What is the maximum number of processors Windows 2000 Server can support?
2
4
8
16
Which components are part of the Windows 2000 kernel mode? (Select all that apply.)
The integral subsystem
The Hardware Abstraction layer
The Windows 2000 Executive
The environment subsystem
You have been asked to create a temporary network for the billing department to use during an upgrade to a new billing system. There will be a maximum of seven employees using the network at a given time. You are required to provide the most efficient solution possible.
Required Result: Users must be able to share password-protected files between computers on the billing network.
Optional Result: Users can share a single printer.
Optional Result: Users can log in to the billing network and gain access to shared folders on every billing computer without having to type in a password again.
Solution: Create a workgroup environment and attach a printer to one of the workstations. Share the printer and provide the billing department employees with the printer’s password.
The solution meets the required result and both of the optional results.
The solution meets the required result and only one of the optional results.
The solution meets the required result only.
The solution does not meet the required result.
Which programs can be used to install Windows 2000 Server? (Select all that apply.)
setup.exe
install.exe
winnt32.exe
win2k.exe
You plan on installing Windows 2000 Server on a computer that is already running Windows 98 Second Edition. Which installation file(s) could you use? (Select all that apply.)
winnt.exe
winnt32.exe
setup.exe
upgrade.exe
You are planning to install Windows 2000 Server on a Pentium III computer with 30 gigabytes of free hard drive space and a 21-inch monitor. What is the minimum amount of RAM you’ll need to install Windows 2000?
32 MB
64 MB
96 MB
128 MB
Which files are required to perform an unattended installation of Windows 2000 Server?
Answer file
Difference file
Slipstreaming file
Automation file
When can you install service packs for Windows 2000 Server?
Only after the installation is complete
During the installation
Only while running in native mode
None of the above
You are upgrading a Windows NT network to run Windows 2000.
Required Result: Allow Windows NT clients to continue to access network resources normally and allow Windows 2000 clients to take advantage of the Windows 2000 Server’s advanced capabilities.
Optional Result: Maintain security on the network during the transition period.
Optional Result: Allow users to use the same account information on the new server.
Solution: Upgrade the PDC to Windows 2000 Server and verify that everything is running properly. Then upgrade each BDC separately, making sure each is running properly before moving on to the next. Upgrade member servers and standalone servers in alphabetical order, based on their computer names.
The solution meets the required result and both of the optional results.
The solution meets the required result and only one of the optional results.
The solution meets the required result only.
The solution does not meet the required result.
You are the administrator for a Windows NT network consisting of 1 PDC, 15 BDCs, and 235 member servers. All the member servers are running Windows NT Workstation. As soon as you upgrade the PDC to Windows 2000 Server, which mode(s) can you run in? (Select all that apply.)
Native mode
Transitive mode
Mixed mode
a or c
When can Windows 2000 have transitive trust relationships?
In native mode only
In both native and mixed mode
In mixed mode only
Never
You are installing a Windows 2000 Server as a domain controller. Which filesystem(s) can you use? (Select all that apply.)
FAT
FAT32
NTFS
HPFS
VFAT
You have been assigned a disk quota of 50 MB. You are already using 42 MB and you’d like to store a 9 MB text file in your folder. You use file compression to shrink the text file to 6 MB, but when you try to copy it into your folder, you can’t. What is the most likely cause of the failure?
The file has been corrupted during the compression process.
There has been a disk failure on the file server.
You have exceeded your 50 MB quota.
You have renamed the file after it is compressed.
What can the link tracking service be used for under Windows 2000?
Web site traffic analysis for IIS
Windows shortcut management
Web site traffic analysis for a Windows 2000 proxy server
Transitive trust relationship management
A backup program can gather information on changes that have occurred on a Windows 2000 file server using which technology?
Sparse files
The System Journal
The Change Journal
Mod files
File Replication Service uses which logical networking topology?
Bus
Mesh
Ring
Star
Which types of keys are used in the Windows 2000 Encrypting Filesystem? (Select all that apply.)
Encryption key
Private key
Public key
Recovery key
Which Windows 2000 Servers can use the Encrypting Filesystem?
A standalone server running the FAT32 filesystem
A standalone server running the NTFS filesystem
Any Windows 2000 Server, regardless of filesystem
Domain controllers only
A member of the backup operators group is trying to back up an encrypted file owned by a system administrator to a tape backup device. Is this possible?
No, only a user logged in with a system administrator account may back up files owned by an administrator account.
Yes, members of the backup operators group can back up encrypted files regardless of ownership.
No, encrypted files cannot be backed up to tape drives. They can only be backed up to NTFS formatted disks.
Yes, as long as the administrator gives the backup operators group Read permissions for the encrypted file.
A user has a disk quota of 15 MB. They are already using 12 MB and decide to compress their files to make room for more. After compressing the files, the user realizes one of their documents is an important sales proposal. He decides to encrypt the file without success. What is the most likely cause?
Compression has no effect on disk quota.
Only a system administrator can encrypt files.
You can’t encrypt a compressed file.
