Sail E0 Webinar

MCQs

Total Questions : 122 | Page 6 of 13 pages
Question 51. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?
  1.    CHAP
  2.    MS-CHAP v2
  3.    PAP
  4.    SPAP
  5.    None of above
 Discuss Question
Answer: Option B. -> MS-CHAP v2
Question 52. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
  1.    Install Active Directory on the server
  2.    Select Basic Authentication check box
  3.    Clear the Allow Anonymous Connection check box
  4.    Disable the IUSE_inta user account on Intra
  5.    Clear the Allow IIS to Control Password check box
 Discuss Question
Answer: Option C. -> Clear the Allow Anonymous Connection check box
Question 53. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
  1.    Set the CrashonAuditFail registry key to 0
  2.    Set the Security Log to overwrite events as needed
  3.    Delete the Liscense Trial registry key
  4.    Increase the size of the security log
  5.    Save the security log to a file, and clear it every morning
 Discuss Question
Answer: Option A. -> Set the CrashonAuditFail registry key to 0
Question 54. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?
  1.    Install Network Monitor on Monitor 1
  2.    Install Network Monitor on Application Server
  3.    Configure the network monitor ECP port something for TCP
  4.    Configure the network monitor EDP port something for UDP
  5.    Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance
 Discuss Question
Answer: Option C. -> Configure the network monitor ECP port something for TCP
Question 55. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?
  1.    Use Computer Management to stop and restart the Server service
  2.    Use Computer Management to stop and restart the Workstation service
  3.    Use Task Manager to end any related child processes
  4.    Use Task Manager to end and automatically restart the Explorer.exe process
  5.    None of above
 Discuss Question
Answer: Option C. -> Use Task Manager to end any related child processes
Question 56. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
  1.    Apply a less restrictive custom security template to DC1
  2.    Apply a less restrictive custom policy to Windows NT domain controller
  3.    Ensure the Windows 2000 domain is configured in the mixed mode
  4.    Ensure the Windows 2000 domain is configured to run in the native mode
  5.    None of above
 Discuss Question
Answer: Option A. -> Apply a less restrictive custom security template to DC1
Question 57. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?
  1.    Convert the disk that contains the shared folders to a dynamic disk
  2.    Convert the partition that contains the shared folders to NTFS
  3.    Defragment the disk that contains the shared folders
  4.    Move the paging file to the partition that contains the shared folders
  5.    None of above
 Discuss Question
Answer: Option C. -> Defragment the disk that contains the shared folders
Question 58. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?
  1.    End the task named Application
  2.    End the Application.exe process
  3.    End the Application.exe process tree
  4.    End both the Explorer.exe process and the Application.exe process
  5.    None of above
 Discuss Question
Answer: Option C. -> End the Application.exe process tree
Question 59. You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?
  1.    Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system vol
  2.    Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume
  3.    Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command
  4.    Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility
  5.    None of above
 Discuss Question
Answer: Option A. -> Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system vol
Question 60. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?
  1.    Compress the files in her home folder to save disk space
  2.    Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
  3.    Move some of the files from her home folder to the IN_PROGRESS shared folder
  4.    Remove files from her home folder until the total uncompressed file size is less than 100 MB
  5.    None of above
 Discuss Question
Answer: Option D. -> Remove files from her home folder until the total uncompressed file size is less than 100 MB

Latest Videos

Latest Test Papers