Chapter 10. Answer Key to Practice Test 1


Chapter 10. Answer Key to Practice Test #1

1. A

2. A, B, C

3. A, B, C

4. A

5. A

6. B

7. B

8. A

9. B, D

10. A

11. A, C

12. B

13. B

14. B

15. D

16. B

17. A, B, C, D

18. B

19. A, B, C

20. A, D

21. B

22. B, C

23. B

24. B

25. A, B

26. B

27. C, D

28. D

29. D

30. A

31. A, C, D

32. B

33. A, B, C

34. B

35. B, C, D

36. D

37. C

38. B, C

39. C

40. B, C, D

41. C

42. C, D

43. D

44. B

45. A

46. B, C

47. C

48. C

49. A, C, D

50. D

51. A

52. A, B

53. B

54. A, D

55. A, B

56. A, D

57. C

58. B

59. B

60. C

A1:

Answer A is correct. The Security Templates snap-in allows you to edit as well as cut and paste security templates, but doesn't allow you to import or export them. The Local Policies and Account policies MMCs don't exist. They are nodes in the Local Security Settings MMC.

A2:

Answers A, B, and C are correct. The network administrator might believe that the key is fraudulent or compromised, or the user cannot be trusted.

A3:

Answers A, B, and C are correct. You do not need a CA on your network to install digitally signed drivers; therefore, answer D is incorrect.

A4:

Answer A is correct. Directory browsing determines whether users connecting to the site are able to access information located in other folders outside the Home Directory.

A5:

Answer A is correct. Windows 9x and Windows NT clients can only connect to a VPN using PPTP. Therefore, answers B, C, and D are all incorrect.

A6:

Answer B is correct. Disk quotas are based on the ownership attribute of each file. In this case, all files that John has created, edited, or otherwise taken ownership of (including application installation) will count toward his quota usage. Most likely he does not have enough space left under his quota to allow him to install the application; therefore, answers A, C, and D are incorrect.

A7:

Answer B is correct. File and folder auditing can be enabled only on NTFS-formatted volumes .

A8:

Answer A is correct. Non “Plug and Play hardware must be added via the Add/Remove Hardware applet in the Control Panel. All drivers to be installed should be Windows 2000 compliant. The Phone and Modem Options applet of the Control Panel can be used to configure dialing rules and modem settings after a modem has been successfully installed; therefore, answer B is incorrect. Only Plug and Play hardware can be installed physically and have Windows 2000 automatically install and configure the device and drivers; therefore, answer C is incorrect. The Device Manager will not assist in installing new hardware directly; therefore, answer D is incorrect.

A9:

Answers B and D are correct. The Event Viewer and Performance Monitor are applications that are available in Windows 2000 Server for monitoring your computer and network performance.

A10:

Answer A is correct. In Windows 2000, the PhysicalDisk object is enabled by default. Diskperf with the “y switch turns on the LogicalDisk object; the “n switch turns off all disk objects.

A11:

Answers A and C are correct. Choosing Enable Process Throttling on the Performance tab limits the performance impact of a Web site on the server. Selecting the Log Visits selection tracks user access to the Web site. Additional configuration settings are required to limit network usage by Web sites and restrict users access to files only on the local server. Therefore, answers B and D are incorrect.

A12:

Answer B is correct. Driver signing in Group Policy is configured in the Computer Configuration, Administrative Templates, System section of the Group Policy Object. The System applet in the Control Panel is used for configuring a local computer's driver signing restrictions; therefore, answer A is incorrect. Driver signing restrictions are configured in Group Policy in the User Configuration section; therefore, answers C and D are incorrect.

A13:

Answer B is correct. The Compatible template is used to set the security settings to be roughly equivalent to those of Windows NT 4.0. The default security template is used to restore the standard Windows 2000 security settings. The secure or high secure templates can be used to increase the security of a computer. Windows 2000 and Windows 98 computers can share files and folders across the network without the need to apply a security template.

A14:

Answer B is correct. In Windows 2000, although the PhysicalDisk object is enabled by default, the LogicalDisk object must be turned on manually. Diskperf with the “y switch turns on the LogicalDisk object; the “n switch turns off all disk objects.

A15:

Answer D is correct. Driver signing behavior for a local computer is configured from the System applet of the Control Panel. Mary must visit each computer to perform the configuration because she is not running an Active Directory network. The Computer Configuration, Administrative Templates, System section of Group Policy would be used if Mary were using an Active Directory domain, which she is not. Driver signing restrictions are configured in Group Policy in the User Configuration section; therefore, answers B and C are incorrect.

A16:

Answer B is correct. Encryption is only supported on NTFS 5, so any files copied to a floppy will be decrypted.

A17:

Answers A, B, C, and D are correct. NTFS provides many benefits, including disk quotas, auditing, file and folder security, and EFS encryption.

A18:

Answer B is correct. A differential backup backs up the files that have changed since the last normal backup, so the backup jobs get longer everyday. But it will always only take two tapes for a restore.

A19:

Answers A, B, and C are correct. The Routing and Remote Access service can perform routing duties for your private network, act as a VPN (Virtual Private Network) server, or act as an RAS (Remote Access Server).

