Chapter 9. Practice Test 1


Chapter 9. Practice Test #1

Question 1

Which tool(s) can be used to import and export security templates?

  • A. Local Security Settings MMC

  • B. Security Templates snap-in

  • C. Local Policies MMC

  • D. Account policies MMC

Question 2

Why would you revoke a certificate? (Choose all that apply.)

  • A. Because the user can no longer be trusted.

  • B. Because the certificate may be fraudulent.

  • C. Because the key has been compromised.

  • D. Because the network administrator needs to pare the certificate list occasionally.

Question 3

You are interviewing an applicant for an opening in your help desk group . During the course of your interview, you ask the applicant to tell you everything she knows about Windows 2000 and digitally signed drivers. Out of the four statements that the applicant makes, given below, which ones are correct? (Choose all that apply.)

  • A. Digitally signed device drivers have passed rigorous testing by the Microsoft Hardware Quality Labs and therefore should provide a high degree of reliability.

  • B. Digitally signed device drivers are protected against changes to the driver files since being signed by the Microsoft Hardware Quality Labs.

  • C. Digitally signed device drivers are the only type of driver files that are found on the Windows Update Web site or Windows 2000 CD-ROMs.

  • D. Digitally signed device drivers can't be installed unless a certificate authority has been set up on your network.

Question 4

Which of the following settings restricts users from accessing Web information on folders outside the Home Directory for a Web site?

  • A. Directory browsing

  • B. Index this resource

  • C. Execute scripts only

  • D. When connecting to this resource, the content should come from a share located on another computer.

Question 5

Which of the following VPN protocols can be used with a pre-Windows 2000 client?

  • A. PPTP

  • B. L2PP

  • C. L2TP

  • D. L1TP

Question 6

John is attempting to install a new application onto a computer, but is denied due to insufficient disk space. You check the hard disk and see that it still has 17GB of free space available. What is the most likely reason that John is not able to perform the installation?

  • A. John does not have Domain Admin permissions.

  • B. John has reached his disk quota limit.

  • C. John is installing an incompatible version of the application.

  • D. John is in Safe Mode.

Question 7

You are implementing file and folder auditing on your network file servers. What requirement must you meet to use auditing?

  • A. Your network must be an Ethernet network.

  • B. Your file servers must be formatted with the NTFS file system.

  • C. All of your users must be using Windows 2000 Professional.

  • D. Your file servers must be on the same local subnet as your users.

Question 8

Joe installed a new RAID controller in his Exchange 2000 Server. Joe plans to create a RAID 5 array using the controller. The RAID controller, however, does not appear in the Device Manager after starting the server. Joe has been assured by the hardware reseller that both the hardware and the drivers are compatible with Windows 2000. What does Joe need to do to get the new hardware installed in his computer satisfactorily?

  • A. Use the Add/Remove Hardware applet in the Control Panel.

  • B. Use the Phone and Modem Options applet in the Control Panel.

  • C. Install the device in the computer; Windows 2000 will detect and automatically install the device the next time it is started.

  • D. Use the Device Manager to install the new hardware device.

Question 9

What applications can you use to monitor your computer and network performance?

  • A. Device Manager

  • B. Performance Monitor

  • C. Recovery Console

  • D. Event Viewer

Question 10

What command is used to enable the PhysicalDisk object so that the counters can be monitored in Windows 2000?

  • A. It is enabled by default

  • B. Diskperf “y

  • C. Diskperf “n

  • D. None of the above

Question 11

You are responsible for managing the operation of an IIS 5 server that hosts two Web sites. You must meet the following performance requirements:

  • You must limit the performance impact of Web sites on the server.

  • You must limit the network usage of Web sites.

  • You must track access to the Web sites.

  • You must ensure users are allowed only to access files on the local server.

On the Properties page for each Web site, you select the Home Directory tab and select Log Visits and Directory Browsing. On the Performance tab, you select Enable process throttling, select Enforce limits, and set the Maximum CPU use setting to 15%.

Which of the following does the proposed solution provide? (Choose all that apply.)

  • A. The proposed solution limits the performance impact of one Web site on the server.

  • B. The proposed solution limits the network usage of two Web sites.

  • C. The proposed solution tracks access to the Web sites.

  • D. The proposed solution limits user access to files only on the local server.

Question 12

Chris is the network administrator of a small Windows 2000 network that has 10 servers and 125 client workstations. The network is running Active Directory and all computer configuration is controlled by Group Policy. Chris wants to include driver signing behavior in her Group Policy. Where does she need to go to configure the option for driver signing?

  • A. The System applet in the Control Panel.

