CertCities.com -- The Ultimate Site for Certified IT Professionals
"
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  e-Book Shop
  Practice Exams
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Industry Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

CertCities.com
Let us know what you
think! E-mail us at:



-- advertisement --
Traveling to a
Tradeshow or Event?
France Hotels
North Carolina Hotels
Fraser CO Hotels
Kingman AZ Hotels
Durango Hotels
Georgetown CO Hotels
St. Paul Hotels
Santa Monica Hotels
Honolulu Hotels
Elkton FL Hotels

 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Saturday: January 8, 2005



The New TechMentor Register Early and Save!
  • 6 New Tracks
  • Exam Discounts
  • Year-End Savings
Register by
March 4th
and save $200 off
the new TechMentor!

* REGISTERED USERS ONLY

Microsoft Exam #70-215: Installing, Configuring, and Administering Windows 2000 Server
6 questions. Answers can be found at the end of the quiz.

courtesy of   Transcender LLC

Questions

1. A Windows 2000 file server hosts home directories of several hundred users. Files are intensively written and deleted on the computer's disks, which causes fragmentation. You do not want to perform the defragmentation prematurely. Which of the following commands should you use to determine whether you should run the defragmentation utility on a particular disk?

a. Defragment in Disk Defragmenter

b. Check Now on the Tools tab in the disk's Properties page

c. Analyze in Disk Defragmenter

d. Defragment Now on the Tools tab in the disk's Properties page

 

2. Your corporate network includes 230 Windows 2000 computers and 18 UNIX computers. There is a print device attached to a UNIX computer, and you want to enable Windows 2000 clients to print to that device. You want to accomplish this task in the most efficient and economical manner. Which of the following steps should you take?

a. Install Print Services for UNIX on a Windows 2000 Server print server.

b. Install an LPR port on each Windows 2000 client computer.

c. Install an LPR port on the Windows 2000 Server print server.

d. Install Print Services for UNIX on the UNIX print server.

e. Install an LPR port on the UNIX print server.

f. Install Print Services for UNIX on each Windows 2000 client computer.

 

3.You are a Windows 2000 network administrator for your company. All computers in the Marketing department belong to the Marketing organizational unit (OU). You suspect that someone has been trying to gain unauthorized access to files on the computers in Marketing. You want to identify that person without affecting other computers. Which two steps should you take to accomplish this task with the least amount of administrative effort?

a. Enable an audit policy for the Marketing OU.

b. Enable auditing for the Everyone group for the files or folders that you suspect are under attack.

c. Enable an audit policy for each computer in the Marketing OU individually.

d. Enable auditing for the Marketing group.

 

4. You have implemented a Windows 2000 Server computer on your company's network and configured it as a file server. Windows NT and Windows 98 users complain that they cannot connect to the new server to store their files on it. TCP/IP is configured on the file server as shown in the exhibit.

Question 4 graphic

What changes should you make in the configuration of the file server to correct the problem?

a. Specify the IP address of at least one WINS server.

b. Enable LMHOSTS lookup.

c. Enable NetBIOS over TCP/IP.

d. Import the same LMHOSTS file that the Windows NT and Windows 98 clients are using.

 

5. A user named Susan needs to encrypt her files that are stored on several Windows 2000 file servers. Because of the sensitive nature of her work, Susan is allowed to interactively log on to each of the file servers and to access her files locally. She is not allowed remote access to these files. After the files have been encrypted, she should be able to edit the files and then save the edited versions with the encryption in place. Which of the following should you do to provide Susan with the required functionality?

a. Nothing needs to be done. Susan can encrypt and decrypt any file that she owns on any file server to which she has access.

b. Enable the file servers to be trusted for delegation.

c. Create a roaming user profile for Susan.

d. Implement a certification authority (CA).

6. Andrew is a new employee who has been designated as an administrator of your corporate network, which includes several Windows 2000 domains. Working interactively on a Windows 2000 member server, Andrew attempts to run Windows Update in order to install several critical updates. Andrew receives an error message that indicates that he does not have the necessary permissions to install the updates. Which of the following actions is most likely to enable Andrew to install the updates?

a. Andrew should log on as a member of the Enterprise Admins universal group.

b. Andrew should log on as a member of the Domain Admins global group in the domain where the member server belongs.

c. Andrew should log on as a member of the built-in Administrators local group on the member server.

d. Andrew should log on as a member of the built-in Administrators local group in the domain where the member server belongs.

 

Answers:

1) Choice c is correct. To determine whether you should run defragmentation without actually starting the defragmentation process, you should click Analyze in Disk Defragmenter. The physical structure of the files on a specific volume will be analyzed, and you will receive a color diagram and a tabular report. Using this information, you can decide whether you should actually defragment that volume. The Defragment command in Disk Defragmenter also performs the same analysis, but you do not receive a tabular report; instead, defragmentation starts immediately. The Check Now button on the Tools tab in the volume's Properties page is used to start the program that checks and can automatically correct certain types of data integrity problems. Clicking the Defragment Now button on the Tools tab in the volume's Properties page only causes the Disk Defragmenter window to appear; neither analysis nor defragmentation will start until you click the appropriate button in Disk Defragmenter. Reference: W2KSOH, Contents, "Monitoring and Diagnostics Tools," "Disk Defragmenter," "Concepts," "Disk Defragmenter overview." W2KSOH, Contents, "Monitoring and Diagnostics Tools," "Disk Defragmenter," "Concepts," "Understanding Disk Defragmenter (entire section)." W2KSOH, Contents, "Monitoring and Diagnostics Tools," "Disk Defragmenter," "How To... (entire section)."

2) Only choices a and c are correct. The best way to enable Windows 2000 users to print to the print device on a UNIX print server is to install a printer for that print device on a Windows 2000 Server print server and then share the printer. On the Windows 2000 Server print server, you should install Print Services for UNIX, install an LPR-compliant port, install the appropriate printer on the LPR port, and then share the printer. The LPR port on a Windows 2000 computer implements a print client for the LPD utility, which is the native UNIX print server utility. Windows 2000 clients will not need any additional software to connect to the printer shared on the Windows 2000 print server. The driver will be downloaded and installed automatically on a Windows 2000 client computer the first time that the client connects to the shared printer. Alternatively, you can install Windows Services for UNIX on each Windows 2000 client computer, install an LPR port and install the printer. However, this is not the best solution because it requires more effort to install the printer on all Windows 2000 client computers than to install it only once on a Windows 2000 Server print server. Print Services for UNIX and an LPR port are Windows 2000 components; they cannot be installed on UNIX computers. UNIX print servers run the native LPD utility, and UNIX print clients run the native LPR utility. Reference: W2KSRK, Contents, "Server Operations Guide," "Storage, File Systems, and Printing," "Network Printing," "Working with Other Operating Systems," "Printing with UNIX Clients and Servers Using LPR/LPD."

3) Choices a and b are correct. To track access attempts to file resources on computers in the Marketing OU, you should first create a Group Policy object linked to the OU. Open the policy in Group Policy Editor and navigate to the node Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy. In the right pane, click Audit object access, select Security from the Action menu and enable auditing of success and failure. Then, you should use Windows Explorer to configure auditing for particular files or folders on the appropriate computers. Instead of creating a Group Policy object for the OU, you can enable an audit policy locally on each computer. However, this would require more effort than configuring a single policy one time. If you audit access only by users who belong to the Marketing group, then you may miss the perpetrator because he or she may be anyone, not necessarily a member of the Marketing group. Reference: W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Distributed Security," "Setting Uniform Security Policies," "Group Policy." W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Distributed Security," "Setting Uniform Security Policies," "Group Policy Security Settings." W2KSOH, Contents, "Security," "Concepts," "Understanding Security," "Auditing Security Events (entire section)." W2KSOH, Contents, "Security," "How To...," "Audit Events (entire section)."