A20:

Answers A and D are correct. Digitally signed drivers have been tested by the WHQL to ensure that they will perform satisfactorily in Windows 2000. The advantage to having high-quality drivers is that your Windows 2000 computer will run more smoothly with fewer system instability issues. You can get digitally signed drivers from the Windows Update Web site or on any Windows 2000 Setup CD-ROM; therefore, answer B is incorrect. Digitally signed drivers, like any other digitally signed file, cannot be tampered with without changing the hash, thus rendering the signature invalid; therefore, answer C is incorrect.

A21:

Answer B is correct. If your network is small and has no servers, you have no choice but to configure it as a workgroup. A domain requires that you have at least one server acting as a domain controller.

A22:

Answers B and C are correct. Because NTFS permissions take precedence over Share permissions, the user will not be granted Full Control over the folder. However, the Read & Execute permission allows the user to run programs within the folder and view the permissions for files in the folder. Changing ownership is only available with the Full Control permission, and deleting files is only available with Modify and Full Control. Therefore, answers A and D are incorrect.

A23:

Answer B is correct. Press the F8 key when you see the system boot menu.

A24:

Answer B is correct. You must replace the failed disk, re-create the striped volume, and restore the data to the new striped volume. Simply replacing the disk and re-creating the volume will not get your data back; therefore, answer A is incorrect. Replacing the disk without re-creating the striped volume before restoring the data will not solve this problem correctly; therefore, answer C is incorrect. Re-creating the striped volume cannot be done until the failed disk has been replaced ; therefore, answer D is incorrect.

A25:

Answers A and B are correct. From Device Manager, you can look at the icon to the left of the device name , and you can also open the Properties window for the device to see its present status.

A26:

Answer B is correct. NTFS compression and EFS encryption are mutually exclusive; therefore, if Christopher wants to use NTFS compression, he must disable EFS encryption. NTFS compression and EFS encryption can be configured on any Windows 2000 computer with NTFS 5.0 disks; therefore, answer A is incorrect. Membership in the Domain Admins group is not a requirement to enable NTFS compression; therefore, answer C is incorrect. There are no digital certificates required to use NTFS compression; therefore, answer D is incorrect.

A27:

Answers C and D are correct. Rick needs to configure two Group Policy Objects for his network. The first one should be applied to the OUs for the Administration and Support departments with the Block setting configured. The second one should be applied to the OUs for the Software and Hardware departments with the Warn setting configured. Applying the Ignore setting to all four OUs does not accomplish any of the desired results, but instead will allow all users to install unsigned drivers without any operating system intervention; therefore, answer A is incorrect. Applying the Block setting to all four OUs will prevent his technical users from being able to install drivers as required; therefore, answer B is incorrect.

A28:

Answer D is correct. All Safe modes start with the base video driver.

A29:

Answer D is correct. The best plan of action is to replace the adapter with one that is on the HCL. Although configuring the resources from Device Manager or the BIOS might work, it isn't supported.

A30:

Answer A is correct. Implementing a disk quota that limits users to 50MB of disk space will solve your problem; therefore, answers B, C, and D are incorrect.

A31:

Answers A, C, and D are correct. Service packs can include security patches and updates. The service packs contain the latest fixes and patches for your own system and for all other computers in the network running Windows 2000 Professional or Windows XP.

A32:

Answer B is correct. Windows 2000 disk quotas are based on uncompressed file size, thus the 15MB of space that Dorothy sees as free may actually be something such as 8 or 10MB of free space. That is not enough room to save her 13MB file; therefore, answers A, C, and D are incorrect.

A33:

Answers A, B, and C are correct. Unlike the Remote Administration mode, in Application server mode, by default, any authenticated user can access Terminal Services. Therefore, anyone in the Administrators, Users, or Power Users groups is the correct answer.

A34:

Answers B is correct. Roger can install the new device drivers from the Device Manager. To install the new drivers, he must right-click the device to be updated and select Properties. He then needs to switch to the Driver tab and click Update Driver. The System Information utility allows you to quickly determine many facts about your computer, but will not help you install an updated driver; therefore, answer A is incorrect. The Add/Remove Programs applet is used for installing programs and configuring Windows components , not for installing drivers; therefore, answer C is incorrect. The Services MMC snap-in is used to configure and control the services running on a computer not to install drivers; therefore, answer D is incorrect.

A35:

Answers B, C, and D are correct. The Security Policy settings for Audit logon events tracks failed logon attempts. Allowing Full Control to the Accounting group for the Accounting and Payroll shares gives members of that group complete access to the files and folders. Removing the Everyone group from the Security Management share ensures that only explicitly configured users or groups can access this share remotely. Because the server includes FAT and NTFS volumes, the only method for ensuring security is to limit local access to the server; however, the proposed solution does not include the Server Operators group; therefore, answer A is incorrect.

A36:

Answer D is correct. DNS is the default method of name resolution in Windows 2000, and is required for Active Directory.

A37:

Answer C is correct. In this case, the disk quotas have been disabled on the volume, allowing users to violate company hard disk space usage limits and use all free space on the hard disk.

