Dump of perfection Test

  • Thread starter Chris & Ara Duke
  • Start date
C

Chris & Ara Duke

1. You are an administrator of your company's network. You want to perform
routine upgrades on your Windows 2000 Server computer. You use your non
administrator user account in the domain to log on to the server. You want
to update all of the critical system files and patches on the server in the
shortest possible time.

What should you do?

A. Run Windows Update.
B. Run System File Checker.
C. Log on as an Administrator and run Windows Update.
D. Log on as an Administrator and run System File Checker.


Answer: C


2. You are the network administrator for your company. The company has
numerous branch offices, and each office uses Internet Connecting Sharing to
connect to the Internet.

A new employee named David Johnson is configuring a Windows 2000 Server
computer as a file server. When David uses Windows update for the first time
and selects Product Update, he receives an error message stating that access
is denied.

David needs to be able to update the files by using his account. What should
you do?

A. Configure the settings for Internet Connecting Sharing to allow POP3
access.
B. Configure the settings for Internet Connecting Sharing to allow SMTP
access.
C. Give David's user account administrator privileges on the Windows 2000
Server computer.
D. Instruct David to log on as a domain administrator on the Windows 2000
Server computer.


Answer: C


3. You install a second modem on a Windows 2000 Server computer configured
with Routing and Remote Access. Dial-in users report that they are unable to
connect to the server by using this new modem.

What can you do to help find out the cause of the problem? (Choose Three.)

A. Use the Diagnostics tab in Phone and Modem Options in Control Panel to
query the modem.
B. Use device Manager to identify any port resource conflicts.
C. Use the Routing and Remote Access snap-in to find out whether the ports
for both modems are operational.
D. From a command prompt, run the Net Config Server command.
E. From a command prompt, run the Net Statistics command.
F. Use Regedit32 to view the Error Control value in the
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess Key.


Answer: A,B,C


4. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem
configured to use IRQ 5. You add a PCI modem and restart the computer.
Device Manager reports an IRQ conflict between the two modems. Both modems
are trying to use IRQ 5.

You want to resolve the problem. What should you do?

A. Use Device Manager to change the IRQ for the original modem to IRQ 9.
B. Use Device Manager to change the IRQ for the original modem to IRQ 10.
C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and
Play devices.
D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and
Play devices.


Answer: C


5. You are the administrator of the contoso.local domain. You organize the
domain into organizational units (OUs) as shown in the exhibit.
(Exhibit)


<img src="./70-215/images/Q23.gif">

You configure the Local Security Options and other settings for the Default
Domain Policy object. You delegate administration of the Michigan and
Florida OUs. You want to prevent those administrators from creating any
other Group Policy objects (GPOs) with settings that conflict with those you
configured.

What should you do?

A. From the Group Policy options for the contoso.local domain, set the
option not to override.
B. From the Group Policy options for the Michigan and Florida OUs, set the
option not to override.
C. Block Group Policy inheritance for the contoso.local domain.
D. Block Group Policy inheritance in the Michigan and Florida OUs.


Answer: A


6. You are the administrator of a Windows 2000 domain and TWO Windows NT
domains. The Windows 2000 domain trusts each of the Windows NT domains, and
the Windows NT domains trust the Windows 2000 domain.

A Windows 2000 domain controller named DC1 is configured to use a highly
secure domain controller security template. Users in the Windows NT domains
report that they cannot access DC1.

You need to allow the users of computers in the Windows NT domain to access
resources on DC1. What should you do?

A. Apply a less restrictive custom security template to DC1.
B. Apply a less restrictive custom system policy to Windows NT domain
controllers.
C. Ensure that the Windows 2000 domain is configured in the mixed mode.
D. Ensure that the Windows 2000 domain is configured to run in the native
mode.


Answer: A


7. Your company has 50 offices. The employees in these offices have limited
knowledge of Windows 2000. Each office has a network of between 5 and 20
client computers. The office networks are not connected to any other
networks.

The company is buying 50 identical computers to run Windows 2000 Server in
these offices. These servers must be installed to the company's standard
configuration. You create a setup information file (SIF) that specifies the
company's standard configuration.

You want to automate the installation process as much as possible in the
least possible amount of time.
What should you do?

A. Use the makebt32.exe to create 4 installation startup disks and add the
SIF to the first disk. Instruct an employee at each office to start the
installation by using these disks.
B. Create an MS-DOS boot disk that contains the CD-ROM drivers and the SIF
and that runs WinNT /S:D:\I386 command. Instruct an employee at each office
to start the installation by using this disk.
C. Create a floppy disk that contains only the SIF. Instruct an employee at
each office to start the installation by using the Windows 2000 Server
CD-ROM with the floppy disk inserted.
D. Create a Windows 2000 folder on the hard disk, copy the Windows 2000
Server CD-ROM to the folder, add the SIF to the folder. Copy the folder to
the writable CD. Instruct an employee at each office to start the
installation by using this CD.


Answer: C


8. You are the administrator of Windows 2000 Server network. On each server
you format a separate system partition and a separate boot partition as
NTFS.

Several months later you shut down one of the computers for maintenance.
When you try to restart the computer you receive the following error message
"NTLDR is missing, press any key to restart".

You want to install a new NTLDR file on the computer but you do not want to
lose any settings you made since the installation. What should you do?

A. Start the computer by using the Windows 2000 Server CD-ROM and choose to
repair the installation.
B. Select Recovery Console and copy the NTLDR file on the CD-ROM to the root
of the system volume.
C. Start the computer by using the Windows 2000 server CD- ROM and choose to
reinstall. When the installation is complete copy the NTLDR to the root of
the boot volume.
D. Start the computer by using the Windows 2000 bootable floppy disk. From a
command prompt run the sfc/scanboot command.
E. Start the computer by using Windows 2000 bootable floppy disk. Run the
file signature verification utility.


Answer: A


9. Your network includes Windows 98 computers and Windows 2000 Server
computers. You are adding a new computer to the network. You plan to install
Windows 2000 Server on the new computer. The computer has one 20 GB hard
disk with no partition defined.

The Windows 2000 Server CD ROM is unavailable. You want to install Windows
2000 server from the source files that are located on a server on the
network. You also want the entire hard disk of the new computer to be used
for the system partition.

What should you do?

A. On another Windows 2000 computer use makebt32.exe to create installation
startup disks. Start the computer by using the first disk.
B. On another Windows 2000 computer format a floppy disk. Copy NTLDR,
boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by
using the disk.
C. Start the new computer by using the Windows 98 network boot disk. Connect
to the server. Run dsclient.exe. Create and format 20GB FAT32 partition.
D. Start the new computer by using the Windows 98 network boot disk. Create
and format a single FAT32 partition. Connect to network server. Run
winnt.exe.
E. Start the computer by using Windows 98 network boot disk. Create and
format a single Fat 32 partition. Start the new computer by using the
Windows 2000 emergency repair disk.


Answer: D


10. You are the network administrator at Island Hopper News. The domain and
network configuration is a single-site Windows 2000 domain that is
configured as shown in the exhibit.

<img src="./70-215/images/Q10.gif">

You must provide Terminal Services to the Pentium MMX client computers. You
also need to able to manage user licenses and enable users to access
term1.islandhoppernews.com

First, you install terminal services in application server mode on
term1.islandhoppernews.com.
What should you do next?

A. Install terminal services licensing on term1.islandhoppernews.com. Select
the Enterprise License server option.
B. Install terminal services licensing on term1.islandhoppernews.com. Select
the domain license server option.
C. Install terminal services licensing on file1.islandhoppernews.com. Select
the enterprise license server option.
D. Install terminal services licensing on file1.islandhoppernews.com. Select
the domain license server option.
E. Install terminal services licensing on uu2.islandhoppernews.com. Select
the enterprise license server option.
F. Install terminal services licensing on uu2.islandhoppernews.com. Select
the Domain license server option.


Answer: A


11. You are a network administrator for Fabrikam Inc. Fabrikam Inc has three
offices. The network consists of one native mode Windows 2000 domain. All
servers are Windows 2000 Professional computers. The network is connected by
a Frame Relay connection.

You install a third-party network management suite of applications on a
server named Mon1.

You need to ensure that this new software will be able to interact with and
manage the existing devices on your network.
What should you do?

A. Install SNMP on Mon1.
B. Install SNMP on all computers except Mon1.
C. Configure the SNMP service option in the TCP/IP installation properties
on Mon1.
D. Configure the SNMP server option in the TCP/IP installation properties on
all computers except Mon1.


Answer: A


12. Your network uses TCP/IP as the only network protocol. You configure a
remote access server on this network.

Some users report that when they connect to the server they receive the
following message: " IPX/SPX compatible CP reported error 733 - The PPP
control network protocol for the network is not available".
If the users allow the connection to continue they are able to connect to
services that use TCP/IP.

You want to prevent this message from being displayed. What should you do?

A. Configure the client computers to use only TCP/IP for the connection to
the remote access server.
B. Configure the client computers to use a defined IPX network address for
the connection to the remote access server.
C. Configure the remote access server to allow IPX based remote access and
demand-dial connections.
D. Configure the remote access server to disable Multilink connections.


Answer: A


13. You are the network administrator for your company. Mike Nash is a
member of the Administration group, and Nate Sun is a member of the Intern
group. Both groups are in the same domain.

On the intranet server, the Administration group is placed in the Security
group, and the Intern group is placed in the Nonsecurity group. The Security
group is then granted Full Control permission for the Sales virtual
directory. Nate needs to update new sales information that is located on the
Sales virtual directory.

What should you do so that Nate can perform this task?

A. Enable Anonymous access for the intranet server.
B. Enable Anonymous access for the Sales virtual directory.
C. Remove Nate from the Intern group.
D. Make Nate a member of the Security group.


Answer: D


14. You are the administrator of a Windows NT 4.0 Terminal server edition
computer. The server has one hard disk, which is divided into two
partitions. The first partition contains the Windows NT 4.0 system files and
is formatted as FAT. The second partition contains application data and user
data. This second partition is formatted as NTFS. The server currently has
Service Pack 3 installed.

You need to upgrade the server to Windows 2000 Server. You want to ensure
that no application data or user data is lost during the upgrade. You also
want to perform the minimum number of steps necessary to complete the
upgrade.

What should you do? (Choose all that apply)

A. Convert the system partition to NTFS.
B. Install service pack4 or later on the server.
C. Use a Windows 2000 Server CD to start the server. In setup, select the
option to upgrade.
D. Replace the Terminal Server installation with a standard Windows NT
server 4.0 installation.


Answer: A,B,C


15. You are the administrator of a Windows 2000 Server computer. Your
computer has a spanned volume that consists of areas on three physical hard
disks on the server. The three disks support hot swapping. You regularly
backup the spanned volume by using Windows Backup.

One of the disks fails. You replace the disk with a new un-partitioned disk.
You want to recover the span volume and disk data as soon as possible.

What should you do?

A. Extend the spanned volume to include the new disk. Rescan the disk.
B. Extend the spanned volume to include the new disk. Shut down and restart
the server. Use Windows Backup to restore the data.
C. Rescan the disk. Format the spanned volume. Use Windows Backup to restore
the data.
D. Rescan the disk. Extend the spanned volume to include the new disk. Shut
down and restart the server. Use Windows Backup to restore the new data.
E. Rescan the disks. Remove the spanned volume and create a new spanned
volume that includes the new disk. Format the spanned volume. Use Windows
Backup to restore the data.


Answer: E


16. Your Windows 2000 server computer contains data files that users of
client computers access throughout the day. You install a driver for the new
tape device on the computer.

After restarting the computer you log on as an administrator. Shortly after
you log on you receive the following Stop error: "irql_not_less_or_equal".
You need to bring the server back on line as quickly and reliably as
possible.

What should you do?

A. Restart the computer by using the last known good configuration.
B. Perform an emergency repair and select Fast Repair. Restart the computer.
C. Restart the computer in safe mode. Remove the driver. Restart the
computer.
D. Restart the computer by using the Recovery Console. Disable the driver.
Restart the computer. Remove the driver.


Answer: D


17. A Windows 2000 Server computer named server2 runs numerous 32-bit
applications and two 16-bit applications. Users start the 16-bit
applications by running APP1.EXE for one application and APP2.EXE for
another application. The 16-bit applications are configured to run in the
separate memory spaces.

You want to create a performance baseline chart in System Monitor for all
the applications on Server2. You add all of 32-bit applications and now you
want to add the two 16-bit applications.

What should you do?

A. Add the APP1 and APP2 instances of the %Processor time counter for the
process object.
B. Add the NTVDM, APP1 and APP2 instances of the %Processor time counter for
the process object.
C. Add only the NTVDM instance of the %Processor time counter for the
process object.
D. Add the NTVDM and NTVDM2 instances of the %Processor time counter for the
process object.


Answer: D


18. Every afternoon you run Microsoft Excel locally on your Windows 2000
Server computer to update a performance spread sheet. Users report that,
during this time, the server response to file requests appears to slow down.

What should you do to resolve the problem?

A. Run the start/normal csrss.exe command, before you start the Excel.
B. Run the start/normal Excel.exe command to start Excel.
C. Use task manager to set the priority for csrss.exe process to above
normal.
D. Use task manager to set the priority for Excel.exe process to low.


Answer: D


19. You are the administrator of a network that consists of a single Windows
NT 4.0 domain. The network contains five Windows NT Server domain
controllers and 1,000 Windows NT Workstation client computers. You want to
install Windows 2000 Server on a new computer. You want the new computer to
act as a domain controller in the existing domain.

What should you do?

A. On the new computer, install Windows NT Server 4.0 and designate the
computer as a BDC in the existing domain. Promote the computer to the PDC of
the domain. Upgrade the computer to Windows 2000 Server.
B. On the new computer, install Windows NT Server 4.0 and designate the
computer as a PDC in a new domain that has the same NetBIOS name as the
existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use
Active Directory Sites and Services to force synchronization of the domain
controllers.
C. Shut down the PDC of the existing Windows NT domain from the network. On
the new computer, install Windows 2000 Server, and then run the Active
Directory Installation wizard to install Active Directory, specifying the
same NetBIOS name for the Windows 2000 domain as the existing Windows NT
domain.
D. Shut down the PDC of the existing Windows NT domain from the network. On
the new computer, install Windows 2000 Server, and then run the Active
Directory Installation wizard to install Active Directory as a replica in
the existing Windows NT domain. Promote the new computer to the PDC of the
domain. Restart the Windows NT PDC on the network and demote it to a BDC.


Answer: A


20. You plan to install Windows 2000 Server on 10 new computers on your
company's network. These servers will provide file and print services to
departments within the company. The computers have identical hardware and
will use the same software configuration.

You plan to use a centralized copy of the Windows 2000 installation files,
which are stored on an existing Windows 2000 Server computer.

Which three actions should you take to install Windows 2000 Server on the
new computer? (Choose three.)

A. Create a set of installation boot disks by using Makeboot.exe.
B. Create an MS-DOS network boot disk.
C. Create an Unattend.txt file by using Setup Manager. Create a UDF file
that identifies the names of the new computers.
D. Create a UDF file by using setup manager. Create an Unattend.txt file
that identifies the names of the new computers.
E. Begin the installation process by running the Winnt command with the /S,
/U, and /udf switches.
F. Begin the installation process by running Winnt32 command with the /s,
/unattend, and /udf switches.


Answer: B,C,E


21. You are the administrator of a network that consists of Windows 2000
Server computers and Windows 2000 Professional computers.
You want to configure the deployment of the most recent Windows 2000 service
pack so that users of the Windows 2000 Professional computers receive the
service pack automatically when they log on to the domain.

What should you do?

A. Create a Microsoft Windows installer package for the service pack.
Configure RIS to use the package.
B. Create a Microsoft Windows Installer package for the service pack.
Configure the package in a Group Policy.
C. Create a Microsoft Windows Installer package for the service pack.
Configure the package in the Local Computer Policy.
D. Place the service pack in a Distributed file system (Dfs).


Answer: B


22. Your network consists of numerous domains within a LAN, plus one remote
location that is configured as another domain within the tree. Each domain
contains several organizational units (OUs). The remote domain is connected
to the main office network by a 56-Kbps connection.
See the EXHIBIT.

<img src="./70-215/images/Q22.gif">

The remote location is running a previous service pack for Windows 2000, and
the LAN is running the most recent service pack.
You want to configure a Group Policy for the remote location so that users
can repair a problem with a service pack system file. You also want to
reduce the traffic on the LAN and ease administration of the Group Policies.
You want to retain the domain administrator's access to the Group Policy
configuration.

What should you do?

A. Configure a Group Policy for each OU in the west.litware.com domain.
Configure a service pack software package for each Group Policy.
B. Configure a Group Policy for each OU in the litware.com domain. Configure
a service pack software package for each Group Policy.
C. Configure a Group Policy for the west.litware.com domain. Configure a
service pack software package for the Group Policy.
D. Configure a Group Policy for the litware.com domain. Configure a service
pack software package for the Group Policy.


Answer: C


23. You install and run a third-party 32-bit application named Application
on your Windows 2000 Server computer. After several days. the application
stops responding. You open Task Manager and find that the CPU usage is at
100 percent. The normal range of CPU usage on the server is from 20 percent
to 30 percent.

You end the application. However, you see that the CPU on the server is
still at 100 percent. Task Manager shows no other applications running. You
then examine the Processes page in Task Manager and confirm that the
Application.exe process is no longer running.

You want to return the CPU usage to its normal range. What should you do?

A. Use Computer Management to stop and restart the Server service.
B. Use Computer Management to stop and restart the Workstation service.
C. Use Task Manager to end any related child processes.
D. Use Task Manager to end and automatically restart the Explorer.exe
process.


Answer: C


24. You install a new multiple-process database application named
Application on your Windows 2000 Server computer. Two days later, users
begin to report that the new application has suddenly stopped responding to
queries. You verify that the server is operating and decide that you need to
restart the application.

What should you do before you restart the application?

A. End the task named Application.
B. End the Application.exe process.
C. End the Application.exe process tree.
D. End both the Explorer.exe process and the Application.exe process.


Answer: C


25. Your Windows 2000 Server computer uses a SCSI adapter that is not
included on the current Hardware Compatibility List (HCL). You install an
updated driver for the SCSI adapter.

When you start the computer, you receive the following STOP error:
"INACCESSIBLE_BOOT_DEVICE."

Which two procedures can you use to resolve the problem? (Choose two.)

A. Start the computer in safe mode. Reinstall the old driver for the SCSI
adapter.
B. Start the computer by using a Windows 2000 bootable floppy disk.
Reinstall the old driver for the SCSI adapter.
C. Start the computer by using the Windows 2000 Server CD-ROM. Perform an
emergency repair. Reinstall the old driver for the SCSI adapter.
D. Start the computer by using the Recovery Console. Run System File
Checker. Restart the computer. Reinstall the old driver for the SCSI
adapter.
E. Start the computer by using the Recovery Console. Copy the old driver for
the SCSI adapter to the system volume and to C:\NTbootdd.sys. Restart the
computer.


Answer: C,E


26. A Windows 2000 Server computer named Server1 is a file server on your
network. Server1 runs numerous 16-bit applications. One of the applications,
named App1, stops responding, causing all of the other 16-bit applications
to stop responding.

You want to isolate App1 for monitoring and troubleshooting purpose.
What can you do? (Choose all that apply.)

A. Create a batch file that starts App1 by running the start command with
the /separate switch. Use this batch file to start App1.
B. Create a shortcut to App1, and select the Run in separate memory space
option in the shortcut properties. Use this shortcut to start App1.
C. In the properties for File and Printer Sharing for Microsoft Networks,
select the Maximize data throughput for file sharing option button.
D. In the properties for File and Printer Sharing for Microsoft Networks,
select the Balance option button.


Answer: A,B


27. You want to improve the TCP transmission speed of a Windows 2000 Server
computer. You also want to remove an unused registry key.

You use Regedit32 to edit the registry of the Windows 2000 Server. You
insert a value in the registry named TCPWindowSize, and you remove the
unused key. You restart the computer, but the computer stops responding
before the logon screen appears.

You want to return the computer to its previous configuration. What should
you do?

A. Restart the computer in safe mode. Then restart the computer again.
B. Restart the computer by using the Recovery Console. Run the Fixboot C:
command, and then run the Exit command.
C. Restart the computer by using the Recovery Console. Run the enable
winlogon service_auto_start command, and then run the Exit command.
D. Restart the computer by using the last known good configuration.


Answer: D


28. You install a new server application on your Windows 2000 Server
computer. Response times fail to meet user specifications. You want to use
the Processes page in Task Manager to find out whether the response time of
new application would improve by the addition of one or more processors.

<img src="./70-215/images/Q28.gif">

Which two columns should you select to view? (Choose two.)
To answer, click the two appropriate check boxes in the Select Columns
dialog box (see the exhibit).

A. CPU usage
B. Thread counts
C. I/O Writes
D. Memory Usage
E. Page Pooled


Answer: A,B


29. You are the administrator of a Windows 2000 Server computer. The server
has a single hard disk with a single NTFS partition.

You use a third-party tool to add a new partition to the disk. When you
restart the server, you receive the following error message: "Windows 2000
could not start because the following file is missing or corrupt: <Windows
2000 root>\system32\ntoskrnl.exe. Please re-install a copy of the above
file."

What should you do to resolve the problem?

A. Start the computer by using the Recovery Console. Run System File
Checker.
B. Start the computer by using the Recovery Console. Modify the Partition
parameter in the operating system path in C:\Boot.ini.
C. Start the emergency repair process. Choose the option to repair system
files.
D. Start the computer in safe mode with command prompt. Modify the Partition
parameter in the operating system path in C:\boot.ini.


Answer: B


30. You are the administrator of a Windows 2000 domain that has three domain
controllers. Each day, you use Windows Backup to perform full backups of
each domain controller.

You run a script to make changes to account information in Active Directory.
As a result of errors in the script, the incorrect user accounts are
modified. Active Directory replication then replicates the changes to the
other two domain controllers.

You want to revert Active Directory to the version that was backed up the
previous day.
What should you do?

A. On a single domain controller, use Windows Backup to restore the System
State data. Shut down and restart the computer.
B. Shut down and restart a single domain controller in directory services
restore mode. Use Windows Backup to restore the System State data. Run the
Ntdsutil utility. Restart the computer.
C. Shut down and restart a single domain controller by using the Recovery
Console. Use Windows Backup to restore the System State data. Exit the
Recovery Console. Restart the computer.
D. Shut down and restart each domain controller by using the Recovery
Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery
Console. Restart the computer.


Answer: B


31. You are the administrator of the contoso.local domain. You organize the
domain into organization units (OUs) as shown in the exhibit.
(Exhibit)

<img src="./70-215/images/Q23.gif">

You configure the Local Security Options and other setting for the Default
Domain Policy object. You enable a local security option policy to display a
logon message each time a user attempts to log on. Suzan Fine, the
administrator of the Florida OU, wants to configure a different logon
message for the Orlando OU without changing the other Local Security
Options.

What should Suzan do?

A. Create a new Group Policy object (GPO) in the Orlando OU with the
appropriate logon message. Block policy inheritance for the new GPO.
B. Create a new Group Policy object (GPO) in the Florida OU with the
appropriate logon message. Set the option not to override for the new GPO.
C. Create a new Group Policy object (GPO) in the Orlando OU with the
appropriate logon message. Enable policy inheritance for the new GPO.
D. Create two new Group Policy objects (GPOs) in the Miami and Orlando OUs.
Configure the GPO for the Orlando OU with the appropriate logon message for
the Orlando OU. Place the GPO for the Orlando OU at the top of the priority
list.


Answer: C


32. Your company has a human resources (HR) manager named Sean Chai. He
keeps your company's confidential HR files in a shared folder. To increase
the security of the HR files, Sean set the folder to encrypt the files.

Sean leaves the company without resetting the permissions and encryption
settings for the HR files. The files must be made accessible to the new HR
manager.

Which two actions should you take to allow this access? (Choose two.)

A. Set the file permissions on the HR files to allow access to the new
manager.
B. Back up the shared folder to tape and restore the files to a different
folder.
C. Log on as an administrator and remove the encryption attribute from the
HR files.
D. Log on as the new manager, connect to the shared folder, and run the
cipher /e /s . command.
E. Configure the new manager's account to be an Encrypted Data Recovery
Agent for Sean's account.


Answer: A,C


33. You are the administrator responsible for security and user desktop
settings on your network. You need to configure a custom registry entry for
all users. You want to add the custom registry entry into a Group Policy
object (GPO) with the least amount of administrative effort.

What should you do?

A. Configure an ADM template and add the template to the GPO.
B. Configure an INF policy and add the policy to the GPO.
C. Configure a Microsoft Windows Installer package and add the package to
the GPO.
D. Configure RIS to include the registry entry.


Answer: A


34. Your company has a senior manager named Paul West. Paul uses computers
in two different offices. Paul's home folder is stored on a server named
UserServer.

Paul works with many files that are highly confidential. Paul keeps these
files in a folder named Confidential in his home folder. You need to
maximize the security of the Confidential folder. You also want Paul to be
able to access the folder from computers in each office.

What should you do?

A. Obtain a signing and sealing certificate from a certificate server for
Paul's account, and install the certificate on the computers that Paul uses.
B. Log on at UserServer as the administrator, connect to Paul's home folder,
and set the encryption attribute.
C. Configure Paul's account to have a roaming user profile, and instruct
Paul to use folder properties to set the encryption attribute for his
folders.
D. Add the cipher /e /s . command to Paul's logon script.


Answer: C


35. You install the Routing and Remote Access service on a Windows 2000
Server computer in your network. Your network is not directly connected to
the Internet and uses the private IP address range 192.168.0.0.

When you use Routing and Remote Access to dial in to the server, your
computer connects successfully, but you are unable to access any resources.
When you try to ping servers by using their IP addresses, you receive the
following message: "Request timed out." When you run the ipconfig command,
it shows that your dial-up connection has been given the IP address
169.254.75.182.

What should you do to resolve the problem?

A. Configure the remote access server with the address of a DHCP server.
B. Authorize the remote access server to receive multiple addresses from a
DHCP server.
C. Configure the remote access server to act as a DHCP Relay Agent.
D. Ensure that the remote access server is able to connect to a DHCP server
that has a scope for its subnet.


Answer: D


36. Your company's network includes Windows 3.1 client computers, Windows 95
client computers, and Windows 2000 Professional client computers. The
company's manufacturing facilities run 24 hours per day.

The company has developed its own 32-bit application that collects
information from the manufacturing process so that workers on one shift can
find out what was manufactured during the previous shift. The company wants
to make the application available on all of the client computers by using
Terminal Service on a Windows 2000 Server computer. This server will not run
as a domain controller.
You install Terminal Services.
The information technology (IT) department needs to be able to remote
control users' sessions to support and troubleshoot the application.

What should you do to enable the IP department to control users' sessions?

A. Configure the Terminal server to run in Remote Administration mode.
B. Grant the IT department Full Control permission to the Remote Desktop
Protocol (RDP) on the Terminal server.
C. Add the members of the IT department to the Power Users group on the
Terminal server.
D. Use third-party software to enable remote control of users' sessions.


Answer: B


37. Your network contains 10 domain controllers, 10 member servers, and
approximately 1,000 client computers. All the servers run Windows 2000
Server, and all the client computers run Windows 2000 Professional. Two of
the domain controllers act as DNS servers. Users of client computers use
file sharing to grant access to files stored locally.

The network has 10 subnets and uses TCP/IP as the only network protocol. You
want to configure the network so that all computers can resolve the
addresses of all other computers by using DNS. Client computers must be able
to register and resolve addresses, if a server fails.

How should you configure the DNS servers?

A. Configure one server with a standard primary zone for the domain, and
configure at least one server with standard secondary zone.
B. Configure one server with a standard primary zone for the domain, and
configure at least one server with an Active Directory integrated primary
zone.
C. Configure one server with an Active directory integrated primary zone for
the domain, and configure at least one server with a standard secondary
zone.
D. Configure at least two servers with Active Directory integrated primary
zones for the domain.
E. Configure at least two servers with standard primary zones for the
domain.


Answer: D


38. Your network is configured as shown in the exhibit.
(Exhibit)

<img src="./70-215/images/Q37.gif">

All the servers are Windows 2000 Server computers that use TCP/IP as the
only network protocol. The sales department uses one subnet and has servers
named Sales1 and Sales2. The engineering department uses another subnet and
has servers named Engineering1 and Engineering2.

Sales1 and Engineering1 are configured to act as DHCP servers. The router
that joins the two subnets is not RFC 1542 compliant and does not support
DHCP/BOOTP relay.

You want to allow Sales1 and Engineering1 to support client computers on
each other's subnets. What should you do?

A. Set the router option in the DHCP Scopes to 192.168.2.1 for Engineering1
and 192.168.1.1 for Sales1.
B. On Engineering2 and Sales2, install Routing and Remote Access, and
configure RIP as a routing protocol.
C. On Engineering2 and Sales2, install and configure the DHCP Relay Agent
service.
D. Configure Engineering2 and Sales2 as DHCP servers without any scopes.


Answer: C


39. You install Terminal Services on a Windows 2000 domain controller. You
install Terminal Services Client on users' client computers.
Users report that when they try to connect to the Terminal server, they
receive the following error message: "The local policy of this system does
not allow you to logon interactively." When you attempt to log on to the
Terminal server as an administrator from a user's computer, you log on
successfully.

You want users to be able to log on to the Terminal server. What should you
do?

A. Grant the users the right to log on as a service.
B. Grant the users the right to log on locally.
C. Grant the users the right to log on over the network.
D. Copy the users' profiles to the Terminal server.
E. Copy the users' home folders to the Terminal server.


Answer: B


40. Your company has a main office and 50 branch offices. The main office
has a private network with 1,000 computers. Each branch office has a private
network with between 10 and 20 computers and a 56-Kbps connection to the
Internet.

The company plans to use the Network Address Translation (NAT) feature of
Routing and Remote Access to provide each office with access to the
Internet. When you test this configuration, you discover that connections
cannot be made to sites by using fully qualified domain names. However,
connections can be made to these sites by using their IP addresses.

You want to be able to make connections by using fully qualified domain
names. What should you do?

A. Configure the computers on each of the branch office networks with the
address of a WINS server.
B. Configure the computers on each of the branch office networks with the
address of a DNS server on the Internet.
C. Configure a filter on the NAT servers to pass DNS packets.
D. Create a host file on each of the NAT servers.


Answer: B


41. You are the administrator of a routed Windows 2000 network. The network
includes 25 Windows 2000 Server computers. You want to install a new Windows
2000 Server computer as the first computer on a new routed segment.

You configure the existing DHCP server with a scope that is valid for the
new routed segment. During the installation of the new Windows 2000 Server,
you specify that the server should obtain its IP address from an existing
DHCP server.

After you complete the installation, you open My Network Places. You see the
new server but no other computers. You run the ipconfig command and find
that the new server's assigned IP address is 169.254.1.200, with a 16-bit
subnet mask and no default gateway address.

You want to resolve the problem so that you can see other computers on the
routed network.
What can you do? (Choose two.)

A. Configure all of the routers to route BOOTP broadcast frames.
B. Configure the default gateway to the TCP/IP properties of the new server.
C. Add the IP address for the default gateway to the TCP/IP properties of
the new server.
D. Add a DHCP Relay Agent computer to the new routed segment.
E. Add a WINS server to the new routed segment.


Answer: A,D


42. You are the administrator of a Windows 2000 Server computer that has one
hard disk. This computer runs a custom application that writes a large
number of small temporary files in a single directory to support requests
from client computers.
To improve performance of the application, you add three new 100-GB SCSI
disks to the server to hold these temporary files. You want to ensure that
the application can use all 300 GB of space with a single drive letter. You
also want to ensure the fastest possible performance when writing the
temporary files.

How should you configure the three disks?

A. Convert all three disks to dynamic disks. Create a striped volume.
B. Convert all three disks to dynamic disks. Create a RAID-5 volume.
C. Create a single volume on each of the three disks. Format each volume as
NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1.
D. Create a single volume on Disk 1. Format the volume as NTFS. Extend the
volume to create a spanned volume that includes the space on all three
disks.


Answer: A


43. Your Windows 2000 Server computer contains a stripe set with parity on a
four-disk array. You convert the stripe set with parity to a dynamic RAID-5
volume.

Six months later, users report that disk access on the server is slower than
it had been on the previous day. You use Disk Management and discover that
the status of the third disk in the array is Missing.

You want to recover the failed RAID-5 volume.
What should you do first?

A. Replace the third disk and restart the server. Use disk Management to
repair the volume.
B. Ensure that the third disk is attached to the server and has power. Use
Disk Management to reactivate the disk.
C. Ensure that the third disk is attached to the server and has power. Use
Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the new
disk. Restart the computer and allow Windows 2000 to automatically repair
the volume on the extended partition.


Answer: B


44. You are the administrator of a Windows 2000 Server computer. The server
has a single hard disk with two partitions. An application that runs on your
server creates a very large log file in the Systemroot\Temp folder.

There is not enough free space on the system partition to accommodate the
log file. The application does not provide a way to change the path to the
log file. You want to run the application on your server.

What should you do?

A. On the second partition, create a shared folder named Temp.
B. In the systemroot folder, create a shortcut named Temp that points to the
second partition on the disk.
C. Add a second hard disk. Create and format a partition from the free space
on the second hard disk. Create a Temp folder on the new partition. Mount
the system partition as the Temp folder on the new partition.
D. Add a second hard disk. Delete the contents of the Systemroot\Temp
folder. Create and format a partition from the free space on the second hard
disk. Mount the partition as the Systemroot\Temp folder.


Answer: D


45. You install your boot volume on volume C on your Windows 2000 Server
computer. You mirror volume C on dynamic Disk 1.

Two years later, during routine server maintenance, you open Disk Management
and find that the status of volume C is Failed Redundancy. The status of
Disk 1 is Missing.

You attempt to reactivate Disk 1, but the status of volume C does not return
to Healthy.

What should you do next?

A. Replace Disk 1 and restart the computer. The mirror will automatically
regenerate.
B. Remove the mirror on Disk 1, replace the disk, and then add back the
mirror to the new Disk 1.
C. Replace Disk 1 and copy all data from volume C to a new NTFS primary
partition on the new Disk 1. Restart the computer.
D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then
re-create the mirror.


Answer: B


46. You install the boot volume D on your Windows 2000 Server computer on
dynamic Disk 0. You mirror volume D on dynamic Disk 1.
One year later, during routine server maintenance, you open Disk Management
and find that the status of volume D is Failed Redundancy. The status of
Disk 1 is Online (Errors). A symbol with an exclamation point appears in the
graphical view of the disk.

You want to return the status of the boot volume to Healthy. What can you
do? (Choose two.)

A. Break the mirror, delete the volume on Disk 1, and re-create the mirror.
B. Replace Disk 1, copy the data from the boot volume to the new disk, and
then use Disk Management to rescan the disks.
C. Replace Disk 1, Ensure that the new disk is a basic disk, and repair the
volume.
D. Reactivate the mirror on Disk 1.
E. Convert Disk 1 to a basic disk, and reconvert it to a dynamic disk.


Answer: A,D


47. Five Lakes Publishing has a Windows 2000 network serving 200 users. A
server named User_srv is used to hold users' files. User_srv is configured
with a single, large NTFS volume. Every user has a home folder on User_srv.
Users can also use a shared folder named IN_PROGRESS to store files for
books that are being prepared.

The network administrator at Five Lakes Publishing configured disk quotas
for the NTFS volume on User_srv. All users have a default limit of 100 MB,
and the option to deny space to users who exceed their limit has been
enabled.

When a user named Amy Jones attempts to save a chapter of a new book to her
home folder on the server, she receives the following error message: "The
disk is full or too many files are open."

What should Amy do to allow this document to be saved? (Choose all that
apply.)

A. Compress the files in her home folder to save disk space.
B. Change the security setting of some of the files in her home folder to
grant Full Control permission to a user who has not reached the quota level.
C. Move some of the files from her home folder to the IN_PROGRESS shared
folder.
D. Remove files from her home folder until the total uncompressed file size
is less than 100 MB.


Answer: D


48. You upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The
computer has two hard disks. The system and boot partitions are located on
two primary partitions on Disk 0. Both partitions are mirrored on Disk 1.

One month later, Disk 1 fails. You replace the disk with a disk taken from
another Windows 2000 computer. When you try to repair the fault-tolerant
volumes by using Disk Management, you find that the Repair Volume option is
unavailable.

You want to repair the mirror set. What can you do? (Choose two.)

A. Delete all volumes on Disk 1. Change Disk 1 back to a basic disk. Repair
the fault-tolerant volumes on Disk 0.
B. Create two new volumes on Disk 1. Copy all the data from the two disk
partitions on Disk 0 to the two volumes on Disk 1.
C. Break the mirror set. Convert Disk 0 to a dynamic disk. Create a mirror
on Disk 1.
D. Create a single volume on Disk 1. Copy all the data from Disk 0 to the
single volume. Convert Disk 0 to a dynamic disk.


Answer: A,C


49. Trey Research has a Windows 2000 Server computer named User_srv. This
computer has a RAID-5 controller. The RAID array is configured as two
partitions. Drive C is a 2-GB partition that holds the operating system and
paging file. Drive D is a 30-GB partition that will hold the home folders
for 200 users.

Trey Research employs 10 scientists. The user accounts for scientists are
members of a group named Scientists. The scientists use a data capture
application that generates files that can be larger than 100 MB.

Trey Research wants to use disk quotas. Ordinary users should be allowed to
store a maximum of 75 MB of data in their home folder. The storage for users
in the Scientists group should not be limited by quotas.

What should you do to configure this disk quota scheme? (Choose two.)

A. Enable quota management on drive D. Select the Deny disk space to users
exceeding quota limit Check box. Set the default quota limit to 75 MB.
B. Create a Scientist template account. Create a new quota entry for this
account. Select the Do not limit disk usage for this entry option button.
C. Create new quota entries for the 10 scientists' user accounts. Select the
Do not limit disk usage for this entry option button.
D. Enable quota management on drive D. Select the Deny disk space to users
exceeding quota limit check box. Select the Do not limit disk usage option
button for the default quota limit.
E. Create a Scientist template account. Create a quota entry for this
account. Set the quota limit to 30 GB.


Answer: A,C


50. You share a folder on a Windows 2000 Server computer for users in your
company's London office. You place several subfolders (Marketing, Sales,
Research and Marketing-2) in the London folder. See the exhibit.

<img src="./70-215/images/Q50.gif">

The Marketing-2 folder is compressed. You want to move some files from the
Research folder into Marketing-2, and you want to make sure that the files
are compressed when you move them. However, you do not want to compress the
remaining files in Research.

What should you do?

A. Move each of the files from Research to Marketing-2.
B. Copy the files from Research to Marketing-2, and then delete the original
files.
C. Compress Research, apply changes to the folder only, and then move the
files from Research to Marketing-2.
D. Encrypt Marketing-2, move the files from Research to Marketing-2, and
then decrypt Marketing-2.


Answer: B


51. You are the administrator of a Windows 2000 Server network. You
configure two sites: one for your New York office and one for your Paris
office. You configure two organizational units (OUs) named New York and
Paris. In each of these OUs, you create subordinate OUs named Sales,
Marketing, and Research. You place user accounts, stand-alone member
servers, and Windows 2000 Professional computers in their appropriate
subordinate OUs.

You suspect that someone is trying to log on to your domain by guessing user
account names and passwords. You want to find out which computers are being
used for these logon attempts.

What should you do?

A. Edit the Default Domain Controllers Policy object to audit directory
services access failures.
B. Edit the Default Domain Policy object to audit account logon failures.
C. Edit the New York OU and Paris OU Group Policy objects (GPOs) to audit
logon failures.
D. Edit the Group Policy object (GPO) of each subordinate OU to audit
directory service access failures.


Answer: B


52.You want to provide complete redundancy for all data stored on your
hardware RAID-5 disk array. You install a second hardware Raid-5 disk array.

You want to create a mirror of the original array on the new array. However,
when you right-click the free space on the new array in Disk Management, you
see no option to create a new volume or a mirrored volume.

Bsfore you create a mirrored volume on the new array, what should you do?

A. Convert both arrays to dynamic disks.
B. Create an empty single extended partition on the new disk array.
C. Create a single unformatted primary partition on the new disk array.
D. Format the new disk array as a single NTFS primary partition.
E. Format the new disk array as a single NTFS logical drive in an extended
partition.


Answer: A


53. You are the administrator of the homeoffice.local domain. You want to
create a shared printer for the company's executives so that they do not
have to wait for their documents to print when the default printer's queue
contains a large number of documents.

You configure the new high-priority printer and want to set permissions for
the groups shown in the exhibit.
(Exhibit. Note: The default settings have been cleared.)

<img src="./70-215/images/Q48.gif">

You select the check box to allow Print permission for the Executives group.
You want only the Administrators, Print Operators, Server Operators, and
Executives groups to be able to print to the printer.

What can you do? (Choose two.)

A. Remove the Everyone group.
B. Select the check box to deny Print permission for the Everyone group.
C. Select the check box to deny Manage Documents permission for the Everyone
group.
D. Select all Deny check boxes for the Everyone group.
E. Clear all check boxes for the Everyone group.


Answer: A,E


54. You are the administrator of Coho Vineyard. You are responsible for all
remote locations, each of which has at least one Windows 2000 Server
computer.

After you install a new video adapter, one of the users at a remote location
reports that Routing and Remote Access does not accept calls. After you
resolve the Routing and Remote Access problem, you need to configure the
server to prevent users from installing any unsigned device drivers.

What two actions should you take in the Driver Signing Option dialog box?
(choose two)

A. Set File Signature Verification to Ignore.
B. Set File Signature Verification to Block.
C. Set File Signature Verification to Warn.
D. Select the Apply Settings As System Default check box.


Answer: B,D


55. You want to upgrade a Windows NT Server 4.0 computer named Server34 to
Windows 2000 Server. Server34 is a member server in a Windows 2000 domain
named marketing.fabrikam.local. The domain runs in native mode. You want to
change the role of Server 34 from a member server to a domain controller in
the same domain.

What should you do? (Choose two.)

A. Reinstall Windows NT Server 4.0 on Server 34 in the same WINNT folder,
and make Server 34 a BDC in the marketing domain.
B. Use Server Manager on Server34 and promote Server34 to a PDC for the
marketing domain.
C. Upgrade Server34 to Windows 2000 Server.
D. Run the Active Directory Installation wizard to make Server34 a domain
controller in the marketing.fabrikam.local domain.
E. Run the Active Directory Installation wizard to convert Server34 to a
domain controller in the fabrikam.local domain.


Answer: C,D


56. You are a network administrator for your company. The company is
currently configuring its branch offices with a Windows 2000 Server computer
at each office. Each branch office has a technical-support department but
not a network administrator.

You want to configure the remote Windows 2000 Server computers so that
whenever a new Microsoft driver becomes available, the branch offices are
notified automaticaly when the administrator logs onto the server.

What should you do?

A. Install the Windows 2000 Resource Kit.
B. Install Windows Critical Update notification.
C. Configure System File Checker to notify the branch offices.
D. Configure Windows File Protection to notify the branch offices.


Answer: B


57. You are the administrator of a Windows 2000 network. The network
includes a Windows 2000 Server computer that is used as a file server. More
than 800 of your company's client computers are connected to this server.

A shared folder named Data on the server is on an NTFS partition. The Data
folder contains more than 200 files. The permissions for the Data folder are
shown in the following table.
(Exhibit)

<img src="./70-215/images/Q49.gif">

You discover that users are connected to the Data folder. You have an
immediate need to prevent 10 of the files in the Data folder from being
modified. You want your actions to have the smallest possible effect on
users who are using other files on the server.

Which two actions should you take? (Choose two.)

A. Modify the NTFS permissions for the 10 files.
B. Modify the NTFS permissions for the Data folder.
C. Modify the share permissions for the Data folder.
D. Log off the users from the network.
E. Disconnect the users from the Data folder.


Answer: A,E


58. You are the administrator of the Intranet at Blue Sky Airlines. You
install and configure a new Windows 2000 Server computer named
server1.departments.blueskyairlines.com as an intranet server. This server
hosts the multiple departmental and resource Web links to the network and
databases.

You configure a ticketing Web site. You also configure a finance virtual
directory in the department's Web site, as shown in the exhibit.
See the Exhibit.

<img src="./70-215/images/Q44.gif">

During the first morning that the new server is available, users report that
the only information they are seeing in their browser is a list of HTM and
ASP files. For security reasons the first action you need to take is to
disable the users' ability to view the files of all WEB sites in the form of
a list.

What should you do?

A. Clear the Directory Browsing checkbox for the Server Properties, and then
apply the settings to the child WEB sites.
B. Clear the Directory Browsing checkbox for the Ticketing WEB site, and
then apply the setting to child virtual directories.
C. Clear the Directory Browsing checkbox for the Department's WEB site, and
then apply the setting to the child virtual directories.
D. Clear the Directory Browsing checkbox for the Financing virtual
directory.


Answer: A


59. You are the administrator of your company's network. You are configuring
the security policy for a group of users in the Finance organizational unit
(OU). You need to configure a Group Policy so that future changes to Group
Policy will be applied within 15 minutes to any computers that are logged on
to the network.

What should you do?

A. Enable the background refresh settings to use the default Group Policy
refresh rate.
B. Enable the asynchronous Group Policy application settings.
C. Enable and configure the Group Policy refresh interval for domain
controller.
D. Enable and configure the Group Policy refresh interval for computers.


Answer: D


60. You are the network administrator at Contoso Ltd. You work at the main
office in Seattle. The branch office in Denver is a call center. The network
consists of a Windows 2000-only domain.

Denver is a token ring network. Seattle is an ethernet network. None of your
network adapters at Contoso Ltd support promiscuous mode. The Brouter does
not support multicast traffic.
Wks1.contoso.com and mem1.contoso.com are available for use as network
monitor clients.

You want to be able to detect and identify rogue installations of network
monitor on your network by using the fewest possible computers.
What should you do? (Choose all that apply)

A. Install network monitor tools on wks1.contoso.com by using the Windows
components wizard.
B. Install the SNMP protocol on wks1.contoso.com by using the Windows
components wizard.
C. Install network monitor tools on mem1.contoso.com by using the Windows
components wizard.
D. Install the SNMP protocol on mem1.contoso.com by using the Windows
components wizard.
E. Install network monitor tools on wks1.contoso.com that supports
promiscuous mode.
F. Install network monitor tools on mem1.contoso.com that supports
promiscuous mode.


Answer: A,C


61. The Litware, Inc. network has three main network segments and six domain
controllers. Part of the network is shown in the exhibit.
See the Exhibit.

<img src="./70-215/images/Q33.gif">

You back up all of the System State data for each domain controller and
place the data on a single tape. That tape is currently attached to the
srv1.west.litware.com computer.

To which server or servers can you restore the System State data from
srv1.west.litware.com? (Choose all that apply).

A. srv1.west.litware.com.
B. srv2.west.litware.com.
C. srv3.central.litware.com.
D. srv4.central.litware.com.
E. srv5.east.litware.com.
F. srv6.east.litware.com.


Answer: A


62. You configure a HP JetDirect print device as shown in the exhibit. See
the Exhibit.

You want to create and share a printer at Srv2.sales.justtogs.com that is
connected to the TCP/IP port of the print device. However, when you enter
the IP address of the device, you receive the dialog box shown in the
Printer Port Wizard.
See the exhibit.

<img src="./70-215/images/Q46.gif">
<img src="./70-215/images/Q46a.gif">

What should you do?

A. Select Hewlett Packard JetDirect from the standard drop-down list.
B. Select the Custom option button, click the Settings command button, and
select the LPR protocol.
C. Change the IP address of the print device to 10.5.20.200.
D. Change the subnet mask of the print device to 255.0.0.0.
E. Change the default gateway address on Srv2.sales.justtogs.com to
10.5.20.100.


Answer: C


63. You install a new modem on your Windows 2000 Server computer. Windows
2000 detects the modem and installs the default driver. Occasionally the
modem stops communicating, and the only way to reactivate it is to restart
your computer.

You download an updated modem driver from the manufacturer's web site and
save it in the WINNT folder on your hard drive.

You want to install the new driver. What should you do?

A. In the Properties sheet for the modem in the Device Manager, click the
Update Driver command button.
B. Use Device Manager to scan for hardware changes.
C. Delete the modem within the Device Manager and restart the computer.
D. Move the new driver to the Winnt/driver Cache folder, and then restart
the computer.


Answer: A


64. Your Windows 2000 Server computer has a 10-GB hard disk with two
partitions; Drive C and drive D. Windows 2000 Server is installed on Drive
D. Both partitions are formatted as NTFS.

Your office experiences a power failure that causes your Windows 2000 Server
computer to restart.
When the computer is restarting, you receive the following error message
"NTLDR is missing. Press any key to restart".

What should you do?

A. Start the computer by using Windows 2000 Server computer CD-ROM and
choose to repair the installation.
B. Select the Recovery Console and copy the NTLDR file on the CD-ROM to the
root of the system partition.
C. Start the computer in debugging mode. Copy the NTLDR file on the CD-ROM
to the root of the system partition.
D. Start the computer by using the Windows 2000 bootable floppy disk. From a
command prompt, run the sfc/scanboot command.
E. Start the computer by using a Windows 2000 bootable floppy disk. Run the
File Signature Verification utility.


Answer: B


65. You are the administrator of a Windows 2000 Server computer. The server
hosts several web sites that have logging enabled. You use a third-party
reporting utility to analyze the log files produces by the web sites.

You notice that all data from 7:00 P.M to midnight each night is included in
the following day's log file.

You want all data to be included in the correct day's log file. What should
you do?

A. Ensure that the log type is set to W3C.
B. Change the log rollover property in the web site logging properties.
C. Change the time zone setting in the time properties on the web server.
D. Configure the time server service o the web server to use the LocalSystem
account.


Answer: B


66. You are installing Windows 2000 Server on a multiprocessor computer. The
manufacturer has provided a customized hardware abstraction layer (HAL) to
use with the computer. The HAL is on the floppy disk. You want to install
the customized HAL designed for the computer.

What should you do?

A. During the text mode portion of the Windows 2000 setup, install the
customized HAL.
B. After text mode portion of Windows 2000 setup is complete use the
recovery console to copy the customized HAL to the system32 folder on the
boot partition.
C. After the text mode portion your Windows 2000 setup is complete use the
emergency repair process to replace the existing HAL with the customized HAL
and then continue the Windows 2000 setup.
D. After the Windows 2000 setup is complete use the device manager to scan
for Hardware changes when prompted install the customized HAL.


Answer: A


67. Your Windows 2000 domain contains a Windows 2000 member server named
server1. Server1 has routing and remote access for Windows 2000 enabled.
Server1 is also configured to use a modem bank to accept incoming dial-up
attempts.

You need to configure server1 so that users can connect to it from their
home computers. You want to restrict access to the network to only users who
can access the network at speeds faster than 64 Kbps.

You also must ensure that the users connect by using mutual authentication.
Which three actions should you take? (Choose Three)

A. Configure the authentication provider to be RADIUS server.
B. Configure the authentication provider to be Windows Authentication.
C. Specify IDSL as the dial-in media.
D. Specify Async as the dial-in media.
E. Configure support for EAP.
F. Configure support for MS-CHAP
G. Configure support for MS-CHAP version 2.


Answer: B,C,G


68. You are the administrator of a Windows 2000 Server computer. A folder
named HR-Data on the system partition of the server is shared on the network
as HR-Data. The owner of the HR-Data folder is Administrators.
The share permissions and NTFS permissions are shown in the following table.
(Exhibit).

<img src="./70-215/images/Q43.gif">

Katrin creates a file in the HR-Data folder. She sets the NTFS permissions
for the file to list only herself on the access control list, with Full
Control permission. Katrin then leaves on vacation and cannot be contacted.

Later, you discover that the file contains sensitive information and must be
removed from the server as soon as possible. You want to delete the file
without modifying any of the permissions for other files in the HR-Data
folder. You want your actions to have the least possible impact on users who
may be using other files in the HR-Data folder. You want to use the minimum
amount of authority necessary to delete the file.

What should you do?

A. Grant yourself Full Control permission for only the HR-Data folder and
not its files and subobjects. Delete the file. Then remove Full Control
permission for the HR-Data folder.
B. Take ownership of the HR-Data folder. When prompted, take ownership of
existing files. Grant yourself Full Control permission for the file. Delete
the file.
C. Take ownership of the file. Grant yourself Modify permission for the
file. Delete the file.
D. Grant yourself Modify permission for the HR-Data folder and its
subobjects. Delete the file. Then remove Modify permission for the HR-Data
folder.


Answer: C


69. You enable disk quotas on volume D on the server. You configure a disk
quota 10 GB for each user. You select the deny disk space to users exceeding
quota limit check box.

A user named Bruno reports that he cannot save a Microsoft Windows 2000
document to a shared folder used by his department. You need to ensure that
users can always save more than 10 GB to their home directories.

What should you do?

A. Clear the deny disk space to users exceeding quota limit check box in the
quota configuration for volume D.
B. Log on to the server as administrator, and take ownership of all files in
the group-shared folders
C. Create a new volume on the server. Move the group-shared folders to the
new volume
D. Increase the quota limit on volume D to permit extra space for shared
files


Answer: A


70. You are the network administrator at Awesome computers, a hardware
manufacturing firm. You are deploying 20 new Windows 2000 Server computers
in the software development department. The software testers will use these
servers for testing.

Each tester is a member of the Power Users group. Each tester must be able
to install new hardware and device drivers on these servers. You want the
testers to be able to test custom applications that install drivers without
interruption.

You install Windows 2000 Server on one computer so that you can prepare a
system image for the deployment.

You must configure this system image to meet the needs of the software
testers. What should you do?

A. For the Power Users group, apply the right to load and unload device
drivers.
B. For the domain users group, apply the right to load and unload device
drivers.
C. Configure the driver signing options to install all files, regardless of
file signature. Configure the setting to be a system default.
D. Configure the driver signing options to install all files, regardless of
file signature. Configure the setting not to be a system default.


Answer: A


71. You want to upgrade your Windows NT 4.0 Server to Windows 2000 Server.
The current system partition uses the FAT file system.

You start the setup by starting the computer from the Windows 2000 Server
CD-ROM and receive the following error message:
"You chose to install Windows 2000 on a partition containing another
operating system. Installing Windows 2000 on this partition may cause the
operating system to function improperly".

You are unable to perform the upgrade. What should you do to resolve this
problem?

A. Convert the partition to NTFS.
B. Disable Advanced Configuration and Power Interface (ACPI) support for the
computer.
C. Restart the computer and then run WINNT32.EXE from the Windows NT Server
4.0 environment.
D. Restart by using the Setup floppy disks.


Answer: C


72. You install a Windows 2000 Server computer on your network. You place
several shared folders on a 12-GB primary partition formatted as FAT32.

During months of continuous operation, the number of users who access the
server and their access frequency remains constant. The average size of the
files on the server remains approximately constant.

After nine months of use, users report that the server does not retrieve
files from the shared folders as fast as when you first installed the
server. What should you do to resolve the problem?

A. Convert the disk that contains the shared folders to a dynamic disk.
B. Convert the partition that contains the shared folders to NTFS.
C. Defragment the disk that contains the shared folders.
D. Move the paging file to the primary partition that contains the shared
folders.


Answer: C


73. You are the network administrator of the Windows 2000 network at Island
Hopper News. Your company does not have a Web presence. Your network
consists of a Windows 2000 domain controller, a file server, and a member
server named Server 1. Server 1 is connected to a modem bank.

Many users want to log on to the network for home. These users have Windows
95, Windows 98 and Windows 2000 are professional computers.
You enable routing and remote access for Windows 2000 on server 1. You
configure the server 1 properties as shown in the exhibit.

<img src="./70-215/images/Q73.gif">

Users configure dial-up networking on their client computers to connect to
server 1. Some users report that they are unable to connect to server 1.
What should you do?

A. Change the authentication provider to RADIUS Authentication.
B. Disable EAP.
C. Disable MS-CHAP version2.
D. Enable SPAP.
E. Enable MS-CHAP.


Answer: E


74. Your company network includes Windows 98, Windows 2000 Professional, and
Macintosh client computers. All of the client computers currently use TCP/IP
as their only network protocol.

You create several shared folders on a Windows 2000 Server computer. You
plan to store the company's financial data in these shared folders. During
testing, you discover that the Macintosh client computers cannot access the
shared folders.

You want the shared folders to be accessible from all of the client
computers on the network.
What should you do first?

A. Install the SAP protocol on the Windows 2000 Server computer.
B. Install the Apple Talk network protocol on the Macintosh computers and on
the Windows 2000 Server computer.
C. Install Apple Talk network integration on the Windows 2000 Server
computer.
D. Install RIP on the Windows 2000 Server computer.


Answer: B


75. You are the administrator of a Windows 2000 Server computer. You add a
new hard disk to the computer and configure it as a basic disk. You create a
single NTFS partition that uses all of the space on the disk. You assign the
drive letter G to the new partition.
You share drive G as DataFiles and assign the default share permissions to
the drive.

You want to create several folders in the root of drive G. You plan to use
these folders to store network users' files.
You want to prevent users from creating additional folders in the root of
drive G. You also want to allow users to create subfolders under the folders
that you have already created. You want to configure the NTFS security
permissions for the drive G folders in the minimum amount of time.

What should you do?

A. Create your folders in the root of drive G. Configure the permissions on
these folders to block permission inheritance.
B. Create your folders in the root of drive G. Modify the permissions on the
folders to allow users to create subfolders. Configure the permissions on
these folders to block permission inheritance.
C. Create your folders in the root of drive G. Configure the permissions on
these folders to block permission inheritance. Modify the permissions on the
root of drive G to prevent users from creating folders on the root.
D. Modify the permissions on the root of drive G to prevent users from
creating folders on the root. Create your folders in the root of drive G.
Configure the permissions on these folders to block permission inheritance.


Answer: C


76. A Windows 2000 Server computer at your company is connected to two print
devices. Company executives use one print device, which is shared as
Executive. The office staff use the other print device, which is shared as
Office.

Occasionally, a company executive directs a member of the office staff to
print a report to the Executive printer. However, the executives report that
some members of the office staff are printing to the Executive printer
without authorization.

You need to find out which users are printing to the Executives printer
without authorization.
What should you do?

A. Monitor the printer's spool directory for files printed by unauthorized
users.
B. Use system monitor to monitor the print jobs being set to the executive
printer.
C. Enable audit logging for object access. Configure auditing on the
executive printer.
D. Use the event viewer to review the security log for messages from the
printer subsystem.


Answer: C


77. You are the network administrator for your company. You configure a
shared printer on a Windows 2000 Server computer. The printer connects to a
Hewlett Packard JetDirect print device that uses DLC. This print device is
on the same network segment as the server.

Six months later, you relocate the print device to a different network
segment. Users report that they are able to send print jobs to the printer
but that their print jobs no longer print.

You need to ensure that the printer and the print device are working
properly.
What should you do?

A. Configure the JetDirect print device to use DHCP.
B. Uninstall and reinstall the DLC protocol from the server.
C. Configure the printer and the JetDirect print device to use LPR printing
protocol.
D. Delete the printer. Re-create the printer by using DLC to connect to the
JetDirect print device.


Answer: D


78. You are the domain administrator for your company. The domain and OU
structure is shown in the exhibit.

<img src="./70-215/images/Q78.gif">

You want to log all unsuccessful attempts to delete files from all your data
servers.

Which two actions should you take? (Choose two)

A. Set audit permissions on all file and print server computers.
B. Use Secedit to import the Hisecws.inf template for all computers in the
file and print servers OU.
C. Use Secedit to import the Hisecws.inf template for all computers in the
Client computers OU.
D. Enable group policy auditing on the file and print servers OU.
E. Set auditing permissions on all of the client computers.
F. Enable auditing group policy on the client computers OU.


Answer: A,D


79. You configure one of your Windows 2000 Server computers as a print
server. You install a second Plug and Play network adapter on the server to
improve network adapter uses IRQ11. The second adapter uses IRQ5. The server
is now unable to print to the print device connected to the non-Plug and
Play LPT2 port adapter.

You want to continue to use print devices installed on Plug and Play LPT1
and non-Plug and Play LPT2.
What should you do?

A. Use device manager to change the IRQ for LPT1 to IRQ10.
B. Use device manager to change the IRQ for LPT2 to IRQ7.
C. Edit the CMOS settings on the server to reserve IRQ7 for non-Plug and
Play devices.
D. Edit the CMOS settings on the server to reserve IRQ5 for non-Plug and
Play devices.


Answer: D


80. You are the administrator for your company. Your Windows 2000 Server
computer contains two 23GB hard disks. Each disk is configured as a basic
disk and has a single 23GB NTFS partition. Both partitions are backed up to
tape every night. The partition on Disk1 stores user data. Most users of
your company encrypt their files.
Disk1 fails. You replace it with a new disk.

You need to recover the data as quickly as possible while maintaining the
security of the files.

What should you do?

A. Create a single NTFS partition. Restore the contents of Disk1 from the
most recent tape backup. Run the cipher /d /i command.
B. Create a single NTFS partition. Restore the contents of Disk1 from the
most recent tape backup. Instruct the users to verify the integrity of their
files.
C. Create a single NTFS partition. Restore the contents of Disk1 to a second
file server. Logon to the server console as a recovery agent. Copy the files
from the second file server to the new partition.
D. Create a single NTFS partition. Restore the contents of Disk1 to a second
file server. Instruct users to copy their files from the second file server
to the new partition.


Answer: B


81. You want to install Windows 2000 server on 15 new computers. These
servers will provide file and print services in branch offices of your
company. The company wants each branch office to purchase its own copy of
Windows 2000 Server, and the installation in each branch office should use
the serial number associated with the branch office's own copy of Windows
2000 Server.

You want to install, configure and test all 2000 servers before shipping
them to your branch offices. You want the users at the branch offices to
enter the serial numbers and computer names once they receive the computers.

What should you do?

A. Install Windows 2000 Server on the computers by using an Unattend.txt
file, and then use the Registry Editor to remove the computer name and
license details.
B. Start the installation from an MS-DOS boot disk. Install Windows 2000
Server on the computers from an existing server by running the Winnt command
with the /PreInst switch.
C. Install Windows 2000 Server on the computers. Use Setup Manager to create
a sysprep.inf file for sysprep.exe. Place the sysprep.inf on the computers
and run sysprep -nosidgen.
D. Create an Unattend.txt file bu using Setup Manager. Include the line
OemPreinstall=YES in the Unattend.txt file. Use this file to perform the
installation.


Answer: C


82. You are preparing to install Windows 2000 Server on a new computer. The
computer is connected to a network that includes Windows 98 computers and
Windows 2000 Server computers.

You want to install Windows 2000 Server from source files that are located
on a server on the network.
What should you do?

A. Start the new computer by using a Windows 98 network boot disk. Connect
to the network server. Run Winnt32.exe.
B. Start the new computer by using Windows 98 network boot disk. Connect to
the network server. Run Winnt.exe.
C. On a Windows 2000 Server computer, use Makebt32.exe to create
installation startup disk. Start the new computer by using the first disk.
D. On a Windows 2000 computer, format a floppy disk. Copy NTLDR, boot.ini,
Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the
disk.


Answer: B


83. Your network has Windows 2000 professional client computers and Windows
NT Workstation 4.0 client computers. The network uses TCP/IP as the only
network protocol.
One server on the network acts as WINS server and DNS server. The IP address
of this server is 192.168.1.10. All of the client computers are configured
to use this server for the DNS and WINS services.

Users of Windows NT Workstation computers cannot connect to a file server
named FS_1. However, users of Windows 2000 Professional computer can access
FS_1.
FS_1 has a statically assigned address of 192.168.1.11. The TCP/IP settings
for FS_1 are shown in the Exhibit.

<img src="./70-215/images/Q83.gif">

Which change should you make to allow Windows NT Workstation computers to
connect to FS_1?

A. Add the WINS address used by the Windows NT Workstation computers and
select the Enable LMHOSTS lookup check box.
B. Select Enable LMHOSTS lookup checkbox and import Lmhosts file used by the
Windows NT Workstation computers.
C. Select Enable NetBIOS over TCP/IP option button and add the WINS address
used by the Windows NT Workstation computer.
D. Select the Use the NetBIOS setting from the DHCP server option button and
add the WINS address used by the Windows NT Workstation computer.


