Directory.



D) Jennifer should run the compact command. She does not
have enough free space to create the Active Directory.



E) Jennifer can do nothing. She will need to format and
start again because she failed to install all of the
Administrative Tools.








24) Ntds.dit, a core component of Active Directory, grows
as the database fills up. However, it is limited in size
by how much?



A) 10 MB

B) 20 MB

C) 50 MB

D) 100 MB

E) 1 GB








25) What is the Global Catalog's primary function?



A) In Windows 2000 Server, it provides assistance to the
help tool by providing a cached list of frequently used
queries.



B) In Windows 2000 Server, it provides quick and efficient
searches across the entire Active Directory forest.



C) In IIS 5.0, it is a powerful e-commerce tool which
allows you to setup a store front with relative ease.



D) In Windows 2000 Server, it provides efficient
monitoring of network services across a VPN within the
domain.



E) In Windows 2000 Server, it provides an access point to
access network shares in Linux using Samba.








26) What is the primary consideration in restoring a DC
through replication?



A) Hard disk space
B) Bandwidth

C) RAM

D) Processor

E) Time Management







27) What is the default method of restoration of the
Active Directory?



A) Full

B) Incremental
C) Differential

D) Non-Authoritative

E) Authoritative









2 When is a primary restore absolutely required?



A) It is never a requirement.



B) When the Domain Controller you are restoring is the
only DC in the domain.



C) When you want to restore any Primary Domain Controller.



D) When you are using Active Directory.



E) A primary restore is always required under every
circumstance.








29) You have been assigned the task of changing the
Administrator password for your Windows 2000 Server. Upon
logging in, you enter the Active Directory. After locating
the Administrator account, you right-click and notice
the "change password" option is not available. Is it
possible at this point to change the Administrator
password? My Answer:



A) No, The Administrator password is set in stone during
the installation portion and cannot be changed.



B) You must first change the name of the account, then
the "change password" option will appear. Once you have
done this, simply change the name back to Administrator.



C) Yes, Press Ctrl + Alt + Del while logged in as
Administrator. Then select the option "Change Password".
Make your modification and save it.



D) You must first log in as the Domain Administrator,
rename the Administrator account, change the password, and
then rename the account back to Administrator.



E) It is not possible to alter the Administrator account.








30) Assuming you have installed Windows 2000 Server, what
is absolutely required to configure Active
Directory?



A) Domain Name Services. If you do not have a DNS server,
Active Directory will install one automatically upon the
administrator's confirmation.



B) An effective business model. Active Directory cannot be
configured unless it detects a business model.



C) The DHCP Server must be installed and started. Active
Directory cannot be configured without the presence of
DHCP services.



D) NetBeui. Without this protocol, Active Directory cannot
be configured.



E) A second Primary Domain Controller. Without the
presence of a second PDC, it is impossible to configure
Active Directory.








31) What is the default subnet mask for a Class B network?



A) 255.255.255.255

B) 255.0.0.0

C) 255.255.255.254

D) 255.255.0.0

E) 255.255.255.194







32) PPP supports which of the following protocols?



I. TCP/IP

II. IPX/SPX

III. NetBeui

IV. AppleTalk



A) I and IV

B) I, II, and IV
C) III and IV

D) All of the above

E) None of the above







33) Jennifer has noticed a significant amount of
inappropriate traffic originating from the IP address
192.168.0.66. She has over 300 users in her domain, so she
cannot afford to visit each individual machine to
determine the identity of the offender. What tool can she
use to determine the DNS of the workstation in question?



A) ping

B) netstat

C) netdiag

D) tracert
E) tracefind







34) In the Windows NT 4.0 model uses a Primary Domain
Controller. Everything else is a Secondary Domain
Controller. When performing a full migration, which server
receives the first upgrade?



A) If there is a stand-alone server, upgrade that one
first, then all Secondary Domain Controllers, and finally
the Primary Domain Controller.



B) You should upgrade the Primary Domain Controller first,
and then Secondary Domain Controller, and then any stand-
alone servers.



C) You should upgrade the Secondary Controller first, and
then the Primary Domain Controller, leaving any other
servers alone.



D) This is not possible. You will need to backup all the
servers, format, and reinstall.



E) You should upgrade the stand-alone servers, the Primary
Domain Controllers, and finally the Secondary Domain
controllers.








35) What networking protocol is installed by default
during the second stage configuration of Windows 2000
Server? My Answer:



A) TCP/IP
B) NWLink

C) NetBeui

D) IPX/SPX

E) Microsoft Family Logon








36) Unauthorized recreational Web Browsing has become a
problem for Jerry and his small network. Jerry noticed
that this use has resulted in an average utilization of
80%. While Jerry wants to make sure that mail reaches his
server, he needs to eliminate Web Browsing as it is not a
critical tool for his end-users. What ports should he
allow to continue the flow of e-mail?



A) Ports 80 and 23

B) Ports 110 and 23

C) Ports 80 and 25
D) Ports 110 and 25

E) Ports 25 and 143







37) Why should you right-click on My Network Places, click
on Properties, right-click on Local Area Connection, click
on Properties, Sharing, and then highlight the box beside
Share this connection?



A) This function allows you to share the Internet
connection with the Exchange Server. This allows you to
get mail faster.



B) You manage a small network that will never get any
bigger than it already is. This method allows easy
configuration of any end-user by offering a pre-configured
VPN that is, in essence, plug and play.



C) SMS 2.0 requires that the network connection be shared
with it and all workstations. Without this function, SMS
2.0 will not function.



D) Exchange Mail Client will not function correctly
without the ICS Service running. This is the only way to
make the service run.



E) This eliminates the need for a firewall. Windows 2000
Server utilizes IPSec to protect itself from outside
threats, and through ICS, creates a non-routable VPN to
protect all the workstations on the domain.








3 NetBios resides on which layer of the OSI?



A) The Transport Layer

B) The Network Layer
C) The Session Layer

D) The Application Layer

E) The Presentation Layer








39) In what two modes can a Windows 2000 Domain operate?



A) Standalone or Primary mode
B) Mixed or Native Mode

C) Primary or Backup Mode

D) Root or User Mode

E) Native or Non-Native Mode


 
Reply With Quote
 
 
 
 
molsonexpert
Guest
Posts: n/a
 
      09-14-2004

"Marco Gonzalez" <(E-Mail Removed)> wrote in message
news:0d4701c49a8b$e852f920$(E-Mail Removed)...
> I need your help as soon as possible.
>
> Thanks for your time and consideration
>
>


<braindump unceremoniously snipped>

>
>
>
>


You kidding, right?

steve.


 
Reply With Quote
 
 
 
 
Neil
Guest
Posts: n/a
 
      09-14-2004
babbling on and on again "molsonexpert" <(E-Mail Removed)> spewed in
news:(E-Mail Removed):

> You kidding, right?


unlikely...

--
Neil MCNGP #30
the "curious" hair on the soap of society
 
Reply With Quote
 
RH
Guest
Posts: n/a
 
      09-14-2004
I already took this exam....do the same thing I
did....look it up.
>-----Original Message-----
>I need your help as soon as possible.
>
>Thanks for your time and consideration
>
>
>
>
>1) Jerry works in a small environment which will require
>only one Windows 2000 Server. The current platform is
>LINUX Red Hat 6.0. Jerry would like to perform this
>installation across the network. Jerry has configured a
>Samba share containing the \I386 directory files and
>installed the network client on the target computer.

