Dump of perfection Test

Discussion in 'Microsoft Certification' started by Chris & Ara Duke, Nov 5, 2003.

  1. 1. You are an administrator of your company's network. You want to perform
    routine upgrades on your Windows 2000 Server computer. You use your non
    administrator user account in the domain to log on to the server. You want
    to update all of the critical system files and patches on the server in the
    shortest possible time.

    What should you do?

    A. Run Windows Update.
    B. Run System File Checker.
    C. Log on as an Administrator and run Windows Update.
    D. Log on as an Administrator and run System File Checker.


    Answer: C


    2. You are the network administrator for your company. The company has
    numerous branch offices, and each office uses Internet Connecting Sharing to
    connect to the Internet.

    A new employee named David Johnson is configuring a Windows 2000 Server
    computer as a file server. When David uses Windows update for the first time
    and selects Product Update, he receives an error message stating that access
    is denied.

    David needs to be able to update the files by using his account. What should
    you do?

    A. Configure the settings for Internet Connecting Sharing to allow POP3
    access.
    B. Configure the settings for Internet Connecting Sharing to allow SMTP
    access.
    C. Give David's user account administrator privileges on the Windows 2000
    Server computer.
    D. Instruct David to log on as a domain administrator on the Windows 2000
    Server computer.


    Answer: C


    3. You install a second modem on a Windows 2000 Server computer configured
    with Routing and Remote Access. Dial-in users report that they are unable to
    connect to the server by using this new modem.

    What can you do to help find out the cause of the problem? (Choose Three.)

    A. Use the Diagnostics tab in Phone and Modem Options in Control Panel to
    query the modem.
    B. Use device Manager to identify any port resource conflicts.
    C. Use the Routing and Remote Access snap-in to find out whether the ports
    for both modems are operational.
    D. From a command prompt, run the Net Config Server command.
    E. From a command prompt, run the Net Statistics command.
    F. Use Regedit32 to view the Error Control value in the
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess Key.


    Answer: A,B,C


    4. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem
    configured to use IRQ 5. You add a PCI modem and restart the computer.
    Device Manager reports an IRQ conflict between the two modems. Both modems
    are trying to use IRQ 5.

    You want to resolve the problem. What should you do?

    A. Use Device Manager to change the IRQ for the original modem to IRQ 9.
    B. Use Device Manager to change the IRQ for the original modem to IRQ 10.
    C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and
    Play devices.
    D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and
    Play devices.


    Answer: C


    5. You are the administrator of the contoso.local domain. You organize the
    domain into organizational units (OUs) as shown in the exhibit.
    (Exhibit)


    <img src="./70-215/images/Q23.gif">

    You configure the Local Security Options and other settings for the Default
    Domain Policy object. You delegate administration of the Michigan and
    Florida OUs. You want to prevent those administrators from creating any
    other Group Policy objects (GPOs) with settings that conflict with those you
    configured.

    What should you do?

    A. From the Group Policy options for the contoso.local domain, set the
    option not to override.
    B. From the Group Policy options for the Michigan and Florida OUs, set the
    option not to override.
    C. Block Group Policy inheritance for the contoso.local domain.
    D. Block Group Policy inheritance in the Michigan and Florida OUs.


    Answer: A


    6. You are the administrator of a Windows 2000 domain and TWO Windows NT
    domains. The Windows 2000 domain trusts each of the Windows NT domains, and
    the Windows NT domains trust the Windows 2000 domain.

    A Windows 2000 domain controller named DC1 is configured to use a highly
    secure domain controller security template. Users in the Windows NT domains
    report that they cannot access DC1.

    You need to allow the users of computers in the Windows NT domain to access
    resources on DC1. What should you do?

    A. Apply a less restrictive custom security template to DC1.
    B. Apply a less restrictive custom system policy to Windows NT domain
    controllers.
    C. Ensure that the Windows 2000 domain is configured in the mixed mode.
    D. Ensure that the Windows 2000 domain is configured to run in the native
    mode.


    Answer: A


    7. Your company has 50 offices. The employees in these offices have limited
    knowledge of Windows 2000. Each office has a network of between 5 and 20
    client computers. The office networks are not connected to any other
    networks.

    The company is buying 50 identical computers to run Windows 2000 Server in
    these offices. These servers must be installed to the company's standard
    configuration. You create a setup information file (SIF) that specifies the
    company's standard configuration.

    You want to automate the installation process as much as possible in the
    least possible amount of time.
    What should you do?

    A. Use the makebt32.exe to create 4 installation startup disks and add the
    SIF to the first disk. Instruct an employee at each office to start the
    installation by using these disks.
    B. Create an MS-DOS boot disk that contains the CD-ROM drivers and the SIF
    and that runs WinNT /S:D:\I386 command. Instruct an employee at each office
    to start the installation by using this disk.
    C. Create a floppy disk that contains only the SIF. Instruct an employee at
    each office to start the installation by using the Windows 2000 Server
    CD-ROM with the floppy disk inserted.
    D. Create a Windows 2000 folder on the hard disk, copy the Windows 2000
    Server CD-ROM to the folder, add the SIF to the folder. Copy the folder to
    the writable CD. Instruct an employee at each office to start the
    installation by using this CD.


    Answer: C


    8. You are the administrator of Windows 2000 Server network. On each server
    you format a separate system partition and a separate boot partition as
    NTFS.

    Several months later you shut down one of the computers for maintenance.
    When you try to restart the computer you receive the following error message
    "NTLDR is missing, press any key to restart".

    You want to install a new NTLDR file on the computer but you do not want to
    lose any settings you made since the installation. What should you do?

    A. Start the computer by using the Windows 2000 Server CD-ROM and choose to
    repair the installation.
    B. Select Recovery Console and copy the NTLDR file on the CD-ROM to the root
    of the system volume.
    C. Start the computer by using the Windows 2000 server CD- ROM and choose to
    reinstall. When the installation is complete copy the NTLDR to the root of
    the boot volume.
    D. Start the computer by using the Windows 2000 bootable floppy disk. From a
    command prompt run the sfc/scanboot command.
    E. Start the computer by using Windows 2000 bootable floppy disk. Run the
    file signature verification utility.


    Answer: A


    9. Your network includes Windows 98 computers and Windows 2000 Server
    computers. You are adding a new computer to the network. You plan to install
    Windows 2000 Server on the new computer. The computer has one 20 GB hard
    disk with no partition defined.

    The Windows 2000 Server CD ROM is unavailable. You want to install Windows
    2000 server from the source files that are located on a server on the
    network. You also want the entire hard disk of the new computer to be used
    for the system partition.

    What should you do?

    A. On another Windows 2000 computer use makebt32.exe to create installation
    startup disks. Start the computer by using the first disk.
    B. On another Windows 2000 computer format a floppy disk. Copy NTLDR,
    boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by
    using the disk.
    C. Start the new computer by using the Windows 98 network boot disk. Connect
    to the server. Run dsclient.exe. Create and format 20GB FAT32 partition.
    D. Start the new computer by using the Windows 98 network boot disk. Create
    and format a single FAT32 partition. Connect to network server. Run
    winnt.exe.
    E. Start the computer by using Windows 98 network boot disk. Create and
    format a single Fat 32 partition. Start the new computer by using the
    Windows 2000 emergency repair disk.


    Answer: D


    10. You are the network administrator at Island Hopper News. The domain and
    network configuration is a single-site Windows 2000 domain that is
    configured as shown in the exhibit.

    <img src="./70-215/images/Q10.gif">

    You must provide Terminal Services to the Pentium MMX client computers. You
    also need to able to manage user licenses and enable users to access
    term1.islandhoppernews.com

    First, you install terminal services in application server mode on
    term1.islandhoppernews.com.
    What should you do next?

    A. Install terminal services licensing on term1.islandhoppernews.com. Select
    the Enterprise License server option.
    B. Install terminal services licensing on term1.islandhoppernews.com. Select
    the domain license server option.
    C. Install terminal services licensing on file1.islandhoppernews.com. Select
    the enterprise license server option.
    D. Install terminal services licensing on file1.islandhoppernews.com. Select
    the domain license server option.
    E. Install terminal services licensing on uu2.islandhoppernews.com. Select
    the enterprise license server option.
    F. Install terminal services licensing on uu2.islandhoppernews.com. Select
    the Domain license server option.


    Answer: A


    11. You are a network administrator for Fabrikam Inc. Fabrikam Inc has three
    offices. The network consists of one native mode Windows 2000 domain. All
    servers are Windows 2000 Professional computers. The network is connected by
    a Frame Relay connection.

    You install a third-party network management suite of applications on a
    server named Mon1.

    You need to ensure that this new software will be able to interact with and
    manage the existing devices on your network.
    What should you do?

    A. Install SNMP on Mon1.
    B. Install SNMP on all computers except Mon1.
    C. Configure the SNMP service option in the TCP/IP installation properties
    on Mon1.
    D. Configure the SNMP server option in the TCP/IP installation properties on
    all computers except Mon1.


    Answer: A


    12. Your network uses TCP/IP as the only network protocol. You configure a
    remote access server on this network.

    Some users report that when they connect to the server they receive the
    following message: " IPX/SPX compatible CP reported error 733 - The PPP
    control network protocol for the network is not available".
    If the users allow the connection to continue they are able to connect to
    services that use TCP/IP.

    You want to prevent this message from being displayed. What should you do?

    A. Configure the client computers to use only TCP/IP for the connection to
    the remote access server.
    B. Configure the client computers to use a defined IPX network address for
    the connection to the remote access server.
    C. Configure the remote access server to allow IPX based remote access and
    demand-dial connections.
    D. Configure the remote access server to disable Multilink connections.


    Answer: A


    13. You are the network administrator for your company. Mike Nash is a
    member of the Administration group, and Nate Sun is a member of the Intern
    group. Both groups are in the same domain.

    On the intranet server, the Administration group is placed in the Security
    group, and the Intern group is placed in the Nonsecurity group. The Security
    group is then granted Full Control permission for the Sales virtual
    directory. Nate needs to update new sales information that is located on the
    Sales virtual directory.

    What should you do so that Nate can perform this task?

    A. Enable Anonymous access for the intranet server.
    B. Enable Anonymous access for the Sales virtual directory.
    C. Remove Nate from the Intern group.
    D. Make Nate a member of the Security group.


    Answer: D


    14. You are the administrator of a Windows NT 4.0 Terminal server edition
    computer. The server has one hard disk, which is divided into two
    partitions. The first partition contains the Windows NT 4.0 system files and
    is formatted as FAT. The second partition contains application data and user
    data. This second partition is formatted as NTFS. The server currently has
    Service Pack 3 installed.

    You need to upgrade the server to Windows 2000 Server. You want to ensure
    that no application data or user data is lost during the upgrade. You also
    want to perform the minimum number of steps necessary to complete the
    upgrade.

    What should you do? (Choose all that apply)

    A. Convert the system partition to NTFS.
    B. Install service pack4 or later on the server.
    C. Use a Windows 2000 Server CD to start the server. In setup, select the
    option to upgrade.
    D. Replace the Terminal Server installation with a standard Windows NT
    server 4.0 installation.


    Answer: A,B,C


    15. You are the administrator of a Windows 2000 Server computer. Your
    computer has a spanned volume that consists of areas on three physical hard
    disks on the server. The three disks support hot swapping. You regularly
    backup the spanned volume by using Windows Backup.

    One of the disks fails. You replace the disk with a new un-partitioned disk.
    You want to recover the span volume and disk data as soon as possible.

    What should you do?

    A. Extend the spanned volume to include the new disk. Rescan the disk.
    B. Extend the spanned volume to include the new disk. Shut down and restart
    the server. Use Windows Backup to restore the data.
    C. Rescan the disk. Format the spanned volume. Use Windows Backup to restore
    the data.
    D. Rescan the disk. Extend the spanned volume to include the new disk. Shut
    down and restart the server. Use Windows Backup to restore the new data.
    E. Rescan the disks. Remove the spanned volume and create a new spanned
    volume that includes the new disk. Format the spanned volume. Use Windows
    Backup to restore the data.


    Answer: E


    16. Your Windows 2000 server computer contains data files that users of
    client computers access throughout the day. You install a driver for the new
    tape device on the computer.

    After restarting the computer you log on as an administrator. Shortly after
    you log on you receive the following Stop error: "irql_not_less_or_equal".
    You need to bring the server back on line as quickly and reliably as
    possible.

    What should you do?

    A. Restart the computer by using the last known good configuration.
    B. Perform an emergency repair and select Fast Repair. Restart the computer.
    C. Restart the computer in safe mode. Remove the driver. Restart the
    computer.
    D. Restart the computer by using the Recovery Console. Disable the driver.
    Restart the computer. Remove the driver.


    Answer: D


    17. A Windows 2000 Server computer named server2 runs numerous 32-bit
    applications and two 16-bit applications. Users start the 16-bit
    applications by running APP1.EXE for one application and APP2.EXE for
    another application. The 16-bit applications are configured to run in the
    separate memory spaces.

    You want to create a performance baseline chart in System Monitor for all
    the applications on Server2. You add all of 32-bit applications and now you
    want to add the two 16-bit applications.

    What should you do?

    A. Add the APP1 and APP2 instances of the %Processor time counter for the
    process object.
    B. Add the NTVDM, APP1 and APP2 instances of the %Processor time counter for
    the process object.
    C. Add only the NTVDM instance of the %Processor time counter for the
    process object.
    D. Add the NTVDM and NTVDM2 instances of the %Processor time counter for the
    process object.


    Answer: D


    18. Every afternoon you run Microsoft Excel locally on your Windows 2000
    Server computer to update a performance spread sheet. Users report that,
    during this time, the server response to file requests appears to slow down.

    What should you do to resolve the problem?

    A. Run the start/normal csrss.exe command, before you start the Excel.
    B. Run the start/normal Excel.exe command to start Excel.
    C. Use task manager to set the priority for csrss.exe process to above
    normal.
    D. Use task manager to set the priority for Excel.exe process to low.


    Answer: D


    19. You are the administrator of a network that consists of a single Windows
    NT 4.0 domain. The network contains five Windows NT Server domain
    controllers and 1,000 Windows NT Workstation client computers. You want to
    install Windows 2000 Server on a new computer. You want the new computer to
    act as a domain controller in the existing domain.

    What should you do?

    A. On the new computer, install Windows NT Server 4.0 and designate the
    computer as a BDC in the existing domain. Promote the computer to the PDC of
    the domain. Upgrade the computer to Windows 2000 Server.
    B. On the new computer, install Windows NT Server 4.0 and designate the
    computer as a PDC in a new domain that has the same NetBIOS name as the
    existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use
    Active Directory Sites and Services to force synchronization of the domain
    controllers.
    C. Shut down the PDC of the existing Windows NT domain from the network. On
    the new computer, install Windows 2000 Server, and then run the Active
    Directory Installation wizard to install Active Directory, specifying the
    same NetBIOS name for the Windows 2000 domain as the existing Windows NT
    domain.
    D. Shut down the PDC of the existing Windows NT domain from the network. On
    the new computer, install Windows 2000 Server, and then run the Active
    Directory Installation wizard to install Active Directory as a replica in
    the existing Windows NT domain. Promote the new computer to the PDC of the
    domain. Restart the Windows NT PDC on the network and demote it to a BDC.


    Answer: A


    20. You plan to install Windows 2000 Server on 10 new computers on your
    company's network. These servers will provide file and print services to
    departments within the company. The computers have identical hardware and
    will use the same software configuration.

    You plan to use a centralized copy of the Windows 2000 installation files,
    which are stored on an existing Windows 2000 Server computer.

    Which three actions should you take to install Windows 2000 Server on the
    new computer? (Choose three.)

    A. Create a set of installation boot disks by using Makeboot.exe.
    B. Create an MS-DOS network boot disk.
    C. Create an Unattend.txt file by using Setup Manager. Create a UDF file
    that identifies the names of the new computers.
    D. Create a UDF file by using setup manager. Create an Unattend.txt file
    that identifies the names of the new computers.
    E. Begin the installation process by running the Winnt command with the /S,
    /U, and /udf switches.
    F. Begin the installation process by running Winnt32 command with the /s,
    /unattend, and /udf switches.


    Answer: B,C,E


    21. You are the administrator of a network that consists of Windows 2000
    Server computers and Windows 2000 Professional computers.
    You want to configure the deployment of the most recent Windows 2000 service
    pack so that users of the Windows 2000 Professional computers receive the
    service pack automatically when they log on to the domain.

    What should you do?

    A. Create a Microsoft Windows installer package for the service pack.
    Configure RIS to use the package.
    B. Create a Microsoft Windows Installer package for the service pack.
    Configure the package in a Group Policy.
    C. Create a Microsoft Windows Installer package for the service pack.
    Configure the package in the Local Computer Policy.
    D. Place the service pack in a Distributed file system (Dfs).


    Answer: B


    22. Your network consists of numerous domains within a LAN, plus one remote
    location that is configured as another domain within the tree. Each domain
    contains several organizational units (OUs). The remote domain is connected
    to the main office network by a 56-Kbps connection.
    See the EXHIBIT.

    <img src="./70-215/images/Q22.gif">

    The remote location is running a previous service pack for Windows 2000, and
    the LAN is running the most recent service pack.
    You want to configure a Group Policy for the remote location so that users
    can repair a problem with a service pack system file. You also want to
    reduce the traffic on the LAN and ease administration of the Group Policies.
    You want to retain the domain administrator's access to the Group Policy
    configuration.

    What should you do?

    A. Configure a Group Policy for each OU in the west.litware.com domain.
    Configure a service pack software package for each Group Policy.
    B. Configure a Group Policy for each OU in the litware.com domain. Configure
    a service pack software package for each Group Policy.
    C. Configure a Group Policy for the west.litware.com domain. Configure a
    service pack software package for the Group Policy.
    D. Configure a Group Policy for the litware.com domain. Configure a service
    pack software package for the Group Policy.


    Answer: C


    23. You install and run a third-party 32-bit application named Application
    on your Windows 2000 Server computer. After several days. the application
    stops responding. You open Task Manager and find that the CPU usage is at
    100 percent. The normal range of CPU usage on the server is from 20 percent
    to 30 percent.

    You end the application. However, you see that the CPU on the server is
    still at 100 percent. Task Manager shows no other applications running. You
    then examine the Processes page in Task Manager and confirm that the
    Application.exe process is no longer running.

    You want to return the CPU usage to its normal range. What should you do?

    A. Use Computer Management to stop and restart the Server service.
    B. Use Computer Management to stop and restart the Workstation service.
    C. Use Task Manager to end any related child processes.
    D. Use Task Manager to end and automatically restart the Explorer.exe
    process.


    Answer: C


    24. You install a new multiple-process database application named
    Application on your Windows 2000 Server computer. Two days later, users
    begin to report that the new application has suddenly stopped responding to
    queries. You verify that the server is operating and decide that you need to
    restart the application.

    What should you do before you restart the application?

    A. End the task named Application.
    B. End the Application.exe process.
    C. End the Application.exe process tree.
    D. End both the Explorer.exe process and the Application.exe process.


    Answer: C


    25. Your Windows 2000 Server computer uses a SCSI adapter that is not
    included on the current Hardware Compatibility List (HCL). You install an
    updated driver for the SCSI adapter.

    When you start the computer, you receive the following STOP error:
    "INACCESSIBLE_BOOT_DEVICE."

    Which two procedures can you use to resolve the problem? (Choose two.)

    A. Start the computer in safe mode. Reinstall the old driver for the SCSI
    adapter.
    B. Start the computer by using a Windows 2000 bootable floppy disk.
    Reinstall the old driver for the SCSI adapter.
    C. Start the computer by using the Windows 2000 Server CD-ROM. Perform an
    emergency repair. Reinstall the old driver for the SCSI adapter.
    D. Start the computer by using the Recovery Console. Run System File
    Checker. Restart the computer. Reinstall the old driver for the SCSI
    adapter.
    E. Start the computer by using the Recovery Console. Copy the old driver for
    the SCSI adapter to the system volume and to C:\NTbootdd.sys. Restart the
    computer.


    Answer: C,E


    26. A Windows 2000 Server computer named Server1 is a file server on your
    network. Server1 runs numerous 16-bit applications. One of the applications,
    named App1, stops responding, causing all of the other 16-bit applications
    to stop responding.

    You want to isolate App1 for monitoring and troubleshooting purpose.
    What can you do? (Choose all that apply.)

    A. Create a batch file that starts App1 by running the start command with
    the /separate switch. Use this batch file to start App1.
    B. Create a shortcut to App1, and select the Run in separate memory space
    option in the shortcut properties. Use this shortcut to start App1.
    C. In the properties for File and Printer Sharing for Microsoft Networks,
    select the Maximize data throughput for file sharing option button.
    D. In the properties for File and Printer Sharing for Microsoft Networks,
    select the Balance option button.


    Answer: A,B


    27. You want to improve the TCP transmission speed of a Windows 2000 Server
    computer. You also want to remove an unused registry key.

    You use Regedit32 to edit the registry of the Windows 2000 Server. You
    insert a value in the registry named TCPWindowSize, and you remove the
    unused key. You restart the computer, but the computer stops responding
    before the logon screen appears.

    You want to return the computer to its previous configuration. What should
    you do?

    A. Restart the computer in safe mode. Then restart the computer again.
    B. Restart the computer by using the Recovery Console. Run the Fixboot C:
    command, and then run the Exit command.
    C. Restart the computer by using the Recovery Console. Run the enable
    winlogon service_auto_start command, and then run the Exit command.
    D. Restart the computer by using the last known good configuration.


    Answer: D


    28. You install a new server application on your Windows 2000 Server
    computer. Response times fail to meet user specifications. You want to use
    the Processes page in Task Manager to find out whether the response time of
    new application would improve by the addition of one or more processors.

    <img src="./70-215/images/Q28.gif">

    Which two columns should you select to view? (Choose two.)
    To answer, click the two appropriate check boxes in the Select Columns
    dialog box (see the exhibit).

    A. CPU usage
    B. Thread counts
    C. I/O Writes
    D. Memory Usage
    E. Page Pooled


    Answer: A,B


    29. You are the administrator of a Windows 2000 Server computer. The server
    has a single hard disk with a single NTFS partition.

    You use a third-party tool to add a new partition to the disk. When you
    restart the server, you receive the following error message: "Windows 2000
    could not start because the following file is missing or corrupt: <Windows
    2000 root>\system32\ntoskrnl.exe. Please re-install a copy of the above
    file."

    What should you do to resolve the problem?

    A. Start the computer by using the Recovery Console. Run System File
    Checker.
    B. Start the computer by using the Recovery Console. Modify the Partition
    parameter in the operating system path in C:\Boot.ini.
    C. Start the emergency repair process. Choose the option to repair system
    files.
    D. Start the computer in safe mode with command prompt. Modify the Partition
    parameter in the operating system path in C:\boot.ini.


    Answer: B


    30. You are the administrator of a Windows 2000 domain that has three domain
    controllers. Each day, you use Windows Backup to perform full backups of
    each domain controller.

    You run a script to make changes to account information in Active Directory.
    As a result of errors in the script, the incorrect user accounts are
    modified. Active Directory replication then replicates the changes to the
    other two domain controllers.

    You want to revert Active Directory to the version that was backed up the
    previous day.
    What should you do?

    A. On a single domain controller, use Windows Backup to restore the System
    State data. Shut down and restart the computer.
    B. Shut down and restart a single domain controller in directory services
    restore mode. Use Windows Backup to restore the System State data. Run the
    Ntdsutil utility. Restart the computer.
    C. Shut down and restart a single domain controller by using the Recovery
    Console. Use Windows Backup to restore the System State data. Exit the
    Recovery Console. Restart the computer.
    D. Shut down and restart each domain controller by using the Recovery
    Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery
    Console. Restart the computer.


    Answer: B


    31. You are the administrator of the contoso.local domain. You organize the
    domain into organization units (OUs) as shown in the exhibit.
    (Exhibit)

    <img src="./70-215/images/Q23.gif">

    You configure the Local Security Options and other setting for the Default
    Domain Policy object. You enable a local security option policy to display a
    logon message each time a user attempts to log on. Suzan Fine, the
    administrator of the Florida OU, wants to configure a different logon
    message for the Orlando OU without changing the other Local Security
    Options.

    What should Suzan do?

    A. Create a new Group Policy object (GPO) in the Orlando OU with the
    appropriate logon message. Block policy inheritance for the new GPO.
    B. Create a new Group Policy object (GPO) in the Florida OU with the
    appropriate logon message. Set the option not to override for the new GPO.
    C. Create a new Group Policy object (GPO) in the Orlando OU with the
    appropriate logon message. Enable policy inheritance for the new GPO.
    D. Create two new Group Policy objects (GPOs) in the Miami and Orlando OUs.
    Configure the GPO for the Orlando OU with the appropriate logon message for
    the Orlando OU. Place the GPO for the Orlando OU at the top of the priority
    list.


    Answer: C


    32. Your company has a human resources (HR) manager named Sean Chai. He
    keeps your company's confidential HR files in a shared folder. To increase
    the security of the HR files, Sean set the folder to encrypt the files.

    Sean leaves the company without resetting the permissions and encryption
    settings for the HR files. The files must be made accessible to the new HR
    manager.

    Which two actions should you take to allow this access? (Choose two.)

    A. Set the file permissions on the HR files to allow access to the new
    manager.
    B. Back up the shared folder to tape and restore the files to a different
    folder.
    C. Log on as an administrator and remove the encryption attribute from the
    HR files.
    D. Log on as the new manager, connect to the shared folder, and run the
    cipher /e /s . command.
    E. Configure the new manager's account to be an Encrypted Data Recovery
    Agent for Sean's account.


    Answer: A,C


    33. You are the administrator responsible for security and user desktop
    settings on your network. You need to configure a custom registry entry for
    all users. You want to add the custom registry entry into a Group Policy
    object (GPO) with the least amount of administrative effort.

    What should you do?

    A. Configure an ADM template and add the template to the GPO.
    B. Configure an INF policy and add the policy to the GPO.
    C. Configure a Microsoft Windows Installer package and add the package to
    the GPO.
    D. Configure RIS to include the registry entry.


    Answer: A


    34. Your company has a senior manager named Paul West. Paul uses computers
    in two different offices. Paul's home folder is stored on a server named
    UserServer.

    Paul works with many files that are highly confidential. Paul keeps these
    files in a folder named Confidential in his home folder. You need to
    maximize the security of the Confidential folder. You also want Paul to be
    able to access the folder from computers in each office.

    What should you do?

    A. Obtain a signing and sealing certificate from a certificate server for
    Paul's account, and install the certificate on the computers that Paul uses.
    B. Log on at UserServer as the administrator, connect to Paul's home folder,
    and set the encryption attribute.
    C. Configure Paul's account to have a roaming user profile, and instruct
    Paul to use folder properties to set the encryption attribute for his
    folders.
    D. Add the cipher /e /s . command to Paul's logon script.


    Answer: C


    35. You install the Routing and Remote Access service on a Windows 2000
    Server computer in your network. Your network is not directly connected to
    the Internet and uses the private IP address range 192.168.0.0.

    When you use Routing and Remote Access to dial in to the server, your
    computer connects successfully, but you are unable to access any resources.
    When you try to ping servers by using their IP addresses, you receive the
    following message: "Request timed out." When you run the ipconfig command,
    it shows that your dial-up connection has been given the IP address
    169.254.75.182.

    What should you do to resolve the problem?

    A. Configure the remote access server with the address of a DHCP server.
    B. Authorize the remote access server to receive multiple addresses from a
    DHCP server.
    C. Configure the remote access server to act as a DHCP Relay Agent.
    D. Ensure that the remote access server is able to connect to a DHCP server
    that has a scope for its subnet.


    Answer: D


    36. Your company's network includes Windows 3.1 client computers, Windows 95
    client computers, and Windows 2000 Professional client computers. The
    company's manufacturing facilities run 24 hours per day.

    The company has developed its own 32-bit application that collects
    information from the manufacturing process so that workers on one shift can
    find out what was manufactured during the previous shift. The company wants
    to make the application available on all of the client computers by using
    Terminal Service on a Windows 2000 Server computer. This server will not run
    as a domain controller.
    You install Terminal Services.
    The information technology (IT) department needs to be able to remote
    control users' sessions to support and troubleshoot the application.

    What should you do to enable the IP department to control users' sessions?

    A. Configure the Terminal server to run in Remote Administration mode.
    B. Grant the IT department Full Control permission to the Remote Desktop
    Protocol (RDP) on the Terminal server.
    C. Add the members of the IT department to the Power Users group on the
    Terminal server.
    D. Use third-party software to enable remote control of users' sessions.


    Answer: B


    37. Your network contains 10 domain controllers, 10 member servers, and
    approximately 1,000 client computers. All the servers run Windows 2000
    Server, and all the client computers run Windows 2000 Professional. Two of
    the domain controllers act as DNS servers. Users of client computers use
    file sharing to grant access to files stored locally.

    The network has 10 subnets and uses TCP/IP as the only network protocol. You
    want to configure the network so that all computers can resolve the
    addresses of all other computers by using DNS. Client computers must be able
    to register and resolve addresses, if a server fails.

    How should you configure the DNS servers?

    A. Configure one server with a standard primary zone for the domain, and
    configure at least one server with standard secondary zone.
    B. Configure one server with a standard primary zone for the domain, and
    configure at least one server with an Active Directory integrated primary
    zone.
    C. Configure one server with an Active directory integrated primary zone for
    the domain, and configure at least one server with a standard secondary
    zone.
    D. Configure at least two servers with Active Directory integrated primary
    zones for the domain.
    E. Configure at least two servers with standard primary zones for the
    domain.


    Answer: D


    38. Your network is configured as shown in the exhibit.
    (Exhibit)

    <img src="./70-215/images/Q37.gif">

    All the servers are Windows 2000 Server computers that use TCP/IP as the
    only network protocol. The sales department uses one subnet and has servers
    named Sales1 and Sales2. The engineering department uses another subnet and
    has servers named Engineering1 and Engineering2.

    Sales1 and Engineering1 are configured to act as DHCP servers. The router
    that joins the two subnets is not RFC 1542 compliant and does not support
    DHCP/BOOTP relay.

    You want to allow Sales1 and Engineering1 to support client computers on
    each other's subnets. What should you do?

    A. Set the router option in the DHCP Scopes to 192.168.2.1 for Engineering1
    and 192.168.1.1 for Sales1.
    B. On Engineering2 and Sales2, install Routing and Remote Access, and
    configure RIP as a routing protocol.
    C. On Engineering2 and Sales2, install and configure the DHCP Relay Agent
    service.
    D. Configure Engineering2 and Sales2 as DHCP servers without any scopes.


    Answer: C


    39. You install Terminal Services on a Windows 2000 domain controller. You
    install Terminal Services Client on users' client computers.
    Users report that when they try to connect to the Terminal server, they
    receive the following error message: "The local policy of this system does
    not allow you to logon interactively." When you attempt to log on to the
    Terminal server as an administrator from a user's computer, you log on
    successfully.

    You want users to be able to log on to the Terminal server. What should you
    do?

    A. Grant the users the right to log on as a service.
    B. Grant the users the right to log on locally.
    C. Grant the users the right to log on over the network.
    D. Copy the users' profiles to the Terminal server.
    E. Copy the users' home folders to the Terminal server.


    Answer: B


    40. Your company has a main office and 50 branch offices. The main office
    has a private network with 1,000 computers. Each branch office has a private
    network with between 10 and 20 computers and a 56-Kbps connection to the
    Internet.

    The company plans to use the Network Address Translation (NAT) feature of
    Routing and Remote Access to provide each office with access to the
    Internet. When you test this configuration, you discover that connections
    cannot be made to sites by using fully qualified domain names. However,
    connections can be made to these sites by using their IP addresses.

    You want to be able to make connections by using fully qualified domain
    names. What should you do?

    A. Configure the computers on each of the branch office networks with the
    address of a WINS server.
    B. Configure the computers on each of the branch office networks with the
    address of a DNS server on the Internet.
    C. Configure a filter on the NAT servers to pass DNS packets.
    D. Create a host file on each of the NAT servers.


    Answer: B


    41. You are the administrator of a routed Windows 2000 network. The network
    includes 25 Windows 2000 Server computers. You want to install a new Windows
    2000 Server computer as the first computer on a new routed segment.

    You configure the existing DHCP server with a scope that is valid for the
    new routed segment. During the installation of the new Windows 2000 Server,
    you specify that the server should obtain its IP address from an existing
    DHCP server.

    After you complete the installation, you open My Network Places. You see the
    new server but no other computers. You run the ipconfig command and find
    that the new server's assigned IP address is 169.254.1.200, with a 16-bit
    subnet mask and no default gateway address.

    You want to resolve the problem so that you can see other computers on the
    routed network.
    What can you do? (Choose two.)

    A. Configure all of the routers to route BOOTP broadcast frames.
    B. Configure the default gateway to the TCP/IP properties of the new server.
    C. Add the IP address for the default gateway to the TCP/IP properties of
    the new server.
    D. Add a DHCP Relay Agent computer to the new routed segment.
    E. Add a WINS server to the new routed segment.


    Answer: A,D


    42. You are the administrator of a Windows 2000 Server computer that has one
    hard disk. This computer runs a custom application that writes a large
    number of small temporary files in a single directory to support requests
    from client computers.
    To improve performance of the application, you add three new 100-GB SCSI
    disks to the server to hold these temporary files. You want to ensure that
    the application can use all 300 GB of space with a single drive letter. You
    also want to ensure the fastest possible performance when writing the
    temporary files.

    How should you configure the three disks?

    A. Convert all three disks to dynamic disks. Create a striped volume.
    B. Convert all three disks to dynamic disks. Create a RAID-5 volume.
    C. Create a single volume on each of the three disks. Format each volume as
    NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1.
    D. Create a single volume on Disk 1. Format the volume as NTFS. Extend the
    volume to create a spanned volume that includes the space on all three
    disks.


    Answer: A


    43. Your Windows 2000 Server computer contains a stripe set with parity on a
    four-disk array. You convert the stripe set with parity to a dynamic RAID-5
    volume.

    Six months later, users report that disk access on the server is slower than
    it had been on the previous day. You use Disk Management and discover that
    the status of the third disk in the array is Missing.

    You want to recover the failed RAID-5 volume.
    What should you do first?

