I have passed the 70-210 test on 09-25-2002 all i studied is this dump and used the random options so i did not get use to where the answers are. now i'm going to go for 70-215 and make a dump likes this one i made to study with. http://www.mcsebraindumps.com
1.You purchase a USB board, ISDN terminal adapter for your Windows 2000 Professional portable
computer. You plug the device in to the USB port. Plug and Play fails to detect the new device. You test
the device on a Windows 2000 Professional desktop computer. You find that plug and play correctly
detects the device.
You want to resolve the problem so that you can use ISDN terminal adapter on your portable computer.
What should you do?
A. Use the Device Manager to enable the USB manager root hub.
B. Use the Device Manager to enable the USB host controller in the current hardware profile.
C. Contact the hardware manufacturer to obtain the upgrade for the Plug and Play BIOS.
D. Turn off the computer plug in the ISDN terminal host adapter and restart the computer.
Answer: C
Explanation: The most likely cause of this problem is an old BIOS. By upgrading the BIOS the computer will
be able to find the USB adapter. |
Incorrect answers:
A: This would be possible but it is not the most likely cause of the problem. The USB root hub should
already be enabled.
B: The USB host controller should already be enabled.
D: The computer should not need to be restarted to be able to detect a new USB device. It should be
detected immediately. |
2.You install a new AGP video adapter in your Windows 2000 Professional Computer. You start the
computer and notice that the video display has retained the default setting of 16 color 640*480 resolution.
You install the manufacturer’s drivers for the new video adapter. You then restart the computer. During
the setup process the monitor goes blank. After several minutes the screen is still black. You restart the
computer and experience the same problem again. You want to enable Windows 2000 Professional to
start successfully.
What should you do?
A. Start the computer in the debug mode. Restore the original adapter driver settings.
B. Start the computer in the Safe Mode. Rename the AGP device by using Device Manager
C. Start the computer by using the Recovery Console. Rename the AGP driver.
D. Start the computer by using the emergency repair disk. Restore the original driver settings.
Answer: C
Explanation: We can use the Window 2000 installation CD to boot to the Recovery Console. In the Recovery
Console we can rename the AGP driver. This will prevent Windows 2000 from loading the driver. The
computer will then restart without the driver and will prompt us for the correct driver. |
Incorrect Answers:
A: We cannot start the system in Debug mode. Debug mode is a special mode that is used by software developers to debug programs and is a Safe Mode option.
B: We cannot rename a device using Device Manager. Therefore starting the computer in Safe Mode to rename the device using Device Manager is not the correct option.
D: The emergency repair disk will not enable us to restore the original driver. The emergency repair disk
(ERD) is a floppy disk that is used to repair a Windows 2000 installation. It contains autoexec.nt,
config.nt and setup.log and is used to repair core system files. |
3.You are the administrator of a small server based network. While installing Windows 2000 Professional
on your computer, you configure the network adapter card for each computer to use TCP/IP and assign
static IP setting information. During installation the setup detects and installs the 10/100 MBPS UTP only
network adepter card on computers 6 & 8 and 10 MBPS/UTP combination adapter card on the other 7
computers. You accept the default settings for the network adapter card and finish installing the network
adapter card. All computers are connected to 10/100 switch that has category 5 UTP cabling. After
installation you find that computer 6 and 8 can communicate with each other. You want all 9 computers
on your network to be able to communicate with each other.
What should you do?
A. Configure the 10/100 switch to transfer only at the 100 MBPS rate.
B. Configure 10/100 MBPS network adapter card to switch all the computers at 10 MBPS rate.
C. Change the combination network adapter card to use the BNC transceiver setting.
D. Change the combination network adapter card to use the UTP transceiver setting.
Answer: D
Explanation: In this scenario, the combination network adapter cards are set to use BNC connectors. We need
to manually reconfigure the network adapters for UTP cabling. |
Incorrect answers:
A: If the switch only worked at the100 MBPS rate, the 10MBPS network adapters would not be able to
communicate via the switch.
B: It is not necessary to run the network at 10MBPS. This will not take advantage of the higher 100MBPS
network speeds that the system is capable of using. We should instead change the transceiver setting on
the combination network adapter cards to UTP.
C: The network uses a 10/100MBPS switch that uses UTP cabling. The network adapters have to be
configured for UTP and not BNC. |
4.You want to install Windows 2000 Professional on 20 new PXE compliant computers, which do not have
operating systems installed. You create a RIS image and load the image onto the RIS server and then
start the new computers. You find that the new computers cannot connect to the RIS server. You verify
that existing client computers on the network can connect to network servers.
What should you do? (SELECT AND PLACE)
Move?
A. W2K AD
B. W2K GC
C. W2K WINS
D. W2K DHCP
Answer: D
(Place the DHCP server in the Place Server Here box.)
Explanation:
A RIS server requires the presence of a DHCP server, and either a WINS server a DNS server
running Active Directory. In the exhibit there is both a DNS server and Active Directory. There is no DHCP
server and no WINS server. However, either a WINS server or a DNS server running Active Directory is
required on the network. As DNS and Active Directory are present there is no need for the WINS server. Both
WINS and DNS with Active Directory are responsible for name resolution. A WINS server is required for
compatibility with older versions of Windows and with non-Windows computers.
|
Incorrect answers: A,B,C
RIS requires a Windows 2000 Active Directory, which already is present in the exhibit.
RIS does not require a Global Catalog.
As DNS and Active Directory are present there is no need for the WINS server. Both WINS and DNS
with Active Directory are responsible for name resolution. A WINS server is required for compatibility
with older versions of Windows and with non-Windows computers. |
5.You are the administrator for your company's network. The network is configured as shown in the
exhibit.
You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing
segment of your network. The new computers do not have operating systems installed.
You create a RIS image. You load the image onto the RIS server. You then start the new computers.
You find that the new computers cannot connect to the RIS server. You verify that the new computers
cannot connect to the RIS server. You verify that the existing client computers in the network can
connect to the network servers, including the RIS server. You want to enable the new computers to
connect to the RIS server.
What should you do?
A. Add a Windows 2000 Server computer running WINS to the network.
B. Add a Windows 2000 Server computer running DHCP to the network.
C. Add the domain Everyone group to the RIS OS image security settings.
D. Place the new computers on the same segment as the RIS server.
Answer: B
Explanation: A RIS server requires the presence of a DHCP server, and either a WINS server a DNS server
running Active Directory. In the exhibit there is both a DNS server and Active Directory. There is no DHCP
server and no WINS server. However, either a WINS server or a DNS server running Active Directory is
required on the network. As DNS and Active Directory are present there is no need for the WINS server. Both
WINS and DNS with Active Directory are responsible for name resolution. A WINS server is required for
compatibility with older versions of Windows and with non-Windows computers. |
Incorrect answers:
A:RIS requires either a WINS server or a DNS server running Active Directory is required on the network.
As DNS and Active Directory are present there is no need for the WINS server. Both WINS and DNS
with Active Directory are responsible for name resolution. A WINS server is required for compatibility
with older versions of Windows and with non-Windows computers.
C: There should be no need to manually configure file permissions on the RIS OS image.
D: Moving the new computers in the same segment will not work since there is no DHCP server present.
Generally RIS works well in networks with subnets. |
6.
You want to upgrade 100 computers from Windows 98 to Windows 2000 Professional. You use setup
manager to create the unattended.txt file. The hardware on each computer is configured identically.
You upgrade 10 of the computers. You notice that the monitors on the 10 computers go blank after
Windows 2000 Professional loads. You restart one of the computers in Safe Mode, and find that the
monitor appears to be working. Which change should you make to unattend.txt to configure your video
settings correctly?
To answer, click the appropriate line on the Unattend.txt-notepad screen.
|

|
A.place it on VRefresh = 150
B.place it on Xresolution = 640
C.place it on BitsPerPel = 8
D.place it on Yresolution = 480
E.place it on InstallDefaultComponents = Yes
Answer: A
Explanation:
The video adapter’s refresh rate defines the number of times that the screen must be rewritten per
second. The higher the resolution, the larger the number of dots that have to be written in every refresh cycle.
Video adapters and monitors have a default refresh rate of 60 Hz. This is setting guaranteed to work on most
modern video adapter and monitors, even with the standard video adapter driver is installed. Not all video
adapters and monitors support a refresh rate of above 80 Hz. When the refresh rate is not supported, the monitor
goes blank or the image becomes distorted.
7.You need to install Windows 2000 Professional on a new computer in your network. You use the setup
manager wizard to configure a fully automated installation script file. You begin an unattended
installation and leave the office. When you return, the installation has reached the GUI-mode setup and you see the following error
message “Unattended setup is unable to continue because a setup parameter specified by your system
administrator or computer manufacturer is missing or invalid.”
You need to complete the installation. What must you do?
A. In the unattended section of the answer file, set the OemPreinstall property to Yes.
B. In the NetBinding section of the answer file, specify the enable variable.
C. In the UserData section of the answer file, specify the ProductID variable
D. In the GUIUnattended section of the answer file set the OemSkipWelcome property to 1.
Answer: C
Explanation: For a fully unattended installation to complete, the ProductID or product registration key, must be
specified in the UserData section of the answer file. The syntax of this key is ProductId = "XXXXX-XXXXXXXXXX-
XXXXX-XXXXX". If this key is missing the error message is returned. |
Incorrect Answers:
A: The OemPreinstall property is used to determine whether a special subdirectory,
\$OEM$, should be copied to the hard drive and certain sections used during setup. This
is an optional property and does not affect the success of an unattended installation.
B: The Netbindings section of the answer file refers to communication channels between various network
components. This section would not generate the error message as the Netbindings section can be used
to specify communication between network components on the target computer once Windows 2000
Professional has been installed on the computer.
D: The OemSkipWelcome property is used to specify whether the Windows Welcome Screen
should be displayed when the system boots during the installation process. This is an
optional setting that does not require user interaction during the installation process and has no effect on
the success of an unattended installation of Windows 2000 Professional.
|
8.You are the administrator of your company's network. The network is configured as shown in the
exhibit.
You want to install Windows 2000 Professional on 10 non-PXE-compliant computers on the marketing
segment of your network. The 10 computers do not have operating systems installed.
You attempt to load the computers by using an existing RIS image that is on the RIS server. You find
that the 10 computers cannot connect to the RIS server.
You verify that existing client computers on the network can connect to network servers, including the
RIS server. You then check the network servers and find that the Windows NT Server 4.0 computer
running WINS has stopped responding due to hard disk failure. You want to enable the computers to
connect to the RIS server.
What should you do? (Choose two)
A. Repair and restart the WINS server.
B. Repair the WINS server and upgrade the server to Windows 2000 Server.
C. Configure the Active Directory server to run DHCP.
D. Configure the static entry in WINS that points to the RIS server.
E. Create and use the RIS boot disk.
F. Run RIPrep.exe to create a non-PXE-compliant startup disk.
Answer: C, E
Explanation: A RIS installation requires the presence of a DHCP server, and either a WINS server or a DNS
server running Active Directory. The DHCP server is required for the automatic distribution of IP addresses
while the WINS server or a DNS server is used for NetBIOS to IP address name resolution. A WINS server is
required for compatibility with computer systems, such as Windows 98, that cannot make use of the DNS
server.
Clients with Non-PXE compliant network cards cannot be booted over the network and therefore require a RIS
boot disk to be able to connect to the RIS server. A boot disk can be created by using the RBFG.EXE utility. |
Incorrect answers:
A: In Windows 2000 the DNS server is responsible for name resolution. The WINS server was a feature of
Windows NT 4.0 and has been superceded by DNS. In a Windows 2000 environment, the WINS server
is used to support computers that cannot make use of Active Directory and DNS. In this scenario there
are no computers that cannot connect to Active Directory and DNS. Therefore the RIS service requires
Active Directory and DNS and not WINS.
B: In Windows 2000 the DNS server is responsible for name resolution. The WINS server was a feature of
Windows NT 4.0 and has been superceded by DNS. In a Windows 2000 environment, the WINS server
is used to support computers that cannot make use of Active Directory and DNS. In this scenario there
are no computers that cannot connect to Active Directory and DNS. Therefore the RIS service requires
Active Directory and DNS and not WINS.
D:A static entry for the RIS server can be created on the DNS server. In a Windows 2000 environment, the
WINS server is used to support computers that cannot make use of Active Directory and DNS. There is
thus no need for a static entry for the RIS server on the WINS server.
F: Riprep.exe is used to launch the RIPrep Wizard. It is not used to create non-PXE-compliant startup
disks. The RBFG.EXE is used to create startup or boot disk. |
9.You are the administrator of a Windows 2000 Professional computer that has a shared printer. Several
departments in your company use the shared printer.
The Sales department frequently prints multiple-page presentation graphics, which take a long time to
print. Users in other departments who have short messages to print must wait an unnecessary long time
for their jobs to print.
You want to improve the efficiency of printing for all users who use the shared printer. You want to
accomplish this with the least amount of administrator effort.
What should you do?
A. Configure the priority of the printer to 50. Add a new printer, and set the priority to 1. For the new
printer, deny print permission for users in the Sales department.
B. Configure the priority of the printer to 50. Add a new printer, and set the priority to 95. For the new
printer, deny print permissions for users in the Sales department.
C. Monitor the print queue, and raise the priority of all print jobs that are sent by users who are not
members of the Sales department.
D. Delete the old printer. Add a new printer, and set the priority to a higher value. Pause the print queue
only when graphic intensive print jobs are printing.
Answer: B
Explanation: Printer priority is used to determine which printer is the preferred printer. The highest printer
priority is 99 and the lowest is 1. When a print job is sent through the network the printer with the highest
priority is used if it is not already busy with another print job. If it is busy printing, the print job is moved to the
printer with the next highest priority. In this scenario we need to dedicate a printer for use by the departments
other than the Sales department, as it is the other departments that have the problem. We therefore require a new
printer and should deny print permissions for users in the Sales department on the new printer. We will want the
other departments to make use of the new printer before they make use of the old printer. We therefore need to
specify a higher priority for the new printer. This will ensure that the other departments’ print jobs are sent to
the new computer first. Only when the new computer is already busy will the print job be sent to the old printer. |
Incorrect Answers:
A:Specifying a priority of 1 for the new computer will give the new printer a lower priority than the
existing printer. All print jobs will thus be sent to the old printer before it is sent to the new printer. This
will not be beneficial for the Sales department as the Sales department is denied access to the new
printer.
C:It is not possible to specify a priority level on the basis of individual print jobs. Printer priority can only
be specified when more than one printer is employed on a network.
D:This proposed solution only uses one printer and requires the administrator to manually pause print jobs
so as to give certain print jobs higher priority. This would require an enormous amount of administrative
effort and is therefore not the best solution. |
10.Your Windows 2000 Professional computer has 10 shared folders that are available to other network
users. A user reports that he cannot access a shared folder named ShareA.
You want to respond to the user’s problem as quickly as possible by using an administrative tool.
However, you cannot remember the server location of ShareA. What should you do?
A. Use Windows explorer to display the file paths of your shared folders.
B. Use storage in computer management to view logical drive properties.
C. Use event viewer in computer management to search for shared folder error messages.
D. Use System tools in computer management to display the file paths of your shared folders.
Answer: D
Explanation: The System tools component of Computer Management Console can used to locate shared
folders. The Computer Management Console can be accessed through the Administrative Tools applet on the
Control Panel. In the Computer Management Console, expand System Tools, expand Shared Folders and then
open Shares to display all shared folders. |
Incorrect Answers:
A:Windows Explorer does not show the location of shared folders in one place. To locate shared folders
through Windows Explorer, we would need to check each directory and subdirectory for a shared folder
icon.
B:Logical Drives properties is used to display the capacity of the local logical drives on the local computer
and the security permissions that have been granted on the logical dive. It does not show any shared
folders in Storage.
C:The Event viewer is used to view log and error messages generated by Windows 2000. It cannot be used
to show information on shares as it does not log any information concerning shared folders.
|
11.Your Windows 2000 Professional computer is configured to support two monitors. You install a DOSbased
application on your computer. The application uses the Windows 2000 Professional default settings
Autoexec.nt and Config.nt.
Your primary and secondary video adapters are both set to 16-bit color, 1024x 768 resolutions, and
default refresh rates. You create a shortcut for the DOS-application on the secondary monitor and use
the default PIF settings.
You attempt to run the DOS-based application on the primary monitor. The application opens, but the
display area is scrambled. You then attempt to run the DOS-based application on the secondary monitor.
The application does not open. Both monitors function correctly when you run Windows-based
applications.
What should you do?
A. Change the color setting for both video adapters to 256 colors. Reconfigure the shortcut properties to
run the DOS-based application in full-screen mode.
B. Change the refresh rate setting to optimal for both video adapters. Reconfigure the PIF settings for the
DOS-based application to start in the window.
C. Change the drivers for the secondary video adapter from WDM-compliant drivers to DOS drivers.
Reconfigure the PIF settings to run the DOS-based application in full-screen mode.
D. Update the drivers for the primary video adapter. Change the secondary video adapter to use 640 x 480
resolution and 256 colors.
Answer: A
Explanation: Some legacy DOS applications can only run in 256 color mode. We should therefore set the
video adapter to 256 colors. Furthermore, if a DOS application fails to display on a secondary monitor, one
possible solution would be to set the DOS application to run in full-screen mode.
|
Incorrect answers:
B: The video adapter’s refresh rate defines the number of times that the screen must be rewritten per
second. This has no bearing on the DOS application because the display would be faulty for Windows
based programs as well if the video adapter does not support the specified refresh rate. Changing the
refresh rate will thus not solve the problem.
C: Windows 2000 works with WDM-compliant drivers. Replacing the WDM-compliant drivers with DOS
drivers could affect the performance of the entire Windows 2000 operating system and could thus make
matters worse.
D: The drivers on the primary video adapter are working since there is no display problem in Windows
based programs. There is thus no need to replace the video adapter’s drivers.
|
12.You are the administrator of the corp.arborshoes.com domain. Users in the domain run Windows 2000
Professional on their desktop computers.
A user named Katrin in the Sales organizational unit reports that her mouse is not working correctly.
You logon to the domain from Katrin’s computer by using a domain administrative account. You use
Device Manager to display current information for the mouse drivers.
You discover that Katrin’s computer is using an older version of the mouse driver. You have a current
driver by the manufacturer of mouse. You install the current driver by the usage of Device Manager and
restart the computer.
You test the mouse and it is still not functioning correctly. You check the problem and see that previous
driver is still installed.
You want to be able to install the correct mouse driver. What should you do?
A. Set the Sales OU policy for security to warn and allow the installation to override the local security defaults.
B. Set the domain policy for security to block but allow the installation to override local and Sales OU security defaults.
C. Set the local computer policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults.
D. Disable, plug and play on Katrin’s computer. Restart the computer and manually setup the system resources for the mouse.
Answer: A
Explanation: Setting the OU security policy to warn will allow Katrin to install the mouse driver. The OU
policy will override any security policy that has been set at local, site and domain level. The policy hierarchy
from lowest is local, site, domain, OU. The OU policies override local, site and domain policies.
|
Incorrect answers:
B:Setting the security policy at the domain level to block will not solve the problem as there is an existing
policy which blocks the installation of the drivers. This policy setting must be overridden. This can be
done by setting the policy at the highest, i.e., OU, level.
C:Local computer policies cannot override the domain or the Sales OU security defaults. Therefore the
policy that is blocking the installation of the drivers will remain in effect. This will thus not solve the
problem.
D:The installation of the mouse drivers is being blocked by a security policy. Disabling plug and play will
not change the security policy in Windows and will not permit the installation of the drivers. By
disabling plug and play, we would be required to make available the system resources that the mouse
would use, however, the policy that is blocking the installation of the mouse driver will still prevent the
drivers from being installed. |
13.You are administering a Windows 2000 Professional, single Pentium II 400Mhz processor computer. You
need to install a new accounting software application. The software manufacturer recommends that you
use a dual-processor configuration. First, you install a second identical processor in your computer.
You need to ensure that you will be able to install the new software.
What should you do next?
A. Update the HAL to support multiple processors.
B. In Device Manager, disable the direct memory access controller.
C. Use the Add/Remove Hardware Wizard to detect and install the driver for the new processor.
D. Reinstall Windows 2000 Professional to support a multi-processor configuration.
Answer: A
Explanation: The Hardware Abstraction Layer (HAL) must be updated using the Device Manager to support
multiple processors. To update the HAL open the System applet in the Control Panel, expand Computer, rightclick
Advanced Configuration and Power Interface (ACPI) PC (or similar), select Properties, select Driver Tab,
then select Update Driver. The Update Device Driver Wizard starts and can be used to update the HAL.
|
Incorrect answers:
B:Disabling the direct memory access controller will not help to support the second processor. It will
likely make the computer run slower.
C:The HAL cannot be updated through the Add/Remove Hardware Wizard, as it already exists on the
computer. The Add/Remove Hardware Wizard is used to add new hardware or to remove existing
hardware. It is not used to update drivers. Device Manager is used to update the HAL.
D:It is not necessary to reinstall Windows 2000. Instead the Device Manager can be used to update the
HAL. |
14.Your Windows 2000 Professional computer has 50 MB of free disk space on drive C and 500 MB free
disk space on drive D. Print jobs are failing because the available space on C is inadequate. You want
printer to be able to use the space on drive D.
What should you do?
A. From the print server properties dialog box, change the location of the spool folder to any existing file
path on drive D.
B. From the printer properties dialogue box, use advanced settings to change the location of the spool
folder to D:\WinNT\System32\spools\printers.
C. Copy the C:\WinNT\System32\spool\printers folder to the D:\WinNT\system32\spool\printers folder.
D. Mount drive C as a subdirectory on the drive D.
Answer: A
Explanation: The location of the spool folder can be specified on the Advanced tab of the Print Server
properties dialog box. To change the spool folder location open the Printers folder, open File menu, select
Server Properties, select Advanced tab, enter the path and the name of the new default spool folder for this print
server, and then click Close.
|
Incorrect answers:
B:The Advanced tab of the Printer Properties dialog box does not contain the location of
the spool folder. It is thus not possible to change the location of the spool folder in the
Advanced tab of the Printer Properties dialog box.
C:Copying the Spool folder to another hard drive will not change the location of the Spool folder as the
location of the spool folder is specified on the Print Server. To change the location of the spool folder
we would have to specify a new location for the spool folder on the Advanced tab of the Print Server
properties dialog box.
D:This is not the correct procedure for mounting a folder. The folder must be mounted to a disk and not a
disk to a folder. |
15.You are the administrator of your company’s network. Your network has 200 Windows 2000
Professional computers and 15 Windows 2000 Server computers. Users on the network save their work
files in home folders on a network server. The NTFS partition that contains the home folders has
Encrypting File System (EFS) enabled.
A user named John leaves the company. You move all of the files from John’s home folder to his
manager’s folder. When the manager attempts to open any of the files, she receives the following error
message; “Access denied.”
You want the manager to be able to access the files.
What should you do?
A. Grant the manager NTFS Full control permission to the files.
B. Grant the manager NTFS Take Ownership permission to the files.
C. Log on to the network as a Recovery Agent. Decrypt the files for the manager.
D. Log on to the network as a member of the Backup Operators Group. Decrypt the files for the manager.
Answer: C
Explanation: An encrypted file on an EFS partition can only be decrypted by the owner of file or by the
Recovery agent.
|
Incorrect answers:
A:Granting the manager NTFS Full control permission of the files will not enable the manager to decrypt
the files, as an encrypted file can only be decrypted by the owner of file or by the Recovery agent.
B:Granting the manager NTFS Take Ownership permission of the files will not enable the manager to
decrypt the files, as an encrypted file can only be decrypted by the owner of file or by the Recovery
agent.
D:A member of the Backup Operators Group can only restore encrypted files from backup. They cannot
decrypt encrypted files. Only the owner of file or a Recovery agent can decrypt an encrypted file. |
16.Your Windows 2000 Professional computer contains a single hard disk configured as a single partition.
You want to move a folder named Sales under a folder named CORP on your computer.
You want the files in the Sales folder to remain compressed after moving the folder. You want the files in
the CORP folder to remain uncompressed. You want to ensure that files are recoverable in case of any
disk problems. You also want to move the files with the least amount of administrative effort.
What should you do?
A. Copy the Sales folder to the Corp folder. Do nothing further.
B. Backup the Sales folder. Move the Sales folder to the CORP folder.
C. Compress the CORP folder then copy the Sales folder to the CORP folder.
D. Move the Sales folder to a second computer then move the Sales folder to the CORP folder.
Answer: B
Explanation: The contents of the Sales folder should be backed up so that files would be recoverable in case of
disk problems. We could the move the Sales folder to the CORP folder, as the files will remain compressed
since the folder is moved within a single partition. The general rules on copying and moving compressed files
and folder are: files and folders copied within a NTFS volume and between NTFS volumes inherits the
compression state of the target folder; files and folders moved between NTFS volumes inherits the compression
state of the target folder; and files and folders moved within an NTFS volume retain the original compression
state of the file or folder.
|
Incorrect answers:
A:A folder copied within a NTFS partition will inherit the compression state of the target
folder. This will result in the Sales folder inheriting the uncompressed state of the CORP
folder since the target folder is uncompressed. Furthermore, we are also required to ensure that the
folder contents are recoverable in the event of a system failure. This solution does not make provision
for the recovery of the folder.
C:A folder copied within a NTFS partition will inherit the compression state of the target folder. This will
result in the Sales folder losing its compressed state since the target folder is uncompressed.
Compressing the CORP folder is also not a viable solution, as the scenario explicitly requires us to retain
the uncompressed state of the files in the CORP folder. Furthermore, we are also required to ensure that
the folder contents are recoverable in the event of a system failure. This solution does not make
provision for the recovery of the folder.
D:Files and folders that are moved between NTFS partitions inherit the compression state of the target
folder. Therefore the Sales folder might lose its compression state. Furthermore, moving the Sales folder
twice is unnecessary as this will not ensure recoverability of the files in the Sales folder. |
17.
You are creating a dial-up connection on your Windows 2000 portable computer to connect to your
customer’s dial-up server. You are not sure which type of server your customer is using for dial-up
connections. You want to ensure that your dial-up connection authentication is secure and that your
logon information is not sent in plain text. You view the Advanced Security Settings dialog box as shown
in the exhibit. Which option or options should you disable in the Advanced Security Settings dialog box? (Choose all
that apply) |

|
A. Unencrypted password (PAP)
B. Shiva Password Authentication Protocol (SPAP)
C. Challenge Handshake Authentication Protocol (CHAP)
D. Microsoft CHAP (MS-CHAP)
E. Microsoft CHAP Version 2 (MS-CHAP v2)
F. For Microsoft CHAP based protocols.
Answer: A
Explanation: PAP is the least complicated authentication protocol and sends passwords in plain text.
Passwords are thus not encrypted passwords. This authentication protocol is used when a more secure means of
authentication cannot be negotiated between two computers. We should therefore disable PAP to ensure that
login information is not sent in plain text.
|
Incorrect answers:
B:SPAP does not support data encryption. Instead it uses a reversible encryption authentication
mechanism.
C:CHAP was designed to overcome the problem of sending passwords in plain text and encrypts the
authentication process by using a challenge-respond method of authentication known as Message Digest 5.
D:MS-CHAP is an improvement of CHAP and uses a similar challenge-response method of authentication.
E:MS-CHAP v2 provides more advanced and improved features than CHAP and MS-CHAP. It uses
mutual authentication, stronger data encryption keys and different encryption keys for sending and
receiving data.
F:All CHAP protocols use an encryption mechanism in the authentication process. |
18.Your company upgrades its network to 100 Mbps. You remove the old network adapter and install a new
10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP
protocol settings to be the same as they were for the previously installed network adapter.
When you restart the computer, however, you cannot access the network. You try to ping your network
adapter’s TCP/IP address locally. You receive the following error message, “Request timed out ” Next,
you try to ping 127.0.0.1 and receive the same error message.
What must you do?
A. Configure a different TCP/IP address.
B. Enable DHCP in the TCP/IP properties.
C. Enable DNS in the TCP/IP properties.
D. Configure the network adapter to run at 100 Mbps only.
E. Replace the network adapter.
Answer: E
Explanation: The 127.0.0.1 IP address is a loop back address that creates a connection with the local computer
via the network adapter. As the same error message was received when pinging the loop back address, a faulty
network adapter card on the local computer is indicated. We therefore need to replace the network adapter card
on the local computer.
|
Incorrect answers:
A:The TCP/IP protocol settings have been configured to be the same as those held with the original
network adapter card. Therefore the problem is not related to the IP address. Furthermore, the 127.0.0.1
IP address is a loop back address that creates a connection with the local computer via the network
adapter. As the same error message was received when pinging the loop back address, a faulty network
adapter card on the local computer is indicated. We therefore need to replace the network adapter card
on the local computer.
B:The TCP/IP protocol settings have been configured to be the same as those held with the original
network adapter card. Therefore the problem is not related to the TCP/IP properties specified in the
network configuration. Furthermore, the 127.0.0.1 IP address is a loop back address that creates a
connection with the local computer via the network adapter. As the same error message was received
when pinging the loop back address, a faulty network adapter card on the local computer is indicated.
We therefore need to replace the network adapter card on the local computer.
C:The TCP/IP protocol settings have been configured to be the same as those held with the original
network adapter card. Therefore the problem is not related to the TCP/IP properties specified in the
network configuration. Furthermore, the 127.0.0.1 IP address is a loop back address that creates a
connection with the local computer via the network adapter. As the same error message was received
when pinging the loop back address, a faulty network adapter card on the local computer is indicated.
We therefore need to replace the network adapter card on the local computer.
D:10/100 network adapters are designed to detect and adjust to the speed of the network. There is thus no
need to configure a 10/100 network card to run at 100 Mbps. Furthermore, the 127.0.0.1 IP address is a
loop back address that creates a connection with the local computer via the network adapter. As the
same error message was received when pinging the loop back address, a faulty network adapter card on
the local computer is indicated. We therefore need to replace the network adapter card on the local
computer |
19.You install Windows 2000 Professional on your computer. Your computer has a built in 33.6 kbps
modem. You install a 56-kbps ISA-based modem.
When the installation is complete, you notice that the 56-Kbps modem is not functioning. You use
computer management to view the modems for your computer.
Device Manager shows that the 33.6 Kbps modem and the 56Kbps modem are conflicting with each
other. You want to configure Windows 2000 Professional to use only the 56Kbps modem.
What should you do?
To answer, click the select and place button and then drag the designated actions to the appropriate
action box for each modem in the diagram. (Note: Both boxes must be filled. If a box does not require a
specified action, use No action required.)
A. A
B. B
C. C
D. D
Answer: A,C
Drag Disable Using Device Manager to PLACE2
Drag No Action Needed to PLACE1
Explanation: The two modems are having a system resource conflict. The 33.6 Kbps modem will not be used
any longer and has been replaced by the 56 Kbps modem. We can therefore disable the 33.6 Kbps modem using
the Device Manager setting on the Hardware tab of the System component of the Control Panel. By disabling
the built-in 33.6 Kbps modem, it will no longer compete for system resources. The system resources would thus
be available for the 56 Kbps modem and it will then work correctly. No action thus needs be taken on the 56
Kbps modem.
|
Incorrect answers:
Installing the 56 Kbps into another slot will not solve the problem as the 33.6 Kbps modem will still compete
for system resources. The 33.6 Kbps modem also cannot be moved to another slot nor can it be removed as it is
built-in on the motherboard. We can therefore only disable the 33.6 Kbps modem. |
20.You are configuring five computers for Windows NT Workstation 4.0 and Windows 2000 Professional.
Each computer has an 8 GB hard disk.
You configure the hard disk on each computer to have two 4 GB partitions. Windows NT Workstation is
installed on drive C, Windows 2000 Professional on drive D.
In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work
files on the disk. You restart your computer and load Windows NT Workstation. You notice that users
can save files to drive D.
You want to prevent users from saving the files to drive D in either operating system. You also want to
ensure that users can access both drives while using either operating system.
What should you do?
A. Use Windows 2000 Professional to configure drive D as a dynamic partition.
B. Use Windows 2000 Professional to enable encrypting file system on drive D.
C. Use Windows NT workstation to configure NTFS permissions on drive D to deny the users write
permission.
D. Reinstall Windows NT Workstation after configuring disk quotas.
Answer: C
Explanation: We can use NTFS permissions to prevent users from saving files to a specific drive, partition or
folder. NTFS permissions can be set on Windows NT computers that use the NTFS file system. Setting the
NTFS permissions to deny users write permissions will prevent the users from saving work files on the disk.
|
Incorrect answers:
A:Windows NT users cannot use dynamic partitions, as dynamic partitions are a storage feature that has
been introduced with Window 2000. Thus, configuring drive D as a dynamic partition will prevent the
Windows NT Workstation users from using the disk. However, the Windows 2000 Professional users
will still be able to make use of the drive and to store files on the drive.
B:The Encrypting File System (EFS) is a file and folder security mechanism used to prevent unauthorized
users from accessing encrypted files. This does not prevent users from saving files on the disk. It only
prevents them from opening and reading encrypted files.
D:Reinstalling Windows NT will not prevent users in Windows 2000 to save files on disk D. As the
installation process does not have an option to prevent users from saving files to specified locations. |
21.You are the administrator of a Windows 2000 network. You need to store secured files for your
company's accounting and legal departments on a Windows 2000 Professional computer.
You want to accomplish the following goals:
• Enable users in both departments to access their own files from the network.
• Enable users in the accounting department to view the legal accounting department’s documents.
• Prevent users in the legal department from being able to view the accounting department’s documents.
• Enable managers within the company to access and modify both the accounting and the legal department’s files.
You take the following actions:
• Create two shared folders named Accounting and Legal.
• Create three groups named Accounting, Legal, and Management.
• Allow the accounting group modify permission on the Accounting folder.
• Allow the legal group modify permissions on the legal folders.
• Allow the management group modify permission on both the accounting and legal folders.
Which result or results do these actions produce? (Choose all that apply)
A. Users in both departments can access to their own files from the network.
B. Users in the accounting department can view the legal accounting department’s documents.
C. Users in the legal department cannot view the accounting department’s documents.
D. Company managers can access and modify both department’s files.
Answer: A, C, D
Explanation: Three groups have been created based on the three departments. This allows us the ability to
grant permissions to files and folders on a departmental basis. We have granted the Accounting group
permission on the Accounting folder and the Legal group modify permissions on the Legal folders. Therefore
these two groups have access only to the folders that pertain to their departments and cannot view the files or
folders that pertain to the other department. In addition, we have granted the Managers group modify
permissions on both the accounting and legal folders. The company managers can therefore access and modify
the files of both departments.
|
Incorrect answers:
B:To gain access to the Legal folder the Accounting department must be granted permissions to those
folders. They have not been granted any permission on the Legal department documents and therefore
they cannot access the Legal folders.
|
22.You are the administrator of your company’s network. A user named Peter runs Windows 2000
Professional on his portable computer. Peter wants to be able to work at home on files that were created
in the office on the company network. Prior to logging off the network and leaving the office, Peter
enables offline files. Peter calls you from home and reports that copies of his folders and files on the
network are not available on his portable computer.
What should you instruct Peter to do?
A. Enable file and print sharing. Peter will be able to access his files at home immediately.
B. Synchronize all offline files. Peter will be able to access his files at home immediately.
C. At the office, make all files available offline. Peter will be able to access his files the next time he logs off the network.
D. At the office, create a shortcut to the Offline Files folder. Peter will be able to access his files the next time he logs off the network.
Answer: C
Explanation: To use files and folders offline the files and folders must be synchronized. This entails the
copying of files onto the portable computer when the user logs off from the network. This will enable the user
to access and work with the files offline. When the user logs on to the server again, the files that had been
altered offline must be copied onto the server to overwrite the outdated files on the server.
|
Incorrect answers:
A:File and print sharing pertains to the sharing of resources over the network. It does not pertain to using files offline.
B:The synchronization of files is dependant on the user requesting the availability of offline files being
logged on to the network as file synchronization is applied on the basis of a user account. Therefore
Peter must be logged on to the network.
D:Offline file synchronization can be applied on folders and files and not on shortcuts to folders. |
23.Five of your company's employees have Windows 2000 Professional portable computers. The employees
use their portable computers in a network enabled docking station when they are at their desks. When
the employees are working outside of the office, they use the portable computers without network
connectivity.
You have just installed wireless PC card network adapters in the portable computers so that the
employees can access the network when they are in the conference rooms in the office building.
You need to configure the portable computers for optimum performance in all of the working
environments. What should you do?
A. Configure the wireless PC card network adapters to use DHCP to obtain their IP addresses.
B. Configure three different hardware profiles on each portable computer.
C. Configure the wireless PC Card network adapters to use Automatic Private IP Addressing when they
cannot detect a DHCP server.
D. Instruct each employee to unplug the wireless PC card network adapter whenever the portable computer
is attached to a network-enabled docking station.
Answer: B
Explanation: To ensure the optimal performance in all three networking environments, we should create three
separate hardware profiles that the users can choose from under different network environments. We should
create a profile to be used when the portable computer is docked at the office; another profile for when the
portable computer is not docked in the office but uses the wireless PC card network adapters; and a third profile
for when the portable computers are used in the filed and are not connected to the network.
|
Incorrect answers:
A:Configuring the wireless PC card network adapters to use DHCP to obtain their IP addresses will not
optimize the network performance of the portable computer in a varying network environment. We need
to create separate profiles that will load only the appropriate drivers and network protocols.
C:Configuring the wireless PC Card network adapters to use Automatic Private IP Addressing when they
cannot detect a DHCP server will not optimize the network performance of the portable computer in a
varying network environment. We need to create separate profiles that will load only the appropriate
drivers and network protocols. Furthermore, when the wireless PC Card network adapters uses
Automatic Private IP Addressing it will only be able to communicate with other computers that are also
using Automatic Private IP Addressing.
D:Unplugging the wireless PC card network adapter whenever the portable computer is attached to a
network-enabled docking station will not optimize the network performance of the portable computer in
a varying network environment. We need to create separate profiles that will load only the appropriate
drivers and network protocols. |
24.You installed an updated device driver for a zip drive on a Windows 2000 Professional computer. You
restart the computer. During the startup process, the computer stops responding.
You then restart the computer in the Safe Mode. During the startup process, the computer stops
responding again. You suspect the new device driver is causing the problem. You want to resolve the
problem so that the computer starts successfully.
What should you do? (Select all that apply)
A. Use the listsvc command to disable the zip device driver.
B. Use the disable command to disable the zip device driver.
C. Select Recovery Console from the repair menu.
D. Select the debug mode from the Windows 2000 advanced options menu.
E. Insert emergency repair disk.
F. Specify the path to the recovery file on the hard disk.
G. Start the computer by using the Windows 2000 Professional CD-ROM.
Answer: B, C, G
Explanation: The Recovery Console is a command-line interface that can be used to access a hard disk of a
Windows 2000 computer system. It can be accessed from the Windows 2000 Professional installation CD-ROM
and can be used to repair an installation of Windows 2000 Professional by repairing the registry or by disabling
a device driver or service. To repair an installation of Windows 2000 Professional by disabling a device driver,
boot the computer from the Windows 2000 Professional installation CD-ROM. On the Welcome to Setup
screen, press R to open the Repair Options screen, and press C to activate the Recovery Console. If we are
unsure of the name of the device driver that is causing the problem we can type ‘listsvc’ to obtain a list of the
device drivers that currently installed on the computer. Then use the DISABLE command to the disable the Zip
device driver. Finally, type ‘exit’ and press enter to restart the computer.
|
Incorrect answers:
A:We can type ‘listsvc’ to obtain a list of the device drivers that currently installed on the computer if we
are unsure of the name of the device driver that is causing the problem. However, the listsvc command
does not disable a device. We must use the DISABLE command to the disable the device driver.
D:Debug mode is a special mode used by software developers. It is used to debug programs and is one of
the Safe Mode options. It cannot be used to disable device drivers.
E:The emergency repair disk (ERD) is a floppy disk that is used to repair a Windows 2000 installation. It
contains autoexec.nt, config.nt and setup.log. It does not contain a copy of the registry and cannot be
used to disable a device driver.
F:Recovery files are not used as part of the recovery process. Instead the Recovery Console should be
used, as the Recovery Console allows us to disable device drivers. |
25.You want to configure your Windows 2000 Professional portable computer to use offline files. The files
that you want to access offline include a large project file and some smaller personal files.
Your portable computer is configured to connect to the network by using the dial up connection at
scheduled times during day to automatically download your e-mail messages. You do not want to
synchronize the project file when you connect to the network using the dial-up connection.
What you should do?
A. Configure the synchronization settings to perform a quick synchronization.
B. Configure the synchronization settings to ask you before synchronizing items.
C. Configure the synchronization settings to synchronize the project file only when using the LAN
connection. Set synchronization for the personal files for both the LAN connection and your dial-up
connection.
D. Set the synchronization settings to synchronize the project file only when you log off the network. Set
synchronization for the personnel files for both the LAN and dialup connection for logging on and
logging off.
Answer: C
Explanation: With Windows 2000 it is possible to have different synchronization settings for every network
connection. In this case one synchronization setting can be used for the LAN connection and another
synchronization setting can be used for the dial-up connection.
|
Incorrect answers:
A:There is no quick synchronization in Windows 2000. Quick synchronization could possibly denote
automatic synchronization. This would not solve the problem though since automatic synchronization on
the dial-up connection is not desired.
B:To ask the user before synchronization would not be a workable solution since a requirement is that the
computer automatically should download e-mail messages during at a scheduled basis.
D:The computer will log off the network when it uses the dial-up connection. This will cause a
synchronization of the project file on the dial-up connection. This is contrary to the requirement. |
26.You install a SCSI adapter and a SCSI tape drive on your Windows 2000 Professional computer. You
start the computer and Windows 2000 Professional detects and installs drivers for the new SCSI devices.
Later the same day, you restart your computer. During the startup process, the computer stops loading
Windows 2000 Professional. You then restart the computer and it stops again.
You want to enable your Windows 2000 Professional computer to start successfully. What should you
do?
A. Start the computer in Safe Mode. Enable driver signing.
B. Start the computer in Safe Mode. Use Device Manager to remove the SCSI tape device.
C. Start the computer by using the Recovery Console. Repair the Master Boot Record by using the fixmbr
command.
D. Start the computer by using the Recovery Console. Disable the SCSI adapter device driver by using the
disable command.
Answer: B
Explanation: There are a number of solutions to take when attempting to remove a newly installed device that
is preventing a computer from starting. The first solution is to restart the computer using the Last Known Good
Configuration. This will load the last hardware and registry configuration that was automatically saved by
Windows 2000 on the last successful start up of Windows 2000. The second solution is restarting the computer
in Safe Mode and using Device Manager to remove the device. A third solution is to use the Recovery Console.
This should be used it the computer cannot start up in Safe Mode. As the option to restart the computer using
the Last Known Good Configuration is not listed as an option, the best answer is to use Safe Mode and use
Device Manager to disable the device driver.
|
Incorrect answers:
A:Although starting in Safe Mode is part of a possible solution, enabling driver signing is not, as the
device driver has already been installed. The device driver should instead be disabled.
C:The fixmbr utility is used to repair the master boot record on the hard drive. It is not used to remove a
device driver that has been installed onto the operating system. It is thus not relevant to this scenario.
D:Although the Recovery Console can be used to disable the device driver, it is not the preferred solution,
as it requires more administrative effort and authority than removing the device drivers in Safe Mode. |
27.You are the administrator of a Windows 2000 Professional computer. You schedule a task to run after 15
minutes. One hour later, the task still has not run.
You notice that your Event Viewer system log has the following error message;
"The task scheduler service failed to start due to following error. The service did not start due to login
failure."
You want to run the scheduler task again. What should you do before restarting the task scheduler
service?
A. Set the task scheduler service to log on using a local system account
B. Set the task scheduler service to allow the service to interact with the desktop
C. Restart the remote producer call (RPC) service.
D. Log off and then log on to an account in power users group.
Answer: A
Explanation: Task Scheduler service must be set to log on using the Local System Account and not a user
account. The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security
principal to log on as a service, as a way of establishing a security context. The Local System account on the
Windows computer always retains the right to log on as a service. Any service that runs under a separate
account must be granted this right.
|
Incorrect answers:
B:The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security
principal to log on as a service, as a way of establishing a security context. The Local System account on
the Windows computer always retains the right to log on as a service. Any service that runs under a
separate account must be granted this right. Allowing the service to interact with the desktop will not
grant the service the required rights.
C:The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security
principal to log on as a service, as a way of establishing a security context. The Local System account on
the Windows computer always retains the right to log on as a service. Any service that runs under a
separate account must be granted this right. Restarting the remote producer call (RPC) service will not
grant the service the required rights.
D:The Task Scheduler is a service and requires ‘Log on as a service’ rights, which allow a security
principal to log on as a service, as a way of establishing a security context. The Local System account on
the Windows computer always retains the right to log on as a service. Any service that runs under a
separate account must be granted this right. Log off and then log on to an account in power users group
will not grant the service the required rights as no user account or user group account can be granted the
‘Log as a service’ right. |
28.A user named Tom reports that applications on his Windows 2000 Professional computer are running
slowly. You notice that Tom’s computer has 64 MB of RAM and 100 MB free disk space. Which method
can you use to improve performance? (Choose all that apply)
A. Add Tom to the power users group.
B. Set the total paging file to 75 percent of physical memory.
C. Perform a disk analysis, and use the disk defragmenter, if recommended.
D. Use disk cleanup to delete temporary files and unnecessary program files.
E. Ensure that the performance options Window is optimized for background services.
Answer: C, D
Explanation: The system in this scenario is showing symptoms of running out of disk space. The Disk Cleanup
utility can be use to free some disk space. It’s also a good idea to defragment the hard drive as a hard drive
which is close to its maximum capacity can become fragmented fast.
|
Incorrect answers:
A:Adding a user to a group will not improve system performance. Users and user groups have an impact
on network performance and not system performance.
B:The recommended setting of the page file is 1.5 times the physical memory, not 75%.
E:On a Windows 2000 Professional computer the performance options should be optimized for
Applications not Background services. |
29.You are the administrator of your company's network. You attempt to install a printer driver on a
Windows 2000 computer for a user Linda.
You receive the following error message: “Error 11-Cannot install printer driver.”
The driver was originally downloaded from the printer manufacturer’s web site. You have successfully
used the driver in the past on their Windows 2000 Professional computers.
You want to configure Linda’s computer to check for driver integrity and to allow you to install this
printer driver.
What should you do?
A. Configure driver signing to display a message before installing an unsigned driver.
B. Configure driver signing to ignore File Signature Verification. Create a Local Computer Policy to enable
Windows file protection.
C. Use the Add Printer driver wizard to install the driver. Create a local computer policy to enable
Windows file protection.
D. Use the print troubleshooter. Configure the computer to prevent the installation of unsigned drivers.
Answer: A
Explanation: The error message in this scenario indicates that the Driver Signing option, File Signature
Verification, is set to Block. Therefore the unsigned driver has to be installed. Changing the File Signature
Verification to Warn will allow the installation of the device driver. It will also show a warning message when
we try to install an unsigned driver. The warning message also contains an option to install the unsigned drivers
anyway. These settings are set in the Driver Signing settings on the Hardware tab of the System applet on the
Control Panel.
|
Incorrect answers:
B:The Driver Signature verification can be set to ignore File Signature Verification. However, Windows
File Protection protects the integrity of the Windows system files. It does not check driver signings
when new drivers are installed.
C:When any attempt is made to install new device drivers, Windows 2000 checks the File Signature
policy. Thus, when using the Add Printer driver wizard the File Signature policy is checked.
Furthermore, Windows File Protection protects the integrity of the Windows system files. It does not
check any device drivers.
D:The print troubleshooter cannot be used to prevent installation of unsigned drivers. |
30.Users report that some shortcuts on the start menu of their Windows 2000 Professional computers are
hidden. They want to access their shortcuts without having to click a scroll arrow.
How must you configure the client computers to always display all Start menu shortcuts?
A. In the folder options dialog box, clear the enable web content check box in My Desktop Properties.
B. In the display properties dialog box, clear the transaction effects for menus and tool tips check box.
C. In the folder options dialog box, clear the hide file extensions for known file types check box.
D. In the Taskbar and Start Menu Properties dialog box, clear the Use Personalized Menus check box.
Answer: D
Explanation: Personalized Menus keeps the Programs menu clean by hiding items that have not been used
recently, while retaining the accessibility of all the other programs. When Personalized Menus is enabled,
Windows 2000 keeps track of which programs are used, and hides the programs that have not been used
recently. The Start Menu Properties dialog box is accessed by clicking the Start button, selecting Settings, and
then selecting Taskbar and Start menu.
|
Incorrect answers:
A:Disabling the web content check box in My Desktop properties only affects the desktop setting. It does
not affect the Start Menu property.
B:Transaction effects for menus and tool tips is a visual effect, which is used when you open menus. It
does not affect the Start Menu property.
C:Showing file extensions of known file types will not influence the Start Menu property. |
31.You are the administrator of your company’s network. Your company is based in Russia and conducts
the majority of its business in Russian. Users in your company create, view, and edit documents in
English (US), French, and Spanish to communicate with vendors internationally.
Users run the Russian localized edition of Windows 2000 Professional on their desktop and portable
computers. A user named Katrin wants to create word processing documents in both English and
Spanish by using Notepad in Windows 2000 Professional. She requests your assistance in enabling
English and Spanish on her computer.
What should you do?
A. Instruct Katrin to select the desired input locale for either English or Spanish within Notepad.
B. Instruct Katrin to select the input locale indicator on the taskbar and select either English or Spanish.
C. Instruct Katrin to use Regional Options in Control Panel to add input Locales and keyboard layouts/IME
for both English and Spanish.
D. Create a Local Computer Policy for Katrins computer to include both English and Spanish.
Answer: C
Explanation: Multiple input languages can be enabled on a Windows 2000 computer. An additional input
language can be enabled by clicking on the Regional Options applet in Control Panel, selecting the Input Locale
tab, then pressing the Add button, and selecting the desired input language from the drop down list.
|
Incorrect answers:
A:The input locale cannot be changed from within Notepad. The input locale for the languages must be
added before they can be selected from the task bar.
B:The input locale indicator cannot be used to switch languages unless the computer has been configured
to use another language.
D:The local Computer policy cannot be configured to include both English and Spanish. It could be used to
allow Katrin to use Multilingual support. |
32.You want to connect to your company network from your Windows 2000 Professional computer at home.
You have an ISDN line that is used for Internet connectivity. You create a VPN connection and are able
to connect successfully to the company network. While connected to the company network, you are
unable to access the Internet.
What must you do so that you can access the Internet?
A. Configure the ISDN connection to use SLIP instead of PPP.
B. Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.
C. Clear the Use default gateway on remote network checkbox.
D. Install and configure the SAP Agent service.
Answer: C
Explanation: If the connection is using the default gateway on the remote network, it will be able to access
computers on the remote network but it will not be able to access Internet.
|
Incorrect answers:
A:SLIP is a legacy protocol. It can only be used on servers. It enables a remote connection from a
Windows 2000 Server to a Unix server, which cannot handle PPP.
B:Internet Connections Sharing would enable the sharing of this connection at the client side. It will not
help to solve the problem of Internet connectivity.
D:SAP is a distance-vector-based advertising protocol commonly used on IPX internetworks to advertise
services and their locations. RRAS also provides the ability to configure static SAP services and SAP
service filters. SAP service filters reduce unneeded SAP traffic from being sent of RRAS connection.
Installing and configuring a SAP Agent service is thus not appropriate to this scenario. |
33.You are the administrator of a Windows 2000 network. You install Windows 2000 Professional on a new
computer and configure the TCP/IP settings to have a static IP address.
While testing network connectivity from the new computer, you discover an error in the DNS server
address that is configured in the TCP/IP settings. You configure the correct DNS server address, which is
10.1.1.5. However, you are still unable to successfully connect to network resources by name.
You run the IPconfig/all command. The results indicate that the DNS server address is now configured as
0.0.0.0
You need to ensure that the computer can connect to network resources by name. What should you do?
A. Stop and restart the DNS client service.
B. Add 10.1.1.5 to the DNS server list on the TCP/IP advanced properties tab.
C. Add an A (host) record for the computer to the DNS server’s zone file.
D. Configure your DHCP server to have a DNS server address of 10.1.1.5.
Answer: A
Explanation: In this scenario the client computer does not have the correct information in its local DNS cache.
There are two ways to solve this problem. We could use ipconfig /flushdns to reset the DNS cache, or we could
stop and restart the DNS client service.
|
Incorrect answers:
B:The correct DNS address is already configured. When we enter a preferred DNS Server IP address, this
address is automatically added in the DNS server list on the TCP/IP Advanced properties tab. The DNS
Server list is used to add more than 2 DNS servers.
C:The client cannot find the DNS server. Adding an A (host) record for the client computer would only
help other computer to find the client computer but will not enable the client to find the DNS server.
This solution is thus not appropriate to the problem in this scenario.
D:The client computer has a static IP address and does not use a DHCP server to for IP configuration
information. Therefore, changing the DNS server’s IP address in the DHCP is in appropriate. |
34.From your Windows 2000 Professional computer, you need to map drive G to the default administrative
share on drive C of a server named AppSrv.
What can you do to map the drive?
A. Run the net share C$=G:\ command.
B. Run the net use G: \\AppSrv\C$ command.
C. Browse to AppSrv in Windows Explorer, and map drive G to the C$ share.
D. Browse to AppSrv in My Network Places, and map drive G to the C$ share.
Answer: B
Explanation: The root of each volume on a hard disk is automatically shared, and the share name is the drive
letter appended with a dollar sign ($). The appended dollar sign causes the share to be hidden. One method of
mapping a share to a logical drive is to open the command prompt and type the command: NET USE
devicename \\computername\sharename. In this scenario this translates to the command: net use G:
\\AppSrv\C$
|
Incorrect answers:
A:The net share command is used to create shares not to connect to existing shares on another computers in the network.
C:It is not possible to browse to the administrative share C$ on AppSrv since this is a hidden share.
D:It is not possible to browse to the administrative share C$ on AppSrv since this is a hidden share. |
35.You are using Windows Installer to deploy an application to 750 Windows 2000 Professional computers
on your network. The network includes an organizational unit (OU) named Sales. A Group Policy object
(GPO) is created for the Sales OU. The software deployment of the application is unsuccessful. During
the deployment, some users in the Sales OU report that the installation is aborting with random errors
midway through the installation process. The remaining users in the Sales OU report that the software is
installing, but is giving them general protection fault errors.
What should you do?
A. Repackage and redeploy the application’s .msi file to the Sales OU.
B. Repackage and redeploy the application’s .mst file to the Sales OU.
C. Redeploy the application by using the Group Policy object (GPO) for the Sales OU.
D. Restart Windows Installer on all computers in the Sales OU. Then redeploy the application’s .zap file to
the Sales OU.
Answer: A
Explanation: It seems likely that the software package in this scenario is not a native Windows Installer
package, since there are multiple errors in the installation process. Repackaged application (.msi) files could be
used to repackage applications that do not have a native Windows Installer package (.msi).
|
Incorrect answers:
B: .mst files cannot be used to deploy an application. .mst files are used to transform .msi files at the time
of assignment or publication.
C: There is no problem with the GPO in this scenario, as the software installation actually finishes on some
computers. The installation files need to be repackaged and redeployed.
D: The .zap file of an application is the original setup.exe program. Redeploying the .zap file would result
in exactly the same sort of problems since no changes have been made in the deployment strategy. |
36.You are the administrator of a Windows 2000 Professional portable computer that is shared by users in
the Sales department. You want to configure a roaming user profile for each user. You want each
individual user profile setting to be available from any location, including by using a dial-up connection.
You log on to the computer by using local administrator account. You create user accounts for the users
in the Sales department. When you attempt to configure each individual user account profile to be a
roaming profile, you find that you cannot. You receive the change profile type dialog box as shown in the
exhibit.
You want to be able to configure each user account to use a roaming user profile. What should you do?
A. From system in control panel, select the change type option, and then select the roaming profile option.
B. From users and passwords in control panel, select the advanced tab, and then define the path for the profile location.
C. Use the network connection wizard to create a virtual private network connection to the network, and define a mandatory profile path on each domain user account.
D. Connect the portable computer to the network, and configure the user accounts for a roaming user profile.
Answer: D
Explanation: Roaming profiles are used for users who log on to the network from different computers but who
require the same desktop setting regardless of which computer they use to logon. To be able to configure a
roaming user profile the computer must be physically connected to the network and you must be logged onto to
the network, as the roaming user profile has to be stored on the network so that the user can have access to the
profile regardless of which computer he or she is logging onto the network from.
|
Incorrect answers:
A: We cannot change the type option to a roaming profile if we have not logged onto the network, as the
roaming user profile has to be stored on the network so that the user can have access to the profile
regardless of which computer he or she is logging onto the network from.
B: We cannot define profile paths on domain accounts if we have logged on to a computer with the local
administrators account. The local administrators account only provides access to the local computer and
not to the network. We need to be logged on to the network with a domain account, as the roaming user
profile has to be stored on the network so that the user can have access to the profile regardless of which
computer he or she is logging onto the network from.
C: We cannot define profile paths on domain accounts if we have logged on to a computer with the local
administrators account. The local administrators account only provides access to the local computer and
not to the network. We need to be logged on to the network with a domain account, as the roaming user
profile has to be stored on the network so that the user can have access to the profile regardless of which
computer he or she is logging onto the network from. |
37.You are delegated administrative control of the administration organizational unit. The administration
OU has 12 Window 2000 Professional computers that were recently purchased. Each computer has a Fax
Modem. Each computer has the fax service installed with default values and settings.
A user named Helene reports that she can use Microsoft Word 2000 to send faxes, but she cannot receive
any faxes by using the fax printer. She also informs you that she cannot reconfigure the fax service on her
computer.
You want to reconfigure fax service correctly. You want to accomplish this with least amount of
administrative effort. You logon to Helene’s computer by using local administrator account. What should
you do next?
A. Use Fax service management to start the fax service, and configure the fax service to start automatically.
B. Use fax service manger to select the fax management service, and enable the device to receive faxes.
C. Use fax in control panel to reinstall the fax service, and configure the fax services to receive faxes.
D. Use fax in control panel to add a fax printer, and configure the fax print device to receive faxes.
Answer: B
Explanation:To configure a fax device to receive faxes first open the Fax Service Management Console from
the Control Panel select the Fax applet, choose the Advanced Tab, select Fax Service Management Console,
open Devices, right-click on the Fax device, select Properties then select Enable receive.
|
Incorrect answers:
A: The Fax Service is already running since Helene is able to send faxes. Therefore, configuring the fax
service to start automatically will not change anything in this scenario.
C: There is no need to reinstall the fax service, as Helene is able to send faxes. Instead we should use the
fax service management to enable the existing fax device to receive faxes.
D: There is no need to add a fax printer. Instead we should use the fax service management to enable the
existing fax device to receive faxes. |
Explanation: When the automated detection of hardware through the use of the Add/Remove hardware wizard
fails, the hardware must be installed manually by selecting the Have Disk option. The information on the disk
provided by the hardware manufacturer can then be used to
install the hardware.
|
Incorrect answers:
B: Safe Mode is used to resolve Windows start up problems and runs with the minimum number of
standard device drivers required to load the operating system. It is not used to install new devices.
C: Driver signing is a software setting designed to protect the operating system from conflicts that could
arise from the installation of untested, and therefore unsigned, drivers. Furthermore, Windows 2000 in
configured to use driver signing by default and the driver signing policy only comes into effect during
the installation of the hardware. It would therefore not aid in the detection of new hardware.
D: The problem is not that Windows cannot find the drivers for the SCSI device. Windows cannot detect
the hardware. Copying the driver onto the hard drive will not help to detect hardware. Furthermore, the
Add/Remove hardware wizard has a Have Disk option, which can be used to locate the hardware drivers
on the disk. |
39.You are the administrator of your company’s network. A user named Lilly prints dozens of documents
daily from her Windows 2000 Professional computer. Lilly reports that she receives a dialog box
announcing that each print job she sends has printed successfully.
Lilly’s default printer is a shared printer that is connected to Windows 2000 Server computer. She wants
to have this notification turned off because she has so many documents.
What should you do?
A. In the server properties of the printer system folder, clear the Notify when remote documents are printed
option.
B. In the server properties of the printers system folder, clear the notify computer, not user, when remote
documents are printed option.
C. In the default printer properties, select the Ports tab, and clear the Enable bidirectional support option.
D. In the default printer properties, select the Advanced tab, and clear the advanced printing features
option.
Answer: A
Explanation: To turn off the notification that a print job has printed successfully we must clear the “Notify
when remote documents are printed” option on the Advanced tab of the Print Sever properties. The Print Server
properties can be accessed via the File menu in the Printers folder.
|
Incorrect answers:
B: This option specifies whether the notification should be sent to the computer or the user. By clearing this
setting the notification will be sent to the user. We do not want this notification to be sent. Therefore we
should clear the “Notify when remote documents are printed” option.
C: Disabling the bidirectional support option will prevent the print device from communicating with the
printer on the server. The printer will still be sending notification messages to users of the printer. The
bidirectional support option should be enabled so that the print device could report printer problems
such low toner etc.
D: The advanced printing features option concerns metafile spooling and options such Page Order, Booklet
Printing, and Pages Per sheet. Disabling this option will not disable the notification of print jobs. |
40.You are the administrator of your company's network. A use named Michael has limited dexterity, which
prevents him from using a standard keyboard to complete his daily computing tasks. You want to
configure his Windows 2000 Professional computer to use the appropriate accessibility options.
You logon to Michael’s computer by using Michael’s user account, which is a member of local users
group. You configure the stickykeys, filterkeys and togglekeys options. You then log off.
Michael logs on to the computer by using this user account. Michael is able to use the accessibility option
that you have configured. However, when he returns from lunch, the accessibility options are
automatically turned off.
What should you do?
A. Use Accessibility Options in control panel to reconfigure accessibility idle time settings.
B. Use Accessibility Options in control panel to enable the filterkeys option to reconfigure the time setting.
C. Use Utility Manager to configure the accessibility options to start automatically when Windows 2000
Professional loads.
D. Use Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and
save the settings.
Answer: A
Explanation: By choosing Accessibility Options in Control Panel, then selecting the General tab, you are able
to increase the idle time settings. By doing this Michael would be able to return before the accessibility features
automatically are turned off. The Accessibility Options can be found by clicking on the Start Menu, on
Accessories, and then on Accessibility.
|
Incorrect answers:
B: Filter Keys settings cannot be used to reconfigure accessibility idle time settings.
C: We have configured the accessibility settings and logged off. Michael then logged on and the
accessibility settings were still in effect. Therefore the problem does not occur when Michael logs on to
the computer, it occurs when the computer has been idle for some time. Therefore increasing the idle
time before the option is set off would solve Michael’s problem.
D: We cannot use the Utility Manager to increase the accessibility ideal time setting. The Utility Manager
is used to start, stop the Magnifier, the Narrator and the On-Screen Keyboard. The Utility manager can
also start these program automatically when Windows Starts or when the Utility Manager starts. |
41.From your Windows 2000 Professional computer, you need to print from a 16-bit accounting application
to a network printer named Printer02. Printer02 is attached to a print server named PrtSrv. The
accounting application allows you to print only to a local LTP port.
You currently have two printers attached to your local LPT1 and LPT2 ports. You need to be able to
print to the network printer and to both local printers. You install the driver for the network printer on
your computer.
What must you do next to enable printing on the network printer?
A. Create a new local printer port named PrtSrv\Printer02, and configure the printer to use the new port.
B. Create a new local printer port named PrtSrv\Printer02. In the properties for the new port, select the
option to print directly to the printer. Configure the printer to use the new port.
C. Run the net use Lpt3 \\PrtSrv\Printer02 command.
D. Run the net print\\PrtSrv\Printer02 command.
Answer: C
Explanation: The net use command is the only method available for accessing a network printer from client
computers that are running 16-bit DOS applications.
|
Incorrect answers:
A: Legacy 16-bit DOS programs cannot use new local printer ports. They can only use the LPT1, LPT2,
LPT3 or LPT4 ports. Those ports have to be used with the net use command.
B: Legacy 16-bit DOS programs cannot use new local printer ports. They can only use the LPT1, LPT2,
LPT3 or LPT4 ports. Those ports have to be used with the net use command.
D: Net print displays or controls print jobs and print queues. It is not used to perform the actual printing. |
42.You install Windows 2000 Professional on a computer named Client2. The network configuration is
shown in the exhibit.
You connect to the shared resources on ServerE daily. Today, you cannot connect to ServerE. Heather
can connect to ServerE successfully from her computer. You ping ServerE to find out the nature of the
problem as shown in the Ping results exhibit.
You verify that all of the servers are connected to the network and are running correctly.
What is the most likely cause of the problem?
A. The router configuration.
B. The WINS configuration on Client2.
C. The WINS configuration on ServerE.
D. The default gateway setting on Client2.
Answer: A
Explanation: The servers on the various network segments can communicate with servers on the same network
segment. Therefore the problem must lay with the router configuration, as communication across the router is
not successful.
|
Incorrect answers:
B: In the exhibit we see "Reply from 10.10.164.3: Destination host unreachable". This shows the Client2
communicates with the Router, which is the Default Gateway. So the WINS configuration on Client2 is
not the cause of the problem.
C: Heather, who is on the same subnet as ServerE, is able to communicate with ServerE. Therefore there is
no WINS configuration problem on ServerE.
D: Client2 does communicate with the Default Gateway (the Router in this case). We see this in the exhibit:
the replies from 10.10.164.3 |
43.You install Windows 2000 Professional on your computer at home. You create a new dial-up connection
to connect to your company's remote access server. You configure the connection to use both of your
external modems and to use Multilink to bind the modems together.
You start the dial-up connection to connect to the remote access server. You notice that only one of the
modems is connected to the remote access server.
What should you do?
A. Configure the dial-up connection to use a SLIP connection.
B. Configure the company's remote access server to accept Multilink connections.
C. Replace your modems with new modems that support Multilink.
D. Grant your user account Multilink permission on the company's remote access server.
Answer: B
Explanation: To use multilink modems, multilink must be enabled at the client and at the server. In the
scenario the multilink is enabled at the client only. We therefore need to enable it at the server as well.
|
Incorrect answers:
A: SLIP is a legacy protocol. It can only be used on Servers. It enables a remote connection from a
Windows 2000 Server to a UNIX server, which cannot handle PPP.
C: Multilink is a feature of Windows 2000, it’s not a feature of modems. All modems can be used in a
Multilink connection.
D: There is no such thing as a Multilink permission in Windows 2000. |
44.You configure your Windows 2000 Professional computer for Internet Connection Sharing and for
TCP/IP filtering as shown in the exhibit.
You test your TCP/IP filtering configuration from another client computer. You can access web sites, but
you cannot access FTP sites.
What should you do to be able to access FTP sites?
A. Add Port 21 to the TCP Ports section.
B. Add Port 138 to the TCP Ports section.
C. Add Port 21 to the IP Ports section.
D. Add Port 138 to the IP Ports section.
Answer: A
Explanation: The FTP protocol uses the TCP port 21. In the exhibit the UDP port 21 has been incorrectly
added instead of the TCP port.
|
Incorrect answers:
B: The FTP protocol uses Port 21 not Port 138.
C: The port 21 should be added at a TCP port 21. Not as a UDP port or as an IP protocol. IP is also a
network protocol and not a port.
D: The FTP protocol uses TCP port 21 not Port 138. IP is also a network protocol and not a port. |
45.You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0
to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the
necessary applications on 10 computers. You have returned these computers to their users.
The users of these computers report that their word processing application will not start.
What should you do?
A. Set the permissions on the application to execute.
B. Add the application to the urn key in the registry.
C. Apply the Securews.inf security template on the users’ computers.
D. Apply the Compatws.inf security template on the users’ computers.
Answer: D
Explanation: The Compatws.inf template relaxes access controls for the Users group and is therefore well
suited for Windows 2000 clients that need compatibility with older applications.
|
Incorrect answers:
A: The file permissions of the application file cannot be the problem since the application worked before
the upgrade and the upgrade process does not change any file permissions on applications.
B: There is no urn key in the registry to which applications can be added.
C: The Securews.inf template would put even more restriction on the users. It would not help the user’s to
run their application. |
46.You are the administrator of your company’s network. An employee named Mark is leaving the
company. A new employee named Eric has been hired to replace him.
Mark has a local user account on Windows 2000 Professional computer. Mark has rights to multiple files
and folders on the computer.
You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark
will no longer have access to the files and folders. You want to accomplish this with least administrative
effort.
What should you do?
A. Rename Mark’s user account to Eric and change the account password.
B. Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.
C. Create Eric’s account by copying Marks account. Delete Mark’s account.
D. Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged.
Grant Eric to all the individual user rights and permissions that Mark had.
Answer: A
Explanation: A user account and the permission and rights attached to them can easily be transferred to another
user by renaming the account and changing the password. By renaming Mark’s user account and by changing
the password, Eric will have the same rights and permissions as Mark had and Mark will not be able to use his
old account. This provides the solution with least administrative effort.
|
Incorrect answers:
B: Copying Mark’s profile to Eric’s account will not give Eric the permissions Mark had. Instead Eric will
have the same desktop and hardware profile.
C: Every user account has a unique Security Identifier (SID). When Mark’s account is copied the resulting
account, Eric’s account, will not have the same permissions.
D: This solution will meet the requirements of this scenario, however, it is not the solution with the least
administrative effort. Therefore this is not the best solution. The best solution would be to rename Marks
account and change the password. This would provide Eric with the same rights and permission that
Mark had and would not require us to do any additional administrative work on Eric’s account. |
47.Your Windows 2000 Professional computer belongs to the contoso.com domain. You need to encrypt a
compressed file named c:\data. You successfully encrypt the file but discover that it is not longer
compressed.
What is the most likely cause of this problem?
A. A group policy is preventing the compression of encrypted files.
B. The file is stored on a FAT32 partition.
C. Only members of the administrators and the power users groups can compress and encrypt files.
D. Encrypted files cannot be compressed.
Answer: D
Explanation: A compressed file cannot be encrypted and an encrypted file cannot be compressed. If we encrypt
a compressed file, the file will first be uncompressed and then encrypted. It will no longer be compressed and
neither will we be able to compress it once it has been encrypted.
|
Incorrect answers:
A: There is no Group Policy that prevents compression of encrypted files. A file can either be encrypted or
compressed, but not both.
B: The FAT32 file system does not support compression or encryption.
C: Any user with appropriate file permissions, and not only administrators or power users, are able to
compress and encrypt files. |
48.You are the administrator of your company’s network. The dial-up server on your network is configured
to support certificate authentication. A user names Tom wants to use smart card authentication on his Windows 2000 Professional portable
computer. You verify that the Toms computer has a PC card smart card reader and the appropriate
driver installed. You give to Tom a smart card to use.
What else should you do to enable smart card authentication on Tom’s computer?
A. Configure a dial-up connection to use EAP. Select the smart card device for authentication.
B. Configure a dial-up connection to use SPAP. Select the smart card device for authentication.
C. Configure a dial-up connection to use certificate authentication. Enable the users credentials for
authentication.
D. Configure a dial-up connection to connect to a private network through the Internet. Enable L2TP to
create a virtual private network (VPN) tunnel.
Answer: A
Explanation: Extensible Authentication Protocol (EAP) is an extension to PPP and works with dial-in, PPP and
L2TP clients. The authentication methods used by EAP include smart cards.
|
Incorrect answers:
B: SPAP cannot be used for smart card authentication. Only EAP can be used for smart card authentication.
C: Only EAP, and not other certificate authentication methods, can be used for smart card authentication.
D: To be able to create a VPN tunnel the dial-up server must be configured for L2TP server. This has not
been done in the scenario and is therefore inappropriate. |
49.You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to
Windows 2000 Professional. All of the upgraded computers are configured to have the default security
settings. After the upgrade, users in the accounting department report that they can no longer run any financial
or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only
the rights that allow users to run the applications.
What should you do?
A. Add each user account to the Power Users group on that user’s computer.
B. Configure the financial and credit applications to run as services on the computers in the accounting
department.
C. Apply the Compatws.inf security template to the local security policy of the computers in the accounting
department.
D. Use the computer management console to configure separate memory spaces for each financial and
credit application on the accounting department computers.
Answer: C
Explanation: The Compatws.inf template relaxes access controls for the Users group and is therefore well
suited for Windows 2000 clients that need compatibility with older applications.
|
Incorrect answers:
A: Adding each user account to the Power Users group might allow them to use the application but this will
give the user accounts too much administrative rights. This is therefore not a good solution.
B: Applications cannot, in general, be configured to run as services. Only services can log as services.
D: The computer management console cannot be used to configure memory spaces for applications. |
50.You are the administrator of your company’s network. Ten Windows 2000 Professional computers are
located in research department. The computer contains highly confidential information.
You want the 10 computers to be able to communicate with other Windows 2000 Professional computers
on the network. However, you do not want them to communicate with computers that are not running
Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.
You want to configure a security policy on each computer to ensure that the confidential information is
secure.
What should you do?
A. Use security configuration and analysis to import the Hisecws.inf security template file to modify the
default security settings.
B. Use security templates to create a security template file and import the security settings to modify the
default security settings.
C. Use the local computer policy to disable the access this computer from the network option.
D. Use Secedit.exe to reconfigure the computer default security settings to not allow anonymous access to
the computer.
Answer: A
Explanation: The Hisecws.inf, the highly secure template, is used to require maximum protection for network
traffic and protocols used between computers running Windows 2000. As a result, such computers configured
with a highly secure template can only communicate with other Windows 2000 computers. They will not be
able to communicate with computers running Windows 95, Windows 98, or Windows NT.
|
Incorrect answers:
B: It is possible to make the appropriate changes to the security template manually but this is a daunting
administrative task. It would be easier to use a predefined security template.
C: The Windows 2000 computers must be able to access each other. We therefore cannot disconnect the
local computer form the network.
D: Anonymous access is not handled by the security settings. It is handled by enabling or disabling the
Guest account, and by giving or restricting permissions to the Everyone group.
Disabling anonymous access, by disabling the Guest account and removing permissions from the
Everyone group, would differentiate between Windows 2000 computers and downlevel Windows
systems. |
51.You are the administrator of a Windows 2000 network. Your network includes 75 Windows NT
Workstation 4.0 computers. You are adding 50 new PXE-compliant computers to the network. The
hardware on each computer is configured identically.
You are using a RIS image to deploy Windows 2000 Professional to the 50 computers. You successfully
install Windows 2000 Professional on the first 10 computers. However, you cannot install Windows 2000
Professional on remaining 40 computers.
What should you do?
A. Configure the DHCP scope to add additional IP addresses.
B. Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.
C. Modify the startup sequence in the CMOS of the remaining computers.
D. Create computer accounts on the remaining computers in the active directory.
Answer: A
Explanation: In this scenario, the DHCP server has run out of IP-addresses. By extending the scope by 40 IP
addresses the installation on the remaining computers will be successful. Note: RIS requires Active Directory,
DNS and DHCP. The clients can either be PXE-compliant or they could use a Remote boot diskette.
|
Incorrect answers:
B: Rbfg.exe is used to create Remote Boot disks for computers that do not have PXE-compliant network
cards. In this scenario, all clients are PXE-compliant and will thus be able to boot through the network
and access the RIS image. It is thus not necessary to create Remote Boot disks.
C: The 50 new computers have identical hardware. There installation worked on 10 of the new computers.
There can thus be no incorrect startup sequence setting in CMOS.
D: In this situation there is no need for prestaged computer accounts in the Active Directory. Pre-staged
computer accounts are used to select between RIS servers. By configuring the RIS server to answer only
known client computers it would require user accounts for all RIS clients. This is not the default setting. |
52.You need to install Windows 2000 Professional on 35 new computers on the company LAN.
First, you create a distribution folder on the network server. Then you create a network boot disk to
install Windows 2000 Professional from the distribution folder.
Now you need to create a batch file, which the network boot disk will execute to start the installation. You
must specify a source path and temporary drive for the installation files.
You also need to install the accessibility options within the batch file. The batch file must execute a
hardware-specific application to run after the GUI-mode Setup has completed.
Which command must you specify in the batch file?
A. Z:\i386\winnt/s:z:\i386/t:d/a/e:z:\hardware\setup.exe
B. Z:\i386\winnt/s:z:\i386/rwinnt.tmp/a/e:z:\hardware\setup.exe
C. Z:\i386\winnt32/s:z:\i386/tempdrive:d/cmd:z\hardware\setup.exe
D. Z:\i386\winnt32/s:z:\i386/cmdcons:z:\hardware\setup/makelocalsource
Answer: A
Explanation: Winnt must be used to start the installation process from a boot diskette. The /t:d switch specifies
that the D drive should be used to contain temporary setup files; the /a switch specifies an installation with
accessibility options; and the /e[:command] switch specifies a command to be executed at the end of Setup’s
GUI mode.
|
Incorrect answers:
B: This command does not specify the drive should be used to contain temporary setup files. To specify a
temp drive the /t switch must be used. The /r switch specifies an optional folder that must be installed on
the hard drive.
C: Winnt32 is a 32-bit application and can only be used from inside a Windows environment and not after
starting the computer by means of a boot diskette. A computer can only be booted into DOS mode from
a boot disk, and DOS mode cannot use 32-bit applications.
D: Winnt32 is a 32-bit application and can only be used from inside a Windows environment and not after
starting the computer by means of a boot diskette. A computer can only be booted into DOS mode from
a boot disk, and DOS mode cannot use 32-bit applications. |
53.You are the administrator of your company's network. You want to install Windows 2000 Professional
on 10 non-PXE-compliant computers that are on the marketing segment of your network. You start one
of the computers by using a RIS boot disk. However, you cannot connect to the RIS server.
You verify that existing client computers on the network can connect to network servers, including the
RIS server. You discover that the network router does not support BOOTP. You want to enable the new
computers to connect to the RIS server.
(Note: Both boxes must be filled. If a box does not require a server, use No server needed)
What should you do?
A. PLACE1 = A , PLACE2 = B
B. PLACE1 = C , PLACE2 = D
C. PLACE1 = B , PLACE2 = E
D. PLACE1 = E , PLACE2 = A
Answer: D
Drag DHCP Relay Agent to PLACE 1
Drag NO SERVER NEEDED to PLACE 2
Explanation:
RIS requires Active Directory, DNS and DHCP. These services must be accessible to all RIS
clients. The Router does not support BOOTP; it is not RFC 1542 compliant. The DHCP traffic does not reach
the segment of the DNS server. The DHCP server cannot register the RIS clients in DNS. This makes the RIS
server inaccessible to the RIS clients. This problem can be solved by putting a DHCP relay agent on the upper
segment. There is no other communication problem. The existing computers on the lower segment can
communicate with the Server on the upper segment. Therefore No Server Need must be added in Place 2.
54.You are creating a shared Internet connection on your Windows 2000 Professional computer. You want
to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.
What should you do? (Choose all that apply)
A. Configure your shared Internet connection to disable LCP extensions.
B. Configure your shared Internet connection to disable on-demand dialing.
C. Create an Internet connection sharing application type for HTTP to use remote server for port 25.
D. Create an Internet connection sharing application type for HTTP to use remote servers port 80.
E. Create the Internet connection sharing application type for FTP to use remote server port 21.
F. Create an Internet connection sharing application type for FTP to use remote server port 72.
Answer: D, E
Explanation: HTTP traffic uses TCP port 80 and FTP traffic uses TCP port 21 for session control and port 20
for data transfer. Therefore, by enabling TCP port 80 and TCP port 21 only HTTP and FTP traffic will be
allowed. All other network traffic will not be allowed.
|
Incorrect answers:
A: LCP extensions are used in the context of RRAS and PPP. It is not used to prevent or allow any specific
type of network traffic.
B: Disabling on-demand dialing on the shared Internet connection will not prevent network traffic. It will
only prevent ICS clients to initiate an Internet connection.
C: HTTP uses TCP port 80, not TCP port 25. FTP also does not use TCP port 25. It uses TCP ports 20
answer 21. SMTP uses TCP port 25.
F: Neither FTP or HTTP uses port 72. |
55.You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your
company's network. Your computer currently has an ISA network adapter installed. You install a second
ISA network adapter.
After you restart your computer, you notice that the second ISA network adapter is not functioning.
What should you do?
A. Set the driver signing option to block.
B. Set the driver signing option to ignore.
C. In the computer’s BIOS, reserve an unused IRQ for ISA devices.
D. In the Device Manager, configure the second ISA network adapter to use an unused IRQ.
Answer: D
Explanation: The Device Manager is used to configure the system resources used by a hardware device. The
system resources of legacy ISA devices must be set manually. This can be done in Device Manger, By rightclicking
the device in Device Manager, choosing Properties, and then selecting the Resources tab, we can
change the system resources, such as the IRQ setting, used by the device.
|
Incorrect answers:
A: Setting the driver signing option to block will prevent the installation of unsigned drivers. This will not
enable the second ISA adapter to work properly.
B: Setting the driver signing option to ignore would allow the installation of unsigned drivers. This will not
enable the second ISA adapter to work properly. This is also not the current problem since the scenario
does not mention any problems with unsigned drivers.
C: Reserving IRQs in the BIOS will not prevent any legacy ISA device using that IRQ, it would only
prevent Plug and Play (PnP) devices from using that particular IRQ. Reserving IRQs in the BIOS could
be used when PnP Devices and legacy devices use the same IRQ. In that case we could reserve an IRQ
in BIOS, which would prevent the PnP device from use it, and allow the legacy device use it instead. |
56.You are upgrading computer1 to computer2 from Windows NT Workstation 4.0 to Windows 2000
Professional. You successfully upgrade the computer1. During the upgrade of computer2, a series of
power outrages interrupts the upgrade.
You discover that upgrade of computer2 is incomplete. Furthermore, you find that computer2 can no
longer run Windows NT workstation 4.0. Computer2 does not support booting from Windows 2000
Professional CD-ROM. You decide to use computer1 to help recover the failed upgrade.
What should you do?
A. On computer1, copy the CD-ROM driver and system files named ntdetect, ntbootdd.sys, Ntdll.dll and
Setupldr.bin to a formatted floppy disk. On computer2, restart the computer by using the floppy disk.
Then run WinNT32/debug from the Windows 2000 Professional CD-ROM.
B. From computer1, copy the CD-ROM driver and system files named Ntdetect, Ntbootdd.sys, Ntdll.dll,
and Setupldr.bin to a formatted floppy disk. On the computer2, restart and upgrade by using the floppy
disk. Then run WinNT32/rx from the Windows 2000 Professional CD-ROM.
C. On the computer1, run Makebt32.exe from the Bootdisk folder on the Windows 2000 Professional CDROM.
On computer2, restart the upgrade by using the newly created floppy disks.
D. On computer1, perform a remote installation from a network share. On computer2, when the text portion
of setup has completed, resume the installation by using the Setup Manager.
Answer: C
Explanation: We can create the four setup boot disks by using either makeboot.exe or makebt32.exe. Both are
located in the \Bootdisk directory on the Windows 2000 installation CD. These disks can be used to restart the
installation process on computer2.
|
Incorrect answers:
A: We cannot create a NT boot diskette by copying files to a diskette. Winnt32 is a 32-bit application and
can only be used from inside a Windows environment and not after starting the computer by means of a
boot diskette. A computer can only be booted into DOS mode from a boot disk, and DOS mode cannot
use 32-bit applications.
B: We cannot create a NT boot diskette by copying files to a diskette. Winnt32 is a 32-bit application and
can only be used from inside a Windows environment and not after starting the computer by means of a
boot diskette. A computer can only be booted into DOS mode from a boot disk, and DOS mode cannot
use 32-bit applications.
D: The text portion of the setup on computer2 will not be completed. To use a network installation on
computer2, computer2 must be booted with a network boot disk. |
57.You need to install Windows 2000 Professional on 30 new computers. You also need to deploy a Windows
2000 Professional service pack during the installation.
First, you create a network distribution folder named InstallFiles. You copy the i386 folder from the
Windows 2000 Professional CD to the InstallFiles folder.
What should you do?
A. Copy the service pack files to the InstallFiles\Misc folder.
B. Copy the service pack file sot the InstallFiles\$OEM$ folder.
C. From an existing client computer, run the update –u command from the service pack to the InstallFiles
folder.
D. From an existing client computer, run the Update –s:InstallFiles command from the service pack to the
InstallFiles folder.
Answer: D
Explanation: Service pack slipstreaming refers to a service pack being integrated with an updated version of
Windows 2000 on a CD-ROM or on a network share. When Windows 2000 is installed from either source, the
appropriate files from the service pack are installed without having to manually apply the service pack after the
installation. To apply a new service pack, run Update.exe with the -s:distribution_folder switch, where
distribution_folder is the name of the folder that contains the Windows 2000 installation files. Note: In some
material Microsoft refers to update /slip. This is incorrect, update –s is used.
|
Incorrect answers:
A: We cannot apply a service pack by simply copying them to a folder named Misc.
B: We cannot apply service simply by copying them to a folder named $OEM$. The $OEM$ folder is used
to provide supplemental files to be copied to target computer during Setup. These files include drivers,
utilities, applications, and any other files required to deploy Windows 2000 Server within an
organization. The $OEM$ folder must be located inside the distribution share.
C: We use update-s not update-u to perform service pack slipstreaming. This solution thus does not use the
correct switch. |
58.You are the administrator of a Windows 2000 Professional computer named computer1. Computer1 has
a shared color laser printer named printer1. Printer1 will not turn on.
The printer queue for printer1 has three jobs waiting to print. You want to enable the three waiting print
jobs to print to an identical print device, which has been shared as printer2 on computer2. You also want
to connect users who currently connect to printer1 to automatically use printer2 without having to
reconfigure their default printer.
What should you do?
A. Enable bidirectional support for printer1.
B. Change the share name of printer2 to printer1.
C. Configure printer1 to add a port, and set the port to \\computer2\printer2.
D. Configure the printer server properties to use the path \\computer2\$winnt$\system32\spool\printers.
Answer: C
Explanation: Because both print devices use the same printer drivers, they are identical. This makes it possible
to redirect the print jobs. To redirect all print jobs from printer1 to printer2 we must add the port
\\computer2\printer2 to printer1.
|
Incorrect answers:
A: Disabling the bidirectional support option will prevent the print device from communicating with the
printer. This will prevent us from redirecting the print jobs.
B: Changing the share name of printer2 to printer1 will not redirect any printer jobs as we would still have
two distinct printers name \\computer1\printer1 and \\computer2\printer1. Instead we should add the port
\\computer2\printer2 to printer1 so as to redirect all print jobs from printer1 to printer2.
D: The actual path to the spool folder is not used for redirecting print jobs. It is used to save pending print
jobs. To redirect all print jobs from printer1 to printer2 we must add the port \\computer2\printer2 to
printer1. |
59.You have implemented the Hisecws.inf security template on all the Windows 2000 Professional client
computers in your network.
A user has received a driver and utility software for an internal SCSI controller in his computer. He uses
the manufacturer-provided CD to install the driver and the utility. He restarts the computers and reports
that the internal SCSI controller is not working correctly. You discover that the driver is not installed
correctly.
What should you do?
A. Disable the security template. Reconfigure the driver signing option. Install the driver. Enable the
security template
B. Reconfigure the driver signing option. Disable the security template. Install the driver. Enable the
security template.
C. Run the Sigverif command. Reconfigure the driver signing option. Install the driver
D. Run the Sigverif command. Disable the security template. Install the driver. Enable the security template
E. Run the Sfc/cancel command. Install the driver. Run the Sfc/enable command
Answer: A
Explanation: To reinstall the correct drivers, the security template must first be disabled. This will allow us to
alter the driver signings policy, which we would reconfigure to either Ignore or Warn. This allows us to install
the unsigned the drivers. Once the correct drivers have been installed we must reapply the security template.
|
Incorrect answers:
B: The Hisecws.inf template does not allow any reconfiguration of the driver signing option. The security
template must be disabled before the driver signing option is reconfigured.
C: Sigverif cannot be used to configure the driver signing option. The File Signature Verification utility
(Sigverif) is used to find unsigned device drivers. Sigverif allows us to view the file's name, its location,
its modification date, its type, and its version number.
D: Sigverif cannot be used to disable the security template. The File Signature Verification utility (Sigverif)
is used to find unsigned device drivers. Sigverif allows us to view the file's name, its location, its
modification date, its type, and its version number |
60.A folder on your Windows 2000 Professional computer contains bitmap files that have been compressed
from 2MB to 1MB. You want to copy one of the compressed bitmap files from the hard disk to 1.4-MB
floppy disk.
When you attempt to copy, you receive the following error message ‘Destination drive is Full’.
What should to do?
A. Move, rather than copy, the compressed bitmap file to the floppy disk.
B. Reformat the floppy disk. Then copy the compressed bitmap file to the floppy disk.
C. Use another program to compress the bitmap file before copying it to the floppy disk.
D. Copy an empty compressed folder to the floppy disk. Then copy the compressed bitmap file to the folder
on the floppy disk.
Answer: C
Explanation: Windows 2000 file compression only works on the NTFS file system. However, floppy disks
make use of the FAT file system. When compressed files are copied from an NTFS drive to a FAT or FAT32
drive, the file loses it compressed state and become uncompressed. We therefore require another application to
compress the bitmap file. We could for example use Winzip, WinRar, WinAce or Micosoft’s compress.exe.
|
Incorrect answers:
A: Windows 2000 file compression only works on the NTFS file system. However, floppy disks make use
of the FAT file system. When compressed files are moved from an NTFS drive to a FAT or FAT32
drive, the file loses it compressed state and become uncompressed. In which case the file would be too
big to fit on the floppy disk.
B: Floppy disks can only be formatted with the FAT file system. It cannot be formatted with the NTFS file
system. Windows 2000 file compression only works on the NTFS file system. However, floppy disks
make use of the FAT file system. When compressed files are moved from an NTFS drive to a FAT or
FAT32 drive, the file loses it compressed state and become uncompressed. In which case the file would
be too big to fit on the floppy disk.
D: When compressed folders are moved from an NTFS drive to a FAT or FAT32 drive, the folder loses it
compressed state and becomes uncompressed. When a compressed file is then moved to the folder it too
becomes uncompressed. In which case the file would be too big to fit on the floppy disk. |
61.On a Windows 2000 Professional computer, you run a shipping application that prints packing labels to a
laser printer for every outgoing shipment, 24 hours per day. During peak hours, your company ships
more than 1,000 packages per hour.
You have just purchased a second identical laser printer to aid in printing. You want to configure the
printers so that the jobs are load balanced. You connect the second laser printer to the computer.
What must you do next?
A. Enable bi-directional support.
B. Enable printer pooling.
C. Configure print spooling.
D. Configure print sharing.
Answer: B
Explanation: To load balance print jobs on two printers we must create a printer pool. The printer pool will
then automatically distribute the print jobs to the first available print device and the print jobs will be load
balanced.
|
Incorrect answers:
A: Disabling the bidirectional support option will prevent the print device from communicating with the
printer. This will not help in load balancing the print jobs.
C: Print spooling configuration cannot be use to load balance the print jobs. We need to create a printer
pool to enable printer load balancing.
D: Print sharing configuration cannot be used to load balance the print jobs. Print sharing concerns rights
and permission on the printers. Instead we should create a printer pool to enable printer load balancing. |
62.You are the administrator of a Windows 2000 network. You replace the uniprocessor computers in the
graphics department with 25 new MPS-compliant computers. Each computer has two 550-MHz
processors.
You install the software that users need to perform their work. The software includes Win32-, Win16-,
and DOS-based applications.
Users report that when they use a Win 16-based application, they do not notice an improvement in
performance compared to using the uniprocessor computers. You want the users in the graphics
department to be able to see a noticeable improvement in performance.
What should you do?
A. Use Device Manager to install the MPS-compliant driver for the second processor.
B. Use Device Manager to install the ACPI-compliant drivers for the second processor.
C. Run the Win 16-based application in a separate memory space.
D. Replace the Win 16-based applications with available Win32-based applications.
Answer: D
Explanation: Legacy 16-bit software cannot take advantage of multiple processors processing. The Win16-
applications therefore cannot use the second processor and should be replaced with Win32-based applications.
|
Incorrect answers:
A: The MPS-compliant computers are computers that are Multiprocessor System-compliant and are new.
However, since there are no complaints concerning the performance of the Win32-based applications in
this scenario, we can therefore assume that the MPS-compliant driver for the second processor has been
installed.
B: ACPI is related to power management and not multiprocessor support. It is therefore not relevant to this
scenario.
C: Separating the memory space of the Win16-based applications will not make them use the second
processor as Win16-applications are not able to make use multiple processor systems. |
63.You are the administrator of a Windows 2000 network. The network is configured as shown in the
exhibit.
Computers on the Sales subnet run Windows 2000 Professional. These computers are dynamically
assigned IP addressing and configuration information from a DHCP server on the subnet.
Computers on the development subnet run Windows 98. These computers are statically assigned IP
addressing and configuration information.
Users on the Sales subnet report that they cannot communicate with users on the development subnet. A
user who works on computer3 reports that he cannot communicate with computers on either subnet. You
want all users to be able to communicate with other users on both subnets.
What should you do? (Choose two)
A. Change the frame type to 802.2 on computer3.
B. Change the default gateway option IP address on the DHCP server.
C. Change the default protocol on the computers on the Sales subnet to NWLink IPX/SPX/NetBIOS
Compatible Transport Protocol.
D. Enable TCP/IP protocol with the default settings on Computer3.
E. Add the NetBEUI protocol to the binding order on all client computers.
Answer: B, D
Explanation: The computers on the Sales subnet cannot communicate with any computers on the development
subnet, but they communicate with each other with the exception of computer3, which cannot communicate at
all. An incorrect default gateway address on the computers on the Sales subnet explains why they cannot
communicate with the development subnet. This problem is resolved by changing the default gateway option on
the DHCP server. Computer3 needs to be configured with the TCP/IP protocol to be able to communicate with
the other computers.
|
Incorrect answers:
A: Changing the frame type to 802.2 on computer3 would allow computer3 to communicate with the other
computers on the Sales subnet, but it would not allow communication with the computers on the
development subnet which all use TCP/IP.
C: Changing the default protocol to NWLINK on the Sales subnet would not allow them to communicate
with the development TCP/IP-configured computers.
E: NetBEUI is not a routable protocol. It would not allow communication between the subnets. |
64.You install Windows 2000 Professional on your portable computer. You have an external CD-ROM
drive that is connected to the parallel port on your computer.
When you start the Windows 2000 Professional, you cannot see the CD-ROM drive in Windows
Explorer. You use computer management to scan for hardware changes. The CD-ROM drive is not
found.

|

To view the port setting tab and the resources Tab of the ECP printer port properties dialogue box as shown in the exhibit. |
You want to enable Windows 2000 Professional to detect the CD-ROM driver. What should you do?
A. Configure the parallel port to never use an interrupt.
B. Configure the parallel port to use the automatic resource setting.
C. Configure the parallel port to use any interrupt assigned to the port.
D. Configure the parallel port to enable legacy plug and play detection.
Answer: D
Explanation: An external CD-ROM using the parallel port is a legacy device. Modern External CD-ROM
devices use USB (or PCMCIA). To ensure that Windows 2000 will detect a legacy external CD-ROM attached
to the parallel port we must enable Legacy Plug and Play detection for the port in the computer’s bios.
|
Incorrect answers:
A: An interrupt is a system resource. There are four types of system resources: input/output (I/O) port,
direct memory access (DMA) channel, interrupt request (IRQ) line, and memory address. The parallel
port does require an interrupt to communicate with the system. We therefore cannot configure the port
not to use interrupts.
B: Automatic resource setting is enabled for Plug and Play devices. It doesn’t enable the detection of
Legacy devices unless Legacy Plug and Play detection on the port has to be enabled.
C: Devices and ports are configured to use the system resources that are assigned to it. This will therefore
not aid in the detection of Legacy devices. However, enabling Legacy Plug and Play detection on the
port can solve this problem. |
65.You are administrator of your company’s network. Your company has offices in New York, Madrid,
Paris and Tokyo.
A user named Carmen works in the New York office, but she often travels to the Madrid office. Carmen
uses the multi-language version of Windows 2000 Professional on her portable computer. She needs to be
able to access both an English and Spanish user interface, input locale, and keyboard layout/IME.
When Carmen is in the New York office, she logs on to the network by using the Carmen_eng user
account. She is given the English user interface, input locale and keyboard layout/IME. When Carmen is
in the Madrid office she logs on to the network by using the Carmen_span user account. She is then given
the Spanish interface, input locale and keyboard layout/IME.
Carmen reports that when she logs on to the network by using the Carmen_eng user account, she is not
allowed to add any languages to her computer other than English, which is already installed.
What should you do?
A. Add the Spanish keyboard layout/IME for the Carmen_eng user account profile.
B. Add the English keyboard layout/IME for the Carmen_span user account profile.
C. Reconfigure the Group Policy Object for the Carmen_eng user account to allow her to change the
languages on her computer.
D. Configure the Group Policy Object for the Carmen_span user account to allow her to change the
languages on her computer.
Answer: C
Explanation: Group Policy Objects are used to configure the language settings on a computer. To configure it
we should open Administrative Tools, open Group Policy, select Local Computer Policy, select User
Configuration, select Administrative templates, select Control Panel, open Regional options and disable Restrict
Selection of Windows 2000 menus and dialogs language. This policy restricts users to the specified language,
by disabling the menus and dialogs control in the Regional Options control panel. If the specified language is
not installed on the target computer, the language selection will default to English.
|
Incorrect answers:
A: A user profile contains folders and data that store the user's current desktop environment, application
settings, and personal data. It also contains all the network connections that are established when a user
logs on to a computer. A user profile cannot be used to allow installations of additional keyboard/IME
layout.
B: A user profile cannot be used to allow installations of additional keyboard/IME layout.
D: We want to enable Carmen to add the Spanish keyboard layout/IME when she is logged on as
Carmen_eng not to add the English keyboard layout/IME Carmen_span. We do not want her to change
the language locale. |
66.You are the administrator of your company’s network. A user named Andrew has limited dexterity,
which prevents him from using standard keyboard when completing his daily computing tasks.
You configure the Windows 2000 Professional computer to use the on-screen keyboard and stickykeys
option. You save the accessibility option settings to a shared folder on the local hard disk of Andrew’s
computer.
You want to configure the same options for a user named Peter. You logon to Peters computer using
Peter’s login user account. You access the shared folder over the network from Peter’s computer. You
select the .acw file from the shared folder to a set up Peter’s computer to use the accessibility options.
You receive the error message shown in the exhibit.
Accessibility Wizard |
There was a problem loading the file specified when running the accessibility wizard.
OK |
What should you do?
A. Copy the .acw file to the c:\documents and setting\default user folder.
B. Save the accessibility options to a floppy disk and change the permissions to allow full control of the
file.
C. Resave the settings for the options by using utility manager. Then copy the file to Peter’s local profile
folder.
D. Change the permissions of the .acw file in the shared network folder to allow read access for Peter’s user
account.
Answer: D
Explanation: The error message from the wizard indicates that Peter does not have permissions to the .acw file
that contains the accessibility options. To be able to continue, Peter’s permissions to the file must be changed to
Read.
|
Incorrect answers:
A: Peter is using another computer. The c:\documents and setting\default user folder on Andrew´s computer
is not shared by default. Peter wouldn’t be able to access .acw.
B: Using a floppy disk for the .acw file is not a good solution. Even if it works, which is doubtful, it would
be very awkward for the user.
C: The utility manager cannot be used to save the accessibility settings. The .acw is produced by the
Accessibility Wizard. The .acw file can be copied in Windows with, for example, Windows Explorer. |
67.You install Windows 2000 Professional on a new APM-compliant portable computer. You notice that
whenever you attempt to shut down the computer, the Windows 2000 shutdown screen remains on the
screen as the power remains on.
You attempt to shut off the computer by using Power Button, but you want the computer to shut off
when Windows 2000 Professional shuts down.
What should you do?
A. Restart the computer, disable APM in the system BIOS, and then restart the computer.
B. Restart the computer, use power options in control panel to enable APM, and restart the computer.
C. Restart the computer, use power options in control panel to enable hibernate support, and then restart the
computer.
D. Restart the computer, use power options in control panel to create a different power scheme, and then
restart the computer.
Answer: B
Explanation: As APM is used on older computers while ACPI is the new Power Management standard, the
APM might need to be enabled on some APM systems. This can be done from the Control Panel by opening the
Power Options, selecting the APM tab and checking Enable Advanced Power Management Support.
|
Incorrect answers:
A: Our first option should be to check if the computer works correctly with the APM enabled. If the
problem still occurs the next option would be disable the APM in BIOS.
C: Hibernation enables the computer to shut down and save its current state, and later return to that state.
Enabling hibernation will solve the problem in this scenario.
D: Creating a different power scheme saves a collection of Power Options settings. It does not address the
problem. |
68.You are the administrator of the Coho Vineyard network. The network consists of 10 Windows
2000Advanced Server computers and 250 Windows 2000 Professional computers.
Your company has two domains cohovineyard.com and westcoastsales.com.
The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA
is in the cohovineyard.com domain and is running Internet Information Services and Microsoft Proxy
Server2.0.
You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to
access the intranet site. You want users to be able to connect to the intranet site by using the URL
http://serverA rather than its fully qualified domain name.
What should you do?
A. Add cohovineyard.com to the domain suffix search order on the computers.
B. Add westcoassales.com to the domain suffix search orders on the computers.
C. Add westcoassales.com to the exceptions list in the Proxy server settings on the computers.
D. Configure the Proxy server settings on the computers to bypass the proxy server for intranet addresses.
Answer: A
Explanation: ServerA is located in the domain cohovineyard.com. If we add cohovineyard.com to the domain
suffix then http://ServerA will translate to http://ServerA.cohovineyard.com, which would resolve this problem.
This configuration can be done by opening TCP/IP properties, selecting the Advanced Button, selecting DNS
Tab, selecting append these DNS Suffixes (in order), selecting Add, and entering cohovineyard.com
|
Incorrect answers:
B: ServerA is located in the cohovineyard.com domain not in the westcoastsales.com domain.
C: The domain suffix must be used to configure the connection, and not the proxy server settings.
D: By configuring the proxy setting to bypass the proxy server for intranet addresses, we would prevent
intranet access from accessing external DNS servers. It also would not allow users to use the shorthand
URL of http://serverA. |
69.Your desktop computer has Windows 2000 Professional installed. You create a new dial-up connection to
connect to the Internet. You configure the Internet connection to enable Internet Connection Sharing.
After you configure the connection, you cannot see or connect to any shared resources. You want your
computer to be able to connect to shared resources.
What should you do?
A. Configure the dial-up connection to disable shared access.
B. Configure the dial-up connection to disable on-demand dialing.
C. Disable data encryption in the new dial-up connection.
D. Use the ipconfig command to release and renew your network TCP/IP address.
Answer: D
Explanation: When ICS is configured the IP address for the ICS internal adapter changes to 192.168.0.1. with
a subnet mask of 255.255.0.0. The other clients in the local network still have their old IP addresses. If their IP
addresses are released and renewed they will get a correct IP configuration from the mini-DHCP server, which
is included in ICS. The ICS clients would get IP addresses in the range of 192.168.0.2-192.168.0.254 and a
subnet mask of 255.255.0.0. They would be able to communicate amongst themselves.
|
Incorrect answers:
A: This would disable the ICS. As we want to keep the Internet Connection sharing, this would not be a
good solution.
B: Disabling on-demand dialing prevents the ICS client computers from establishing an Internet
connection. This might not be a good solution since this is a dial-up connection. Furthermore, this will
not solve the problem in this scenario.
C: Data encryption setting on the dial-up would not cause any problems with local shares. Therefore this
solution will not solve the problem. |
70.You are configuring a Windows 2000 Professional portable computer to use a dial-up connection to
connect to a routing and remote access server. The computer has a smart card reader and appropriate
drivers installed.
You install the MMC to request a new certificate. You install the certificate to use the smart card. You
want to use your smart card for authentication when you connect to the routing and remote access
server. You want to use the advanced security settings dialog box as shown in the exhibit.
Which option or options should you enable in the Advanced Security Settings dialog box?
A. Use Extensible authentication protocol (EAP)
B. Unencrypted Password (PAP)
C. Shiva Password Authentication Protocol (SPAP)
D. Challenge Handshake Authentication Protocol (CHAP)
E. Microsoft CHAP (MS-CHAP)
F. Microsoft CHAP Version 2 (MS-CHAP v2)
G. For MS-CHAP based protocols, automatically use my Windows logon name and
password (and domain, if any)
Answer: A
Explanation: By using EAP, support for a number of authentication schemes may be added, including token
cards, one-time passwords, public key authentication using smart cards, certificates, and others. |
Incorrect answers: EAP is the only authentication protocol used for smart card authentication. The other protocols are not used for
this purpose. |
71.You want to prevent a Windows 2000 Professional computer named Payroll5 from communicating on
your network with Windows NT 4.0, Windows 95, and Windows 98 computers. You want to enable the
payroll5 computer to communicate on your network with other Windows 2000 computers only.
What should you do?
A. Close all NetBIOS ports in the advanced TCP/IP options of Payroll5.
B. Import the Hisecws.inf security template to payroll5.
C. Disable access this computer from network in the local security policy settings for payroll5.
D. Clear all WINS client settings on payroll5.
Answer: B
Explanation: The Hisecws.inf is the security template that requires highest level of security and the maximum
protection for network traffic and protocols used between computers running Windows 2000. As a result,
computers configured with a highly secure template can only communicate with other Windows 2000
computers. They will not be able to communicate with computers running Windows 95, Windows 98, or
Windows NT. |
Incorrect answers:
A: Closing NetBIOS ports will affect Windows 2000 and downlevel Windows clients similarly. In other
words it will affect the ability of all other computers to communicate with the computer.
C: Disabling the “Access this computer from network” setting would prevent all other computers,
including Windows 2000 computers, from accessing the computer through the network.
D: Clearing the WINS client settings on payroll5 will not prevent Windows 95, Windows 98 or Windows
NT computers from communicating with payroll5. |
72.You use a shared Windows 2000 Professional computer. You notice that some of your Microsoft Word
documents that were on the local hard drive have been deleted. You restore the documents from a recent
backup.
You want to be able to track all users who access your word documents in the future. What should you
do? (Choose two)
A. Enable the local group policy for auditing object access events that are successful.
B. Enable the local group policy for auditing object access events that are unsuccessful.
C. Enable the local group policy for auditing process tracking events successful.
D. Enable the local group policy for auditing process tracking events that are unsuccessful.
E. Use the Windows 2000 explorer to enable auditing for your files.
F. Run the diskperf –y command. Use system monitor to examine the logical I/O counter. Restart the
computer.
Answer: A, E
Explanation: Auditing is a two-step process. First we must enable the auditing on the right kind of object; in
this scenario we would want to audit ‘Object Access’. This includes files, folders and printers. We must also
decide if we are going to audit success, or failure, or both success and failure. In this scenario we will use
success since we want to audit access of the word documents. Then we must use Windows Explorer to enable
the auditing on specific resources. In this scenario which files and folders should be audited. |
Incorrect answers:
B: We must track successful object access, not unsuccessful, since we want to track the access of the word
documents.
C: To track access to Word documents we must use audit object access and not process tracking.
D: To track access to Word documents we must use audit object access and not process tracking.
F: The diskperf –y switch was used in Windows NT 4.0 to enable physical disk performance counters.
These counters are enabled by default in Windows 2000. Furthermore, performance counters cannot be
used to audit network access. |
73.You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You
want to give a new employee named Maria the ability to back up files, share resources, and install
programs on a client computer that she shares with other users. You do not want Maria to be able to
read other users’ files.
What should you do to accomplish these goals? (Choose all that apply)
A. Add Maria’s user account to the system group.
B. Add Maria’s user account to the interactive group.
C. Add Maria’s user account to the power user group.
D. Add Maria’s user account to the administrators group.
E. Add Maria’s user account to the Backup Operators group.
Answer: C, E
Explanation: By adding Maria’s user account to the power user group Maria will inherit the ability to share
resources and install programs that are conferred on members of the power user group. To grant Maria the
ability to backup files she must be added to the Backup Operators group, which has the permissions to backup
files. As a member of this group Maria will be able to backup files as she will inherit those rights by virtue of
being a member of that group. Maria will not have permissions to read the users’ files as neither the power user
group nor the Backup Operators group has the permissions to read other users’ files. |
Incorrect answers:
A: The system group is a collection of the built-in groups. System groups do not have specific memberships
that can be modified. We cannot thus add users to system groups.
B: The interactive group is a built-in group, which includes the user account of the user who is currently
logged on to the computer. User accounts cannot be added to this built-in group.
D: Adding Maria’s user account to the administrators group would give her too much permissions and
rights. She would be able to perform all the required functions but she will also be able to read other
users’ files. |
74.A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional
computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is
located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found
in the folder properties.
What should you do to enable the user to encrypt the folder?
A. Log on to her computer as an administrator, and then run the cipher/e command.
B. Instruct the user to run the chipper/e command.
C. Log on to her computer as an administrator, and then run the Secedit/enforce command.
D. Instruct the user to run the Secedit/enforce command.
E. Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.
Answer: E
Explanation: Any ordinary user should be able to encrypt files as long as they have the appropriate permission
to the files and the folder and as long as the file system supports file encryption. The only file system that
supports file encryption is the NTFS file system. If this file system is not in use, the option to encrypt files will
not be shown. As no option for file encryption can be found, we can assume that the disk uses the FAT or
FAT32 file system. This would need to be converted to NTFS to support file encryption. We would need to log
on as an administrator and run Convert d:/FS:NTFS in the command prompt, which can be called by clicking on
the start button, clicking on Run and the typing cmd in the dialog box. This allows us to convert the drive to the
NTFS file system without affecting the data on the drive. We however cannot convert a drive back to FAT or
FAT32. |
Incorrect answers:
A: Any user who has access to a file can encrypt the file. We therefore do not require administrative
privileges to encrypt the file and thus we do not need to log on with the Administrator account.
B: Windows 2000 does not support a chipper command. It does support a cipher command. The Cipher /e
command would encrypt files on an NTFS partition.
C: Secedit is used to apply security templates. The secedit command does not have a /enforce switch.
D: Secedit is used to apply security templates. The secedit command does not have a /enforce switch. |
75.Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After
the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer
connect to the network. The remaining 80 Windows 2000 computers in the company can connect,
however. Your company uses NWLink as the only network protocol.
You need to connect the computers in the marketing department to the network.
What must you do?
A. Configure the NWLink frame type of the network adapters to be ethernet 802.3.
B. Configure the NWLink frame type of the network adapters to be ethernet II.
C. Replace the network adapters with 10/100 BNC adapters.
D. Replace the network adapters with 10/100 UTP network adapters.
Answer: D
Explanation: The hubs, switches and other network devices have been upgraded to 100Mbps. It thus seems
likely that the 20 computers with network connection problems in this scenario are using 10Mbps network
adapters. These need to be upgraded to 100Mbit or to 10/100Mbit network adapters.
Since the network is a category 5 Ethernet network the network adapters must also support UTP. |
Incorrect answers:
A: The computers were working properly before the upgrade. The NWLink protocol can be used in
100Mbps network without any problems. Therefore changing the frame type will not solve the problem.
B: The computers were working properly before the upgrade. The NWLink protocol can be used in
100Mbps network without any problems. Therefore changing the frame type will not solve the problem.
C: A category 5 network uses UTP cabling not thinnet BNC connectors. |
76.You are preparing to install Windows 2000 Professional on 100 MPS-compliant computers. Each
computer has two 550 MHz processors. The computers are configured identically.
You want to use one of the computers as a reference computer for deploying Windows 2000 Professional
to the remaining computers. You install Windows 2000 Professional on the reference computer. You view
the Device Manager and notice that the drivers for the second processor are not installed.
You want to add support for the second processor and the remaining 99 computers. You want to do this
with least amount of administrative effort.
What should you do?
A. Use setup manager to configure the reference computer, and then create a disk image.
B. Use the system preparation tool with the -pnp parameter to set up the reference disk, and then create the
disk image.
C. Use Device Manager to add the appropriate hardware abstraction layer to the reference computer to
support the second processor, and then create a disk image.
D. After imaging the reference computer, restart the reference computer in Safe Mode and add the driver
for the second processor.
Answer: C
Explanation: When upgrading from a single processor system to a multiprocessor system the Hardware
Abstraction Layer (HAL) must be upgraded. To do this, open Computer Management in Administrative Tools,
open Device Manager, Expand Computer, Right-click Advanced Configuration and Power Interface (ACPI) PC
(or similar), select Properties, select the Driver tab, and select Update Driver. This will start the Upgrade Device
Driver Wizard that can be used to update the HAL. |
Incorrect answers:
A: To support the second processor we must upgrade the HAL. The Upgrade Device Driver Wizard can be
used to update the HAL.
B: The HAL should be updated before the image is made as the –pnp parameter forces a plug and play
hardware detection after the reboot in the installation process. If the HAL is not yet updated the
hardware detection will not be able to detect the second processor.
D: The HAL should be updated before the image is made. Furthermore, Safe Mode should not be used to
update the HAL. The Upgrade Device Driver Wizard should be used to update the HAL. |
77.You have updated the modem driver on your Windows 2000 Professional computer. You restart your
computer. Immediately after you log on, you receive a stop error.
You need to start Windows 2000. What must you do?
A. Restart the computer in Safe Mode. Uninstall the modem driver.
B. Restart the computer by using the last known good configuration.
C. Restart the computer in Recovery Console. Replace the new Modem.inf file with the old modem.inf file.
D. Start the computer from the Windows 2000 startup floppy disks. Repair the registry.
E. Start the computer from the Windows 2000 startup floppy disks. Repair the system files.
Answer: A
Explanation: Because the computer cannot start normally we must start the computer in Safe Mode. Once in
Safe Mode we can uninstall the modem driver and the computer should be able to boot normally after that. |
Incorrect answers:
B: After the installation of the modem driver the computer was rebooted and the logon was successful.
After a successful log on the Last Known Good Configuration (LKGC) is overwritten. Hence we cannot
use the Last Known Good Configuration.
C: To disable a driver with the Recovery Console the command Disable must be used. Replacing the
modem.inf file could result in unpredictable behavior. Furthermore, Safe Mode requires less
administrative authority and effort compared to using the Recovery Console.
D: Repairing the registry could help, but this is a daunting task with a lot of administrative effort.
E: Repairing the system files can be used to replace system file that may be damaged. It will not disable the
modem driver. |
78.You install Windows 2000 Professional on a computer that has a non-plug and play video adapter. You
want to configure the video adapter to use 16-bit color and 1024 x 768 resolution. The color setting for the
video adapter is set to 16 colors, and you cannot change that setting.
The video adapter properties are shown in the (default monitor) and VGA properties dialog box in the
exhibit.
What should you do?
A. Change the adapter refresh rate to 60Mhtz.
B. Change the monitor drivers to be WDM-compliant drivers.
C. Use List all modes to select the adapter default mode.
D. Install the WDM-compliant video adapter and monitor drivers.
Answer: D
Explanation: In this scenario an incorrect video adapter driver has been installed. Therefore Windows has
installed a standard video driver. The Windows Driver Model (WDM) provides a common model for device
drivers across Windows 98 and Windows 2000. Drivers written in WDM work in both Windows 98 and in
Windows 2000 and should be used whenever they are available. |
Incorrect answers:
A: The monitor’s refresh rate is not the problem in this scenario. The problem the correct video adapter
driver has not been installed.
B: Using a WDM-compliant monitor driver is a good option, but it will not enable us to configure the video
adapter.
C: The List all modes would give a list of all available resolution and refresh rate modes. However, only 16
colors would be configurable. Therefore the video adapter drive must be updated. |
79.You want to connect your Windows 2000 Professional computer to a new color laser printer. The printer
is plug and play compliant. The printer is included on the current hardware compatibility list (HCL).
You are a member of the Sales organizational unit. You want to share the printer with other users in the
Sales organizational unit.
You plug the printer into the LPT port on the back of the computer. You then attempt to install the 32-
bit application printer software that came with the printer. During the installation you receive an error
message as shown below.
“Failed to load Windows Print dll, the specified module could not be found”
What should you do before you share the printer to other users in the Sales OU?
A. Change the LPT port settings to enable legacy plug and play detection on your computer.
B. Change the LPT port setting to bidirectional in the BIOS on your computer. Then reinstall the printer
software.
C. Connect the printer to another computer in the Sales Organizational Unit. Then install the device drivers
for the printer.
D. Obtain and install WDM-compliant device driver and printing software for the printer.
Answer: D
Explanation: An error message with a reference to the print.dll file indicates a problem with printer driver. The
current print driver should be replaced by a WDM-compliant driver. WDM-compliant drivers and WDMcompliant
printing software should be used to assure that the printers and the print devices work well in
Windows 2000. The Windows Driver Model (WDM) provides a common model for device drivers across
Windows 98 and Windows 2000 and would thus work in both Windows 98 and in Windows 2000. |
Incorrect answers:
A: The computer is a modern color laser printer, which is included in the Hardware Compatibility List
(HCL). It is therefore not a legacy device. Therefore enabling legacy plug and play detection of the print
port will solve the problem in this scenario.
B: Bidirectional support enables communication between the physical print device and the Windows 2000
printer. This enables the print device to send status messages like “Low toner”. Bidirectional support
would not help with driver problems.
C: A printer driver is already installed, but the driver is not compatible with Windows 2000. We therefore
need to install a WDM-compliant driver. |
80.You use Windows 2000 Professional on a desktop computer. You schedule a task to run an MMC-snap in
to perform configuration tasks to another computer. You notice that task is completing incorrectly.
You manually start MMC. You add snap-in and are then able to successfully run the task. You verify
that all of your other tasks are working correctly.
You want to enable your task to complete successfully. What should you do?
A. You schedule the tasks to configure the task to run under the security context of your account.
B. Configure the task scheduler service account to use the local administrator account and password.
C. Use Computer Management to start the messenger service and to configure the messenger service to
start automatically.
D. Use Computer Management to start the task scheduler service and to configure the task scheduler
service to start automatically.
Answer: A
Explanation: As the task worked correctly when you were logged in with your user account, it should complete
successfully if run in the same security context as your account. |
Incorrect answers:
B: The local administrator would not have required permissions on the network as it is a local computer
account. Furthermore, the scheduled task should, for security reasons, not have too many rights or
permissions on the local computer.
C: When the task was tested it and all the other running tasks worked correctly. There is thus no problem
with the messenger service and no need to reconfigure it.
D: When the task was tested it and all the other running tasks worked correctly. This includes the task
scheduler. It is thus not necessary to reconfigure the task scheduler. |
81.You are the network administrator for your company. An employee named Bruno uses a Windows 2000
Professional portable computer. When he starts the computer, Windows 2000 prompts him to select
either a docked or an undocked mode.
Bruno primarily works out of the office and does not use a docking station. What should you do?
A. Modify the portable computer’s BIOS settings, and disable support for the docking station.
B. Modify the portable computer’s hardware profiles, to remove the Docked hardware profile
C. Modify the portable computer’s device settings to disable the Unplug devices icon in the system tray.
D. Modify the portable computer’s hardware profiles, and move the Docked hardware profile to the top of
the list of hardware profiles.
Answer: B
Explanation: When two or more hardware profiles exist the user will be given the option to choose between
them when booting the computer. As the docked hardware profile is not used, it should be removed. Then
Bruno would not be prompted to choose a hardware profile. |
Incorrect answers:
A: We cannot disable docking station support in BIOS, we just remove the docked hardware profile
instead.
C: Remove the docked hardware profile. You cannot use device settings to remove the hardware profile.
D: The docked hardware profile is not used. By moving it to the top of the list of profiles it would become
the default hardware profile and will be used if the user does not specify which profile to use. |
82.Your Windows 2000 Professional computer has a single Pentium II 400-Mhz processor, 64 MB of RAM,
and E-IDE hard disk. You use your computer to design graphics ads for web sites and newspapers.
When you are working on multiple ads simultaneously, you notice that your computer responds very
slowly. You are also experiencing long delays when loading color palettes and importing graphics.
You use system monitor to view your system performance as shown in the exhibit.
You want to improve the performance of your computer based on the performance results. What should
you do?
A. Increase the physical RAM in the computer to 128 MB.
B. Increase the processor priority level for your development application.
C. Add a second Pentium II 400-MHz processor.
D. Upgrade the hard disk to a SCSI-based hard disk.
Answer: C
Explanation: The Processor: %Processor Time counter measures the time a processor takes to execute a nonidle
thread. A Processor: %Processor Time count that is above 80% for extended periods of time indicates that
the CPU is unable to handle the load placed on it and is the cause of a system bottleneck. The exhibit in this
scenario shows that the Processor: %Processor Time counter is close to 100% most of the time and should
upgraded. Replacing the processor with a fast one or adding a second processor, as is suggested here, will
improve system performance. |
Incorrect answers:
A: The Memory: Pages/sec counter is used to measure memory usage. In the exhibit this is represented by
the green line and is well within acceptable limits. Insufficient RAM is therefore not the primary
problem in this scenario, the processor performance is.
B: The processor is at its limit. Giving the application higher priority won’t enable the processor to work
any harder than it already is. The processor needs to be upgraded or an additional processor added to the
system.
D: The Physical Disk: Ave. Disk Queue Length counter is used to measure hard disk performance. In the
exhibit this is represented by the blue line and is well within acceptable limits. The primary problem in
this scenario is the processor performance not the disk subsystem. |
83.You attach a USB camera to your Windows 2000 Professional computer. Your Windows 2000
Professional detects the camera and prompts you to install the manufacturer’s device driver. You insert
the manufacturer-provided floppy disk.
After installing the device drivers, you restart the computer. When Windows 2000 Professional loads, you
notice that your USB board does not respond. You suspect that the camera drivers are not certified for
Windows 2000 Professional. You want to configure your computer to enable your USB keyboard and to
prevent uncertified drivers from being installed in future.
What should you do? (Choose two)
A. Configure Windows 2000 Professional to enable driver signing.
B. Configure Windows 2000 Professional to disable driver signing.
C. Start the computer by using the Recovery Console. Restore the system state data.
D. Start the computer in Safe Mode. Replace the camera driver with Windows 2000 Professional certified
driver by using Device Manager.
E. Start the computer in debug mode. Replace the camera driver with Windows 2000 Professional certified
drivers by using the Device Manager.
Answer: A, D
Explanation: We would need to start the computer in Safe Mode so that the camera driver can be replaced with
a certified driver. Thereafter, to prevent uncertified drivers from being installed in the future, we can enable the
driver signing policy and set it to block. This will prevent any future attempt to install an unsigned driver on the
system. |
Incorrect answers:
B: To prevent uncertified drivers from being installed in the future we must enable and not disable driver
signing. This is thus not the correct solution.
C: Restoring the system state data will neither enable the USB keyboard, nor will it prevent uncertified
drivers from being installed. It is therefore not appropriate to this scenario.
E: Debug mode is a special mode used by software developers to debug programs. It is one of the Safe
Mode options. Debug mode is not used for enabling device drivers or for driver signing configuration. It
is therefore not appropriate to this scenario. |
84.You are the network administrator for your company. A user reports that the USB ports on his Windows
2000 Professional portable computer function only when the portable computer is in its docked position
at the office. He asks you to configure the computer so that the USB port works when the portable
computer is docked and when it is undocked and running on battery power. You verify that the portable
computer supports ACPI power management.
What should you do?
A. Modify the portable computer’s power management settings to ensure the USB ports are not shut down
when the computer is running on battery power.
B. Modify the portable computer’s BIOS settings to disable ACPI when the computer is running on battery
power.
C. Modify the portable computer’s undocked hardware profile, and enable the USB root hub.
D. Disable the BIOS power management features in the portable computer’s BIOS settings.
E. Obtain external power supplies for the user’s USB devices. Ensure that these power supplies are
connected when the portable computer is undocked.
F. Undock the portable computer, and reinstall the drivers for the USB port.
Answer: C
Explanation: To ensure that the USB port works when the portable computer is docked and when it is
undocked and running on battery power, we should configure the portable computer with two hardware profiles.
We must configure the undocked hardware profile to enable the USB root hub. |
Incorrect answers:
A: There is no power management setting that would ensure that the USB ports are not shut down when the
computer is running on battery.
B: The problem in this scenario is not related to the advanced power management configuration. We need
to enable the USB root hub in the undocked hardware profile. Furthermore, ACPI is most beneficial to
portable computers running on battery as it can extend the use of battery power through proper
management.
D: The problem in this scenario is not related to the advanced power management configuration. We need
to enable the USB root hub in the undocked hardware profile. Furthermore, ACPI is most beneficial to
portable computers running on battery as it can extend the use of battery power through proper
management.
E: The problem at hand is not solved by obtaining an external power supply for the USB devices as they
are currently disabled when the portable computer in running on battery power. We must therefore
enable the USB root hub in the undocked hardware profile.
F: Drivers installation on a Windows 2000 computer is not done on the basis of profiles. Instead Windows
2000 offers us the ability to disable certain installed devices by using different hardware profiles. It is
therefore not necessary to install the USB drivers in both hardware profiles. |
85.You are the administrator of a Windows 2000 network. You use a user account named user1 to log on to
a Windows 2000 Professional computer. The computer is used by different students in a classroom.
User1 does not have administrative rights. However, you prefer to use this account for most of your daily
activities, because it is not a security breach if you fail to log off.
You want to schedule a task to run on the command file named AddUser.cmd that automatically adds six
more student user accounts.
What should you do?
A. Schedule the task to run under the administrative account.
B. Log on by using the local administrator account. Then schedule the task to run under user1.
C. Take ownership of the AddUsers.cmd. Then Schedule the task to run under user1.
D. Grant user1 read & execute permission for AddUsers.cmd. Then schedule the task to run under User1.
Answer: A
Explanation: As the task needs to add users accounts it requires administrative rights, or at least rights to add
user accounts, we must therefore schedule the task to run under the administrative account. |
Incorrect answers:
B: Logging on to the computer with the local administrator would make it possible to add local user
accounts. However, this could cause a security breach. It would be better to schedule the task to run with
administrative rights.
C: The task needs to have rights to add user accounts. Changing file permissions will not allow this. User1
is a user account and does not have right to add user accounts.
D: The task needs to have rights to add user account. Changing file permissions will not allow this. User1 is
a user account and does not have right to add user accounts. |
86.You install a 16-Bit ISA sound card on your Windows 2000 Professional computer. You install the
manufacturer’s device driver for the sound card. You then restart the computer.
During the start up process, the computer stops loading and Windows 2000 Professional.
You restart the computer, and again the computer stops loading Windows 2000 Professional computer.
You start the computer in Safe Mode.
What should you do next?
A. Remove the sound card device driver by enabling driver signing.
B. Remove the sound card device driver by disabling driver signing.
C. Disable the sound card device driver by using the disable command.
D. Disable the sound card device driver by using computer management.
Answer: D
Explanation: We need to disable the sound card as the problem has occurred after the sound card was installed.
We can disable the sound card in Safe Mode by right clicking on the sound card in the Device Manager settings
of the System applet and selecting the Disable option. The System applet can be accessed trough the Control
Panel |
Incorrect answers:
A: A device cannot be removed by enabling driver signing. The driver signing option specifies what actions
Windows 2000 should take when an attempt is made to install new unsigned drivers on the computer. In
this scenario the device driver has already been installed.
B: A device cannot be removed by disabling driver signing. The driver signing option specifies what
actions Windows 2000 should take when an attempt is made to install new unsigned drivers on the
computer. In this scenario the device driver has already been installed.
C: |
87.You are the administrator of your company’s network. A user named Stephen in the graphics
department logs on to his Windows 2000 Professional computer. He installs a shared color laser printer.
The color laser printer is connected to a computer named Server1.
The next day Stephen returns and logs on to a Windows NT Workstation 4.0 computer. Stephan reports
that when he attempts to print a document to the shared color laser printer, the printer is not included in
the list of available printers.
You want to allow Stephen to send print jobs to the shared color laser printer from any computer on the
network.
What should you do?
A. Configure a roaming user profile for Stephen’s user account.
B. Configure the server properties of the printer system folder to connect to the shared printer.
C. Install the printer driver for the print device on the Windows NT workstation computer.
D. Upgrade the Windows NT Workstation computer to Windows 2000 Professional, and then import the
profile settings for Stephen’s user account.
Answer: A
Explanation: A user profile, a roaming user profile for example, contains folders and data that stores the user's
current desktop environment, application settings, and personal data. It also contains all the network
connections that are established when a user logs on to a computer. This includes network printers. By
configuring a roaming user profile Stephen would be able to connect to the laser color printer from every
computer in the network. |
Incorrect answers:
B: The server properties of a printer system are configured for the shared printer at the print server, and not
at the client which connects to the shared printer. This option thus does not make sense.
C: This is not a printer driver problem. Stephen must be able to see the network. The NT 4.0 printer driver
could be installed at the printer server and would then be automatically downloaded to any NT 4.0
clients.
D: There is no need to upgrade the Windows NT 4.0 Workstation to Windows 2000 as profiles can be used
in Windows NT 4.0. |
88.You are the administrator of a Windows 2000 network that has 1,500 Windows 2000 Professional
computers. Microsoft Office 2000 was assigned to all the computers on the network by using a Group
Policy object (GPO).
You deploy the Office 2000 service release to all the Windows 2000 Professional computers on the
network. The service release, in addition to other software that had been assigned, fails to install on only
one of the computers.
What should you do?
A. Redeploy the service release by using a .Zap file.
B. Redeploy the service release by using a .mst file.
C. Restart Windows installer on the domain controller.
D. Restart Windows installer on the computer that failed to install the service release.
Answer: D
Explanation: As the deployment works on 1,499 out of 1,500 computers, the most likely problem lies with that
particular computer. Our first option in attempting to solve the problem is to restart the Windows installer on
that computer. |
Incorrect answers:
A: There is no need to redeploy the service release as it worked successfully on all the other computers.
B: There is no need to redeploy the service release as it worked successfully on all the other computers.
C: The Windows installer service on the domain controller is not used in the deployment process of the
clients. |
89.Your computer has Windows 2000 Professional installed. Your office has a power outage while you are
running the Windows 2000 disk defragmenter. When you restart your computer, you receive the
following error message: “Bad or missing operating system”.
What should you do?
A. Start the computer in Safe Mode, and reformat the hard disk
B. Start the computer in debug mode, and reformat the hard disk
C. Start the computer by using the Emergency Repair Disk, and repair the Master Boot Record.
D. Start the computer by using the Windows 2000 Professional CD-ROM. Then use the Recovery Console
to repair the Master Boot Record.
Answer: D
Explanation: In this scenario the master boot record has become corrupted and has to be repaired. If the
computer system is not able to boot, we will have to use the Recovery Console. The Recovery Console is a
command-line interface that can be used to access a hard disk of a Windows 2000 computer system. It can be
accessed from the Windows 2000 Professional installation CD-ROM and can be used to repair an installation of
Windows 2000 Professional by repairing the registry or by disabling a device driver or service. To repair an
installation of Windows 2000 Professional by disabling a device driver, boot the computer from the Windows
2000 Professional installation CD-ROM. On the Welcome to Setup screen, press R to open the Repair Options
screen, and press C to activate the Recovery Console. We can then use the FIXMBR command to the repair the
boot sector. |
Incorrect answers:
A: As we cannot boot the computer, we will not be able to enter Safe Mode. Further more, reformatting the
hard drive is not necessary as the master boot record can be repaired.
B: As we cannot boot the computer, we will not be able to enter Safe Mode. Debug mode is one of the Safe
Mode options. As we cannot boot the computer we will not be able to enter debug mode. Furthermore,
Debug mode is used by software developers to debug programs, it is not used to repair the master boot
record.
C: We cannot use an Emergency Repair Diskette (ERD) to repair the master boot record. The ERD process
is used to restore core system files. |
90.You use Windows backup to backup the files on your Windows 2000 Professional computer. Your
computer is configured to perform a daily backup of your files on drive D.
On Thursday morning, drive D on your computer fails. You replace the failed hard disc with a new hard
disc. You want to restore files on drive D to the new hard disc. You view your back up log as shown in
the exhibit.
it
Backup Status
Operation: Backup 1
Active backup destination: Tape
Media name: “Set created Friday at 11:00 PM”
Backup of “D;”
Backup set #1 on media #1
Backup description: “Set created Friday at 11:00 PM”
Backup Type: Normal
Backup started on 9/8/1999 at 11:00 PM.
Backup completed on 9/9/1999 at 1:30 AM.
Directories: 5012
Files: 4323
Bytes: 4, 623, 252, 320
Time: 2 hours 30 minutes 2 seconds |
Backup Status
Operation: Backup 2
Active backup destination: Tape
Media name: “Set created Saturday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Saturday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/9/1999 at 11:00 PM.
Backup completed on 9/9/1999 at 11:26 PM.
Directories: 116
Files: 320
Bytes: 6, 278, 256
Time: 26 minutes 32 seconds |
Backup Status
Operation: Backup 3
Active backup destination: Tape
Media name: “Set created Sunday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Sunday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/10/1999 at 11:00 PM.
Backup completed on 9/10/1999 at 11:15 PM.
Directories: 10
Files: 24
Bytes: 4, 272, 903
Time: 15 minutes 55 seconds |
Backup Status
Operation: Backup 4
Active backup destination: Tape
Media name: “Set created Monday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Monday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/11/1999 at 11:00 PM.
Backup completed on 9/11/1999 at 11:55 PM.
Directories: 732
Files: 964
Bytes: 9, 243, 747
Time: 55 minutes 12 seconds |
Backup Status
Operation: Backup 5
Active backup destination: Tape
Media name: “Set created Tuesday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Tuesday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/12/1999 at 11:00 PM.
Backup completed on 9/12/1999 at 11:01 PM.
Directories: 116
Files: 1
Bytes: 1, 623, 252
Time: 6 seconds |
Backup Status
Operation: Backup 6
Active backup destination: Tape
Media name: “Set created Wednesday at 11:00 PM”
Backup of “D:”
Backup set #1 on media #1
Backup description: “Set created Wednesday at 11:00 PM”
Backup Type: Incremental
Backup started on 9/13/1999 at 11:00 PM.
Backup completed on 9/13/1999 at 11:14 PM.
Directories: 84
Files: 38
Bytes: 2, 984, 837
Time: 14 minutes 32 seconds |
In which order should you restore your data?
A. Friday, Wednesday: files will be current as of the Wednesday night.
B. Friday, Thursday: files will be current as of the Thursday morning.
C. Friday, Saturday, Sunday, Monday: files cannot be restored after this time.
D. Friday, Saturday, Sunday, Monday, Tuesday, Wednesday: files will be current as of the Wednesday
night.
Answer: D
Explanation: We cannot start the restore process with an incremental restore. Instead we must start with the
normal backup from Friday. Incremental backups only backup files that are not marked as archived. Once they
are backed up the backed up files are marked as archived. Incremental backups thus only backup files that have
changed since the last backup. Therefore, when restoring files from an incremental backup, all the incremental
backups must be used in sequence from the oldest backup to the most recent one. The incomplete incremental
backup from Tuesday must be included since 1 file was backup up. |
Incorrect answers:
A: Incremental backups only backup files that are not marked as archived. Once they are backed up the
files are marked as archived. Incremental backups thus only backup files that have changed since the last
backup. Therefore, when restoring files from an incremental backup, all the incremental backups must
be used in sequence from the oldest backup to the most recent one.
B: Incremental backups only backup files that are not marked as archived. Once they are backed up the
files are marked as archived. Incremental backups thus only backup files that have changed since the last
backup. Therefore, when restoring files from an incremental backup, all the incremental backups must
be used in sequence from the oldest backup to the most recent one.
C: The incremental backup from Tuesday and the incremental backup from Wednesday must be included in
the restore process so as to recover as much information as possible. |
91.You configure your Windows 2000 Professional portable computer to redirect your My Documents
folder to your home folder. You want to ensure that you can access all of your files in your My
Documents folder when you are not connected to the network.
What should you do? (Chose two)
A. Use Windows Explorer to enable offline files.
B. Use Windows Explorer to create shortcut to access offline files folder as desktop.
C. Use Windows Explorer to configure the properties of your home folder to be available offline.
D. Use synchronization manager to configure your home folder to be available offline.
E. Create a shortcut in my network places to access your home folder.
Answer: A, C
Explanation: To ensure that we can access all of our files in our My Documents folder when we are not
connected to the network, we must enable caching at the server by using Windows Explorer.
At the client computer we must connect to a network share and configure it to be available for off-line access. |
Incorrect answers:
B: Shortcuts cannot be used to access offline files and folders.
D: The synchronization manager is used to manage synchronization not to configure folders to be available
offline.
E: Creating a shortcut to your home folder will not make it available offline. |
92.Your Windows 2000 Professional computer has 64 MB of RAM and two hard disk drives, drive C and
drive D. Each hard disk has more than 500 MB of free disk space. Windows 2000 Professional is installed
on drive C.
You frequently run two or more memory-intensive graphics applications simultaneously. You notice that
access to drive C is much slower when you are using the graphic applications.
You want to maximize disk performance.
What should you do?
A. Configure the paging file on drive C to set the initial size of the virtual memory and a maximum size of
the virtual memory to the 64 MB.
B. Configure the paging file on drive C to set the initial size of the virtual memory and a maximum size of
the virtual memory to the 128 MB.
C. Move the paging file from drive C to drive D to set the initial size of virtual memory and the maximum
size of virtual memory to 256 MB.
D. Move the paging file from drive C to drive D. Set the initial size of virtual memory to 56 MB and
maximum size of virtual memory to 256 MB.
Answer: C
Explanation: If possible, the paging file should be placed on a different physical disk than the operating
system. In this scenario the paging file should be placed on the D drive. The default size of a paging file is 1.5
times available RAM, in this scenario it should be 96MB. Sometimes it is beneficial to increase the default page
size, for example when using resource intensive applications. |
Incorrect answers:
A: The paging file should be placed on a different physical disk than the operating system. In this scenario
the paging file should be placed on the D drive.
B: The paging file should be placed on a different physical disk than the operating system. In this scenario
the paging file should be placed on the D drive.
D: The initial size of the paging file is incorrect as it should be 1.5 times the size of the available RAM. As
the amount of RAM is 64 MB in this scenario, the paging file should be 96MB. |
93.You upgrade five computers in the finance organizational unit from Windows NT Workstation 4.0 to
Windows 2000 Professional. The computers are used by members of the Finance OU to run financial
Applications. All five computers are configured to have the default security settings.
A user named Helene reports that she can no longer log run the financial applications on her Windows
2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on
her computer. Helene is a member of local user group.
You want the financial applications to run on her computer. What should you do?
A. Use the computer management to configure separate memory space for each financial application on
Helene’s computer.
B. Use the security templates to edit the security policy to include the financial application on Helene’s
computer. Then add Helene’s user account to the power user group on Helene’s computer.
C. Use security configuration and analysis to reconfigure the default security policy .inf to allow financial
applications to run on Helene’s computer.
D. Use the Secedit.exe to apply the Compatws.inf security template on Helene’s security policy to loosen
the permissions for the local users group o Helene’s computer.
Answer: D
Explanation: The Compatws.inf template relaxes security settings for the Users group and is therefore well
suited for workstations that need compatibility with older applications. In fact, the main purpose of the
compatws.inf template is to enable non-certified legacy program to run. |
Incorrect answers:
A: Computer management cannot be used to configure separate memory space for applications.
B: Adding Helene’s user account to the power users group might make the application to run. But it also
represents a security risk since ordinary users should not have the rights and permissions of a Power
User.
C: It is possible to reconfigure the default security policy to make the application to run. This however
demands a lot of administrative effort. It is thus better to use the compatws.inf template, which is
designed to allow legacy programs to run. |
94.You are the administrator of a Windows 2000 Professional computer. A user named Maria assists you in
performing some administrative tasks. Maria is a member of local administrators group.
Users report that Maria has been viewing and changing their files. You want Maria to be able to install
programs, perform backup and manage printer, but not to view, change or read other users’ files for
which permission has not been granted.
You want to setup Maria’s account to have minimal rights and permission. You want to accomplish this
with least amount of administrative effort.
What should you do?
A. Leave Maria and local administrators group. Limit her rights by using local policy.
B. Leave Maria and local administrators group. Change the NTFS provision on other users’ files to deny
Maria’s request.
C. Remove Maria from the local administrators group. Add her to both the power users group and backup
operators group.
D. Remove Maria from local administrators group. Add her to power user group. Then grant her NTFS read
permission on the files to be backed up.
Answer: C
Explanation: By adding Maria’s user account to the power user group Maria will inherit the ability to share
resources and install programs that are conferred on members of the power user group. To grant Maria the
ability to backup files she must be added to the Backup Operators group, which has the permissions to backup
files. As a member of this group Maria will be able to backup files as she will inherit those rights by virtue of
being a member of that group. Maria will not have permissions to read the users’ files as she has been removed
from the local administrators group and as neither the power user group nor the Backup Operators group has the
permissions to read other users’ files. |
Incorrect answers:
A: Leaving Maria in the local administrators group would allow her to view, read and change the files of
the users. As the local administrators group enjoy these permissions.
B: Leaving Maria in the local administrators group would allow her to take ownership of any file and then
view, read or change it as the local administrators group enjoys this permission.
D: Giving Maria read permission on the files she must backup would be against the wishes of the users;
they do not want Maria to be able to view their files. |
95.You are the administrator of your company’s network. Your network consists of 20 Windows 2000
Professional computers. You want to configure all of the computers to allow access to the Internet.
Your Budget does not allow for installing a permanent Internet connection for the network. You do have
a single dial-up account at a local Internet service provider (ISP) and a 56-Kbps modem. You want the
computer to be able to access the Internet when web resources are requested.
What should you do? (Choose all that apply)
A. Configure the shared modem to use software handshaking
B. Configure the dial-up connection to enable on-demand dialing.
C. Configure the dial-up connection to enable the Internet connection sharing.
D. Configure all the other computers to have a dial-up connection that uses the shared modem.
E. Attach the modem to one of the Windows 2000 Professional computer, and create a dial-up connection
to the ISP.
F. Attach the modem to one of the Windows 2000 Professional computers, and share the modem on the
network.
Answer: B, C, E
Explanation: To enable the computer to access the Internet when web resources are requested we must first
attach the modem to the computer and create a dialup connection to the ISP. We must then configure the dial
connection to enable Internet Connection Sharing. This can be accomplished by opening Network And Dial-Up
Connections, then right-click the dial-up connection, select Properties, select the Sharing tab, and finally enable
Internet Connection Sharing For This Connection check box. To enable this connection to dial automatically
when another computer on the home network attempts to access external resources, the Enable On-Demand
Dialing check box must be selected. |
Incorrect answers:
A: Software handshaking settings of the modem do not need to be configured when using Internet
Connection Sharing.
D: The ICS clients on the network will not access the modem directly. They will access the ICS computer’s
shared Internet connection.
F: The Internet connection is shared, not the modem. Therefore the modem does not need to be shared. |
96.You want to upgrade 150 computers from Windows NT Workstation 4.0 Windows 2000 Professional.
You create an unattend.txt file by using setup manager. You copy the file to a floppy disk.
You then start the installation on a test computer by using the Windows 2000 Professional CD-ROM.
You insert the floppy disk after the computer starts.
Although you had set the user interaction level to full unattended mode, you are prompted for all the
required parameters. You want to ensure that the unattended installation does not prompt you for input.
What should you do?
A. Add a [data] section to unattend.txt, and set the unattendedinstall Parameter to YES.
B. Add an [Unattend] section to unattend.txt, and set the OEMPreinstall parameter to yes.
C. Rename unattend.txt on the floppy disk to Winnt.sif.
D. Create a \$Oem$\$1 folder on the hard disk of the test computer, and copy unattend.txt to the folder.
Answer: C
Explanation: When booting the computer from the CD-ROM, and then using an answer file from a floppy
disk, the answer file must be named Winnt.sif. |
Incorrect answers:
A: A [data] section must be added to the unattend.txt file, and the unattendedinstall Parameter must be set
to YES. However, the answer file must be named winnt.sif, as it is located on the diskette.
B: An [Unattend] section in the answer file has already been created by the Setup Manager.
D: The unattend.txt file must be located on a diskette, and it must be named winnt.sif. It should not be
copied to a folder named $OEM$ on the hard drive. |
97.You copy the contents of the Windows 2000 Professional CD to a shared network folder named
\\Server1\Win2000p. You use the shared folder to perform over-the-network installations of Windows
2000 Professional on new computers purchased by your company.
You receive a Windows 2000 service Pack CD. You apply the Service Pack to Server1 and to the
\\Server1\Win2000p folder.
You discover that the service pack contains several files that are incompatible with the new computers.
You want to make sure that the service pack files are not installed on any new computers until the
problem has been corrected.
What can you do?
A. Use update.exe from the service pack CD on server1. Select the uninstall option.
B. Copy the contents of the Windows 2000 Professional CD to \\Server1\Win2000p again, allowing the
operating system to overwrite newer files while copying.
C. Run \\server1\Win2000p\WinNT32.exe/u on the new computer.
D. Run Update.exe/s:\\Server1\Win2000p/you from the Service Pack CD on Server1.
Answer: B
Explanation: The service packs that has been applied, or slipstreamed, to the installation files and cannot be
unapplied. We thus have to replace the installation files in the network share with the original Windows 2000
installation files |
Incorrect answers:
A: The update.exe utility does not have an uninstall option.
C: The winnt32 /u command performs an unattended installation of Windows 2000. It does not remove the
service pack from the installation files.
D: Update.exe /s command applies the service pack to the Windows 2000 installation files – it slipstreams
the service pack. This has already been done, and we want to make this undone.
|
98.You want to install Windows 2000 Professional on 45 new computers on your company’s network. You
first install Windows 2000 Professional on one of the new computers.
You log on to the computer by using the local administrator account. You install Microsoft Office 97, a
virus scanner, and other company-standard applications. You then create a RIS image of the computer
you configured.
You want to configure the RIS image so that the standard applications will be accessible to the user when
the user first logs on to the network.
What should you do?
A. Run Rbfg.exe before installing the standard applications.
B. Run RIPrep.exe before installing the standard applications.
C. Copy the all users profile to the default users profile.
D. Copy the local administrator account profile to the default users profile
Answer: D
Explanation: By copying the local administrator account profile to the default users profile, all users will get
access to the shortcuts which were made when the local administrator installed the applications. |
Incorrect answers:
A: Rbfg.exe (Remote boot floppy generator) is used to make a remote boot floppy, which is used by non-
PXE compliant RIS clients to start the RIS installation process. It is thus not appropriate to this scenario.
B: Riprep.exe should not run prior to installing the applications, as the RIS image must include the installed
applications. Therefore riprep.exe must be used after the installation of applications.
C: The all users profile is used by all the users. There is no need to copy it to the default user profile. |
99.You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the
computers in your company use the same hardware. However, several different peripheral devices are
used throughout the company.
You want to verify that the hardware in use is compatible to Windows 2000 Professional. You want to
accomplish this with least amount of administrative effort.
What should you do?
A. Create several different computer configurations. Install Windows 2000 Professional and enable driver
signing.
B. Create a bootable floppy disk that contains and automatically runs WinNT32.exe/checkupgradeOnlyQ.
Send the floppy disk to each user on the network.
C. Copy the contents of Windows 2000 Professional CD-ROM to a network share. From the network,
modify your network logon scripts to run WinNT32.exe/Unattended:ReportOnly.
D. Use setup manager to create a setup.inf file. Add the entry ReportOnly=Yes to the [Win9xUpg] section
of the answer file. Run Winnt32.exe/unattended.setup.inf on all of the different computer configurations.
Answer: D
Explanation: Winnt32.exe/unattended:setup.inf will start an unattended installation using the answer file
setup.inf. When ReportOnly=Yes is added in the [Win9xUpg] section of the answer file the installation only
generates an upgrade report and then exits without making any changes to the current Windows 95 or Windows
98 installation. The upgrade report contains a list of hardware and software incompatibilities and is saved to the
root of the system drive if the SaveReportTo key is not specified. |
Incorrect answers:
A: Creating several different computer configurations and installing Windows 2000 Professional with the
driver signing enabled would require a great deal of administrative effort. Administrative effort that is
not required as the process can be automated by running the Winnt32.exe/unattended:setup.inf with the
ReportOnly option set to Yes.
B: We cannot run winnt32 from a bootable diskette. As the boot floppy operates in DOS mode. We
therefore cannot use 32 bit applications such as Winnt32 when booting form a floppy disk. Winnt32 can
only be run from a Windows environment. The boot disk can start winnt. Furthermore, the switch
/checkupgradeOnlyQ is not correct. The switch should be /checkupgradeOnly without any Q.
C: The command winnt32.exe/unattended:ReportOnly will not work. It will try to start an unattended
installation with an answer file named ReportOnly. Furthermore, the ReportOnly=Yes statement must be
added in the [Win9xUpg] section of the answer file, not by putting ReportOnly in the winnt32 command
line. |
100.Your Windows 2000 Professional computer has a removable disk device installed. The device can use
storage modules of varying sizes. You use these storage modules to transfer graphics filed between your
location and a printing company. The printing company uses Windows NT 4.0 service pack 3.
You insert a new 20-Mailbox disk device into your computer. When you attempt to format it as FAT32
with the default options, you receive the following error message “Windows was unable to complete the
format.”
You need to format the device so that you can use it to send a large graphic file to the printing company.
How should you format the device?
A. As FAT 16 with a 4-KB cluster size.
B. As FAT 32 with a 1-KB cluster size.
C. As FAT 32 with a 4-KB cluster size.
D. As NTFS with a 4-KB cluster size.
Answer: A
Explanation: FAT16 and NTFS 4.0 are the only file formats supported by Windows NT 4.0 Service Pack 3. |
Incorrect answers:
B: FAT32 cannot be used in Windows NT 4.0 Service Pack 3.
C: FAT32 cannot be used in Windows NT 4.0 Service Pack 3.
D: NTFS with a 4 KB cluster size was first supported in NTFS-5, which is used by Windows 2000.
Windows NT 4.0 needs at least Service Pack 4 to be able to use NTFS 5. |
101.You are the administrator of a Windows 2000 network. You purchase 25 new portable computers that
have a preinstalled version of Windows 98. You upgrade the 25 new computers to Windows 2000
Professional.
You want to remove the Logoff option from the start menu on the 25 new computers.
Which two methods can you use to accomplish this goal? (Choose two)
A. On the advanced tab of the task bar and start menu dialog box, clear the Display log off option.
B. On the advanced tab of the task bar and start menu dialog box, clear the administrative tools option.
C. On the general tab of the task bar and start menu dialog box, clear the personalized menus option. Log
off and then log on to the computers.
D. Use a local computer policy that will not include the logoff option on the start menu.
E. Use the user profiles tab within the properties of my computer to change the profile from the local
profile to a roaming user profile.
Answer: A, D
Explanation: The Log off option can be removed from the start menu by the following sequence: Open Start,
Choose Settings, select Taskbar & Start menu, select the Advanced tab, and Disable the Display logoff option.
A local computer policy could also be used to remove the logoff option from the start menu. This is done by the
following steps: Open the local computer policy, select User Configuration, select Windows settings, open
Administrative templates, and disable Add logoff to the start menu. |
Incorrect answers:
B: By clearing the administrative tools setting the Administrative tools will not be accessible from the Start
menu. This will not remove the Logoff option on the start menu.
C: By clearing the personalized menus option the start menu and its submenu will show all the items at the
same time. It will not hide the applications that had not been used recently and will not hide the logoff
option either.
E: Changing the user profile from a local profile to a roaming user profile will give the user the same
desktop environment when the user logs in on different computers. It will not hide the logoff option on
the start menu though. |
102.You are the administrator of your company’s network. You configure a local group named accounting to
have a mandatory user profile. The mandatory profile has been configured to include a custom logo that
was saved with 16-bit color and 1024x768 resolution.
Some of the Windows 2000 Professional computers in the accounting department have standard VGA
video adapters, and others have SVGA video adapters.
Several users report that when they log on to certain Windows 2000 Professional computers, the custom
bitmap becomes very pixilated and distorted, and does not reflect the proper color depth.
You want users to be able to correctly view the custom bitmap on any computer in the accounting
department.
What should you do?
A. Configure a roaming user profile for each user in the accounting group.
B. Configure a separate user profile for each user in the accounting Group.
C. Change the custom bitmap to a 16-color bitmap that has 640x480 resolution, and reconfigure the
mandatory user profile.
D. Reinstall the appropriate WDM-compliant drivers for the computers that do not display the custom
bitmap correctly.
Answer: C
Explanation: Not all standard VGA video adapters are capable of managing a 16-bit color bitmap with
1024x768 resolution. By changing the bitmap to a 16 color bitmap with a resolution of 640x480 (VGA), all
standard VGA video adapters would be able to correctly present the custom bitmap. |
Incorrect answers:
A: Configuring roaming user profiles will not help the VGA adapters to display the high-resolution image.
B: Configuring a separate user profile for each user will not help the VGA adapters to display the highresolution
image.
D: The use of WDM-compliant video drivers is not required as the problem is that some video adapters
only support VGA resolution. |
103.You run the English (US) edition of Windows 2000 Professional on your computer. You are developing a
product installation document that has text in both English and Spanish. The word processing program
you are using is a Windows 16-bit character-based application.
You start the word processing program and complete the English Portion of the document. You then
install Spanish as a language group by using Regional Options in Control Panel.
However, you cannot use Spanish to complete the Spanish portion of your document.
What should you do?
A. Change the language preference from English to Spanish within the word processing Program.
B. Install the Spanish version of Windows 2000 Professional. Reconfigure your language settings, and
restart the word processing program.
C. Save and close the word processing program. Select Spanish by using the locale indicator on the taskbar,
and restart the word processing program.
D. Save and close the word processing program. Log off and log on to the computer. Restart the word
processing program, and select Spanish by using the locale indicator on the taskbar.
Answer: C
Explanation: The word processing program has to be closed since 16-bit applications do not include
multilingual support as most 32-bit programs do. We can then switch to Spanish by using the locale indicator on
the taskbar. When the program is restarted the Spanish language will be selected and used. |
Incorrect answers:
A: The legacy 16-bit application program is not able to change the language preference within the program
environment. This can only be done in most 32-bit applications, like Word 2000.
B: It is not necessary to install a Spanish version of Windows 2000, since Windows 2000 has built-in
multilingual support.
D: It is not necessary to reboot the system to change the language. We could simply close the 16-bit
program and switch to Spanish by using the locale indicator on the task bar. |
104.You are the administrator of a Windows 2000 domain. You deploy a graphics software application to
users in the graphics Organizational Unit.
You want to install a custom installation for three users named Carlos, Carmen and Maria, who are
members of graphics OU. You want these three users to be able to access additional text, filters, and
other graphics options for the software.
What should you do?
A. Create the graphic users OU in the domain. Add a custom .msi file to graphics OU.
B. Create the graphic users OU in the domain. Add a custom .mst file to graphics OU.
C. Create the advanced software OU wit in the graphics OU, and add Carlos, Carmen and Maria. Create an
.msi file, including changes, and apply the modifications to the advanced software OU.
D. Create the advanced software OU within the graphics OU and add Carlos, Carmen and Maria. Create an
.mst file, including changes, and apply the modifications to the advanced software OU.
Answer: D
Explanation: We will first have to create a new OU and add the three users to the OU. To be able to produce a
custom installation for Carlos, Carmen and Maria, the original .msi deployment file needs a transformation .mst
file. This file is then published in the new advanced software OU. The transformation file (the .mst file) will be
applied to the original deployment file (the .msi) at the time of the publication. |
Incorrect answers:
A: We cannot add a custom .msi file. We must therefore use a custom .mst file. Furthermore, the custom
package should only be available for these three users therefore adding the packing to the graphics OU
is incorrect, as all users in graphics OU would be able to use the extra software options.
B: The custom package should only be available for these three users therefore adding the packing to the
graphics OU is incorrect, as all users in graphics OU would be able to use the extra software options.
C: We must create a custom .mst transform file, as we cannot customize .msi file. |
105.You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the
basicwk.inf security template to the computers. Now, none of the users can run the company's database
application.
What should you do?
A. Apply the compactws.inf security template to the computers.
B. Delete the basicwk.inf security template file from the computers.
C. Use the system policy editor to configure a new security policy for the database application.
D. For each user account, allow read permission to the database application and in associated files.
Answer: A
Explanation: The basicwk.inf security template configures the Windows 2000 default security settings.
Apparently the database application is a legacy application, which will not run with these default security
settings. The compatws.inf template is applied to enable non-certified legacy program to run successfully under
the less secure Power User configuration. |
Incorrect answers:
B: By deleting the basicwk.inf the only thing achieved is the possibility to return to the default security
setting is lost. The security setting of the computer is not changed by deleting a security template.
C: The system policy editor was used in downlevel versions of Windows (95, 98, NT) to configure
Administrative templates. In Windows 2000 the Group Policy editor is used instead.
D: By just changing some file permissions we will not enable the legacy application to run. The users most
likely already have read permissions to the application files. |
106.You are the administrator of your company network. You purchase 75 new Windows 2000 Professional
computers that will be shared by the users in graphic organizational unit. All the computers are
configured identically.
You want the users to be able to maintain their individual desktop settings regardless of which computer
to use. You want to accomplish this with the least amount of administrative effort.
What should you do?
A. Configure each computer to join a workgroup. Create a user account and a local profile for each user.
B. Configure each computer to join a work group. Create a domain user account that uses roaming user
profiles.
C. Configure each computer to join the domain. Create a user account for each user on a domain controller.
D. Configure each computer to join the domain. Create a domain user account that uses a roaming user
profile.
Answer: D
Explanation: The computers must be configured to join a domain as they are going to be shared by users in an
organizational unit. Roaming user profiles must be configured as these allow the users to maintain their
individual desktop settings regardless of which computer they use. |
Incorrect answers:
A: To be able to use organizational units the computers must be configured to join a domain, and not a
workgroup.
B: To be able to use organizational units the computers must be configured to join a domain, and not a
workgroup.
C: To let the users maintain their individual desktop settings regardless of which computer they use
roaming profiles must be configured. Roaming user profiles are not created in this option. |
107.You want to configure your Windows 2000 Professional computer to remotely access your company's
Windows 2000 routing and remote access server. You configure a VPN connection. For security
purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You
also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to secure
server.
When you try to connect, you receive the following error message, “The encryption attempt failed
because no valid certificate was found.”
What should you do to connect to the server?
A. Enable the VPN connection to use MS-CHAP.
B. Change the data encryption setting to Optional Encryption.
C. Specify a TCP/IP address in the network properties.
D. Change the IPSec policy setting to Client.
Answer: D
Explanation: In this scenario the client and the server are able to make some initial communication but then
encryption negotiation failed. The Server is configured to use the Secure Server (Require Security) policy,
which does not allow unsecured communications with clients. By changing the policy at the server to Client
(Respond Only) policy, plaintext communications would be allowed. The Client (Respond Only) policy
effectively allows clear-text communication but will attempt to negotiate security if a security request is made. |
Incorrect answers:
A: Since both the client and the Server are Windows computers there is no need for MS-CHAP v2. MSChap
is sometimes used on downlevel Windows clients, for example Windows 98, which does not
support MS-Chap by default.
B: Even if the data encryption setting on the client is set to Optional Encryption the RRAS server will still
use the Secure Server setting, which will not accept unencrypted traffic. Therefore this option does not
provide a solution for this problem.
C: The client and the server were able to communicate, although there is a disagreement on encryption.
Therefore an IP address has been leased and there is thus no need to specify a TCP/IP address in the
Network properties. |
108.You are the administrator of your company’s network. You use your Windows 2000 Professional
computer to transfer 20 large files. Each file is 100 MB in size. You want to copy the files from the UNIX
server in your branch office to a computer running Microsoft SQL server at the main office.
When you copy the files by using Windows Explorer, the connection appears to time out and the file copy
is aborted. You suspect that you encountering a TCP/IP performance problem. Your network
connection is shown in the Xircom LAN Properties dialog box in the exhibit.
You want to monitor the performance of TCP/IP on your computer.
What should you do?
A. Install the network monitor agent. Use the performance console to view all the counters for the TCP
object.
B. Install the network monitor agent. Use the performance console to view the fragmented datagrams/sec
counter.
C. Install SNMP. Use the performance console to view all the counters for the TCP object.
D. Install simple TCP/IP services. Use the performance console to view the fragmentation failures counter.
Answer: C
Explanation: By installing Simple Network Management Protocol (SNMP) many new performance counters
will be available. The counters for the TCP object can be used to monitor TCP/IP performance problems. |
Incorrect answers:
A: SNMP, not network monitor, will install the counters for the TCP object. However, network monitor can
be used to measure TCP/IP performance.
B: SNMP, not network monitor, will install the counters for the TCP object. However, network monitor can
be used to measure TCP/IP performance.
D: Simple TCP/IP services includes DayTime, Echo, Quote of the Day, Discard and Character Generator. It
is not used to install counters or to monitor the system. |
109.You want to install Windows 2000 Professional on 30 PXE-compliant computers and 35 Non-PXEcompliant
computers. All 65 computers are included on the current hardware compatibility list (HCL).
You create a RIS image. You load the image on the RIS server. You then start the 65 computers. You
find that the 30 PXE-Compliant computers can connect to the RIS server.
However, the 35 Non-PXE-compliant computers fail to connect to the RIS server.
What should you do?
A. Run Rbfg.exe to create a Non-PXE-compliant startup disk.
B. Run Riprep.exe to create a Non–PXE complaint startup disk.
C. Grant the Everyone group NTFS Read permission for the RIS image.
D. Grant the Administrators group NTFS Read permission for the RIS image.
Answer: A
Explanation: Non-PXE compliant clients need to use a network boot disk to be able to connect to the RIS
server. This boot disk can be created using the RBFG.EXE utility (remote boot floppy generator). |
Incorrect answers:
B: Riprep.exe is used to make a disk image. It is not used to create non-PXE-compliant startup disks.
RBFG.EXE is used to create this bootable disk.
C: The 30 PXE-compliant computers were able to load the image. Therefore there is no problem with the
NTFS permissions on the RIS image.
D: The 30 PXE-compliant computers were able to load the image. Therefore there is no problem with the
NTFS permissions on the RIS image. |
110.You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a 400-
Mhz Pentium III, and has 128 MB of RAM and a 10-GB hard disk. You are performing the installation
by using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete,
you restart the computer. The BIOS virus checker on your computer indicates that your computer is
infected with a Master Boot Record virus.
What should you do before you continue the installation?
A. Remove the virus checker in Windows 98.
B. Disable the BIOS virus checker and restart the computer.
C. Run Fixmbr.Exe from the Windows 20000 Professional CD-ROM.
D. Modify the Boot.ini file to include a signature parameter on the ARC path of the system partition.
Answer: B
Explanation: During the installation of Windows 2000, the setup program must make changes the boot sector.
The BIOS virus checker interprets changes made to the boot sector as the result of a virus and prevents the
computer from booting any further. We must therefore disable the BIOS virus checker. |
Incorrect answers:
A: Removing the virus checker in Windows 98 before starting the upgrade process could increase the
performance of the upgrade. However, it is the BIOS virus checker on the computer that is indicating
that the computer has a Master Boot Record virus. In this case the BIOS virus is the problem though.
C: We can fix a faulty master boot sector record by starting the Recovery Console and using the Fixmbr
command. However, the master boot sector has not been corrupted in this scenario. The BIOS virus
checker has mistakenly detected a possible virus.
D: The Boot.ini points to the correct boot partitions on a dual boot system. It does not indicate a boot sector
virus warning. The BIOS virus checker has mistakenly detected a boot sector virus and has generated
the warning. |
111.You are the administrator of your company’s network. You network has five Windows 2000 server
computers and 75 Windows 2000 Professional computers. The Windows 2000 Professional computers
were installed by using a RIS image on one of the Windows 2000 Server computers. You need to upgrade
several applications on the Windows 2000 Professional computers. The applications do not have built-in
support for scripted installations.
You want to accomplish the following goals:
• An unattended installation of the upgraded applications will be performed on the Windows 20000
Professional computers.
• Existing user environments will be maintained on the Windows 2000 Professional computers.
• The network name of each Windows 2000 Professional computer will be changed to match its
asset tag.
• The RIS image and the upgraded applications will be enabled as they are added to the network.
You take the following actions:
• Install the RIS image on a Windows 20000 Professional computer named Computer1.
• Install the upgraded applications on Computers1.
• Change the network name of Computer1 to %DMI-SERIAL_NUM%.
• Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server.
• Start all of the Windows 2000 Professional computers, and then load the RIS image from the RIS
server.
Which result or results do these actions produce? (Chooses all that apply.)
A. An unattended installation of the upgraded applications will be performed on the Windows 20000
Professional computers.
B. Existing user environments will be maintained on the Windows 2000 Professional computers.
C. The network name of each Windows 2000 Professional computer will be changed to match its asset tag.
D. The RIS image and the upgraded applications will be enabled as they are added to the network.
Answer: A, D
Explanation: The following steps are taken:
As the initial RIS image then the applications have been installed on Computer1 before the new RIS image was
created using the RIPrep utility, All the applications will be included in this image Furthermore, we have loaded
the new RIS image on to the RIS server, started all of the Windows 20000 Professional computers, and then
loaded the RIS image from the RIS server. Unattended installations of the upgraded applications will thus be
performed. |
Incorrect answers:
B: The hard drives on the computers are flushed when the new RIS image is loaded. Therefore the existing user
environments are not be maintained but will be replaced.
C: No special action is taken to handle the naming of the Windows 2000 Professional computers. The renaming
of Computer1 to %DMI_SERIAL_NUM% does not accomplish the naming of the Windows 2000 Professional
computers.
|
112.You are the administrator of a Windows 2000 Professional computer that is shared by several users in
the Sales department. User accounts have been created for current users. Current users can log on to the
computers. To accommodate new users, you add two new user accounts named User7 and User8 to
computer5. When user7 attempts to log on o the computer, she receives the following error message:
“Windows cannot copy file c:\documents\and Settings\Default User\ to location C:\Documents and
Settings\User7. Contact you network administrator. Detail – Access is denied. “ When User8 attempts to
log on to the computer, he receives the same type of error message.
You want to allow the two new users, as well as other users in the Sales department, to be able to log on
to the computer.
Which two methods can you use to accomplish your goal? (Choose two.)
A. Add the User7 and User8 user accounts to the DACL for the Profiles shared folder on the network
server.
B. Add the User7 and User8 user accounts to the DACL for the C:\Documents and Settings\Default user
folder.
C. Add the Everyone group to the DACL for the C:\documents and Settings\Default user folder.
D. Add a group Policy object (GPO) for the Sales OU that redirects user profiles to a shared folder.
E. Log on by using the local Administrator account and create new folders for User7 and User8 in the
C:\documents and settings folder.
F. Select the allow inheritable permissions from parent to propagate to this object option on the
c:\documents and Settings\default user folder, and reset the permissions on all child objects.
G. Move and retain permissions and compressions.
Answer: C, F
Explanation: The problem in this scenario is related to permissions to the C:\Documents and Settings\Default
user folder. To solve this problem we should grant the Everyone group permission on the C:\Documents and
Settings\Default user folder by adding the group to the DACL. We should also specify that the permissions to
the C:\Documents and Settings\Default user folder must propagate to its subfolders; Desktop, Documents,
Favorites and Start menu. |
Incorrect answers:
A: The error message indicates that there is a permission problem on the C:\documents and
Settings\Default user folder, not with permission on Profiles shared folder.
B: Granting the Everyone group permission to the C:\documents and Settings\Default user folder rather
than just User7 and User8 will reduce administrative effort and would not have to be repeated for each
new user that is added to the domain.
D: The error message indicates that there is a permission problem on the C:\documents and Settings\Default
user folder. It does not indicate a Group Policy object problem.
E: Granting the Everyone group permission to the C:\documents and Settings\Default user folder rather
than just User7 and User8 will reduce administrative effort and would not have to be repeated for each
new user that is added to the domain.
G: This is a very vague suggestion, as it does not indicate what permissions should be moved and what
permissions must be retained. Furthermore, file compression is an invisible process in Windows 2000.
The operating system takes care of uncompressing the compressed files when they must be read.
Therefore file compression is not the cause of the problem in this scenario.
|
113.Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000
Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10
new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS
names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet
mask on each new computer.
Which 2 additional TCP/IP properties should you configure on each new computer? (Choose two)
A. The bindings.
B. A DNS address.
C. A Gateway address.
D. A WINS server address.
E. A DHCP server address.
Answer: C, D
Explanation: As the network routed, it consists of more than one subnet. On a routed network a default
gateway address has to be configured so that the clients on one subnet will be able to communicate with the
clients on another subnet across the router. The requirement to use NetBIOS names in a routed environment
forces us to use a WINS server, as NetBIOS broadcasts cannot pass across the router. |
Incorrect answers:
A: There is no bindings option in TCP/IP properties.
B: There is a requirement to use NetBIOS names. WINS is used for NetBIOS names while DNS is used for
domain name resolution.
E: An IP address and subnet mask is already configured on all clients. |
114.You upgrade 6 MPS compliant computers from Windows NT Workstation 4.0 to Windows 2000
Professional computer. Each computer has two 550 MHz processors. The computers are used for highresolution
graphics applications that require exceptional performance. After the upgrade users complain
that the processing time for graphic applications is much slower than before.
What should you do?
A. Use Device Manager to enable AGP bridge controller.
B. Use Device Manager to install the MPS compliant drivers for the second processor.
C. Use Device Manager to install ACPI compliant driver for second processor.
D. During startup press F8 and install MPS compliant driver for second processor.
Answer: B
Explanation: Before the upgrade the NT Workstation 4.0 operating system was configured for multiprocessor
support. The upgrade process does not automatically keep this configuration since a new Hardware Abstraction
Layer (HAL) needs to be installed. This HAL has to be Multiprocessor (MPS) compliant. We can update the
Hardware Abstraction Layer (HAL) with the Device Manager. Open Computer Management in Administrative
Tools, open Device Manager, expand Computer, right-click Advanced Configuration and Power Interface
(ACPI) PC (or similar), select Properties, select Driver tab, select Update Driver. This will start the Upgrade
Device Driver Wizard, which can be used to update the HAL. |
Incorrect answers:
A: Enabling AGP bridge controller will not enable support for the second processor. Support for the second
processor is dependant on the HAL.
C: Power Management drivers (ACPI drivers) will not enable support for the second processor. Support for
the second processor is dependant on the HAL.
D: To install a new HAL during the installation process you should press F2, not F8. |
115.You are configuring your computer to use both Windows 2000 Professional and Windows 98. Your
computer has 3 6GB hard disks, Disk0, Disk1 and Disk2. You want to configure each hard disk to have a
6GB partition. You want to install Windows 98 on Disk0 and Windows 2000 Professional on Disk1. You
want to store your project file on Disk2. You want to implement file level security on Disk1. You want to
be able to access your project files when using either operating system.
What should you do?
A. DISK 0 - FAT32 , DISK 1 - NTFS , DISK 2 - FAT32
B. DISK 0 - NTFS , DISK 1 - FAT32 , DISK 2 - FAT32
C. DISK 0 - FAT32 , DISK 1 - NTFS , DISK 2 - NTFS
D. DISK 0 - FAT32 , DISK 1 - FAT32 , DISK 2 - FAT32
Answer: A
DISK 0 - FAT32
DISK 1 - NTFS
DISK 2 - FAT32
Explanation: The computer will boot from the first disk, which is DISK 0. This disk must be formatted with
the FAT32 file system as Window98 can only boot from the first disk, and cannot reside on a disk that has been
formatted with the NTFS file system. As Windows 2000 will be installed on disk1, it should be formatted with
the NTFS file system as the encryption file level security requires the NTFS file system. The Windows 98
operating system is not be able to detect the NTFS file system and as we want to store project file on Disk2 and
we want to be able to access the project files from either operating system, we will have to format Disk2 with
the FAT32 file system.
DISK 0: Windows 98 will be installed on Disk 0. Windows 98 supports only FAT, not NTFS. FAT32 is
preferred to FAT16.
DISK 1: File level security should be implemented on Disk1. Only NTFS supports file level security.
DISK 2: The project files are stored on disk2. They should be accessed from Windows 98 and Windows 2000.
FAT must be used. FAT32 is preferred to FAT16. |
116.You install Windows 2000 Professional on your portable computer. Your computer has a built in 10 MB
Ethernet Adapter. You have installed a 100MB Ethernet PC Adapter card
When the installation is complete you notice that 10MB Ethernet PC card Adapter is not functioning.
You use computer management to view the network Adapter in your computer. Device Manager shows
that the 10MB Ethernet Adapter card and 100MB Ethernet PC Adapter card are conflicting with each
other.
You want to configure Windows 2000 Professional to use only the 100MB PC card Adapter. What should
you do?
A. Remove the 100MB Ethernet Adapter driver by using Device Manager.
B. Remove the drivers from both Ethernet Adapter cards by using Device Manager.
C. Install the 100 MB Ethernet Adapter in different PC card slot.
D. Disable the device driver for 10Mb Ethernet Adapter card by using Device Manager.
Answer: D
Explanation: The 10MB and the 100MB adapter cards are in conflict. By disabling the 10MB adapter card it
will no longer use any system resources and the 100MB would work properly. The 10MB adapter does not have
to be physically removed, it could just be disabled. |
Incorrect answers:
A: The 100MB network card would be preferred as it has improved network capabilities over the 10MB network card therefore its drivers should not be disabled.
B: Removing the drivers for both network cards will prevent both network cards from working and will
prevent us from accessing the network. This is thus not a viable solution. Furthermore we need only
disable one of the network cards’ drivers so as to overcome the system resource conflict. The 100MB
network card would be preferred as it has improved network capabilities over the 10MB network card
therefore its drivers should not be disabled.
C: The 10MB card would still compete for system resources after the 100MB card has been moved to a
different PC card slot. |
117.You are the administrator of your company’s network. You install Windows 2000 Professional on 10
computers in the graphics department. The 10 computers have built in USB controllers. You physically
install a USB tablet pointing device on each computer. You install the 32MB manufacturer tablets
software on each computer. A tablet icon appears in the central panel to configure the device but the
device does not work.
You want USB tablets to work on 10 computers. What to do?
A. Enable the USB ports in the BIOS and reinstall the USB tablet device drivers.
B. Enable the USB root hub controller and reinstall the USB tablet device driver.
C. Disable the USB error detection for the USB root hub controller and enable USB tablet device in
hardware profile.
D. Reinstall the USB device drivers and disable the USB error detection.
Answer: A
Explanation: On some older computers the USB must be enabled manually in the BIOS. |
Incorrect answers:
B: The USB root hub controller is enabled by default.
C: USB error detection is not a likely cause of this problem.
D: USB error detection is not a likely cause of this problem. |
118.You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and
maintain their security settings. You have the option of backing up to either the network or floppy disk.
What should you do?
A. Copy the files to a network share on a NTFS volume and do nothing further.
B. Copy the files to a network, shared on a NTFS 32 volume and do nothing further.
C. Copy the files to a floppy disk that has been formatted by using Windows 2000 Professional.
D. Replace the files in an encrypted folder, and then copy the folder to floppy disk.
Answer: A
Explanation: Encryption security settings are retained when an encrypted file is moved or copied to an NTFS volume. |
Incorrect answers:
B: There is no NTFS 32 file system. Windows 2000 uses NTFS 5.0, Windows NT 4.0 uses NTFS 4.0. and
Windows 98 uses FAT32, which does not support encryption.
C: Floppy disks use the FAT file system, which does not support encryption.
D: Floppy disks use the FAT file system, which does not support encryption. |
119.You are the administrator of your company's network. A user named Tom in the art department wants
to update his Windows 2000 Professional computer so that he can view graphics at the highest resolution.
Tom downloads a video card driver from the Internet and then asks of your assistance in installing it.
You are unsure of the source of driver. You want to ensure that Tom does not loose productive time
because of the incompatible driver.
What should you do?
A. Install the driver in the computer. Save after installing the driver. Restart the computer, then use the last
known good configuration to recover the original driver.
B. Install the driver in the computer. Save after installing the driver, use hardware troubleshooter then use
Recovery Console to recover the original driver.
