Home / CSE / Windows 2000 Server :: Section 2

CSE :: Windows 2000 Server

  1. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

  2. A.
    During the text mode portion of the Windows 2000 setup install the customized HAL
    B.
    After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition
    C.
    After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup
    D.
    After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

  4. A.
    Add the APP1 and APP2 instances to the processor time counter for the process object
    B.
    Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
    C.
    Add only the NTVDM instance for the percent processor time counter for the process object
    D.
    Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem?

  6. A.
    Create a new hardware profile
    B.
    Use Device Manager to remove the integrated 10-MB Ethernet adapter
    C.
    Use Device Manager to disable the integrated 10-MB Ethernet adapter
    D.
    Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_6r_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?

  8. A.
    Restart the computer by using the last known good menu option
    B.
    Perform an emergency repair and select fast repair, restart the computer
    C.
    Restart the computer in the safe mode, remove the driver and restart the computer
    D.
    Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

  10. A.
    Replace the third disk and restart the server. Use disk Management to repair the volume
    B.
    Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
    C.
    Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
    D.
    Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?

  12. A.
    Convert both to dynamic disks
    B.
    Create an empty extended partition on new disk
    C.
    Create a single unformatted primary partition on new array
    D.
    Format new disk array as a single NTFS primary partition
    E.
    Format the new disk array as a single NTFS logical drive in an extended partition

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

  14. A.
    Move the intranet server to the client segment of the network
    B.
    Move the proxy server to the server segment of the network
    C.
    Configure each client computer to bypass the proxy server for local addresses
    D.
    Configure each client computer to use port 81 for the proxy server
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

  16. A.
    Convert the disk to dynamic disk shut down and restart the server
    B.
    Backup the data on the stripe volume and delete the stripe volume. Create a raid5 volume on the four disks, restore the data to the new raidS volume
    C.
    Backup the data on the stripe volume and delete the stripe volume. Create to mirror volume, shut down and restart the server. Restore the data to new mirror volumes
    D.
    Backup the data on the stripe volume and delete the stripe volume. Create a span volume for the first two disks, create a second span volume for the last two disk. Mount the root of the second span volume in the root of the first span volume. Restore the data to the first span volume
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?

  18. A.
    Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package
    B.
    Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy
    C.
    Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy
    D.
    Place the service pack in a Distributed file system (Dfs)
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

  20. A.
    CHAP
    B.
    MS-CHAP v2
    C.
    PAP
    D.
    SPAP
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum