New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
nutshell the windows 2000 exams
Mcse In A Nutshell The Windows 2000 Exams 1st Edition Michael G Moncur ,Michael Moncur - Solutions
You have just installed a new Windows 2000 Server computer as a domain controller for a new domain in an existing Active Directory forest. Which of the following roles will be assigned to this server by default? (Select all that apply.)a. Schema masterb. Domain naming masterc. Relative ID masterd.
Which of the following are the three basic roles of Windows 2000 Server computers? (Select two answers.)a. Primary domain controllerb. Backup domain controllerc. Domain controllerd. Member server
What is RADIUS commonly used for?a. Dial-up authentication with an ISPb. Dedicated T1 or cable authentication with an ISPc. Storing the IP addresses of all computers behind a firewalld. Storing the IP addresses of domain controllers behind a firewall
Which functions can a standalone subordinate certificate authority perform?a. Issue certificates to usersb. Issue certificates to authorize other standalone subordinate certificate authoritiesc. Accept certificates from usersd. Accept certificates from other standalone subordinate certificate
Which of the following Windows 2000 features is incompatible with EFS?a. NTFSb. File compressionc. File sharingd. Certificate Services
Which of the following are the two modes Windows 2000 Terminal Services can operate in? (Select two.)a. Remote administration modeb. RIS modec. Application sharing moded. Thin client mode
What is Microsoft's implementation of RADIUS called?a. MS-RADIUSb. Kerberosc. Active Directory Authentication Service (ADAS)d. Internet Authentication Service (IAS)
You are designing a smart card login solution for your Windows 2000 network.You have already bought the smart cards and the readers and installed Certificate Services. What else must you do before you can begin using smart card logins?a. Make sure the Enable Ctrl-Alt-Del policy is setb. Make sure
Which of the following operating systems use case-sensitive passwords by default? (Select all that apply.)a. Windows 3.11b. Windows 98c. Windows NTd. Windows 2000
Which of the following certificate types are used to authenticate outside organizations or individuals? (Select all that apply.)a. Standalone root CAb. Standalone subordinate CAc. Enterprise root CAd. Enterprise subordinate CA
Which of the following protocols is used for encryption between web servers and clients?a. NTLMb. SSLc. IASd. EFS
Which of the following is required to allow a new Macintosh computer to access shares on a Windows 2000 server?a. File Services for Macintoshb. AppleTalk protocolc. Both of the aboved. None of the above
Which of the following operating systems support NTLM? (Select all that apply.)a. Windows 3.1b. Windows 98c. Windows NT 4.0d. Windows 2000
Which of the following is Windows 2000's standard authentication method?a. LMb. NTLMc. Kerberosd. Certificate authority
Which of the following refers to Microsoft's implementation of RADIUS?a. RASb. IASc. SMBd. PPTP
Which of the following are Windows 2000 VPN protocols? (Select all that apply.)a. PPTPb. SMBc. PPPd. L2TP
1. You are running NAT to provide Internet access to 10 computers on a network.How many public IP addresses are required?a. 0b. 1c. 10d. 11
Two of the Windows 2000 Professional workstations and one of the Windows 98 machines are used remotely via dial-up connections. You have recently had a number of outside attempts to gain access via the dial-up modems. Which of the following dial-up authentication methods could you use to provide
Create a table with the headings Less Secure and More Secure. Place each of the following pairs of items into the appropriate columns on a line of the table.a. LM vs. NTLMb. NAT vs. Proxy Serverc. SSL vs. HTTPd. Digest authentication vs. standard Windows authenticatione. Smart cards vs. username
You suspect that one or more users have been accessing files they should not have access to. Which of the following could you use to help determine whether this is a problem?a. NTLMb. Auditingc. EFSd. Smart cards
2. Place the following RAS authentication methods under the headings encrypted or unencrypted:a. CHAPb. PAPc. SPAPd. MS-CHAPe. EAP
1. Place the following protocols under the headings name resolution or IP addressing:a. DNSb. DHCPc. WINSd. NATe. ICS
3. After installing the service you chose above, which additional services will be required to provide for the original requirement of Internet access and IP addressing?a. DNSb. DHCPc. NATd. WINS
