Sample Questions Best site for GRE, LSAT, SAT, GMAT, TOEFL, CCNA, CCSA and interview sample questions  

MCSE Sample Questions ›› Microsoft Windows Server 2003 Environment

MCSE Sample Questions : Microsoft Windows Server 2003 Environment

Microsoft Windows Server 2003 Environment

  1. The manager of the finance department has two spreadsheets that contain sensitive information. She has used Windows 2000 encryption to ensure the security of the files on her local computer. She would like to make a backup of the files. What should you advise her to do?

    1. Copy the files to a network share on an NTFS volume
    2. Copy the files to a floppy disk and use the CIPHER command to encrypt them.
    3. Place the files in an encrypted folder and copy the folder to a floppy disk.
    4. Use her computer to format a floppy disk and copy the files to the disk.

    Answer: A

  2. You are asked to establish a dial-up connection on a Windows 2000 Professional computer in the Accounts Payable department to connect a custom application to the vendor's network. You have limited information about the type of connection. Because of the sensitive nature of the connection you want to make sure that authentication information is not sent in plain text. Click the exhibit button to view the Advanced Security Settings dialog box. In the Advanced Security Settings dialog box, which options should be checked? (Choose all that apply)

    1. Unencrypted password (PAP)
    2. Shiva Password Authentication Protocol (SPAP)
    3. Challenge Handshake Authentication Protocol (CHAP)
    4. Microsoft CHAP (MS-CHAP)
    5. Microsoft CHAP Version 2 (MS-CHAP v2)
    6. For MS-CHAP based protocols, automatically use my Windows logon name and password

    Answer: C, D, E

  3. You are the desktop administrator for your network. Sam, the manager of the sales department, complains that someone has been deleting files from his hard disk. He asks you if you can track any users that delete files from his computer in the future. What should you do? (Choose all that apply)

    1. Enable a Group Policy for auditing successful object access events.
    2. Enable a Group Policy for auditing unsuccessful object access events.
    3. Enable the local Group Policy for auditing successful system events.
    4. Enable the local Group Policy for auditing unsuccessful system events.
    5. Use Windows 2000 Explorer to enable auditing for Sam's files.
    6. Enable auditing in the properties of any share that exists on Sam's computer.

    Answer: A, E

  4. Your company has an outside sales team. Recently each of the outside sales staff was given a new Windows 2000 portable computer. The sales team now wants to be able to dial into the network from client sites. For security purposes, you have been asked to set up connections that use smart cards for two-factor authentication. The connection is already configured on the server. You need to configure each laptop to use this connection. What should you do?

    1. Set the dial-up connection to use EAP.
    2. Set the dial-up connection to use SPAP.
    3. Use the software that came with the smart card to create the connection.
    4. Issue a client side certificate for each of the portable computers. Configure each connection as a VPN connection.

    Answer: A

  5. You have a need to provide a vendor with a Windows 2000 based portable computer with an external Zip drive. You find an external Zip drive in the supply closet. You attach the drive to the parallel port of the portable computer, and configure the parallel port as an ECP port. Your port settings are shown in the exhibit (See the exhibit below). Windows 2000 Professional has detected the change to the port, but does not detect the attached drive. You need to resolve the problem quickly. What should you do?(Choose all that apply)

    1. Configure the ECP port to use any interrupt assigned to the port.
    2. Configure the ECP port to not use the automatic resource setting.
    3. Change the LPT Port Number to Unassigned.
    4. Configure the ECP port to enable legacy Plug and Play detection.

    Answer: D

  6. You get a great deal on a refurbished laser printer. The printer is plug and play compliant and connects to your USB port. The printer is on the current Windows 2000 Hardware Compatibility List (HCL). You install the printer and run the manufacturers setup program. During the installation, you receive the error shown in the exhibit (See the exhibit below). What should you do?

    1. Change the USB port setting to enable legacy Plug and Play detection.
    2. Configure the USB port to Disable Error Detection.
    3. Connect the printer as a shared device on a non-Windows 2000 computer.
    4. Install the WDM-compliant device drivers using the Add New Hardware wizard.