  • B. The User Configuration, Administrative Templates, System section of the Group Policy Object.

  • C. The Computer Configuration, Administrative Templates, System section of the Group Policy Object.

  • D. The Computer Configuration, Windows Settings, Security Settings section of the Group Policy Object.

Question 13

The Compatible security template is used to perform what function in Windows 2000?

  • A. Restores the default security configuration to the computer after application.

  • B. Applies a security configuration that is approximately equivalent to a Windows NT 4.0 computer to allow legacy applications to function properly.

  • C. Applies a security configuration that is more secure than the default configuration.

  • D. Applies a security configuration that makes Windows 2000 computers able to share files and folders with Windows 98 computers.

Question 14

What command is used to enable the LogicalDisk object so that the counters can be monitored in Windows 2000?

  • A. It is enabled by default

  • B. Diskperf “y

  • C. Diskperf “n

  • D. None of the above

Question 15

Mary is the network administrator of a small Windows 2000 network that has 3 servers and 45 client workstations. The network is not running Active Directory. Mary wants to configure driver signing behavior for her computers. Where does she need to go to configure the option for driver signing?

  • A. The Computer Configuration, Administrative Templates, System section of the Group Policy Object.

  • B. The Computer Configuration, Windows Settings, Security Settings section of the Group Policy Object.

  • C. The Computer Configuration, Administrative Templates, System section of the Group Policy Object.

  • D. The System applet in the Control Panel.

Question 16

Jeff moves some encrypted files from his computer to a floppy disk. What is the status of the files now in regard to encryption?

  • A. The files are encrypted if the folder that they were moved into is encrypted.

  • B. The files are not encrypypted.

  • C. The files are encrypted if Jeff selected this option during the move process.

  • D. The files remain encrypted as long as Jeff's EFS certificate is on the floppy disk.

Question 17

Which of the following are advantages to using the NTFS v5 file system on your network server hard disks? (Choose all that apply.)

  • A. Auditing of file, folder, and object access.

  • B. Enforcement of disk space usage quotas.

  • C. EFS encryption of files and folders.

  • D. File and folder level security.

Question 18

If you run a normal backup on Monday, and a differential backup the other days of the week using only one tape per day, how many tapes will be needed to restore your server after a system failure on Friday?

  • A. One

  • B. Two

  • C. Three

  • D. Five

Question 19

What functions can the Routing and Remote Access Service in Windows 2000 perform? (Choose all that apply.)

  • A. RAS Server

  • B. VPN Server

  • C. Network routing

  • D. DHCP Server

Question 20

Ralph is interviewing for the position of a help desk employee. You ask him to tell you which of the following four statements about driver signing is false. Of the following statements you make, which ones are incorrect? (Choose all that apply.)

  • A. Digitally signed drivers are guaranteed to have been rigorously tested by Microsoft to ensure that they will properly function in Windows 2000.

  • B. Digitally signed drivers can only be obtained by calling Microsoft support directly.

  • C. Digitally signed drivers do not provide any protection against tampering after they leave the Microsoft WHQL.

  • D. Digitally signed drivers play an important role in Windows 2000 in keeping a computer stable and properly functioning.

Question 21

In what situation would you design your network as a workgroup instead of a domain?

  • A. When the network has multiple servers.

  • B. When the network is small and has no servers.

  • C. When you need to use Active Directory.

  • D. When you have several hundred clients spread out over multiple geographic regions .

Question 22

A user has been assigned the following permissions to the AcctInfo folder on a server:

  • AcctInfo Shared folder permissions ” Read (Everyone group)

  • AcctInfo Shared folder permissions ” Full Control (user)

  • AcctInfo NTFS permissions ” Read, Write, Read & Execute (user)

The user accesses the folder remotely from another computer on the network and attempts to manipulate the files in the folders. Which of the following will the user be allowed to perform? (Choose all that apply.)

  • A. The user will be allowed to change the ownership for the files in the folder.

  • B. The user will be able to run programs within the folder.

  • C. The user will be able to view the permissions for the files in the folder.

  • D. The user will be able to delete the files in the folder.

Question 23

To start in Safe Mode:

  • A. Press the F7 key during system boot.

  • B. Press the F8 key during system boot.

  • C. Select Start, Accessories, System Tools, Safe Mode.

  • D. None of the above.

Question 24

You have a striped volume on one of your Windows 2000 servers. Over the weekend , one of the disks has failed. You have a backup from Friday night. What must you do to get the server back into operation?

  • A. Replace the failed disk and re-create the striped volume.

  • B. Replace the failed disk, re-create the striped volume, and restore the data to the new striped volume.

