1. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

2. You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. “The server on which the printer resides does not have a suitable HP LaserJet printer driver installed”. You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do?

3. Your company’s network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company’s manufacturing facilities run 24 hours per day. The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out that was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Services. The information technology (IT) department needs to be able to remote control users’ sessions to support and troubleshoot the application. What should you do to enable the IT department to control users’ sessions?

4. You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

5. You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

6. You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full backups of each domain controller. You run a script to make changes to account information in Active Directory. As a result of errors in the script, the incorrect user accounts are modified. Active Directory replication then replicates the changes to the other two domain controllers. You want to revert Active Directory to the version that was backed up the previous day. What should you do?

7. Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User’s print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it’s IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do?

8. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day’s logfile. You want all data to be included in the correct day’s log file. What should you do?

9. You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

10. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?

11. Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only. What should you do?

12. You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

13. You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks?

14. You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

15. You have configured a Group Policy Object (GPO) for the marketing oranization unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers Domain Local Group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel. What should you do?

16. You install the Routing and Remote Access service on a Windows 2000 Server computer in your network. Your network is not directly connected to the Internet and uses the private IP address range 192.168.0.0. When you use Routing and Remote Access to dial in to the server, your computer connects successfully, but you are unable to access any resources. When you try to piiig servers by using their IP addresses, you receive the following message: “Request timed out.” When you run the ipconfig command, it shows that your dial-up connection has been given the IP address 169.254.75.182. What should you do to resolve the problem?

17. You configure your Windows 2000 Server as a print server. You install a second PnP Network adapter to improve the performance. The first adapter uses IRQ11, and the second adapter uses IRQ5. The server is now unable to print to print devices connected to a non-PnP LPT2 port adapter. You want to continue to use the print devices connected to your print server. What should you do?

18. Your computer has a mirrored volume and you wish to now install the Recovery Console for future troubleshooting. How do you do this?

19. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5. You want to resolve the problem. What should you do?

20. Your network contains NetWare 4.0 Servers. You have successfully installed Client Service for NetWare on Windows 2000 Professional computers, and Gateway Service for NetWare on Windows 2000 Server Computers. You recently added a new Windows 2000 Server computer to the network and installed Gateway Service for NetWare on it. However, the server is unable to connect to any NetWare servers. What should you do on the new Windows 2000 Server computer to resolve this problem?

21. You install Internet Information Services 5.0 on a computer running Windows 2000 Server. You create two new department web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales web site while a developer updates the contents of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive?

22. You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific Client-Server application to run on, because the application gets very slow returning query data. You want to have the fastest possible access for the Client-Server App to the HDD’s. Which Raid should you apply?

23. You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with a single NTFS partition. You use a third-party tool to add a new partition to the disk. When you restart the server, you received the following error message: “Windows 2000 could not start because the following file is missing or corrupt: system32
toskrnl.exe. Please re-install a copy of the above file.” What should you do to resolve the problem?

24. You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server. What should you do?

25. Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do?

26. How can you recreate the PTR record in your Windows 2000 DNS server from you Windows 2000 client?

27. You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection.to the remote location?

28. You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do?

29. You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

30. Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do?

31. Your network is configured as shown in the exhibit. “Engineering! and Salesl have DHCP installed up them.” All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Salesl and Sales2. The engineering department uses another subnet and has servers named Engineeringl and Engineering2. Salesl and Engineeringl are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Salesl and Engineeringl to support client computers on each other’s subnets. What should you do?

32. The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |” IPX SPX compatible computer deported error 733″ The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

33. You are the administrator of your company’s network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

34. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?

35. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do?

36. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users’ client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: “The local policy of this system does not allow you to logon interactively.” When you attempt to log on to the Terminal server as an administrator from a user’s computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do?

37. How can you assign an application to one processor exclusively?

38. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

39. You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?

40. You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?

41. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain. What should you do?

42. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

43. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

44. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem?

45. Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error “irql_not_less_6r_equal”. You need to bring the server back on line as quickly and reliably as possible. What should you do?

46. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

47. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?

48. You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

49. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

50. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?

51. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

52. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

53. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

54. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it’s problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?

55. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

56. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

57. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?

58. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?

59. You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message “NTLDR is missing, press any key to restart”. You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?

60. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users’ files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: “The disk is full or too many files are open.” What should Amy do to allow this document to be saved?

61. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first?

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *