Questions Relating to Administering Windows 2000 Server

Discussion in 'MCSE' started by Marco Gonzalez, Sep 14, 2004.

  1. I need your help as soon as possible.

    Thanks for your time and consideration




    1) Jerry works in a small environment which will require
    only one Windows 2000 Server. The current platform is
    LINUX Red Hat 6.0. Jerry would like to perform this
    installation across the network. Jerry has configured a
    Samba share containing the \I386 directory files and
    installed the network client on the target computer. Jerry
    runs winnt /s and points it to the share. Setup returns an
    error "Failure of dependency service to start." What
    should Jerry do to resolve this situation?

    A) Jerry should replace the network adapter and/or the
    network cable and attempt installation again.

    B) Jerry should contact the Linux Administrator and
    request a restart of Samba.

    C) Jerry should recopy the \I386 directory and make sure
    all the files are there and not corrupted.

    D) Jerry should replace the hard drive as it probably
    failed.

    E) Jerry should try again later if the network is down.








    2) Sarah has been attempting to install Windows 2000
    Server for two days. She consistently gets the following
    error, "Error loading operating system." She has run f
    disk multiple times using various partition
    configurations. In order to rule out hardware issues, she
    has swapped a known good UDMA-100 40 GB hard drive for her
    UDMA-100 33 GB hard drive. She has also swapped the UDMA-
    100 cable four times. Windows 2000 Server will not
    install. What may be causing the problem?



    A) Sarah must use PC 133, CAS-2 memory. The RAM and
    processor are obviously incompatible.



    B) Sarah must run winnt using the /noreboot switch. This
    will halt the reboot step in the installation process and
    allow him to troubleshoot the error using the Disk Manager
    snap-in from the Administrator menu.



    C) Sarah has checked the cables and hard drives. They seem
    to be good, so the jumpers or BIOS settings for the drive
    configuration are most likely incorrect.



    D) Sarah must run winnt using the /syspart: C switch. This
    will copy all the files to the hard drive, provide the
    correct settings for setup to proceed past the reboot
    phase.



    E) Sarah must replace the UDMA-100 hard drive with a
    standard IDE drive. Windows 2000 Server does not support
    UDMA-100 at this time.







    3) Exactly how many processors does Windows 2000 Server
    support?



    A) 2, asymmetrically

    B) 4, symmetrically
    C) 2, symmetrically

    D) 4, asymmetrically

    E) 8, symmetrically or asymmetrically





    4) Sally is attempting to install Windows 2000 Server in a
    small legal firm. The computer, a Pentium II 333, 256 MB
    of RAM, 8x CD-ROM, and an 800 MB hard drive, has been a
    solid performer for the past 2 years and produced no
    errors. During the ScanDisk phase of setup Sally receives
    an error, "Setup has been aborted. Please remove any disks
    and press any key to restart." What should Sally do to
    resolve the situation?



    A) Sally should change out the CD-ROM. Windows 2000 Server
    requires a minimum 16x CD-ROM to perform an installation.



    B) Sally should check the RAM. She probably has a bad DIMM.



    C) Sally should upgrade her hard drive to 1GB minimum, 2
    GB if that is possible. Windows 2000 Server requires a
    minimum of 1 GB of hard drive space.



    D) Sally should have specified the correct path to the
    \I386 directory.



    E) Sally should partition the hard drive, copy the \I386
    directory, and attempt the install from the hard drive.








    5) Andrew wants to install Windows 2000 Server on a
    Pentium III 933 with 256 MB of RAM, and a 40 GB hard
    drive. However, he does not want to sit while setup runs,
    as he has other work which also needs to be completed.
    Andrew loads the setup disk in the CD-ROM, drive D,
    partitions the hard drive using a small primary DOS
    partition, and copies the file Andrew.txt there. He
    changes to drive D:\ and invokes the command \I386\winnt32
    \ /s:d:\I386 /unattend:c:\Andrew.txt. What should happen
    when Andrew returns in about an hour?



    A) He will need to continue with the GUI stage of
    installation.



    B) Setup should be waiting for user input.



    C) Andrew will need to remove the CD, and restart and then
    configure Windows 2000 Server.



    D) Andrew will need to add the relevant network
    information.



    E) Andrew will see an error.








    6) What function does Sysprep.exe serve during the
    installation of Windows 2000 Server?



    I. It can be used to automate installation.

    II. It guarantees duplicate SIDS by adding unique hardware
    identifiers.

    III. It adds a mini-setup Wizard to the image file which
    will run when the computer is started for the first time
    after installation is complete.



    A) I

    B) I and II
    C) I and III

    D) All of the above

    E) None of the above








    7) John has made the decision to upgrade his facility to
    Windows 2000 Server. His current Server is running Windows
    3.51 with Citrix MetaFrame. He assumes the hardware
    configuration exceed the minimum requirements. John
    successfully upgrades the server to Windows 2000. However,
    when he reboots, he notices that his settings are not
    correct and Citrix MetaFrame has disappeared. What should
    John do to recover this?



    A) John should uninstall Windows 2000. This will reinstate
    his original settings.



    B) John will need to reinstall Citrix MetaFrame on his
    server. Windows 2000 Server does not support a clean
    upgrade. He disregarded the warning message during setup.



    C) John will need to map a share to the directory that
    contains Citrix MetaFrame. All his settings were saved in
    a .tmp file.



    D) John should restore from backup. This will restore his
    original network settings as well as map a directory to
    Citrix MetaFrame.



    E) John should rename the \I386 directory to \Citrix.







    8) Windows 2000 Server will upgrade and preserve settings
    from which of the following operating systems?

    I. Windows NT 3.51 Server

    II. Windows NT 4.0 Server

    III. Windows NT 4.0 Terminal ServerI

    IV. Windows NT 4.0 Enterprise Edition

    V. Windows NT 4.0 Workstation



    A) I, II, and III

    B) II and IV

    C) II, III, IV, and V
    D) All of the above

    E) None of the above







    9) Jerry has completed a successful installation of
    Windows 2000 Server. He would like this server to become
    the Primary Domain Controller in an environment that
    includes 5 other servers. What command must he issue to
    complete this step?



    A) Jerry must issue the command promote from the command
    prompt.



    B) There is no command issued. Jerry must click Start,
    Programs, Administrators Tools, Server Manager, and then
    access the promote command from the toolbar.



    C) Jerry must issue the command dcpromo from the command
    prompt.



    D) Jerry should have selected that option during the
    network installation phase of setup.



    E) Jerry should do nothing. Windows 2000 Server is the
    Primary Domain Controller by default.








    10) When installing Windows 2000 Server, exactly how many
    stages of setup exist, according to Microsoft's White
    Paper release?



    A) 1

    B) 2

    C) 3
    D) 4
    E) 5





    11) Windows 2000 Server requires how many partitions to
    complete setup successfully?



    A) 1
    B) 2

    C) 3

    D) 4
    E) None







    12) With what new technology did Windows 2000 Server
    replace Windows NT 4.0 Server Incorporated Directory
    Replication Services?



    A) Nothing, with the advent of Windows 2000 Server, there
    was no need for Directory replication as it now happens
    automatically.



    B) Windows 2000 Server incorporates a new technology
    called File Replication Service, which is fault tolerant
    and is easier to administer than its predecessor.



    C) Windows 2000 File Management Service. In this, all
    passwords and profiles are stored, an image is created,
    and replicated every 15 minutes automatically each time a
    new account is created.



    D) Windows 2000 Server handles replication through Active
    Directory Services. Replication occurs every 3 hours and
    automatically when a new account is created.



    E) Windows 2000 Server continues to use Directory
    Replication Services. Replication occurs every 15 minutes
    by default, and automatically when a new server is
    installed on the network.







    13) What is required to secure files and folders which
    have been configured for Web Services?



    A) IIS must be running on the server where the folders are
    to be shared. The access permissions must be set read,
    write, script source access, and directory browsing.
    Application permissions must be set none, scripts and
    execute.



    B) SMS 2.0 Server must be installed and running. Create a
    share and name it Browsing Files. Point Web Services must
    be pointed to that share.



    C) The files must be password protected and placed in a
    share folder under the IIS directory.



    D) There is no way to secure these files.



    E) The files must be created under the Administrator
    account.








    14) Regina has a copy of Windows 2000 Server on a Jaz 1.0
    GB drive. She runs winnt from the \I386 directory. Setup
    reaches 84% and fails. Assuming she has exceeded the
    hardware requirements, and all of the hardware is known to
    be good. What can she do to recover from this failure?



    A) Regina should rerun the installation with the /noreboot
    switch to ensure Windows 2000 Server does not attempt
    another reboot.



    B) Nothing. Setup can only run from a CD-ROM, the hard
    drive, or a network share.



    C) Regina should run ScanDisk to determine whether the
    files are corrupted.



    D) Regina should check the connection between the Jaz
    drive and the computer to confirm the connection was not
    broken.



    E) Regina should rerun the installation using the /ox
    switch. This invokes setup from across the network.








    15) Joan wants to see what the current compression rate is
    on the \I386 file on her Windows 2000 Server. Which
    command should she issue to accomplish this?


    A) Joan should run the command "compact C:\I386" from the
    command prompt.



    B) Joan should double click on My Computer, C:\, and then
    the \I386 file. The compression will be displayed at the
    bottom of the pop-up window.



    C) This cannot be done.



    D) Joan should run Disk Manager, locate the file, right-
    click on the \I386 directory, and select Properties.



    E) Joan should run the command "diffile" from the command
    prompt.







    16) Mark has installed Windows 2000 Server in his office
    of 7 employees. Since there are so few employees, Mark has
    elected not to use DHCP. Mark does want to implement a
    Virtual Private Network. How can he accomplish this
    without configuring the DHCP Server?



    A) Mark must use DHCP to accomplish this. There is simply
    no way around it.



    B) Mark must click on Start, then Control Panel, then
    Network and Dial-up Connections. He must then Locate the
    connection he wants to share, right-click on it and select
    Properties. Under the Shared Access tab, he needs to check
    the box beside "Share this Connection".



    C) Mark must use a layer 3 switch and configure the
    Virtual Private Network from there.



    D) Mark must first install another network card. Then,
    Mark must click on Start, then Control Panel, then Network
    and Dial-up Connections. Locate the connection he wants to
    share, right-click on it and select Properties. Under the
    Shared Access tab, he needs to check the box beside "Share
    this Connection." Mark may then plug the second network
    card into a hub or switch and then add other computers. He
    must then reboot each computer and configure Internet
    access.



    E) Mark must install a second network board and connect
    that card to a hub or switch along with all the computers
    with which he wishes to share Internet access.








    17) What protocol does Windows 2000 use to communicate
    with IBM Mainframes?



    A) NWLink

    B) TCP/IP
    C) DLC

    D) NetBeui

    E) IPX/SPX








    18) Active Directory cannot run without which Service?



    A) DHCP

    B) Windows 2000 File Replication Service

    C) Domain Name Service
    D) Network Services

    E) Windows Management Instrumentation Service








    19) Gerald would like to assess his network traffic, which
    is aggregated or centralized, through his Windows 2000
    Server. Assuming DHCP is installed, which tool should he
    use to determine this information?



    A) Gerald should go into the Accounts, select a user,
    right-click, and click on the Properties tab. This is the
    best and most efficient way to determine the average load
    on the Server.



    B) Gerald should use the new DHCP MMC console snap-in,
    Enhanced Monitoring Service. This will not only provide
    him with the needed information, it will also provide him
    with graphical data he can present at meetings.



    C) Gerald should use Server Manager to determine the total
    traffic for his users.



    D) Gerald should use a third-party software tool. Windows
    2000 has no tool that will accomplish this task.



    E) Gerald should use User Manager, and select Domain
    Properties. He can find this information there.








    20) Which service, in Windows 2000 Server, facilitates
    intrusion detection of potentially conflicting network
    addresses on the network?



    A) Rouge DHCP Server Detection Service
    B) Domain Name Service

    C) Enhanced Monitoring Service

    D) Option Class Support Service

    E) Expanded Scope Support Service







    21) What does Windows 2000 Server utilize to ensure File
    Security?



    A) Windows 2000 Server installs file security by default.
    2000 isolates directory folders and auto secures them with
    the password assigned to Administrator.



