CertCities.com -- The Ultimate Site for Certified IT Professionals
"
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  e-Book Shop
  Practice Exams
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Industry Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

CertCities.com
Let us know what you
think! E-mail us at:



-- advertisement --
Traveling to a
Tradeshow or Event?
Loveland CO Hotels
Myrtle Beach Hotels
Portland Hotels
Port St Lucie FL Hotels
Lantana FL Hotels
Debary FL Hotels
Little Rock Hotels
Marianna FL Hotels
Tulsa Hotels
Siesta Key FL Hotels

 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Saturday: January 8, 2005



The New TechMentor Register Early and Save!
  • 6 New Tracks
  • Exam Discounts
  • Year-End Savings
Register by
March 4th
and save $200 off
the new TechMentor!

* REGISTERED USERS ONLY

Microsoft Exam #70-215: Installing, Configuring, and Administering Windows 2000 Server
6 questions. Answers can be found at the end of the quiz.

courtesy of   Transcender LLC

Questions

1. A Windows 2000 file server hosts home directories of several hundred users. Files are intensively written and deleted on the computer's disks, which causes fragmentation. You do not want to perform the defragmentation prematurely. Which of the following commands should you use to determine whether you should run the defragmentation utility on a particular disk?

a. Defragment in Disk Defragmenter

b. Check Now on the Tools tab in the disk's Properties page

c. Analyze in Disk Defragmenter

d. Defragment Now on the Tools tab in the disk's Properties page

 

2. Your corporate network includes 230 Windows 2000 computers and 18 UNIX computers. There is a print device attached to a UNIX computer, and you want to enable Windows 2000 clients to print to that device. You want to accomplish this task in the most efficient and economical manner. Which of the following steps should you take?

a. Install Print Services for UNIX on a Windows 2000 Server print server.

b. Install an LPR port on each Windows 2000 client computer.

c. Install an LPR port on the Windows 2000 Server print server.

d. Install Print Services for UNIX on the UNIX print server.

e. Install an LPR port on the UNIX print server.

f. Install Print Services for UNIX on each Windows 2000 client computer.

 

3.You are a Windows 2000 network administrator for your company. All computers in the Marketing department belong to the Marketing organizational unit (OU). You suspect that someone has been trying to gain unauthorized access to files on the computers in Marketing. You want to identify that person without affecting other computers. Which two steps should you take to accomplish this task with the least amount of administrative effort?

a. Enable an audit policy for the Marketing OU.

b. Enable auditing for the Everyone group for the files or folders that you suspect are under attack.

c. Enable an audit policy for each computer in the Marketing OU individually.

d. Enable auditing for the Marketing group.

 

4. You have implemented a Windows 2000 Server computer on your company's network and configured it as a file server. Windows NT and Windows 98 users complain that they cannot connect to the new server to store their files on it. TCP/IP is configured on the file server as shown in the exhibit.

Question 4 graphic

What changes should you make in the configuration of the file server to correct the problem?

a. Specify the IP address of at least one WINS server.

b. Enable LMHOSTS lookup.

c. Enable NetBIOS over TCP/IP.

d. Import the same LMHOSTS file that the Windows NT and Windows 98 clients are using.

 

5. A user named Susan needs to encrypt her files that are stored on several Windows 2000 file servers. Because of the sensitive nature of her work, Susan is allowed to interactively log on to each of the file servers and to access her files locally. She is not allowed remote access to these files. After the files have been encrypted, she should be able to edit the files and then save the edited versions with the encryption in place. Which of the following should you do to provide Susan with the required functionality?

a. Nothing needs to be done. Susan can encrypt and decrypt any file that she owns on any file server to which she has access.

b. Enable the file servers to be trusted for delegation.

c. Create a roaming user profile for Susan.

d. Implement a certification authority (CA).

6. Andrew is a new employee who has been designated as an administrator of your corporate network, which includes several Windows 2000 domains. Working interactively on a Windows 2000 member server, Andrew attempts to run Windows Update in order to install several critical updates. Andrew receives an error message that indicates that he does not have the necessary permissions to install the updates. Which of the following actions is most likely to enable Andrew to install the updates?

a. Andrew should log on as a member of the Enterprise Admins universal group.

b. Andrew should log on as a member of the Domain Admins global group in the domain where the member server belongs.

c. Andrew should log on as a member of the built-in Administrators local group on the member server.

d. Andrew should log on as a member of the built-in Administrators local group in the domain where the member server belongs.

 

Answers:

1) Choice c is correct. To determine whether you should run defragmentation without actually starting the defragmentation process, you should click Analyze in Disk Defragmenter. The physical structure of the files on a specific volume will be analyzed, and you will receive a color diagram and a tabular report. Using this information, you can decide whether you should actually defragment that volume. The Defragment command in Disk Defragmenter also performs the same analysis, but you do not receive a tabular report; instead, defragmentation starts immediately. The Check Now button on the Tools tab in the volume's Properties page is used to start the program that checks and can automatically correct certain types of data integrity problems. Clicking the Defragment Now button on the Tools tab in the volume's Properties page only causes the Disk Defragmenter window to appear; neither analysis nor defragmentation will start until you click the appropriate button in Disk Defragmenter. Reference: W2KSOH, Contents, "Monitoring and Diagnostics Tools," "Disk Defragmenter," "Concepts," "Disk Defragmenter overview." W2KSOH, Contents, "Monitoring and Diagnostics Tools," "Disk Defragmenter," "Concepts," "Understanding Disk Defragmenter (entire section)." W2KSOH, Contents, "Monitoring and Diagnostics Tools," "Disk Defragmenter," "How To... (entire section)."

2) Only choices a and c are correct. The best way to enable Windows 2000 users to print to the print device on a UNIX print server is to install a printer for that print device on a Windows 2000 Server print server and then share the printer. On the Windows 2000 Server print server, you should install Print Services for UNIX, install an LPR-compliant port, install the appropriate printer on the LPR port, and then share the printer. The LPR port on a Windows 2000 computer implements a print client for the LPD utility, which is the native UNIX print server utility. Windows 2000 clients will not need any additional software to connect to the printer shared on the Windows 2000 print server. The driver will be downloaded and installed automatically on a Windows 2000 client computer the first time that the client connects to the shared printer. Alternatively, you can install Windows Services for UNIX on each Windows 2000 client computer, install an LPR port and install the printer. However, this is not the best solution because it requires more effort to install the printer on all Windows 2000 client computers than to install it only once on a Windows 2000 Server print server. Print Services for UNIX and an LPR port are Windows 2000 components; they cannot be installed on UNIX computers. UNIX print servers run the native LPD utility, and UNIX print clients run the native LPR utility. Reference: W2KSRK, Contents, "Server Operations Guide," "Storage, File Systems, and Printing," "Network Printing," "Working with Other Operating Systems," "Printing with UNIX Clients and Servers Using LPR/LPD."

3) Choices a and b are correct. To track access attempts to file resources on computers in the Marketing OU, you should first create a Group Policy object linked to the OU. Open the policy in Group Policy Editor and navigate to the node Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy. In the right pane, click Audit object access, select Security from the Action menu and enable auditing of success and failure. Then, you should use Windows Explorer to configure auditing for particular files or folders on the appropriate computers. Instead of creating a Group Policy object for the OU, you can enable an audit policy locally on each computer. However, this would require more effort than configuring a single policy one time. If you audit access only by users who belong to the Marketing group, then you may miss the perpetrator because he or she may be anyone, not necessarily a member of the Marketing group. Reference: W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Distributed Security," "Setting Uniform Security Policies," "Group Policy." W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Planning Distributed Security," "Setting Uniform Security Policies," "Group Policy Security Settings." W2KSOH, Contents, "Security," "Concepts," "Understanding Security," "Auditing Security Events (entire section)." W2KSOH, Contents, "Security," "How To...," "Audit Events (entire section)."

4) Choice c is correct. NetBIOS is a naming convention and a programming interface that was used with previous versions of Windows, such as Windows NT, Windows 9x and Windows 3.x. Computers with these operating systems used a flat NetBIOS namespace and identified each other by NetBIOS names. On routed networks, either WINS, server-based name resolution service, or a local LMHOSTS file on each computer had to be used for mapping computer names to their IP addresses. Additionally, NetBIOS was also used to provide support for browsing in Network Neighborhood. Windows 2000 uses DNS naming service and does not require NetBIOS in a purely Windows 2000 environment. However, Windows 2000 supports both NetBIOS and WINS for backward compatibility with earlier versions of Windows in a mixed environment. In this scenario, you should enable NetBIOS over TCP/IP on the new Windows 2000 file server, and then the users of down-level Windows computers will be able to locate the file server and to store their files on it. You can specify the IP address of a WINS server or enable LMHOSTS lookup and create or import an LMHOSTS file. However, none of those steps is necessarily required. If the network is not routed, then all computers can use broadcasts for NetBIOS name registration and resolution. Even if the network is routed, only the client computers would need to use NetBIOS name resolution means, such as WINS or LMHOSTS files, because client computers initiate all connections for file access. The server responds to a client request by using the client's IP address provided in the request. Reference: W2KSRK, Contents, "Deployment Planning Guide," "Active Directory Infrastructure," "Determining Domain Migration Strategies," "Planning Domain Upgrade," "Using NetBIOS with Windows 2000." W2KSRK, Contents, "TCP/IP Core Networking Guide," "Windows 2000 TCP/IP," "Windows 2000 TCP/IP," "Network Application Interfaces," "NetBIOS over TCP/IP."

5) Choice a is correct. Encrypting File System (EFS) generates a unique file encryption key for each file that is encrypted. After the file has been encrypted, the file encryption key is encrypted with the user's public key. To decrypt the file, EFS must first decrypt the file encryption key by using the user's private key. Both the public and private keys are associated with the user's certificate, which can be issued either by a CA or by EFS if no CA is available. The certificate and the keys are stored in the user's profile. When Susan interactively logs on to a file server for the first time, her local user profile is created on that computer. The first time she encrypts a file on that computer, a copy of her certificate will be installed in her local profile. Therefore, she can log on interactively to her domain user account from any of the file servers and encrypt and decrypt any of her files on those computers. If Susan had to encrypt and decrypt files on a remote file server while she is logged on to her workstation, then the remote server would have to be trusted for delegation in order to be able to access Susan's certificate and the associated keys in her local user profile on her workstation. A roaming user profile is a profile that is stored somewhere on a network share and is loaded whenever the user logs on to his or her domain account from different computers. The path to a roaming user profile is specified in the user's account properties. If Susan were assigned to several workstations in the company from which she had to encrypt and decrypt her files on a remote file server, then the remote file server would have to be trusted for delegation and Susan would have to use a roaming user profile. In that case, her certificate would be downloaded together with the profile to the workstation that she would be using, and then the certificate would be destroyed when she logged off or when the computer was restarted. Reference: W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "Features of EFS." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "What the User Sees." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "How EFS Works." W2KSRK, Contents, "Distributed Systems Guide," "Distributed Security," "Encrypting File System," "Introduction to EFS," "How Certificates Are Stored."

6) Choice c is correct. Andrew is unable to install the updates because the user account with which he logged on has insufficient permissions on the member server. The most powerful group on the member server is the built-in Administrators local group that is defined on that computer. If Andrew can log on as a member of the built-in Administrators local group on the member server, then he will most definitely have all of the permissions that may be necessary to install the updates. By default, the Domain Admins global group is made a member of the built-in Administrators local group on each member server in the domain. However, Domain Admins can be removed from the built-in Administrators local group on any of the member servers in that domain. Therefore, logging on as a member of Domain Admins is less likely to provide Andrew with the necessary permissions. Enterprise Admins is a universal group that resides in the forest's root domain and, by default, is a member of the built-in Adminstrators local group in each domain in the forest. However, membership in the built-in Administrators local group in the domain does not provide any administrative privileges on member servers. Reference: W2KSRK, Contents, "Server Operations Guide," "Troubleshooting," "Troubleshooting Strategies," "Troubleshooting Tools for Windows 2000," "Windows Update." W2KSRK, Contents, "Distributed Systems Guide," "Appendixes," "Well-Known Security Identifiers."