A38:

Answers B and C are correct. Using the Device Manager, Austin will be able to gather information on all of the resources in use and available on his server. He will also be able to determine the status of each device in the system. The amount of memory installed in the server is not displayed in the Device Manager; therefore, answer A is incorrect. The size of the paging file is also not displayed in the Device Manager; therefore, answer D is incorrect.

A39:

Answer C is correct. Class A = 255.0.0.0, Class B = 255.255.0.0, Class C = 255.255.255.0

A40:

Answers B, C, and D are correct. By enabling disk quotas with no configured limit, you can easily monitor disk space usage from the Quota Entries window. You can drag the entries from this window into a spreadsheet application, such as Excel, for easy sorting and reporting. Manually examining each user's disk usage in Windows Explorer can get very time consuming; therefore, answer A is incorrect.

A41:

Answer C is correct. The troubleshooters are designed to help you find a solution to your computing and/or networking problem.

A42:

Answers C and D are correct. ICS can be configured using the RRAS setup Wizard, or manually by selecting the Sharing tab of the interface that is connected to the Internet. There are no Communications or ICS applets in the Control Panel; therefore, answers A and B are incorrect.

A43:

Answer D is correct. An incremental backup backs up the files that have changed since the last normal or incremental backup. This results in a short backup time, but it will require the normal tape plus all of the incremental tapes for a restore.

A44:

Answer B is correct. The most likely reason for Jeff not being able to create a RAID-5 array in this situation is that his disks are basic disks, not dynamic disks. Being a member of the Enterprise Admins group is not a requirement to create a RAID-5 array; therefore, answer A is incorrect. Dynamic disks are required to create RAID-5 arrays; therefore, answer C is incorrect. Jeff will not require a hardware RAID controller in his computer to create a RAID-5 array; therefore, answer D is incorrect.

A45:

Answer A is correct. Auditing is enabled from the Group Policy Editor. The Group Policy Editor is used to configure Group Policy Objects at various levels within Active Directory, such as the Domain or Organizational Unit level.

A46:

Answers B and C are correct. If the user account is set to allow, the access policy is ignored. If the account is set to use the policy, the policy setting is used.

A47:

Answer C is correct. Active Directory intra-site synchronization is configured automatically by the File Replication Service. The other functions can be handled by FRS, but must be configured manually.

A48:

Answer C is correct. When the Highly Secure templates are applied to a server or workstation, they can no longer communicate with downlevel clients because they use encryption for all communications.

A49:

Answers A, C, and D are correct. System State data includes critical information about a computer, such as the Registry, the Active Directory database, and the boot files. User documents are not included in the system state backup; therefore, answer B is incorrect.

A50:

Answer D is correct. Non “Plug and Play hardware must be added via the Add/Remove Hardware applet of the Control Panel. All drivers to be installed should be Windows 2000 compliant. The Device Manager will not assist in installing new hardware directly; therefore, answer A is incorrect. The Phone and Modem Options applet in the Control Panel can be used to configure dialing rules and modem settings after a modem has been successfully installed; therefore, answer B is incorrect. Only Plug and Play hardware can be installed physically and have Windows 2000 automatically install and configure the device and drivers; therefore, answer C is incorrect.

A51:

Answer A is correct. The /h switch is used when you are working with a folder that contains hidden or system files.

A52:

Answers A and B are correct. To use ICS, you must have a computer with two network connections (one of which must be an Ethernet adapter) that has an active connection to the Internet. You cannot have a DNS or DHCP server on your network while using ICS because ICS performs these functions for its clients; therefore, answers C and D are incorrect.

A53:

Answer B is correct. A System State backup backs up only critical operating system files, such as the Registry and the Active Directory database. Therefore, answers A, C, and D are incorrect.

A54:

Answers A and D are correct. You can use the Setup Wizard on the Windows 2000 Server CD-ROM to create the answer file automatically, or you can create the file manually by opening a text editor and entering the script code.

A55:

Answers A and B are correct. The supported methods of data recovery are to restore the encrypted file to a computer containing the DRA certificate and perform decryption, or to export the DRA certificate to the location of the encrypted file and perform decryption.

A56:

Answers A and D are correct. The Recovery console can be started via the Windows 2000 setup procedure that is available from the disks and the CD-ROM.

A57:

Answer C is correct. You can install the Recovery Console by using the winnt32 /cmdcons command after Windows 2000 has been installed.

A58:

Answer B is correct. The compact command is used to manage NTFS file and folder compression from the command line; therefore, answers A, C, and D are incorrect.

A59:

Answer B is correct. You must be running Windows 2000 in an Active Directory domain environment to create an Enterprise CA.

A60:

Answer C is correct. Standalone Dfs servers are limited to one level of Dfs links. All other answers are incorrect.



MCSE Windows 2000 Server Exam Cram2 (Exam 70-215)
MCSE Windows 2000 Server Exam Cram 2 (Exam Cram 70-215)
ISBN: 0789728737
EAN: 2147483647
Year: 2003
Pages: 155

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net