Chapter 10. Practice Tests

Test Questions

  1. What is the maximum number of processors Windows 2000 Server can support?

    1. 2

    2. 4

    3. 8

    4. 16

  2. Which components are part of the Windows 2000 kernel mode? (Select all that apply.)

    1. The integral subsystem

    2. The Hardware Abstraction layer

    3. The Windows 2000 Executive

    4. The environment subsystem

  3. You have been asked to create a temporary network for the billing department to use during an upgrade to a new billing system. There will be a maximum of seven employees using the network at a given time. You are required to provide the most efficient solution possible.

    Required Result: Users must be able to share password-protected files between computers on the billing network.

    Optional Result: Users can share a single printer.

    Optional Result: Users can log in to the billing network and gain access to shared folders on every billing computer without having to type in a password again.

    Solution: Create a workgroup environment and attach a printer to one of the workstations. Share the printer and provide the billing department employees with the printer’s password.

    1. The solution meets the required result and both of the optional results.

    2. The solution meets the required result and only one of the optional results.

    3. The solution meets the required result only.

    4. The solution does not meet the required result.

  4. Which programs can be used to install Windows 2000 Server? (Select all that apply.)

    1. setup.exe

    2. install.exe

    3. winnt32.exe

    4. win2k.exe

  5. You plan on installing Windows 2000 Server on a computer that is already running Windows 98 Second Edition. Which installation file(s) could you use? (Select all that apply.)

    1. winnt.exe

    2. winnt32.exe

    3. setup.exe

    4. upgrade.exe

  6. You are planning to install Windows 2000 Server on a Pentium III computer with 30 gigabytes of free hard drive space and a 21-inch monitor. What is the minimum amount of RAM you’ll need to install Windows 2000?

    1. 32 MB

    2. 64 MB

    3. 96 MB

    4. 128 MB

  7. Which files are required to perform an unattended installation of Windows 2000 Server?

    1. Answer file

    2. Difference file

    3. Slipstreaming file

    4. Automation file

  8. When can you install service packs for Windows 2000 Server?

    1. Only after the installation is complete

    2. During the installation

    3. Only while running in native mode

    4. None of the above

  9. You are upgrading a Windows NT network to run Windows 2000.

    Required Result: Allow Windows NT clients to continue to access network resources normally and allow Windows 2000 clients to take advantage of the Windows 2000 Server’s advanced capabilities.

    Optional Result: Maintain security on the network during the transition period.

    Optional Result: Allow users to use the same account information on the new server.

    Solution: Upgrade the PDC to Windows 2000 Server and verify that everything is running properly. Then upgrade each BDC separately, making sure each is running properly before moving on to the next. Upgrade member servers and standalone servers in alphabetical order, based on their computer names.

    1. The solution meets the required result and both of the optional results.

    2. The solution meets the required result and only one of the optional results.

    3. The solution meets the required result only.

    4. The solution does not meet the required result.

  10. You are the administrator for a Windows NT network consisting of 1 PDC, 15 BDCs, and 235 member servers. All the member servers are running Windows NT Workstation. As soon as you upgrade the PDC to Windows 2000 Server, which mode(s) can you run in? (Select all that apply.)

    1. Native mode

    2. Transitive mode

    3. Mixed mode

    4. a or c

  11. When can Windows 2000 have transitive trust relationships?

    1. In native mode only

    2. In both native and mixed mode

    3. In mixed mode only

    4. Never

  12. You are installing a Windows 2000 Server as a domain controller. Which filesystem(s) can you use? (Select all that apply.)

    1. FAT

    2. FAT32

    3. NTFS

    4. HPFS

    5. VFAT

  13. You have been assigned a disk quota of 50 MB. You are already using 42 MB and you’d like to store a 9 MB text file in your folder. You use file compression to shrink the text file to 6 MB, but when you try to copy it into your folder, you can’t. What is the most likely cause of the failure?

    1. The file has been corrupted during the compression process.

    2. There has been a disk failure on the file server.

    3. You have exceeded your 50 MB quota.

    4. You have renamed the file after it is compressed.

  14. What can the link tracking service be used for under Windows 2000?

    1. Web site traffic analysis for IIS

    2. Windows shortcut management

    3. Web site traffic analysis for a Windows 2000 proxy server

    4. Transitive trust relationship management

  15. A backup program can gather information on changes that have occurred on a Windows 2000 file server using which technology?

    1. Sparse files

    2. The System Journal

    3. The Change Journal

    4. Mod files

  16. File Replication Service uses which logical networking topology?

    1. Bus

    2. Mesh

    3. Ring

    4. Star

  17. Which types of keys are used in the Windows 2000 Encrypting Filesystem? (Select all that apply.)

    1. Encryption key

    2. Private key

    3. Public key

    4. Recovery key

  18. Which Windows 2000 Servers can use the Encrypting Filesystem?

    1. A standalone server running the FAT32 filesystem

    2. A standalone server running the NTFS filesystem

    3. Any Windows 2000 Server, regardless of filesystem

    4. Domain controllers only

  19. A member of the backup operators group is trying to back up an encrypted file owned by a system administrator to a tape backup device. Is this possible?

    1. No, only a user logged in with a system administrator account may back up files owned by an administrator account.

    2. Yes, members of the backup operators group can back up encrypted files regardless of ownership.

    3. No, encrypted files cannot be backed up to tape drives. They can only be backed up to NTFS formatted disks.

    4. Yes, as long as the administrator gives the backup operators group Read permissions for the encrypted file.

  20. A user has a disk quota of 15 MB. They are already using 12 MB and decide to compress their files to make room for more. After compressing the files, the user realizes one of their documents is an important sales proposal. He decides to encrypt the file without success. What is the most likely cause?

    1. Compression has no effect on disk quota.

    2. Only a system administrator can encrypt files.

    3. You can’t encrypt a compressed file.

    4. You have to encrypt the file before compressing it.

  21. What is the name of the command-line encryption utility in Windows 2000?

    1. encrypt

    2. cipher

    3. opaque

    4. secure

  22. What happens to a compressed file when it is moved to a floppy disk under Windows 2000?

    1. It is uncompressed.

    2. It remains compressed.

    3. You are given a choice of whether or not you want compression preserved on the floppy.

    4. You have to reformat the floppy with a Windows 2000 machine first, then you can store compressed files on it.

  23. You move a compressed file from one NTFS volume to another NTFS volume. The destination folder is not compressed. Which choice best describes what will happen to the file and why?

    1. Because both folders are on NTFS volumes, the compression state will remain the same.

    2. Under NTFS, files inherit the compression state of the destination folder, so the file will be uncompressed.

    3. Under NTFS, compression states are only maintained within the same NTFS volume, so the file will be uncompressed.

    4. Because the file is compressed, it must be uncompressed before it can be moved to another volume, regardless of whether that volume is FAT or NTFS.

  24. When you use Windows Backup to perform a differential backup, what happens to the archive bits?

    1. They are updated.

    2. They remain the same.

    3. Under NTFS the archive bits are updated, under FAT they remain the same.

    4. Under NTFS the archive bits remain the same, under FAT they are updated.

  25. Which type of computer names does Windows 2000 Active Directory use?

    1. NetBIOS

    2. NetBEUI

    3. TCP/IP

    4. DNS

  26. You decide to host an Internet web site on your Windows 2000 Server. What is the name of the folder you should store your web files in for maximum convenience and security?

    1. WebDEV

    2. WebDAV

    3. WebSITE

    4. WebPAGE

  27. What can happen when a prematurely broken FTP session is reestablished with an IIS 5 FTP server?

    1. The file being transferred during the break will need to be transferred from the beginning.

    2. All files will need to start their transfer session from the beginning.

    3. It resumes the session where it left off, as long as the FTP client is capable of doing so.

    4. It resumes the session where it left off, regardless of the FTP client.

  28. A user on your Windows 2000 network would like to telnet into the Windows 2000 Server and run an application remotely. Which operating systems can they use to perform this task, assuming they have a Telnet program installed and NTLM authentication has been turned off in the Telnet server’s configuration?

    1. Windows 2000

    2. Linux

    3. Solaris

    4. Windows NT

    5. a and d

    6. All of the above

  29. Which modes can Terminal Services be installed in? (Select all that apply.)

    1. Application sharing

    2. Remote sharing

    3. Remote administration

    4. Application tuning

  30. You install Terminal Services in application sharing mode. You plan on sharing a large database application with 500 computers. To ensure maximum performance, which two upgrades should you perform? (Select all that apply.)

    1. Add RAM to the server

    2. Add RAM to the clients

    3. Install a fast SCSI hard drive in the server

    4. Install a fast SCSI hard drive in the clients

  31. Which connection type can be used with a virtual private network using two Windows 2000 computers?

    1. Ethernet

    2. 56K modem

    3. ISDN

    4. All of the above

  32. What is the name of the file that stores a mandatory profile in Windows 2000?

    1. ntprofile.dat

    2. ntprofile.man

    3. ntuser.dat

    4. ntuser.man

  33. You would like to create a universal group on your Windows 2000 network. What requirements have to be met before you can do this?

    1. You need at least one Windows 2000 Server on the network.

    2. You need at least two Windows 2000 Servers on the network.

    3. You must be running in mixed mode.

    4. You must be running in native mode.

  34. Which of the following statements, in regard to printing in a Windows 2000 environment, is incorrect?

    1. A print device can refer to more than one logical printer.

    2. A logical printer can refer to more than one print device.

    3. A print pool can contain more than one print device.

    4. Print devices can be assigned permissions.

  35. You are planning on installing new video cards in all the web design computers. All of the web designers use identical computers, so you take one to test the new video card in before ordering the rest of the cards. It functions perfectly. Now that you know the card and its driver work well, you don’t want to get any more warnings about the device driver being unsigned. You decide to sign the device driver and register the certificate throughout the domain. Is this possible?

    1. Yes, as long as all the web design computers are in that domain.

    2. No, only Microsoft can sign device drivers.

    3. Yes, as long as the video card is on the HCL.

    4. No, each copy of the device driver must be signed on the computer it is installed on.

  36. You want to keep track of all the users that are trying to access the payroll file. What should you do?

    1. Run the network monitor to capture all network data on the subnet.

    2. Take ownership of the payroll file and set the security to no access.

    3. Create an audit policy to monitor both successful and failed access to the payroll file.

    4. Move the payroll file to a local folder on your workstation.

  37. What is the name of the area that a Kerberos server provides authentication services for?

    1. Domain

    2. Zone

    3. Realm

    4. Scope

  38. What does Kerberos provide authentication for? (Select all that apply.)

    1. The user trying to log into the server

    2. The server that the user is trying to log into

    3. The domain controller for the network the user is logging into

    4. Only the user trying to log in

  39. Which parameters can Task Manager be used to monitor?

    1. RAM

    2. Disk

    3. CPU

    4. a and c

    5. All of the above

  40. When you first get your network running properly, you decide to use the System Monitor to store some current performance information so you can compare it to the performance as more clients are added to the network. What is this original data called?

    1. Primary traffic

    2. Default traffic

    3. Baseline

    4. Timeline

  41. What is an SNMP community?

    1. A group of computers participating in SNMP monitoring

    2. The domain where an SNMP Network Management Station resides

    3. A password

    4. A type of global group

  42. You are trying to log on using the recovery console by booting the computer from the Windows 2000 setup disks. What type of logon account do you need?

    1. A valid user account on the domain

    2. A valid user account on that computer

    3. A backup operator’s account on the domain

    4. A local administrator’s account for that computer

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset