Sample Questions Best site for GRE, LSAT, SAT, GMAT, TOEFL, CCNA, CCSA and interview sample questions  

MCSE Sample Questions›› Microsoft Windows 2000 Professional

MCSE Sample Questions : Microsoft Windows 2000 Professional

Microsoft Windows 2000 Professional

  1. You want to connect your Windows 2000 Professional computer to a new color laser printer.The printer is Plug and Play compliant.The printer is included on the current Hardware Compatibility List (HCL).

    You are a member of the Sales organizational unit (OU).You want to share the printer with other users in the Sales Organizational Unit.

    You plug the printer into the LPT port on the back of the computer.You then attempt to install the 32- bit application printer software that came with the printer.During the installation you receive an error message as shown in the exhibit.

    What should you do before you share the printer to other users in the Sales OU?

    1. Change the LPT port settings to enable legacy Plug and Play detection on your computer.
    2. Change the LPT port setting to bidirectional in the BIOS on your computer. Then reinstall the printer software.
    3. Connect the printer to another computer in the Sales Organizational Unit. Then install the device drivers for the printer.
    4. Obtain and install WDM-compliant device drivers and printing software for the printer.

    Answer: D

    Explanation: An error message with a reference to the print.dll file indicates a problem with the printer driver. The current print driver should be replaced with a WDM-compliant driver.WDM-compliant drivers and WDM- compliant printing software should be used to assure that the printers and the print devices work well in Windows 2000.The Windows Driver Model (WDM) provides a common model for device drivers across Windows 98 and Windows 2000 and would thus work in both Windows 98 and Windows 2000.

  2. Your desktop computer has Windows 2000 Professional installed.You create a new dial-up connection to connect to the Internet.You configure the Internet connection to enable Internet Connection Sharing.

    After you configure the connection, you cannot see or connect to any shared resources.You want your computer to be able to connect to shared resources.

    What should you do?

    1. Configure the dial-up connection to disable shared access.
    2. Configure the dial-up connection to disable on-demand dialing.
    3. Disable data encryption in the new dial-up connection.
    4. Use the ipconfig command to release and renew your network TCP/IP address.

    Answer: D

    Explanation: When ICS is configured, the IP address for the ICS internal adapter changes to with a subnet mask of other clients in the local network still have their old IP addresses.If their IP addresses are released and renewed they will get a correct IP configuration from the mini-DHCP server, which is included in ICS.The ICS clients would get IP addresses in the range of and a subnet mask of would be able to communicate amongst themselves.

  3. You are configuring a Windows 2000 Professional portable computer to use a dial-up connection to connect to a Routing and Remote Access server.The computer has a smart card reader and appropriate drivers installed.

    You install the MMC to request a new certificate.You install the certificate to use the smart card.You want to use your smart card for authentication when you connect to the Routing and Remote Access server.You want to use the advanced security settings dialog box as shown in the exhibit. Which option or options should you enable in the Advanced Security Settings dialog box?

      (Choose all that apply)
    1. Use Extensible authentication protocol (EAP)
    2. Unencrypted Password (PAP)
    3. Shiva Password Authentication Protocol (SPAP)
    4. Challenge Handshake Authentication Protocol (CHAP)
    5. Microsoft CHAP (MS-CHAP)
    6. Microsoft CHAP Version 2 (MS-CHAP v2) G.For MS-CHAP based protocols, automatically use my Windows logon name and password (and domain, if any)

    Answer: A

    Explanation: By using EAP, support for a number of authentication schemes may be added, including token cards, one-time passwords, public key authentication using smart cards, certificates, and others.

  4. You want to prevent a Windows 2000 Professional computer named Payroll5 from communicating on your network with Windows NT 4.0, Windows 95, and Windows 98 computers.You want to enable the Payroll5 computer to communicate on your network with other Windows 2000 computers only.

    What should you do?

    1. Close all NetBIOS ports in the Advanced TCP/IP options of Payroll5.
    2. Import the Hisecws.inf security template to Payroll5.
    3. Disable access this computer from network in the local security policy settings for Payroll5.
    4. Clear all WINS client settings on Payroll5.

    Answer: B

    Explanation: The Hisecws.inf is the security template that requires the highest level of security and the maximum protection for network traffic and protocols used between computers running Windows 2000.As a result, computers configured with a highly secure template can only communicate with other Windows 2000 computers.They will not be able to communicate with computers running Windows 95, Windows 98, or Windows NT.

  5. You use a shared Windows 2000 Professional computer.You notice that some of your Microsoft Word documents that were on the local hard drive have been deleted.You restore the documents from a recent backup.

    You want to be able to track all users who access your Word documents in the future.

    What should you do?(Choose two)

    1. Enable the local group policy for auditing Object Access events that are successful.
    2. Enable the local group policy for auditing Object Access events that are unsuccessful.
    3. Enable the local group policy for auditing Process Tracking events that are successful.
    4. Enable the local group policy for auditing Process Tracking events that are unsuccessful.
    5. Use Windows Explorer to enable auditing for your files.
    6. Run the diskperf -y command.Use System Monitor to examine the logical I/O counter.Restart the computer.

    Answer: A, E

    Explanation: Auditing is a two-step process.First you must enable the auditing on the right kind of object; in this scenario you would want to audit 'Object Access'.This includes files, folders and printers.You must also decide if you are going to audit success or failure, or both success and failure.In this scenario you will use success since you want to audit access of the Word documents.Then you must use Windows Explorer to enable the auditing on specific resources.In this scenario the files and folders that should be audited.

  6. You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional.You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users.You do not want Maria to be able to read other users' files.

    What should you do to accomplish these goals?

      (Choose all that apply)
    1. Add Maria's user account to the System group.
    2. Add Maria's user account to the Interactive group.
    3. Add Maria's user account to the Power Users group.
    4. Add Maria's user account to the Administrators group.
    5. Add Maria's user account to the Backup Operators group.

    Answer: C, E

    Explanation: By adding Maria's user account to the Power Users group Maria will inherit the ability to share resources and install programs on the computer.To grant Maria the ability to backup files she must be added to the Backup Operators group, which has the permissions to backup files.As a member of this group Maria will be able to backup files as she will inherit those rights by virtue of being a member of that group.Maria will not have permissions to read the users' files as neither the Power Users group nor the Backup Operators group have the permissions to read other users' files.

  7. A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer.Her computer has two drives: Drive C and Drive D.The folder that needs to be encrypted is located on Drive D.When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties.

    What should you do to enable the user to encrypt the folder?

    1. Log on to her computer as an Administrator, and then run the cipher /e command.
    2. Instruct the user to run the cipher /e command.
    3. Log on to her computer as an Administrator, and then run the Secedit /enforce command.
    4. Instruct the user to run the Secedit /enforce command.
    5. Log on to her computer as an Administrator, and then run the Convert d:/FS:NTFS command.

    Answer: E

    Explanation: Any ordinary user should be able to encrypt files as long as they have the appropriate permission to the files and the folder, and as long as the file system supports file encryption.The only file system that supports file encryption is the NTFS file system.If this file system is not in use, the option to encrypt files will not be shown.As no option for file encryption can be found, you can assume that the disk uses the FAT or FAT32 file system.This would need to be converted to NTFS to support file encryption.You would need to log on as an administrator and run Convert d:/FS:NTFS at the command prompt, which can be done by clicking on the start button, clicking on Run and then typing cmd in the dialog box.This allows us to convert the drive to the NTFS file system without affecting the data on the drive.However, you cannot convert a drive back to FAT or FAT32.

  8. Your company has just upgraded its CATEGORY 5 Ethernet network from 10Mbps to 100Mbps.After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network.The remaining 80 Windows 2000 computers in the company can connect, however.Your company uses NWLink as the only network protocol.