These questions and answers are provided by Transcender LLC. Order the full version of this exam simulation online at www.transcender.com, phone 615-726-8779, 8 a.m. - 6 p.m., (CST), M - F, fax 615-726-8884, or mail to Transcender LLC, 565 Marriott Drive, Suite 300, Nashville, TN 37214.


More Pop Quiz:


There are 35 CertCities.com user Comments for “Microsoft Exam #70-215: Installing, Configuring, and Administering Windows 2000 Server”
Page 2 of 4
9/1/01: JBMubo says: Good test!.. got 4/6. failed Questions 2&3, because i did not pay attention. I chose 1 option on those 2 where it required 2 options.!
9/11/01: javier says: this was a great pool of questions. notice mike didn't tell how many he missed. must be difficult for him. 5/6 correct
9/17/01: J.B says: Got all Qs 6/6, good for practice!.
10/31/01: kadima says: have learned alot from u guyz.bra-vo and pliz let me get your magazine via kadima victor kenyatta university cyber p.o box 43844 nairobi (kenya)this were good study questions .keep it up
12/5/01: cathy says: I got one right! I hope these are n+ questions and not A+! Cos if they're A+ I'm heading the wrong way!!!!!
12/5/01: cathy says: help ?!
12/9/01: shawky ahmed says: dear web master pls send me demo tets for the follow cant find it in yr site pls confirm immediatly rgsd eng shawky need the demo of the test of 70-216 - implementing infrstructure 70-218 for managing microsoft win enviroment
1/14/02: Frank from Uganda says: This is great, I wish U can increase on the no. of qns. The explanation is really good..
2/7/02: Mike says: Oh ok real funny, so I did not see the tiny little print about the questions coming from Transcender. I don't think Becky should try to take credit for this website because it is not like it is that good anyway. Oh ya and Waldo, I work on a network with over 250 workstations and 6 servers so I am sure I would be over qualified to work on your network!
2/20/02: marty says: i got 6 of 6 right, think im about ready for this test!
First Page   Previous Page     Next Page   Last Page

Want to read the whole article? Please register. It's free, it's easy, and you'll only need to register once to access all of CertCities.com's exam reviews, tips articles, the ability to post under articles, and more. Click on the button below to start your registration,or read our FAQ if you'd like more information.
Already registered? Log in here:
User Name:
Password:
Remember me on this computer
" Forgot User Name/Password

top

Sponsored Links:
MeasureUp Practice Tests On Sale: Get your A+, MCDST, MCSA, or MCSE!
Free Authorized Cisco eLearning: from Global Knowledge
TechMentor is Back in Orlando with 6 New Tracks: April 4-8, 2005
Keep Current on Microsoft News: Subscribe to Redmond Report Newsletter
IT certification news delivered weekly: Subscribe Today!



Home | Microsoft® | Cisco® | Oracle® | A+/Network+" | Linux/Unix | MOS | Security | List of Certs
Advertise | Contact Us | Contributors | Features | Forums | News | Pop Quiz | Tips | Industry Releases | RSS Feeds RSS Feeds from CertCities.com
Search | Site Map | ENTmag.com | MCPmag.com | TCPmag.com | TechMentor Conferences | 101communications | Privacy Policy
This Web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc., Microsoft Corp., Oracle Corp., The Computing Technology Industry Association, Linus Torvolds, or any other certification or technology vendor. Cisco® and Cisco Systems® are registered trademarks of Cisco Systems, Inc. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corp. Oracle® is a registered trademark of Oracle Corp. A+®, i-Net+T, Network+T, and Server+T are trademarks and registered trademarks of The Computing Technology Industry Association. (CompTIA). LinuxT is a registered trademark of Linus Torvalds. All other trademarks belong to their respective owners.
Reprints allowed with written permission from the publisher. For more information, e-mail
Application Development Trends | Campus Technology | CertCities.com | The Data Warehousing Institute | E-Gov | ENT News
Enterprise Systems | Federal Computer Week | IT Compliance Institute | JavaSPEKTRUM | MCP TechMentor Conferences
MCPmag.com | OBJEKTspektrum | Recharger | Redmond magazine | SIGS-DATACOM | TCPmag.com
Copyright 1996-2005 101communications. See our Privacy Policy.
101communications