    A. Replace the third disk and restart the server. Use disk Management to
    repair the volume.
    B. Ensure that the third disk is attached to the server and has power. Use
    Disk Management to reactivate the disk.
    C. Ensure that the third disk is attached to the server and has power. Use
    Disk Management to repair the volume.
    D. Install a new disk and create a single extended partition on the new
    disk. Restart the computer and allow Windows 2000 to automatically repair
    the volume on the extended partition.


    Answer: B


    44. You are the administrator of a Windows 2000 Server computer. The server
    has a single hard disk with two partitions. An application that runs on your
    server creates a very large log file in the Systemroot\Temp folder.

    There is not enough free space on the system partition to accommodate the
    log file. The application does not provide a way to change the path to the
    log file. You want to run the application on your server.

    What should you do?

    A. On the second partition, create a shared folder named Temp.
    B. In the systemroot folder, create a shortcut named Temp that points to the
    second partition on the disk.
    C. Add a second hard disk. Create and format a partition from the free space
    on the second hard disk. Create a Temp folder on the new partition. Mount
    the system partition as the Temp folder on the new partition.
    D. Add a second hard disk. Delete the contents of the Systemroot\Temp
    folder. Create and format a partition from the free space on the second hard
    disk. Mount the partition as the Systemroot\Temp folder.


    Answer: D


    45. You install your boot volume on volume C on your Windows 2000 Server
    computer. You mirror volume C on dynamic Disk 1.

    Two years later, during routine server maintenance, you open Disk Management
    and find that the status of volume C is Failed Redundancy. The status of
    Disk 1 is Missing.

    You attempt to reactivate Disk 1, but the status of volume C does not return
    to Healthy.

    What should you do next?

    A. Replace Disk 1 and restart the computer. The mirror will automatically
    regenerate.
    B. Remove the mirror on Disk 1, replace the disk, and then add back the
    mirror to the new Disk 1.
    C. Replace Disk 1 and copy all data from volume C to a new NTFS primary
    partition on the new Disk 1. Restart the computer.
    D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then
    re-create the mirror.


    Answer: B


    46. You install the boot volume D on your Windows 2000 Server computer on
    dynamic Disk 0. You mirror volume D on dynamic Disk 1.
    One year later, during routine server maintenance, you open Disk Management
    and find that the status of volume D is Failed Redundancy. The status of
    Disk 1 is Online (Errors). A symbol with an exclamation point appears in the
    graphical view of the disk.

    You want to return the status of the boot volume to Healthy. What can you
    do? (Choose two.)

    A. Break the mirror, delete the volume on Disk 1, and re-create the mirror.
    B. Replace Disk 1, copy the data from the boot volume to the new disk, and
    then use Disk Management to rescan the disks.
    C. Replace Disk 1, Ensure that the new disk is a basic disk, and repair the
    volume.
    D. Reactivate the mirror on Disk 1.
    E. Convert Disk 1 to a basic disk, and reconvert it to a dynamic disk.


    Answer: A,D


    47. Five Lakes Publishing has a Windows 2000 network serving 200 users. A
    server named User_srv is used to hold users' files. User_srv is configured
    with a single, large NTFS volume. Every user has a home folder on User_srv.
    Users can also use a shared folder named IN_PROGRESS to store files for
    books that are being prepared.

    The network administrator at Five Lakes Publishing configured disk quotas
    for the NTFS volume on User_srv. All users have a default limit of 100 MB,
    and the option to deny space to users who exceed their limit has been
    enabled.

    When a user named Amy Jones attempts to save a chapter of a new book to her
    home folder on the server, she receives the following error message: "The
    disk is full or too many files are open."

    What should Amy do to allow this document to be saved? (Choose all that
    apply.)

    A. Compress the files in her home folder to save disk space.
    B. Change the security setting of some of the files in her home folder to
    grant Full Control permission to a user who has not reached the quota level.
    C. Move some of the files from her home folder to the IN_PROGRESS shared
    folder.
    D. Remove files from her home folder until the total uncompressed file size
    is less than 100 MB.


    Answer: D


    48. You upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The
    computer has two hard disks. The system and boot partitions are located on
    two primary partitions on Disk 0. Both partitions are mirrored on Disk 1.

    One month later, Disk 1 fails. You replace the disk with a disk taken from
    another Windows 2000 computer. When you try to repair the fault-tolerant
    volumes by using Disk Management, you find that the Repair Volume option is
    unavailable.

    You want to repair the mirror set. What can you do? (Choose two.)

    A. Delete all volumes on Disk 1. Change Disk 1 back to a basic disk. Repair
    the fault-tolerant volumes on Disk 0.
    B. Create two new volumes on Disk 1. Copy all the data from the two disk
    partitions on Disk 0 to the two volumes on Disk 1.
    C. Break the mirror set. Convert Disk 0 to a dynamic disk. Create a mirror
    on Disk 1.
    D. Create a single volume on Disk 1. Copy all the data from Disk 0 to the
    single volume. Convert Disk 0 to a dynamic disk.


    Answer: A,C


    49. Trey Research has a Windows 2000 Server computer named User_srv. This
    computer has a RAID-5 controller. The RAID array is configured as two
    partitions. Drive C is a 2-GB partition that holds the operating system and
    paging file. Drive D is a 30-GB partition that will hold the home folders
    for 200 users.

    Trey Research employs 10 scientists. The user accounts for scientists are
    members of a group named Scientists. The scientists use a data capture
    application that generates files that can be larger than 100 MB.

    Trey Research wants to use disk quotas. Ordinary users should be allowed to
    store a maximum of 75 MB of data in their home folder. The storage for users
    in the Scientists group should not be limited by quotas.

    What should you do to configure this disk quota scheme? (Choose two.)

    A. Enable quota management on drive D. Select the Deny disk space to users
    exceeding quota limit Check box. Set the default quota limit to 75 MB.
    B. Create a Scientist template account. Create a new quota entry for this
    account. Select the Do not limit disk usage for this entry option button.
    C. Create new quota entries for the 10 scientists' user accounts. Select the
    Do not limit disk usage for this entry option button.
    D. Enable quota management on drive D. Select the Deny disk space to users
    exceeding quota limit check box. Select the Do not limit disk usage option
    button for the default quota limit.
    E. Create a Scientist template account. Create a quota entry for this
    account. Set the quota limit to 30 GB.


    Answer: A,C


    50. You share a folder on a Windows 2000 Server computer for users in your
    company's London office. You place several subfolders (Marketing, Sales,
    Research and Marketing-2) in the London folder. See the exhibit.

    <img src="./70-215/images/Q50.gif">

    The Marketing-2 folder is compressed. You want to move some files from the
    Research folder into Marketing-2, and you want to make sure that the files
    are compressed when you move them. However, you do not want to compress the
    remaining files in Research.

    What should you do?

    A. Move each of the files from Research to Marketing-2.
    B. Copy the files from Research to Marketing-2, and then delete the original
    files.
    C. Compress Research, apply changes to the folder only, and then move the
    files from Research to Marketing-2.
    D. Encrypt Marketing-2, move the files from Research to Marketing-2, and
    then decrypt Marketing-2.


    Answer: B


    51. You are the administrator of a Windows 2000 Server network. You
    configure two sites: one for your New York office and one for your Paris
    office. You configure two organizational units (OUs) named New York and
    Paris. In each of these OUs, you create subordinate OUs named Sales,
    Marketing, and Research. You place user accounts, stand-alone member
    servers, and Windows 2000 Professional computers in their appropriate
    subordinate OUs.

    You suspect that someone is trying to log on to your domain by guessing user
    account names and passwords. You want to find out which computers are being
    used for these logon attempts.

    What should you do?

    A. Edit the Default Domain Controllers Policy object to audit directory
    services access failures.
    B. Edit the Default Domain Policy object to audit account logon failures.
    C. Edit the New York OU and Paris OU Group Policy objects (GPOs) to audit
    logon failures.
    D. Edit the Group Policy object (GPO) of each subordinate OU to audit
    directory service access failures.


    Answer: B


    52.You want to provide complete redundancy for all data stored on your
    hardware RAID-5 disk array. You install a second hardware Raid-5 disk array.

    You want to create a mirror of the original array on the new array. However,
    when you right-click the free space on the new array in Disk Management, you
    see no option to create a new volume or a mirrored volume.

    Bsfore you create a mirrored volume on the new array, what should you do?

    A. Convert both arrays to dynamic disks.
    B. Create an empty single extended partition on the new disk array.
    C. Create a single unformatted primary partition on the new disk array.
    D. Format the new disk array as a single NTFS primary partition.
    E. Format the new disk array as a single NTFS logical drive in an extended
    partition.


    Answer: A


    53. You are the administrator of the homeoffice.local domain. You want to
    create a shared printer for the company's executives so that they do not
    have to wait for their documents to print when the default printer's queue
    contains a large number of documents.

    You configure the new high-priority printer and want to set permissions for
    the groups shown in the exhibit.
    (Exhibit. Note: The default settings have been cleared.)

    <img src="./70-215/images/Q48.gif">

    You select the check box to allow Print permission for the Executives group.
    You want only the Administrators, Print Operators, Server Operators, and
    Executives groups to be able to print to the printer.

    What can you do? (Choose two.)

    A. Remove the Everyone group.
    B. Select the check box to deny Print permission for the Everyone group.
    C. Select the check box to deny Manage Documents permission for the Everyone
    group.
    D. Select all Deny check boxes for the Everyone group.
    E. Clear all check boxes for the Everyone group.


    Answer: A,E


    54. You are the administrator of Coho Vineyard. You are responsible for all
    remote locations, each of which has at least one Windows 2000 Server
    computer.

    After you install a new video adapter, one of the users at a remote location
    reports that Routing and Remote Access does not accept calls. After you
    resolve the Routing and Remote Access problem, you need to configure the
    server to prevent users from installing any unsigned device drivers.

    What two actions should you take in the Driver Signing Option dialog box?
    (choose two)

    A. Set File Signature Verification to Ignore.
    B. Set File Signature Verification to Block.
    C. Set File Signature Verification to Warn.
    D. Select the Apply Settings As System Default check box.


    Answer: B,D


    55. You want to upgrade a Windows NT Server 4.0 computer named Server34 to
    Windows 2000 Server. Server34 is a member server in a Windows 2000 domain
    named marketing.fabrikam.local. The domain runs in native mode. You want to
    change the role of Server 34 from a member server to a domain controller in
    the same domain.

    What should you do? (Choose two.)

    A. Reinstall Windows NT Server 4.0 on Server 34 in the same WINNT folder,
    and make Server 34 a BDC in the marketing domain.
    B. Use Server Manager on Server34 and promote Server34 to a PDC for the
    marketing domain.
    C. Upgrade Server34 to Windows 2000 Server.
    D. Run the Active Directory Installation wizard to make Server34 a domain
    controller in the marketing.fabrikam.local domain.
    E. Run the Active Directory Installation wizard to convert Server34 to a
    domain controller in the fabrikam.local domain.


    Answer: C,D


    56. You are a network administrator for your company. The company is
    currently configuring its branch offices with a Windows 2000 Server computer
    at each office. Each branch office has a technical-support department but
    not a network administrator.

    You want to configure the remote Windows 2000 Server computers so that
    whenever a new Microsoft driver becomes available, the branch offices are
    notified automaticaly when the administrator logs onto the server.

    What should you do?

    A. Install the Windows 2000 Resource Kit.
    B. Install Windows Critical Update notification.
    C. Configure System File Checker to notify the branch offices.
    D. Configure Windows File Protection to notify the branch offices.


    Answer: B


    57. You are the administrator of a Windows 2000 network. The network
    includes a Windows 2000 Server computer that is used as a file server. More
    than 800 of your company's client computers are connected to this server.

    A shared folder named Data on the server is on an NTFS partition. The Data
    folder contains more than 200 files. The permissions for the Data folder are
    shown in the following table.
    (Exhibit)

    <img src="./70-215/images/Q49.gif">

    You discover that users are connected to the Data folder. You have an
    immediate need to prevent 10 of the files in the Data folder from being
    modified. You want your actions to have the smallest possible effect on
    users who are using other files on the server.

    Which two actions should you take? (Choose two.)

    A. Modify the NTFS permissions for the 10 files.
    B. Modify the NTFS permissions for the Data folder.
    C. Modify the share permissions for the Data folder.
    D. Log off the users from the network.
    E. Disconnect the users from the Data folder.


    Answer: A,E


    58. You are the administrator of the Intranet at Blue Sky Airlines. You
    install and configure a new Windows 2000 Server computer named
    server1.departments.blueskyairlines.com as an intranet server. This server
    hosts the multiple departmental and resource Web links to the network and
    databases.

    You configure a ticketing Web site. You also configure a finance virtual
    directory in the department's Web site, as shown in the exhibit.
    See the Exhibit.

    <img src="./70-215/images/Q44.gif">

    During the first morning that the new server is available, users report that
    the only information they are seeing in their browser is a list of HTM and
    ASP files. For security reasons the first action you need to take is to
    disable the users' ability to view the files of all WEB sites in the form of
    a list.

    What should you do?

    A. Clear the Directory Browsing checkbox for the Server Properties, and then
    apply the settings to the child WEB sites.
    B. Clear the Directory Browsing checkbox for the Ticketing WEB site, and
    then apply the setting to child virtual directories.
    C. Clear the Directory Browsing checkbox for the Department's WEB site, and
    then apply the setting to the child virtual directories.
    D. Clear the Directory Browsing checkbox for the Financing virtual
    directory.


    Answer: A


    59. You are the administrator of your company's network. You are configuring
    the security policy for a group of users in the Finance organizational unit
    (OU). You need to configure a Group Policy so that future changes to Group
    Policy will be applied within 15 minutes to any computers that are logged on
    to the network.

    What should you do?

    A. Enable the background refresh settings to use the default Group Policy
    refresh rate.
    B. Enable the asynchronous Group Policy application settings.
    C. Enable and configure the Group Policy refresh interval for domain
    controller.
    D. Enable and configure the Group Policy refresh interval for computers.


    Answer: D


    60. You are the network administrator at Contoso Ltd. You work at the main
    office in Seattle. The branch office in Denver is a call center. The network
    consists of a Windows 2000-only domain.

    Denver is a token ring network. Seattle is an ethernet network. None of your
    network adapters at Contoso Ltd support promiscuous mode. The Brouter does
    not support multicast traffic.
    Wks1.contoso.com and mem1.contoso.com are available for use as network
    monitor clients.

    You want to be able to detect and identify rogue installations of network
    monitor on your network by using the fewest possible computers.
    What should you do? (Choose all that apply)

    A. Install network monitor tools on wks1.contoso.com by using the Windows
    components wizard.
    B. Install the SNMP protocol on wks1.contoso.com by using the Windows
    components wizard.
    C. Install network monitor tools on mem1.contoso.com by using the Windows
    components wizard.
    D. Install the SNMP protocol on mem1.contoso.com by using the Windows
    components wizard.
    E. Install network monitor tools on wks1.contoso.com that supports
    promiscuous mode.
    F. Install network monitor tools on mem1.contoso.com that supports
    promiscuous mode.


    Answer: A,C


    61. The Litware, Inc. network has three main network segments and six domain
    controllers. Part of the network is shown in the exhibit.
    See the Exhibit.

    <img src="./70-215/images/Q33.gif">

    You back up all of the System State data for each domain controller and
    place the data on a single tape. That tape is currently attached to the
    srv1.west.litware.com computer.

    To which server or servers can you restore the System State data from
    srv1.west.litware.com? (Choose all that apply).

    A. srv1.west.litware.com.
    B. srv2.west.litware.com.
    C. srv3.central.litware.com.
    D. srv4.central.litware.com.
    E. srv5.east.litware.com.
    F. srv6.east.litware.com.


    Answer: A


    62. You configure a HP JetDirect print device as shown in the exhibit. See
    the Exhibit.

    You want to create and share a printer at Srv2.sales.justtogs.com that is
    connected to the TCP/IP port of the print device. However, when you enter
    the IP address of the device, you receive the dialog box shown in the
    Printer Port Wizard.
    See the exhibit.

    <img src="./70-215/images/Q46.gif">
    <img src="./70-215/images/Q46a.gif">

    What should you do?

    A. Select Hewlett Packard JetDirect from the standard drop-down list.
    B. Select the Custom option button, click the Settings command button, and
    select the LPR protocol.
    C. Change the IP address of the print device to 10.5.20.200.
    D. Change the subnet mask of the print device to 255.0.0.0.
    E. Change the default gateway address on Srv2.sales.justtogs.com to
    10.5.20.100.


    Answer: C


    63. You install a new modem on your Windows 2000 Server computer. Windows
    2000 detects the modem and installs the default driver. Occasionally the
    modem stops communicating, and the only way to reactivate it is to restart
    your computer.

    You download an updated modem driver from the manufacturer's web site and
    save it in the WINNT folder on your hard drive.

    You want to install the new driver. What should you do?

    A. In the Properties sheet for the modem in the Device Manager, click the
    Update Driver command button.
    B. Use Device Manager to scan for hardware changes.
    C. Delete the modem within the Device Manager and restart the computer.
    D. Move the new driver to the Winnt/driver Cache folder, and then restart
    the computer.


    Answer: A


    64. Your Windows 2000 Server computer has a 10-GB hard disk with two
    partitions; Drive C and drive D. Windows 2000 Server is installed on Drive
    D. Both partitions are formatted as NTFS.

    Your office experiences a power failure that causes your Windows 2000 Server
    computer to restart.
    When the computer is restarting, you receive the following error message
    "NTLDR is missing. Press any key to restart".

    What should you do?

    A. Start the computer by using Windows 2000 Server computer CD-ROM and
    choose to repair the installation.
    B. Select the Recovery Console and copy the NTLDR file on the CD-ROM to the
    root of the system partition.
    C. Start the computer in debugging mode. Copy the NTLDR file on the CD-ROM
    to the root of the system partition.
    D. Start the computer by using the Windows 2000 bootable floppy disk. From a
    command prompt, run the sfc/scanboot command.
    E. Start the computer by using a Windows 2000 bootable floppy disk. Run the
    File Signature Verification utility.


    Answer: B


    65. You are the administrator of a Windows 2000 Server computer. The server
    hosts several web sites that have logging enabled. You use a third-party
    reporting utility to analyze the log files produces by the web sites.

    You notice that all data from 7:00 P.M to midnight each night is included in
    the following day's log file.

    You want all data to be included in the correct day's log file. What should
    you do?

    A. Ensure that the log type is set to W3C.
    B. Change the log rollover property in the web site logging properties.
    C. Change the time zone setting in the time properties on the web server.
    D. Configure the time server service o the web server to use the LocalSystem
    account.


    Answer: B


    66. You are installing Windows 2000 Server on a multiprocessor computer. The
    manufacturer has provided a customized hardware abstraction layer (HAL) to
    use with the computer. The HAL is on the floppy disk. You want to install
    the customized HAL designed for the computer.

    What should you do?

    A. During the text mode portion of the Windows 2000 setup, install the
    customized HAL.
    B. After text mode portion of Windows 2000 setup is complete use the
    recovery console to copy the customized HAL to the system32 folder on the
    boot partition.
    C. After the text mode portion your Windows 2000 setup is complete use the
    emergency repair process to replace the existing HAL with the customized HAL
    and then continue the Windows 2000 setup.
    D. After the Windows 2000 setup is complete use the device manager to scan
    for Hardware changes when prompted install the customized HAL.


    Answer: A


    67. Your Windows 2000 domain contains a Windows 2000 member server named
    server1. Server1 has routing and remote access for Windows 2000 enabled.
    Server1 is also configured to use a modem bank to accept incoming dial-up
    attempts.

    You need to configure server1 so that users can connect to it from their
    home computers. You want to restrict access to the network to only users who
    can access the network at speeds faster than 64 Kbps.

    You also must ensure that the users connect by using mutual authentication.
    Which three actions should you take? (Choose Three)

    A. Configure the authentication provider to be RADIUS server.
    B. Configure the authentication provider to be Windows Authentication.
    C. Specify IDSL as the dial-in media.
    D. Specify Async as the dial-in media.
    E. Configure support for EAP.
    F. Configure support for MS-CHAP
    G. Configure support for MS-CHAP version 2.


    Answer: B,C,G


    68. You are the administrator of a Windows 2000 Server computer. A folder
    named HR-Data on the system partition of the server is shared on the network
    as HR-Data. The owner of the HR-Data folder is Administrators.
    The share permissions and NTFS permissions are shown in the following table.
    (Exhibit).

    <img src="./70-215/images/Q43.gif">

    Katrin creates a file in the HR-Data folder. She sets the NTFS permissions
    for the file to list only herself on the access control list, with Full
    Control permission. Katrin then leaves on vacation and cannot be contacted.

    Later, you discover that the file contains sensitive information and must be
    removed from the server as soon as possible. You want to delete the file
    without modifying any of the permissions for other files in the HR-Data
    folder. You want your actions to have the least possible impact on users who
    may be using other files in the HR-Data folder. You want to use the minimum
    amount of authority necessary to delete the file.

    What should you do?

    A. Grant yourself Full Control permission for only the HR-Data folder and
    not its files and subobjects. Delete the file. Then remove Full Control
    permission for the HR-Data folder.
    B. Take ownership of the HR-Data folder. When prompted, take ownership of
    existing files. Grant yourself Full Control permission for the file. Delete
    the file.
    C. Take ownership of the file. Grant yourself Modify permission for the
    file. Delete the file.
    D. Grant yourself Modify permission for the HR-Data folder and its
    subobjects. Delete the file. Then remove Modify permission for the HR-Data
    folder.


    Answer: C


    69. You enable disk quotas on volume D on the server. You configure a disk
    quota 10 GB for each user. You select the deny disk space to users exceeding
    quota limit check box.

    A user named Bruno reports that he cannot save a Microsoft Windows 2000
    document to a shared folder used by his department. You need to ensure that
    users can always save more than 10 GB to their home directories.

    What should you do?

    A. Clear the deny disk space to users exceeding quota limit check box in the
    quota configuration for volume D.
    B. Log on to the server as administrator, and take ownership of all files in
    the group-shared folders
    C. Create a new volume on the server. Move the group-shared folders to the
    new volume
    D. Increase the quota limit on volume D to permit extra space for shared
    files


    Answer: A


    70. You are the network administrator at Awesome computers, a hardware
    manufacturing firm. You are deploying 20 new Windows 2000 Server computers
    in the software development department. The software testers will use these
    servers for testing.

    Each tester is a member of the Power Users group. Each tester must be able
    to install new hardware and device drivers on these servers. You want the
    testers to be able to test custom applications that install drivers without
    interruption.

    You install Windows 2000 Server on one computer so that you can prepare a
    system image for the deployment.

    You must configure this system image to meet the needs of the software
    testers. What should you do?

    A. For the Power Users group, apply the right to load and unload device
    drivers.
    B. For the domain users group, apply the right to load and unload device
    drivers.
    C. Configure the driver signing options to install all files, regardless of
    file signature. Configure the setting to be a system default.
    D. Configure the driver signing options to install all files, regardless of
    file signature. Configure the setting not to be a system default.


    Answer: A


    71. You want to upgrade your Windows NT 4.0 Server to Windows 2000 Server.
    The current system partition uses the FAT file system.

    You start the setup by starting the computer from the Windows 2000 Server
    CD-ROM and receive the following error message:
    "You chose to install Windows 2000 on a partition containing another
    operating system. Installing Windows 2000 on this partition may cause the
    operating system to function improperly".

    You are unable to perform the upgrade. What should you do to resolve this
    problem?

    A. Convert the partition to NTFS.
    B. Disable Advanced Configuration and Power Interface (ACPI) support for the
    computer.
    C. Restart the computer and then run WINNT32.EXE from the Windows NT Server
    4.0 environment.
    D. Restart by using the Setup floppy disks.


    Answer: C


    72. You install a Windows 2000 Server computer on your network. You place
    several shared folders on a 12-GB primary partition formatted as FAT32.

    During months of continuous operation, the number of users who access the
    server and their access frequency remains constant. The average size of the
    files on the server remains approximately constant.

    After nine months of use, users report that the server does not retrieve
    files from the shared folders as fast as when you first installed the
    server. What should you do to resolve the problem?

    A. Convert the disk that contains the shared folders to a dynamic disk.
    B. Convert the partition that contains the shared folders to NTFS.
    C. Defragment the disk that contains the shared folders.
    D. Move the paging file to the primary partition that contains the shared
    folders.


    Answer: C


    73. You are the network administrator of the Windows 2000 network at Island
    Hopper News. Your company does not have a Web presence. Your network
    consists of a Windows 2000 domain controller, a file server, and a member
    server named Server 1. Server 1 is connected to a modem bank.

    Many users want to log on to the network for home. These users have Windows
    95, Windows 98 and Windows 2000 are professional computers.
    You enable routing and remote access for Windows 2000 on server 1. You
    configure the server 1 properties as shown in the exhibit.

    <img src="./70-215/images/Q73.gif">

    Users configure dial-up networking on their client computers to connect to
    server 1. Some users report that they are unable to connect to server 1.
    What should you do?

    A. Change the authentication provider to RADIUS Authentication.
    B. Disable EAP.
    C. Disable MS-CHAP version2.
    D. Enable SPAP.
    E. Enable MS-CHAP.


    Answer: E


    74. Your company network includes Windows 98, Windows 2000 Professional, and
    Macintosh client computers. All of the client computers currently use TCP/IP
    as their only network protocol.

    You create several shared folders on a Windows 2000 Server computer. You
    plan to store the company's financial data in these shared folders. During
    testing, you discover that the Macintosh client computers cannot access the
    shared folders.

    You want the shared folders to be accessible from all of the client
    computers on the network.
    What should you do first?

    A. Install the SAP protocol on the Windows 2000 Server computer.
    B. Install the Apple Talk network protocol on the Macintosh computers and on
    the Windows 2000 Server computer.
    C. Install Apple Talk network integration on the Windows 2000 Server
    computer.
    D. Install RIP on the Windows 2000 Server computer.


    Answer: B


    75. You are the administrator of a Windows 2000 Server computer. You add a
    new hard disk to the computer and configure it as a basic disk. You create a
    single NTFS partition that uses all of the space on the disk. You assign the
    drive letter G to the new partition.
    You share drive G as DataFiles and assign the default share permissions to
    the drive.

    You want to create several folders in the root of drive G. You plan to use
    these folders to store network users' files.
    You want to prevent users from creating additional folders in the root of
    drive G. You also want to allow users to create subfolders under the folders
    that you have already created. You want to configure the NTFS security
    permissions for the drive G folders in the minimum amount of time.

    What should you do?

    A. Create your folders in the root of drive G. Configure the permissions on
    these folders to block permission inheritance.
    B. Create your folders in the root of drive G. Modify the permissions on the
    folders to allow users to create subfolders. Configure the permissions on
    these folders to block permission inheritance.
    C. Create your folders in the root of drive G. Configure the permissions on
    these folders to block permission inheritance. Modify the permissions on the
    root of drive G to prevent users from creating folders on the root.
    D. Modify the permissions on the root of drive G to prevent users from
    creating folders on the root. Create your folders in the root of drive G.
    Configure the permissions on these folders to block permission inheritance.


    Answer: C


    76. A Windows 2000 Server computer at your company is connected to two print
    devices. Company executives use one print device, which is shared as
    Executive. The office staff use the other print device, which is shared as
    Office.

    Occasionally, a company executive directs a member of the office staff to
    print a report to the Executive printer. However, the executives report that
    some members of the office staff are printing to the Executive printer
    without authorization.

    You need to find out which users are printing to the Executives printer
    without authorization.
    What should you do?

    A. Monitor the printer's spool directory for files printed by unauthorized
    users.
    B. Use system monitor to monitor the print jobs being set to the executive
    printer.
    C. Enable audit logging for object access. Configure auditing on the
    executive printer.
    D. Use the event viewer to review the security log for messages from the
    printer subsystem.


    Answer: C


    77. You are the network administrator for your company. You configure a
    shared printer on a Windows 2000 Server computer. The printer connects to a
    Hewlett Packard JetDirect print device that uses DLC. This print device is
    on the same network segment as the server.

    Six months later, you relocate the print device to a different network
    segment. Users report that they are able to send print jobs to the printer
    but that their print jobs no longer print.

    You need to ensure that the printer and the print device are working
    properly.
    What should you do?

    A. Configure the JetDirect print device to use DHCP.
    B. Uninstall and reinstall the DLC protocol from the server.
    C. Configure the printer and the JetDirect print device to use LPR printing
    protocol.
    D. Delete the printer. Re-create the printer by using DLC to connect to the
    JetDirect print device.


    Answer: D


    78. You are the domain administrator for your company. The domain and OU
    structure is shown in the exhibit.

    <img src="./70-215/images/Q78.gif">

    You want to log all unsuccessful attempts to delete files from all your data
    servers.

    Which two actions should you take? (Choose two)

    A. Set audit permissions on all file and print server computers.
    B. Use Secedit to import the Hisecws.inf template for all computers in the
    file and print servers OU.
    C. Use Secedit to import the Hisecws.inf template for all computers in the
    Client computers OU.
    D. Enable group policy auditing on the file and print servers OU.
    E. Set auditing permissions on all of the client computers.
    F. Enable auditing group policy on the client computers OU.


    Answer: A,D


    79. You configure one of your Windows 2000 Server computers as a print
    server. You install a second Plug and Play network adapter on the server to
    improve network adapter uses IRQ11. The second adapter uses IRQ5. The server
    is now unable to print to the print device connected to the non-Plug and
    Play LPT2 port adapter.

    You want to continue to use print devices installed on Plug and Play LPT1
    and non-Plug and Play LPT2.
    What should you do?

    A. Use device manager to change the IRQ for LPT1 to IRQ10.
    B. Use device manager to change the IRQ for LPT2 to IRQ7.
    C. Edit the CMOS settings on the server to reserve IRQ7 for non-Plug and
    Play devices.
    D. Edit the CMOS settings on the server to reserve IRQ5 for non-Plug and
    Play devices.


    Answer: D


    80. You are the administrator for your company. Your Windows 2000 Server
    computer contains two 23GB hard disks. Each disk is configured as a basic
    disk and has a single 23GB NTFS partition. Both partitions are backed up to
    tape every night. The partition on Disk1 stores user data. Most users of
    your company encrypt their files.
    Disk1 fails. You replace it with a new disk.

    You need to recover the data as quickly as possible while maintaining the
    security of the files.

    What should you do?

    A. Create a single NTFS partition. Restore the contents of Disk1 from the
    most recent tape backup. Run the cipher /d /i command.
    B. Create a single NTFS partition. Restore the contents of Disk1 from the
    most recent tape backup. Instruct the users to verify the integrity of their
    files.
    C. Create a single NTFS partition. Restore the contents of Disk1 to a second
    file server. Logon to the server console as a recovery agent. Copy the files
    from the second file server to the new partition.
    D. Create a single NTFS partition. Restore the contents of Disk1 to a second
    file server. Instruct users to copy their files from the second file server
    to the new partition.


    Answer: B


    81. You want to install Windows 2000 server on 15 new computers. These
    servers will provide file and print services in branch offices of your
    company. The company wants each branch office to purchase its own copy of
    Windows 2000 Server, and the installation in each branch office should use
    the serial number associated with the branch office's own copy of Windows
    2000 Server.

    You want to install, configure and test all 2000 servers before shipping
    them to your branch offices. You want the users at the branch offices to
    enter the serial numbers and computer names once they receive the computers.

    What should you do?

    A. Install Windows 2000 Server on the computers by using an Unattend.txt
    file, and then use the Registry Editor to remove the computer name and
    license details.
    B. Start the installation from an MS-DOS boot disk. Install Windows 2000
    Server on the computers from an existing server by running the Winnt command
    with the /PreInst switch.
    C. Install Windows 2000 Server on the computers. Use Setup Manager to create
    a sysprep.inf file for sysprep.exe. Place the sysprep.inf on the computers
    and run sysprep -nosidgen.
    D. Create an Unattend.txt file bu using Setup Manager. Include the line
    OemPreinstall=YES in the Unattend.txt file. Use this file to perform the
    installation.


    Answer: C


    82. You are preparing to install Windows 2000 Server on a new computer. The
    computer is connected to a network that includes Windows 98 computers and
    Windows 2000 Server computers.

    You want to install Windows 2000 Server from source files that are located
    on a server on the network.
    What should you do?

    A. Start the new computer by using a Windows 98 network boot disk. Connect
    to the network server. Run Winnt32.exe.
    B. Start the new computer by using Windows 98 network boot disk. Connect to
    the network server. Run Winnt.exe.
    C. On a Windows 2000 Server computer, use Makebt32.exe to create
    installation startup disk. Start the new computer by using the first disk.
    D. On a Windows 2000 computer, format a floppy disk. Copy NTLDR, boot.ini,
    Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the
    disk.


    Answer: B


    83. Your network has Windows 2000 professional client computers and Windows
    NT Workstation 4.0 client computers. The network uses TCP/IP as the only
    network protocol.
    One server on the network acts as WINS server and DNS server. The IP address
    of this server is 192.168.1.10. All of the client computers are configured
    to use this server for the DNS and WINS services.

    Users of Windows NT Workstation computers cannot connect to a file server
    named FS_1. However, users of Windows 2000 Professional computer can access
    FS_1.
    FS_1 has a statically assigned address of 192.168.1.11. The TCP/IP settings
    for FS_1 are shown in the Exhibit.

    <img src="./70-215/images/Q83.gif">

    Which change should you make to allow Windows NT Workstation computers to
    connect to FS_1?

    A. Add the WINS address used by the Windows NT Workstation computers and
    select the Enable LMHOSTS lookup check box.
    B. Select Enable LMHOSTS lookup checkbox and import Lmhosts file used by the
    Windows NT Workstation computers.
    C. Select Enable NetBIOS over TCP/IP option button and add the WINS address
    used by the Windows NT Workstation computer.
    D. Select the Use the NetBIOS setting from the DHCP server option button and
    add the WINS address used by the Windows NT Workstation computer.


    Answer: C


    84. Your domain includes numerous domain controllers. One of the domains
    controllers is malfunctioning, and a disk with the following ARC path is not
    responding:
    multi(1)disk(0)rdisk(1)partition(1).

    <img src="./70-215/images/Q84.gif">

    The nonresponsive disk needs to be replaced.

    Which disk should you replace? (See the exhibit)

    A. Controller 1 - Disk 1
    B. Controller 2 - Disk 1
    C. Controller 2 - Disk 3
    D. Controller 2 - Disk 4


    Answer: B


    85. You are the administrator of a Windows 2000 Server computer. The server
    contains a RAID-5 array that is configured as a volume D and an 18-GB hard
    disk that is configured as volume C. Volume D is formatted as NTFS, contains
    60GB of data, and has 2GB of free disk space. Volume C is formatted as FAT32
    and has 16GB of free disk space.

