logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows 2000 Server Comments

  • Question
  • The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?


  • Options
  • A. Configure a client computer to use only TCP/IP for the connections to the remote access server
  • B. Configure the client computer to use a defined IPX network address for the connection to the remote access servers
  • C. Configure the remote access server to allow IPX based remote access demand dial connections
  • D. Configure the remote access server to disable multi-link connection
  • E. None of above

  • Correct Answer
  • Configure the remote access server to disable multi-link connection 


  • Windows 2000 Server problems


    Search Results


    • 1. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

    • Options
    • A. CHAP
    • B. MS-CHAP v2
    • C. PAP
    • D. SPAP
    • E. None of above
    • Discuss
    • 2. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?

    • Options
    • A. Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone
    • B. Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone
    • C. Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone
    • D. Configure at least two servers with Active Directory integrated primary zones for the domain
    • E. Configure at least two servers with standard primary zones for the domain
    • Discuss
    • 3. Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_6r_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?

    • Options
    • A. Restart the computer by using the last known good menu option
    • B. Perform an emergency repair and select fast repair, restart the computer
    • C. Restart the computer in the safe mode, remove the driver and restart the computer
    • D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver
    • E. None of above
    • Discuss
    • 4. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first?

    • Options
    • A. Replace the third disk and restart the server. Use Disk Management to repair the volume
    • B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
    • C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
    • D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
    • E. None of above
    • Discuss
    • 5. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem?

    • Options
    • A. Create a new hardware profile
    • B. Use Device Manager to remove the integrated 10-MB Ethernet adapter
    • C. Use Device Manager to disable the integrated 10-MB Ethernet adapter
    • D. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder
    • E. None of above
    • Discuss
    • 6. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

    • Options
    • A. Install Active Directory on the server
    • B. Select Basic Authentication check box
    • C. Clear the Allow Anonymous Connection check box
    • D. Disable the IUSE_inta user account on Intra
    • E. Clear the Allow IIS to Control Password check box
    • Discuss
    • 7. Special programs that assist programmers are called:

    • Options
    • A. heuristic processors
    • B. symbolic programmers
    • C. intelligent programming tools
    • D. program recognizers
    • E. None of the above
    • Discuss
    • 8. The expert system developed at MIT to solve mathematical problems is known as:

    • Options
    • A. RAND
    • B. ISIS
    • C. MACSYMA
    • D. MOLGEN
    • E. CMU
    • Discuss
    • 9. LISP machines also are known as:

    • Options
    • A. AI workstations
    • B. time-sharing terminals
    • C. super mini computers
    • D. All of the above
    • E. None of the above
    • Discuss
    • 10. In LISP, which of the following function assigns the value 10 to the symbol a?

    • Options
    • A. (setq a 10)
    • B. (a = b) where b = 10
    • C. (a = 10) (d) (setq 10 a)
    • D. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment