Sample Questions Best site for GRE, LSAT, SAT, GMAT, TOEFL, CCNA, CCSA and interview sample questions  

MCSE Sample Questions›› Microsoft Windows 2000 Professional

MCSE Sample Questions : Microsoft Windows 2000 Professional

Microsoft Windows 2000 Professional

  1. You are the administrator of your company's network.An employee named Mark is leaving the company.A new employee named Eric has been hired to replace him.

    Mark has a local user account on a Windows 2000 Professional computer.Mark has rights to multiple files and folders on the computer.

    You want Eric to have the same rights and permissions that Mark has.You want to ensure that Mark will no longer have access to the files and folders.You want to accomplish this with least administrative effort.

    What should you do?

    1. Rename Mark's user account to Eric and change the account password.
    2. Create Eric's account by copying Mark's profile to Eric's account.Delete Mark's account.
    3. Create Eric's account by copying Marks account.Delete Mark's account.
    4. Delete Mark's account.Add Eric's account.Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

    Answer: A

    Explanation: A user account and the permission and rights attached to them can easily be transferred to another user by renaming the account and changing the password.By renaming Mark's user account and by changing the password, Eric will have the same rights and permissions as Mark had, and Mark will not be able to use his old account.This provides the solution with least amount of administrative effort.

  2. Your Windows 2000 Professional computer belongs to the contoso.com domain.You need to encrypt a compressed file named C:\data.You successfully encrypt the file but discover that it is not longer compressed.

    What is the most likely cause of this problem?

    1. A group policy is preventing the compression of encrypted files.
    2. The file is stored on a FAT32 partition.
    3. Only members of the Administrators and the Power Users groups can compress and encrypt files.
    4. Encrypted files cannot be compressed.

    Answer: D

    Explanation: A compressed file cannot be encrypted, and an encrypted file cannot be compressed.If you encrypt a compressed file, the file will first be uncompressed and then encrypted.It will no longer be compressed and neither will you be able to compress it once it has been encrypted.

  3. You are the administrator of your company's network.The dial-up server on your network is configured to support certificate authentication.

    A user named Tom wants to use smart card authentication on his Windows 2000 Professional portable computer.You verify that Tom's computer has a PC card smart card reader and the appropriate driver installed.You give Tom a smart card to use.

    What else should you do to enable smart card authentication on Tom's computer?

    1. Configure a dial-up connection to use EAP.Select the smart card device for authentication.
    2. Configure a dial-up connection to use SPAP.Select the smart card device for authentication.
    3. Configure a dial-up connection to use certificate authentication.Enable the user's credentials for authentication.
    4. Configure a dial-up connection to connect to a private network through the Internet.Enable L2TP to create a virtual private network (VPN) tunnel.

    Answer: A

    Explanation: Extensible Authentication Protocol (EAP) is an extension to PPP and works with dial-in, PPP and L2TP clients.The authentication methods used by EAP include smart cards.

  4. You upgrade 11 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional.All of the upgraded computers are configured to have the default security settings.

    After the upgrade, users in the Accounting department report that they can no longer run any financial or credit applications on their computers.

    You want all Accounting department users to be able to run these applications.You want to allow only the rights that allow users to run the applications.

    What should you do?

    1. Add each user account to the Power Users group on that user's computer.
    2. Configure the financial and credit applications to run as services on the computers in the Accounting department.
    3. Apply the Compatws.inf security template to the local security policy of the computers in the Accounting department.
    4. Use the Computer Management console to configure separate memory spaces for each financial and credit application on the Accounting department computers.

    Answer: C

    Explanation: The Compatws.inf template relaxes access controls for the Users group and is therefore well suited for Windows 2000 clients that need compatibility with older applications.

  5. You are the administrator of your company's network.Ten Windows 2000 Professional computers are located in the Research department.The computers contain highly confidential information.

    You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network.However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure.

    What should you do?

    1. Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.
    2. Use security templates to create a security template file and import the security settings to modify the default security settings.
    3. Use the local computer policy to disable the access to this computer from the network option.
    4. Use Secedit.exe to reconfigure the computers' default security settings to not allow anonymous access to the computers.

    Answer: A

    Explanation: The Hisecws.inf, the highly secure template, is used to require maximum protection for network traffic and protocols used between computers running Windows 2000.As a result, such computers configured with a highly secure template can only communicate with other Windows 2000 computers.They will not be able to communicate with computers running Windows 95, Windows 98, or Windows NT.

  6. You are the administrator of a Windows 2000 network.Your network includes 75 Windows NT Workstation 4.0 computers.You are adding 50 new PXE-compliant computers to the network.The hardware on each computer is configured identically.

    You are using a RIS image to deploy Windows 2000 Professional to the 50 computers.You successfully install Windows 2000 Professional on the first 10 computers.However, you cannot install Windows 2000 Professional on remaining 40 computers.

    What should you do?

    1. Configure the DHCP scope to add additional IP addresses.
    2. Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.
    3. Modify the startup sequence in the CMOS of the remaining computers.
    4. Create computer accounts on the remaining computers in the Active Directory.

    Answer: A

    Explanation: In this scenario, the DHCP server has run out of IP-addresses.By extending the scope by 40 IP addresses the installation on the remaining computers will be successful. Note: RIS requires Active Directory, DNS and DHCP.The clients can either be PXE-compliant or they can use a Remote boot diskette.

  7. You need to install Windows 2000 Professional on 35 new computers on the company LAN. First, you create a distribution folder on the network server.Then you create a network boot disk to install Windows 2000 Professional from the distribution folder.

    Now you need to create a batch file, which the network boot disk will execute to start the installation.You must specify a source path and temporary drive for the installation files.

    You also need to install the accessibility options within the batch file.The batch file must execute a hardware-specific application to run after the GUI-mode Setup has completed. Which command must you specify in the batch file?

    1. Z:\i386\winnt /s:z:\i386 /t:d: /a /e:z:\hardware\setup.exe
    2. Z:\i386\winnt /s:z:\i386 /rwinnt.tmp /a /e:z:\hardware\setup.exe
    3. Z:\i386\winnt32 /s:z:\i386 /tempdrive:d /cmd:z\hardware\setup.exe
    4. Z:\i386\winnt32 /s:z:\i386 /cmdcons:z:\hardware\setup /makelocalsource

    Answer: A

    Explanation: Winnt must be used to start the installation process from a boot diskette.The /t:d switch specifies that the D drive should be used to contain temporary setup files; the /a switch specifies an installation with accessibility options; and the /e[:command] switch specifies a command to be executed at the end of Setup's GUI mode.

  8. You are creating a shared Internet connection on your Windows 2000 Professional computer.You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.

    What should you do?(Choose all that apply)

    1. Configure your shared Internet connection to disable LCP extensions.
    2. Configure your shared Internet connection to disable on-demand dialing.
    3. Create an Internet Connection Sharing application type for HTTP to use remote server for port 25.
    4. Create an Internet Connection Sharing application type for HTTP to use remote server port 80.
    5. Create the Internet Connection Sharing application type for FTP to use remote server port 21.
    6. Create an Internet Connection Sharing application type for FTP to use remote server port 72.

    Answer: D, E

    Explanation: HTTP traffic uses TCP port 80 and FTP traffic uses TCP port 21 for session control and port 20 for data transfer.Therefore, by enabling TCP port 80 and TCP port 21 only HTTP and FTP traffic will be allowed.All other network traffic will not be allowed.

  9. You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company's network.Your computer currently has an ISA network adapter installed.You install a second ISA network adapter.

    After you restart your computer, you notice that the second ISA network adapter is not functioning.

    What should you do?

    1. Set the driver signing option to block.
    2. Set the driver signing option to ignore.
    3. In the computer's BIOS, reserve an unused IRQ for ISA devices.
    4. In the Device Manager, configure the second ISA network adapter to use an unused IRQ.

    Answer: D

    Explanation: The Device Manager is used to configure the system resources used by a hardware device.The system resources of legacy ISA devices must be set manually.This can be done in Device Manager.By right clicking the device in Device Manager, choosing Properties, and then selecting the Resources tab, you can change the system resources, such as the IRQ settings, used by the device.

  10. You are upgrading computer1 and computer2 from Windows NT Workstation 4.0 to Windows 2000 Professional.You successfully upgrade computer1.During the upgrade of computer2, a series of power outages interrupts the upgrade.

    You discover that the upgrade of computer2 is incomplete.Furthermore, you find that computer2 can no longer run Windows NT workstation 4.0.Computer2 does not support booting from the Windows 2000 Professional CD-ROM.You decide to use computer1 to help recover the failed upgrade.

    What should you do?

    1. On computer1, copy the CD-ROM driver and system files named ntdetect, ntbootdd.sys, Ntdll.dll and Setupldr.bin to a formatted floppy disk.On computer2, restart the computer by using the floppy disk. Then run WinNT32/debug from the Windows 2000 Professional CD-ROM.
    2. From computer1, copy the CD-ROM driver and system files named Ntdetect, Ntbootdd.sys, Ntdll.dll, and Setupldr.bin to a formatted floppy disk.On the computer2, restart the upgrade by using the floppy disk.Then run WinNT32/rx from the Windows 2000 Professional CD-ROM.
    3. On the computer1, run Makebt32.exe from the Bootdisk folder on the Windows 2000 Professional CD- ROM.On computer2, restart the upgrade by using the newly created floppy disks.
    4. On computer1, perform a remote installation from a network share.On computer2, when the text portion of setup has completed, resume the installation by using the Setup Manager.

    Answer: C

    Explanation: You can create the four setup boot disks by using either makeboot.exe or makebt32.exe.Both are located in the \Bootdisk directory on the Windows 2000 installation CD.These disks can be used to restart the installation process on computer2.

« Previous || Next »

MCSE sample questions Number : 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | 91-100 | 101-110 | 111-120 | 121-130 | 131-140 | 141-149 |
Sample Test Questions
GRE Sample Questions
CAT Sample Questions
GMAT Sample Questions
TOEFL Sample Questions
ACT Sample Questions
SAT Sample Questions
LSAT Sample Questions
PSAT Sample Questions
MCAT Sample Questions
PMP Sample Questions
GED Sample Questions
ECDL Sample Questions
DMV Sample Questions
CCNA Sample Questions
MCSE Sample Questions
Network+ Sample Questions
A+ Sample Questions
Technical Sample Questions
WASL Sample Questions
CISA Sample Questions

Other Sample Questions
Sample Interview Questions
Sample Teacher Interview Questions
Sample Citizenship Questions
Accuplacer Sample Questions
Science Bowl sample Questions
Driving Test Sample Questions
Sample Survey Questions Sample Essay Questions
Sample Behavioral Interview Questions

Copyright © 2004-2013, Best BSQ. All Rights Reserved.