2. Along with the requirements mentioned above, you want to ensure that the web servers are secured against attacks and to monitor and control Internet access by employees. Which of the following would be the best choice for Internet connectivity?a. ICSb. NATc. Proxy Server 2.0d. A router
1. You are considering using ICS (Internet Connection Sharing) to provide IP addresses and Internet connectivity. Which of the following might be a problem with this approach? (Select all that apply.)a. No support for Macintosh clientsb. No support for incoming connections to the web serversc. No
20. Which of the following is the encryption method used with PPTP virtual private networks under Windows 2000?a. IPSecb. MS-CHAPc. MPPEd. SPAP
19. Which of the following DNS zones is available only in Windows 2000?a. Traditional primary zoneb. Traditional secondary zonec. Active Directory integrated zoned. Reverse lookup zone
18. For client computers running Windows 2000 Professional, which of the following DNS records are updated by the DHCP server?a. PTR recordb. A recordc. MX recordd. None of the above
17. Which one of the following Internet connectivity methods requires a public IP address for each computer that will access the Internet?a. Proxy Serverb. NATc. Routerd. ICS
16. How many PPTP or L2TP ports are supported by default in routing and remote access?a. 1b. 2c. 5d. 16
15. Which of the following routing protocols support router authentication? (Select all that apply.)a. RIP v1b. RIP v2c. OSPFd. L2TP
14. Which Proxy Server feature allows you to support a web or other Internet server on a machine with a private IP address?a. Web Publishingb. Proxy Serverc. Special portsd. Connection sharing
13. Which NAT feature allows you to configure a web or other Internet server on a machine with a private IP address?a. Web Publishingb. Proxy Serverc. Special portsd. Connection sharing
12. Which of the following services are performed by NAT along with address translation? (Select all that apply.)a. DNSb. DHCPc. WINSd. RAS
11. Which of the following is not included with Windows 2000 Server?a. NATb. Proxy Server 2.0c. ICSd. DHCP
10. In Windows 2000, how many WINS server addresses can a client be configured with?a. 1b. 2c. 6d. 12
9. Which of the following can be used to forward DHCP requests between subnets in a network? (Select all that apply.)a. DHCP relayb. RIPc. Hardware routersd. Superscopes
8. Which of the following is a Windows 2000 DHCP feature that allows multiple non-consecutive pools of IP addresses to be used?a. Scopesb. Superscopesc. DNS updatesd. DHCP relay
7. Which of the following operating systems can operate as a DHCP server? (Select all that apply.)a. Windows Meb. Windows NT Serverc. Windows 2000 Professionald. Windows 2000 Server
6. Which of the following is a routing protocol new to Windows 2000?a. RIP v1b. RIP v2c. OSPFd. L2TP
5. Which of the following IPSec policies should you choose for maximum security?a. Respond Onlyb. Require Securityc. Request Security
4. Which of the following are advantages of a proxy server over IP filtering for security? (Select all that apply.)a. Protocol-specific filteringb. Cachingc. Improved speedd. Support for new protocols
3. Which of the following protocols can assign IP addresses to clients from a pool of available addresses? (Select all that apply.)a. DHCPb. NATc. DNSd. ICS
2. Which of the following is not a reserved private IP address?a. 192.168.0.12b. 10.0.10.10c. 209.68.11.152d. 169.254.0.5
Which of the following are used for NetBIOS name resolution? (Select all that apply.)a. DNSb. WINSc. HOSTSd. LMHOSTS
Which of the following is not a network transport protocol?a. TCP/IPb. IPX/SPXc. DLCd. NetBEUI
Which of the following protocols are routable? (Select all that apply.)a. TCP/IPb. IPX/SPXc. NetBEUId. AppleTalk
Which of the following is Windows 2000's default transport protocol?a. TCP/IPb. IPX/SPXc. DLCd. NetBEUI
Why can't the prototyping department open all of the newly moved files?a. The prototyping department's domain controller hasn't been rebooted.b. Any files transferred into an OU never inherit permissions.c. Individual file permissions override the destination OU's permissions.d. The source OU's
Active Directory appears to be malfunctioning. What's the first step for troubleshooting Active Directory?a. Reboot the global catalog server.b. Check the Event Viewer for the Directory Service logs.c. Check the global catalog server for the Directory Service logs.d. Start changing permissions at
You've had to seize the role of a malfunctioning relative ID master. It turned out to be some bad RAM, which was replaced. What else must you do before putting that computer back on the network?a. Format the hard drive and reinstall Windows 2000.b. Just reinstall Windows 2000 without formatting.c.