    You need to connect the computers in the marketing department to the network.

    What must you do?

    1. Configure the NWLink frame type of the network adapters to be Ethernet 802.3.
    2. Configure the NWLink frame type of the network adapters to be Ethernet II.
    3. Replace the network adapters with 10/100 BNC adapters.
    4. Replace the network adapters with 10/100 UTP network adapters.

    Answer: D

    Explanation: The hubs, switches and other network devices have been upgraded to 100Mbps.It thus seems likely that the 20 computers with network connection problems in this scenario are using 10Mbps network adapters.These need to be upgraded to 100Mbit or to 10/100Mbit network adapters. Since the network is a category 5 Ethernet network the network adapters must also support UTP.

  9. You are preparing to install Windows 2000 Professional on 100 MPS-compliant computers.Each computer has two 550 MHz processors.The computers are configured identically.

    You want to use one of the computers as a reference computer for deploying Windows 2000 Professional to the remaining computers.You install Windows 2000 Professional on the reference computer.You view the Device Manager and notice that the drivers for the second processor are not installed.

    You want to add support for the second processor on the remaining 99 computers.You want to do this with least amount of administrative effort.

    What should you do?

    1. Use Setup Manager to configure the reference computer, and then create a disk image.
    2. Use the System Preparation Tool with the -pnp parameter to set up the reference disk, and then create the disk image.
    3. Use Device Manager to add the appropriate hardware abstraction layer (HAL) to the reference computer to support the second processor, and then create a disk image.
    4. After imaging the reference computer, restart the reference computer in Safe Mode and add the driver for the second processor.

    Answer: C

    Explanation: When upgrading from a single processor system to a multiprocessor system the Hardware Abstraction Layer (HAL) must be upgraded.To do this, open Computer Management in Administrative Tools, open Device Manager, Expand Computer, Right-click Advanced Configuration and Power Interface (ACPI) PC (or similar), select Properties, select the Driver tab, and select Update Driver.This will start the Upgrade Device Driver Wizard that can be used to update the HAL.

  10. You have updated the modem driver on your Windows 2000 Professional computer.You restart your computer.Immediately after you log on, you receive a Stop error.

    You need to start Windows 2000.

    What must you do?

    1. Restart the computer in Safe Mode. Uninstall the modem driver.
    2. Restart the computer by using the last known good configuration.
    3. Restart the computer in Recovery Console. Replace the new modem.inf file with the old modem.inf file.
    4. Start the computer from the Windows 2000 startup floppy disks. Repair the registry.
    5. Start the computer from the Windows 2000 startup floppy disks. Repair the system files.

    Answer: A

    Explanation: Because the computer cannot start normally you must start the computer in Safe Mode.Once in Safe Mode you can uninstall the modem driver and the computer should be able to boot normally after that.

« Previous || Next »

MCSE sample questions Number : 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | 81-90 | 91-100 | 101-110 | 111-120 | 121-130 | 131-140 | 141-149 |
Sample Test Questions
GRE Sample Questions
CAT Sample Questions
GMAT Sample Questions
TOEFL Sample Questions
ACT Sample Questions
SAT Sample Questions
LSAT Sample Questions
PSAT Sample Questions
MCAT Sample Questions
PMP Sample Questions
GED Sample Questions
ECDL Sample Questions
DMV Sample Questions
CCNA Sample Questions
MCSE Sample Questions
Network+ Sample Questions
A+ Sample Questions
Technical Sample Questions
WASL Sample Questions
CISA Sample Questions

Other Sample Questions
Sample Interview Questions
Sample Teacher Interview Questions
Sample Citizenship Questions
Accuplacer Sample Questions
Science Bowl sample Questions
Driving Test Sample Questions
Sample Survey Questions Sample Essay Questions
Sample Behavioral Interview Questions

Copyright © 2004-2013, Best BSQ. All Rights Reserved.