Sail E0 Webinar

MCQs

Total Questions : 122 | Page 10 of 13 pages
Question 91. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem?
  1.    Create a new hardware profile
  2.    Use Device Manager to remove the integrated 10-MB Ethernet adapter
  3.    Use Device Manager to disable the integrated 10-MB Ethernet adapter
  4.    Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemrootsystem32Driver Cache folder
  5.    None of above
 Discuss Question
Answer: Option C. -> Use Device Manager to disable the integrated 10-MB Ethernet adapter
Question 92. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?
  1.    Add the APP1 and APP2 instances to the processor time counter for the process object
  2.    Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
  3.    Add only the NTVDM instance for the percent processor time counter for the process object
  4.    Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
  5.    None of above
 Discuss Question
Answer: Option D. -> Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Question 93. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?
  1.    CHAP
  2.    MS-CHAP v2
  3.    PAP
  4.    SPAP
  5.    None of above
 Discuss Question
Answer: Option B. -> MS-CHAP v2
Question 94. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?
  1.    Use Computer Management to stop and restart the Server service
  2.    Use Computer Management to stop and restart the Workstation service
  3.    Use Task Manager to end any related child processes
  4.    Use Task Manager to end and automatically restart the Explorer.exe process
  5.    None of above
 Discuss Question
Answer: Option C. -> Use Task Manager to end any related child processes
Question 95. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?
  1.    Install Network Monitor on Monitor 1
  2.    Install Network Monitor on Application Server
  3.    Configure the network monitor ECP port something for TCP
  4.    Configure the network monitor EDP port something for UDP
  5.    Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance
 Discuss Question
Answer: Option C. -> Configure the network monitor ECP port something for TCP
Question 96. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
  1.    Set the CrashonAuditFail registry key to 0
  2.    Set the Security Log to overwrite events as needed
  3.    Delete the Liscense Trial registry key
  4.    Increase the size of the security log
  5.    Save the security log to a file, and clear it every morning
 Discuss Question
Answer: Option A. -> Set the CrashonAuditFail registry key to 0
Question 97. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
  1.    Install Active Directory on the server
  2.    Select Basic Authentication check box
  3.    Clear the Allow Anonymous Connection check box
  4.    Disable the IUSE_inta user account on Intra
  5.    Clear the Allow IIS to Control Password check box
 Discuss Question
Answer: Option C. -> Clear the Allow Anonymous Connection check box
Question 98. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
  1.    Apply a less restrictive custom security template to DC1
  2.    Apply a less restrictive custom policy to Windows NT domain controller
  3.    Ensure the Windows 2000 domain is configured in the mixed mode
  4.    Ensure the Windows 2000 domain is configured to run in the native mode
  5.    None of above
 Discuss Question
Answer: Option A. -> Apply a less restrictive custom security template to DC1
Question 99. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?
  1.    Convert the disk that contains the shared folders to a dynamic disk
  2.    Convert the partition that contains the shared folders to NTFS
  3.    Defragment the disk that contains the shared folders
  4.    Move the paging file to the partition that contains the shared folders
  5.    None of above
 Discuss Question
Answer: Option C. -> Defragment the disk that contains the shared folders
Question 100. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?
  1.    Compress the files in her home folder to save disk space
  2.    Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
  3.    Move some of the files from her home folder to the IN_PROGRESS shared folder
  4.    Remove files from her home folder until the total uncompressed file size is less than 100 MB
  5.    None of above
 Discuss Question
Answer: Option D. -> Remove files from her home folder until the total uncompressed file size is less than 100 MB

Latest Videos

Latest Test Papers