Jerry
>runs winnt /s and points it to the share. Setup returns

an
>error "Failure of dependency service to start." What
>should Jerry do to resolve this situation?
>
>A) Jerry should replace the network adapter and/or the
>network cable and attempt installation again.
>
>B) Jerry should contact the Linux Administrator and
>request a restart of Samba.
>
>C) Jerry should recopy the \I386 directory and make sure
>all the files are there and not corrupted.
>
>D) Jerry should replace the hard drive as it probably
>failed.
>
>E) Jerry should try again later if the network is down.
>
>


>
>
>
>
>
>
>2) Sarah has been attempting to install Windows 2000
>Server for two days. She consistently gets the following
>error, "Error loading operating system." She has run f
>disk multiple times using various partition
>configurations. In order to rule out hardware issues,

she
>has swapped a known good UDMA-100 40 GB hard drive for

her
>UDMA-100 33 GB hard drive. She has also swapped the UDMA-
>100 cable four times. Windows 2000 Server will not
>install. What may be causing the problem?
>
>
>
>A) Sarah must use PC 133, CAS-2 memory. The RAM and
>processor are obviously incompatible.
>
>
>
>B) Sarah must run winnt using the /noreboot switch. This
>will halt the reboot step in the installation process

and
>allow him to troubleshoot the error using the Disk

Manager
>snap-in from the Administrator menu.
>
>
>
>C) Sarah has checked the cables and hard drives. They

seem
>to be good, so the jumpers or BIOS settings for the

drive
>configuration are most likely incorrect.
>
>
>
>D) Sarah must run winnt using the /syspart: C switch.

This
>will copy all the files to the hard drive, provide the
>correct settings for setup to proceed past the reboot
>phase.
>
>
>
>E) Sarah must replace the UDMA-100 hard drive with a
>standard IDE drive. Windows 2000 Server does not support
>UDMA-100 at this time.
>
>
>
>
>
>
>
>3) Exactly how many processors does Windows 2000 Server
>support?
>
>
>
>A) 2, asymmetrically
>
>B) 4, symmetrically
>C) 2, symmetrically
>
>D) 4, asymmetrically
>
>E) 8, symmetrically or asymmetrically
>
>
>
>
>
>4) Sally is attempting to install Windows 2000 Server in

a
>small legal firm. The computer, a Pentium II 333, 256 MB
>of RAM, 8x CD-ROM, and an 800 MB hard drive, has been a
>solid performer for the past 2 years and produced no
>errors. During the ScanDisk phase of setup Sally

receives
>an error, "Setup has been aborted. Please remove any

disks
>and press any key to restart." What should Sally do to
>resolve the situation?
>
>
>
>A) Sally should change out the CD-ROM. Windows 2000

Server
>requires a minimum 16x CD-ROM to perform an installation.
>
>
>
>B) Sally should check the RAM. She probably has a bad

DIMM.
>
>
>
>C) Sally should upgrade her hard drive to 1GB minimum, 2
>GB if that is possible. Windows 2000 Server requires a
>minimum of 1 GB of hard drive space.
>
>
>
>D) Sally should have specified the correct path to the
>\I386 directory.
>
>
>
>E) Sally should partition the hard drive, copy the \I386
>directory, and attempt the install from the hard drive.
>
>
>
>
>
>


>
>
>5) Andrew wants to install Windows 2000 Server on a
>Pentium III 933 with 256 MB of RAM, and a 40 GB hard
>drive. However, he does not want to sit while setup

runs,
>as he has other work which also needs to be completed.
>Andrew loads the setup disk in the CD-ROM, drive D,
>partitions the hard drive using a small primary DOS
>partition, and copies the file Andrew.txt there. He
>changes to drive D:\ and invokes the command \I386

\winnt32
>\ /s:d:\I386 /unattend:c:\Andrew.txt. What should happen
>when Andrew returns in about an hour?
>
>
>
>A) He will need to continue with the GUI stage of
>installation.
>
>
>
>B) Setup should be waiting for user input.
>
>
>
>C) Andrew will need to remove the CD, and restart and

then
>configure Windows 2000 Server.
>
>
>
>D) Andrew will need to add the relevant network
>information.
>
>
>
>E) Andrew will see an error.
>
>
>
>
>
>


>
>
>6) What function does Sysprep.exe serve during the
>installation of Windows 2000 Server?
>
>
>
>I. It can be used to automate installation.
>
>II. It guarantees duplicate SIDS by adding unique

hardware
>identifiers.
>
>III. It adds a mini-setup Wizard to the image file which
>will run when the computer is started for the first time
>after installation is complete.
>
>
>
>A) I
>
>B) I and II
>C) I and III
>
>D) All of the above
>
>E) None of the above
>
>
>
>
>
>


>
>
>7) John has made the decision to upgrade his facility to
>Windows 2000 Server. His current Server is running

Windows
>3.51 with Citrix MetaFrame. He assumes the hardware
>configuration exceed the minimum requirements. John
>successfully upgrades the server to Windows 2000.