Answer: C


84. Your domain includes numerous domain controllers. One of the domains
controllers is malfunctioning, and a disk with the following ARC path is not
responding:
multi(1)disk(0)rdisk(1)partition(1).

<img src="./70-215/images/Q84.gif">

The nonresponsive disk needs to be replaced.

Which disk should you replace? (See the exhibit)

A. Controller 1 - Disk 1
B. Controller 2 - Disk 1
C. Controller 2 - Disk 3
D. Controller 2 - Disk 4


Answer: B


85. You are the administrator of a Windows 2000 Server computer. The server
contains a RAID-5 array that is configured as a volume D and an 18-GB hard
disk that is configured as volume C. Volume D is formatted as NTFS, contains
60GB of data, and has 2GB of free disk space. Volume C is formatted as FAT32
and has 16GB of free disk space.

The server is used to store user home folders. Most of the data in the home
folders has been encrypted with the encrypted with the encrypted file
system.
You estimate that the server will need an additional 10-GB disk space to
meet user needs. However, you will not be able to purchase additional hard
disks for three months.

You want to immediately free at least 10-GB of the disk space. You do not
want to compromise the security of the user's files.
What should you do?

A. Instruct the users to move at least 10-GB of data to another file server
that has EFS.
B. Create additional shared folders on volume C. Move 10-GB of data to the
new, shared folders.
C. Copy at least 10-GB of data to a writable CD-ROM. Delete these files from
the server.
D. Enable the compression attribute for the volume, and compress the users'
home folders. Ensure that EFS remains enabled on the home folders.


Answer: A


86. You are the administrator of Windows 2000 Server computer. Volume D is
formatted as NTFS. Volume D contains folders that are shared by departments
within your company.
You want to limit the amount of disk space that the shared folders can
store. A user named Richard has stored 10GB of files in the shared folders.
Richard's files are using more disk space on the shared folders than any
other user's files.
You enable disk quotas on Volume D and create a default quota entry. You set
the quota limit to 1.1 GB and select the Deny disk space to users exceeding
quota limit check box.
When Richard attempts to encrypt the files in his home folder using the
encrypted file system he receives the following error messages, 'There is
insufficient disk space to complete the operation'.

You need to allow Richard to encrypt the files in his home folder.
Which three actions must you have? (Choose Three)

A. Create a quota entry for Richard, and select the Do not limit disk space
check box.
B. Instruct Richard to encrypt the files in his home folder.
C. Run the Cipher.exe/d command
D. Enable the compression attribute on Richard's home folder.
E. Set the Richard's quota limit to equal the amount of disk space used by
the files in his home directory.
F. Set the default quota entry on volume D to 12GB, and clear the Deny disk
space too users exceeding quota limit check box.


Answer: A,B,E


87. You are installing a new computer names Svr2.justtogs.com on your
Windows 2000 network. Part of the network is shown in the exhibit.

<img src="./70-215/images/Q87.gif">
<img src="./70-215/images/Q87a.gif">

You want to enter the appropriate TCP/IP addresses for the subnet mask and
the default gateway for Svr2.justtogs.com.

Which subnet mask and default gateway should you use? (See the Select and
Place exhibit).

A. Subnet Mask 255.255.0.0 Default Gateway 10.1.10.100
B. Subnet Mask 255.255.255.0 Default Gateway 10.1.10.100


Answer: A


88. Your network contains NetWare 4.0 Servers. You have successfully
installed Client Service for NetWare on Windows 2000 Professional computers,
and Gateway Service for NetWare on Windows 2000 Server Computers.

You recently added a new Windows 2000 Server computer to the network and
installed Gateway Service for NetWare on it. However, the server is unable
to connect to any NetWare servers.

What should you do on the new Windows 2000 Server computer to resolve this
problem?

A. Enable NWLink NetBIOS.
B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use
the correct Ethernet frame type.
C. Install RIP routing for IPX.
D. Install the SAP Agent.


Answer: B


89. You are the administrator of a Windows 2000 Server network that runs in
mixed mode. You install a new Windows 2000 Server computer. You create and
share a new HP LaserJet 4L printer.

Your Windows 2000 Professional client computers can print to the new printer
successfully. However, when users try to connect to the printer from Windows
NT Workstation 4.0 client computers, they receive the dialog box shown in
the exhibit.
(Exhibit)

<img src="./70-215/images/Q47.gif">

You want the printer driver to be installed automatically on the Windows NT
Workstation computers. What should you do?

A. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folders on
all Windows NT Server 4.0 computers still configured as BDCs.
B. Copy the Windows NT 4.0 printer drivers to the Netlogon shared folder on
the PDC emulator.
C. Change the sharing options on the printer to install additional drivers
for Windows NT 4.0 or Windows 2000.
D. Copy the Windows NT 4.0 printer drivers to the
Winnt\System32\printers\drivers folder on the Windows 2000 print server.
E. Change the default gateway address on Srv2.sales.justtogs.com to
10.5.20.100.


Answer: C


90. You are the administrator of the Windows 2000 Server network shown in
the exhibit.
(Exhibit)

<img src="./70-215/images/Q45.gif">

Users in the Research group and the Executives group have permission to
access the Internet through a Windows 2000 Server computer running Microsoft
Proxy Server. These users must enter their proxy server user names and
passwords to connect to the proxy server, to the Internet, and to your local
intranet server.

The users who do not access the Internet do not have user accounts on the
proxy server and, therefore, cannot connect to the intranet server.

You want all users to be able to connect to the intranet server without
entering a separate user name and password. What should you do?

A. Move the intranet server to the client segment of the network.
B. Move the proxy server to the server segment of the network.
C. Configure each client computer to bypass the proxy server for local
addresses.
D. Configure each client computer to use port 81 for the proxy server.


Answer: C


91. You are the administrator of a Windows 2000 Server computer. The
computer is configured to have a single 18-GB drive, which contains the
operating system files. This drive also contains a shared folder where five
network users store their Microsoft Excel files.

You want to prevent each network user from using more than 1GB of space in
the shared folder.

Which action or actions should you take to achieve this goal? (Choose all
that apply)

A. Create a quota entry for Everyone account. Set the quota limit to 1 GB.
B. Enable disk quotas on the volume.
C. Set the default disk quota limit to 1 GB.
D. Select the Deny disk space to users exceeding quota limit check box.
E. Upgrade the disk to a dynamic disk.


Answer: B,C,D


92. You edit the registry on your Windows 2000 Server and reboot. The
computer stops responding before you reach the login screen. How do you
restore the computer's previous configuration?

A. Boot into Safe Mode. Run REGEDIT and click File, Restore Previous
Registry.
B. Start the computer using Recovery Console. Run FIXBOOT C:. Reboot.
C. Run the emergency repair process and choose "Registry Restore." Reboot.
D. Restart the computer and choose the "Last Known Good Configuration" as it
boots.


Answer: D


93. You install a second modem on a Windows 2000 Server computer configured
with Routing and Remote Access. Dial-in users report that they are unable to
connect to the server by using this new modem.

What can you do to help find out the cause of the problem? (Choose one).

A. Use the Routing and Remote Access snap-in to find out whether the ports
for both modems are operational.
B. From a command prompt, run the Net Config Server command.
C. From a command prompt, run the Net Statistics command.
D. Use Regedit32 to view the Error Control value in the
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RemoteAccess Key.


Answer: A


94. Your Windows 2000 Server computer uses a non-Plug and Play EISA network
adapter configured to use IRQ 11. You add a second PCI network adapter and
restart the computer. Device Manager reports an IRQ conflict between the two
network adapters. Both adapters are trying to use IRQ 11.

You want to resolve the problem. What should you do?

A. Use Device Manager to change the IRQ for the original network adapter to
IRQ 9.
B. Use Device Manager to change the IRQ for the original network adapter to
IRQ 10.
C. Edit the CMOS settings on the computer to reserve IRQ 11 for non-Plug and
Play devices.
D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and
Play devices.


Answer: C


95. You are configuring a Windows 2000 Server computer as a Routing and
Remote Access server for a Branch office. You discover that an incorrect
driver was installed during the installation of the modem.

You attempt to remove the modem by using Phone and Modem Options in Control
Panel. After each attempt to remove the modem by using this method, the
computer stops responding.

You restart the computer again. You must install the correct driver for the
modem as quickly as possible.

What should you do?

A. Use the Add/Remove Hardware wizard to uninstall the modem. Restart the
server.
B. Shut down the server, then remove the modem card, and restart the server.
Shut down the server again, insert the modem card, and restart the server.
C. Delete all references to modems in the registry.
D. Run the Modem troubleshooter and remove the modem when prompted. Restart
the server.


Answer: A


96. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet
adapter. You are replacing the integrated adapter with a new 100-MB Ethernet
adapter.
You install the new adapter in an available PCI slot. When you restart the
computer, you receive error messages in the System log stating that the new
adapter is missing or is not working.

What should you do to resolve the problem?

A. Create a new hardware profile.
B. Use Device Manager to remove the integrated 10-MB Ethernet adapter.
C. Use Device Manager to disable the integrated 10-MB Ethernet adapter.
D. Delete the device driver for the integrated 10-MB Ethernet adapter from
the Systemroot\system32\Driver Cache folder.


Answer: C


97. You are a member of the Enterprise Admins group at Trey Research. You
create and share a printer named HPColorL2 on a Windows 2000 Server computer
named treyresearch.local. You grant Print permission only to the Domain
Local group named CompanySales. Later, you add a new child domain named
london.treyresearch.local.

Clair Hector is a member of the global group named LondonSales in the
london.treyresearch.local domain. Clair reports that she is unable to send a
print job to the HPColorL2 printer.
You want all members of the LondonSales group to be able to print to the
HPColorL2 printer.

What should you do?

A. Add the LondonSales group to the CompanySales group.
B. Add the CompanySales group to the LondonSales group.
C. Change the CompanySales group to a universal group.
D. Change the LondonSales group to a universal group.


Answer: A


98. You are the network administrator of the litware.com domain. LitWare,
Inc., has its main office in Dallas and branch offices in New York, Phoenix,
and Seattle. A Windows 2000 Server computer named web1.litware.com is
running Internet Information Service (IIS). This computer is located in the
main office.

Web developers in Dallas, New York, Phoenix, and Seattle need to update each
of the Web sites and virtual directories located on web1.litware.com.
Different updates will be occurring simultaneously. You want to ensure that
each developer can use Microsoft FrontPage to update the sites successfully
and to manage content changes.

What should you do?

A. Run the fpremadm command to install the server extensions for IIS on
web1.litware.com. Configure the server extensions for each web site.
B. Run the fpsrvadm command to install the server extensions for IIS on
web1.litware.com. Configure the server extensions for each Web site.
C. Install the server extensions for IIS on web1.litware.com by selecting
Upgrade Extensions from All Tasks menu in IIS. Configure the server
extensions for each Web site.
D. Configure the server extensions for each Web site by selecting Configure
Server Extensions from the All Tasks menu in IIS. Configure the server
extensions to allow each developer update access for each Web site.


Answer: D


99. You are the administrator of a Windows 2000 Server computer named
Server1. You create a Distributed file system (Dfs) root named Public. You
add a shared folder named Docs as a Dfs node under the root.

The share permissions and NTFS permissions for Public and Docs are shown in
the following table.
(Exhibit).

<img src="./70-215/images/Q42.gif">

A user named Maria is a member of the Users and Training user groups. When
Maria attempts to save the file \\Server1\Public\Docs\memo.doc, she receives
the following error message: "Access denied."

You want Maria to be able to change and delete all files in the Docs folder.
You do not want her to have more access than necessary.

What should you do?

A. Add Maria to the Domain Admins group.
B. Add Maria to the local Administrators group.
C. Set the share permissions for the Public folder to grant Maria Full
Control permission.
D. Set the share permissions for the Docs folder to grant Maria Change
permission.
E. Set the NTFS permissions for the Public folder and its subobjects to
grant Maria Modify permission.
F. Set the NTFS permissions for the Docs folder and its subobjects to grant
Maria Full Control permission.


Answer: D


100. You install a new tape drive on your Windows 2000 Server. You reboot,
log in, and are prompted, "irq1_not_less_or_equal." The Server contains
important data that must be accessed by users on the network at all times.
How do you bring the server back online as soon as possible?

A. Disconnect the tape drive and reboot.
B. Perform an emergency repair and select "Fast Repair" and reboot.
C. Boot into Safe Mode. Remove the new driver in Device Manager and reboot.
D. Restart the computer using Recovery Console. Disable the new driver.
Restart the computer and disable the new tape device driver.


Answer: D


101. Your network uses TCP/IP as the only network protocol. Devices on the
network are configured to use IP address from the private 10.0.0.0 range.
All the client computers on the network runs Windows 2000 Professional. The
network includes Windows 2000 Server computers and UNIX servers.
User's print jobs are sent to shared printers on a Windows 2000 Server
computer named PrintServ that directs the print jobs to print devices
attached directly to the network.

You have a high-capacity print device that is attached to one of the UNIX
servers. The UNIX computer uses the LPR printing protocol, and it's IP
address is 10.1.1.99. The name of the printer queue is GIANT. You want users
to be able to connect to this printer from their computers.
What should you do?

A. Install Microsoft Print Services for Unix on PrintServ. Create a network
printer on users' computers, and specify that the printer URL is
LPR://10.1.1.99/GIANT.
B. Install Microsoft Print Services for Unix on users' Computers. Share this
printer and connect to it from users' computers.
C. Create a network printer on PrintServ, and specify that the printer name
is \\10.1.1.99\GIANT. Share this printer and connect to it from users'
computers.
D. Create a local printer on PrintServ. Create a new TCP/IP port for an LPR
server at address 10.1.1.99 with a queue name of GIANT. Share this printer
and connect to it from users' computers.


Answer: D


102. You are the administrator of a Windows 2000 Server network at Blue Sky
Airlines. You configure a server named
print10.marketing.blueskyairlines.local as a print server at the Los Angeles
site. You create and share a variety of printers on the server for use by
employees in the marketing.blueskyairlines.local domain.

You want to review the configured properties of all of the shared printers
on the print10.marketing.blueskyairlines.local server. You want to perform
this review from a Windows 2000 Professional computer at the London site of
Blue Sky Airlines.

What should you do?

A. Use your Web browser to connect to
<http://print10.marketing.blueskyairlines.local/printers>.
B. Use your Web browser to connect to
<http://print10.blueskyairlines.local/printers>.
C. Run the net view \\print10 command.
D. Run the net view \\print10.blueskyairlines.com command.


Answer: A


103. Your network contains Windows 2000 Server computers and NetWare server
computers. The NetWare client computers on your network use only the IPX/SPX
transport protocol.
You install a database server on a Windows 2000 Server computer named
DB_serv. This server has the NWLink IPX/SPX/NetBIOS compatible transport
protocol, TCP/IP and the NetBEUI protocol installed. NWLink uses the 802.2
frame type and a network number of 77. In addition, client for Microsoft
networks and file and printer sharing for Microsoft networks are installed
on DB_serv.

The NetWare client computers that are on the same subnet as DB_serv can
connect to DB_serv and the database stored on it. However, the NetWare
client computers that are on the other subnets cannot connect to DB_serv.

What should you do to allow the NetWare client computers on the other
subnets to connect to the DB_serv?

A. Install gateway service for NetWare on DB_serv.
B. Install the SAP Agent on DB_serv.
C. Configure the NetWare client computers on the other subnets to use
NetBEUI.
D. Configure IPX/SPX on the NetWare client computers on the other subnets to
use a network number of 77.


Answer: D


104. You want to measure physical disk performance on your Windows 2000
Server. You want to run System monitor locally on the server. You also want
to ensure that System Monitor has the least impact on other processes
currently running.

What can you do? (Choose two)

A. From a command prompt, run the start/low perfmon command.
B. From a command prompt, run the start/normal perfmon command.
C. From a command prompt, run the start /min perfmon command.
D. Open System Monitor, and then use Task Manager to set the priority of the
Mmc.exe process to Low.
E. Open System Monitor, and then use Task Manager to set the priority of the
Mmc.exe process to normal.


Answer: A,D


105. Your Windows 2000 Server computer contains a 14-GB hard disk formatted
as FAT32. This computer has been operating on your network for several
months.

You want to find out whether you need to defragment the disk to improve
performance.
What should you do first?

