logo

CuriousTab

CuriousTab

Discussion


Home Certification Microsoft Certification Comments

  • Question
  • Which Event Viewer log can you use to view the results of auditing?


  • Options
  • A. Application Log
  • B. Security Log
  • C. System Log
  • D. Directory Service Log

  • Correct Answer
  • Security Log 

    Explanation

    Audited events are written to the Security Log in Event Viewer.


  • Microsoft Certification problems


    Search Results


    • 1. How can you redirect print jobs to a different print device?

    • Options
    • A. Copy the print jobs from one printer to another printer
    • B. Assign the printer to a port that is connected to a different type of print device.
    • C. Cancel all of the print jobs, then delete the printer. Create a new printer with the same name, and assign it to a different port.
    • D. Assign the printer to a port that is connected to another identical print device.
    • Discuss
    • 2. You move a file from an NTFS volume on a Windows 2000 client computer to a folder on an NTFS volume on a Windows 2000 Server computer. What effect does moving this file have on the NTFS permissions assigned to the file?

    • Options
    • A. The moved file retains all of its original NTFS permissions
    • B. The moved file loses all of its original NTFS permissions, and now has no permissions.
    • C. The moved file loses some of its original NTFS permissions, and inherits some of the NTFS permissions from its destination folder
    • D. The moved file loses all of its original NTFS permissions, and inherits all of the inheritable NTFS permissions from its destination folder
    • Discuss
    • 3. You want to create a Group Policy Object (GPO) that will be associated with a specific domain. Which tool should you use?

    • Options
    • A. Domain Security Policy
    • B. Domain Controller Security Policy
    • C. Active Directory Users and Computers
    • D. Active Directory Sites and Services
    • Discuss
    • 4. You want to assign a mandatory user profile to a user. What must you do?

    • Options
    • A. Rename the user's NTUSER.DAT file
    • B. Rename the user's ntuser.ini file
    • C. Copy the Default User profile folder to the user's profile folder
    • D. Copy the user's profile folder to the Default User profile folder
    • Discuss
    • 5. You want to search for a specific shared folder object in Active Directory. Which tool should you use?

    • Options
    • A. Search
    • B. Windows Explorer
    • C. Active Directory Sites and Services
    • D. Active Directory Users and Computers
    • Discuss
    • 6. You want to monitor and configure your organization's removable media, including a tape library and optical discs. Which Windows 2000 tool can you use to do this?

    • Options
    • A. Remote Storage
    • B. Sounds and Multimedia
    • C. Imaging
    • D. Removable Storage
    • Discuss
    • 7. You are planning to install and configure network services for ineroperability on your Windows 2000 Server computer. You specifically want this server to maintain and advertise a list of services that use the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol. What service should you install?

    • Options
    • A. Indexing Service
    • B. NNTP Service
    • C. RIP Listener
    • D. SAP Agent
    • Discuss
    • 8. You just finished installing the Dynamic Host Configuration Protocol (DHCP) service on a Windows 2000 Server computer that is a domain controller on your network. What must you do before the DHCP service can start?

    • Options
    • A. Authorize the DHCP server in Active Directory
    • B. Configure a scope, a superscope, and a multicast scope
    • C. Configure a DHCP address reservation
    • D. Configure the DHCP server for DNS integration
    • Discuss
    • 9. Which authentication method provides the highest level of security?

    • Options
    • A. Microsoft encrypted authentication version 2 (MS-CHAP v2)
    • B. Microsoft encrypted authentication (MS-CHAP)
    • C. Encrypted authentication (CHAP)
    • D. Shiva password Authentication Protocol (SPAP)
    • Discuss
    • 10. What protocol is required by Internet Information Services(IIS), the indexing Service, and Certificate Services?

    • Options
    • A. TCP/IP
    • B. NWLink IPX/SPX/NetBIOS Compatible Transport protocol
    • C. NetBEUI
    • D. RIP Version 2 for Internet Protocol
    • Discuss


    Comments

    There are no comments.

Enter a new Comment