  • C. Replace the failed disk and restore the data to it.

  • D. Re-create the striped volume and restore the data to it.

Question 25

How do you learn the status of a device? (Choose all that apply.)

  • A. By looking at the icon next to the device in the Device Manager tree.

  • B. By looking in the device's Properties window.

  • C. By seeing if the device is in the device list.

  • D. By seeing if the category of the device is in the device list.

Question 26

Christopher wants to enable NTFS compression on his local Windows 2000 Professional computer. You inform him that he cannot do so without violating the company's security policy that requires EFS to be used on all local computer hard disks. What is the cause of this problem?

  • A. NTFS compression and EFS encryption cannot be implemented on local computers, only on network file servers.

  • B. NTFS compression and EFS encryption are mutually exclusive, thus he will not be able to use EFS encryption.

  • C. Christopher is not a member of the Domain Admins group and will not be able to configure the desired changes.

  • D. Christopher does not have the required digital certificate for implementing NTFS file and folder compression.

Question 27

Rick is the administrator of a Windows 2000 network consisting of 150 Windows 2000 servers and 1,500 Windows 2000 Professional clients. His company is organized into four departments: Software, Hardware, Administration, and Support. The company manufactures and markets surveying devices that are used in the field by civil engineers . Rick wants to prevent his non-technical users from being able to install unsigned device drivers but still allow his technical users to install them as required, only after they have acknowledged the fact the drivers are unsigned. What steps should Rick perform to achieve his goals? All computer and user accounts are in one of four OUs that correspond to the four departments in the company. (Choose all that apply.)

  • A. From Active Directory Users and Computers, Rick should create a GPO and link it to the Software, Hardware, Administration, and Support OUs. He should then configure the driver signing policy in the GPO for Ignore.

  • B. From Active Directory Users and Computers, Rick should create a GPO and link it to the Software, Hardware, Administration, and Support OUs. He should then configure the driver signing policy in the GPO for Block.

  • C. From Active Directory Users and Computers, Rick should create a GPO and link it to the Administration and Support OUs. He should then configure the driver signing policy in the GPO for Block.

  • D. From Active Directory Users and Computers, Rick should create a GPO and link it to the Software and Hardware OUs. He should then configure the driver signing policy in the GPO for Warn.

Question 28

Which of the following is not a valid Safe mode option?

  • A. Safe Mode

  • B. Safe Mode with Networking

  • C. Safe Mode with Command Prompt

  • D. Safe Mode with Base Video

Question 29

Your network adapter is not on the HCL, and Plug and Play doesn't recognize it. What is your best plan of action?

  • A. Manually configure the resources using Device Manager.

  • B. Manually configure the resources in the server BIOS.

  • C. Manually configure the resources using Computer Management.

  • D. Replace the adapter with an HCL supported one.

Question 30

You are the network administrator of a large organization that is using all Windows 2000 Server computers and Windows 2000 Professional and Windows NT 4.0 Workstation computers. Users consistently seem to be using several hundred MB of hard disk space on your network's file servers. Organizational policy states that no user will use more than 50MB of disk space on any server without prior approval. What can you to prevent users from using too much disk space in the future?

  • A. Create a disk quota entry for all users and limit their usage to 50MB.

  • B. Upgrade the Windows NT 4.0 Workstation clients to Windows 2000 Professional.

  • C. Deny the Windows NT 4.0 Workstation clients access to the Windows 2000 file servers.

  • D. Establish an external trust between the root of your Windows 2000 domain and the Windows NT 4.0 domain.

Question 31

Why must you deploy service packs for Windows 2000 Server? (Choose all that apply.)

  • A. So you won't be affected by security attacks over the Internet.

  • B. Because Windows won't work if you don't.

  • C. So you have the latest fixes and patches so Windows 2000 Server operates properly.

  • D. So all other network users running Windows 2000 or XP will have the latest updates.

Question 32

Dorothy is attempting to save a large database file and is denied access due to being out of disk space. NTFS file and folder compression is in use on the disk in question, as are disk quotas. Dorothy shows that she has 15MB of space remaining and the database file is only 13MB in size. Why is she still not able to save this large file?

  • A. There is not enough space for the temp file that will be created during the saving of the file.

  • B. Disk quotas are based on uncompressed file sizes, not compressed file sizes.

  • C. Dorothy has too many applications open , thus her paging file has grown too large.

  • D. The file is too large to transmit over the network without excessive fragmentation and packet loss.

Question 33

Which of the following user groups are permitted to use the Application Server mode of Terminal Services? (Choose all that apply.)

  • A. Administrators

  • B. Users

  • C. Power Users

  • D. Anonymous

Question 34

Roger is an administrator for his company and is responsible for keeping 25 servers and 750 workstations up to date with the latest stable drivers. A driver update has been issued for the DLT backup system that is installed on three of Roger's servers. Where can Roger go to quickly install the updated device drivers on these three servers?

  • A. The Services MMC snap-in

  • B. Device Manager

  • C. System Information

  • D. The Add/Remove Programs applet in the Control Panel

Question 35

Your Windows 2000 Server is configured with both FAT32 and NTFS volumes . You must configure the server to provide the most secure access possible to all files on the server and meet the following security requirements:

  • You must limit local access to change or delete files and folder all groups except Administrators and Server Operators.

  • You must track all failed logon attempts.

  • You must allow members of the Accounting group complete access to the files in the Accounting and Payroll folders on the NTFS volume.

  • You must not allow remote access to the Everyone group to the Security Management share on the FAT volume.

The proposed solution is to change the Security Policy settings. In the Users Rights Assignments policies, change Log On Locally to include only Administrators. In the Audit Policy settings, change Audit Logon Events to Failure. On the Permissions for the shared folders Accounting and Payroll, add the Accounting group and select Allow Full Control. On the Permissions for the Security Management share, remove the Everyone group.

Which of the following does the proposed solution provide? (Choose all that apply.)

  • A. The proposed solution limits local access to delete files and folders for all groups except Administrators and Server Operators.

  • B. The proposed solution tracks all failed logon attempts.

  • C. The proposed solution allows members of the Accounting group complete access to the files in the Accounting and Payroll folders.

  • D. The proposed solution restricts remote access for Everyone to the Security Management folder.

Question 36

What is the default method of name resolution in Windows 2000?

  • A. WINS

  • B. NetBIOS

  • C. NetBEUI

  • D. DNS

Question 37

You are the administrator in your organization with the responsibility for managing all file servers. Recently, some of your users have been complaining about getting out of space errors even though they claim their individual use is within the posted guidelines for which disk quotas are configured. You open the disk quota settings window for the file server in question and see the image shown in Figure 9.1 with the red light illuminated. What is the cause of the problem?

  • A. The disk in the file server is failing and needs to be replaced .

  • B. The disk quota service has become hung and must be restarted.

  • C. The disk quota is disabled for this hard disk and other users have violated the usage guidelines, using all available space on the hard disk.

  • D. The file server is disconnected from the local network.

Figure 9.1. The quota status display.

graphics/09fig01.jpg

Question 38

Austin is using the Device Manager to gather information about a particular server in his company. Which of the following items will he be able to gather information on using the Device Manager? (Choose all that apply.)

  • A. The amount of memory installed in the server.

  • B. A list of all interrupts currently being used on the computer.

  • C. The status of a particular device, such as enabled or disabled.

  • D. The size of the paging file on the server.

Question 39

What subnet mask is used for a class B address?

  • A. 255.255.248.0

  • B. 255.255.255.0

  • C. 255.255.0.0

  • D. 255.0.0.0

Question 40

You are the network administrator of your company's Windows 2000 network. All computers on the network are running Windows 2000 Server or Windows 2000 Professional. You have one central file server that all users save their documents onto. You want to be able to monitor user disk space usage without restricting it. How can you most easily accomplish this? (Choose all that apply.)

  • A. Use Windows Explorer to manually examine the usage of each of your users one at a time.

  • B. Enable disk quotas on the volumes of concern.

  • C. Select the Do not limit disk usage option.

  • D. Drag the usage statistics out of the Quota Entries window into a spreadsheet application.

Question 41

Why would you use a troubleshooter?

  • A. Because you like to answer questions about devices.

  • B. Because you can access Windows Help from there.

  • C. So you can determine if Windows can provide a solution to your problem.

  • D. So you can learn what problems you may run into.

Question 42

Where is Internet Connection Sharing configured on a Windows 2000 Server? (Choose all that apply.)

  • A. In the Communications applet

  • B. In the ICS applet

  • C. In the RRAS MMC

  • D. From the properties page of the interface that's connected to the Internet

Question 43

If you run a normal backup on Monday, and an incremental backup the other days of the week using only one tape per day, how many tapes will be needed to restore your server after a system failure on Friday?

  • A. One

  • B. Two

  • C. Three

  • D. Five

Question 44

Jeff wants to configure a RAID-5 array on his Windows 2000 Server computer. He has five hard disks installed but cannot create a RAID-5 array. What is the most likely reason for his trouble?

  • A. Jeff is not a member of the Enterprise Admins group.

  • B. Jeff's hard disks are basic disks instead of dynamic disks.

  • C. Jeff's hard disks are dynamic disks instead of basic disks.

  • D. Jeff's server does not have a hardware RAID controller installed.

Question 45

Auditing is enabled from what location?

  • A. The Group Policy Editor

  • B. The Event Viewer

  • C. Windows Explorer

  • D. The Services console

Question 46

In what two locations might permission be granted for a user to have dial-up access? (Choose all that apply.)

  • A. Remote Policy

  • B. Remote Access Policy

  • C. User Account Properties

  • D. Group Policy

Question 47

Which of the following File Replication Service functions is configured automatically?

  • A. IIS virtual directory synchronization

  • B. Active Directory inter-site synchronization

  • C. Active Directory intra-site synchronization

  • D. Dfs root replica synchronization

Question 48

Which of the following security templates requires a pure Windows 2000 environment in order to be used?

  • A. Securews

  • B. Ocfiless

  • C. Hisecdc

  • D. Securedc

Question 49

What is included in a System State backup? (Choose all that apply.)

  • A. The Registry

  • B. User documents

  • C. Boot files

  • D. Active Directory database

Question 50

Andrea recently purchased a new custom-created FAX solution for her FAX server. The solution is not Plug and Play compatible. What does Andrea need to do to get the new hardware installed in her computer satisfactorily?

  • A. Use the Device Manager to install the new hardware device.

  • B. Use the Phone and Modem Options applet in the Control Panel.

  • C. Install the device in the computer. Windows 2000 will detect and automatically install the device the next time it is started.

  • D. Use the Add/Remove Hardware applet in the Control Panel.

Question 51

What command-line switch should you use with the cipher utility if you are encrypting a folder that contains system files?

  • A. Cipher /h

  • B. Cipher /s

  • C. Cipher /e

  • D. Cipher /d

Question 52

Which of the following are required to use Internet Connection Sharing on your network? (Choose all that apply.)

  • A. A connection to the Internet

  • B. A computer with two network connections, one of which must be an Ethernet adapter

  • C. Windows 2000 DHCP service

  • D. Windows 2000 DNS service

Question 53

What type of backup would you perform if you only wanted to back up critical files such as the Registry or the Active Directory database?

  • A. Daily

  • B. System State

  • C. Incremental

  • D. Differential

Question 54

How do you create an answer file? (Choose all that apply.)

  • A. Using the Setup Wizard

  • B. From the CD-ROM

  • C. From the boot disks

  • D. Creating the file manually

Question 55

What two methods are available for the Data Recovery Agent to decrypt a file that was encrypted by a user whose user account has been deleted from Active Directory? (Choose all that apply.)

  • A. Restore the file to a recovery server containing the DRA's recovery certificate and decrypt the file.

  • B. Export the DRA's recovery certificate to the location of the encrypted file and decrypt the file.

  • C. Re-create the user account with the same properties and use it to decrypt the file.

  • D. Copy the file from the command line to a floppy disk.

Question 56

If you have a server failure and the Recovery Console was not preloaded, how can you still boot to it? (Choose all that apply.)

  • A. From the four Windows 2000 Boot disks

  • B. From a network share

  • C. Using a PXE capable NIC

  • D. From the Windows 2000 CD-ROM

Question 57

How is the Recovery Console installed on a Windows 2000 computer?

  • A. Using the winnt32 /reccons command.

  • B. Using the winnt /cmdcons command.

  • C. Using the winnt32 /cmdcons command.

  • D. During Windows 2000 setup.

Question 58

Andrea wants to configure NTFS file and folder compression on a folder on her Windows 2000 Professional computer from the command line. What is the required command to perform this action from the command line?

  • A. compress

  • B. compact

  • C. zip

  • D. reduce

Question 59

What is required to install an Enterprise Certificate Authority?

  • A. An active Internet connection

  • B. Active Directory

  • C. A third-party digital certificate from VeriSign

  • D. Windows 2000 Advanced Server

Question 60

Which of the following configuration limitations is true of standalone Dfs servers?

  • A. They must reside on NTFS volumes.

  • B. They can be configured to replicate using FRS.

  • C. They are limited to one level of Dfs links.

  • D. They provide fault-tolerant access to links for network users.



MCSE Windows 2000 Server Exam Cram2 (Exam 70-215)
MCSE Windows 2000 Server Exam Cram 2 (Exam Cram 70-215)
ISBN: 0789728737
EAN: 2147483647
Year: 2003
Pages: 155

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net