A. From a command prompt, convert the disk to NTFS and then run the Chkdsk
command.
B. From disk management, format the disk as NTFS and then run the Chkdsk
command.
C. Use disk Defragmenter to analyze the disk.
D. Use disk Defragmenter to defragment the disk.


Answer: C


106. Your Windows 2000 Server computer has five hard disks. Four 100-GB hard
disks on the server are configured as a single striped volume. You want to
reconfigure the four disks so that the volume is fault-tolerant and has as
much space as possible for data storage. You want to use only the existing
hardware.

What should you do?

A. Convert the disk to a dynamic disk. Shut down and restart the server.
B. Back up the data on the striped volume and then delete the striped
volume. Create a RAID-5 volume on the the four disks. Restore data to the
new RAID-5 volume.
C. Backup the data on the striped volume and then delete the striped volume.
Create two mirrored volumes. Shut down and restart the server. Restore the
data to the new mirrored volumes.
D. Back up the data on the stripped volume, and then delete the stripped
volume. Create a spanned volume from the first two disks. Create a second
spanned volume from the last two disks. Mount the root of the second spanned
volume in the root of the first spanned volume. Restore the data to the
first spanned volume.


Answer: B


107. You administer a network with NT Server 4.0 computers, NT Workstation
4.0 computers, and several UNIX computers. The network consists of a single
Windows NT domain.

You want to upgrade a Windows NT Server computer named Server1, which is
currently a BDC, to Windows 2000 Server. Your existing DNS server is a UNIX
computer that supports SRV (service) records and is configured to accept
dynamic updates. The existing WINS server is another Windows NT Server
computer.

You want to configure Server1 as a domain controller in a new Active
Directory forest. You want the existing Windows NT domain accounts to be
upgraded to Active Directory.

You want to upgrade Server1 with the least impact on the network. What
should you do?

A. Promote Server1 to the PDC of the domain. Run Windows 2000 Setup on
Server1.
B. Run Windows 2000 Setup on Server1. Configure Server1 as a DNS server and
WINS server.
C. Run Windows 2000 Server Setup on Server1 and select the PDC AutoConfigure
option during Setup.
D. Set up Server1 as a WINS server. Run Windows 2000 Server Setup on
Server1.


Answer: A


108. You are a member of the Backup Operators group in the arborshoes.com
domain. You are not a member of any other groups within the domain. You
install new backup software on a Windows 2000 Server computer. You are
logged on to a Windows 2000 Server computer named bcksrv3.arborshoes.com.

You try to configure the software for a tape backup device, but the
configuration fails during backup. The documentation for the software
indicates that the current tape backup device driver is out of date.

What should you do?

A. Run the RUNAS command to start the Device Manager, using your own
username and password. Then click the Update Driver command button on the
driver tab for the tape backup device.
B. Instruct a domain administrator to run the RUNAS command to start the
Device Manager, using his own username and password. Then click the Update
Driver command button on the driver tab for the tape backup device.
C. Update the device driver by using the Add/Remove Hardware Wizard.
D. Open Device Manager, and then click the Update Driver command button on
the driver tab for the tape backup device.


Answer: B


109. You are the administrator responsible for testing and deploying new
service packs for Windows 2000. Your forest has two trees, with four domains
in each tree, as shown in the exhibit.
See the exhibit.

<img src="./70-215/images/Q246.gif">

For the testing of each service pack, you plan to deploy the service pack to
the support.IS.contoso.com domain and the support.IS.litware.com domain, but
to no other domains. You plan to use a Group Policy to configure and
administer the service pack package.

You need to minimize the complexity and administration of the service pack
package, and minimize network traffic between domains.

You create a Microsoft Windows Installer Package for the service pack. What
should you do to configure the Group Policy?

A. Configure the Windows Installer Package in a Group Policy for the
litware.com and contoso.com domains.
B. Configure the Windows Installer Package in a Group Policy for the
support.IS.litware.com and support.IS.contoso.com domains.
C. Configure two sites, with one tree in each site. Configure the Windows
Installer Package in a Group Policy for each site.
D. Configure one site that contains both trees. Configure the Windows
Installer Package in a Group Policy for the site.


Answer: B


110. You are installing Windows 2000 Server on a new computer by using the
Windows 2000 Server CD-ROM. The computer has three 100 GB physical hard
disks: Disk0, Disk1, and Disk2. The disks do not have any partitions
defined.

You want to use as much space on Disk0 as possible for the partition on
which Windows 2000 Server is installed. You want as much space as possible
across all three physical disks to be accessible by using a single drive
letter in Windows 2000.

What should you do?

A. Install Windows 2000 Server on a 4 GB FAT partition on Disk0. After
Setup, create a 96 GB NTFS partition on Disk0. Create a volume set that
combines the 96 GB NTFS partition with the two remaining 100 GB disks.
B. Install Windows 2000 Server on a 4 GB NTFS partition on Disk0. After
Setup, configure all three disks as dynamic disks. Create a volume set from
the three 100 GB disks.
C. Install Windows 2000 Server on a 100 GB NTFS partition on Disk0. After
Setup, create a volume set that combines the three 100 GB disks.
D. Install Windows 2000 Server on a 100 GB NTFS partition on Disk0. After
Setup is complete, create a 100 GB partition on Disk1 and on Disk2. Mount
the partitions on Disk1 and Disk2 as subdirectories on the 100 GB partition
on Disk0.


Answer: D


111. You are the administrator of a network that consists of five Windows
2000 Server computers and 200 Windows 2000 Professional computers.
You want to deploy an update for an application that is used on the Windows
2000 Professional computers. You want users to automatically install the
update when they log on to the domain.

What should you do?

A. Place the application update in the root folder of a Distributed file
system (Dfs).
B. Create a Microsoft Windows installer package for the application update.
Configure RIS to use the package.
C. Create a Microsoft Windows Installer package for the application update.
Apply the package to the Local Computer Policy on all the computers.
D. Create a Microsoft Windows Installer package for the application update.
Apply the package to a Group Policy.


Answer: D


112. Your network has two domains with approximately 1,000 users in each
domain. Both domains are Active Directory domains that run in native mode.
Some of the users have portable computers and access the network by using
remote access.

The managers at your company are concerned that remote access might pose a
security risk. They want to see a list that shows which users are allowed to
use remote access.

How should you configure the remote access to display a list of authorized
users?

A. Create a group named RAS_USERS. Add users who are permitted to dial in to
the network. Create a remote access policy that allows only this group to
use the remote access server. To show who has access to the remote access
server, display the members of the group.
B. Create a group named RAS_USERS. Add users who are allowed to dial in to
the network. Set the remote access permission for this group to allow
access. To show who has access to the remote access server, display the
members of the group.
C. Write a script for the windows scripting host. In the script, iterate
through the members of the users container. Display the name of any user who
has the remote access permission set to Allow access.
D. Use the default remote access policy to view users and groups who have
been granted remote access permission.


Answer: A


113. You are the administrator of a Windows 2000 Active Directory network.
The network consists of a single domain. The domain includes 20 Windows NT
workstation 4.0 client computers. All other client computers are Windows
2000 Professional client computers.

You create a Windows NT 4.0 default user policy on the Windows 2000 Server
computer that is configured as the PDC emulator. This default user policy
denies access to Network Neighborhood.
You then install terminal services on one of the servers and terminal
services client on the 20 Windows NT workstation client computers.

You find that the users of the terminal server can still browse the network
when they open My Network Places. You want to prevent all default users from
browsing the network.
What should you do?

A. Modify the Windows NT policy template file so that you can restrict
access to both My Network Places and Network Neighborhood. Save the policy
file on the Terminal server.
B. Copy the Windows NT policy file to the 20 Windows NT workstation
computers.
C. Create a Windows 2000 Group Policy that denies user access to My network
places.
D. Edit the local registry on the Windows NT workstation computers to deny
access to Entire Network in Network Neighborhood.


Answer: C


114. You are the administrator of the A. Datum Corporation network shown in
the exhibit.

<img src="./70-215/images/Q114.gif">
<img src="./70-215/images/Q114a.gif">

You want to use a Virtual Private Network (VPN) so that 100 users in the
Phoenix office can access resources in the Portland office.

How should you configure the VPN server in the Portland office? (See Select
and Place exhibit).

A. Start IP address: 10.3.0.1 End IP address: 10.3.0.100
B. Start IP address: 10.4.0.1 End IP address: 10.4.0.100


Answer: A


115. Your company has a Routing and Remote Access server at its main office.
One of the branch offices also runs Routing and Remote Access on a server
that has one modem. This server is configured to use demand-dial routing to
connect to the main office. This server is part of the company's Active
Directory domain, which runs in native mode.

Some employees at the branch office use the branch office server to access
their files from home. The manager of the branch office reports that
sometimes none of the users in the office can connect to the main office.
When you examine the event log, you find that users have been connecting to
the server during working hours.

The manager wants users to be able to dial in to the server only between
6:00 p.m and 8:00 a.m. However, the manager still wants users to be able to
log on at any time when connected directly to the LAN.

What should you do to limit only dial-in access to these times?

A. Change the logon hours for user accounts to deny logons between 8:00 AM
and 6:00 PM.
B. Set the remote access policy to deny connections between 8:00 AM and 6:00
PM.
C. Create one batch file to start remote access connection manager service,
and create another batch file to stop it. Schedule the stop batch file to
run at 8:00a.m every day and start batch file to run at 6:00p.m every day.
D. Create two user accounts, for each user. Grant dial-in permissions to one
account, and deny dial-in permissions to the second account. Change the
logon hours for the dial-in accounts to deny logon between 8:00a.m to
6:00p.m.


Answer: B


116. Your network includes Windows 2000 Professional client computers,
Windows NT Workstation 4.0 client computers, Windows 95 client computers and
UNIX client computers. Users of the Windows operating systems sent print
jobs to shared printers on a Windows 2000 Server computer named PrintServ.
The UNIX client computers support the LPR printing protocol.


You want to make the shared printers on PrintServ available to the UNIX
computers.
What should you do?

A. Configure each of the printers to use an LPR port.
B. Install Microsoft print services for Unix on PrintServ.
C. Configure each of the printers to support TCP/IP printing.
D. Use the SRVANY utility from the Windows NT Resource Kit to run the LPR
program as a service.


Answer: B


117. You administer a Windows 2000 Server network consisting of 500 Windows
2000 Professional computers and 50 Windows 2000 Servers. You configure two
domains- litware.local and dev.litware.local. You enable auditing in the
domain policy object for litware.local to audit the success and failure of
object access.

You install a printer on a domain controller named dc7.dev.litware.local.
You configure auditing on this printer to observe successful and failed
attempts to print by the Research universal group. You view the security log
for dc7.dev.litware.local one week later and find that no events have been
written to the log. You know users in the Research universal group have used
the printer repeatedly. What should be done to fix the problem?

A. Enable auditing in the domain policy objects of dev.litware.local to
audit the success and failure of object access.
B. Audit the domain policy object for litware.local to enable auditing of
the success and failure of directory service access.
C. Configure auditing of the success and failure of object access in the
default domain controller policy object on the domain controller
organizational unit (OU) of the dev.litware.local domain.
D. Configure auditing of the success and failure of object access in the
default domain controller policy object on the domain controller
organizational unit (OU) of the litware.local domain.


Answer: A


118. Litware Inc., has two offices named East and West. The Windows 2000
Server computer named east.litware.com is a domain controller in the East
office, and the Windows 2000 Server computer named west.litware.com is a
domain controller in the west office. Both offices create tape backups of
server applications, data and System State data. The tapes are stored in the
East office.

You need to restore the System State data to west.litware.com.

What should you do?

A. Run windows backup on east.litware.com, and restore the System State data
to the systemroot folder on the west.litware.com.
B. Restart east.litware.com in directory services restore mode. Run windows
backup on east.litware.com, and restore the System State data to the
systemroot folder on west.litware.com.
C. Restart east.litware.com and west.litware.com in directory services
restore mode. Run windows backup on east.litware.com, and restore the System
State data to the systemroot folder on west.Litware.com.
D. Ship the west.litware.com backup tapes to the west office. Run windows
backup on west.litware.com, and restore the System State data to the
systemroot folder.


Answer: D


119. Your network contains Windows 2000 Professional client computers that
use TCP/IP as the only network protocol. The network also contains Windows
3.1 computers that use the NetBEUI protocol.

You install a new Windows 2000 Server computer on the network. You configure
this server to use NetBEUI and TCP/IP. All of the Windows 2000 Professional
client computers and Windows 3.1 computers are able to access the server.

When you browse network resources on the server, you notice a delay before a
list of servers is returned.
What should you do to remove this delay?

A. In the Advanced settings for the network adapter, disable NetBEUI from
Client for Microsoft networks.
B. In the Advanced settings for the network adapter, disable NetBEUI from
file and printer sharing for Microsoft network.
C. In the properties of the network adapter, disable Client for Microsoft
Networks.
D. In the Advanced settings for TCP/IP, enable NetBIOS over TCP/IP.


Answer: D


120. You administer a Windows 2000 Server that hosts an important network
share named REPORTS on an NTFS partition. The permissions for REPORTS are as
follows:

Type of Permission Account Permission
Share Users Change
NTFS Users Full Control

The CEO of your company has called to request that particular files in the
REPORTS folder be prevented from being modified immediately. Many of the
files are currently in use. What two actions should you take to fulfill this
request?

A. Disconnect users from the REPORTS folder.
B. Modify the NTFS permissions of the REPORTS folder.
C. Modify share permissions of the REPORTS folder.
D. Disconnect users from the network.
E. Modify NTFS permissions for the ten files.


Answer: A,E


121. You are installing Windows 2000 Server on a new computer that has a
single 10-GB SCSI disk. The disk controller is not included on the current
Hardware Compatibility List (HCL). You start the computer by using the
Windows 2000 Server CD-ROM.

When the computer restarts at the end of the text mode portion of Windows
2000 setup, you receive the following STOP error:
"INACCESSIBLE_BOOT_DEVICE."

Which two actions should you take to eliminate the STOP error? (Choose Two)

A. Restart the Windows 2000 Setup by using the Windows 2000 Server CD-ROM.
B. Select Safe Mode from the Windows 2000 boot menu.
C. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
D. Install a driver for the SCSI controller from a floppy disk.
E. Use Device Manager to update the driver for the SCSI controller.


Answer: A,D


122. The network you administer has two organizational units named North
America and South America. Within each OU are subordinate OU's named
Marketing, Graphics, and Sales. You suspect someone is trying to log into
your domain by guessing account names and passwords. How can you configure
your network so that you can detect which computer is being used for these
log on attempts?

A. Edit the default domain controller policy object to audit account logon
failures.
B. Edit the default domain controller policy object to audit resource access
failures.
C. Edit the North and South America OU group policy objects to audit log on
failures.
D. Edit the GPO of each subordinate OU to audit resource access failures.


Answer: A


123. Your Windows 2000 Server computer has two disks attached to an EIDE
disk controller. You need additional disk space. You add a new SCSI disk
controller that has six new disks attached. The new controller is not
included on the Hardware Compatibility List (HCL). When you restart the
computer, Windows 2000 does not detect the new controller.

What can you do to install the new controller? (Choose two).

A. Use Device Manager to turn off IRQ steering in the properties of the
standard PC. Then restart the computer.
B. Use Disk Management to restore the basic configuration. Then restart the
computer.
C. Use the Add/Remove Hardware wizard to add a new SCSI and RAID controller
from the disk supplied by the manufacturer.
D. Use Disk Management to rescan the disk.
E. Use the manufacturer's setup program to install the driver for the SCSI
disk controller.


Answer: C,E


124. You administer a large network consisting of 6 domain controllers, 4
member servers, and 500 clients. All computers are using Windows 2000 Server
or Windows 2000 Professional. TCP/IP is the only protocol in use. You want
to configure the network so that all computers can resolve the addresses of
all other computers using DNS. There must be redundancy built into the
system, in case the primary name server fails. How should you implement DNS
on your network?

A. Configure one server with a standard primary zone for the domain and
configure at least one server with a standard secondary zone.
B. Configure one server responsible for an Active Directory integrated
primary zone; configure at least one server responsible for a standard
secondary zone.
C. Configure one server with a standard primary zone for the domain and
configure at least one server responsible for an Active Directory integrated
primary zone.
D. Configure at least two servers responsible for the Active Directory
integrated primary zone of the domain.


