40. You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary applications on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?
A. Set the permissions on the application to execute.
B. Add the application to the urn key in the registry.
C. Apply the Securews.inf security template on the users’ computers.
D. Apply the Compatws.inf security template on the users’ computers.
Answer: D
Explanation: The Compatws.inf template relaxes access controls for the Users group and is therefore well suited for Windows 2000 clients that need compatibility with older applications.
Incorrect answers:
A: The file permissions of the application file cannot be the problem since the application worked before the upgrade and the upgrade process does not change any file permissions on applications.
B: There is no urn key in the registry to which applications can be added.
C: The Securews.inf template would put even more restriction on the users. It would not help the user’s to run their application.
41. You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer. You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?
A. Rename Mark’s user account to Eric and change the account password.
B. Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.
C. Create Eric’s account by copying Marks account. Delete Mark’s account.
D. Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.
Answer: A
Explanation: A user account and the permission and rights attached to them can easily be transferred to another user by renaming the account and changing the password. By renaming Mark’s user account and by changing the password, Eric will have the same rights and permissions as Mark had and Mark will not be able to use his old account. This provides the solution with least administrative effort.
Incorrect Answers:
B: Copying Mark’s profile to Eric’s account will not give Eric the permissions Mark had. Instead Eric will have the same desktop and hardware profile.
C: Every user account has a unique Security Identifier (SID). When Mark’s account is copied the resulting account, Eric’s account, will not have the same permissions.
D: This solution will meet the requirements of this scenario, however, it is not the solution with the least administrative effort. Therefore this is not the best solution. The best solution would be to rename Marks account and change the password. This would provide Eric with the same rights and permission that Mark had and would not require us to do any additional administrative work on Eric’s account.
42. Your Windows 2000 Professional computer belongs to the contoso.com domain. You need to encrypt a compressed file named c:\data. You successfully encrypt the file but discover that it is not longer
compressed. What is the most likely cause of this problem?
A. A group policy is preventing the compression of encrypted files.
B. The file is stored on a FAT32 partition.
C. Only members of the administrators and the power users groups can compress and encrypt files.
D. Encrypted files cannot be compressed.
Answer: D
Explanation: A compressed file cannot be encrypted and an encrypted file cannot be compressed. If we encrypt a compressed file, the file will first be uncompressed and then encrypted. It will no longer be compressed and neither will we be able to compress it once it has been encrypted.
Incorrect answers:
A: There is no Group Policy that prevents compression of encrypted files. A file can either be encrypted or compressed, but not both.
B: The FAT32 file system does not support compression or encryption.
C: Any user with appropriate file permissions, and not only administrators or power users, are able to compress and encrypt files.
43. You are the administrator of your company’s network. The dial-up server on your network is configured to support certificate authentication. A user names Tom wants to use smart card authentication on his Windows 2000 Professional portable computer. You verify that the Toms computer has a PC card smart card reader and the appropriate
driver installed. You give to Tom a smart card to use. What else should you do to enable smart card authentication on Tom’s computer?
A. Configure a dial-up connection to use EAP. Select the smart card device for authentication.
B. Configure a dial-up connection to use SPAP. Select the smart card device for authentication.
C. Configure a dial-up connection to use certificate authentication. Enable the users credentials for authentication.
D. Configure a dial-up connection to connect to a private network through the Internet. Enable L2TP to create a virtual private network (VPN) tunnel.
Answer: A
Explanation: Extensible Authentication Protocol (EAP) is an extension to PPP and works with dial-in, PPP and L2TP clients. The authentication methods used by EAP include smart cards.
Incorrect answers:
B: SPAP cannot be used for smart card authentication. Only EAP can be used for smart card authentication.
C: Only EAP, and not other certificate authentication methods, can be used for smart card authentication.
D: To be able to create a VPN tunnel the dial-up server must be configured for L2TP server. This has not been done in the scenario and is therefore inappropriate.
44. You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.
After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications. What should you do?
A. Add each user account to the Power Users group on that user’s computer.
B. Configure the financial and credit applications to run as services on the computers in the accounting department.
C. Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.