C. Display the advance attributes a parallel works for video card driver file. Install the file, if the contents
have been secured.
D. Run file signature verification survey to verify that the driver has a digital signature. Do not install
otherwise.
Answer: D
Explanation: SIGVERIF.EXE is a file signature verification utility that can be used to quickly scan protected
system files and verify that their digital signatures are intact. In the utility’s advanced settings dialog box, we
can set the program to scan non-system files in any location, including the downloaded driver in this scenario.
We would click on Start, select Run, type sigverif in the dialog box and press Enter. This will bring up the file
signature verification utility, We would the press the Advanced button, select Look for other files that are not
digitally signed, and choose Browse to browse for the folder that contains the downloaded driver. |
Incorrect answers:
A: It would be a better practice to check if the driver is signed before installing it, as this would inform us
of any possible consequences that may arise from the installation of the driver should it not be signed.
B: It would be a better practice to check if the driver is signed before installing it, as this would inform us
of any possible consequences that may arise from the installation of the driver should it not be signed.
C: Viewing advanced attributes of the driver will not show if it is signed or not. |
120.You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a
user named Paul West. You create a user account named Paul West on the Windows 2000 server
computer named server 1. You define a network profile by entering the path
\\server1\profile\%username% in Paul’s user account setting.
When Paul logs on to a Windows 2000 Professional computer he sees the following message.
“Windows can not locate your roaming profile and is attempting to log you on with your local profile
which will not be propagated to the server.”
The details of network cannot be found. You want to configure the roaming user profile for Paul.
What should you do?
A. Create a home folder for Paul.
B. Share the network profile directory.
C. Map a device to network profile directory.
D. Use the %username% variable to allow access.
Answer: B
Explanation: Roaming profiles are used for users who log on to the network from different computers but who
require the same desktop setting regardless of which computer they use to logon. Therefore the roaming profiles
must be stored on a network share and the user account must be given appropriate NTFS and share permissions
to that folder. This will allow the user account to access that folder regardless of the computer that they use to
logon to the network. In this scenario a network folder has been specified as the folder where the roaming
profiles must be stored. However, Paul’s user account cannot access the roaming profile therefore Paul’s user
account has probably not been given the appropriate permissions to the folder that is used to store the profiles. |
Incorrect answers:
A: Roaming profiles are used for users who log on to the network from different computers but who require
the same desktop setting regardless of which computer they use to logon. Therefore the roaming profiles
must be stored on a network share and the user account must be given appropriate NTFS and share
permissions to that folder. Home folders are created on the local computer and will thus only be
available on that computer. The user however requires a profile that is accessible from the network.
C: The correct path to the folder that is used to store the roaming profiles has already been specified.
However, Paul’s user account cannot access the roaming profile therefore Paul’s user account has
probably not been given the appropriate permissions to the folder that is used to store the profiles.
D: The %username% variable cannot be used to enable access to the roaming user profile. Roaming
profiles must be stored on a network share and the user account must be given appropriate NTFS and
share permissions to that folder. This will allow the user account to access that folder regardless of the
computer that they use to logon to the network. |
121.You install Windows 2000 Professional on your portable computer. You install an SCSI and PC card
adapter, that you can use in the office to use color scanner. You use a docking station for your computer
when you are in the office. You want to maximize the battery performance for your portable computer.
You also want to prevent the driver from loading whenever you are away from the office.
What should you do?
A. When away from the office use Device Manager to remove the adapter.
B. When away from the office configure the startup properties for the adapter to be automatic.
C. Remove the computer from the docking station and start Windows 2000 Professional to disable the
SCSI PC card adapter device for the current profile.
D. Remove the computer from the docking station and start Windows 2000 Professional, use Device
Manager to remove SCSI PC card adapter device.
Answer: C
Explanation: The SCSI device should only be used when using the docked hardware profile at the office.
Therefore the SCSI device must be disabled in the undocked hardware profile. |
Incorrect answers:
A: It is not necessary to manually remove the adapter every time the user is away from the office, as it
would require that the device be physically replaced every time the user has to dock the portable
computer. Windows 2000 provides mechanisms to disable a device without physically removing it from
the computer. It is also possible to create two hardware profiles; one that has the SCSI device disabled
and is used when the portable computer is not docked; and one that has the SCSI device enabled. This
profile should be used when the portable computer is docked. When two hardware profiles exist on a
computer, the user is prompted to choose which profile to use during the Windows 2000 startup process.
B: It is not necessary to disable the device every time the user is away from the office, as it would require
that the device be enabled every time the user has to dock the portable computer. Windows 2000
provides mechanisms to disable a device without physically removing it from the computer. It is also
possible to create two hardware profiles; one that has the SCSI device disabled and is used when the
portable computer is not docked; and one that has the SCSI device enabled. This profile should be used
when the portable computer is docked. When two hardware profiles exist on a computer, the user is
prompted to choose which profile to use during the Windows 2000 startup process.
D: Physically removing the device from the portable computer would make he device unusable until it is
physically replaced. Windows 2000 provides mechanisms to disable a device without physically
removing it from the computer. It is also possible to create two hardware profiles; one that has the SCSI
device disabled and is used when the portable computer is not docked; and one that has the SCSI device
enabled. This profile should be used when the portable computer is docked. When two hardware profiles
exist on a computer, the user is prompted to choose which profile to use during the Windows 2000
startup process. |
122.You want to configure Windows NT Workstation and Windows 2000 Professional.
What should you do?
A. When installing Windows 2000 Professional run chkdisk in Windows NT Workstation.
B. Disable the disk compression in Windows NT Workstation.
C. Install service pack four or later in Windows NT Workstation.
D. Install the distributed file system client on the Windows NT Workstation.
Answer: C
Explanation: In this scenario a computer should be configured for a dual boot between Windows NT
Workstation and Windows 2000 Professional. Windows 2000 Professional uses the NTFS 5.0 file system while
Windows NT Workstation 4.0 uses the NTFS 4.0 file system. Windows NT Workstation requires Service Pack
4 or later to be able to use the NTFS 5.0 file system. |
Incorrect answers:
A: The Windows NT Workstation 4.0 operating system requires Service Pack 4 to be able to see the
Windows 2000 volume. Windows 2000 Professional uses the NTFS 5.0 file system while Windows NT
Workstation 4.0 uses the NTFS 4.0 file system. Windows NT Workstation requires Service Pack 4 or
later to be able to use the NTFS 5.0 file system.
B: Disabling the disk compression in Windows NT Workstation will not enable Windows NT Workstation
to use the NTFS 5.0 file system. Windows 2000 Professional uses the NTFS 5.0 file system while
Windows NT Workstation 4.0 uses the NTFS 4.0 file system. Windows NT Workstation requires
Service Pack 4 or later to be able to use the NTFS 5.0 file system.
D: Neither Windows 2000 Professional nor Windows NT Workstation 4.0 support a distributed file system
client. Therefore this solution is not appropriate to the scenario. |
123.You are the administrator of your company’s network. A user named Paul in the service department has
a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his
computer. A local computer named Sales has all the data. Paul is the member of Sales local group but he
cannot access the file he needs.
What should you do?
A. Grant Paul NTFS permission so that he can access any parent folder to files in the shared folder.
B. Share the Sales folder and grant Paul shared folder permission to access the shared Sales folder.
C. Remove Paul from any other group that has been explicitly denied access to the Sales folder.
D. Delete the Sales local group and recreate, add individual user accounts from Sales department back into
Sales local group.
Answer: C
Explanation: The Sales group, which Paul is a member of, has permission to access the files. However, Paul
still cannot access the files. It would seem that Paul has a permissions conflict in a different user context. A user
can be granted file permissions in a number of contexts: as a user or as a member of a user group. When a user
has different file permissions in a multiple contexts, the most restrictive permission is applied, furthermore, the
deny permission overrides all other permissions. As Paul does not have access to the file we must therefore
assume Paul has explicitly been denied access to the file in some context, as member of one or more groups that
have been denied access to the file. We would thus have to remove Paul from such a group so that the
restriction is not applied to Paul. |
Incorrect answers:
A: Paul has already got NTFS permission to the file, since he belongs to the Sales group. The deny
permission overrides all other file permissions. We therefore need to remove Paul’s user account from
the groups that have been denied access to the file.
B: When a user has different file permissions in a multiple contexts, the most restrictive permission is
applied, furthermore, the deny permission overrides all other permissions. As Paul does not have access
to the file we must therefore assume Paul has explicitly been denied access to the file in some context, as
member of one or more groups that have been denied access to the file. We would thus have to remove
Paul from such a group so that the restriction is not applied to Paul.
D: The Sales group has been correctly configured and has full permissions to the files. Paul is a member of
the Sales group and thus should have access to the files by virtue of his membership to that group.
However, a user can be granted file permissions in a number of contexts: as user or as a member of a
user group. When a user has different file permissions in a multiple contexts, the most restrictive
permission is applied, furthermore, the deny permission overrides all other permissions. As Paul does
not have access to the file we must therefore assume Paul has explicitly been denied access to the file in
some context, as member of one or more groups that have been denied access to the file. We would thus
have to remove Paul from such a group so that the restriction is not applied to Paul. |
124.You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer.
Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was
configured by a system policy to require at-least a 12 alphanumeric character password. After the
upgrade your computer will not apply security policy.
What should you do?
A. Use secedit.exe to refresh the security policy.
B. Use the local computer policy to configure the local security policy.
C. Use security configuration and analysis to support the security files as a .pol file.
D. Use computer management to configure the security policy setting.
Answer: B
Explanation: In this scenario the Windows NT Workstation 4.0 and Windows 2000 Professional computers
have incompatible security settings. The security setting could be correctly configured with a local computer
policy. From Control Panel, open the Administrative Tools, open Local Security Policy, select Security
Settings, select Account Policies, select Password Policies, and select and Configure Minimum Password
Length. |
Incorrect answers:
A: The security policy must be correctly configured, not refreshed.
C: Windows 2000 does not use .pol files for security policy settings. .pol files are used on Windows NT computers.
D: Computer Management cannot be used to configure security policy settings; instead the Local Security
Policy administrative tool should be used. |
125.You are the administrator of your company’s network. The software department is preparing to rewrite
an accounting application so that it will run on Windows 2000 Professional computers. All of the
computers in the software department currently use Windows 98. You want to configure the computers
in the software department so that the users can use both Windows 98 and Windows 2000 Professional
during the project.
You also want to ensure that the computers are configured for optimal disk performance. In addition you
want to ensure that users in the software department can access all of the files on their computers by
using either operating system.
What should you do?
A. Create and format a FAT 32 partition.
B. Create and format an NTFS volume.
C. Configure Windows 2000 Professional to enable disk compression.
D. Configure Windows 2000 Professional to enable dynamic volume.
Answer: A
Explanation: All files need to be accessed from both Windows 98 and Windows 2000. Windows 98 only
supports the FAT and the FAT32 file systems. It cannot support the NTFS file system. Therefore the partition
must be formatted with the FAT32 file system. |
Incorrect answers:
B: Windows 98 cannot support the NTFS file system. It therefore cannot access NTFS file systems and
cannot detect partitions that have been formatted with the NTFS file system.
C: Windows 98 is not able to read compressed Windows 2000 volumes. Uncompressed FAT volumes must
be used.
D: Windows 98 is not able to access dynamic volumes. Basic FAT volumes must be used. |
126.You are the administrator of you company network. A user named Peter requests assistance in his
Windows 2000 Professional portable computer. Peter is preparing for his test and wants to optimize the
battery life for his portable computer.
You want to configure Peter’s computer to save the contents of memory on hard disk and then shutdown
when Peter presses the sleep button.
What should you do?
A. Configure power settings to use the standard option.
B. Configure power settings to use the power off option.
C. Configure power settings to use the hibernate option.
D. Configure power settings to use always on power scheme.
E. Configure the computer to use the portable laptop power scheme.
Answer: C
Explanation: When your computer hibernates, it saves the current system state to the hard disk, and then shuts
down the computer. When the computer is restarted after it has been hibernating, it loads the saved system state
and thus all applications that were open will be reloaded at the same point they were when the computer went
into hibernation. |
Incorrect answers:
A: Hibernate mode, not standard mode, must be selected to allow the computer to go to sleep.
B: If you configure the Power Settings to Power Off on pressing the Sleep button, the memory contents will
not be saved to the hard drive.
D: If the Always On power scheme is configured to be used nothing would happen when the sleep button
would be pressed.
E: The portable laptop power scheme is used to save power; it is not used to configure the sleep button. |
127.You are delegated administrative control of graphics Organizational Unit. You install Windows 2000
Professional on 25 PXE-compliant computers in graphics Organizational Unit by using disk-duplicating
software. The reference computer was configured to have the Windows 2000 default desktop settings.
Users in the graphics Organizational Unit have home folders specified in their user account settings. The
home folders are located on the \\server1\usersnetwork share. You want to change the default path of the
users my documents folder to their respective home folder whenever users log on to the network.
You want to accomplish this with least amount of administrative effort.
What should you do?
A. In the properties of the My Documents folder select move and define the UNC path\\server1\users.
B. Reconfigure domain user account properties on the profile tab and define the UNC path\\server1\users.
C. Enable a local computer policy to redirect the My Documents folder and define the UNC
path\\server1\users\%username%.
D. Create a group policy object of the graphics Organizational Unit to redirect the My Documents folder
and define the UNC path\\server\user\%username%.
Answer: D
Explanation: To change the default path of the users my documents folders to their respective home folders
whenever users log on to the network, a Group Policy Object (GPO) must be linked to the graphics
Organization Unit (OU) and can be used to redirect the My Documents folder to the user’s network share. All
users in the graphics OU will then have their My Documents folder redirected. |
Incorrect answers:
A: The properties of the My Documents folder does not support a move command.
B: A policy must be used to redirect the My Documents folder to the network share. It cannot be
configured in the domain user account properties. A Group Policy Object (GPO), which can be used to
redirect the My Documents folder to the user’s network share, must be linked to the graphics
Organization Unit (OU).
C: It is possible to redirect the My Documents folder with a local computer policy. The drawback is that
this has to be configured at every client computer. Using a group policy would require less
administrative work. |
128.You install Windows 2000 Professional on your portable computer. You create a new dial up connection
to connect to your company’s remote access server. You connect to the remote access server by using the
dial up connection. You can connect to the servers on the same segment as the remote access server. You
cannot access the shared resources that are on the remote segments from the remote access server.
What should you do?
A. Configure the company remote access server to accept multilink connections.
B. Configure the TCP/IP program for the dial up connection to disable IP header compression.
C. Configure the TCP/IP properties for the dial up connection to use the default gateway on the remote
network.
D. Grant your user account dial in permission on the company remote access server.
Answer: C
Explanation: If the RAS client does not use the same Default Gateway as the RAS server, it will be able to
reach the computers on the same segment as the RAS server, but it will not be able to reach other remote
segments. |
Incorrect answers:
A: This is not a multilink problem. A multilink problem is when not all communication lines are used.
B: Disabling header compression can be used when the dial-client and the dial-server are not able to
communicate. This will enable the dial-client and the dial-server to communicate. It will however, not
allow the client to reach other remote segments.
D: The client has successfully accessed to the RAS server. Therefore there cannot be a dial-in permission
problem in this scenario. |
129.You are using Windows 2000 Professional on your desktop computer. You are working on the company’s
financial report and you want other users on the network to able to modify your documents for the
report. You want users to share the financial report folder on the network. Because the network contains
confidential information you want to prevent users from the enabling off line access for the network
share that contains the financial report.
What should you do?
A. Use Windows Explorer to receive the offline files.
B. Using the Windows Explorer, disable the cache for the reports on the network share.
C. Use the Windows NT explorer to grant the special access for the reports on the network share.
D. Use the synchronization manager to configure synchronization not to occur when users are connected to
the LAN connection.
Answer: B
Explanation: To prevent users from the enabling off line access for the network share that contains the
financial report we must disable caching for the report folder. This will prevent users enabling off line access
for this share. |
Incorrect answers:
A: This solution is not appropriate in this scenario, as we want to prevent the use offline files. We must
instead disable caching for the report folder.
C: Special access cannot be used to prevent users enabling off line access. To prevent users from enabling
off line access for the network share that contains the financial report, we must disable caching for the
report folder.
D: Users would still be able to use manual synchronization, and make the files available for off line access.
To prevent users from the enabling off line access for the network share that contains the financial
report, we must disable caching for the report folder. |
130.You are using a Windows 2000 Professional computer. You create a shortcut for the folder named
PROJECTS on the network share. You want to make shortcuts to the projects folder available, when you
are not connected to the network. You attempt to configure the shortcut to be available offline. However
you do not see an option to make the folder available offline.
What should you do?
A. Use Windows Explorer to enable the CACHE for the project folder.
B. Use Windows Explorer to configure the project folder on the network share to be available for offline
access.
C. Connect to the network before trying to make shortcut available online.
D. Create the shortcuts of each file in the projects folder and then make the shortcut files available offline.
Answer: B
Explanation: An option to make the folder available offline is only available when the folder is configured for offline
availability. |
Incorrect answers:
A: The setting to enable caching for users applies to other users on the network not to you. So this setting does
not have to be configured in this scenario.
C: Folders, not shortcuts, can be configured to be available for off line access.
D: Folders, not shortcuts, can be configured to be available for off line access.
|
131.You want to use Windows 2000 backup to perform a weekly backup of the user data on a Windows 2000
Professional computer. You want to ensure that the registry, boot files and COM plus objects are also backed up.
What should you do?
A. Configure the Windows backup to backup the system partition.
B. Configure the Windows backup to backup the system state data.
C. Create a script written in MS Visual Basic scripting addition language to run rdisk.exe/s before back up
starts.
D. Create the batch file to run rdisk.exe/s before the backup starts.
Answer: B
Explanation: The System State Data Backup is a backup of the registry, the Active Directory store on Domain
Controllers only, the SYSVOL folder, the COM+ Class Registration database, system startup files, and the
Certificate Services if Certificate Services are installed. To enable System State Data Backups click on Start,
select Accessories, select System Tools, select Backup, select Scheduled Jobs, choose Add Job, select Next:
Only backup system state data. Continue and finish the Wizard. |
Incorrect answers:
A: Backing up the system volume does not include a backup of the registry.
C: The Rdisk.exe utility was used in Windows NT to backed up the Emergency Repair data. Rdisk.exe
does not exist in a Windows 2000 environment.
D: The Rdisk.exe utility was used in Windows NT to backed up the Emergency Repair data. Rdisk.exe
does not exist in a Windows 2000 environment. |
132.You are configuring 5 computers to use both Windows NT workstation 4.0 and Windows 2000
Professional. Each computer has an 8GB hard disc. You configure that hard disc on each computer to
have two 4GB partitions. Windows NT workstation is installed on drive C. Windows 2000 Professional is
installed on drive D. in Windows 2000 Professional you configure a disc quota on drive D to prevent users
from saving work files on the disc. You restart the computer and load Windows NT workstation. You
notice that users can still save files to drive D.
You want to prevent users from saving files to drive D in either operating system. You also want to
ensure that users can access both drivers using either operating system.
What should you do on each computer?
A. Use Windows 2000 Professional to configure drive D as a dynamic volume.
B. Use Windows 2000 Professional to enable encrypting file system (ESF) on drive D.
C. Use Windows NT workstation to configure NTFS permission on drive D to deny the users write
permission.
D. Reinstall Windows NT workstation after configuring the disc code task.
Answer: C
Explanation: To prevent both Windows NT 4.0 Workstation and Windows 2000 Professional users from
access to the D drive NTFS permissions must be used. For example, it could be used to deny users write
permission. |
Incorrect answers:
A: Configuring drive D as a dynamic volume would prevent Windows NT 4.0 Workstation users accessing
drive D, however, Windows 2000 Professional users would still be able to access the drive.
B: Encrypting file system will prevent access to encrypted files and folders, but would not prevent access to
unencrypted files.
D: Neither Windows NT 4.0 Workstation nor Windows 2000 Professional supports a disc code task. |
133.You install Windows 2000 Professional on a computer named client 2. Client 2 is configured to have a
TCP/IP address of 10.10.167.4 and a default gateway of 10.10.167.1.
The network is configured as shown in the exhibit. .
You want to connect to a shared folder on server B. You want to attempt to connect to the network share.
You receive the following error message, ‘the network location cannot be reached’. You run IP configure
to view the configuration on client 2.
Which configuration setting would you change?
(To answer click the incorrectly configured network setting.) In the IP configuration display.
A. Subnet mask
B. Default Gateway
C. DHCP Server
D. WINS Server
Answer: A
Explanation: The subnet mask is too restrictive. It must include more nodes. |
Incorrect answers:
B:The configuration of Default Gateway does not need to be changed.
The advanced option does not need to be used.
C:You do not need to Change the DHCP Server
D:You do not need to Change the WINS Server |
134.You use a Windows 2000 Professional computer to run a weekly accounts table. The report has the name
ap_financial_reports. You also want the use the computer to run a task named perf_log to connect to
network routers and retrieve their performance logs. When the ap_financial_report is running on the
computer perf_log task stops responding the eventually times out. When you run only the perf_log task
the task completes successfully. You use the task manager to view your system resources.
You want to resolve the performance log time out problem by using task manager.
What should you do?
A. Decrease the base priority of the ap_financial_reports task.
B. Decrease the number of threads available for the ap_financial_reports task.
C. Increase the base priority of the perf_log task.
D. Increase the number of threats available for perf_log task.
Answer: A
Explanation: In this scenario the ap_finincial_reports task is using too much system resources. To reduce the
amount of system resources allocated to the task, the task’s base priority has to be decreased. The base priority
can be set from -32768 to 32767. The default priority setting is 0. |
Incorrect answers:
B: It is it not possible to decrease the number of threads available for a particular task in Windows 2000.
C: The ap_finincial_reports base priority has to be decreased. There is no need to increase the base priority
of the perf_log task; it completes successfully when the ap_finincial_report task is not run.
D: It is it not possible to increase the number of threads available for a particular task in Windows 2000. |
135.You are the administrator of your company's network. You install 220 new Windows 2000 Professional
computers in the Sales department. Two weeks later users report that five of the computers have stopped
responding. You trouble shoot the five computers and then find that the users have attached USB devices
and have installed device drivers that are not supported by Windows 2000 Professional. You want to
ensure that it does not happen again.
You decide to configure the computer to install device drivers only for the devices that are included on
the current hardware compatibility list (HCL).
What should you do?
A. Use NTFS permission to restrict users access to the /win NT/driver cache folder.
B. Use NTFS permission to restrict users access to the/win NT/system32/drivers folder.
C. Configure Windows 2000 Professional to enable driver signing verification.
D. Configure Windows 2000 Professional to trust the Microsoft certificate authority (CA).
Answer: C
Explanation: To prevent the installation of unsigned drivers, the driver signing verification option has to be
enabled. Microsoft has signed all the drivers for the devices, which are included in the hardware compatibility
list (HCL). With driver signing enabled and set to block, only device drivers for devices on the current HCL
will be allowed to be installed. |
Incorrect answers:
A: NTFS permissions are permissions to files and folders, and cannot be used to prevent drivers from being
installed. To prevent the installation of unsigned drivers, the driver signing verification option has to be
enabled instead.
B: NTFS permissions are permissions to files and folders, and cannot be used to prevent drivers from being
installed. To prevent the installation of unsigned drivers, the driver signing verification option has to be
enabled instead.
D: The Microsoft certificate authority (CA) is used supply support for certificates that are used for
authentication purposes; the Microsoft certificate authority is not used for configuration of driver
signing. To prevent the installation of unsigned drivers, the driver signing verification option has to be
enabled instead. |
136.You are the administrator of your company's network. Your network has 20 Windows 2000 server
computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to
perform clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the
Windows 98 computers are identical models and are PXE complaint.
You want to accomplish the following goals:
• An unattended installation of Windows 2000 Professional will be performed.
• An unattended installation of company's standard application will be performed during the
installation of Windows 2000 Professional.
• Each computer will be assigned a unique security identifier description.
• The unattended installation script will be modified so that the computers automatically join the contoso.com domain.
You take the following actions:
• Install Windows 2000 Professional on Windows 98 computer named computer 1.
• Install and configure computer standard application on computer 1.
• Use set up manager on computer1 to create an unattended.txt file based on the current
configuration including domain membership.
• Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use the
unattended.txt file to provide the setting for the installation.
Which result or results do these actions produce? (CHOOSE ALL THAT APPLY)
A. An unattended installation of Windows 2000 Professional will be performed.
B. An unattended installation of company's standard application will be performed during the installation of
Windows 2000 Professional.
C. Each computer will be assigned a unique security identity description.
D. The unattended installation script will be modified so that the computers automatically join the
contoso.com domain.
Answer: A, C
Explanation: The setup manager is used to create an unattend.txt answer file. Using the answer file an
unattended installation will be performed. New security identifier descriptions (SIDs) are created by default
during the installation process. |
Incorrect answers:
B: Sysprep.exe utility should be run after the installation of applications so that the applications can be
included in the unattended installation.
D: The computers will not automatically join the contoso.com domain. You need to prestage computer
accounts and to use a UDF (Uniqueness Database File) for the computer names.
|
137.You want to configure your Windows 2000 Professional computer to support two monitors. Your
computer is configured to use 16-bit color, 1024 x 768 and an optimal refresh rate. You physically install
plug and play PCI adapters and their appropriate drivers. The video adapters are included on the
current hardware compatibility list (HCL). You start the computer after Windows 2000 Professional
loads. You notice that the secondary monitor does not display an image.
What should you do?
A. Move the video adapters to different PCI slots so that the primary video adapter is in slot zero.
B. Use the hardware troubleshooter to upgrade the video adapter drivers for the secondary video adapter.
C. Run DXDIAG.exe to configure the video adapters. Configure the secondary video adapters to use the
optimal refresh rate.
D. Change the resolution of the primary video adapter to 640 x 480 and use the default refresh setting for
the primary video adapter.
Answer: A
Explanation: When configuring multiple adapters to support multiple monitors, the primary display adapter
should be installed in the either PCI slot 0 or 1. This will ensure that the monitor displays will be correct.
|
Incorrect answers:
B: Only hardware devices and their drivers that have been check by Microsoft for compatibility with Windows
2000 are included in the HCL. Ac both video adapters are included in the HCL, their drivers should not create
incompatibility issues with Windows 2000.
C: DXDIAG is a Direct X diagnostic program. It cannot be used to configure multiple monitors. This solution
is thus inappropriate.
D: The second monitor is black; it is not displaying the image. If there were a problem with the resolution
settings, the monitor would have shown a distorted image. Furthermore, the first monitor is showing a correct
image. |
138.You are the administrator of your company's network. You are preparing to deploy 20 new Windows
2000 Professional computers on your network. You want to be able to recover from disc failures and
corrupt system files on the new computers. You want to configure the computers to automatically update
their system configuration and emergency repair files on a scheduled bases.
What should you do?
A. Use the add command to schedule a weekly job to back up the boot partition.
B. Use the add command to schedule a weekly job to return the system file checker.
C. Use Windows backup to schedule a backup of the system state data.
D. Use Windows backup to schedule a backup of the system partition and the boot partition.
Answer: C
Explanation: The System State Data Backup is a backup of the registry, the Active Directory store on Domain
Controllers only, the SYSVOL folder, the COM+ Class Registration database, system startup files, and the
Certificate Services if Certificate Services are installed. To enable System State Data Backups click on Start,
select Accessories, select System Tools, select Backup, select Scheduled Jobs, choose Add Job, select Next:
Only backup system state data. Continue and finish the Wizard.
|
Incorrect answers:
A: On a partitioned hard drive, the boot partition is the first logical drive that is used to boot the operating
system. Backing up the boot partition will not back up the system configuration.
B: The system file checker could possibly denote the File Signature Verification utility (Sigverif). Sigverif
is used to find unsigned device drivers. It cannot be used to update system configuration and emergency
repair files.
D: Backing up the system and the boot partition will not backup the system configuration. The system state
data has to be backed up. |
139.You install Windows 2000 Professional on a computer named Client2. The computer is configured to
have a TCP/IP address of 10.10.167.4 and a default gateway of 10.10.167.1
You want to connect to a shared folder on a server B. When you attempt to connect to the network share
you receive the following error message, ‘the network location could not be reached’.
You run IP config to review the configuration as shown in IP configuration exhibit.
You want to allow Client2 to connect to server B.
What should you do?
A. Place Client2 on the same segment as server B.
B. Place a computer running the wins proxy server on the same segment as Client2.
C. Configure Client2 to use a default gateway of 10.10.13.1.
D. Configure Client2 use a DNS server address 10.10.13.24.
E. Configure Client2 to use a WINS server address of 10.10.13.24.
Answer: E
Explanation: Client2’s default gateway setting, the IP address, 10.10.167.1, of the Router’s local interface is
correct. Client2 requires a name resolving service to be able to use names to connect to resources, such as
ServerB, on the network. The only name resolution service provided by the network is the WINS server named
Server A, which has an IP address of 10.10.13.24. By configuring Client2 with the WINS server address of
10.10.13.24, Client2 will be able to connect to Server B. |
Incorrect answers:
A: Placing Client2 on the same segment as server B should not be necessary, as Client2 has been provided
with the correct default gateway IP address of 10.10.167.1.
B: Wins Proxy server is used for clients with operating systems that do not support WINS. Windows 2000
Professional support WINS so there is no need for a Wins Proxy server.
C: Client2 has been provided with the correct default gateway IP address of 10.10.167.1. The IP address of
10.10.13.1 is the IP address of the Routers remote interface. The default gateway should be configured
with the IP address of the local interface of the Router, which is 10.10.167.1.
D: There is no DNS server on the network. Server A, the WINS server, has the IP address
10.10.13.24. |
140.You are installing Windows 2000 Professional on a computer named client2. The network is configured
as shown in the exhibit. .
Your network uses TCP/IP as the only network protocol. You configure Client2 to have a TCP/IP
address of 10.10.20.234, a default gateway of 10.10.13.1, and a WINS Server address of 10.10.13.10.
ServerB is configured with TCP/IP. ServerB is the network WINS server.
You cannot connect to shared resources on ServerB and ServerC by using UNC names. You want Client2
to be able to connect to ServerB and ServerC.
What should you do?
A. Configure Client2 to use a default gateway of 10.10.20.1.
B. Configure Client2 to use a TCP/IP address of 10.10.13.234.
C. Install a WINS server on the same segment as Client2.
D. Install and configure a DNS server, and configure Client2 to use the DNS server service.
Answer: A
Explanation: The exhibit indicates that Client2 has an incorrect default gateway setting, the gateway setting
should be 10.10.20.1 and not 10.10.13.1 as can be seen in the exhibit. |
Incorrect answers:
B: There is no need to change the TCP/IP address of Client2. This will not enable Client2 to connect to
ServerB. We should instead configure Client2 with the correct the default gateway.
C: It is not necessary to install a WINS server on the same segment as Client2. Client2 would be able to
reach the WINS server on the other segment if the default gateway setting was configured correctly.
Furthermore, adding a WINS server to the segment that Client2 is on will not enable Client2 to connect
to ServerB.
D: Client2 is already configured for WINS therefore DNS is not required as WINS and DNS are both
responsible for name resolution. And both can be used by Windows 2000 Professional. |
141.All of the client computers in your company network are Windows 2000 portable computers. A user
named Maria stores Sales files in her My Documents folder. She uses these files when she travels. Maria
informs you that when she takes her portable computer to trade shows, she can access some of the Sales
files but not all of them. When her portable computer is connected to the network at the office, she can
access all of the files.
You need to enable Maria to access all of the files in her My Documents folder when she is working
remotely.
What should you do?
A. Allow Maria full control permissions on the %systemroot%\documents and settings\Maria\My
Documents folder.
B. Allow Maria full control permissions on the %systemroot%\documents and settings\all users\My
Documents folder.
C. Configure Maria’s computer to automatically copy the entire contents of her network My Documents
folder to her offline files folder.
D. Configure Maria’s computer to automatically copy the entire contents of her network My Documents
folder to her local My Documents folder.
Answer: C
Explanation: To give Maria access to the files when she is working remotely, the folder needs to be enabled for
offline access and must be configured to make the entire contents of the folder available offline. |
Incorrect answers:
A: Full control permissions on the folder will not give Maria access to the folder when she is working
remotely. The folder needs to be enabled for offline access and must be configured to make the entire
contents of the folder available offline to give Maria access to the files when she is working remotely.
B: Full control permissions on the folder will not give Maria access to the folder when she is working
remotely. The folder needs to be enabled for offline access and must be configured to make the entire
contents of the folder available offline to give Maria access to the files when she is working remotely.
Furthermore, the subfolder that has been designated to offline access is not the correct folder. This is the
all users folder; we should specify Maria’s folder.
D: A folder cannot be configured to be copied to the local My Documents folder. To give Maria access to
the files when she is working remotely, the folder needs to be enabled for offline access and must be
configured to make the entire contents of the folder available offline. |
142.From your Windows 2000 Professional computer, you need to map drive G to the default administrative
share on drive C of a server named srv01.
Which command can you use?
A. Net share C$=G:\
B. Net share Admin$=G:\
C. Net use G:\\AppSrv01\C$
D. Net use G; \\AppSrv01\Admin$
Answer: C
Explanation: The root of each volume on a hard disk is automatically shared, and the share name is the drive
letter appended with a dollar sign ($). The appended dollar sign causes the share to be hidden. One method of
mapping a drive to a logical drive is to open the command prompt and use the NET USE command. The basic
syntax of this command is: NET USE devicename \\computername\sharename. In this scenario this translates to
the command: NET USE G:\\AppSrv01\C$. |
Incorrect answers:
A: Net share is used to share resources. It is not used to map drives.
B: Net share is used to share resources. It is not used to map drives.
D: Net use G; \\AppSrv01\Admin$ is syntactically incorrect. It also would map the incorrect resource.
Admin$ is the system root folder, which is C:\Winnt by default. |
143.You have 17GB of private files on drive D on your Windows 2000 Professional computer. You have
shared the files as private_files. You do not want other users to see this share name in the browse list.
You want all other share names to continue to appear in the browser list.
What should you do?
A. Stop the computer browser service, and disable the startup state.
B. Change the comment for the share to hidden:Yes
C. Change the share name to private_files$.
D. Add a hidden entry to the HKLMSystem\currentcontrolset\services\larmanserver\shares\private_files
registry value entry.
Answer: C
Explanation: By appending a dollar sign to the end of the share name the share is hidden and the folder will not
be shown in any browse list. Only users who know the folder name can gain access to it if they also possess the
proper permissions to it. |
Incorrect answers:
A: If the computer browser service is stopped, users on the computer will not be able to browse the
network. The share would still be visible though.
B: A share will not become hidden by adding any comments to it. It will only be hidden when the dollar
sign is appended to the share name.
D: A share cannot be hidden by adding a hidden entry into the registry. It will only be hidden when the
dollar sign is appended to the share name. |
144.During startup, a Windows 2000 Professional computer in your office proceeds directly to the desktop
without first prompting for a user name and password first.
You need to enforce logon requirements.
What should you do?
A. Change the Netlogon service startup setting to manual.
B. Disable the disable CTRL+ALT+DEL requirement for logon option in the local group policy.
C. In control panel, modify the startup and recovery settings in the system option.
D. In control panel, add the appropriate user accounts to the users and passwords setting.
Answer: B
Explanation: A combination of two factors will allow the computer to boot to the desktop without first
prompting for a user name and password first. This occurs when the user account logging on, usually the local
administrator’s account, has an empty password; and when the “Disable CTRL+ALT+DEL Requirement For
Logon” is set. By default, Windows 2000 Professional requires users to press CTRL+ALT+DEL to log on to
the computer. This increases security on the computer because, by forcing users to press CTRL+ALT+DEL, we
are using a key combination recognized only by Windows to ensure that we are giving the password to
Windows and not to a Trojan horse program waiting to capture the password. We must use the local Group
Policy snap-in and disable the “Disable CTRL+ALT+DEL Requirement For Logon” policy setting. |
Incorrect answers:
A: Changing the Netlogon service startup setting to manual would increase the complexities of the logon
process. It is therefore not a recommended practice.
C: Reconfiguration of the startup and recovery settings will not enforce logon requirements.
D: Adding another user account to the computer will not solve the problem, as there are already several
existing user accounts on the computer, including the local administrator account. |
145.You are the administrator of your company's network. The network is configured as shown in the
exhibit. .
You want to install Windows 2000 Professional on 10 non-PXE-compliant computers that are on the
marketing segment of your network. You start one of the computers by using a RIS boot disk. However,
you cannot connect to the RIS server.
You verify that the existing client computers on the network can connect to network servers, including
the RIS server. The network router does not support BOOTP, so existing client computers use manually
configured TCP/IP addresses. You want to enable the computers to connect to the RIS server.
What should you do?
A. Add a computer running DHCP Relay Agent to the marketing segment.
B. Add a computer running the network monitor driver to the marketing segment.
C. Move the Windows 2000 Server computer running WINS to the marketing segment.
D. Move the Windows 2000 Server computer running Active Directory to the marketing segment.
Answer: A
Explanation: The router is not RFC-1542 compliant, i.e. it is not BOOTP compliant, and therefore the DHCP
Server will not be reached from the marketing segment. Thus the computers will not be able to contact the RIS
server since RIS clients require DHCP to acquire TCP/IP configuration. By adding a DHCP Relay Agent to the
marketing segment the computers will be able to connect to the DHCP server, get their TCP/IP configuration,
and connect to the RIS server. |
Incorrect answers:
B: Network monitor driver is used to monitor network traffic. It cannot solve the problem in this scenario
and is thus inappropriate.
C: In addition to a DHCP server, the RIS server requires the presence of either a WINS server or a DNS
server running Active Directory. As DNS and Active Directory are present in the exhibit, there is no
need for the WINS server. Both WINS and DNS with Active Directory are responsible for name
resolution. A WINS server is required for compatibility with older versions of Windows and with non-
Windows computers.
D: A DHCP server, a DNS server and Active Directory is available on this network. These servers and
services are required for RIS. However the RIS server cannot access the DHCP server as the router is
not RFC-1542 compliant. |
146.You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000
Professional computer. Your company hires an intern named Richard. You create a subfolder named
intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only.
You create a user account named intern. You want to allow the intern user account the ability to update,
create, and delete files within the intern folder. You need to prevent Richard from accessing any other
files or folders within the AccSecured folder.
What should you do? (Choose all that apply)
A. Map a network drive to the AccSecuredintern folder from Richard’s computer.
B. Map a network drive to the AccSecured shared folder from Richard’s computer.
C. Allow the intern user account modify permissions on the intern subfolder.
D. Allow the intern user account traverse folder/execute file permission on the AccSecured folder.
E. Allow the intern user account list folder content permission on the AccSecured folder. Remove read
extended attributes and read permissions.
Answer: C, D
Explanation: The traverse folder/execute file permission” enables Richard to traverse the AccSecured folder to
reach the intern folder. While the modify permissions on the intern folder allow Richard to modify information
in the intern subfolder. |
Incorrect answers:
A: There is no need to map a network drive to the intern folder.
B: Richard only need the traverse folder/execute file permission on the AccSecured folder. He does not
need to map the folder.
E: Richard should not be allowed to view the contents in the AccSecured folder. |
147.Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers.
The application stores its data in a shared network folder named Accdata on a Windows 2000 Server
computer named Server1.
You upgrade all 10 computers to Windows 2000 Professional and verify that all applications are
compatible with Windows 2000. After the upgrade, some users report that they are receiving intermittent
data-corruption error messages. They are also receiving data file-version mismatch error messages.
When these errors occur, your only method of recovery is to restore the entire contents of the Accdata
folder from a known good backup copy.
You need to prevent these errors from occurring in the future.
What should you do?
A. Configure Accdata folder to allow a maximum of one user.
B. Configure the Accdata folder to disable client caching.
C. Create a group policy that removes the Bypass Traverse Checking user right on server1.
D. Create a group policy that increases the amount of idle time required before a session disconnects on
server1.
Answer: B
Explanation: Client caching is a new feature in Windows 2000. The legacy application, written for Windows
NT 4.0, which does not have the client caching feature, cannot handle client caching in Windows 2000.
Therefore client caching has to be disabled. |
Incorrect answers:
A: Data file version mismatch error messages indicates a caching problem, not a concurrent sharing
problem. Therefore configuring Accdata folder to allow a maximum of one user will not solve the
problem in this scenario.
C: The file version mismatch error messages indicate a caching problem. Removing the Bypass Traverse
Checking user right cannot solve a caching problem.
D: Increasing the idle time required before a session disconnections will not solve he problem in this
scenario. We should disable client caching instead. |
148.You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. The
package consists of three components.
The first component is a data acquisition application that monitors continuous data output from
scientific instruments. The second component is a data analysis application that receives data from the
data acquisition application by using shared memory. The third component is a data graphing
application that displays the processed data in real time.
The data analysis application communicates with the data graphing application by using OLE. When you
attempt to analyze large data sets, your computer is not able to display data in real time. You install a
second processor in your computer; only one processor is used while the package is running, even though
task manager shows both processors.
You want your data analysis package to use both processors.
What should you do? (Choose two)
A. Configure the data acquisition application to run in its own virtual DOS machine (VDM).
B. Configure the data analysis application to run in its own virtual DOS machine (VDM).
C. Configure the data graphing application to run in its own virtual DOS machine (VDM).
D. Configure the virtual DOS machine for the data acquisition and data analysis applications to have a hard
affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for
processor1.
E. Configure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0.
Configure the VDM for the data graphing application to have a hard affinity for processor1.
Answer: C, D
Explanation: Since data acquisition and data analysis use shared memory they should run in the same VDM,
but data graphing should be run in a separate window. The VDMs are able to communicate through OLE. By
using the affinity setting the two VDMs can be configured to run on different processors. This can be done by
using the Task Manager. |
Incorrect answers:
A: The data acquisition and the data analysis application should run in the same VDM since they share
memory.
B: The data acquisition and the data analysis application should run in the same VDM since they share
memory.
E: The data acquisition and the data analysis application should run in the same VDM since they share
memory. |
149.You use a Windows 2000 Professional computer at home. You need to access shared files on a server
named server1. This server is on your company's network and is not accessible from the internet.
Your company's network also includes a third party VPN server that is accessible from the internet. You
dial in to your internet service provider and then create a VPN connection to your company's VPN
server. After the connection is successfully established, you run the net view\\server1 command and
receive the following error ‘the server is inaccessible or could not be found’.
You need to access the shared files on server 1.
What should you do?
A. Stop and then start the TCP/IP NetBIOS helper service on your computer.
B. Stop and then start the DNS client service on your computer.
C. Add a HOSTS entry for server1 to your computer.
D. Add a LMHOSTS entry for server1 to your computer.
Answer: D
Explanation: By adding a LMHOST entry for server1 the home computer will be able to access the Server by
using its NetBIOS name. |
Incorrect answers:
A: Stopping and starting the TCP/IP NetBIOS service will not solve the problem in this scenario.
B: The name Server1 is a NetBIOS name not a DNS name. Therefore, stopping and then restarting the
DNS client service will not solve the problem in this scenario.
C: HOST files map DNS entries, but Server1 is not a DNS name it is a NetBIOS name. Therefore we do
not require HOST entries for Server1 on our computer. |
150.You have just added three new hard disks to your Windows 2000 Professional computer. You want to
configure all of the disks as two drives. You want the two drives to be as equal in size as possible. You
want to configure the non-system drive for the best optimal performance.
What should you do?
A. Extend the system volume onto disk1.
Create a single, stripe volume from disk2 and disk3.
B. Extend the system volume onto disk2.
Create a single, stripe volume from disk1 and disk2.
C. Extend the system volume onto disk1.
Create a single, spanned volume from disk2 and disk3.
D. Extend the system volume onto disk1.
Create a single, spanned volume from disk1 and disk2.
E. Create a single, stripe volume from disk1, disk2, and disk3.
F. Create a single spanned volume from disk1, disk2, and disk3.
Answer: A
Explanation: Configuring the non-system volume as a striped volume will realize the best performance gains
in this scenario. The system volume is extended onto disk1, which makes it size comparable to the non-system
drive. |
Incorrect answers:
B: Disk3 is not used in this solution.
C: For the best performance, the non-system volume must be configured as a striped volume, not spanned
volume.
D: Disk3 is not used in this solution. Furthermore, to realize the best performance gains, the non-system
volume should be configured as a striped volume, not a spanned volume.
E: We need to create two drives. The solution in this option will result in the creation of only one drive.
F: We need to create two drives. The solution in this option will result in the creation of only one drive.
Furthermore, to realize the best performance gains, the non-system volume should be configured as a
striped volume, not a spanned volume. |
151.You need additional storage space on your Windows 2000 Server computer. You install a second SCSI
controller and a second hard disk.
During the installation of the SCSI driver, you receive a warning that the driver is unsigned. You
complete the installation of the driver and restart Windows 2000 Professional. During startup, you
receive a Stop error.
You need to correct the error and start Windows 2000 as quickly as possible.
What should you do?
A. Start the computer in Recovery Console. Delete the SCSI controller driver.
B. Start the computer by using the last known good configuration.
C. Start the computer by using the Windows 2000 startup floppy disks, and repair the system files.
D. Start the computer by using the Windows 2000 startup floppy disks, and repair the registry.
Answer: B
Explanation: As the computer cannot be successfully rebooted after the installation of the driver, it is most
likely that the new driver is the cause of the problem. The Last Known Good Configuration (LKGC) will load
the last hardware and registry configuration that was automatically saved by Windows 2000 on the last
successful start up of Windows 2000 and can thus be used to return to the system to the system state before the
driver was installed. |
Incorrect answers:
A: The Recovery Console could be used to disable the device driver, but not to delete the driver.
Furthermore, the Last Known Good Configuration requires less administrative effort than using the
Recovery Console.
C: The computer can be started by using the Windows 2000 startup floppy disks, however, using the Last
Known Good Configuration requires less administrative effort.
D: The computer can be started by using the Windows 2000 startup floppy disks, however, using the Last
Known Good Configuration requires less administrative effort. |
152.You install a new USB scanner on a Windows 2000 Professional computer. Two weeks later, the user of
the computer informs you that when he scans images with the scanner, the colors do not display
correctly. When he prints the scanned images, the colors print correctly.
You need to ensure that the scanned images display the correct colors.
What should you do?
A. In scanners and cameras in control panel, remove the color management profile.
B. In the display properties in control panel, set the Windows color scheme to Windows standard.
C. In the advanced properties of the display properties in control panel, remove all color management
profiles.
D. In the display properties in control panel, increase the colors setting.
Answer: C
Explanation: One of the color management settings is making the picture look distorted when it is displayed on
the screen. By removing all color management profiles, the default setting would be used. This would give a
better on screen picture. |
Incorrect answers:
A: Because the printed picture quality was correct, the scanning setting must have been correctly
configured. If it were not, the printed picture would also have been distorted.
B: Only the scanned image, and not the entire display, is displayed with the wrong colors. It is therefore not
necessary to set the Windows color scheme to Windows standard.
D: Only the scanned image, not the entire display, is displayed with the wrong colors. It is therefore not
necessary to increase the display property’s colors setting |
153.You need to install Windows 2000 Professional on 35 new computers on your company's network. You
also need to install the Recovery Console during the installation.
You create a distribution folder and copy the Windows 2000 Professional support folder to the network
server. Then you create a network boot floppy disk to install Windows 2000 Professional from the
distribution folder.
You need to create a batch file, which the network boot disk will execute to start the installation.
Which command must you specify in the batch file?
A. Winnt32 /cmd:z:\i386\winnt/a
B. Winnt32/cmd:z:\support\tools\setup.exe
C. Winnt/e:z:\i386\winnt/cmdcons
D. Winnt/e:z:\support\tools\setup.exe
Answer: C
Explanation: The installation of Windows 2000 comprises of stages. The first stage is the Setup Program,
which runs in text mode. During this stage the hard drive is checked and prepared for the installation and the
files required for the Setup Wizard are copied to the hard drive. This stage ends with a reboot and is followed by
the Setup Wizard, the second stage, which runs in graphical mode. Windows Networking is installed during the
third phase and ends with another reboot. This is followed by the final phase, which completes the Setup by
installing the start menu items and the registry components; saving the configuration, removing temporary setup
files and rebooting the system.
The switch /e specify that the Windows 2000 Setup program must run a command after the final stage of the
installation of Windows 2000 is finished. The parameter winnt/cmdcons specifies that the command must install
the Recovery Console onto the hard drive. |
Incorrect answers:
A: As the boot floppy operates in dos mode, we cannot use 32 bit applications such as Winnt32.
Furthermore, Winnt32 does not support a /cmd switch.
B: As the boot floppy operates in dos mode, we cannot use 32 bit applications such as Winnt32.
Furthermore, Winnt32 does not support a /cmd switch. The setup path specified in this parameter points
to the Windows 2000 Support Tools that are intended for use in diagnosing and resolving Windows
2000 computer problems. The installation files for the Recovery Console are located in the i386 folder
on the Windows 2000 Professional CD and is initiated by specifying the /cmdcons switch with the
winnt.exe command. It is not necessary to include the .exe file extension in the command, as Windows
will check for an executable file with the name winnt.
D: The setup path specified in this parameter points to the Windows 2000 Support Tools that are intended
for use in diagnosing and resolving Windows 2000 computer problems. The installation files for the
Recovery Console are located in the i386 folder on the Windows 2000 Professional CD and is initiated
by specifying the /cmdcons switch with the winnt.exe command. It is not necessary to include the .exe
file extension in the command, as Windows will check for an executable file with the name winnt. |
154.You are the administrator of your company’s network. You want to deploy a Windows 2000 Professional
service pack to 10 computers in the developmental Organizational Unit.
You create a Windows 2000 installer package file for the service pack. You use the package files to
successfully install the service pack to other computers in the domain. You assign the package file to the
development Organizational Unit. After the installation you notice that the service pack was not installed
on any of the 10 computers.
You want to ensure that the service pack is successfully installed on the computers in the development
Organizational Unit.
What should you do?
A. Use computer management to start the Windows installer service on all the computers in the
Development Organizational Unit
B. Use the local administrator account to log on to the computers in the Development Organizational Unit.
Then redeploy the service pack to the computer in the Development Organizational Unit.
C. Run Windows installer to repair the package file. Then redeploy the service pack to the computers in
the Development Organizational Unit.
D. Add the user accounts from the Development Organizational Unit to a DACL. Grant the user accounts
read permission to the service pack deployment directory.
Answer: D
Explanation: Before users can access resources on Windows 2000, they must be assigned the appropriate
permissions to those resources. In this scenario the user from the Development OU needs to be assigned read
permission to the deployment directory, which is an object, to be able to start the installation process. Objects,
such as the deployment directory, use a DACL (discretionary access control list) to check whether users or
groups have been allowed or denied permissions to the object that they are attempting to access. Therefore, the
user accounts of the Development OU must be added to a DACL. |
Incorrect answers:
A: This is not the most likely problem. The most likely problem is that the user account does not have
appropriate permissions on the service pack deployment directory.
B: Assigned software does not need to be installed with any special user account. There is thus no need to
log on with the local administrator account.
C: As the package was installed successfully on other computers in the domain, the problem does not lie
with the installation package. Instead it lies with the Development OU’s lack of the appropriate
permissions to access the deployment directory. |
155.You are preparing to install Windows 2000 Professional on 75 new computers. You want to create a
Standard installation image to use on all the new computers. The computers have several different
configurations of hard disks and hardware components.
You install Windows 2000 Professional and other standard software on one of the computers. You log on
to the computer using the local administrator account. You configure the standard applications and
customize the desktop settings you intend to deploy.
You run the setup manager and create a Sysprep.inf file. You copy Sysprep.exe and Setupcl.exe to the
C:\Sysprep folder. You run Sysprep.exe and run your third party disk imaging software.
You copy the image to the several test computers and restart the computers. When the installation is
complete, you find that some of the computers do not function at all. You also find that the desktop
settings do not appear as you have configured them on the original computer.
You want to correct the imaging process and ensure that all computers have the same standard desktop.
What should you do? (CHOOSE TWO)
A. Copy sysprep.inf to C:\sysprep folder.
B. Copy the administrator profile to default user profile, then grant permissions to the Everyone group to
use the profile.
C. Include the -pnp parameter for sysprep.exe when you rerun that utility.
D. Include the -nosidgen parameter for sysprep.exe when you rerun that utility.
Answer: B, C
Explanation:
B: A user profile is automatically created and maintains the desktop configuration for each
user's desktop on the local Windows 2000 computer. This user profile is created when the
user logs on to a computer for the first time. An administrator profile, which maintains the
administrators desktop configuration is created during the Windows 2000 Professional
installation. In this scenario the administrator profile, must be copied and used as the Default User
profile, which is applied to all users. As all users are automatically placed in the Everyone user group,
the Everyone user group must be granted permission to access this profile.
C: Because the computers that Windows 2000 Professional will be installed onto have different hardware
configurations, a full plug and play detection must be done during the installation process. This can be
accomplished by including the –pnp parameter to the sysprep.exe utility, as this parameter causes the
plug and play detection utility to be used.
|
Incorrect answers:
A: When the installation is complete, you find that some of the computers do not function at all and that
the desktop settings do not appear as they have been configured on the original computer. This indicates
that the sysprep installation was done on some of the computers. Therefore there is no need to copy the
sysprep.inf file to the C:\Sysprep folder. Had it been required, the installation of all the computers also
would have failed.
D: The -nosidgen is only used on the initial computer where the clone image was made. It instructs the
installation program not to generate the system information that is unique to each installation of
Windows 2000 Professional. This parameter is not used here during the installation of Windows 2000
Professional on the target computers. It is therefore not relevant to this scenario. |
156.Your company network includes 6,000 Windows 2000 Professional client computers and 35 Windows
2000 Server computers in a single domain.
Your company has a print device that is used to print payroll checks. The print device is physically
attached to the parallel port of one of the client computers. This print device’s tray is loaded with checks
at all times. You have shared this printer on the network as ChkPrinter and retained the default
permissions.
A payroll application runs on a server named HRserv. Every Wednesday at 5:00P.M, the application
prints paychecks from employees on this printer. The payroll application runs as a Windows 2000 service
on HRserv.
You need to configure ChkPrinter so that only the payroll application will be able to use the printer.
What should you do?
A. Configure the share name for ChkPrinter to be ChkPrinter$. Configure the payroll application to print to
this new share name.
B. Configure ChkPrinter so that it is available only from 5:00 P.M to 5:30 P.M
C. Configure ChkPrinter to allow the HRserv domain account print permissions for ChkPrinter. Remove
print permissions for the Everyone group.
D. Configure ChkPrinter to allow all HRserv domain accounts Print permissions for ChkPrinter. Change
the permissions to deny print on ChkPrinter for the Everyone group.
Answer: C
Explanation: The print application is run as a service account in the HRserv domain. By granting this account
print permissions, and removing print permissions for the Everyone group, only the payroll application will be
able to use the printer. |
Incorrect answers:
A: By changing the share name to ChkPrinter$ the name would be hidden, but it could still be used by
everyone, since the Everyone group gets print permissions by default.
B: Restricting the available time will not prevent users from using the printer when the printer is available.
The application would not be able to use printer during the times it is configured to be unavailable.
D: If the Everyone group is denied print permission on the printer, not even the application would be able
to use the printer. |
157.You install Windows 2000 Professional onto an NTFS partition on your computer. During the
installation, you manually specify the OEM driver for the tape device SCSI controller. After the
installation, you run the Winnt/cmdcons command. Then you successfully install the latest Windows 2000
service pack.
Next, you install an updated driver for the tape device SCSI controller. When you restart the system and
log on to the computer, you receive a stop error.
You need to restore the functionality of the SCSI controller with the least amount of administrative
effort.
What should you do?
A. Restart the computer in Safe Mode. Reinstall the functional SCSI controller driver.
B. Restart the computer into Recovery Console. Replace the faulty SCSI controller driver with the
functional one.
C. Start the computer by using a Windows 2000 Professional disk. Replace the faulty SCSI controller
driver with the functional one.
D. Install a parallel copy of Windows 2000 Professional in a separate folder. Copy the functional SCSI
controller driver into the original system folder, and restart the computer to the previous installation.
Answer: A
Explanation: The SCSI controller controls the tape device not any hard drives. This makes it possible to boot to Safe Mode
and reinstall the functional driver. The SCSI driver could also be disabled in Safe Mode. |
Incorrect answers:
B: The Recovery Console can be used to disable a driver. However, using Safe Mode requires less
administrative effort. Therefore this is not the best answer.
C: The Recovery Console can be started with the 4 Windows 2000 Professional setup disks. However,
using Safe Mode requires less administrative effort. Therefore this is not the best answer.
D: It is not necessary to install another copy Windows 2000 Professional on the computer. This will also
not solve the problem in this scenario. |
158.You need to create a web share on your Windows 2000 Professional computer named Admin01. You
create a folder named reports. Then you configure web sharing on Reports. You name the share
WebReports and allow Read permissions on the share.
You test the web share by pointing to http://admin01/WebReports from another computer. You receive
the following error message, ‘You are not authorized to view this page.’
You need to be able to access the folder.
What must you do?
A. Allow write permission on WebReports.
B. Allow directory browsing permissions on WebReports.
C. In the IIS console, enable anonymous access to WebReports.
D. In the IIS console, set the execute permissions option to script and executables on WebReports.
Answer: C
Explanation: The proper NTFS permissions, read permission, have already been granted. To access the folder
through Internet Explorer the folder must be published in Internet Information Services (IIS) and authentication
through IIS must be provide. By enabling anonymous access in the IIS console the folder would be accessible
through Internet Explorer. |
Incorrect answers:
A: Only read permission is required to view a page, not write permissions. And read permission is already
granted.
B: Via directory browsing, web site visitors are able to view the contents of directories as a list of files. Directory browsing is not used to allow access to a web share.
D: The execute permission is only required to enable the user to run scripts and executables. It is not
required to view the web share. |
159.You install Windows 2000 Professional on 10 computers that have Video Capture Cards installed. A user
named Lilly reports that her video capture card is not functioning correctly. She wants to use her video
capturing software to capture video frames, but she cannot view the video output.
You use the Device Manager to view the hardware settings on Lilly’s Computer as shown in the exhibit.
You want Lilly to be able to capture the video frames by using the video capture card.
What should you do?
A. Use system in control panel to enable the device.
B. Use Device Manager to update the driver for the device.
C. Move the video capture card to a different PCI slot
D. Uninstall the device and disable plug and play detection for the device
Answer: B
Explanation: Windows has detected the device (the device with the ? in the exhibit) but the correct device
driver has not been installed. The Device Manager can be used to install the correct device driver. |
Incorrect answers:
A: The device has already been enabled. However, Windows 2000 requires the correct driver for the
device. The wrong driver is currently installed.
C: Moving the device to another PCI slot will not solve the problem in this scenario. The device has
already been installed however, Windows 2000 requires the correct driver for the device. The wrong
driver is currently installed.
D: If you disable Plug and Play the system will not be able to find new devices. |