However,
>when he reboots, he notices that his settings are not
>correct and Citrix MetaFrame has disappeared. What

should
>John do to recover this?
>
>
>
>A) John should uninstall Windows 2000. This will

reinstate
>his original settings.
>
>
>
>B) John will need to reinstall Citrix MetaFrame on his
>server. Windows 2000 Server does not support a clean
>upgrade. He disregarded the warning message during setup.
>
>
>
>C) John will need to map a share to the directory that
>contains Citrix MetaFrame. All his settings were saved

in
>a .tmp file.
>
>
>
>D) John should restore from backup. This will restore

his
>original network settings as well as map a directory to
>Citrix MetaFrame.
>
>
>
>E) John should rename the \I386 directory to \Citrix.
>
>
>
>
>
>
>
> Windows 2000 Server will upgrade and preserve

settings
>from which of the following operating systems?
>
>I. Windows NT 3.51 Server
>
>II. Windows NT 4.0 Server
>
>III. Windows NT 4.0 Terminal ServerI
>
>IV. Windows NT 4.0 Enterprise Edition
>
>V. Windows NT 4.0 Workstation
>
>
>
>A) I, II, and III
>
>B) II and IV
>
>C) II, III, IV, and V
>D) All of the above
>
>E) None of the above
>
>
>
>
>
>
>
>9) Jerry has completed a successful installation of
>Windows 2000 Server. He would like this server to become
>the Primary Domain Controller in an environment that
>includes 5 other servers. What command must he issue to
>complete this step?
>
>
>
>A) Jerry must issue the command promote from the command
>prompt.
>
>
>
>B) There is no command issued. Jerry must click Start,
>Programs, Administrators Tools, Server Manager, and then
>access the promote command from the toolbar.
>
>
>
>C) Jerry must issue the command dcpromo from the command
>prompt.
>
>
>
>D) Jerry should have selected that option during the
>network installation phase of setup.
>
>
>
>E) Jerry should do nothing. Windows 2000 Server is the
>Primary Domain Controller by default.
>
>


>
>
>
>
>
>
>10) When installing Windows 2000 Server, exactly how

many
>stages of setup exist, according to Microsoft's White
>Paper release?
>
>
>
>A) 1
>
>B) 2
>
>C) 3
>D) 4
>E) 5
>
>
>
>
>
>11) Windows 2000 Server requires how many partitions to
>complete setup successfully?
>
>
>
>A) 1
>B) 2
>
>C) 3
>
>D) 4
>E) None
>
>
>
>
>
>
>
>12) With what new technology did Windows 2000 Server
>replace Windows NT 4.0 Server Incorporated Directory
>Replication Services?
>
>
>
>A) Nothing, with the advent of Windows 2000 Server,

there
>was no need for Directory replication as it now happens
>automatically.
>
>
>
>B) Windows 2000 Server incorporates a new technology
>called File Replication Service, which is fault tolerant
>and is easier to administer than its predecessor.
>
>
>
>C) Windows 2000 File Management Service. In this, all
>passwords and profiles are stored, an image is created,
>and replicated every 15 minutes automatically each time

a
>new account is created.
>
>
>
>D) Windows 2000 Server handles replication through

Active
>Directory Services. Replication occurs every 3 hours and
>automatically when a new account is created.
>
>
>
>E) Windows 2000 Server continues to use Directory
>Replication Services. Replication occurs every 15

minutes
>by default, and automatically when a new server is
>installed on the network.
>
>
>
>
>
>
>
>13) What is required to secure files and folders which
>have been configured for Web Services?
>
>
>
>A) IIS must be running on the server where the folders

are
>to be shared. The access permissions must be set read,
>write, script source access, and directory browsing.
>Application permissions must be set none, scripts and
>execute.
>
>
>
>B) SMS 2.0 Server must be installed and running. Create

a
>share and name it Browsing Files. Point Web Services

must
>be pointed to that share.
>
>
>
>C) The files must be password protected and placed in a
>share folder under the IIS directory.
>
>
>
>D) There is no way to secure these files.
>
>
>
>E) The files must be created under the Administrator
>account.
>
>


>
>
>
>
>
>
>14) Regina has a copy of Windows 2000 Server on a Jaz

1.0
>GB drive. She runs winnt from the \I386 directory. Setup
>reaches 84% and fails. Assuming she has exceeded the
>hardware requirements, and all of the hardware is known

to
>be good. What can she do to recover from this failure?
>
>
>
>A) Regina should rerun the installation with

the /noreboot
>switch to ensure Windows 2000 Server does not attempt
>another reboot.
>
>
>
>B) Nothing. Setup can only run from a CD-ROM, the hard
>drive, or a network share.
>
>
>
>C) Regina should run ScanDisk to determine whether the
>files are corrupted.
>
>
>
>D) Regina should check the connection between the Jaz
>drive and the computer to confirm the connection was not
>broken.
>
>
>
>E) Regina should rerun the installation using the /ox
>switch. This invokes setup from across the network.
>
>
>
>
>
>


>
>
>15) Joan wants to see what the current compression rate

is
>on the \I386 file on her Windows 2000 Server. Which
>command should she issue to accomplish this?
>
>
>A) Joan should run the command "compact C:\I386" from

the
>command prompt.
>
>
>
>B) Joan should double click on My Computer, C:\, and

then
>the \I386 file. The compression will be displayed at the
>bottom of the pop-up window.
>
>
>
>C) This cannot be done.
>
>
>
>D) Joan should run Disk Manager, locate the file, right-
>click on the \I386 directory, and select Properties.
>
>
>
>E) Joan should run the command "diffile" from the

command
>prompt.
>
>
>
>
>
>
>
>16) Mark has installed Windows 2000 Server in his office
>of 7 employees. Since there are so few employees, Mark

has
>elected not to use DHCP. Mark does want to implement a
>Virtual Private Network. How can he accomplish this
>without configuring the DHCP Server?
>
>
>
>A) Mark must use DHCP to accomplish this. There is

simply
>no way around it.
>
>
>
>B) Mark must click on Start, then Control Panel, then
>Network and Dial-up Connections. He must then Locate the
>connection he wants to share, right-click on it and

select
>Properties. Under the Shared Access tab, he needs to

check
>the box beside "Share this Connection".
>
>
>
>C) Mark must use a layer 3 switch and configure the
>Virtual Private Network from there.
>
>
>
>D) Mark must first install another network card. Then,
>Mark must click on Start, then Control Panel, then

Network
>and Dial-up Connections. Locate the connection he wants

to
>share, right-click on it and select Properties. Under

the
>Shared Access tab, he needs to check the box

beside "Share
>this Connection." Mark may then plug the second network
>card into a hub or switch and then add other computers.

He
>must then reboot each computer and configure Internet
>access.
>
>
>
>E) Mark must install a second network board and connect
>that card to a hub or switch along with all the

computers
>with which he wishes to share Internet access.
>
>


>
>
>
>
>
>
>17) What protocol does Windows 2000 use to communicate
>with IBM Mainframes?
>
>
>
>A) NWLink
>
>B) TCP/IP
>C) DLC
>
>D) NetBeui
>
>E) IPX/SPX
>
>


>
>
>
>
>
>
>1 Active Directory cannot run without which Service?
>
>
>
>A) DHCP
>
>B) Windows 2000 File Replication Service
>
>C) Domain Name Service
>D) Network Services
>
>E) Windows Management Instrumentation Service
>
>


>
>
>
>
>
>
>19) Gerald would like to assess his network traffic,

which
>is aggregated or centralized, through his Windows 2000
>Server. Assuming DHCP is installed, which tool should he
>use to determine this information?
>
>
>
>A) Gerald should go into the Accounts, select a user,
>right-click, and click on the Properties tab. This is

the
>best and most efficient way to determine the average

load
>on the Server.
>
>
>
>B) Gerald should use the new DHCP MMC console snap-in,
>Enhanced Monitoring Service. This will not only provide
>him with the needed information, it will also provide

him
>with graphical data he can present at meetings.
>
>
>
>C) Gerald should use Server Manager to determine the

total
>traffic for his users.
>
>
>
>D) Gerald should use a third-party software tool.