D. Use the computer management console to configure separate memory spaces for each financial and credit application on the accounting department computers.
Answer: C
Explanation: The Compatws.inf template relaxes access controls for the Users group and is therefore well suited for Windows 2000 clients that need compatibility with older applications.
Incorrect Answers:
A: Adding each user account to the Power Users group might allow them to use the application but this will give the user accounts too much administrative rights. This is therefore not a good solution.
B: Applications cannot, in general, be configured to run as services. Only services can log as services.
D: The computer management console cannot be used to configure memory spaces for applications.
45. You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in research department. The computer contains highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?
A. Use security configuration and analysis to import the Hisecws.inf security template file to modify the default security settings.
B. Use security templates to create a security template file and import the security settings to modify the default security settings.
C. Use the local computer policy to disable the access this computer from the network option.
D. Use Secedit.exe to reconfigure the computer default security settings to not allow anonymous access to the computer.
Answer: A
Explanation: The Hisecws.inf, the highly secure template, is used to require maximum protection for network traffic and protocols used between computers running Windows 2000. As a result, such computers configured with a highly secure template can only communicate with other Windows 2000 computers. They will not be able to communicate with computers running Windows 95, Windows 98, or Windows NT.
Incorrect answers:
B: It is possible to make the appropriate changes to the security template manually but this is a daunting administrative task. It would be easier to use a predefined security template.
C: The Windows 2000 computers must be able to access each other. We therefore cannot disconnect the local computer form the network.
D: Anonymous access is not handled by the security settings. It is handled by enabling or disabling the Guest account, and by giving or restricting permissions to the Everyone group. Disabling anonymous access, by disabling the Guest account and removing permissions from the Everyone group, would differentiate between Windows 2000 computers and downlevel Windows systems.
51. You need to install Windows 2000 Professional on 35 new computers on the company LAN. First, you create a distribution folder on the network server. Then you create a network boot disk to install Windows 2000 Professional from the distribution folder. Now you need to create a batch file, which the network boot disk will execute to start the installation. You must specify a source path and temporary drive for the installation files. You also need to install the accessibility options within the batch file. The batch file must execute a
hardware-specific application to run after the GUI-mode Setup has completed.
Which command must you specify in the batch file?
A. Z:\i386\winnt/s:z:\i386/t:d/a/e:z:\hardware\setup.exe
B. Z:\i386\winnt/s:z:\i386/rwinnt.tmp/a/e:z:\hardware\setup.exe
C. Z:\i386\winnt32/s:z:\i386/tempdrive:d/cmd:z\hardware\setup.exe
D. Z:\i386\winnt32/s:z:\i386/cmdcons:z:\hardware\setup/makelocalsource
Answer: A
Explanation: Winnt must be used to start the installation process from a boot diskette. The /t:d switch specifies that the D drive should be used to contain temporary setup files; the /a switch specifies an installation with accessibility options; and the /e[:command] switch specifies a command to be executed at the end of Setup’s
GUI mode.
Incorrect answers:
B: This command does not specify the drive should be used to contain temporary setup files. To specify a temp drive the /t switch must be used. The /r switch specifies an optional folder that must be installed on the hard drive.
C: Winnt32 is a 32-bit application and can only be used from inside a Windows environment and not after starting the computer by means of a boot diskette. A computer can only be booted into DOS mode from a boot disk, and DOS mode cannot use 32-bit applications.
D: Winnt32 is a 32-bit application and can only be used from inside a Windows environment and not after starting the computer by means of a boot diskette. A computer can only be booted into DOS mode from
a boot disk, and DOS mode cannot use 32-bit applications.
46. You are creating a shared Internet connection on your Windows 2000 Professional computer. You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet. What should you do? (Choose all that apply)
A. Configure your shared Internet connection to disable LCP extensions.
B. Configure your shared Internet connection to disable on-demand dialing.
C. Create an Internet connection sharing application type for HTTP to use remote server for port 25.
D. Create an Internet connection sharing application type for HTTP to use remote servers port 80.
E. Create the Internet connection sharing application type for FTP to use remote server port 21.
F. Create an Internet connection sharing application type for FTP to use remote server port 72.
Answer: D, E
Explanation: HTTP traffic uses TCP port 80 and FTP traffic uses TCP port 21 for session control and port 20 for data transfer. Therefore, by enabling TCP port 80 and TCP port 21 only HTTP and FTP traffic will be allowed. All other network traffic will not be allowed.
Incorrect answers:
A: LCP extensions are used in the context of RRAS and PPP. It is not used to prevent or allow any specific type of network traffic.
B: Disabling on-demand dialing on the shared Internet connection will not prevent network traffic. It will only prevent ICS clients to initiate an Internet connection.
C: HTTP uses TCP port 80, not TCP port 25. FTP also does not use TCP port 25. It uses TCP ports 20
answer 21. SMTP uses TCP port 25.
F: Neither FTP or HTTP uses port 72.
47. You have implemented the Hisecws.inf security template on all the Windows 2000 Professional client computers in your network.
A user has received a driver and utility software for an internal SCSI controller in his computer. He uses the manufacturer-provided CD to install the driver and the utility. He restarts the computers and reports that the internal SCSI controller is not working correctly. You discover that the driver is not installed correctly. What should you do?
A. Disable the security template. Reconfigure the driver signing option. Install the driver. Enable the security template
B. Reconfigure the driver signing option. Disable the security template. Install the driver. Enable the security template.
C. Run the Sigverif command. Reconfigure the driver signing option. Install the driver
D. Run the Sigverif command. Disable the security template. Install the driver. Enable the security template
E. Run the Sfc/cancel command. Install the driver. Run the Sfc/enable command
Answer: A
Explanation: To reinstall the correct drivers, the security template must first be disabled. This will allow us to alter the driver signings policy, which we would reconfigure to either Ignore or Warn. This allows us to install the unsigned the drivers. Once the correct drivers have been installed we must reapply the security template.
Incorrect answers:
B: The Hisecws.inf template does not allow any reconfiguration of the driver signing option. The security template must be disabled before the driver signing option is reconfigured.
C: Sigverif cannot be used to configure the driver signing option. The File Signature Verification utility (Sigverif) is used to find unsigned device drivers. Sigverif allows us to view the file's name, its location, its modification date, its type, and its version number.
D: Sigverif cannot be used to disable the security template. The File Signature Verification utility (Sigverif) is used to find unsigned device drivers. Sigverif allows us to view the file's name, its location, its modification date, its type, and its version number
48. You want to prevent a Windows 2000 Professional computer named Payroll5 from communicating on your network with Windows NT 4.0, Windows 95, and Windows 98 computers. You want to enable the
payroll5 computer to communicate on your network with other Windows 2000 computers only. What should you do?
A. Close all NetBIOS ports in the advanced TCP/IP options of Payroll5.
B. Import the Hisecws.inf security template to payroll5.
C. Disable access this computer from network in the local security policy settings for payroll5.
D. Clear all WINS client settings on payroll5.
Answer: B
Explanation: The Hisecws.inf is the security template that requires highest level of security and the maximum protection for network traffic and protocols used between computers running Windows 2000. As a result, computers configured with a highly secure template can only communicate with other Windows 2000 computers. They will not be able to communicate with computers running Windows 95, Windows 98, or
Windows NT.
Incorrect Answers:
A: Closing NetBIOS ports will affect Windows 2000 and downlevel Windows clients similarly. In other words it will affect the ability of all other computers to communicate with the computer.
C: Disabling the “Access this computer from network” setting would prevent all other computers, including Windows 2000 computers, from accessing the computer through the network.
D: Clearing the WINS client settings on payroll5 will not prevent Windows 95, Windows 98 or Windows NT computers from communicating with payroll5.
49. You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install
programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.
What should you do to accomplish these goals? (Choose all that apply)
A. Add Maria’s user account to the system group.
B. Add Maria’s user account to the interactive group.
C. Add Maria’s user account to the power user group.
D. Add Maria’s user account to the administrators group.
E. Add Maria’s user account to the Backup Operators group.
Answer: C, E
Explanation: By adding Maria’s user account to the power user group Maria will inherit the ability to share resources and install programs that are conferred on members of the power user group. To grant Maria the ability to backup files she must be added to the Backup Operators group, which has the permissions to backup files. As a member of this group Maria will be able to backup files as she will inherit those rights by virtue of being a member of that group. Maria will not have permissions to read the users’ files as neither the power user
group nor the Backup Operators group has the permissions to read other users’ files.
Incorrect Answers:
A: The system group is a collection of the built-in groups. System groups do not have specific memberships that can be modified. We cannot thus add users to system groups.
B: The interactive group is a built-in group, which includes the user account of the user who is currently logged on to the computer. User accounts cannot be added to this built-in group.
D: Adding Maria’s user account to the administrators group would give her too much permissions and rights. She would be able to perform all the required functions but she will also be able to read other
users’ files.
50. A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is
located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties.
What should you do to enable the user to encrypt the folder?
A. Log on to her computer as an administrator, and then run the cipher/e command.
B. Instruct the user to run the chipper/e command.
C. Log on to her computer as an administrator, and then run the Secedit/enforce command.
D. Instruct the user to run the Secedit/enforce command.
E. Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.
Answer: E
Explanation: Any ordinary user should be able to encrypt files as long as they have the appropriate permission to the files and the folder and as long as the file system supports file encryption. The only file system that supports file encryption is the NTFS file system. If this file system is not in use, the option to encrypt files will
not be shown. As no option for file encryption can be found, we can assume that the disk uses the FAT or FAT32 file system. This would need to be converted to NTFS to support file encryption. We would need to log on as an administrator and run Convert d:/FS:NTFS in the command prompt, which can be called by clicking on the start button, clicking on Run and the typing cmd in the dialog box. This allows us to convert the drive to the NTFS file system without affecting the data on the drive. We however cannot convert a drive back to FAT or
FAT32.
Incorrect answers:
A: Any user who has access to a file can encrypt the file. We therefore do not require administrative privileges to encrypt the file and thus we do not need to log on with the Administrator account.
B: Windows 2000 does not support a chipper command. It does support a cipher command. The Cipher /e command would encrypt files on an NTFS partition.
C: Secedit is used to apply security templates. The secedit command does not have a /enforce switch.
D: Secedit is used to apply security templates. The secedit command does not have a /enforce switch.
51. Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol. You need to connect the computers in the marketing department to the network.
What must you do?
A. Configure the NWLink frame type of the network adapters to be ethernet 802.3.
B. Configure the NWLink frame type of the network adapters to be ethernet II.
C. Replace the network adapters with 10/100 BNC adapters.
D. Replace the network adapters with 10/100 UTP network adapters.
Answer: D.
Explanation: The hubs, switches and other network devices have been upgraded to 100Mbps. It thus seems likely that the 20 computers with network connection problems in this scenario are using 10Mbps network
adapters. These need to be upgraded to 100Mbit or to 10/100Mbit network adapters. Since the network is a category 5 Ethernet network the network adapters must also support UTP.
Incorrect answers:
A: The computers were working properly before the upgrade. The NWLink protocol can be used in 100Mbps network without any problems. Therefore changing the frame type will not solve the problem.
B: The computers were working properly before the upgrade. The NWLink protocol can be used in 100Mbps network without any problems. Therefore changing the frame type will not solve the problem.
C: A category 5 network uses UTP cabling not thinnet BNC connectors.
52. Your Windows 2000 Professional computer has a single Pentium II 400-Mhz processor, 64 MB of RAM, and E-IDE hard disk. You use your computer to design graphics ads for web sites and newspapers.
When you are working on multiple ads simultaneously, you notice that your computer responds very slowly. You are also experiencing long delays when loading color palettes and importing graphics.
You use system monitor to view your system performance as shown in the exhibit. . You want to improve the performance of your computer based on the performance results. What should
you do?
A. Increase the physical RAM in the computer to 128 MB.
B. Increase the processor priority level for your development application.
C. Add a second Pentium II 400-MHz processor.
D. Upgrade the hard disk to a SCSI-based hard disk.
Answer: C
Explanation: The Processor: %Processor Time counter measures the time a processor takes to execute a nonidle thread. A Processor: %Processor Time count that is above 80% for extended periods of time indicates that the CPU is unable to handle the load placed on it and is the cause of a system bottleneck. The exhibit in this scenario shows that the Processor: %Processor Time counter is close to 100% most of the time and should upgraded. Replacing the processor with a fast one or adding a second processor, as is suggested here, will improve system performance.
Incorrect answers:
A: The Memory: Pages/sec counter is used to measure memory usage. In the exhibit this is represented by the green line and is well within acceptable limits. Insufficient RAM is therefore not the primary
problem in this scenario, the processor performance is.
B: The processor is at its limit. Giving the application higher priority won’t enable the processor to work any harder than it already is. The processor needs to be upgraded or an additional processor added to the system.
D: The Physical Disk: Ave. Disk Queue Length counter is used to measure hard disk performance. In the exhibit this is represented by the blue line and is well within acceptable limits. The primary problem in
this scenario is the processor performance not the disk subsystem.
53. You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network.
What should you do? (Chose two)
A. Use Windows Explorer to enable offline files.
B. Use Windows Explorer to create shortcut to access offline files folder as desktop.
C. Use Windows Explorer to configure the properties of your home folder to be available offline.
D. Use synchronization manager to configure your home folder to be available offline.
E. Create a shortcut in my network places to access your home folder.
Answer: A, C
Explanation: To ensure that we can access all of our files in our My Documents folder when we are not connected to the network, we must enable caching at the server by using Windows Explorer. At the client computer we must connect to a network share and configure it to be available for off-line access.
Incorrect answers:
B: Shortcuts cannot be used to access offline files and folders.
D: The synchronization manager is used to manage synchronization not to configure folders to be available offline.
E: Creating a shortcut to your home folder will not make it available offline.
54. Your Windows 2000 Professional computer has 64 MB of RAM and two hard disk drives, drive C and drive D. Each hard disk has more than 500 MB of free disk space. Windows 2000 Professional is installed
on drive C. You frequently run two or more memory-intensive graphics applications simultaneously. You notice that access to drive C is much slower when you are using the graphic applications. You want to maximize disk performance. What should you do?
A. Configure the paging file on drive C to set the initial size of the virtual memory and a maximum size of the virtual memory to the 64 MB.
B. Configure the paging file on drive C to set the initial size of the virtual memory and a maximum size of the virtual memory to the 128 MB.
C. Move the paging file from drive C to drive D to set the initial size of virtual memory and the maximum size of virtual memory to 256 MB.
D. Move the paging file from drive C to drive D. Set the initial size of virtual memory to 56 MB and maximum size of virtual memory to 256 MB.
Answer: C.
Explanation: If possible, the paging file should be placed on a different physical disk than the operating system. In this scenario the paging file should be placed on the D drive. The default size of a paging file is 1.5 times available RAM, in this scenario it should be 96MB. Sometimes it is beneficial to increase the default page
size, for example when using resource intensive applications.
Incorrect Answers:
A: The paging file should be placed on a different physical disk than the operating system. In this scenario the paging file should be placed on the D drive.
B: The paging file should be placed on a different physical disk than the operating system. In this scenario the paging file should be placed on the D drive.
D: The initial size of the paging file is incorrect as it should be 1.5 times the size of the available RAM. As the amount of RAM is 64 MB in this scenario, the paging file should be 96MB.
55.You are the administrator of your company’s network. You use your Windows 2000 Professional computer to transfer 20 large files. Each file is 100 MB in size. You want to copy the files from the UNIX
server in your branch office to a computer running Microsoft SQL server at the main office. When you copy the files by using Windows Explorer, the connection appears to time out and the file copy
is aborted. You suspect that you encountering a TCP/IP performance problem. Your network connection is shown in the Xircom LAN Properties dialog box in the exhibit.
You want to monitor the performance of TCP/IP on your computer. What should you do?
A. Install the network monitor agent. Use the performance console to view all the counters for the TCP object.
B. Install the network monitor agent. Use the performance console to view the fragmented datagrams/sec counter.
C. Install SNMP. Use the performance console to view all the counters for the TCP object.
D. Install simple TCP/IP services. Use the performance console to view the fragmentation failures counter.
Answer: C
Explanation: By installing Simple Network Management Protocol (SNMP) many new performance counters will be available. The counters for the TCP object can be used to monitor TCP/IP performance problems.
Incorrect answers:
A: SNMP, not network monitor, will install the counters for the TCP object. However, network monitor can be used to measure TCP/IP performance.
B: SNMP, not network monitor, will install the counters for the TCP object. However, network monitor can be used to measure TCP/IP performance.
D: Simple TCP/IP services includes DayTime, Echo, Quote of the Day, Discard and Character Generator. It is not used to install counters or to monitor the system.
109.You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a 400- Mhz Pentium III, and has 128 MB of RAM and a 10-GB hard disk. You are performing the installation
by using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates that your computer is
infected with a Master Boot Record virus.
What should you do before you continue the installation?
A. Remove the virus checker in Windows 98.
B. Disable the BIOS virus checker and restart the computer.
C. Run Fixmbr.Exe from the Windows 20000 Professional CD-ROM.
D. Modify the Boot.ini file to include a signature parameter on the ARC path of the system partition.
Answer: B
Explanation: During the installation of Windows 2000, the setup program must make changes the boot sector. The BIOS virus checker interprets changes made to the boot sector as the result of a virus and prevents the computer from booting any further. We must therefore disable the BIOS virus checker.
Incorrect answers:
A: Removing the virus checker in Windows 98 before starting the upgrade process could increase the performance of the upgrade. However, it is the BIOS virus checker on the computer that is indicating
that the computer has a Master Boot Record virus. In this case the BIOS virus is the problem though.
C: We can fix a faulty master boot sector record by starting the Recovery Console and using the Fixmbr command. However, the master boot sector has not been corrupted in this scenario. The BIOS virus
checker has mistakenly detected a possible virus.
D: The Boot.ini points to the correct boot partitions on a dual boot system. It does not indicate a boot sectorvirus warning. The BIOS virus checker has mistakenly detected a boot sector virus and has generated
the warning.
56.You are installing Windows 2000 Professional on a computer named client2. The network is configured as shown in the exhibit. .
Your network uses TCP/IP as the only network protocol. You configure Client2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.13.1, and a WINS Server address of 10.10.13.10. ServerB is configured with TCP/IP. ServerB is the network WINS server.
You cannot connect to shared resources on ServerB and ServerC by using UNC names. You want Client2 to be able to connect to ServerB and ServerC.
What should you do?
A. Configure Client2 to use a default gateway of 10.10.20.1.
B. Configure Client2 to use a TCP/IP address of 10.10.13.234.
C. Install a WINS server on the same segment as Client2.
D. Install and configure a DNS server, and configure Client2 to use the DNS server service.
Answer: A
Explanation: The exhibit indicates that Client2 has an incorrect default gateway setting, the gateway setting should be 10.10.13.1 and not 10.10.20.1 as can be seen in the exhibit.
Incorrect answers:
B: There is no need to change the TCP/IP address of Client2. This will not enable Client2 to connect to ServerB. We should instead configure Client2 with the correct the default gateway.
C: It is not necessary to install a WINS server on the same segment as Client2. Client2 would be able to reach the WINS server on the other segment if the default gateway setting was configured correctly.
Furthermore, adding a WINS server to the segment that Client2 is on will not enable Client2 to connect to ServerB.
D: Client2 is already configured for WINS therefore DNS is not required as WINS and DNS are both responsible for name resolution. And both can be used by Windows 2000 Professional.
57.You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company's network and is not accessible from the internet.
Your company's network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company's VPN
server. After the connection is successfully established, you run the net view\\server1 command and receive the following error ‘the server is inaccessible or could not be found?
You need to access the shared files on server 1. What should you do?
A. Stop and then start the TCP/IP NetBIOS helper service on your computer.
B. Stop and then start the DNS client service on your computer.
C. Add a HOSTS entry for server1 to your computer.
D. Add a LMHOSTS entry for server1 to your computer.
Answer: D
Explanation: By adding a LMHOST entry for server1 the home computer will be able to access the Server by
using its NetBIOS name.
Incorrect answers:
A: Stopping and starting the TCP/IP NetBIOS service will not solve the problem in this scenario.
B: The name Server1 is a NetBIOS name not a DNS name. Therefore, stopping and then restarting the DNS client service will not solve the problem in this scenario.
C: HOST files map DNS entries, but Server1 is not a DNS name it is a NetBIOS name. Therefore we do not require HOST entries for Server1 on our computer.
58.You need to install Windows 2000 Professional on 35 new computers on your company's network. You also need to install the Recovery Console during the installation. You create a distribution folder and copy the Windows 2000 Professional support folder to the network
server. Then you create a network boot floppy disk to install Windows 2000 Professional from the distribution folder. You need to create a batch file, which the network boot disk will execute to start the installation. Which command must you specify in the batch file?
A. Winnt32 /cmd:z:\i386\winnt/a
B. Winnt32/cmd:z:\support\tools\setup.exe
C. Winnt/e:z:\i386\winnt/cmdcons
D. Winnt/e:z:\support\tools\setup.exe
Answer: C
Explanation: The installation of Windows 2000 comprises of stages. The first stage is the Setup Program, which runs in text mode. During this stage the hard drive is checked and prepared for the installation and the files required for the Setup Wizard are copied to the hard drive. This stage ends with a reboot and is followed by the Setup Wizard, the second stage, which runs in graphical mode. Windows Networking is installed during the third phase and ends with another reboot. This is followed by the final phase, which completes the Setup by installing the start menu items and the registry components; saving the configuration, removing temporary setup files and rebooting the system.
The switch /e specify that the Windows 2000 Setup program must run a command after the final stage of the installation of Windows 2000 is finished. The parameter winnt/cmdcons specifies that the command must install the Recovery Console onto the hard drive.
Incorrect answers:
A: As the boot floppy operates in dos mode, we cannot use 32 bit applications such as Winnt32.
Furthermore, Winnt32 does not support a /cmd switch.
B: As the boot floppy operates in dos mode, we cannot use 32 bit applications such as Winnt32.
Furthermore, Winnt32 does not support a /cmd switch. The setup path specified in this parameter points to the Windows 2000 Support Tools that are intended for use in diagnosing and resolving Windows
2000 computer problems. The installation files for the Recovery Console are located in the i386 folder on the Windows 2000 Professional CD and is initiated by specifying the /cmdcons switch with the winnt.exe command. It is not necessary to include the .exe file extension in the command, as Windows will check for an executable file with the name winnt.
D: The setup path specified in this parameter points to the Windows 2000 Support Tools that are intended for use in diagnosing and resolving Windows 2000 computer problems. The installation files for the
Recovery Console are located in the i386 folder on the Windows 2000 Professional CD and is initiated by specifying the /cmdcons switch with the winnt.exe command. It is not necessary to include the .exe file extension in the command, as Windows will check for an executable file with the name winnt.
59.You are the administrator of your company’s network. You want to deploy a Windows 2000 Professional service pack to 10 computers in the developmental Organizational Unit. You create a Windows 2000 installer package file for the service pack. You use the package files to
successfully install the service pack to other computers in the domain. You assign the package file to the development Organizational Unit. After the installation you notice that the service pack was not installed on any of the 10 computers. You want to ensure that the service pack is successfully installed on the computers in the development Organizational Unit. What should you do?
A. Use computer management to start the Windows installer service on all the computers in the Development Organizational Unit
B. Use the local administrator account to log on to the computers in the Development Organizational Unit. Then redeploy the service pack to the computer in the Development Organizational Unit.
C. Run Windows installer to repair the package file. Then redeploy the service pack to the computers in the Development Organizational Unit.
D. Add the user accounts from the Development Organizational Unit to a DACL. Grant the user accounts read permission to the service pack deployment directory.
Answer: D
Explanation: Before users can access resources on Windows 2000, they must be assigned the appropriate permissions to those resources. In this scenario the user from the Development OU needs to be assigned read permission to the deployment directory, which is an object, to be able to start the installation process. Objects, such as the deployment directory, use a DACL (discretionary access control list) to check whether users or groups have been allowed or denied permissions to the object that they are attempting to access. Therefore, the
user accounts of the Development OU must be added to a DACL.
Incorrect answers:
A: This is not the most likely problem. The most likely problem is that the user account does not have appropriate permissions on the service pack deployment directory.
B: Assigned software does not need to be installed with any special user account. There is thus no need to log on with the local administrator account.
C: As the package was installed successfully on other computers in the domain, the problem does not lie with the installation package. Instead it lies with the Development OU’s lack of the appropriate permissions to access the deployment directory.
60.You are preparing to install Windows 2000 Professional on 75 new computers. You want to create a Standard installation image to use on all the new computers. The computers have several different configurations of hard disks and hardware components. You install Windows 2000 Professional and other standard software on one of the computers. You log on to the computer using the local administrator account. You configure the standard applications and customize the desktop settings you intend to deploy. You run the setup manager and create a Sysprep.inf file. You copy Sysprep.exe and Setupcl.exe to the
C:\Sysprep folder. You run Sysprep.exe and run your third party disk imaging software. You copy the image to the several test computers and restart the computers. When the installation is complete, you find that some of the computers do not function at all. You also find that the desktop settings do not appear as you have configured them on the original computer. You want to correct the imaging process and ensure that all computers have the same standard desktop.
What should you do? (CHOOSE TWO)
A. Copy sysprep.inf to C:\sysprep folder.
B. Copy the administrator profile to default user profile, then grant permissions to the Everyone group to use the profile.
C. Include the -pnp parameter for sysprep.exe when you rerun that utility.
D. Include the -nosidgen parameter for sysprep.exe when you rerun that utility.
Answer: B, C
Explanation:
B: A user profile is automatically created and maintains the desktop configuration for each user's desktop on the local Windows 2000 computer. This user profile is created when the user logs on to a computer for the first time. An administrator profile, which maintains the administrators desktop configuration is created during the Windows 2000 Professional installation. In this scenario the administrator profile, must be copied and used as the Default User profile, which is applied to all users. As all users are automatically placed in the Everyone user group, the Everyone user group must be granted permission to access this profile.
C: Because the computers that Windows 2000 Professional will be installed onto have different hardware configurations, a full plug and play detection must be done during the installation process. This can be accomplished by including the -pnp parameter to the sysprep.exe utility, as this parameter causes the plug and play detection utility to be used.
Incorrect answers:
A: When the installation is complete, you find that some of the computers do not function at all and that the desktop settings do not appear as they have been configured on the original computer. This indicates that the sysprep installation was done on some of the computers. Therefore there is no need to copy the sysprep.inf file to the C:\Sysprep folder. Had it been required, the installation of all the computers also would have failed.
D: The -nosidgen is only used on the initial computer where the clone image was made. It instructs the installation program not to generate the system information that is unique to each installation of
Windows 2000 Professional. This parameter is not used here during the installation of Windows 2000Professional on the target computers. It is therefore not relevant to this scenario.
61.You install Windows 2000 Professional on 10 computers that have Video Capture Cards installed. A user named Lilly reports that her video capture card is not functioning correctly. She wants to use her video capturing software to capture video frames, but she cannot view the video output. You use the Device Manager to view the hardware settings on Lilly’s Computer as shown in the exhibit.
You want Lilly to be able to capture the video frames by using the video capture card. What should you do?
A. Use system in control panel to enable the device.
B. Use Device Manager to update the driver for the device.
C. Move the video capture card to a different PCI slot
D. Uninstall the device and disable plug and play detection for the device
Answer: B
Explanation: Windows has detected the device (the device with the ? in the exhibit) but the correct device driver has not been installed. The Device Manager can be used to install the correct device driver.
Incorrect answers:
A: The device has already been enabled. However, Windows 2000 requires the correct driver for the device. The wrong driver is currently installed.
C: Moving the device to another PCI slot will not solve the problem in this scenario. The device has already been installed however, Windows 2000 requires the correct driver for the device. The wrong driver is currently installed.
D: If you disable Plug and Play the system will not be able to find new devices.