    The server is used to store user home folders. Most of the data in the home
    folders has been encrypted with the encrypted with the encrypted file
    system.
    You estimate that the server will need an additional 10-GB disk space to
    meet user needs. However, you will not be able to purchase additional hard
    disks for three months.

    You want to immediately free at least 10-GB of the disk space. You do not
    want to compromise the security of the user's files.
    What should you do?

    A. Instruct the users to move at least 10-GB of data to another file server
    that has EFS.
    B. Create additional shared folders on volume C. Move 10-GB of data to the
    new, shared folders.
    C. Copy at least 10-GB of data to a writable CD-ROM. Delete these files from
    the server.
    D. Enable the compression attribute for the volume, and compress the users'
    home folders. Ensure that EFS remains enabled on the home folders.


    Answer: A


    86. You are the administrator of Windows 2000 Server computer. Volume D is
    formatted as NTFS. Volume D contains folders that are shared by departments
    within your company.
    You want to limit the amount of disk space that the shared folders can
    store. A user named Richard has stored 10GB of files in the shared folders.
    Richard's files are using more disk space on the shared folders than any
    other user's files.
    You enable disk quotas on Volume D and create a default quota entry. You set
    the quota limit to 1.1 GB and select the Deny disk space to users exceeding
    quota limit check box.
    When Richard attempts to encrypt the files in his home folder using the
    encrypted file system he receives the following error messages, 'There is
    insufficient disk space to complete the operation'.

    You need to allow Richard to encrypt the files in his home folder.
    Which three actions must you have? (Choose Three)

    A. Create a quota entry for Richard, and select the Do not limit disk space
    check box.
    B. Instruct Richard to encrypt the files in his home folder.
    C. Run the Cipher.exe/d command
    D. Enable the compression attribute on Richard's home folder.
    E. Set the Richard's quota limit to equal the amount of disk space used by
    the files in his home directory.
    F. Set the default quota entry on volume D to 12GB, and clear the Deny disk
    space too users exceeding quota limit check box.


    Answer: A,B,E


    87. You are installing a new computer names Svr2.justtogs.com on your
    Windows 2000 network. Part of the network is shown in the exhibit.

    <img src="./70-215/images/Q87.gif">
    <img src="./70-215/images/Q87a.gif">

    You want to enter the appropriate TCP/IP addresses for the subnet mask and
    the default gateway for Svr2.justtogs.com.

    Which subnet mask and default gateway should you use? (See the Select and
    Place exhibit).

    A. Subnet Mask 255.255.0.0 Default Gateway 10.1.10.100
    B. Subnet Mask 255.255.255.0 Default Gateway 10.1.10.100


    Answer: A


    88. Your network contains NetWare 4.0 Servers. You have successfully
    installed Client Service for NetWare on Windows 2000 Professional computers,
    and Gateway Service for NetWare on Windows 2000 Server Computers.

    You recently added a new Windows 2000 Server computer to the network and
    installed Gateway Service for NetWare on it. However, the server is unable
    to connect to any NetWare servers.

    What should you do on the new Windows 2000 Server computer to resolve this
    problem?

    A. Enable NWLink NetBIOS.
    B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use
    the correct Ethernet frame type.
    C. Install RIP routing for IPX.
    D. Install the SAP Agent.


    Answer: B


    89. You are the administrator of a Windows 2000 Server network that runs in
    mixed mode. You install a new Windows 2000 Server computer. You create and
    share a new HP LaserJet 4L printer.

    Your Windows 2000 Professional client computers can print to the new printer
    successfully. However, when users try to connect to the printer from Windows
    NT Workstation 4.0 client computers, they receive the dialog box shown in
    the exhibit.
    (Exhibit)

    <img src="./70-215/images/Q47.gif">

    You want the printer driver to be installed automatically on the Windows NT
    Workstation computers. What should you do?

    A. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folders on
    all Windows NT Server 4.0 computers still configured as BDCs.
    B. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folder on
    the PDC emulator.
    C. Change the sharing options on the printer to install additional drivers
    for Windows NT 4.0 or Windows 2000.
    D. Copy the Windows NT 4.0 printer drivers to the
    Winnt\System32\printers\drivers folder on the Windows 2000 print server.
    E. Change the default gateway address on Srv2.sales.justtogs.com to
    10.5.20.100.


    Answer: C


    90. You are the administrator of the Windows 2000 Server network shown in
    the exhibit.
    (Exhibit)

    <img src="./70-215/images/Q45.gif">

    Users in the Research group and the Executives group have permission to
    access the Internet through a Windows 2000 Server computer running Microsoft
    Proxy Server. These users must enter their proxy server user names and
    passwords to connect to the proxy server, to the Internet, and to your local
    intranet server.

    The users who do not access the Internet do not have user accounts on the
    proxy server and, therefore, cannot connect to the intranet server.

    You want all users to be able to connect to the intranet server without
    entering a separate user name and password. What should you do?

    A. Move the intranet server to the client segment of the network.
    B. Move the proxy server to the server segment of the network.
    C. Configure each client computer to bypass the proxy server for local
    addresses.
    D. Configure each client computer to use port 81 for the proxy server.


    Answer: C


    91. You are the administrator of a Windows 2000 Server computer. The
    computer is configured to have a single 18-GB drive, which contains the
    operating system files. This drive also contains a shared folder where five
    network users store their Microsoft Excel files.

    You want to prevent each network user from using more than 1GB of space in
    the shared folder.

    Which action or actions should you take to achieve this goal? (Choose all
    that apply)

    A. Create a quota entry for Everyone account. Set the quota limit to 1 GB.
    B. Enable disk quotas on the volume.
    C. Set the default disk quota limit to 1 GB.
    D. Select the Deny disk space to users exceeding quota limit check box.
    E. Upgrade the disk to a dynamic disk.


    Answer: B,C,D


    92. You edit the registry on your Windows 2000 Server and reboot. The
    computer stops responding before you reach the login screen. How do you
    restore the computer's previous configuration?

    A. Boot into Safe Mode. Run REGEDIT and click File, Restore Previous
    Registry.
    B. Start the computer using Recovery Console. Run FIXBOOT C:. Reboot.
    C. Run the emergency repair process and choose "Registry Restore." Reboot.
    D. Restart the computer and choose the "Last Known Good Configuration" as it
    boots.


    Answer: D


    93. You install a second modem on a Windows 2000 Server computer configured
    with Routing and Remote Access. Dial-in users report that they are unable to
    connect to the server by using this new modem.

    What can you do to help find out the cause of the problem? (Choose one).

    A. Use the Routing and Remote Access snap-in to find out whether the ports
    for both modems are operational.
    B. From a command prompt, run the Net Config Server command.
    C. From a command prompt, run the Net Statistics command.
    D. Use Regedit32 to view the Error Control value in the
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess Key.


    Answer: A


    94. Your Windows 2000 Server computer uses a non-Plug and Play EISA network
    adapter configured to use IRQ 11. You add a second PCI network adapter and
    restart the computer. Device Manager reports an IRQ conflict between the two
    network adapters. Both adapters are trying to use IRQ 11.

    You want to resolve the problem. What should you do?

    A. Use Device Manager to change the IRQ for the original network adapter to
    IRQ 9.
    B. Use Device Manager to change the IRQ for the original network adapter to
    IRQ 10.
    C. Edit the CMOS settings on the computer to reserve IRQ 11 for non-Plug and
    Play devices.
    D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and
    Play devices.


    Answer: C


    95. You are configuring a Windows 2000 Server computer as a Routing and
    Remote Access server for a Branch office. You discover that an incorrect
    driver was installed during the installation of the modem.

    You attempt to remove the modem by using Phone and Modem Options in Control
    Panel. After each attempt to remove the modem by using this method, the
    computer stops responding.

    You restart the computer again. You must install the correct driver for the
    modem as quickly as possible.

    What should you do?

    A. Use the Add/Remove Hardware wizard to uninstall the modem. Restart the
    server.
    B. Shut down the server, then remove the modem card, and restart the server.
    Shut down the server again, insert the modem card, and restart the server.
    C. Delete all references to modems in the registry.
    D. Run the Modem troubleshooter and remove the modem when prompted. Restart
    the server.


    Answer: A


    96. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet
    adapter. You are replacing the integrated adapter with a new 100-MB Ethernet
    adapter.
    You install the new adapter in an available PCI slot. When you restart the
    computer, you receive error messages in the System log stating that the new
    adapter is missing or is not working.

    What should you do to resolve the problem?

    A. Create a new hardware profile.
    B. Use Device Manager to remove the integrated 10-MB Ethernet adapter.
    C. Use Device Manager to disable the integrated 10-MB Ethernet adapter.
    D. Delete the device driver for the integrated 10-MB Ethernet adapter from
    the Systemroot\system32\Driver Cache folder.


    Answer: C


    97. You are a member of the Enterprise Admins group at Trey Research. You
    create and share a printer named HPColorL2 on a Windows 2000 Server computer
    named treyresearch.local. You grant Print permission only to the Domain
    Local group named CompanySales. Later, you add a new child domain named
    london.treyresearch.local.

    Clair Hector is a member of the global group named LondonSales in the
    london.treyresearch.local domain. Clair reports that she is unable to send a
    print job to the HPColorL2 printer.
    You want all members of the LondonSales group to be able to print to the
    HPColorL2 printer.

    What should you do?

    A. Add the LondonSales group to the CompanySales group.
    B. Add the CompanySales group to the LondonSales group.
    C. Change the CompanySales group to a universal group.
    D. Change the LondonSales group to a universal group.


    Answer: A


    98. You are the network administrator of the litware.com domain. LitWare,
    Inc., has its main office in Dallas and branch offices in New York, Phoenix,
    and Seattle. A Windows 2000 Server computer named web1.litware.com is
    running Internet Information Service (IIS). This computer is located in the
    main office.

    Web developers in Dallas, New York, Phoenix, and Seattle need to update each
    of the Web sites and virtual directories located on web1.litware.com.
    Different updates will be occurring simultaneously. You want to ensure that
    each developer can use Microsoft FrontPage to update the sites successfully
    and to manage content changes.

    What should you do?

    A. Run the fpremadm command to install the server extensions for IIS on
    web1.litware.com. Configure the server extensions for each web site.
    B. Run the fpsrvadm command to install the server extensions for IIS on
    web1.litware.com. Configure the server extensions for each Web site.
    C. Install the server extensions for IIS on web1.litware.com by selecting
    Upgrade Extensions from All Tasks menu in IIS. Configure the server
    extensions for each Web site.
    D. Configure the server extensions for each Web site by selecting Configure
    Server Extensions from the All Tasks menu in IIS. Configure the server
    extensions to allow each developer update access for each Web site.


    Answer: D


    99. You are the administrator of a Windows 2000 Server computer named
    Server1. You create a Distributed file system (Dfs) root named Public. You
    add a shared folder named Docs as a Dfs node under the root.

    The share permissions and NTFS permissions for Public and Docs are shown in
    the following table.
    (Exhibit).

    <img src="./70-215/images/Q42.gif">

    A user named Maria is a member of the Users and Training user groups. When
    Maria attempts to save the file \\Server1\Public\Docs\memo.doc, she receives
    the following error message: "Access denied."

    You want Maria to be able to change and delete all files in the Docs folder.
    You do not want her to have more access than necessary.

    What should you do?

    A. Add Maria to the Domain Admins group.
    B. Add Maria to the local Administrators group.
    C. Set the share permissions for the Public folder to grant Maria Full
    Control permission.
    D. Set the share permissions for the Docs folder to grant Maria Change
    permission.
    E. Set the NTFS permissions for the Public folder and its subobjects to
    grant Maria Modify permission.
    F. Set the NTFS permissions for the Docs folder and its subobjects to grant
    Maria Full Control permission.


    Answer: D


    100. You install a new tape drive on your Windows 2000 Server. You reboot,
    log in, and are prompted, "irq1_not_less_or_equal." The Server contains
    important data that must be accessed by users on the network at all times.
    How do you bring the server back online as soon as possible?

    A. Disconnect the tape drive and reboot.
    B. Perform an emergency repair and select "Fast Repair" and reboot.
    C. Boot into Safe Mode. Remove the new driver in Device Manager and reboot.
    D. Restart the computer using Recovery Console. Disable the new driver.
    Restart the computer and disable the new tape device driver.


    Answer: D


    101. Your network uses TCP/IP as the only network protocol. Devices on the
    network are configured to use IP address from the private 10.0.0.0 range.
    All the client computers on the network runs Windows 2000 Professional. The
    network includes Windows 2000 Server computers and UNIX servers.
    User's print jobs are sent to shared printers on a Windows 2000 Server
    computer named PrintServ that directs the print jobs to print devices
    attached directly to the network.

    You have a high-capacity print device that is attached to one of the UNIX
    servers. The UNIX computer uses the LPR printing protocol, and it's IP
    address is 10.1.1.99. The name of the printer queue is GIANT. You want users
    to be able to connect to this printer from their computers.
    What should you do?

    A. Install Microsoft Print Services for Unix on PrintServ. Create a network
    printer on users' computers, and specify that the printer URL is
    LPR://10.1.1.99/GIANT.
    B. Install Microsoft Print Services for Unix on users' Computers. Share this
    printer and connect to it from users' computers.
    C. Create a network printer on PrintServ, and specify that the printer name
    is \\10.1.1.99\GIANT. Share this printer and connect to it from users'
    computers.
    D. Create a local printer on PrintServ. Create a new TCP/IP port for an LPR
    server at address 10.1.1.99 with a queue name of GIANT. Share this printer
    and connect to it from users' computers.


    Answer: D


    102. You are the administrator of a Windows 2000 Server network at Blue Sky
    Airlines. You configure a server named
    print10.marketing.blueskyairlines.local as a print server at the Los Angeles
    site. You create and share a variety of printers on the server for use by
    employees in the marketing.blueskyairlines.local domain.

    You want to review the configured properties of all of the shared printers
    on the print10.marketing.blueskyairlines.local server. You want to perform
    this review from a Windows 2000 Professional computer at the London site of
    Blue Sky Airlines.

    What should you do?

    A. Use your Web browser to connect to
    <http://print10.marketing.blueskyairlines.local/printers>.
    B. Use your Web browser to connect to
    <http://print10.blueskyairlines.local/printers>.
    C. Run the net view \\print10 command.
    D. Run the net view \\print10.blueskyairlines.com command.


    Answer: A


    103. Your network contains Windows 2000 Server computers and NetWare server
    computers. The NetWare client computers on your network use only the IPX/SPX
    transport protocol.
    You install a database server on a Windows 2000 Server computer named
    DB_serv. This server has the NWLink IPX/SPX/NetBIOS compatible transport
    protocol, TCP/IP and the NetBEUI protocol installed. NWLink uses the 802.2
    frame type and a network number of 77. In addition, client for Microsoft
    networks and file and printer sharing for Microsoft networks are installed
    on DB_serv.

    The NetWare client computers that are on the same subnet as DB_serv can
    connect to DB_serv and the database stored on it. However, the NetWare
    client computers that are on the other subnets cannot connect to DB_serv.

    What should you do to allow the NetWare client computers on the other
    subnets to connect to the DB_serv?

    A. Install gateway service for NetWare on DB_serv.
    B. Install the SAP Agent on DB_serv.
    C. Configure the NetWare client computers on the other subnets to use
    NetBEUI.
    D. Configure IPX/SPX on the NetWare client computers on the other subnets to
    use a network number of 77.


    Answer: D


    104. You want to measure physical disk performance on your Windows 2000
    Server. You want to run System monitor locally on the server. You also want
    to ensure that System Monitor has the least impact on other processes
    currently running.

    What can you do? (Choose two)

    A. From a command prompt, run the start/low perfmon command.
    B. From a command prompt, run the start/normal perfmon command.
    C. From a command prompt, run the start /min perfmon command.
    D. Open System Monitor, and then use Task Manager to set the priority of the
    Mmc.exe process to Low.
    E. Open System Monitor, and then use Task Manager to set the priority of the
    Mmc.exe process to normal.


    Answer: A,D


    105. Your Windows 2000 Server computer contains a 14-GB hard disk formatted
    as FAT32. This computer has been operating on your network for several
    months.

    You want to find out whether you need to defragment the disk to improve
    performance.
    What should you do first?

    A. From a command prompt, convert the disk to NTFS and then run the Chkdsk
    command.
    B. From disk management, format the disk as NTFS and then run the Chkdsk
    command.
    C. Use disk Defragmenter to analyze the disk.
    D. Use disk Defragmenter to defragment the disk.


    Answer: C


    106. Your Windows 2000 Server computer has five hard disks. Four 100-GB hard
    disks on the server are configured as a single striped volume. You want to
    reconfigure the four disks so that the volume is fault-tolerant and has as
    much space as possible for data storage. You want to use only the existing
    hardware.

    What should you do?