You have decided to become a Windows 2000 Networking consultant. Your first client has had a networking disaster, during which multiple operations masters have failed. Which operations master failure would you fix first?a. Infrastructure masterb. Domain naming masterc. Relative ID masterd. Global
Which TCP/IP protocols operate at the Host-to-Host layer of the DoD model?(Select all that apply.)a. TCPb. IPc. UDPd. ICMP
Which of the following protocols translates IP addresses to hardware (MAC)addresses?a. IPb. ARPc. RARPd. ICMP
HTTP (Hypertext Transfer Protocol) operates at which layer of the DoD model?a. Network Accessb. Host-to-Hostc. Internetd. Process/Application
Which of the following IP Security options should you choose on a server to maintain the highest level of security?a. Respond Onlyb. Require Securityc. Request Securityd. All of the above
Which of the following are routing protocols used with Windows 2000? (Select all that apply.)a. RIPb. IPXc. RRASd. OSPF
Which type of routing uses routing protocols rather than a manually configured routing table?a. Static routingb. Dynamic routing
Which of the following Windows 2000 features is used to prevent unauthorized ports or protocols from being accessed on a computer?a. IPSecb. IP Filteringc. Certificate Authorityd. ISAKMP
Which of the following protocols are related to email? (Select all that apply.)a. POPb. SNMPc. SMTPd. IMAP
Which of the following techniques is used to combine several consecutive network addresses into a single network?a. Supernettingb. Subnettingc. CIDRd. DHCP
Which of the following techniques is used to divide an IP network into smaller network segments?a. Supernettingb. Subnettingc. CIDRd. DHCP
Of the following IP address classes, which allows for the greatest number of network addresses?a. Class Ab. Class Bc. Class C
You have 2 RIS servers which have been configured to install Windows 2000 Professional on 20 RIS-compatible clients. Each RIS server is copying a slightly different set of files and everything appears to be running smoothly. You check an RIS client and find out that the wrong files were copied to
Which of the following statements best describes how group policies affect permissions?a. Permissions are not inherited from a parent group to a child group.b. Permissions are inherited from a parent group to a child group as long as a parent group permission is not contradicted by the child group
100.152.137b. 2cecfa7b-9316-11d4-bf01-004005a3ae74c. www.oreilly.comd. 78/38*rbl
What is the difference between intrasite and intersite replication?a. Intrasite replication takes place between sites, and intersite replication takes place within a site.b. Intersite replication takes place between sites, and intrasite replication takes place within a site.c. Intrasite replication
What is the name of the universal configuration framework that can be customized to perform almost any configuration task in Windows 2000?a. Microsoft Snap-in Consoleb. Microsoft Administration Consolec. Microsoft Policy Consoled. Microsoft Management Console
Where can you look to verify your domain is being recognized properly after a Windows 2000 installation?a. My Computerb. Control Panelc. My Network Placesd. Network Neighborhood
Which servers need to be installed before Active Directory can run?a. A primary domain controllerb. A backup domain controllerc. A DNS serverd. A web server
When using the Active Directory Installation Wizard, which are valid options?a. Create a new treeb. Create a new Organizational Unit (OU)c. Join an existing treed. a and ce. All of the above
How many backup domain controllers should be upgraded to Windows 2000 Server before the Windows NT Workstations are upgraded to Windows 2000 Professional, assuming no hardware changes are made?a. Oneb. Twoc. Threed. None
How many backup domain controllers should be upgraded to Windows 2000 Server before the primary domain controller?a. Oneb. Twoc. Threed. None
You are trying to log on using the recovery console by booting the computer from the Windows 2000 setup disks. What type of logon account do you need?a. A valid user account on the domainb. A valid user account on that computerc. A backup operator's account on the domaind. A local administrator's
Where can sites be created?a. Within a subnetb. Within a domainc. Across domainsd. All of the above, if given adequate bandwidth
Which protocols can be used to transfer site replication data? (Select all that apply.)a. IPX/SPXb. TCP/IPc. HTTPd. SMTP
What type of trust relationship is automatically observed between computers running Windows 2000 in native mode who reside in the same tree?a. Transitive trustb. Nontransitive trustc. Transitional trustd. Transverse trust
Object security information is stored in an Access Control List (ACL). Which permissions are stored in the ACL? (Select all that apply.)a. NTFS permissionsb. Group permissionsc. FAT permissionsd. HPFS permissions
What is the name of the utility that can move objects between domains?a. Microsoft Management Console (MMC)b. MOVETREEc. Domain Transfer Console (DTC)d. Windows Explorer
Which objects can't be moved between domains? (Select all that apply.)a. Domain controllersb. User accountsc. Organizational Unitsd. System files
Which of the following could be a globally unique identifier (GUID) for an Active Directory object?a.
Which server is automatically configured as the global catalog server?a. The first domain controller in a subnetb. The first domain controller in a forestc. The first domain controller in a treed. The global catalog server isn't automatically configured
Which topology best describes the path that replication follows in Active Directory?a. Ringb. Starc. Busd. Mesh
What does a site link cost determine?a. The amount of money needed to link subnetsb. The total bandwidth needed between sitesc. The connection that will be used for intersite replicationd. The connection that will be used for Internet connectivity
What is an SNMP community?a. A group of computers participating in SNMP monitoringb. The domain where an SNMP Network Management Station residesc. A passwordd. A type of global group
What does the above chart indicate regarding replication?a. Latencyb. Costc. Distanced. Security
If site A is connected to site B for replication and site B is connected to site C for replication, what is the connection between A and C called?a. A transitive trustb. A bridgeheadc. A site link bridged. A shortcut trust
Which of the following changes will decrease the replication cost value between sites?a. Upgrading from a 10 Mbs to 100 Mbs Ethernet setupb. Decreasing the number of domain controllersc. Increasing the number of domain controllersd. None of the above
Which group can apply Group Policies at the site level?a. Domain Adminsb. Enterprise Adminsc. Replication Adminsd. Power Users
When can shortcut trusts be used?a. Between two domains in the same forestb. Between two domains in different forestsc. Between two users in the same OUd. Between two users in the same forest
When can external trusts be used in Windows 2000?a. Between trees in a forestb. Between domains in a treec. Between trees in a domaind. Between domains in different forests
What is the process of putting one group inside of another called?a. Hive managementb. Nestingc. Inheritanced. Subfolders
Which type of Active Directory container is most useful in mapping company departmental structure for the assignment and inheritance of permissions?a. Domain local accountsb. Global accountsc. Treesd. Organizational Units
Two companies are merging, neither of which has a computer network. They decide they want to use Windows 2000 and Active Directory. They have a small IT staff and would like to have a single domain. However, they'd like to keep their naming systems relatively separate. What can you do to best
You are designing groups to be used across an entire Active Directory forest that contains several domains. The domains are at different physical locations and the available bandwidth between these locations is very low. Which type of group allows for access across the entire forest with the
You are trying to create the most efficient site replication strategy possible for a very large network. It has been decided that you should configure bridgehead servers. Which computers are the best candidates to be bridgehead servers?a. Domain controllers with the most unused RAMb. Domain
You are designing an efficient replication strategy for a mid-sized network. What should be your number one priority?a. Making sure there are sufficient services available within each siteb. Increasing the number of replication sitesc. Decreasing the number of domain controllers per sited.
How many computers in the sales department will be involved with the intrasite replication?a. 3b. 5c. 33d. None
You are running Active Directory within a forest. Two workstations in separate trees need to share a Distributed Filesystem folder. What changes to the trust relationship(s) must be made for this folder to be shared between workstations in different trees?a. You must create two separate one-way
You have been given a budget that allows you to buy five new servers. What should you do with this hardware to get biggest performance benefit for your Active Directory network?a. Create five new DNS serversb. Create five new bridgehead serversc. Create five new global catalog serversd. Create five
Showing 400 - 500
of 611
1
2
3
4
5
6
7
Step by Step Answers