1. Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only. What should you do?
Options
A. Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy
B. Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy
C. Set a Group Policy on all OUs containing computer accounts to enable the passwords must meet complexity requirements policy
D. Set a Group Policy on all OUs containing user accounts to enable the passwords must meet complexity requirements policy
Correct Answer: Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy
2. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
Options
A. Apply a less restrictive custom security template to DC1
B. Apply a less restrictive custom policy to Windows NT domain controller
C. Ensure the Windows 2000 domain is configured in the mixed mode
D. Ensure the Windows 2000 domain is configured to run in the native mode
Correct Answer: Apply a less restrictive custom security template to DC1
3. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?
Options
A. Use Computer Management to stop and restart the Server service
B. Use Computer Management to stop and restart the Workstation service
C. Use Task Manager to end any related child processes
D. Use Task Manager to end and automatically restart the Explorer.exe process
Correct Answer: Use Task Manager to end any related child processes
4. You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?
Options
A. Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive
B. Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen
C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers
D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers
Correct Answer: Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen
5. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
Options
A. Set the CrashonAuditFail registry key to 0
B. Set the Security Log to overwrite events as needed
C. Delete the Liscense Trial registry key
D. Increase the size of the security log
E. Save the security log to a file, and clear it every morning
Correct Answer: Set the CrashonAuditFail registry key to 0
6. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?
Options
A. Convert both to dynamic disks
B. Create an empty extended partition on new disk
C. Create a single unformatted primary partition on new array
D. Format new disk array as a single NTFS primary partition
E. Format the new disk array as a single NTFS logical drive in an extended partition
7. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?
Options
A. Install Network Monitor on Monitor 1
B. Install Network Monitor on Application Server
C. Configure the network monitor ECP port something for TCP
D. Configure the network monitor EDP port something for UDP
E. Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance
Correct Answer: Configure the network monitor ECP port something for TCP
8. You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?
Options
A. Enable the background refresh settings to use the default group policy refresh date
B. Enable the asynchronous group policy application settings
C. Enable and configure the group policy refresh interval for domain controller
D. Enable and configure the group policy refresh interval for computers
Correct Answer: Enable and configure the group policy refresh interval for computers
9. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?
Options
A. Compress the files in her home folder to save disk space
B. Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
C. Move some of the files from her home folder to the IN_PROGRESS shared folder
D. Remove files from her home folder until the total uncompressed file size is less than 100 MB
Correct Answer: Remove files from her home folder until the total uncompressed file size is less than 100 MB
10. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?
Options
A. Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package
B. Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy
C. Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy
D. Place the service pack in a Distributed file system (Dfs)