    B) Windows 2000 Server utilizes the latest file allocation
    table, FAT32, to ensure file level security.



    C) Windows 2000 Server utilizes NTFS v.5 to ensure file
    level security.



    D) Windows 2000 Server utilizes Kerberos to ensure file
    level security.



    E) Windows 2000 Server utilizes NTFS v.4 to ensure file
    level security.








    22) What is the complete list of files that compose Active
    Directory?



    A) sysdiff.exe, compact.exe, ntuser.dat, and usr.exe



    B) sysprep.exe, re1.log, res2.log, ntbackup.exe, and
    ntds.dit



    C) res1.log, res2.log, ntvdm.dit, and edb.chk



    D) edb.log, edb.chk. res1.log, ntds.dit, and res2.log



    E) users.dat, ntvdm.log, aduser.dll, and userenv.dll








    23) Jennifer has finished installing Windows 2000 Server.
    She would like to take advantage of the Active Directory.
    DNS is being done through Windows 2000. She named the
    server SERVER#1 in order to effect efficient management of
    the domain iwantinternet.com. When she runs dcpromo, she
    receives the following error, "Incorrect computer name."
    What, if anything, can she do to resolve this situation?



    A) Jennifer can do nothing until she installs a second
    Primary Domain Controller. She must name that one
    SERVER#2, and then she will be able to configure Active
    Directory.



    B) Jennifer can solve this problem by renaming the server
    to SERVER1. Active Directory does not support the
    character #.



    C) Jennifer will need to create a CNAME called MyServer
    for SERVER#1. She will then be able to install Active
    Directory.



    D) Jennifer should run the compact command. She does not
    have enough free space to create the Active Directory.



    E) Jennifer can do nothing. She will need to format and
    start again because she failed to install all of the
    Administrative Tools.








    24) Ntds.dit, a core component of Active Directory, grows
    as the database fills up. However, it is limited in size
    by how much?



    A) 10 MB

    B) 20 MB

    C) 50 MB

    D) 100 MB

    E) 1 GB








    25) What is the Global Catalog's primary function?



    A) In Windows 2000 Server, it provides assistance to the
    help tool by providing a cached list of frequently used
    queries.



    B) In Windows 2000 Server, it provides quick and efficient
    searches across the entire Active Directory forest.



    C) In IIS 5.0, it is a powerful e-commerce tool which
    allows you to setup a store front with relative ease.



    D) In Windows 2000 Server, it provides efficient
    monitoring of network services across a VPN within the
    domain.



    E) In Windows 2000 Server, it provides an access point to
    access network shares in Linux using Samba.








    26) What is the primary consideration in restoring a DC
    through replication?



    A) Hard disk space
    B) Bandwidth

    C) RAM

    D) Processor

    E) Time Management







    27) What is the default method of restoration of the
    Active Directory?



    A) Full

    B) Incremental
    C) Differential

    D) Non-Authoritative

    E) Authoritative









    28) When is a primary restore absolutely required?



    A) It is never a requirement.



    B) When the Domain Controller you are restoring is the
    only DC in the domain.



    C) When you want to restore any Primary Domain Controller.



    D) When you are using Active Directory.



    E) A primary restore is always required under every
    circumstance.








    29) You have been assigned the task of changing the
    Administrator password for your Windows 2000 Server. Upon
    logging in, you enter the Active Directory. After locating
    the Administrator account, you right-click and notice
    the "change password" option is not available. Is it
    possible at this point to change the Administrator
    password? My Answer:



    A) No, The Administrator password is set in stone during
    the installation portion and cannot be changed.



    B) You must first change the name of the account, then
    the "change password" option will appear. Once you have
    done this, simply change the name back to Administrator.



    C) Yes, Press Ctrl + Alt + Del while logged in as
    Administrator. Then select the option "Change Password".
    Make your modification and save it.



    D) You must first log in as the Domain Administrator,
    rename the Administrator account, change the password, and
    then rename the account back to Administrator.



    E) It is not possible to alter the Administrator account.








    30) Assuming you have installed Windows 2000 Server, what
    is absolutely required to configure Active
    Directory?



    A) Domain Name Services. If you do not have a DNS server,
    Active Directory will install one automatically upon the
    administrator's confirmation.



    B) An effective business model. Active Directory cannot be
    configured unless it detects a business model.



    C) The DHCP Server must be installed and started. Active
    Directory cannot be configured without the presence of
    DHCP services.



    D) NetBeui. Without this protocol, Active Directory cannot
    be configured.



    E) A second Primary Domain Controller. Without the
    presence of a second PDC, it is impossible to configure
    Active Directory.








    31) What is the default subnet mask for a Class B network?



    A) 255.255.255.255

    B) 255.0.0.0

    C) 255.255.255.254

    D) 255.255.0.0

    E) 255.255.255.194







    32) PPP supports which of the following protocols?



    I. TCP/IP

    II. IPX/SPX

    III. NetBeui

    IV. AppleTalk



    A) I and IV

    B) I, II, and IV
    C) III and IV

    D) All of the above

    E) None of the above







    33) Jennifer has noticed a significant amount of
    inappropriate traffic originating from the IP address
    192.168.0.66. She has over 300 users in her domain, so she
    cannot afford to visit each individual machine to
    determine the identity of the offender. What tool can she
    use to determine the DNS of the workstation in question?



    A) ping

    B) netstat

    C) netdiag

    D) tracert
    E) tracefind







    34) In the Windows NT 4.0 model uses a Primary Domain
    Controller. Everything else is a Secondary Domain
    Controller. When performing a full migration, which server
    receives the first upgrade?



    A) If there is a stand-alone server, upgrade that one
    first, then all Secondary Domain Controllers, and finally
    the Primary Domain Controller.



    B) You should upgrade the Primary Domain Controller first,
    and then Secondary Domain Controller, and then any stand-
    alone servers.



    C) You should upgrade the Secondary Controller first, and
    then the Primary Domain Controller, leaving any other
    servers alone.



    D) This is not possible. You will need to backup all the
    servers, format, and reinstall.



    E) You should upgrade the stand-alone servers, the Primary
    Domain Controllers, and finally the Secondary Domain
    controllers.








    35) What networking protocol is installed by default
    during the second stage configuration of Windows 2000
    Server? My Answer:



    A) TCP/IP
    B) NWLink

    C) NetBeui

    D) IPX/SPX

    E) Microsoft Family Logon








    36) Unauthorized recreational Web Browsing has become a
    problem for Jerry and his small network. Jerry noticed
    that this use has resulted in an average utilization of
    80%. While Jerry wants to make sure that mail reaches his
    server, he needs to eliminate Web Browsing as it is not a
    critical tool for his end-users. What ports should he
    allow to continue the flow of e-mail?



    A) Ports 80 and 23

    B) Ports 110 and 23

    C) Ports 80 and 25
    D) Ports 110 and 25

    E) Ports 25 and 143







    37) Why should you right-click on My Network Places, click
    on Properties, right-click on Local Area Connection, click
    on Properties, Sharing, and then highlight the box beside
    Share this connection?



    A) This function allows you to share the Internet
    connection with the Exchange Server. This allows you to
    get mail faster.



    B) You manage a small network that will never get any
    bigger than it already is. This method allows easy
    configuration of any end-user by offering a pre-configured
    VPN that is, in essence, plug and play.



    C) SMS 2.0 requires that the network connection be shared
    with it and all workstations. Without this function, SMS
    2.0 will not function.



    D) Exchange Mail Client will not function correctly
    without the ICS Service running. This is the only way to
    make the service run.



    E) This eliminates the need for a firewall. Windows 2000
    Server utilizes IPSec to protect itself from outside
    threats, and through ICS, creates a non-routable VPN to
    protect all the workstations on the domain.








    38) NetBios resides on which layer of the OSI?



    A) The Transport Layer

    B) The Network Layer
    C) The Session Layer

    D) The Application Layer

    E) The Presentation Layer








    39) In what two modes can a Windows 2000 Domain operate?



    A) Standalone or Primary mode
    B) Mixed or Native Mode

    C) Primary or Backup Mode

    D) Root or User Mode

    E) Native or Non-Native Mode
    Marco Gonzalez, Sep 14, 2004
    #1
    1. Advertising

  2. Marco Gonzalez

    molsonexpert Guest

    "Marco Gonzalez" <> wrote in message
    news:0d4701c49a8b$e852f920$...
    > I need your help as soon as possible.
    >
    > Thanks for your time and consideration
    >
    >


    <braindump unceremoniously snipped>

    >
    >
    >
    >


    You kidding, right?

    steve.
    molsonexpert, Sep 14, 2004
    #2
    1. Advertising

  3. Marco Gonzalez

    Neil Guest

    babbling on and on again "molsonexpert" <> spewed in
    news::

    > You kidding, right?


    unlikely...

    --
    Neil MCNGP #30
    the "curious" hair on the soap of society
    Neil, Sep 14, 2004
    #3
  4. Marco Gonzalez

    RH Guest

    I already took this exam....do the same thing I
    did....look it up.
    >-----Original Message-----
    >I need your help as soon as possible.
    >
    >Thanks for your time and consideration
    >
    >
    >
    >
    >1) Jerry works in a small environment which will require
    >only one Windows 2000 Server. The current platform is
    >LINUX Red Hat 6.0. Jerry would like to perform this
    >installation across the network. Jerry has configured a
    >Samba share containing the \I386 directory files and
    >installed the network client on the target computer.

    Jerry
    >runs winnt /s and points it to the share. Setup returns

    an
    >error "Failure of dependency service to start." What
    >should Jerry do to resolve this situation?
    >
    >A) Jerry should replace the network adapter and/or the
    >network cable and attempt installation again.
    >
    >B) Jerry should contact the Linux Administrator and
    >request a restart of Samba.
    >
    >C) Jerry should recopy the \I386 directory and make sure
    >all the files are there and not corrupted.
    >
    >D) Jerry should replace the hard drive as it probably
    >failed.
    >
    >E) Jerry should try again later if the network is down.
    >
    >


    >
    >
    >
    >
    >
    >
    >2) Sarah has been attempting to install Windows 2000
    >Server for two days. She consistently gets the following
    >error, "Error loading operating system." She has run f
    >disk multiple times using various partition
    >configurations. In order to rule out hardware issues,

    she
    >has swapped a known good UDMA-100 40 GB hard drive for

    her
    >UDMA-100 33 GB hard drive. She has also swapped the UDMA-
    >100 cable four times. Windows 2000 Server will not
    >install. What may be causing the problem?
    >
    >
    >
    >A) Sarah must use PC 133, CAS-2 memory. The RAM and
    >processor are obviously incompatible.
    >
    >
    >
    >B) Sarah must run winnt using the /noreboot switch. This
    >will halt the reboot step in the installation process

    and
    >allow him to troubleshoot the error using the Disk

    Manager
    >snap-in from the Administrator menu.
    >
    >
    >
    >C) Sarah has checked the cables and hard drives. They

    seem
    >to be good, so the jumpers or BIOS settings for the

    drive
    >configuration are most likely incorrect.
    >
    >
    >
    >D) Sarah must run winnt using the /syspart: C switch.

    This
    >will copy all the files to the hard drive, provide the
    >correct settings for setup to proceed past the reboot
    >phase.
    >
    >
    >
    >E) Sarah must replace the UDMA-100 hard drive with a
    >standard IDE drive. Windows 2000 Server does not support
    >UDMA-100 at this time.
    >
    >
    >
    >
    >
    >
    >
    >3) Exactly how many processors does Windows 2000 Server
    >support?
    >
    >
    >
    >A) 2, asymmetrically
    >
    >B) 4, symmetrically
    >C) 2, symmetrically
    >
    >D) 4, asymmetrically
    >
    >E) 8, symmetrically or asymmetrically
    >
    >
    >
    >
    >
    >4) Sally is attempting to install Windows 2000 Server in

    a
    >small legal firm. The computer, a Pentium II 333, 256 MB
    >of RAM, 8x CD-ROM, and an 800 MB hard drive, has been a
    >solid performer for the past 2 years and produced no
    >errors. During the ScanDisk phase of setup Sally

    receives
    >an error, "Setup has been aborted. Please remove any

    disks
    >and press any key to restart." What should Sally do to
    >resolve the situation?
    >
    >
    >
    >A) Sally should change out the CD-ROM. Windows 2000

    Server
    >requires a minimum 16x CD-ROM to perform an installation.
    >
    >
    >
    >B) Sally should check the RAM. She probably has a bad

    DIMM.
    >
    >
    >
    >C) Sally should upgrade her hard drive to 1GB minimum, 2
    >GB if that is possible. Windows 2000 Server requires a
    >minimum of 1 GB of hard drive space.
    >
    >
    >
    >D) Sally should have specified the correct path to the
    >\I386 directory.
    >
    >
    >
    >E) Sally should partition the hard drive, copy the \I386
    >directory, and attempt the install from the hard drive.
    >
    >
    >
    >
    >
    >


    >
    >
    >5) Andrew wants to install Windows 2000 Server on a
    >Pentium III 933 with 256 MB of RAM, and a 40 GB hard
    >drive. However, he does not want to sit while setup

    runs,
    >as he has other work which also needs to be completed.
    >Andrew loads the setup disk in the CD-ROM, drive D,
    >partitions the hard drive using a small primary DOS
    >partition, and copies the file Andrew.txt there. He
    >changes to drive D:\ and invokes the command \I386

    \winnt32
    >\ /s:d:\I386 /unattend:c:\Andrew.txt. What should happen
    >when Andrew returns in about an hour?
    >
    >
    >
    >A) He will need to continue with the GUI stage of
    >installation.
    >
    >
    >
    >B) Setup should be waiting for user input.
    >
    >
    >
    >C) Andrew will need to remove the CD, and restart and

    then
    >configure Windows 2000 Server.
    >
    >
    >
    >D) Andrew will need to add the relevant network
    >information.
    >
    >
    >
    >E) Andrew will see an error.
    >
    >
    >
    >
    >
    >


    >
    >
    >6) What function does Sysprep.exe serve during the
    >installation of Windows 2000 Server?
    >
    >
    >
    >I. It can be used to automate installation.
    >
    >II. It guarantees duplicate SIDS by adding unique

    hardware
    >identifiers.
    >
    >III. It adds a mini-setup Wizard to the image file which
    >will run when the computer is started for the first time
    >after installation is complete.
    >
    >
    >
    >A) I
    >
    >B) I and II
    >C) I and III
    >
    >D) All of the above
    >
    >E) None of the above
    >
    >
    >
    >
    >
    >


    >
    >
    >7) John has made the decision to upgrade his facility to
    >Windows 2000 Server. His current Server is running

    Windows
    >3.51 with Citrix MetaFrame. He assumes the hardware
    >configuration exceed the minimum requirements. John
    >successfully upgrades the server to Windows 2000.

    However,
    >when he reboots, he notices that his settings are not
    >correct and Citrix MetaFrame has disappeared. What

    should
    >John do to recover this?
    >
    >
    >
    >A) John should uninstall Windows 2000. This will

    reinstate
    >his original settings.
    >
    >
    >
    >B) John will need to reinstall Citrix MetaFrame on his
    >server. Windows 2000 Server does not support a clean
    >upgrade. He disregarded the warning message during setup.
    >
    >
    >
    >C) John will need to map a share to the directory that
    >contains Citrix MetaFrame. All his settings were saved

    in
    >a .tmp file.
    >
    >
    >
    >D) John should restore from backup. This will restore

    his
    >original network settings as well as map a directory to
    >Citrix MetaFrame.
    >
    >
    >
    >E) John should rename the \I386 directory to \Citrix.
    >
    >
    >
    >
    >
    >
    >
    >8) Windows 2000 Server will upgrade and preserve

    settings
    >from which of the following operating systems?
    >
    >I. Windows NT 3.51 Server
    >
    >II. Windows NT 4.0 Server
    >
    >III. Windows NT 4.0 Terminal ServerI
    >
    >IV. Windows NT 4.0 Enterprise Edition
    >
    >V. Windows NT 4.0 Workstation
    >
    >
    >
    >A) I, II, and III
    >
    >B) II and IV
    >
    >C) II, III, IV, and V
    >D) All of the above
    >
    >E) None of the above
    >
    >
    >
    >
    >
    >
    >
    >9) Jerry has completed a successful installation of
    >Windows 2000 Server. He would like this server to become
    >the Primary Domain Controller in an environment that
    >includes 5 other servers. What command must he issue to
    >complete this step?
    >
    >
    >
    >A) Jerry must issue the command promote from the command
    >prompt.
    >
    >
    >
    >B) There is no command issued. Jerry must click Start,
    >Programs, Administrators Tools, Server Manager, and then
    >access the promote command from the toolbar.
    >
    >
    >
    >C) Jerry must issue the command dcpromo from the command
    >prompt.
    >
    >
    >
    >D) Jerry should have selected that option during the
    >network installation phase of setup.
    >
    >
    >
    >E) Jerry should do nothing. Windows 2000 Server is the
    >Primary Domain Controller by default.
    >
    >


    >
    >
    >
    >
    >
    >
    >10) When installing Windows 2000 Server, exactly how

    many
    >stages of setup exist, according to Microsoft's White
    >Paper release?
    >
    >
    >
    >A) 1
    >
    >B) 2
    >
    >C) 3
    >D) 4
    >E) 5
    >
    >
    >
    >
    >
    >11) Windows 2000 Server requires how many partitions to
    >complete setup successfully?
    >
    >
    >
    >A) 1
    >B) 2
    >
    >C) 3
    >
    >D) 4
    >E) None
    >
    >
    >
    >
    >
    >
    >
    >12) With what new technology did Windows 2000 Server
    >replace Windows NT 4.0 Server Incorporated Directory
    >Replication Services?
    >
    >
    >
    >A) Nothing, with the advent of Windows 2000 Server,

    there
    >was no need for Directory replication as it now happens
    >automatically.
    >
    >
    >
    >B) Windows 2000 Server incorporates a new technology
    >called File Replication Service, which is fault tolerant
    >and is easier to administer than its predecessor.
    >
    >
    >
    >C) Windows 2000 File Management Service. In this, all
    >passwords and profiles are stored, an image is created,
    >and replicated every 15 minutes automatically each time

    a
    >new account is created.
    >
    >
    >
    >D) Windows 2000 Server handles replication through

    Active
    >Directory Services. Replication occurs every 3 hours and
    >automatically when a new account is created.
    >
    >
    >
    >E) Windows 2000 Server continues to use Directory
    >Replication Services. Replication occurs every 15

    minutes
    >by default, and automatically when a new server is
    >installed on the network.
    >
    >
    >
    >
    >
    >
    >
    >13) What is required to secure files and folders which
    >have been configured for Web Services?
    >
    >
    >
    >A) IIS must be running on the server where the folders

    are
    >to be shared. The access permissions must be set read,
    >write, script source access, and directory browsing.
    >Application permissions must be set none, scripts and
    >execute.
    >
    >
    >
    >B) SMS 2.0 Server must be installed and running. Create

    a
    >share and name it Browsing Files. Point Web Services

    must
    >be pointed to that share.
    >
    >
    >
    >C) The files must be password protected and placed in a
    >share folder under the IIS directory.
    >
    >
    >
    >D) There is no way to secure these files.
    >
    >
    >
    >E) The files must be created under the Administrator
    >account.
    >
    >


    >
    >
    >
    >
    >
    >
    >14) Regina has a copy of Windows 2000 Server on a Jaz

    1.0
    >GB drive. She runs winnt from the \I386 directory. Setup
    >reaches 84% and fails. Assuming she has exceeded the
    >hardware requirements, and all of the hardware is known

    to
    >be good. What can she do to recover from this failure?
    >
    >
    >
    >A) Regina should rerun the installation with

    the /noreboot
    >switch to ensure Windows 2000 Server does not attempt
    >another reboot.
    >
    >
    >
    >B) Nothing. Setup can only run from a CD-ROM, the hard
    >drive, or a network share.
    >
    >
    >
    >C) Regina should run ScanDisk to determine whether the
    >files are corrupted.
    >
    >
    >
    >D) Regina should check the connection between the Jaz
    >drive and the computer to confirm the connection was not
    >broken.
    >
    >
    >
    >E) Regina should rerun the installation using the /ox
    >switch. This invokes setup from across the network.
    >
    >
    >
    >
    >
    >


    >
    >
    >15) Joan wants to see what the current compression rate

    is
    >on the \I386 file on her Windows 2000 Server. Which
    >command should she issue to accomplish this?
    >
    >
    >A) Joan should run the command "compact C:\I386" from

    the
    >command prompt.
    >
    >
    >
    >B) Joan should double click on My Computer, C:\, and

    then
    >the \I386 file. The compression will be displayed at the
    >bottom of the pop-up window.
    >
    >
    >
    >C) This cannot be done.
    >
    >
    >
    >D) Joan should run Disk Manager, locate the file, right-
    >click on the \I386 directory, and select Properties.
    >
    >
    >
    >E) Joan should run the command "diffile" from the

    command
    >prompt.
    >
    >
    >
    >
    >
    >
    >
    >16) Mark has installed Windows 2000 Server in his office
    >of 7 employees. Since there are so few employees, Mark

    has
    >elected not to use DHCP. Mark does want to implement a
    >Virtual Private Network. How can he accomplish this
    >without configuring the DHCP Server?
    >
    >
    >
    >A) Mark must use DHCP to accomplish this. There is

    simply
    >no way around it.
    >
    >
    >
    >B) Mark must click on Start, then Control Panel, then
    >Network and Dial-up Connections. He must then Locate the
    >connection he wants to share, right-click on it and

    select
    >Properties. Under the Shared Access tab, he needs to

    check
    >the box beside "Share this Connection".
    >
    >
    >
    >C) Mark must use a layer 3 switch and configure the
    >Virtual Private Network from there.
    >
    >
    >
    >D) Mark must first install another network card. Then,
    >Mark must click on Start, then Control Panel, then

    Network
    >and Dial-up Connections. Locate the connection he wants

    to
    >share, right-click on it and select Properties. Under

    the
    >Shared Access tab, he needs to check the box

    beside "Share
    >this Connection." Mark may then plug the second network
    >card into a hub or switch and then add other computers.

    He
    >must then reboot each computer and configure Internet
    >access.
    >
    >
    >
    >E) Mark must install a second network board and connect
    >that card to a hub or switch along with all the

    computers
    >with which he wishes to share Internet access.
    >
    >


    >
    >
    >
    >
    >
    >
    >17) What protocol does Windows 2000 use to communicate
    >with IBM Mainframes?
    >
    >
    >
    >A) NWLink
    >
    >B) TCP/IP
    >C) DLC
    >
    >D) NetBeui
    >
    >E) IPX/SPX
    >
    >


    >
    >
    >
    >
    >
    >
    >18) Active Directory cannot run without which Service?
    >
    >
    >
    >A) DHCP
    >
    >B) Windows 2000 File Replication Service
    >
    >C) Domain Name Service
    >D) Network Services
    >
    >E) Windows Management Instrumentation Service
    >
    >


    >
    >
    >
    >
    >
    >
    >19) Gerald would like to assess his network traffic,

    which
    >is aggregated or centralized, through his Windows 2000
    >Server. Assuming DHCP is installed, which tool should he
    >use to determine this information?
    >
    >
    >
    >A) Gerald should go into the Accounts, select a user,
    >right-click, and click on the Properties tab. This is

    the
    >best and most efficient way to determine the average

    load
    >on the Server.
    >
    >
    >
    >B) Gerald should use the new DHCP MMC console snap-in,
    >Enhanced Monitoring Service. This will not only provide
    >him with the needed information, it will also provide

    him
    >with graphical data he can present at meetings.
    >
    >
    >
    >C) Gerald should use Server Manager to determine the

    total
    >traffic for his users.
    >
    >
    >
    >D) Gerald should use a third-party software tool.

    Windows
    >2000 has no tool that will accomplish this task.
    >
    >
    >
    >E) Gerald should use User Manager, and select Domain
    >Properties. He can find this information there.
    >
    >


    >
    >
    >
    >
    >
    >
    >20) Which service, in Windows 2000 Server, facilitates
    >intrusion detection of potentially conflicting network
    >addresses on the network?
    >
    >
    >
    >A) Rouge DHCP Server Detection Service
    >B) Domain Name Service
    >
    >C) Enhanced Monitoring Service
    >
    >D) Option Class Support Service
    >
    >E) Expanded Scope Support Service
    >
    >
    >
    >
    >
    >
    >
    >21) What does Windows 2000 Server utilize to ensure File
    >Security?
    >
    >
    >
    >A) Windows 2000 Server installs file security by

    default.
    >2000 isolates directory folders and auto secures them

    with
    >the password assigned to Administrator.
    >
    >
    >
    >B) Windows 2000 Server utilizes the latest file

    allocation
    >table, FAT32, to ensure file level security.
    >
    >
    >
    >C) Windows 2000 Server utilizes NTFS v.5 to ensure file
    >level security.
    >
    >
    >
    >D) Windows 2000 Server utilizes Kerberos to ensure file
    >level security.
    >
    >
    >
    >E) Windows 2000 Server utilizes NTFS v.4 to ensure file
    >level security.
    >
    >
    >
    >
    >
    >


    >
    >
    >22) What is the complete list of files that compose

    Active
    >Directory?
    >
    >
    >
    >A) sysdiff.exe, compact.exe, ntuser.dat, and usr.exe
    >
    >
    >
    >B) sysprep.exe, re1.log, res2.log, ntbackup.exe, and
    >ntds.dit
    >
    >
    >
    >C) res1.log, res2.log, ntvdm.dit, and edb.chk
    >
    >
    >
    >D) edb.log, edb.chk. res1.log, ntds.dit, and res2.log
    >
    >
    >
    >E) users.dat, ntvdm.log, aduser.dll, and userenv.dll
    >
    >


    >
    >
    >
    >
    >
    >
    >23) Jennifer has finished installing Windows 2000

    Server.
    >She would like to take advantage of the Active

    Directory.
    >DNS is being done through Windows 2000. She named the
    >server SERVER#1 in order to effect efficient management

    of
    >the domain iwantinternet.com. When she runs dcpromo, she
    >receives the following error, "Incorrect computer name."
    >What, if anything, can she do to resolve this situation?
    >
    >
    >
    >A) Jennifer can do nothing until she installs a second
    >Primary Domain Controller. She must name that one
    >SERVER#2, and then she will be able to configure Active
    >Directory.
    >
    >
    >
    >B) Jennifer can solve this problem by renaming the

    server
    >to SERVER1. Active Directory does not support the
    >character #.
    >
    >
    >
    >C) Jennifer will need to create a CNAME called MyServer
    >for SERVER#1. She will then be able to install Active
    >Directory.
    >
    >
    >
    >D) Jennifer should run the compact command. She does not
    >have enough free space to create the Active Directory.
    >
    >
    >
    >E) Jennifer can do nothing. She will need to format and
    >start again because she failed to install all of the
    >Administrative Tools.
    >
    >


    >
    >
    >
    >
    >
    >
    >24) Ntds.dit, a core component of Active Directory,

    grows
    >as the database fills up. However, it is limited in size
    >by how much?
    >
    >
    >
    >A) 10 MB
    >
    >B) 20 MB
    >
    >C) 50 MB
    >
    >D) 100 MB
    >
    >E) 1 GB
    >
    >
    >
    >


    >
    >
    >
    >
    >25) What is the Global Catalog's primary function?
    >
    >
    >
    >A) In Windows 2000 Server, it provides assistance to the
    >help tool by providing a cached list of frequently used
    >queries.
    >
    >
    >
    >B) In Windows 2000 Server, it provides quick and

    efficient
    >searches across the entire Active Directory forest.
    >
    >
    >
    >C) In IIS 5.0, it is a powerful e-commerce tool which
    >allows you to setup a store front with relative ease.
    >
    >
    >
    >D) In Windows 2000 Server, it provides efficient
    >monitoring of network services across a VPN within the
    >domain.
    >
    >
    >
    >E) In Windows 2000 Server, it provides an access point

    to
    >access network shares in Linux using Samba.
    >
    >
    >
    >
    >
    >


    >
    >
    >26) What is the primary consideration in restoring a DC
    >through replication?
    >
    >
    >
    >A) Hard disk space
    >B) Bandwidth
    >
    >C) RAM
    >
    >D) Processor
    >
    >E) Time Management
    >
    >
    >
    >
    >
    >
    >
    >27) What is the default method of restoration of the
    >Active Directory?
    >
    >
    >
    >A) Full
    >
    >B) Incremental
    >C) Differential
    >
    >D) Non-Authoritative
    >
    >E) Authoritative
    >
    >


    >
    >
    >
    >
    >
    >
    >
    >28) When is a primary restore absolutely required?
    >
    >
    >
    >A) It is never a requirement.
    >
    >
    >
    >B) When the Domain Controller you are restoring is the
    >only DC in the domain.
    >
    >
    >
    >C) When you want to restore any Primary Domain

    Controller.
    >
    >
    >
    >D) When you are using Active Directory.
    >
    >
    >
    >E) A primary restore is always required under every
    >circumstance.
    >
    >


    >
    >
    >
    >
    >
    >
    >29) You have been assigned the task of changing the
    >Administrator password for your Windows 2000 Server.

    Upon
    >logging in, you enter the Active Directory. After

    locating
    >the Administrator account, you right-click and notice
    >the "change password" option is not available. Is it
    >possible at this point to change the Administrator
    >password? My Answer:
    >
    >
    >
    >A) No, The Administrator password is set in stone during
    >the installation portion and cannot be changed.
    >
    >
    >
    >B) You must first change the name of the account, then
    >the "change password" option will appear. Once you have
    >done this, simply change the name back to Administrator.
    >
    >
    >
    >C) Yes, Press Ctrl + Alt + Del while logged in as
    >Administrator. Then select the option "Change Password".
    >Make your modification and save it.
    >
    >
    >
    >D) You must first log in as the Domain Administrator,
    >rename the Administrator account, change the password,

    and
    >then rename the account back to Administrator.
    >
    >
    >
    >E) It is not possible to alter the Administrator account.
    >
    >
    >
    >