4) Choice c is correct. NetBIOS is a naming convention and a programming interface that was used with previous versions of Windows, such as Windows NT, Windows 9x and Windows 3.x. Computers with these operating systems used a flat NetBIOS namespace and identified each other by NetBIOS names. On routed networks, either WINS, server-based name resolution service, or a local LMHOSTS file on each computer had to be used for mapping computer names to their IP addresses. Additionally, NetBIOS was also used to provide support for browsing in Network Neighborhood. Windows 2000 uses DNS naming service and does not require NetBIOS in a purely Windows 2000 environment. However, Windows 2000 supports both NetBIOS and WINS for backward compatibility with earlier versions of Windows in a mixed environment. In this scenario, you should enable NetBIOS over TCP/IP on the new Windows 2000 file server, and then the users of down-level Windows computers will be able to locate the file server and to store their files on it. You can specify the IP address of a WINS server or enable LMHOSTS lookup and create or import an LMHOSTS file. However, none of those steps is necessarily required. If the network is not routed, then all computers can use broadcasts for NetBIOS name registration and resolution. Even if the network is routed, only the client computers would need to use NetBIOS name resolution means, such as WINS or LMHOSTS files, because client computers initiate all connections for file access. The server responds to a client request by using the client's IP address provided in the request. Reference: W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Determining Domain Migration Strategies," "Planning Domain Upgrade," "Using NetBIOS with Windows 2000." W2KSRK, Contents, "TCP/IP Core Networking Guide," "Windows 2000 TCP/IP," "Windows 2000 TCP/IP," "Network Application Interfaces," "NetBIOS over TCP/IP."

5) Choice a is correct. Encrypting File System (EFS) generates a unique file encryption key for each file that is encrypted. After the file has been encrypted, the file encryption key is encrypted with the user's public key. To decrypt the file, EFS must first decrypt the file encryption key by using the user's private key. Both the public and private keys are associated with the user's certificate, which can be issued either by a CA or by EFS if no CA is available. The certificate and the keys are stored in the user's profile. When Susan interactively logs on to a file server for the first time, her local user profile is created on that computer. The first time she encrypts a file on that computer, a copy of her certificate will be installed in her local profile. Therefore, she can log on interactively to her domain user account from any of the file servers and encrypt and decrypt any of her files on those computers. If Susan had to encrypt and decrypt files on a remote file server while she is logged on to her workstation, then the remote server would have to be trusted for delegation in order to be able to access Susan's certificate and the associated keys in her local user profile on her workstation. A roaming user profile is a profile that is stored somewhere on a network share and is loaded whenever the user logs on to his or her domain account from different computers. The path to a roaming user profile is specified in the user's account properties. If Susan were assigned to several workstations in the company from which she had to encrypt and decrypt her files on a remote file server, then the remote file server would have to be trusted for delegation and Susan would have to use a roaming user profile. In that case, her certificate would be downloaded together with the profile to the workstation that she would be using, and then the certificate would be destroyed when she logged off or when the computer was restarted. Reference: W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "Features of EFS." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "What the User Sees." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "How EFS Works." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "How Certificates Are Stored."

6) Choice c is correct. Andrew is unable to install the updates because the user account with which he logged on has insufficient permissions on the member server. The most powerful group on the member server is the built-in Administrators local group that is defined on that computer. If Andrew can log on as a member of the built-in Administrators local group on the member server, then he will most definitely have all of the permissions that may be necessary to install the updates. By default, the Domain Admins global group is made a member of the built-in Administrators local group on each member server in the domain. However, Domain Admins can be removed from the built-in Administrators local group on any of the member servers in that domain. Therefore, logging on as a member of Domain Admins is less likely to provide Andrew with the necessary permissions. Enterprise Admins is a universal group that resides in the forest's root domain and, by default, is a member of the built-in Adminstrators local group in each domain in the forest. However, membership in the built-in Administrators local group in the domain does not provide any administrative privileges on member servers. Reference: W2KSRK, Contents, "Server Operations Guide," "Troubleshooting," "Troubleshooting Strategies," "Troubleshooting Tools for Windows 2000," "Windows Update." W2KSRK, Contents, "Distributed Systems Guide," "Appendixes," "Well-Known Security Identifiers."

These questions and answers are provided by Transcender LLC. Order the full version of this exam simulation online at www.transcender.com, phone 615-726-8779, 8 a.m. - 6 p.m., (CST), M - F, fax 615-726-8884, or mail to Transcender LLC, 565 Marriott Drive, Suite 300, Nashville, TN 37214.


More Pop Quiz:


There are 35 CertCities.com user Comments for “Microsoft Exam #70-215: Installing, Configuring, and Administering Windows 2000 Server”
Page 1 of 4
11/18/00: Petar says: Very good test and explantions, typical of transcender. Too bad the Aussie dollar is so weak.
11/19/00: Josh says: Only got 3 correct (2 plus .5 + .5). Lots of detail here; good explanations in the answers.
12/21/00: Fen says: I have been studying 70-210 for 3 days now and did much better on this exam than the one made for 70-210. Whats up with that?
4/10/01: J says: Quite accurate test!
5/1/01: Mike says: These questions are lifted directly from the Transcenders tests. Whoever came up with this site, I hope they wrote a disclaimer saying "hey, BTW I ripped these questions directly from the people at Transcenders". What a rip......
5/1/01: Becky says: Hi Mike -- Did you happen to read the courtesy line at the top, or the credit line at the bottom? If so, you'd notice that Transcender provides these questions to us (that's what the line "These questions and answers are provided by Transcender LLC" means.) Thanks for your concern though -- had we ripped off the quesitons, your post would be right on. Best, -- Becky Nagel, Web Editor, CertCities.com
5/8/01: Anonymous says: cool
7/23/01: Waldo says: lol i want this mike dude to work on my Network team hes a real bright one......
8/6/01: Rocco says: Sock it to 'em Becky. Don't take that stuff. I thought these questions gave you enough to work with and the answers were detailed in there explanations. Typical of Transcender. Very good.
8/13/01: Julio Cesar says: It is a very good test - it's help us a lot to stay updated.
First Page   Next Page   Last Page

Want to read the whole article? Please register. It's free, it's easy, and you'll only need to register once to access all of CertCities.com's exam reviews, tips articles, the ability to post under articles, and more. Click on the button below to start your registration,or read our FAQ if you'd like more information.
Already registered? Log in here:
User Name:
Password:
Remember me on this computer
" Forgot User Name/Password

top

Sponsored Links:
MeasureUp Practice Tests On Sale: Get your A+, MCDST, MCSA, or MCSE!
Free Authorized Cisco eLearning: from Global Knowledge
TechMentor is Back in Orlando with 6 New Tracks: April 4-8, 2005
Keep Current on Microsoft News: Subscribe to Redmond Report Newsletter
IT certification news delivered weekly: Subscribe Today!



Home | Microsoft® | Cisco® | Oracle® | A+/Network+" | Linux/Unix | MOS | Security | List of Certs
Advertise | Contact Us | Contributors | Features | Forums | News | Pop Quiz | Tips | Industry Releases | RSS Feeds RSS Feeds from CertCities.com
Search | Site Map | ENTmag.com | MCPmag.com | TCPmag.com | TechMentor Conferences | 101communications | Privacy Policy
This Web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc., Microsoft Corp., Oracle Corp., The Computing Technology Industry Association, Linus Torvolds, or any other certification or technology vendor. Cisco® and Cisco Systems® are registered trademarks of Cisco Systems, Inc. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corp. Oracle® is a registered trademark of Oracle Corp. A+®, i-Net+T, Network+T, and Server+T are trademarks and registered trademarks of The Computing Technology Industry Association. (CompTIA). LinuxT is a registered trademark of Linus Torvalds. All other trademarks belong to their respective owners.
Reprints allowed with written permission from the publisher. For more information, e-mail
Application Development Trends | Campus Technology | CertCities.com | The Data Warehousing Institute | E-Gov | ENT News
Enterprise Systems | Federal Computer Week | IT Compliance Institute | JavaSPEKTRUM | MCP TechMentor Conferences
MCPmag.com | OBJEKTspektrum | Recharger | Redmond magazine | SIGS-DATACOM | TCPmag.com
Copyright 1996-2005 101communications. See our Privacy Policy.
101communications