You have to encrypt the file before compressing it.
What is the name of the command-line encryption utility in Windows 2000?
encrypt
cipher
opaque
secure
What happens to a compressed file when it is moved to a floppy disk under Windows 2000?
It is uncompressed.
It remains compressed.
You are given a choice of whether or not you want compression preserved on the floppy.
You have to reformat the floppy with a Windows 2000 machine first, then you can store compressed files on it.
You move a compressed file from one NTFS volume to another NTFS volume. The destination folder is not compressed. Which choice best describes what will happen to the file and why?
Because both folders are on NTFS volumes, the compression state will remain the same.
Under NTFS, files inherit the compression state of the destination folder, so the file will be uncompressed.
Under NTFS, compression states are only maintained within the same NTFS volume, so the file will be uncompressed.
Because the file is compressed, it must be uncompressed before it can be moved to another volume, regardless of whether that volume is FAT or NTFS.
When you use Windows Backup to perform a differential backup, what happens to the archive bits?
They are updated.
They remain the same.
Under NTFS the archive bits are updated, under FAT they remain the same.
Under NTFS the archive bits remain the same, under FAT they are updated.
Which type of computer names does Windows 2000 Active Directory use?
NetBIOS
NetBEUI
TCP/IP
DNS
You decide to host an Internet web site on your Windows 2000 Server. What is the name of the folder you should store your web files in for maximum convenience and security?
WebDEV
WebDAV
WebSITE
WebPAGE
What can happen when a prematurely broken FTP session is reestablished with an IIS 5 FTP server?
The file being transferred during the break will need to be transferred from the beginning.
All files will need to start their transfer session from the beginning.
It resumes the session where it left off, as long as the FTP client is capable of doing so.
It resumes the session where it left off, regardless of the FTP client.
A user on your Windows 2000 network would like to telnet into the Windows 2000 Server and run an application remotely. Which operating systems can they use to perform this task, assuming they have a Telnet program installed and NTLM authentication has been turned off in the Telnet server’s configuration?
Windows 2000
Linux
Solaris
Windows NT
a and d
All of the above
Which modes can Terminal Services be installed in? (Select all that apply.)
Application sharing
Remote sharing
Remote administration
Application tuning
You install Terminal Services in application sharing mode. You plan on sharing a large database application with 500 computers. To ensure maximum performance, which two upgrades should you perform? (Select all that apply.)
Add RAM to the server
Add RAM to the clients
Install a fast SCSI hard drive in the server
Install a fast SCSI hard drive in the clients
Which connection type can be used with a virtual private network using two Windows 2000 computers?
Ethernet
56K modem
ISDN
All of the above
What is the name of the file that stores a mandatory profile in Windows 2000?
ntprofile.dat
ntprofile.man
ntuser.dat
ntuser.man
You would like to create a universal group on your Windows 2000 network. What requirements have to be met before you can do this?
You need at least one Windows 2000 Server on the network.
You need at least two Windows 2000 Servers on the network.
You must be running in mixed mode.
You must be running in native mode.
Which of the following statements, in regard to printing in a Windows 2000 environment, is incorrect?
A print device can refer to more than one logical printer.
A logical printer can refer to more than one print device.
A print pool can contain more than one print device.
Print devices can be assigned permissions.
You are planning on installing new video cards in all the web design computers. All of the web designers use identical computers, so you take one to test the new video card in before ordering the rest of the cards. It functions perfectly. Now that you know the card and its driver work well, you don’t want to get any more warnings about the device driver being unsigned. You decide to sign the device driver and register the certificate throughout the domain. Is this possible?
Yes, as long as all the web design computers are in that domain.
No, only Microsoft can sign device drivers.
Yes, as long as the video card is on the HCL.
No, each copy of the device driver must be signed on the computer it is installed on.
You want to keep track of all the users that are trying to access the payroll file. What should you do?
Run the network monitor to capture all network data on the subnet.
Take ownership of the payroll file and set the security to no access.
Create an audit policy to monitor both successful and failed access to the payroll file.
Move the payroll file to a local folder on your workstation.
What is the name of the area that a Kerberos server provides authentication services for?
Domain
Zone
Realm
Scope
What does Kerberos provide authentication for? (Select all that apply.)
The user trying to log into the server
The server that the user is trying to log into
The domain controller for the network the user is logging into
Only the user trying to log in
Which parameters can Task Manager be used to monitor?
RAM
Disk
CPU
a and c
All of the above
When you first get your network running properly, you decide to use the System Monitor to store some current performance information so you can compare it to the performance as more clients are added to the network. What is this original data called?
Primary traffic
Default traffic
Baseline
Timeline
What is an SNMP community?
A group of computers participating in SNMP monitoring
The domain where an SNMP Network Management Station resides
A password
A type of global group
You are trying to log on using the recovery console by booting the computer from the Windows 2000 setup disks. What type of logon account do you need?
A valid user account on the domain
A valid user account on that computer
A backup operator’s account on the domain
A local administrator’s account for that computer