    Answer: D

  7. You are the network consultant for a small company. Part of the office network is shown in the exhibit (See the exhibit below). The network has built up as the company grew. Originally a Windows NT 4.0 peer-to-peer network running NWLINK protocol, the network has grown into a Windows 2000 domain. Not all computers in the network can access all other computers in the network. Though the network works now, the general manager has asked you fix the connectivity problem and prepare the network for Internet connectivity. What should you do?

    1. Change all NWLINK computers to the 802.2 frame type.
    2. Install TCP/IP on the Windows NT 4.0 Workstations.
    3. Change the default network protocol to NWLink IPX/SPX
    4. Add the NetBEUI protocol to the binding order on all client computers.

    Answer: B

  8. You are the desktop administrator for your company. Pat, a manager in the accounting department asks for your help. Pat needs to copy a spreadsheet to a floppy disk so she can use it at home. On her hard drive, compressed, the file is less than 1 MB in size. However, when Pat attempts to copy the file to an empty floppy disk, she receives the error: 'Insufficient Disk Space' What should you suggest to Pat to do?

    1. Use Drivespace.exe to compress the entire floppy disk.
    2. Format the Floppy disk on the Windows 2000 computer. Set the compression attribute on the floppy disk to on.
    3. Use another program to compress the bitmap file before copying it to the floppy disk.
    4. Copy an empty compressed folder to the floppy disk. Copy the compressed bitmap file to the folder on the floppy disk.

    Answer: C

  9. You are the desktop administrator for a graphic arts studio. To support a processor intensive rendering program, you have purchased a computer with Dual Pentium 4 processors. You install Windows 2000 Professional on the computer. In Device Manager you notice that the drivers for the second processor are not installed. How can you enable support for the second processor?

    1. Re-install Windows 2000 Professional. Specify the additional driver for the second processor.
    2. Remove the current processor from device manager, System devices. Reboot to allow Windows 2000 to detect the second processor.
    3. Use Device Manager to add the appropriate hardware abstraction layer (HAL) to the computer to support the second processor.
    4. Boot Windows 2000 Professional into a command prompt only. Use HALBUILD.EXE to rebuild the hardware abstraction layer (HAL).

    Answer: C

  10. You are preparing a RIS installation of Windows 2000 Professional on 45 PXE compliant computers. You install Windows 2000 on a reference computer along with all application and desktop settings. You use sysprep to shut down the computer, and you create an image of the test computer for distribution. When you apply the image to the next computer, you notice that a key application has not been installed. You want to correct the problem with the least amount of effort. What should you do?

    1. Use Setup manager to specify a network installation directory for the application.
    2. Install the application and create the RIS image again.
    3. Use Sysdiff to take a snapshot of the application installation. Use Windiff to apply the change to the rest of the computers.
    4. Add the application install path to the [apps] section of the unattended.txt file

    Answer: B

« Previous

MCSE Sample Question Number : 1-10| 11-20 | 21-30| 31-40
Sample Test Questions
GRE Sample Questions
CAT Sample Questions
GMAT Sample Questions
TOEFL Sample Questions
ACT Sample Questions
SAT Sample Questions
LSAT Sample Questions
PSAT Sample Questions
MCAT Sample Questions
PMP Sample Questions
GED Sample Questions
ECDL Sample Questions
DMV Sample Questions
CCNA Sample Questions
MCSE Sample Questions
Network+ Sample Questions
A+ Sample Questions
Technical Sample Questions
WASL Sample Questions
CISA Sample Questions

Other Sample Questions
Sample Interview Questions
Sample Teacher Interview Questions
Sample Citizenship Questions
Accuplacer Sample Questions
Science Bowl sample Questions
Driving Test Sample Questions
Sample Survey Questions Sample Essay Questions
Sample Behavioral Interview Questions

Copyright © 2004-2013, Best BSQ. All Rights Reserved.