Answer: D


125. Your company's network includes Windows 3.1 client computers, Windows
95 client computers, and Windows 2000 Professional client computers. The
company's manufacturing facilities run 24 hours per day.

The company has developed its own 32-bit application that collects
information from the manufacturing process so that workers on one shift can
find out what was manufactured during the previous shift. The company wants
to make the application available on all of the client computers by using
Terminal Service on a Windows 2000 Server computer. This server will not run
as a domain controller.
You install Terminal Services.

Users want to collect information on the manufacturing process from other
shifts. The company wants users to shut down their computers at the end of
their shifts, and to leave the application running on the Terminal Server.

What should you do?

A. Set the Delete Temporary Folders On Exit setting for the Terminal server
to NO.
B. Set the Remote Desktop Protocol (RDP) on the server to override user
settings, and set the End Disconnected Sessions setting to Never.
C. At the Terminal server, grant the users the right to log on as a batch
job.
D. Do nothing. User programs are always terminated on disconnection.


Answer: B


126. You are configuring Internet access for a remote site of your company.
The remote site has 12 computers on a private network with a 56Kbps
connection to the Internet. Network address translation (NAT) and the AT
feature of routing and remote access will be used. You test the
configuration and find that web sites can only be reached by their IP
address and not their fully qualified domain name. What must you do to fix
this problem? (Choose two)

A. Configure each of the computers in the remote site with the address of a
WINS server.
B. Configure each of the computers in the remote site with the address of a
DNS server on the Internet.
C. Configure a filter on the NAT Server to pass DNS packets.
D. Create a host file on each of the NAT Servers.


Answer: B,C


127. Your company recently hired you to administer its Windows 2000 network.
The network includes 100 Windows 2000 Server computers. These servers are
members of a Windows 2000 domain and are contained in an OU named servers.

You discover that each Windows 2000 Server computer has local security
auditing enabled and that each server is configured to audit different
events.

You want to standardize the events that are audited on the servers. You also
want to ensure that auditing remains standardized even if the audit policy
changes.

What should you do?

A. Configure a local auditing policy on each domain controller.
B. Configure each server to implement a standardized auditing policy.
C. Configure the standardized auditing policy on all domain controllers in
the domain.
D. Configure a local group policy object on each server in the servers OU.
E. Configure a group policy object, and apply it to the servers OU.


Answer: E


128. Your Windows 2000 Server network is a routed network that uses TCP/IP
as the only network protocol. All of the Windows 2000 Professional computers
and Windows NT Workstation 4.0 computers are members of the single domain.

You install Gateway Service for Netware on a Windows 2000 Server computer.
You install a second network adapter on the gateway server. The network is
now configured as shown in the exhibit.
See the exhibit.

<img src="./70-215/images/Q128.gif">

You want to configure Adapter #1 for communications to and from the
Windows-based client computers exclusively. Which checkbox or boxes in the
Local Area Connection Properties dialog box should you select?
Choose all that apply.

A. Gateway (and client) Services for Netware.
B. Client for Microsoft Networks.
C. File and Printer Sharing for Microsoft Networks.
D. NWLink NetBIOS.
E. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.
F. Internet Protocol (TCP/IP)


Answer: B,C,F


129. You want to delegate the backup and restore responsibilities of all
servers to a new employee named Richard. Richard must not be able to shut
down any servers or uninstall any driver files.

You need to apply the appropriate permissions for Richard.

What should you do?

A. Make Richard a member of the domain admins group.
B. Make Richard a member of the server operations group.
C. Make Richard a member of the backup operators group.
D. Grant Richard the user rights to backup and restore files on all
computers in the domain.
E. Grant Richard read only permission to the volumes from which he needs to
back up and restore files.


Answer: D


130. Your network uses the private IP address 192.168.0.0. You connect via
dialup to a Windows 2000 Server that is configured as a remote access
server. You connect successfully, but receive the error "Request timed out"
when trying to run any IP applications. You check to see if you have been
assigned an IP address, and IPCONFIG indicates that your IP address is
125.22.67.100. What should be done to resolve the problem?

A. Configure the remote access server with the address of a DHCP server.
B. Have the remote access server synchronize itself with all domain
controllers on the network.
C. Configure the remote access server to be a DHCP relay agent.
D. Ensure that the remote access server is able to connect to DHCP and that
the DHCP has the remote access server's subnet within its scope.


Answer: D


131. You are the network administrator for Island Hopper News. The main
office has a Windows 2000 workgroup that includes five Windows 2000 Server
computers and 10 Windows 2000 Professional computers. Currently, no users at
the main office have internet access.
Island hopper news also has two remote offices, each with a Windows 2000
workgroup. None of these offices are networked to another. However, users at
the remote office connect to main office individually to access network
resources.

A server named member2 is located at the main office. Member 2 has two
network adapters, which are designated adapter1 and adapter2. adapter1 is
connected to the LAN, and adapter2 is connected to a DSL modem that is
connected to the internet.
To provide users at the main office with internet access, you enable
internet connection sharing on member 2.
Now, some users in the remote office report that they can no longer access
local network resources. In addition, users at the main office are still
unable to access the internet.

You need to ensure that local network resources are always accessible, and
you need to ensure that users at the main office have internet access. What
should you do?

A. Configure internet connection sharing to be enabled on adapter 1.
B. Configure internet connection sharing to be enabled on adapter 2.
C. Configure network address translation on member 2.
D. Install a proxy server on the company's network.


Answer: C


132. You are the administrator of a Windows 2000 Server network. Users
report that they are unable to access shared folders on one of your servers.

You open My computer on the server and do not find the volumes on dynamic
Disk 3 that contain the shared folders. When you open Disk Management, you
see that Disk 3 is offline.
You confirm that the disk has power and it is attached to your SCSI adapter.
Other disks connected to the adapter appear to be functioning normally.

You want to use Disk Management to resolve the problem. What should you do
next?

A. Rescan the disks on the server.
B. Reactivate disk 3.
C. Remove disk 3 by using disk administration, and restart the computer.
D. Convert disk 3 to a basic disk, and then convert it back to a dynamic
disk.


Answer: B


133. You use computers in two different offices. Your home folder is stored
on a server named UserData01.

You work with many files that are highly confidential. You keep the
confidential files in a folder named Private in your home folder. You need
to maximize the security of the private folder. You also want to be able to
access the folder from the computers in each office.

What should you do?

A. Obtain a signing and sealing certificate from a certificate server, and
install the certificate on the computers you use.
B. Login in at UserData01as a domain administrator, connect to your home
folder and set the encryption attribute.
C. Configure your account to have roaming user profile. Use the properties
of the private folder to set the encryption attribute.
D. Add the cipher/e/s *.* command to your computer's startup script.


Answer: C


134. Your network includes Windows 98 computers and Windows 2000 Server
computers. You are adding a new computer to the network. You plan to install
Windows 2000 Server on the new computer. The computer has one 20 GB hard
disk with no partition defined.

The Windows 2000 Server CD ROM is unavailable. You want to install Windows
2000 server from the source files that are located on a server on the
network. You also want the entire hard disk of the new computer to be used
for the system partition.

What should you do?

A. On another Windows 2000 computer use makebt32.exe to create installation
startup disks. Start the computer by using the first disk.
B. On another Windows 2000 computer format a floppy disk. Copy NTLDR,
boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by
using the disk.
C. Start the new computer by using the Windows 98 network boot disk. Connect
to the server. Run dsclient.exe. Create and format 20GB FAT32 partition.
D. Start the new computer by using the Windows 98 network boot disk. Create
and format a single FAT32 partition. Connect to network server. Run
winnt.exe.
E. Start the computer by using Windows 98 network boot disk. Create and
format a single Fat 32 partition. Start the new computer by using the
Windows 2000 emergency repair disk.


Answer: D


135. Your Windows 2000 Server computer contains a stripe set with parity on
a four-disk array. You convert the stripe set with parity to a dynamic
RAID-5 volume.

Six months later, users report that disk access on the server is slower than
it had been on the previous day. You use Disk Management and discover that
the status of the third disk in the array is Missing.

You want to recover the failed RAID-5 volume.
What should you do first?

A. Replace the third disk and restart the server. Use disk Management to
repair the volume.
B. Ensure that the third disk is attached to the server and has power. Use
Disk Management to reactivate the disk.
C. Ensure that the third disk is attached to the server and has power. Use
Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the new
disk. Restart the computer and allow Windows 2000 to automatically repair
the volume on the extended partition.


Answer: B


136. You configure a new Group Policy Object for your company's Marketing
organizational unit (OU)to prevent users from accessing My Network Places
and from running System in Control Panel. You want the Managers Domain Local
group to have access to My Network Places, but you still want to prevent
them from running System in Control Panel.

What should you do?

A. Add the managers group to the access control list of the GPO. Disable the
permission of the managers group to read and apply the group policy.
B. Add the managers group to the access control list of the GPO. Deny
permission to the managers group to read and apply the group policy.
C. Create a second GPO in the OU. Add the managers group to the access
control list. Allow the managers group to apply the group policy. Deny the
authenticated user group to read and apply the group policy. Configure the
new GPO to deny the ability to run System in Control Panel. Give the new GPO
a higher priority than the original GPO.
D. Create a second GPO in the OU. Add the managers group to the access
control list. Allow the managers group to apply the group policy. Disable
the permission of the authenticated user group to read and apply the group
policy. Configure the new GPO to allow access to My Network Places. Give the
new GPO a higher priority than the original GPO.


Answer: D


137. You are the administrator of the contoso.local domain. You organize the
domain into organization units (OUs) as shown in the exhibit.

<img src="./70-215/images/Q23.gif">

You configure the Local Security Options and other setting for the Default
Domain Policy object. You enable a local security option policy to display a
logon message each time a user attempts to log on.
Suzan Fine, the administrator of the Florida OU, wants to configure a
different logon message for the Orlando OU without changing the other Local
Security Options.

What should Suzan do?

A. Create a new Group Policy object (GPO) in the Orlando OU with the
appropriate logon message. Block policy inheritance for the new GPO.
B. Create a new Group Policy object (GPO) in the Florida OU with the
appropriate logon message. Set the option not to override for the new GPO.
C. Create a new Group Policy object (GPO) in the Orlando OU with the
appropriate logon message. Enable policy inheritance for the new GPO.
D. Create two new Group Policy objects (GPOs) in the Miami and Orlando OUs.
Configure the GPO for the Orlando OU with the appropriate logon message for
the Orlando OU. Place the GPO for the Orlando OU at the top of the priority
list.


Answer: C


138. You share a folder on a Windows 2000 Server computer for users in your
company's London office. You place several subfolders (Marketing, Sales,
Research and Marketing-2) in the London folder.

The Marketing-2 folder is compressed. You want to delete Marketing-2, but
you want to keep all the files that are currently in the folder. You plan to
copy all the files in Marketing-2 into the Marketing folder before deleting
Marketing-2. You want these files to remain compressed. However, you do not
want to compress any existing files in Marketing or compress any other new
files added to Marketing.

What should you do before you delete Marketing-2?

A. Copy all the files from Marketing-2 to Marketing.
B. Move all the files from Marketing-2 to Marketing.
C. Compress Marketing and then copy all the files from Marketing-2 to
Marketing.
D. Compress Marketing and then move all the files from Marketing-2 to
Marketing.


Answer: B


139. You are the network administrator for your company. As part of your
disaster recovery plan, you create an emergency repair disk for each
computer on your network. You also perform full daily backups.

You install a custom application on a server named member1. You restart
member 1 and receive the following error message "Invalid Boot.ini file".

What should you do to restore the boot.ini file?

A. Reboot member 1 by using the Windows 2000 Server CD. Launch Recovery
Console. Run the fixboot command with the appropriate parameters.
B. Reboot member 1 by using the Windows 2000 Server CD. Launch Recovery
Console. Run the fixmbr command with the appropriate parameters.
C. Restart member 1 into safe mode. Launch Windows 2000 backup.
D. Restart member 1 into safe mode. Run the Chkdsk command with the
appropriate parameters.
E. Reboot member 1 by using the Windows 2000 Server CD. Launch Recovery
Console. Run the copy command with the appropriate parameters.


Answer: E


140. You are the administrator of a windows 2000 Active Directory network.
The network consists of a single domain named adatum.local that runs in
native mode. The domain includes 500 member client computers, consisting of
200 Windows 2000 Professional computers and 300 Windows NT workstation 4.0
computers.
You create a group policy for the Research organizational unit (OU) and
configure the policy as shown in the exhibit.

<img src="./70-215/images/Q140.gif">

None of the users in the Research OU who are working at Windows 2000
Professional computers can change the wallpaper on their desktop or the
resolution and color depth of their displays. However, when users log on
from any of the Windows NT Workstation computers in the OU, they can change
all the display settings.

You want to restrict all users of Windows NT Workstation computers in the OU
from changing their desktop wallpaper and from accessing the Settings tab in
display in control panel.
What should you do?

A. Add a new computer to the OU and select the Allow pre-windows 2000
computers to use this account check box.
B. Change the group policy so that it also hides the Background tab.
C. Create a separate group policy for a nested OU that contains all window
NT computers.
D. Configure a Windows NT policy file and place it in the
Winnt\Sysvol\Adatum.local\scripts folder on the PDC emulator.


Answer: D


141. You are the administrator of a Windows 2000 network. You upgrade 50
Windows NT Server 4.0 computers to Windows 2000 and place them in a single
domain. The domain includes 200 Windows 2000 Professional computers and 100
Windows NT Workstation 4.0 computers.

You implement Group Policy objects (GPOs) for each Organizational Unit (OU).
However, you find that these GPOs apply only to users of the Windows 2000
Professional computers.

You want to restrict users of Windows NT Workstation computers from
accessing registry editing tools.
What should you do?

A. Create an OU that contains all NT users and computers. Create a GPO in
the OU that restricts users from accessing registry editing tools.
B. Create a Windows NT system policy file on the primary domain controller.
Configure the policy so that it restricts default users from accessing
registry editing tools.
C. Create a mandatory user profile for NT users that removes shortcuts to
registry editing tools from all NT users' desktops.
D. Install SMS. Run a batch delete job of all occurrences of registry
editing applications on all NT Workstations.


Answer: B


142. Your network uses TCP/IP as the only network protocol. You configure a
remote access server on this network.

Some users report that when they connect to the server they receive the
following message: " IPX/SPX compatible CP reported error 733-The PPP
control network protocol for the network is not available".
If the users allow the connection to continue they are able to connect to
services that use TCP/IP.

You want to prevent this message from being displayed. What should you do?

A. Configure the client computers to use only TCP/IP for the connection to
the remote access server.
B. Configure the client computers to use a defined IPX network address for
the connection to the remote access server.
C. Configure the remote access server to allow IPX based remote access and
demand-dial connections.
D. Configure the remote access server to disable Multilink connections.


Answer: A


143. You install a new computer named Srv34.millertextiles.com on your
Windows 2000 network. Part of the network is shown in the exhibit.
See th Exhibit.

<img src="./70-215/images/Q41.gif">

When you complete the installation of Srv34.millertextiles.com, you find
that you cannot connect to Srv22.admin.millertextiles.com. You examine the
TCP/IP configuration on Srv34.millertextiles.com and find no default gateway
address.

You want to connect from Srv34.millertextiles.com to
Srv22.admin.millertextiles.com. Which default gateway address should you
use?

A. 192.168.1.100
B. 192.168.2.100
C. 192.168.3.110
D. 192.168.4.100


Answer: A


144. You administer two Windows 2000 Servers, Server1 and Server2. Sever1
has a spanned volume that consists of areas on three physical hard disks.
The three disks support hot swapping, and three hot swappable disk bays are
available on Server2. The drive letter that the spanned volume on Server1
uses, is not currently in use on Server2.

You want to move the three disks to Server2. You want the spanned volume to
use the same drive letter on Server 2 that it originally used on Server1.
You want to minimize the impact of your actions on the availability and
performance of the two servers.

You back up the spanned volume. What should you do next?

A. Move the disks from Server1 to Server2. On Server1, rescan the disks. On
Server2, rescan the disks.
B. Shut down both servers. Move the disks from Server1 to Server2. Restart
both computers. Rescan the disks on Server2.
C. Shut down Sever1. Move the disks from Server1 to Server2. Restart
Server1. On Server2, restore the spanned volume by using Windows Backup.
D. Move the disks from Server1 to Server2. On Server2, create a new spanned
volume and format the volume. Restore the spanned volume by using Windows
Backup.


Answer: D


145. You are a member of the domain backup operators group in a remote
office for a large company. You are responsible for manufacturing the system
state of a new Windows 2000 member server named members.
You installed Recovery Console onto the hard disk of member1. You use
Windows 2000 backup to create a backup of the System State data. You store
the backup files on the hard disk in a folder named systemstate.

A member in the domain admins group changes the name of member 1 to CR45uu
in order to adhere to a new naming standard.
One of the applications on CR45uu no longer functions after the name change.
You use the restore wizard to restore System State data. Then you restart
the server but you cannot log on to the server afterward.

You need to be able to log on to the server. What should you do?

A. Log on to the server by using the local administrator account.
B. Log on to the server by using a domain administrator account.
C. Use Recovery Console to restore the System State data.
D. Use Recovery Console to perform a full restore from a recent backup.


Answer: A


146. You are the administrator of your company's network. The company adds a
new application to the network. This application reads and writes large
image files to a server. Approximately 100 users use the application.

When all 100 users use the application simultaneously, the application has a
slower response time.
More than 10,000 users are in the domain where the imaging server resides,
but no other users are reporting network response problems.
You need to find out the cause of the problem.
What should you do in the System Monitor?

A. Log the Processor Queue Length counter for the System object.
B. Log the Avg. Disk Queue Length counter for the PhysicalDisk object.
C. Chart the Demand Zero Fault/sec counter for the Memory Object.
D. Chart the Pages/sec counter for the Memory object.


Answer: B


147. You are the administrator of a Windows 2000 Server network. You install
COM + applications on two of your servers. You want to ensure that the
component services class registration database is included in your normal
system backups on these servers.

What should you back up?

A. The Winnt\Registration folder.
B. The Winnt\System32\Com folders.
C. At least one file from each boot volume.
D. The System State data.


Answer: D


148. You are the administrator of a Windows 2000 domain that has three
domain controllers. Each day, you use Windows Backup to perform full backups
of each domain controller.

You run a script to make changes to account information in Active Directory.
As a result of errors in the script, the incorrect user accounts are
modified. Active Directory replication then replicates the changes to the
other two domain controllers.

You want to revert Active Directory to the version that was backed up the
previous day.
What should you do?

A. On a single domain controller, use Windows Backup to restore the System
State data. Shut down and restart the computer.
B. Shut down and restart a single domain controller in directory services
restore mode. Use Windows Backup to restore the System State data. Run the
Ntdsutil utility. Restart the computer.
C. Shut down and restart a single domain controller by using the Recovery
Console. Use Windows Backup to restore the System State data. Exit the
Recovery Console. Restart the computer.
D. Shut down and restart each domain controller by using the Recovery
Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery
Console. Restart the computer.


Answer: B


149. Your network contains Windows 2000 Professional client computers that
use TCP/IP as the only network protocol. The network also contains Windows
3.1 computers that use the NetBEUI protocol.
You install a new Windows 2000 Server computer on the network. You configure
this server to use NetBEUI and TCP/IP. The Windows 3.1 computers can connect
to the new server and use resources located on it. However the Windows 2000
Professional client computers cannot access the new server.

When you run the ipconfig command on the new server, it returns the
information shown in the exhibit.

<img src="./70-215/images/Q149.gif">

You want to allow the Windows 2000 Professional client computers to connect
to the servers. What should you do?

A. Ensure that the server is configured to connect to a Dynamic DNS server
that is authoritative for the domain.
B. Ensure that the server is able to communicate with a DHCP server that has
valid addresses for the network.
C. Ensure that NetBIOS over TCP/IP in enabled in the Advanced settings for
TCP/IP.
D. Ensure that a valid WINS address is configured in the Advanced settings
for TCP/IP.


Answer: B


150. You are installing Windows 2000 Server on a new computer that has a
hardware-based RAID array, a floppy disk drive, and a CD-ROM drive. The disk
controller for the RAID array is not included on the current hardware
compatibility list (HCL). You run Windows 2000 Setup by starting the
computer from the Windows 2000 Server CD-ROM.

When the computer restarts at the end of the text mode portion of Windows
2000 Setup, you receive the following STOP error: "INACCESSABLE_BOOT_DEVICE
".

Which two actions should you take to eliminate the STOP error? (Choose Two)

A. Modify the Boot.ini file.
B. Restart Windows 2000 Setup from the CD-ROM.
C. Select safe mode from the Windows 2000 boot menu.
D. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
E. Install a driver for the RAID controller form a floppy disk.
F. Use device manager to update the driver for the RAID controller.


Answer: B,E


151. You administer a Windows 2000 Server with two 14 GB hard disks. The
first is formatted using FAT 32. The second is formatted using NTFS. You
create a shared folder on both disks.

To conserve disk space, you compress the shared folder on disk two. When you
move files from the shared folder on disk two to the first disk, the files
lose their compression attributes.

How do you ensure that compression is maintained when transferring files
from the second disk to shared folders on the first disk? (Choose two)

A. Format the first disk as NTFS.
B. Convert the first disk to NTFS.
C. Convert both disks to be dynamic disks.
D. Convert the first disk to a dynamic disk.
E. Compress the shared folders on the first disk.


Answer: B,E


152. You have installed routing and remote access for Windows 2000 on a
server named Srv004. Your internal DNS, WINS, and DHCP services are running
properly in the environment. You want this server to provide internet access
for users on that network segment by using network address translation over
a demand dial interface to your internet service provider.

You have installed the NAT protocol and configured the correct public and
private interfaces. All client computers have their default gateway set to
the private address of Srv004, and can successfully ping the gateway. Users
can connect to internal network computers correctly, but network traffic
does not reach the ISP.

You need to ensure that all users can access the internet. What should you
do?

A. Configure the DNS as a forwarder to your ISP's DNS.
B. Configure your ISP's DNS as a secondary to your DNS.
C. Install the RIP version 2 protocol in routing and remote access for
Windows 2000 on Srv004.
D. Add a static route of 0.0.0.0.0.0.0.0 in routing and remote access for
Windows 2000 on Srv004.
E. Add a static route of 0.0.0.0.0.0.0.0 by using the route-p add command
Srv004.


Answer: A


153. You Windows 2000 Server computer contains four hard disks of different
sizes. Each hard disk is configured as a basic disk and has a single 5-GB
partition. All four disks have the amount of unpartitioned space shown in
the following table:

Disk Unpartitioned Space
Disk 0 3-GB
Disk 1 4-GB
Disk 2 3-GB
Disk 3 8-GB

On each hard disk, you create a second partition that uses the remaining
unpartitioned space on the disk. You create an 18-GB stripe volume that
includes all four of the new partitions.
Six months later, disk 1 fails. You replace it with a new hard disk, and
create the necessary partitions.

As quickly as possible, you need to retrieve the data that was contained on
disk 1. What should you do?

A. Restore the first partition on disk 1 from the most recent tape backup.
Use disk management to repair and rebuild the stripe volume.
B. Delete and re-create the stripe volume. Restore the contents of disk 1
from the most recent tape backup.
C. Restore both partitions on disk1 from the most recent tape backup.
D. Delete and re-create the stripe volume. Restore the first partition on
disk 1 and then stripe volume from a recent tape backup.


Answer: D


154. You install and run a third-party 32-bit application named Application
on your Windows 2000 Server computer. After several days. the application
stops responding. You open Task Manager and find that the CPU usage is at
100 percent. The normal range of CPU usage on the server is from 20 percent
to 30 percent.

You end the application. However, you see that the CPU on the server is
still at 100 percent. Task Manager shows no other applications running. You
then examine the Processes page in Task Manager and confirm that the
Application.exe process is no longer running.

You want to return the CPU usage to its normal range. What should you do?

A. Use Computer Management to stop and restart the Server service.
B. Use Computer Management to stop and restart the Workstation service.
C. Use Task Manager to end any related child processes.
D. Use Task Manager to end and automatically restart the Explorer.exe
process.


Answer: C


155. You are the network administrator at Humongous Insurance, a major
insurance company that has 1,000 offices worldwide. You are configuring the
network, so that only the sales staff can connect to it from home.

Your Windows 2000 forest contains a member server named server 1 that has
routing and remote access for Windows 2000 enabled. You configure server 1
to use a modem bank to accept incoming dial-up attempts. You configure
server 1 to use Windows authentication as the authentication provider. The
only supported authentication method is MS-CHAP version 2.

You need to restrict access to server 1. What should you do?

A. Create an OU named sales_staff with the sales staff user accounts.
Provide access to this OU try using the client-friendly-name attribute of
the default remote access policy.
B. Create an OU named sales_staff; populate sales_staff with the sales staff
user accounts. Provide access to this OU by using the Windows-Groups
attribute of the default remote access policy.
C. Create a new remote access policy. Add the everyone group to this policy
by using the Windows-groups attribute in the properties of each sales staff
user account, control dial-in access through remote policy.
D. Create a Windows 2000 global group with the sales staff user accounts.
Provide access to the global group by using the Windows-group attribute of
the default remote access policy.


Answer: D


156. Some applications on your company network use defined domain user
accounts as their service accounts. Each computer that runs one of theses
applications should have the respective service account in the local
administrators group.

Currently, you individually place these service accounts in the local
administrators group on the appropriate Windows 2000 Professional computers.

You need to centralize this process. What should you do?

A. Add the applications service accounts to the domain admins group.
B. Add the applications service accounts to the local administrator group.
Use the restricted group option in each computers local group policy.
C. Add the applications service accounts to the local administrators group
by using the restricted groups option in an OU group policy.
D. Add the applications service accounts to the local administrators group
by using the restricted groups option in a domain group policy.


Answer: D


157. Your company network includes a Windows 2000 application server named
App1. App1 runs many different production applications. All applications
currently start automatically when you start the server. One of these
applications is a critical, custom accounting application. This application
runs as a single service named finance.

You discover that finance has a programming defect that causes App1 to
become unstable. You need to troubleshoot this programming defect. Until the
defect is repaired, you need to ensure that finance does not interface with
the other applications on the server.

What must you do?

A. Use task manager to set the priority of finance to BelowNormal.
B. Use Task Manager to set the priority of Finance to Low.
C. Create a batch file to be launched upon restart that pauses the Finance
service.
D. Use the services console to change the startup type for Finance to
manual.


Answer: D


158. Your network contains NetWare 4.0 Servers. You have successfully
installed Client Service for NetWare on Windows 2000 Professional computers,
and Gateway Service for NetWare on Windows 2000 Server Computers.

You recently added a new Windows 2000 Server computer to the network and
installed Gateway Service for NetWare on it. However, the server is unable
to connect to any NetWare servers.

What should you do on the new Windows 2000 Server computer to resolve this
problem?

A. Enable NWLink NetBIOS.
B. Configure the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol to use
the correct Ethernet frame type.
C. Install RIP routing for IPX.
D. Install the SAP Agent.


Answer: B


159. You administer the Greenware.com domain for the Greenware Corporation.
In Greenware's main office in Toronto, Internet Information Services run on
a computer named web.greenware.com. You want web developers in Puerto Rico
and Los Angeles to be able to update web sites and virtual directories on
web.greenware.com via Microsoft FrontPage. How do you do this?

A. Install server extensions for IIS on web.greenware.com using the FPRENAME
command. Configure the server extensions for each web site.
B. Install server extensions for IIS on web.greenware.com using the FPSRBADM
command. Configure the server extensions for each web site.
C. Install server extensions from the All Task menu within IIS. Configure
the server extensions for each web site.
D. Install server extensions for each web site by selecting Configure Server
Extensions from the All Tasks menu in IIS. Configure the server extensions
to allow each developer update access for each web site.


Answer: D


160. You are the administrator of a network that consists of Windows 2000
Server computers and Windows 2000 Professional computers.
You want to configure the deployment of the most recent Windows 2000 service
pack so that users of the Windows 2000 Professional computers receive the
service pack automatically when they log on to the domain.

What should you do?

A. Create a Microsoft Windows installer package for the service pack.
Configure RIS to use the package.
B. Create a Microsoft Windows Installer package for the service pack.
Configure the package in a Group Policy.
C. Create a Microsoft Windows Installer package for the service pack.
Configure the package in the Local Computer Policy.
D. Place the service pack in a Distributed file system (Dfs).


Answer: B


161. Your network currently contains 6 NT 4.0 Servers and 620 NT 4.0
Workstations. You want to bring a Windows 2000 Server online and implement
it to act as primary domain controller in the existing domain. How?

A. Run the Active Directory Installation Wizard to configure Active
Directory on the 2000 Server. Promote the 2000 Server to be PDC of the
domain. Reboot the existing NT 4.0 PDC and demote it to BDC status.
B. Shut down the existing NT PDC. Run the Active Directory Installation
Wizard on the 2000 Server and specify the current NetBIOS name of the
domain. Restart NT on the PDC and demote it to BDC.
C. Install NT Server 4.0 on the new computer and designate the computer as
PDC of the existing domain. Specify the currently used NetBIOS name of the
domain. Upgrade the computer to Windows 2000 Server and use Active Directory
to force synchronization with the current PDC.
D. Install NT Server 4.0 on the new computer and promote the computer as PDC
of the existing domain. Be sure to specify the currently used NetBIOS name
of the domain. Upgrade the computer to Windows 2000.


Answer: D


162. An NT 4.0 Server named ELIZABETH is a member server in a Windows 2000
domain named testing.product.local. You want to upgrade ELIZABETH to Windows
2000. The domain runs in native mode. You also want to change the role of
ELIZABETH to be PDC within testing.product.local. Which of the following two
actions must be performed?

A. Reinstall NT 4.0 on ELIZABETH to the existing \Winnt folder and promote
ELIZABETH to PDC.
B. Use Server Manager on ELIZABETH to promote ELIZABETH to PDC.
C. Upgrade ELIZABETH to Windows 2000 Server.
D. Run the Active Directory Installation Wizard to make ELIZABETH PDC of the
testing.product.local domain.
E. Designate ELIZABETH as PDC from the existing PDC and reboot the existing
PDC.


Answer: A,C


163. You administer a routed Window 2000 network. You install a new Windows
2000 Server computer on a new routed segment and configure the existing DHCP
Server with a scope that is valid for the new routed segment. After enabling
the new Windows 2000 Server for DHCP, you find on your first boot that it
has been assigned the IP address of 102.93.1.100, a 16 bit subnet mask, and
no default gateway. When opening My Network Places, you see only the local
computer. What two actions must be taken so that this new Windows 2000
Server can see other computers on the network?

A. Configure all routers to route BOOTP broadcast frames.
B. Configure the default gateway to route all requests through TCP port 72.
C. Add the IP address of the default gateway to the new 2000 Server's TCP/IP
properties.
D. Add a DHCP relay agent computer to the new routed segment.
E. Add a WINS server to the new routed segment.


Answer: A,D


164. Your company has two locations-north and south. Windows 2000 Servers in
both locations create weekly tape backups of critical data. The tapes are
stored in the south location. How can you restore system state data to the
server in the north location?

A. Within Windows Backup on the south server, restore the system state data
to the system root folder on the north server.
B. Ship the backup tape to the north office. Run Windows Backup on the north
server and restore system state data to the system root folder.
C. Restart the south server in Directory Services Restore Mode, run Windows
Backup, and restore system state data to the system root folder of the north
server.
D. Copy the backup file to any directory on the north server. Double-click
on the file and choose "Restore System State Data."


Answer: B


165. Your Windows 2000 Server computer includes an integrated network
interface adapter. You are replacing the integrated adapter with a new
network interface adapter.
You install the new network interface adapter in an available PCI slot. When
you restart the computer, you receive error messages in the System log
stating that the new network interface adapter is missing or is not working.

What should you do to resolve the problem?

A. Create a new hardware profile.
B. Run the Add/Rmove Hardware Wizard.
C. Disable the integrated network interface adapter.
D. Delete the device driver for the integrated network interface adapter
from the Systemroot\system32\Drivers folder.


Answer: C
 
R

Rowdy Yates

gee wiz! thanks so much for that post. why don't i next time just wipe my
butt with the $10,000 it's gonna cost me to get my MCSE.

thanks agin. i hope you get a great job in the IT industry and make lots of
money for yourself.

RY, MCSA
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top