    A. Convert the disk to a dynamic disk. Shut down and restart the server.
    B. Back up the data on the striped volume and then delete the striped
    volume. Create a RAID-5 volume on the the four disks. Restore data to the
    new RAID-5 volume.
    C. Backup the data on the striped volume and then delete the striped volume.
    Create two mirrored volumes. Shut down and restart the server. Restore the
    data to the new mirrored volumes.
    D. Back up the data on the stripped volume, and then delete the stripped
    volume. Create a spanned volume from the first two disks. Create a second
    spanned volume from the last two disks. Mount the root of the second spanned
    volume in the root of the first spanned volume. Restore the data to the
    first spanned volume.


    Answer: B


    107. You administer a network with NT Server 4.0 computers, NT Workstation
    4.0 computers, and several UNIX computers. The network consists of a single
    Windows NT domain.

    You want to upgrade a Windows NT Server computer named Server1, which is
    currently a BDC, to Windows 2000 Server. Your existing DNS server is a UNIX
    computer that supports SRV (service) records and is configured to accept
    dynamic updates. The existing WINS server is another Windows NT Server
    computer.

    You want to configure Server1 as a domain controller in a new Active
    Directory forest. You want the existing Windows NT domain accounts to be
    upgraded to Active Directory.

    You want to upgrade Server1 with the least impact on the network. What
    should you do?

    A. Promote Server1 to the PDC of the domain. Run Windows 2000 Setup on
    Server1.
    B. Run Windows 2000 Setup on Server1. Configure Server1 as a DNS server and
    WINS server.
    C. Run Windows 2000 Server Setup on Server1 and select the PDC AutoConfigure
    option during Setup.
    D. Set up Server1 as a WINS server. Run Windows 2000 Server Setup on
    Server1.


    Answer: A


    108. You are a member of the Backup Operators group in the arborshoes.com
    domain. You are not a member of any other groups within the domain. You
    install new backup software on a Windows 2000 Server computer. You are
    logged on to a Windows 2000 Server computer named bcksrv3.arborshoes.com.

    You try to configure the software for a tape backup device, but the
    configuration fails during backup. The documentation for the software
    indicates that the current tape backup device driver is out of date.

    What should you do?

    A. Run the RUNAS command to start the Device Manager, using your own
    username and password. Then click the Update Driver command button on the
    driver tab for the tape backup device.
    B. Instruct a domain administrator to run the RUNAS command to start the
    Device Manager, using his own username and password. Then click the Update
    Driver command button on the driver tab for the tape backup device.
    C. Update the device driver by using the Add/Remove Hardware Wizard.
    D. Open Device Manager, and then click the Update Driver command button on
    the driver tab for the tape backup device.


    Answer: B


    109. You are the administrator responsible for testing and deploying new
    service packs for Windows 2000. Your forest has two trees, with four domains
    in each tree, as shown in the exhibit.
    See the exhibit.

    <img src="./70-215/images/Q246.gif">

    For the testing of each service pack, you plan to deploy the service pack to
    the support.IS.contoso.com domain and the support.IS.litware.com domain, but
    to no other domains. You plan to use a Group Policy to configure and
    administer the service pack package.

    You need to minimize the complexity and administration of the service pack
    package, and minimize network traffic between domains.

    You create a Microsoft Windows Installer Package for the service pack. What
    should you do to configure the Group Policy?

    A. Configure the Windows Installer Package in a Group Policy for the
    litware.com and contoso.com domains.
    B. Configure the Windows Installer Package in a Group Policy for the
    support.IS.litware.com and support.IS.contoso.com domains.
    C. Configure two sites, with one tree in each site. Configure the Windows
    Installer Package in a Group Policy for each site.
    D. Configure one site that contains both trees. Configure the Windows
    Installer Package in a Group Policy for the site.


    Answer: B


    110. You are installing Windows 2000 Server on a new computer by using the
    Windows 2000 Server CD-ROM. The computer has three 100 GB physical hard
    disks: Disk0, Disk1, and Disk2. The disks do not have any partitions
    defined.

    You want to use as much space on Disk0 as possible for the partition on
    which Windows 2000 Server is installed. You want as much space as possible
    across all three physical disks to be accessible by using a single drive
    letter in Windows 2000.

    What should you do?

    A. Install Windows 2000 Server on a 4 GB FAT partition on Disk0. After
    Setup, create a 96 GB NTFS partition on Disk0. Create a volume set that
    combines the 96 GB NTFS partition with the two remaining 100 GB disks.
    B. Install Windows 2000 Server on a 4 GB NTFS partition on Disk0. After
    Setup, configure all three disks as dynamic disks. Create a volume set from
    the three 100 GB disks.
    C. Install Windows 2000 Server on a 100 GB NTFS partition on Disk0. After
    Setup, create a volume set that combines the three 100 GB disks.
    D. Install Windows 2000 Server on a 100 GB NTFS partition on Disk0. After
    Setup is complete, create a 100 GB partition on Disk1 and on Disk2. Mount
    the partitions on Disk1 and Disk2 as subdirectories on the 100 GB partition
    on Disk0.


    Answer: D


    111. You are the administrator of a network that consists of five Windows
    2000 Server computers and 200 Windows 2000 Professional computers.
    You want to deploy an update for an application that is used on the Windows
    2000 Professional computers. You want users to automatically install the
    update when they log on to the domain.

    What should you do?

    A. Place the application update in the root folder of a Distributed file
    system (Dfs).
    B. Create a Microsoft Windows installer package for the application update.
    Configure RIS to use the package.
    C. Create a Microsoft Windows Installer package for the application update.
    Apply the package to the Local Computer Policy on all the computers.
    D. Create a Microsoft Windows Installer package for the application update.
    Apply the package to a Group Policy.


    Answer: D


    112. Your network has two domains with approximately 1,000 users in each
    domain. Both domains are Active Directory domains that run in native mode.
    Some of the users have portable computers and access the network by using
    remote access.

    The managers at your company are concerned that remote access might pose a
    security risk. They want to see a list that shows which users are allowed to
    use remote access.

    How should you configure the remote access to display a list of authorized
    users?

    A. Create a group named RAS_USERS. Add users who are permitted to dial in to
    the network. Create a remote access policy that allows only this group to
    use the remote access server. To show who has access to the remote access
    server, display the members of the group.
    B. Create a group named RAS_USERS. Add users who are allowed to dial in to
    the network. Set the remote access permission for this group to allow
    access. To show who has access to the remote access server, display the
    members of the group.
    C. Write a script for the windows scripting host. In the script, iterate
    through the members of the users container. Display the name of any user who
    has the remote access permission set to Allow access.
    D. Use the default remote access policy to view users and groups who have
    been granted remote access permission.


    Answer: A


    113. You are the administrator of a Windows 2000 Active Directory network.
    The network consists of a single domain. The domain includes 20 Windows NT
    workstation 4.0 client computers. All other client computers are Windows
    2000 Professional client computers.

    You create a Windows NT 4.0 default user policy on the Windows 2000 Server
    computer that is configured as the PDC emulator. This default user policy
    denies access to Network Neighborhood.
    You then install terminal services on one of the servers and terminal
    services client on the 20 Windows NT workstation client computers.

    You find that the users of the terminal server can still browse the network
    when they open My Network Places. You want to prevent all default users from
    browsing the network.
    What should you do?

    A. Modify the Windows NT policy template file so that you can restrict
    access to both My Network Places and Network Neighborhood. Save the policy
    file on the Terminal server.
    B. Copy the Windows NT policy file to the 20 Windows NT workstation
    computers.
    C. Create a Windows 2000 Group Policy that denies user access to My network
    places.
    D. Edit the local registry on the Windows NT workstation computers to deny
    access to Entire Network in Network Neighborhood.


    Answer: C


    114. You are the administrator of the A. Datum Corporation network shown in
    the exhibit.

    <img src="./70-215/images/Q114.gif">
    <img src="./70-215/images/Q114a.gif">

    You want to use a Virtual Private Network (VPN) so that 100 users in the
    Phoenix office can access resources in the Portland office.

    How should you configure the VPN server in the Portland office? (See Select
    and Place exhibit).

    A. Start IP address: 10.3.0.1 End IP address: 10.3.0.100
    B. Start IP address: 10.4.0.1 End IP address: 10.4.0.100


    Answer: A


    115. Your company has a Routing and Remote Access server at its main office.
    One of the branch offices also runs Routing and Remote Access on a server
    that has one modem. This server is configured to use demand-dial routing to
    connect to the main office. This server is part of the company's Active
    Directory domain, which runs in native mode.

    Some employees at the branch office use the branch office server to access
    their files from home. The manager of the branch office reports that
    sometimes none of the users in the office can connect to the main office.
    When you examine the event log, you find that users have been connecting to
    the server during working hours.

    The manager wants users to be able to dial in to the server only between
    6:00 p.m and 8:00 a.m. However, the manager still wants users to be able to
    log on at any time when connected directly to the LAN.

    What should you do to limit only dial-in access to these times?

    A. Change the logon hours for user accounts to deny logons between 8:00 AM
    and 6:00 PM.
    B. Set the remote access policy to deny connections between 8:00 AM and 6:00
    PM.
    C. Create one batch file to start remote access connection manager service,
    and create another batch file to stop it. Schedule the stop batch file to
    run at 8:00a.m every day and start batch file to run at 6:00p.m every day.
    D. Create two user accounts, for each user. Grant dial-in permissions to one
    account, and deny dial-in permissions to the second account. Change the
    logon hours for the dial-in accounts to deny logon between 8:00a.m to
    6:00p.m.


    Answer: B


    116. Your network includes Windows 2000 Professional client computers,
    Windows NT Workstation 4.0 client computers, Windows 95 client computers and
    UNIX client computers. Users of the Windows operating systems sent print
    jobs to shared printers on a Windows 2000 Server computer named PrintServ.
    The UNIX client computers support the LPR printing protocol.


    You want to make the shared printers on PrintServ available to the UNIX
    computers.
    What should you do?

    A. Configure each of the printers to use an LPR port.
    B. Install Microsoft print services for Unix on PrintServ.
    C. Configure each of the printers to support TCP/IP printing.
    D. Use the SRVANY utility from the Windows NT Resource Kit to run the LPR
    program as a service.


    Answer: B


    117. You administer a Windows 2000 Server network consisting of 500 Windows
    2000 Professional computers and 50 Windows 2000 Servers. You configure two
    domains- litware.local and dev.litware.local. You enable auditing in the
    domain policy object for litware.local to audit the success and failure of
    object access.

    You install a printer on a domain controller named dc7.dev.litware.local.
    You configure auditing on this printer to observe successful and failed
    attempts to print by the Research universal group. You view the security log
    for dc7.dev.litware.local one week later and find that no events have been
    written to the log. You know users in the Research universal group have used
    the printer repeatedly. What should be done to fix the problem?

    A. Enable auditing in the domain policy objects of dev.litware.local to
    audit the success and failure of object access.
    B. Audit the domain policy object for litware.local to enable auditing of
    the success and failure of directory service access.
    C. Configure auditing of the success and failure of object access in the
    default domain controller policy object on the domain controller
    organizational unit (OU) of the dev.litware.local domain.
    D. Configure auditing of the success and failure of object access in the
    default domain controller policy object on the domain controller
    organizational unit (OU) of the litware.local domain.


    Answer: A


    118. Litware Inc., has two offices named East and West. The Windows 2000
    Server computer named east.litware.com is a domain controller in the East
    office, and the Windows 2000 Server computer named west.litware.com is a
    domain controller in the west office. Both offices create tape backups of
    server applications, data and System State data. The tapes are stored in the
    East office.

    You need to restore the System State data to west.litware.com.

    What should you do?

    A. Run windows backup on east.litware.com, and restore the System State data
    to the systemroot folder on the west.litware.com.
    B. Restart east.litware.com in directory services restore mode. Run windows
    backup on east.litware.com, and restore the System State data to the
    systemroot folder on west.litware.com.
    C. Restart east.litware.com and west.litware.com in directory services
    restore mode. Run windows backup on east.litware.com, and restore the System
    State data to the systemroot folder on west.Litware.com.
    D. Ship the west.litware.com backup tapes to the west office. Run windows
    backup on west.litware.com, and restore the System State data to the
    systemroot folder.


    Answer: D


    119. Your network contains Windows 2000 Professional client computers that
    use TCP/IP as the only network protocol. The network also contains Windows
    3.1 computers that use the NetBEUI protocol.

    You install a new Windows 2000 Server computer on the network. You configure
    this server to use NetBEUI and TCP/IP. All of the Windows 2000 Professional
    client computers and Windows 3.1 computers are able to access the server.

    When you browse network resources on the server, you notice a delay before a
    list of servers is returned.
    What should you do to remove this delay?

    A. In the Advanced settings for the network adapter, disable NetBEUI from
    Client for Microsoft networks.
    B. In the Advanced settings for the network adapter, disable NetBEUI from
    file and printer sharing for Microsoft network.
    C. In the properties of the network adapter, disable Client for Microsoft
    Networks.
    D. In the Advanced settings for TCP/IP, enable NetBIOS over TCP/IP.


    Answer: D


    120. You administer a Windows 2000 Server that hosts an important network
    share named REPORTS on an NTFS partition. The permissions for REPORTS are as
    follows:

    Type of Permission Account Permission
    Share Users Change
    NTFS Users Full Control

    The CEO of your company has called to request that particular files in the
    REPORTS folder be prevented from being modified immediately. Many of the
    files are currently in use. What two actions should you take to fulfill this
    request?

    A. Disconnect users from the REPORTS folder.
    B. Modify the NTFS permissions of the REPORTS folder.
    C. Modify share permissions of the REPORTS folder.
    D. Disconnect users from the network.
    E. Modify NTFS permissions for the ten files.


    Answer: A,E


    121. You are installing Windows 2000 Server on a new computer that has a
    single 10-GB SCSI disk. The disk controller is not included on the current
    Hardware Compatibility List (HCL). You start the computer by using the
    Windows 2000 Server CD-ROM.

    When the computer restarts at the end of the text mode portion of Windows
    2000 setup, you receive the following STOP error:
    "INACCESSIBLE_BOOT_DEVICE."

    Which two actions should you take to eliminate the STOP error? (Choose Two)

    A. Restart the Windows 2000 Setup by using the Windows 2000 Server CD-ROM.
    B. Select Safe Mode from the Windows 2000 boot menu.
    C. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
    D. Install a driver for the SCSI controller from a floppy disk.
    E. Use Device Manager to update the driver for the SCSI controller.


    Answer: A,D


    122. The network you administer has two organizational units named North
    America and South America. Within each OU are subordinate OU's named
    Marketing, Graphics, and Sales. You suspect someone is trying to log into
    your domain by guessing account names and passwords. How can you configure
    your network so that you can detect which computer is being used for these
    log on attempts?

    A. Edit the default domain controller policy object to audit account logon
    failures.
    B. Edit the default domain controller policy object to audit resource access
    failures.
    C. Edit the North and South America OU group policy objects to audit log on
    failures.
    D. Edit the GPO of each subordinate OU to audit resource access failures.


    Answer: A


    123. Your Windows 2000 Server computer has two disks attached to an EIDE
    disk controller. You need additional disk space. You add a new SCSI disk
    controller that has six new disks attached. The new controller is not
    included on the Hardware Compatibility List (HCL). When you restart the
    computer, Windows 2000 does not detect the new controller.

    What can you do to install the new controller? (Choose two).

    A. Use Device Manager to turn off IRQ steering in the properties of the
    standard PC. Then restart the computer.
    B. Use Disk Management to restore the basic configuration. Then restart the
    computer.
    C. Use the Add/Remove Hardware wizard to add a new SCSI and RAID controller
    from the disk supplied by the manufacturer.
    D. Use Disk Management to rescan the disk.
    E. Use the manufacturer's setup program to install the driver for the SCSI
    disk controller.


    Answer: C,E


    124. You administer a large network consisting of 6 domain controllers, 4
    member servers, and 500 clients. All computers are using Windows 2000 Server
    or Windows 2000 Professional. TCP/IP is the only protocol in use. You want
    to configure the network so that all computers can resolve the addresses of
    all other computers using DNS. There must be redundancy built into the
    system, in case the primary name server fails. How should you implement DNS
    on your network?

    A. Configure one server with a standard primary zone for the domain and
    configure at least one server with a standard secondary zone.
    B. Configure one server responsible for an Active Directory integrated
    primary zone; configure at least one server responsible for a standard
    secondary zone.
    C. Configure one server with a standard primary zone for the domain and
    configure at least one server responsible for an Active Directory integrated
    primary zone.
    D. Configure at least two servers responsible for the Active Directory
    integrated primary zone of the domain.


    Answer: D


    125. Your company's network includes Windows 3.1 client computers, Windows
    95 client computers, and Windows 2000 Professional client computers. The
    company's manufacturing facilities run 24 hours per day.

    The company has developed its own 32-bit application that collects
    information from the manufacturing process so that workers on one shift can
    find out what was manufactured during the previous shift. The company wants
    to make the application available on all of the client computers by using
    Terminal Service on a Windows 2000 Server computer. This server will not run
    as a domain controller.
    You install Terminal Services.

    Users want to collect information on the manufacturing process from other
    shifts. The company wants users to shut down their computers at the end of
    their shifts, and to leave the application running on the Terminal Server.

    What should you do?

    A. Set the Delete Temporary Folders On Exit setting for the Terminal server
    to NO.
    B. Set the Remote Desktop Protocol (RDP) on the server to override user
    settings, and set the End Disconnected Sessions setting to Never.
    C. At the Terminal server, grant the users the right to log on as a batch
    job.
    D. Do nothing. User programs are always terminated on disconnection.


    Answer: B


    126. You are configuring Internet access for a remote site of your company.
    The remote site has 12 computers on a private network with a 56Kbps
    connection to the Internet. Network address translation (NAT) and the AT
    feature of routing and remote access will be used. You test the
    configuration and find that web sites can only be reached by their IP
    address and not their fully qualified domain name. What must you do to fix
    this problem? (Choose two)

    A. Configure each of the computers in the remote site with the address of a
    WINS server.
    B. Configure each of the computers in the remote site with the address of a
    DNS server on the Internet.
    C. Configure a filter on the NAT Server to pass DNS packets.
    D. Create a host file on each of the NAT Servers.


    Answer: B,C


    127. Your company recently hired you to administer its Windows 2000 network.
    The network includes 100 Windows 2000 Server computers. These servers are
    members of a Windows 2000 domain and are contained in an OU named servers.

    You discover that each Windows 2000 Server computer has local security
    auditing enabled and that each server is configured to audit different
    events.

    You want to standardize the events that are audited on the servers. You also
    want to ensure that auditing remains standardized even if the audit policy
    changes.

    What should you do?

    A. Configure a local auditing policy on each domain controller.
    B. Configure each server to implement a standardized auditing policy.
    C. Configure the standardized auditing policy on all domain controllers in
    the domain.
    D. Configure a local group policy object on each server in the servers OU.
    E. Configure a group policy object, and apply it to the servers OU.


    Answer: E


    128. Your Windows 2000 Server network is a routed network that uses TCP/IP
    as the only network protocol. All of the Windows 2000 Professional computers
    and Windows NT Workstation 4.0 computers are members of the single domain.

    You install Gateway Service for Netware on a Windows 2000 Server computer.
    You install a second network adapter on the gateway server. The network is
    now configured as shown in the exhibit.
    See the exhibit.

    <img src="./70-215/images/Q128.gif">

    You want to configure Adapter #1 for communications to and from the
    Windows-based client computers exclusively. Which checkbox or boxes in the
    Local Area Connection Properties dialog box should you select?
    Choose all that apply.

    A. Gateway (and client) Services for Netware.
    B. Client for Microsoft Networks.
    C. File and Printer Sharing for Microsoft Networks.
    D. NWLink NetBIOS.
    E. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.
    F. Internet Protocol (TCP/IP)


    Answer: B,C,F


    129. You want to delegate the backup and restore responsibilities of all
    servers to a new employee named Richard. Richard must not be able to shut
    down any servers or uninstall any driver files.

    You need to apply the appropriate permissions for Richard.

    What should you do?

    A. Make Richard a member of the domain admins group.
    B. Make Richard a member of the server operations group.
    C. Make Richard a member of the backup operators group.
    D. Grant Richard the user rights to backup and restore files on all
    computers in the domain.
    E. Grant Richard read only permission to the volumes from which he needs to
    back up and restore files.


    Answer: D


    130. Your network uses the private IP address 192.168.0.0. You connect via
    dialup to a Windows 2000 Server that is configured as a remote access
    server. You connect successfully, but receive the error "Request timed out"
    when trying to run any IP applications. You check to see if you have been
    assigned an IP address, and IPCONFIG indicates that your IP address is
    125.22.67.100. What should be done to resolve the problem?

    A. Configure the remote access server with the address of a DHCP server.
    B. Have the remote access server synchronize itself with all domain
    controllers on the network.
    C. Configure the remote access server to be a DHCP relay agent.
    D. Ensure that the remote access server is able to connect to DHCP and that
    the DHCP has the remote access server's subnet within its scope.


    Answer: D


    131. You are the network administrator for Island Hopper News. The main
    office has a Windows 2000 workgroup that includes five Windows 2000 Server
    computers and 10 Windows 2000 Professional computers. Currently, no users at
    the main office have internet access.
    Island hopper news also has two remote offices, each with a Windows 2000
    workgroup. None of these offices are networked to another. However, users at
    the remote office connect to main office individually to access network
    resources.

    A server named member2 is located at the main office. Member 2 has two
    network adapters, which are designated adapter1 and adapter2. adapter1 is
    connected to the LAN, and adapter2 is connected to a DSL modem that is
    connected to the internet.
    To provide users at the main office with internet access, you enable
    internet connection sharing on member 2.
    Now, some users in the remote office report that they can no longer access
    local network resources. In addition, users at the main office are still
    unable to access the internet.

    You need to ensure that local network resources are always accessible, and
    you need to ensure that users at the main office have internet access. What
    should you do?

    A. Configure internet connection sharing to be enabled on adapter 1.
    B. Configure internet connection sharing to be enabled on adapter 2.
    C. Configure network address translation on member 2.
    D. Install a proxy server on the company's network.


    Answer: C


    132. You are the administrator of a Windows 2000 Server network. Users
    report that they are unable to access shared folders on one of your servers.

    You open My computer on the server and do not find the volumes on dynamic
    Disk 3 that contain the shared folders. When you open Disk Management, you
    see that Disk 3 is offline.
    You confirm that the disk has power and it is attached to your SCSI adapter.
    Other disks connected to the adapter appear to be functioning normally.

    You want to use Disk Management to resolve the problem. What should you do
    next?

    A. Rescan the disks on the server.
    B. Reactivate disk 3.
    C. Remove disk 3 by using disk administration, and restart the computer.
    D. Convert disk 3 to a basic disk, and then convert it back to a dynamic
    disk.


    Answer: B


    133. You use computers in two different offices. Your home folder is stored
    on a server named UserData01.

    You work with many files that are highly confidential. You keep the
    confidential files in a folder named Private in your home folder. You need
    to maximize the security of the private folder. You also want to be able to
    access the folder from the computers in each office.

    What should you do?

    A. Obtain a signing and sealing certificate from a certificate server, and
    install the certificate on the computers you use.
    B. Login in at UserData01as a domain administrator, connect to your home
    folder and set the encryption attribute.
    C. Configure your account to have roaming user profile. Use the properties
    of the private folder to set the encryption attribute.
    D. Add the cipher/e/s *.* command to your computer's startup script.


    Answer: C


    134. Your network includes Windows 98 computers and Windows 2000 Server
    computers. You are adding a new computer to the network. You plan to install
    Windows 2000 Server on the new computer. The computer has one 20 GB hard
    disk with no partition defined.

    The Windows 2000 Server CD ROM is unavailable. You want to install Windows
    2000 server from the source files that are located on a server on the
    network. You also want the entire hard disk of the new computer to be used
    for the system partition.

    What should you do?

    A. On another Windows 2000 computer use makebt32.exe to create installation
    startup disks. Start the computer by using the first disk.
    B. On another Windows 2000 computer format a floppy disk. Copy NTLDR,
    boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by
    using the disk.
    C. Start the new computer by using the Windows 98 network boot disk. Connect
    to the server. Run dsclient.exe. Create and format 20GB FAT32 partition.
    D. Start the new computer by using the Windows 98 network boot disk. Create
    and format a single FAT32 partition. Connect to network server. Run
    winnt.exe.
    E. Start the computer by using Windows 98 network boot disk. Create and
    format a single Fat 32 partition. Start the new computer by using the
    Windows 2000 emergency repair disk.


    Answer: D


    135. Your Windows 2000 Server computer contains a stripe set with parity on
    a four-disk array. You convert the stripe set with parity to a dynamic
    RAID-5 volume.

    Six months later, users report that disk access on the server is slower than
    it had been on the previous day. You use Disk Management and discover that
    the status of the third disk in the array is Missing.

    You want to recover the failed RAID-5 volume.
    What should you do first?

    A. Replace the third disk and restart the server. Use disk Management to
    repair the volume.
    B. Ensure that the third disk is attached to the server and has power. Use
    Disk Management to reactivate the disk.
    C. Ensure that the third disk is attached to the server and has power. Use
    Disk Management to repair the volume.
    D. Install a new disk and create a single extended partition on the new
    disk. Restart the computer and allow Windows 2000 to automatically repair
    the volume on the extended partition.


    Answer: B


    136. You configure a new Group Policy Object for your company's Marketing
    organizational unit (OU)to prevent users from accessing My Network Places
    and from running System in Control Panel. You want the Managers Domain Local
    group to have access to My Network Places, but you still want to prevent
    them from running System in Control Panel.

    What should you do?

    A. Add the managers group to the access control list of the GPO. Disable the
    permission of the managers group to read and apply the group policy.
    B. Add the managers group to the access control list of the GPO. Deny
    permission to the managers group to read and apply the group policy.
    C. Create a second GPO in the OU. Add the managers group to the access
    control list. Allow the managers group to apply the group policy. Deny the
    authenticated user group to read and apply the group policy. Configure the
    new GPO to deny the ability to run System in Control Panel. Give the new GPO
    a higher priority than the original GPO.
    D. Create a second GPO in the OU. Add the managers group to the access
    control list. Allow the managers group to apply the group policy. Disable
    the permission of the authenticated user group to read and apply the group
    policy. Configure the new GPO to allow access to My Network Places. Give the
    new GPO a higher priority than the original GPO.


    Answer: D


    137. You are the administrator of the contoso.local domain. You organize the
    domain into organization units (OUs) as shown in the exhibit.

    <img src="./70-215/images/Q23.gif">

    You configure the Local Security Options and other setting for the Default
    Domain Policy object. You enable a local security option policy to display a
    logon message each time a user attempts to log on.
    Suzan Fine, the administrator of the Florida OU, wants to configure a
    different logon message for the Orlando OU without changing the other Local
    Security Options.

    What should Suzan do?

    A. Create a new Group Policy object (GPO) in the Orlando OU with the
    appropriate logon message. Block policy inheritance for the new GPO.
    B. Create a new Group Policy object (GPO) in the Florida OU with the
    appropriate logon message. Set the option not to override for the new GPO.
    C. Create a new Group Policy object (GPO) in the Orlando OU with the
    appropriate logon message. Enable policy inheritance for the new GPO.
    D. Create two new Group Policy objects (GPOs) in the Miami and Orlando OUs.
    Configure the GPO for the Orlando OU with the appropriate logon message for
    the Orlando OU. Place the GPO for the Orlando OU at the top of the priority
    list.


    Answer: C


    138. You share a folder on a Windows 2000 Server computer for users in your
    company's London office. You place several subfolders (Marketing, Sales,
    Research and Marketing-2) in the London folder.

    The Marketing-2 folder is compressed. You want to delete Marketing-2, but
    you want to keep all the files that are currently in the folder. You plan to
    copy all the files in Marketing-2 into the Marketing folder before deleting
    Marketing-2. You want these files to remain compressed. However, you do not
    want to compress any existing files in Marketing or compress any other new
    files added to Marketing.

    What should you do before you delete Marketing-2?

    A. Copy all the files from Marketing-2 to Marketing.
    B. Move all the files from Marketing-2 to Marketing.
    C. Compress Marketing and then copy all the files from Marketing-2 to
    Marketing.
    D. Compress Marketing and then move all the files from Marketing-2 to
    Marketing.


    Answer: B


    139. You are the network administrator for your company. As part of your
    disaster recovery plan, you create an emergency repair disk for each
    computer on your network. You also perform full daily backups.

    You install a custom application on a server named member1. You restart
    member 1 and receive the following error message "Invalid Boot.ini file".

    What should you do to restore the boot.ini file?

    A. Reboot member 1 by using the Windows 2000 Server CD. Launch Recovery
    Console. Run the fixboot command with the appropriate parameters.
    B. Reboot member 1 by using the Windows 2000 Server CD. Launch Recovery
    Console. Run the fixmbr command with the appropriate parameters.
    C. Restart member 1 into safe mode. Launch Windows 2000 backup.
    D. Restart member 1 into safe mode. Run the Chkdsk command with the
    appropriate parameters.
    E. Reboot member 1 by using the Windows 2000 Server CD. Launch Recovery
    Console. Run the copy command with the appropriate parameters.


    Answer: E


    140. You are the administrator of a windows 2000 Active Directory network.
    The network consists of a single domain named adatum.local that runs in
    native mode. The domain includes 500 member client computers, consisting of
    200 Windows 2000 Professional computers and 300 Windows NT workstation 4.0
    computers.
    You create a group policy for the Research organizational unit (OU) and
    configure the policy as shown in the exhibit.

    <img src="./70-215/images/Q140.gif">

    None of the users in the Research OU who are working at Windows 2000
    Professional computers can change the wallpaper on their desktop or the
    resolution and color depth of their displays. However, when users log on
    from any of the Windows NT Workstation computers in the OU, they can change
    all the display settings.

    You want to restrict all users of Windows NT Workstation computers in the OU
    from changing their desktop wallpaper and from accessing the Settings tab in
    display in control panel.
    What should you do?

    A. Add a new computer to the OU and select the Allow pre-windows 2000
    computers to use this account check box.
    B. Change the group policy so that it also hides the Background tab.
    C. Create a separate group policy for a nested OU that contains all window
    NT computers.
    D. Configure a Windows NT policy file and place it in the
    Winnt\Sysvol\Adatum.local\scripts folder on the PDC emulator.


    Answer: D


    141. You are the administrator of a Windows 2000 network. You upgrade 50
    Windows NT Server 4.0 computers to Windows 2000 and place them in a single
    domain. The domain includes 200 Windows 2000 Professional computers and 100
    Windows NT Workstation 4.0 computers.

    You implement Group Policy objects (GPOs) for each Organizational Unit (OU).
    However, you find that these GPOs apply only to users of the Windows 2000
    Professional computers.

    You want to restrict users of Windows NT Workstation computers from
    accessing registry editing tools.
    What should you do?

    A. Create an OU that contains all NT users and computers. Create a GPO in
    the OU that restricts users from accessing registry editing tools.
    B. Create a Windows NT system policy file on the primary domain controller.
    Configure the policy so that it restricts default users from accessing
    registry editing tools.
    C. Create a mandatory user profile for NT users that removes shortcuts to
    registry editing tools from all NT users' desktops.
    D. Install SMS. Run a batch delete job of all occurrences of registry
    editing applications on all NT Workstations.


    Answer: B


    142. Your network uses TCP/IP as the only network protocol. You configure a
    remote access server on this network.

    Some users report that when they connect to the server they receive the
    following message: " IPX/SPX compatible CP reported error 733-The PPP
    control network protocol for the network is not available".
    If the users allow the connection to continue they are able to connect to
    services that use TCP/IP.

    You want to prevent this message from being displayed. What should you do?

    A. Configure the client computers to use only TCP/IP for the connection to
    the remote access server.
    B. Configure the client computers to use a defined IPX network address for
    the connection to the remote access server.
    C. Configure the remote access server to allow IPX based remote access and
    demand-dial connections.
    D. Configure the remote access server to disable Multilink connections.


    Answer: A


    143. You install a new computer named Srv34.millertextiles.com on your
    Windows 2000 network. Part of the network is shown in the exhibit.
    See th Exhibit.

    <img src="./70-215/images/Q41.gif">

    When you complete the installation of Srv34.millertextiles.com, you find
    that you cannot connect to Srv22.admin.millertextiles.com. You examine the
    TCP/IP configuration on Srv34.millertextiles.com and find no default gateway
    address.

    You want to connect from Srv34.millertextiles.com to
    Srv22.admin.millertextiles.com. Which default gateway address should you
    use?

    A. 192.168.1.100
    B. 192.168.2.100
    C. 192.168.3.110
    D. 192.168.4.100


    Answer: A


    144. You administer two Windows 2000 Servers, Server1 and Server2. Sever1
    has a spanned volume that consists of areas on three physical hard disks.
    The three disks support hot swapping, and three hot swappable disk bays are
    available on Server2. The drive letter that the spanned volume on Server1
    uses, is not currently in use on Server2.

    You want to move the three disks to Server2. You want the spanned volume to
    use the same drive letter on Server 2 that it originally used on Server1.
    You want to minimize the impact of your actions on the availability and
    performance of the two servers.

    You back up the spanned volume. What should you do next?

    A. Move the disks from Server1 to Server2. On Server1, rescan the disks. On
    Server2, rescan the disks.
    B. Shut down both servers. Move the disks from Server1 to Server2. Restart
    both computers. Rescan the disks on Server2.
    C. Shut down Sever1. Move the disks from Server1 to Server2. Restart
    Server1. On Server2, restore the spanned volume by using Windows Backup.
    D. Move the disks from Server1 to Server2. On Server2, create a new spanned
    volume and format the volume. Restore the spanned volume by using Windows
    Backup.


    Answer: D


    145. You are a member of the domain backup operators group in a remote
    office for a large company. You are responsible for manufacturing the system
    state of a new Windows 2000 member server named members.
    You installed Recovery Console onto the hard disk of member1. You use
    Windows 2000 backup to create a backup of the System State data. You store
    the backup files on the hard disk in a folder named systemstate.

    A member in the domain admins group changes the name of member 1 to CR45uu
    in order to adhere to a new naming standard.
    One of the applications on CR45uu no longer functions after the name change.
    You use the restore wizard to restore System State data. Then you restart
    the server but you cannot log on to the server afterward.

    You need to be able to log on to the server. What should you do?

    A. Log on to the server by using the local administrator account.
    B. Log on to the server by using a domain administrator account.
    C. Use Recovery Console to restore the System State data.
    D. Use Recovery Console to perform a full restore from a recent backup.


    Answer: A


    146. You are the administrator of your company's network. The company adds a
    new application to the network. This application reads and writes large
    image files to a server. Approximately 100 users use the application.

    When all 100 users use the application simultaneously, the application has a
    slower response time.
    More than 10,000 users are in the domain where the imaging server resides,
    but no other users are reporting network response problems.
    You need to find out the cause of the problem.
    What should you do in the System Monitor?

    A. Log the Processor Queue Length counter for the System object.
    B. Log the Avg. Disk Queue Length counter for the PhysicalDisk object.
    C. Chart the Demand Zero Fault/sec counter for the Memory Object.
    D. Chart the Pages/sec counter for the Memory object.


    Answer: B


    147. You are the administrator of a Windows 2000 Server network. You install
    COM + applications on two of your servers. You want to ensure that the
    component services class registration database is included in your normal
    system backups on these servers.

    What should you back up?

    A. The Winnt\Registration folder.
    B. The Winnt\System32\Com folders.
    C. At least one file from each boot volume.
    D. The System State data.


    Answer: D


    148. You are the administrator of a Windows 2000 domain that has three
    domain controllers. Each day, you use Windows Backup to perform full backups
    of each domain controller.

    You run a script to make changes to account information in Active Directory.
    As a result of errors in the script, the incorrect user accounts are
    modified. Active Directory replication then replicates the changes to the
    other two domain controllers.

    You want to revert Active Directory to the version that was backed up the
    previous day.
    What should you do?

    A. On a single domain controller, use Windows Backup to restore the System
    State data. Shut down and restart the computer.
    B. Shut down and restart a single domain controller in directory services
    restore mode. Use Windows Backup to restore the System State data. Run the
    Ntdsutil utility. Restart the computer.
    C. Shut down and restart a single domain controller by using the Recovery
    Console. Use Windows Backup to restore the System State data. Exit the
    Recovery Console. Restart the computer.
    D. Shut down and restart each domain controller by using the Recovery
    Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery
    Console. Restart the computer.


    Answer: B


    149. Your network contains Windows 2000 Professional client computers that
    use TCP/IP as the only network protocol. The network also contains Windows
    3.1 computers that use the NetBEUI protocol.
    You install a new Windows 2000 Server computer on the network. You configure
    this server to use NetBEUI and TCP/IP. The Windows 3.1 computers can connect
    to the new server and use resources located on it. However the Windows 2000
    Professional client computers cannot access the new server.

    When you run the ipconfig command on the new server, it returns the
    information shown in the exhibit.

    <img src="./70-215/images/Q149.gif">

    You want to allow the Windows 2000 Professional client computers to connect
    to the servers. What should you do?

    A. Ensure that the server is configured to connect to a Dynamic DNS server
    that is authoritative for the domain.
    B. Ensure that the server is able to communicate with a DHCP server that has
    valid addresses for the network.
    C. Ensure that NetBIOS over TCP/IP in enabled in the Advanced settings for
    TCP/IP.
    D. Ensure that a valid WINS address is configured in the Advanced settings
    for TCP/IP.


    Answer: B


    150. You are installing Windows 2000 Server on a new computer that has a
    hardware-based RAID array, a floppy disk drive, and a CD-ROM drive. The disk
    controller for the RAID array is not included on the current hardware
    compatibility list (HCL). You run Windows 2000 Setup by starting the
    computer from the Windows 2000 Server CD-ROM.

    When the computer restarts at the end of the text mode portion of Windows
    2000 Setup, you receive the following STOP error: "INACCESSABLE_BOOT_DEVICE
    ".

    Which two actions should you take to eliminate the STOP error? (Choose Two)

    A. Modify the Boot.ini file.
    B. Restart Windows 2000 Setup from the CD-ROM.
    C. Select safe mode from the Windows 2000 boot menu.
    D. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
    E. Install a driver for the RAID controller form a floppy disk.
    F. Use device manager to update the driver for the RAID controller.


    Answer: B,E


    151. You administer a Windows 2000 Server with two 14 GB hard disks. The
    first is formatted using FAT 32. The second is formatted using NTFS. You
    create a shared folder on both disks.

    To conserve disk space, you compress the shared folder on disk two. When you
    move files from the shared folder on disk two to the first disk, the files
    lose their compression attributes.

    How do you ensure that compression is maintained when transferring files
    from the second disk to shared folders on the first disk? (Choose two)

    A. Format the first disk as NTFS.
    B. Convert the first disk to NTFS.
    C. Convert both disks to be dynamic disks.
    D. Convert the first disk to a dynamic disk.
    E. Compress the shared folders on the first disk.


    Answer: B,E


    152. You have installed routing and remote access for Windows 2000 on a
    server named Srv004. Your internal DNS, WINS, and DHCP services are running
    properly in the environment. You want this server to provide internet access
    for users on that network segment by using network address translation over
    a demand dial interface to your internet service provider.

    You have installed the NAT protocol and configured the correct public and
    private interfaces. All client computers have their default gateway set to
    the private address of Srv004, and can successfully ping the gateway. Users
    can connect to internal network computers correctly, but network traffic
    does not reach the ISP.

    You need to ensure that all users can access the internet. What should you
    do?

    A. Configure the DNS as a forwarder to your ISP's DNS.
    B. Configure your ISP's DNS as a secondary to your DNS.
    C. Install the RIP version 2 protocol in routing and remote access for
    Windows 2000 on Srv004.
    D. Add a static route of 0.0.0.0.0.0.0.0 in routing and remote access for
    Windows 2000 on Srv004.
    E. Add a static route of 0.0.0.0.0.0.0.0 by using the route-p add command
    Srv004.


    Answer: A


    153. You Windows 2000 Server computer contains four hard disks of different
    sizes. Each hard disk is configured as a basic disk and has a single 5-GB
    partition. All four disks have the amount of unpartitioned space shown in
    the following table:

    Disk Unpartitioned Space
    Disk 0 3-GB
    Disk 1 4-GB
    Disk 2 3-GB
    Disk 3 8-GB

    On each hard disk, you create a second partition that uses the remaining
    unpartitioned space on the disk. You create an 18-GB stripe volume that
    includes all four of the new partitions.
    Six months later, disk 1 fails. You replace it with a new hard disk, and
    create the necessary partitions.

    As quickly as possible, you need to retrieve the data that was contained on
    disk 1. What should you do?

    A. Restore the first partition on disk 1 from the most recent tape backup.
    Use disk management to repair and rebuild the stripe volume.
    B. Delete and re-create the stripe volume. Restore the contents of disk 1
    from the most recent tape backup.
    C. Restore both partitions on disk1 from the most recent tape backup.
    D. Delete and re-create the stripe volume. Restore the first partition on
    disk 1 and then stripe volume from a recent tape backup.


    Answer: D


    154. You install and run a third-party 32-bit application named Application
    on your Windows 2000 Server computer. After several days. the application
    stops responding. You open Task Manager and find that the CPU usage is at
    100 percent. The normal range of CPU usage on the server is from 20 percent
    to 30 percent.

    You end the application. However, you see that the CPU on the server is
    still at 100 percent. Task Manager shows no other applications running. You
    then examine the Processes page in Task Manager and confirm that the
    Application.exe process is no longer running.

    You want to return the CPU usage to its normal range. What should you do?

    A. Use Computer Management to stop and restart the Server service.
    B. Use Computer Management to stop and restart the Workstation service.
    C. Use Task Manager to end any related child processes.
    D. Use Task Manager to end and automatically restart the Explorer.exe
    process.


    Answer: C


    155. You are the network administrator at Humongous Insurance, a major
    insurance company that has 1,000 offices worldwide. You are configuring the
    network, so that only the sales staff can connect to it from home.

    Your Windows 2000 forest contains a member server named server 1 that has
    routing and remote access for Windows 2000 enabled. You configure server 1
    to use a modem bank to accept incoming dial-up attempts. You configure
    server 1 to use Windows authentication as the authentication provider. The
    only supported authentication method is MS-CHAP version 2.

    You need to restrict access to server 1. What should you do?

    A. Create an OU named sales_staff with the sales staff user accounts.
    Provide access to this OU try using the client-friendly-name attribute of
    the default remote access policy.
    B. Create an OU named sales_staff; populate sales_staff with the sales staff
    user accounts. Provide access to this OU by using the Windows-Groups
    attribute of the default remote access policy.
    C. Create a new remote access policy. Add the everyone group to this policy
    by using the Windows-groups attribute in the properties of each sales staff
    user account, control dial-in access through remote policy.
    D. Create a Windows 2000 global group with the sales staff user accounts.
    Provide access to the global group by using the Windows-group attribute of
    the default remote access policy.


    Answer: D


    156. Some applications on your company network use defined domain user
    accounts as their service accounts. Each computer that runs one of theses
    applications should have the respective service account in the local
    administrators group.

    Currently, you individually place these service accounts in the local
    administrators group on the appropriate Windows 2000 Professional computers.

    You need to centralize this process. What should you do?

    A. Add the applications service accounts to the domain admins group.
    B. Add the applications service accounts to the local administrator group.
    Use the restricted group option in each computers local group policy.
    C. Add the applications service accounts to the local administrators group
    by using the restricted groups option in an OU group policy.
    D. Add the applications service accounts to the local administrators group
    by using the restricted groups option in a domain group policy.


    Answer: D


    157. Your company network includes a Windows 2000 application server named
    App1. App1 runs many different production applications. All applications
    currently start automatically when you start the server. One of these
    applications is a critical, custom accounting application. This application
    runs as a single service named finance.

    You discover that finance has a programming defect that causes App1 to
    become unstable. You need to troubleshoot this programming defect. Until the
    defect is repaired, you need to ensure that finance does not interface with
    the other applications on the server.

    What must you do?

    A. Use task manager to set the priority of finance to BelowNormal.
    B. Use Task Manager to set the priority of Finance to Low.
    C. Create a batch file to be launched upon restart that pauses the Finance
    service.
    D. Use the services console to change the startup type for Finance to
    manual.


    Answer: D


    158. Your network contains NetWare 4.0 Servers. You have successfully
    installed Client Service for NetWare on Windows 2000 Professional computers,
    and Gateway Service for NetWare on Windows 2000 Server Computers.

    You recently added a new Windows 2000 Server computer to the network and
    installed Gateway Service for NetWare on it. However, the server is unable
    to connect to any NetWare servers.

    What should you do on the new Windows 2000 Server computer to resolve this
    problem?

    A. Enable NWLink NetBIOS.
    B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use
    the correct Ethernet frame type.
    C. Install RIP routing for IPX.
    D. Install the SAP Agent.


    Answer: B


    159. You administer the Greenware.com domain for the Greenware Corporation.
    In Greenware's main office in Toronto, Internet Information Services run on
    a computer named web.greenware.com. You want web developers in Puerto Rico
    and Los Angeles to be able to update web sites and virtual directories on
    web.greenware.com via Microsoft FrontPage. How do you do this?

    A. Install server extensions for IIS on web.greenware.com using the FPRENAME
    command. Configure the server extensions for each web site.
    B. Install server extensions for IIS on web.greenware.com using the FPSRBADM
    command. Configure the server extensions for each web site.
    C. Install server extensions from the All Task menu within IIS. Configure
    the server extensions for each web site.
    D. Install server extensions for each web site by selecting Configure Server
    Extensions from the All Tasks menu in IIS. Configure the server extensions
    to allow each developer update access for each web site.


    Answer: D


    160. You are the administrator of a network that consists of Windows 2000
    Server computers and Windows 2000 Professional computers.
    You want to configure the deployment of the most recent Windows 2000 service
    pack so that users of the Windows 2000 Professional computers receive the
    service pack automatically when they log on to the domain.

    What should you do?

    A. Create a Microsoft Windows installer package for the service pack.
    Configure RIS to use the package.
    B. Create a Microsoft Windows Installer package for the service pack.
    Configure the package in a Group Policy.
    C. Create a Microsoft Windows Installer package for the service pack.
    Configure the package in the Local Computer Policy.
    D. Place the service pack in a Distributed file system (Dfs).


    Answer: B


    161. Your network currently contains 6 NT 4.0 Servers and 620 NT 4.0
    Workstations. You want to bring a Windows 2000 Server online and implement
    it to act as primary domain controller in the existing domain. How?

    A. Run the Active Directory Installation Wizard to configure Active
    Directory on the 2000 Server. Promote the 2000 Server to be PDC of the
    domain. Reboot the existing NT 4.0 PDC and demote it to BDC status.
    B. Shut down the existing NT PDC. Run the Active Directory Installation
    Wizard on the 2000 Server and specify the current NetBIOS name of the
    domain. Restart NT on the PDC and demote it to BDC.
    C. Install NT Server 4.0 on the new computer and designate the computer as
    PDC of the existing domain. Specify the currently used NetBIOS name of the
    domain. Upgrade the computer to Windows 2000 Server and use Active Directory
    to force synchronization with the current PDC.
    D. Install NT Server 4.0 on the new computer and promote the computer as PDC
    of the existing domain. Be sure to specify the currently used NetBIOS name
    of the domain. Upgrade the computer to Windows 2000.


    Answer: D


    162. An NT 4.0 Server named ELIZABETH is a member server in a Windows 2000
    domain named testing.product.local. You want to upgrade ELIZABETH to Windows
    2000. The domain runs in native mode. You also want to change the role of
    ELIZABETH to be PDC within testing.product.local. Which of the following two
    actions must be performed?

    A. Reinstall NT 4.0 on ELIZABETH to the existing \Winnt folder and promote
    ELIZABETH to PDC.
    B. Use Server Manager on ELIZABETH to promote ELIZABETH to PDC.
    C. Upgrade ELIZABETH to Windows 2000 Server.
    D. Run the Active Directory Installation Wizard to make ELIZABETH PDC of the
    testing.product.local domain.
    E. Designate ELIZABETH as PDC from the existing PDC and reboot the existing
    PDC.


    Answer: A,C


    163. You administer a routed Window 2000 network. You install a new Windows
    2000 Server computer on a new routed segment and configure the existing DHCP
    Server with a scope that is valid for the new routed segment. After enabling
    the new Windows 2000 Server for DHCP, you find on your first boot that it
    has been assigned the IP address of 102.93.1.100, a 16 bit subnet mask, and
    no default gateway. When opening My Network Places, you see only the local
    computer. What two actions must be taken so that this new Windows 2000
    Server can see other computers on the network?

    A. Configure all routers to route BOOTP broadcast frames.
    B. Configure the default gateway to route all requests through TCP port 72.
    C. Add the IP address of the default gateway to the new 2000 Server's TCP/IP
    properties.
    D. Add a DHCP relay agent computer to the new routed segment.
    E. Add a WINS server to the new routed segment.


    Answer: A,D


    164. Your company has two locations-north and south. Windows 2000 Servers in
    both locations create weekly tape backups of critical data. The tapes are
    stored in the south location. How can you restore system state data to the
    server in the north location?

    A. Within Windows Backup on the south server, restore the system state data
    to the system root folder on the north server.
    B. Ship the backup tape to the north office. Run Windows Backup on the north
    server and restore system state data to the system root folder.
    C. Restart the south server in Directory Services Restore Mode, run Windows
    Backup, and restore system state data to the system root folder of the north
    server.
    D. Copy the backup file to any directory on the north server. Double-click
    on the file and choose "Restore System State Data."


    Answer: B


    165. Your Windows 2000 Server computer includes an integrated network
    interface adapter. You are replacing the integrated adapter with a new
    network interface adapter.
    You install the new network interface adapter in an available PCI slot. When
    you restart the computer, you receive error messages in the System log
    stating that the new network interface adapter is missing or is not working.

    What should you do to resolve the problem?

    A. Create a new hardware profile.
    B. Run the Add/Rmove Hardware Wizard.
    C. Disable the integrated network interface adapter.
    D. Delete the device driver for the integrated network interface adapter
    from the Systemroot\system32\Drivers folder.


    Answer: C
     
    Chris & Ara Duke, Nov 5, 2003
    #1
    1. Advertising

  2. Chris & Ara Duke

    Rowdy Yates Guest

    gee wiz! thanks so much for that post. why don't i next time just wipe my
    butt with the $10,000 it's gonna cost me to get my MCSE.

    thanks agin. i hope you get a great job in the IT industry and make lots of
    money for yourself.

    RY, MCSA

    "Chris & Ara Duke" <Muzicbox@ No Spam yahoo.com> wrote in
    news:JcXpb.1161$:

    > 1. You are an administrator of your company's network. You want to
     
    Rowdy Yates, Nov 5, 2003
    #2
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Chris & Ara Duke

    Dump of perfection Test

    Chris & Ara Duke, Nov 5, 2003, in forum: MCSE
    Replies:
    2
    Views:
    544
    ceedee
    Nov 5, 2003
  2. Guest

    test test test test test test test

    Guest, Jul 2, 2003, in forum: Computer Support
    Replies:
    2
    Views:
    957
    halfalifer
    Jul 2, 2003
  3. Idris Alooma
    Replies:
    0
    Views:
    824
    Idris Alooma
    Sep 1, 2003
  4. Sligo

    epson perfection 1200U scanner

    Sligo, Sep 25, 2003, in forum: Computer Support
    Replies:
    1
    Views:
    669
    Patrick
    Sep 26, 2003
  5. Chris & Ara Duke

    Dump of perfection Test

    Chris & Ara Duke, Nov 5, 2003, in forum: MCSA
    Replies:
    2
    Views:
    402
    ceedee
    Nov 5, 2003
Loading...

Share This Page