Home / CSE / Windows 2000 Server :: Section 2

CSE :: Windows 2000 Server

  1. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

  2. A.
    Install Active Directory on the server
    B.
    Select Basic Authentication check box
    C.
    Clear the Allow Anonymous Connection check box
    D.
    Disable the IUSE_inta user account on Intra
    E.
    Clear the Allow IIS to Control Password check box

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

  4. A.
    Set the CrashonAuditFail registry key to 0
    B.
    Set the Security Log to overwrite events as needed
    C.
    Delete the Liscense Trial registry key
    D.
    Increase the size of the security log
    E.
    Save the security log to a file, and clear it every morning

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?

  6. A.
    Install Network Monitor on Monitor 1
    B.
    Install Network Monitor on Application Server
    C.
    Configure the network monitor ECP port something for TCP
    D.
    Configure the network monitor EDP port something for UDP
    E.
    Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

  8. A.
    Use Computer Management to stop and restart the Server service
    B.
    Use Computer Management to stop and restart the Workstation service
    C.
    Use Task Manager to end any related child processes
    D.
    Use Task Manager to end and automatically restart the Explorer.exe process
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

  10. A.
    Apply a less restrictive custom security template to DC1
    B.
    Apply a less restrictive custom policy to Windows NT domain controller
    C.
    Ensure the Windows 2000 domain is configured in the mixed mode
    D.
    Ensure the Windows 2000 domain is configured to run in the native mode
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?

  12. A.
    Convert the disk that contains the shared folders to a dynamic disk
    B.
    Convert the partition that contains the shared folders to NTFS
    C.
    Defragment the disk that contains the shared folders
    D.
    Move the paging file to the partition that contains the shared folders
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?

  14. A.
    End the task named Application
    B.
    End the Application.exe process
    C.
    End the Application.exe process tree
    D.
    End both the Explorer.exe process and the Application.exe process
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?

  16. A.
    Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume
    B.
    Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume
    C.
    Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command
    D.
    Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?

  18. A.
    Compress the files in her home folder to save disk space
    B.
    Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
    C.
    Move some of the files from her home folder to the IN_PROGRESS shared folder
    D.
    Remove files from her home folder until the total uncompressed file size is less than 100 MB
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first?

  20. A.
    Replace the third disk and restart the server. Use Disk Management to repair the volume
    B.
    Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
    C.
    Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
    D.
    Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
    E.
    None of above

    View Answer

    Workspace

    Discuss Discuss in Forum