23. (T24)You installed an updated device driver for a zip drive on a Windows 2000 Professional computer. You restart the computer. During the startup process, the computer stops responding. You then restart the computer in the Safe Mode. During the startup process, the computer stops responding again. You suspect the new device driver is causing the problem. You want to resolve the problem so that the computer starts successfully. What should you do? (Select all that apply) A. Select Recovery Console from the repair menu. B. Specify the path to the recovery file on the hard disk. C. Select the debug mode from the Windows 2000 advanced options menu. D. Insert emergency repair disk. E. Use the disable command to disable the zip device driver. F. Start the computer by using the Windows 2000 Professional CD-ROM. G. Use the listsvc command to disable the zip device driver. Answer: EAF 30. (T121)You install Windows 2000 Professional on your portable computer. You install an SCSI and PC card adapter, that you can use in the office to use color scanner. You use a docking station for your computer when you are in the office. You want to maximize the battery performance for your portable computer. You also want to prevent the driver from loading whenever you are away from the office. What should you do? A. When away from the office use Device Manager to remove the adapter. B. Remove the computer from the docking station and start Windows 2000 Professional, use Device Manager to remove SCSI PC card adapter device. C. When away from the office configure the startup properties for the adapter to be automatic. D. Remove the computer from the docking station and start Windows 2000 Professional to disable the SCSI PC card adapter device for the current profile. Answer: D 31. (T139)You install Windows 2000 Professional on a computer named Client2. The computer is configured to have a TCP/IP address of 10.10.167.4 and a default gateway of 10.10.167.1 You want to connect to a shared folder on a server B. When you attempt to connect to the network share you receive the following error message, ‘the network location could not be reached’. You run IP config to review the configuration as shown in IP configuration exhibit. You want to allow Client2 to connect to server B.

What should you do? A. Configure Client2 to use a WINS server address of 10.10.13.24. B. Configure Client2 use a DNS server address 10.10.13.24. C. Configure Client2 to use a default gateway of 10.10.13.1. D. Place a computer running the wins proxy server on the same segment as Client2. E. Place Client2 on the same segment as server B. Answer: A 52. (T136)You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint. You want to accomplish the following goals: • An unattended installation of Windows 2000 Professional will be performed. • An unattended installation of company's standard application will be performed during the installation of Windows 2000 Professional. • Each computer will be assigned a unique security identifier description. • The unattended installation script will be modified so that the computers automatically join the contoso.com domain. You take the following actions: • Install Windows 2000 Professional on Windows 98 computer named computer 1. • Install and configure computer standard application on computer 1. • Use set up manager on computer1 to create an unattended.txt file based on the current configuration including domain membership. • Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use the unattended.txt file to provide the setting for the installation. Which result or results do these actions produce? (CHOOSE ALL THAT APPLY) A. Each computer will be assigned a unique security identity description. B. An unattended installation of company's standard application will be performed during the installation of Windows 2000 Professional. C. An unattended installation of Windows 2000 Professional will be performed. D. The unattended installation script will be modified so that the computers automatically join the contoso.com domain. Answer: CA 56. (T101)You are the administrator of a Windows 2000 network. You purchase 25 new portable computers that have a preinstalled version of Windows 98. You upgrade the 25 new computers to Windows 2000 Professional. You want to remove the Logoff option from the start menu on the 25 new computers. Which two methods can you use to accomplish this goal? (Choose two) A. Use a local computer policy that will not include the logoff option on the start menu. B. On the advanced tab of the task bar and start menu dialog box, clear the Display log off option. C. On the general tab of the task bar and start menu dialog box, clear the personalized menus option. Log off and then log on to the computers. D. On the advanced tab of the task bar and start menu dialog box, clear the administrative tools option. E. Use the user profiles tab within the properties of my computer to change the profile from the local profile to a roaming user profile. Answer: BA 12. (T12)You are the administrator of the corp.arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers. A user named Katrin in the Sales organizational unit reports that her mouse is not working correctly. You logon to the domain from Katrin’s computer by using a domain administrative account. You use Device Manager to display current information for the mouse drivers. You discover that Katrin’s computer is using an older version of the mouse driver. You have a current driver by the manufacturer of mouse. You install the current driver by the usage of Device Manager and restart the computer. You test the mouse and it is still not functioning correctly. You check the problem and see that previous driver is still installed. You want to be able to install the correct mouse driver. What should you do? A. Set the Sales OU policy for security to warn and allow the installation to override the local security defaults. B. Set the domain policy for security to block but allow the installation to override local and Sales OU security defaults. C. Set the local computer policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults. D. Disable, plug and play on Katrin’s computer. Restart the computer and manually setup the system resources for the mouse. Answer: A