Windows
>2000 has no tool that will accomplish this task.
>
>
>
>E) Gerald should use User Manager, and select Domain
>Properties. He can find this information there.
>
>


>
>
>
>
>
>
>20) Which service, in Windows 2000 Server, facilitates
>intrusion detection of potentially conflicting network
>addresses on the network?
>
>
>
>A) Rouge DHCP Server Detection Service
>B) Domain Name Service
>
>C) Enhanced Monitoring Service
>
>D) Option Class Support Service
>
>E) Expanded Scope Support Service
>
>
>
>
>
>
>
>21) What does Windows 2000 Server utilize to ensure File
>Security?
>
>
>
>A) Windows 2000 Server installs file security by

default.
>2000 isolates directory folders and auto secures them

with
>the password assigned to Administrator.
>
>
>
>B) Windows 2000 Server utilizes the latest file

allocation
>table, FAT32, to ensure file level security.
>
>
>
>C) Windows 2000 Server utilizes NTFS v.5 to ensure file
>level security.
>
>
>
>D) Windows 2000 Server utilizes Kerberos to ensure file
>level security.
>
>
>
>E) Windows 2000 Server utilizes NTFS v.4 to ensure file
>level security.
>
>
>
>
>
>


>
>
>22) What is the complete list of files that compose

Active
>Directory?
>
>
>
>A) sysdiff.exe, compact.exe, ntuser.dat, and usr.exe
>
>
>
>B) sysprep.exe, re1.log, res2.log, ntbackup.exe, and
>ntds.dit
>
>
>
>C) res1.log, res2.log, ntvdm.dit, and edb.chk
>
>
>
>D) edb.log, edb.chk. res1.log, ntds.dit, and res2.log
>
>
>
>E) users.dat, ntvdm.log, aduser.dll, and userenv.dll
>
>


>
>
>
>
>
>
>23) Jennifer has finished installing Windows 2000

Server.
>She would like to take advantage of the Active

Directory.
>DNS is being done through Windows 2000. She named the
>server SERVER#1 in order to effect efficient management

of
>the domain iwantinternet.com. When she runs dcpromo, she
>receives the following error, "Incorrect computer name."
>What, if anything, can she do to resolve this situation?
>
>
>
>A) Jennifer can do nothing until she installs a second
>Primary Domain Controller. She must name that one
>SERVER#2, and then she will be able to configure Active
>Directory.
>
>
>
>B) Jennifer can solve this problem by renaming the

server
>to SERVER1. Active Directory does not support the
>character #.
>
>
>
>C) Jennifer will need to create a CNAME called MyServer
>for SERVER#1. She will then be able to install Active
>Directory.
>
>
>
>D) Jennifer should run the compact command. She does not
>have enough free space to create the Active Directory.
>
>
>
>E) Jennifer can do nothing. She will need to format and
>start again because she failed to install all of the
>Administrative Tools.
>
>


>
>
>
>
>
>
>24) Ntds.dit, a core component of Active Directory,

grows
>as the database fills up. However, it is limited in size
>by how much?
>
>
>
>A) 10 MB
>
>B) 20 MB
>
>C) 50 MB
>
>D) 100 MB
>
>E) 1 GB
>
>
>
>


>
>
>
>
>25) What is the Global Catalog's primary function?
>
>
>
>A) In Windows 2000 Server, it provides assistance to the
>help tool by providing a cached list of frequently used
>queries.
>
>
>
>B) In Windows 2000 Server, it provides quick and

efficient
>searches across the entire Active Directory forest.
>
>
>
>C) In IIS 5.0, it is a powerful e-commerce tool which
>allows you to setup a store front with relative ease.
>
>
>
>D) In Windows 2000 Server, it provides efficient
>monitoring of network services across a VPN within the
>domain.
>
>
>
>E) In Windows 2000 Server, it provides an access point

to
>access network shares in Linux using Samba.
>
>
>
>
>
>


>
>
>26) What is the primary consideration in restoring a DC
>through replication?
>
>
>
>A) Hard disk space
>B) Bandwidth
>
>C) RAM
>
>D) Processor
>
>E) Time Management
>
>
>
>
>
>
>
>27) What is the default method of restoration of the
>Active Directory?
>
>
>
>A) Full
>
>B) Incremental
>C) Differential
>
>D) Non-Authoritative
>
>E) Authoritative
>
>


>
>
>
>
>
>
>
>2 When is a primary restore absolutely required?
>
>
>
>A) It is never a requirement.
>
>
>
>B) When the Domain Controller you are restoring is the
>only DC in the domain.
>
>
>
>C) When you want to restore any Primary Domain

Controller.
>
>
>
>D) When you are using Active Directory.
>
>
>
>E) A primary restore is always required under every
>circumstance.
>
>


>
>
>
>
>
>
>29) You have been assigned the task of changing the
>Administrator password for your Windows 2000 Server.

Upon
>logging in, you enter the Active Directory. After

locating
>the Administrator account, you right-click and notice
>the "change password" option is not available. Is it
>possible at this point to change the Administrator
>password? My Answer:
>
>
>
>A) No, The Administrator password is set in stone during
>the installation portion and cannot be changed.
>
>
>
>B) You must first change the name of the account, then
>the "change password" option will appear. Once you have
>done this, simply change the name back to Administrator.
>
>
>
>C) Yes, Press Ctrl + Alt + Del while logged in as
>Administrator. Then select the option "Change Password".
>Make your modification and save it.
>
>
>
>D) You must first log in as the Domain Administrator,
>rename the Administrator account, change the password,

and
>then rename the account back to Administrator.
>
>
>
>E) It is not possible to alter the Administrator account.
>
>
>
>


>
>
>
>
>30) Assuming you have installed Windows 2000 Server,

what
>is absolutely required to configure Active
>Directory?
>
>
>
>A) Domain Name Services. If you do not have a DNS

server,
>Active Directory will install one automatically upon the
>administrator's confirmation.
>
>
>
>B) An effective business model. Active Directory cannot

be
>configured unless it detects a business model.
>
>
>
>C) The DHCP Server must be installed and started. Active
>Directory cannot be configured without the presence of
>DHCP services.
>
>
>
>D) NetBeui. Without this protocol, Active Directory

cannot
>be configured.
>
>
>
>E) A second Primary Domain Controller. Without the
>presence of a second PDC, it is impossible to configure
>Active Directory.
>
>


>
>
>
>
>
>
>31) What is the default subnet mask for a Class B

network?
>
>
>
>A) 255.255.255.255
>
>B) 255.0.0.0
>
>C) 255.255.255.254
>
>D) 255.255.0.0
>
>E) 255.255.255.194
>
>
>
>
>
>
>
>32) PPP supports which of the following protocols?
>
>
>
>I. TCP/IP
>
>II. IPX/SPX
>
>III. NetBeui
>
>IV. AppleTalk
>
>
>
>A) I and IV
>
>B) I, II, and IV
>C) III and IV
>
>D) All of the above
>
>E) None of the above
>
>
>
>
>
>
>
>33) Jennifer has noticed a significant amount of
>inappropriate traffic originating from the IP address
>192.168.0.66. She has over 300 users in her domain, so

she
>cannot afford to visit each individual machine to
>determine the identity of the offender. What tool can

she
>use to determine the DNS of the workstation in question?
>
>
>
>A) ping
>
>B) netstat
>
>C) netdiag
>
>D) tracert
>E) tracefind
>
>
>
>
>
>
>
>34) In the Windows NT 4.0 model uses a Primary Domain
>Controller. Everything else is a Secondary Domain
>Controller. When performing a full migration, which

server
>receives the first upgrade?
>
>
>
>A) If there is a stand-alone server, upgrade that one
>first, then all Secondary Domain Controllers, and

finally
>the Primary Domain Controller.
>
>
>
>B) You should upgrade the Primary Domain Controller

first,
>and then Secondary Domain Controller, and then any stand-
>alone servers.
>
>
>
>C) You should upgrade the Secondary Controller first,

and
>then the Primary Domain Controller, leaving any other
>servers alone.
>
>
>
>D) This is not possible. You will need to backup all the
>servers, format, and reinstall.
>
>
>
>E) You should upgrade the stand-alone servers, the

Primary
>Domain Controllers, and finally the Secondary Domain
>controllers.
>
>
>
>


>
>
>
>
>35) What networking protocol is installed by default
>during the second stage configuration of Windows 2000
>Server? My Answer:
>
>
>
>A) TCP/IP
>B) NWLink
>
>C) NetBeui
>
>D) IPX/SPX
>
>E) Microsoft Family Logon
>
>
>
>


>
>
>
>
>36) Unauthorized recreational Web Browsing has become a
>problem for Jerry and his small network. Jerry noticed
>that this use has resulted in an average utilization of
>80%. While Jerry wants to make sure that mail reaches

his
>server, he needs to eliminate Web Browsing as it is not

a
>critical tool for his end-users. What ports should he
>allow to continue the flow of e-mail?
>
>
>
>A) Ports 80 and 23
>
>B) Ports 110 and 23
>
>C) Ports 80 and 25
>D) Ports 110 and 25
>
>E) Ports 25 and 143
>
>
>
>
>
>
>
>37) Why should you right-click on My Network Places,

click
>on Properties, right-click on Local Area Connection,

click
>on Properties, Sharing, and then highlight the box

beside
>Share this connection?
>
>
>
>A) This function allows you to share the Internet
>connection with the Exchange Server. This allows you to
>get mail faster.
>
>
>
>B) You manage a small network that will never get any
>bigger than it already is. This method allows easy
>configuration of any end-user by offering a pre-

configured
>VPN that is, in essence, plug and play.
>
>
>
>C) SMS 2.0 requires that the network connection be

shared
>with it and all workstations. Without this function, SMS
>2.0 will not function.
>
>
>
>D) Exchange Mail Client will not function correctly
>without the ICS Service running. This is the only way to
>make the service run.
>
>
>
>E) This eliminates the need for a firewall. Windows 2000
>Server utilizes IPSec to protect itself from outside
>threats, and through ICS, creates a non-routable VPN to
>protect all the workstations on the domain.
>
>


>
>
>
>
>
>
>3 NetBios resides on which layer of the OSI?
>
>
>
>A) The Transport Layer
>
>B) The Network Layer
>C) The Session Layer
>
>D) The Application Layer
>
>E) The Presentation Layer
>
>


>
>
>
>
>
>
>39) In what two modes can a Windows 2000 Domain operate?
>
>
>
>A) Standalone or Primary mode
>B) Mixed or Native Mode
>
>C) Primary or Backup Mode
>
>D) Root or User Mode
>
>E) Native or Non-Native Mode
>
>
>.
>

 
Reply With Quote
 
 
 
Reply

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Questions Relating to Administering Windows 2000 Server Marco Gonzalez MCSE 1 09-14-2004 07:18 PM
installing, Configuring, and Administering Mcrosoft Windows 2000 Professional Puleng More Microsoft Certification 1 06-17-2004 02:46 PM
70-299 Implementing and Administering Security in a Microsoft Windows Server 200 Billy Patterson MCSE 8 04-23-2004 01:07 AM
71-299 --- Implementing and Administering Security in a Windows Server 2003 Network Burner MCSE 6 11-24-2003 11:19 PM
Implementing and Administering Security in a Microsoft Windows Server 2003 Netwo WantsMore MCSE 6 11-07-2003 04:40 PM



Advertisments