    >
    >
    >
    >
    >30) Assuming you have installed Windows 2000 Server,

    what
    >is absolutely required to configure Active
    >Directory?
    >
    >
    >
    >A) Domain Name Services. If you do not have a DNS

    server,
    >Active Directory will install one automatically upon the
    >administrator's confirmation.
    >
    >
    >
    >B) An effective business model. Active Directory cannot

    be
    >configured unless it detects a business model.
    >
    >
    >
    >C) The DHCP Server must be installed and started. Active
    >Directory cannot be configured without the presence of
    >DHCP services.
    >
    >
    >
    >D) NetBeui. Without this protocol, Active Directory

    cannot
    >be configured.
    >
    >
    >
    >E) A second Primary Domain Controller. Without the
    >presence of a second PDC, it is impossible to configure
    >Active Directory.
    >
    >


    >
    >
    >
    >
    >
    >
    >31) What is the default subnet mask for a Class B

    network?
    >
    >
    >
    >A) 255.255.255.255
    >
    >B) 255.0.0.0
    >
    >C) 255.255.255.254
    >
    >D) 255.255.0.0
    >
    >E) 255.255.255.194
    >
    >
    >
    >
    >
    >
    >
    >32) PPP supports which of the following protocols?
    >
    >
    >
    >I. TCP/IP
    >
    >II. IPX/SPX
    >
    >III. NetBeui
    >
    >IV. AppleTalk
    >
    >
    >
    >A) I and IV
    >
    >B) I, II, and IV
    >C) III and IV
    >
    >D) All of the above
    >
    >E) None of the above
    >
    >
    >
    >
    >
    >
    >
    >33) Jennifer has noticed a significant amount of
    >inappropriate traffic originating from the IP address
    >192.168.0.66. She has over 300 users in her domain, so

    she
    >cannot afford to visit each individual machine to
    >determine the identity of the offender. What tool can

    she
    >use to determine the DNS of the workstation in question?
    >
    >
    >
    >A) ping
    >
    >B) netstat
    >
    >C) netdiag
    >
    >D) tracert
    >E) tracefind
    >
    >
    >
    >
    >
    >
    >
    >34) In the Windows NT 4.0 model uses a Primary Domain
    >Controller. Everything else is a Secondary Domain
    >Controller. When performing a full migration, which

    server
    >receives the first upgrade?
    >
    >
    >
    >A) If there is a stand-alone server, upgrade that one
    >first, then all Secondary Domain Controllers, and

    finally
    >the Primary Domain Controller.
    >
    >
    >
    >B) You should upgrade the Primary Domain Controller

    first,
    >and then Secondary Domain Controller, and then any stand-
    >alone servers.
    >
    >
    >
    >C) You should upgrade the Secondary Controller first,

    and
    >then the Primary Domain Controller, leaving any other
    >servers alone.
    >
    >
    >
    >D) This is not possible. You will need to backup all the
    >servers, format, and reinstall.
    >
    >
    >
    >E) You should upgrade the stand-alone servers, the

    Primary
    >Domain Controllers, and finally the Secondary Domain
    >controllers.
    >
    >
    >
    >


    >
    >
    >
    >
    >35) What networking protocol is installed by default
    >during the second stage configuration of Windows 2000
    >Server? My Answer:
    >
    >
    >
    >A) TCP/IP
    >B) NWLink
    >
    >C) NetBeui
    >
    >D) IPX/SPX
    >
    >E) Microsoft Family Logon
    >
    >
    >
    >


    >
    >
    >
    >
    >36) Unauthorized recreational Web Browsing has become a
    >problem for Jerry and his small network. Jerry noticed
    >that this use has resulted in an average utilization of
    >80%. While Jerry wants to make sure that mail reaches

    his
    >server, he needs to eliminate Web Browsing as it is not

    a
    >critical tool for his end-users. What ports should he
    >allow to continue the flow of e-mail?
    >
    >
    >
    >A) Ports 80 and 23
    >
    >B) Ports 110 and 23
    >
    >C) Ports 80 and 25
    >D) Ports 110 and 25
    >
    >E) Ports 25 and 143
    >
    >
    >
    >
    >
    >
    >
    >37) Why should you right-click on My Network Places,

    click
    >on Properties, right-click on Local Area Connection,

    click
    >on Properties, Sharing, and then highlight the box

    beside
    >Share this connection?
    >
    >
    >
    >A) This function allows you to share the Internet
    >connection with the Exchange Server. This allows you to
    >get mail faster.
    >
    >
    >
    >B) You manage a small network that will never get any
    >bigger than it already is. This method allows easy
    >configuration of any end-user by offering a pre-

    configured
    >VPN that is, in essence, plug and play.
    >
    >
    >
    >C) SMS 2.0 requires that the network connection be

    shared
    >with it and all workstations. Without this function, SMS
    >2.0 will not function.
    >
    >
    >
    >D) Exchange Mail Client will not function correctly
    >without the ICS Service running. This is the only way to
    >make the service run.
    >
    >
    >
    >E) This eliminates the need for a firewall. Windows 2000
    >Server utilizes IPSec to protect itself from outside
    >threats, and through ICS, creates a non-routable VPN to
    >protect all the workstations on the domain.
    >
    >


    >
    >
    >
    >
    >
    >
    >38) NetBios resides on which layer of the OSI?
    >
    >
    >
    >A) The Transport Layer
    >
    >B) The Network Layer
    >C) The Session Layer
    >
    >D) The Application Layer
    >
    >E) The Presentation Layer
    >
    >


    >
    >
    >
    >
    >
    >
    >39) In what two modes can a Windows 2000 Domain operate?
    >
    >
    >
    >A) Standalone or Primary mode
    >B) Mixed or Native Mode
    >
    >C) Primary or Backup Mode
    >
    >D) Root or User Mode
    >
    >E) Native or Non-Native Mode
    >
    >
    >.
    >
    RH, Sep 14, 2004
    #4
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Puleng More
    Replies:
    1
    Views:
    532
    Mark Fugatt [MVP]
    Jun 17, 2004
  2. WantsMore
    Replies:
    6
    Views:
    409
    MCSE World
    Nov 7, 2003
  3. Burner
    Replies:
    6
    Views:
    448
    Marky
    Nov 24, 2003
  4. Billy Patterson
    Replies:
    8
    Views:
    463
    Guest
    Apr 23, 2004
  5. Marco Gonzalez
    Replies:
    1
    Views:
    722
Loading...

Share This Page