Explanation:
Setting the OU security policy to warn will allow Katrin to install the mouse driver. The OU policy will override any security policy that has been set at local, site and domain level. The policy hierarchy from lowest is local, site, domain, OU. The OU policies override local, site and domain policies.

Incorrect answers:
B:Setting the security policy at the domain level to block will not solve the problem as there is an existing policy which blocks the installation of the drivers. This policy setting must be overridden. This can be done by setting the policy at the highest, i.e., OU, level.
C:Local computer policies cannot override the domain or the Sales OU security defaults. Therefore the policy that is blocking the installation of the drivers will remain in effect. This will thus not solve the problem.
D:The installation of the mouse drivers is being blocked by a security policy. Disabling plug and play will not change the security policy in Windows and will not permit the installation of the drivers. By disabling plug and play, we would be required to make available the system resources that the mouse would use, however, the policy that is blocking the installation of the mouse driver will still prevent the drivers from being installed.

55. (T55)You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company's network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do? A. Set the driver signing option to block. B. Set the driver signing option to ignore. C. In the computer’s BIOS, reserve an unused IRQ for ISA devices. D. In the Device Manager, configure the second ISA network adapter to use an unused IRQ. Answer: D

Explanation:
The Device Manager is used to configure the system resources used by a hardware device. The system resources of legacy ISA devices must be set manually. This can be done in Device Manger, By rightclicking the device in Device Manager, choosing Properties, and then selecting the Resources tab, we can change the system resources, such as the IRQ setting, used by the device.

Incorrect answers:
A: Setting the driver signing option to block will prevent the installation of unsigned drivers. This will not enable the second ISA adapter to work properly.
B: Setting the driver signing option to ignore would allow the installation of unsigned drivers. This will not enable the second ISA adapter to work properly. This is also not the current problem since the scenario does not mention any problems with unsigned drivers.
C: Reserving IRQs in the BIOS will not prevent any legacy ISA device using that IRQ, it would only prevent Plug and Play (PnP) devices from using that particular IRQ. Reserving IRQs in the BIOS could be used when PnP Devices and legacy devices use the same IRQ. In that case we could reserve an IRQ in BIOS, which would prevent the PnP device from use it, and allow the legacy device use it instead.

69. (T69)Your desktop computer has Windows 2000 Professional installed. You create a new dial-up connection to connect to the Internet. You configure the Internet connection to enable Internet Connection Sharing. After you configure the connection, you cannot see or connect to any shared resources. You want your computer to be able to connect to shared resources. What should you do? A. Configure the dial-up connection to disable shared access. B. Configure the dial-up connection to disable on-demand dialing. C. Disable data encryption in the new dial-up connection. D. Use the ipconfig command to release and renew your network TCP/IP address. Answer: D

Explanation:
When ICS is configured the IP address for the ICS internal adapter changes to 192.168.0.1. with a subnet mask of 255.255.0.0. The other clients in the local network still have their old IP addresses. If their IP addresses are released and renewed they will get a correct IP configuration from the mini-DHCP server, which is included in ICS. The ICS clients would get IP addresses in the range of 192.168.0.2-192.168.0.254 and a subnet mask of 255.255.0.0. They would be able to communicate amongst themselves.

Incorrect answers:
A: This would disable the ICS. As we want to keep the Internet Connection sharing, this would not be a good solution.
B: Disabling on-demand dialing prevents the ICS client computers from establishing an Internet connection. This might not be a good solution since this is a dial-up connection. Furthermore, this will not solve the problem in this scenario.
C: Data encryption setting on the dial-up would not cause any problems with local shares. Therefore this solution will not solve the problem.

77. (T77)You have updated the modem driver on your Windows 2000 Professional computer. You restart your computer. Immediately after you log on, you receive a stop error. You need to start Windows 2000. What must you do? A. Restart the computer in Safe Mode. Uninstall the modem driver. B. Restart the computer by using the last known good configuration. C. Restart the computer in Recovery Console. Replace the new Modem.inf file with the old modem.inf file. D. Start the computer from the Windows 2000 startup floppy disks. Repair the registry. E. Start the computer from the Windows 2000 startup floppy disks. Repair the system files. Answer: A

Explanation:
Because the computer cannot start normally we must start the computer in Safe Mode. Once in Safe Mode we can uninstall the modem driver and the computer should be able to boot normally after that.
 

Incorrect answers:
B: After the installation of the modem driver the computer was rebooted and the logon was successful. After a successful log on the Last Known Good Configuration (LKGC) is overwritten. Hence we cannot use the Last Known Good Configuration.
C: To disable a driver with the Recovery Console the command Disable must be used. Replacing the modem.inf file could result in unpredictable behavior. Furthermore, Safe Mode requires less administrative authority and effort compared to using the Recovery Console.
D: Repairing the registry could help, but this is a daunting task with a lot of administrative effort.
E: Repairing the system files can be used to replace system file that may be damaged. It will not disable the modem driver.

83. (T83)You attach a USB camera to your Windows 2000 Professional computer. Your Windows 2000 Professional detects the camera and prompts you to install the manufacturer’s device driver. You insert the manufacturer-provided floppy disk. After installing the device drivers, you restart the computer. When Windows 2000 Professional loads, you notice that your USB board does not respond. You suspect that the camera drivers are not certified for Windows 2000 Professional. You want to configure your computer to enable your USB keyboard and to prevent uncertified drivers from being installed in future. What should you do? (Choose two) A. Configure Windows 2000 Professional to enable driver signing. B. Configure Windows 2000 Professional to disable driver signing. C. Start the computer by using the Recovery Console. Restore the system state data. D. Start the computer in Safe Mode. Replace the camera driver with Windows 2000 Professional certified driver by using Device Manager. E. Start the computer in debug mode. Replace the camera driver with Windows 2000 Professional certified drivers by using the Device Manager. Answer: AD

Explanation:
We would need to start the computer in Safe Mode so that the camera driver can be replaced with a certified driver. Thereafter, to prevent uncertified drivers from being installed in the future, we can enable the driver signing policy and set it to block. This will prevent any future attempt to install an unsigned driver on the system.
 

Incorrect answers:
B: To prevent uncertified drivers from being installed in the future we must enable and not disable driver signing. This is thus not the correct solution.
C: Restoring the system state data will neither enable the USB keyboard, nor will it prevent uncertified drivers from being installed. It is therefore not appropriate to this scenario.
E: Debug mode is a special mode used by software developers to debug programs. It is one of the Safe Mode options. Debug mode is not used for enabling device drivers or for driver signing configuration. It is therefore not appropriate to this scenario.

98. (T98)You want to install Windows 2000 Professional on 45 new computers on your company’s network. You first install Windows 2000 Professional on one of the new computers. You log on to the computer by using the local administrator account. You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured. You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network. What should you do? A. Run Rbfg.exe before installing the standard applications. B. Run RIPrep.exe before installing the standard applications. C. Copy the all users profile to the default users profile. D. Copy the local administrator account profile to the default users profile Answer: D

Explanation:
By copying the local administrator account profile to the default users profile, all users will get access to the shortcuts which were made when the local administrator installed the applications.
 

Incorrect answers:
A: Rbfg.exe (Remote boot floppy generator) is used to make a remote boot floppy, which is used by non- PXE compliant RIS clients to start the RIS installation process. It is thus not appropriate to this scenario.
B: Riprep.exe should not run prior to installing the applications, as the RIS image must include the installed applications. Therefore riprep.exe must be used after the installation of applications.
C: The all users profile is used by all the users. There is no need to copy it to the default user profile.

111. (T111)You are the administrator of your company’s network. You network has five Windows 2000 server computers and 75 Windows 2000 Professional computers. The Windows 2000 Professional computers were installed by using a RIS image on one of the Windows 2000 Server computers. You need to upgrade several applications on the Windows 2000 Professional computers. The applications do not have built-in support for scripted installations. You want to accomplish the following goals: • An unattended installation of the upgraded applications will be performed on the Windows 20000 Professional computers. • Existing user environments will be maintained on the Windows 2000 Professional computers. • The network name of each Windows 2000 Professional computer will be changed to match its asset tag. • The RIS image and the upgraded applications will be enabled as they are added to the network. You take the following actions: • Install the RIS image on a Windows 20000 Professional computer named Computer1. • Install the upgraded applications on Computers1. • Change the network name of Computer1 to %DMI-SERIAL_NUM%. • Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server. • Start all of the Windows 2000 Professional computers, and then load the RIS image from the RIS server. Which result or results do these actions produce? (Chooses all that apply.) A. An unattended installation of the upgraded applications will be performed on the Windows 20000 Professional computers. B. Existing user environments will be maintained on the Windows 2000 Professional computers. C. The network name of each Windows 2000 Professional computer will be changed to match its asset tag. D. The RIS image and the upgraded applications will be enabled as they are added to the network. Answer: AD

Explanation:
The following steps are taken: As the initial RIS image then the applications have been installed on Computer1 before the new RIS image was created using the RIPrep utility, All the applications will be included in this image Furthermore, we have loaded the new RIS image on to the RIS server, started all of the Windows 20000 Professional computers, and then loaded the RIS image from the RIS server. Unattended installations of the upgraded applications will thus be performed.
 

Incorrect answers:
B: The hard drives on the computers are flushed when the new RIS image is loaded. Therefore the existing user environments are not be maintained but will be replaced.
C: No special action is taken to handle the naming of the Windows 2000 Professional computers. The renaming of Computer1 to %DMI_SERIAL_NUM% does not accomplish the naming of the Windows 2000 Professional computers.

114. (T114)You upgrade 6 MPS compliant computers from Windows NT Workstation 4.0 to Windows 2000 Professional computer. Each computer has two 550 MHz processors. The computers are used for highresolution graphics applications that require exceptional performance. After the upgrade users complain that the processing time for graphic applications is much slower than before. What should you do? A. Use Device Manager to enable AGP bridge controller. B. Use Device Manager to install the MPS compliant drivers for the second processor. C. Use Device Manager to install ACPI compliant driver for second processor. D. During startup press F8 and install MPS compliant driver for second processor. Answer: B

Explanation:
Before the upgrade the NT Workstation 4.0 operating system was configured for multiprocessor support. The upgrade process does not automatically keep this configuration since a new Hardware Abstraction Layer (HAL) needs to be installed. This HAL has to be Multiprocessor (MPS) compliant. We can update the Hardware Abstraction Layer (HAL) with the Device Manager. Open Computer Management in Administrative Tools, open Device Manager, expand Computer, right-click Advanced Configuration and Power Interface (ACPI) PC (or similar), select Properties, select Driver tab, select Update Driver. This will start the Upgrade Device Driver Wizard, which can be used to update the HAL.
 

Incorrect answers:
A: Enabling AGP bridge controller will not enable support for the second processor. Support for the second processor is dependant on the HAL.
C: Power Management drivers (ACPI drivers) will not enable support for the second processor. Support for the second processor is dependant on the HAL.
D: To install a new HAL during the installation process you should press F2, not F8.

124. (T124)You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do? A. Use secedit.exe to refresh the security policy. B. Use the local computer policy to configure the local security policy. C. Use security configuration and analysis to support the security files as a .pol file. D. Use computer management to configure the security policy setting. Answer: B

Explanation:
In this scenario the Windows NT Workstation 4.0 and Windows 2000 Professional computers have incompatible security settings. The security setting could be correctly configured with a local computer policy. From Control Panel, open the Administrative Tools, open Local Security Policy, select Security Settings, select Account Policies, select Password Policies, and select and Configure Minimum Password Length.
 

Incorrect answers:
A: The security policy must be correctly configured, not refreshed.
C: Windows 2000 does not use .pol files for security policy settings. .pol files are used on Windows NT computers.
D: Computer Management cannot be used to configure security policy settings; instead the Local Security Policy administrative tool should be used.

127. (T127)You are delegated administrative control of graphics Organizational Unit. You install Windows 2000 Professional on 25 PXE-compliant computers in graphics Organizational Unit by using disk-duplicating software. The reference computer was configured to have the Windows 2000 default desktop settings. Users in the graphics Organizational Unit have home folders specified in their user account settings. The home folders are located on the \\server1\usersnetwork share. You want to change the default path of the users my documents folder to their respective home folder whenever users log on to the network. You want to accomplish this with least amount of administrative effort. What should you do? A. In the properties of the My Documents folder select move and define the UNC path\\server1\users. B. Reconfigure domain user account properties on the profile tab and define the UNC path\\server1\users. C. Enable a local computer policy to redirect the My Documents folder and define the UNC path\\server1\users\%username%. D. Create a group policy object of the graphics Organizational Unit to redirect the My Documents folder and define the UNC path\\server\user\%username%. Answer: D

Explanation:
To change the default path of the users my documents folders to their respective home folders whenever users log on to the network, a Group Policy Object (GPO) must be linked to the graphics Organization Unit (OU) and can be used to redirect the My Documents folder to the user’s network share. All users in the graphics OU will then have their My Documents folder redirected.
 

Incorrect answers:
A: The properties of the My Documents folder does not support a move command.
B: A policy must be used to redirect the My Documents folder to the network share. It cannot be configured in the domain user account properties. A Group Policy Object (GPO), which can be used to redirect the My Documents folder to the user’s network share, must be linked to the graphics Organization Unit (OU).
C: It is possible to redirect the My Documents folder with a local computer policy. The drawback is that this has to be configured at every client computer. Using a group policy would require less administrative work.

128. (T128)You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? A. Configure the company remote access server to accept multilink connections. B. Configure the TCP/IP program for the dial up connection to disable IP header compression. C. Configure the TCP/IP properties for the dial up connection to use the default gateway on the remote network. D. Grant your user account dial in permission on the company remote access server. Answer: C

Explanation:
If the RAS client does not use the same Default Gateway as the RAS server, it will be able to reach the computers on the same segment as the RAS server, but it will not be able to reach other remote segments.
 

Incorrect answers:
A: This is not a multilink problem. A multilink problem is when not all communication lines are used.
B: Disabling header compression can be used when the dial-client and the dial-server are not able to communicate. This will enable the dial-client and the dial-server to communicate. It will however, not allow the client to reach other remote segments.
D: The client has successfully accessed to the RAS server. Therefore there cannot be a dial-in permission problem in this scenario.

139. (T139)You install Windows 2000 Professional on a computer named Client2. The computer is configured to have a TCP/IP address of 10.10.167.4 and a default gateway of 10.10.167.1 You want to connect to a shared folder on a server B. When you attempt to connect to the network share you receive the following error message, ‘the network location could not be reached’. You run IP config to review the configuration as shown in IP configuration exhibit. You want to allow Client2 to connect to server B.

What should you do? A. Place Client2 on the same segment as server B. B. Place a computer running the wins proxy server on the same segment as Client2. C. Configure Client2 to use a default gateway of 10.10.13.1. D. Configure Client2 use a DNS server address 10.10.13.24. E. Configure Client2 to use a WINS server address of 10.10.13.24. Answer: E

Explanation:
Client2’s default gateway setting, the IP address, 10.10.167.1, of the Router’s local interface is correct. Client2 requires a name resolving service to be able to use names to connect to resources, such as ServerB, on the network. The only name resolution service provided by the network is the WINS server named Server A, which has an IP address of 10.10.13.24. By configuring Client2 with the WINS server address of 10.10.13.24, Client2 will be able to connect to Server B.
 

Incorrect answers:
A: Placing Client2 on the same segment as server B should not be necessary, as Client2 has been provided with the correct default gateway IP address of 10.10.167.1.
B: Wins Proxy server is used for clients with operating systems that do not support WINS. Windows 2000 Professional support WINS so there is no need for a Wins Proxy server.
C: Client2 has been provided with the correct default gateway IP address of 10.10.167.1. The IP address of 10.10.13.1 is the IP address of the Routers remote interface. The default gateway should be configured with the IP address of the local interface of the Router, which is 10.10.167.1.
D: There is no DNS server on the network. Server A, the WINS server, has the IP address 10.10.13.24.