【导读】
不凡考网发布计算机2022微软认证证书每日一练在线模考(10月22日)相关信息,更多计算机2022微软认证证书每日一练在线模考(10月22日)的相关资讯请访问不凡考网计算机类考试频道。
1. [多选题]You are installing Windows 2000 Server on a new computer that has a single 10-GB SCSI disk. The disk controller is not included on the current Hardware Compatibility List (HCL). You start the computer by using the Windows 2000 Server CD-ROM.When the computer restarts at the end of the text mode portion of Windows 2000 setup, you receive the following STOP error: "INACCESSIBLE_BOOT_DEVICE."
A. Which two actions should you take to eliminate the STOP error? (Choose Two)
B. Restart the Windows 2000 Setup by using the Windows 2000 Server CD-ROM.
C. Select Safe Mode from the Windows 2000 boot menu.
D. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive.
E. Install a driver for the SCSI controller from a floppy disk.
F. Use Device Manager to update the driver for the SCSI controller.
2. [单选题]You want to install Windows 2000 Professional on 30 PXE-compliant computers and 35 non-PXE-compliant computers. All 65 computers are included on the current hardware compatibility list (HCL). You create a RIS image. You load the image on the RIS server. You then start the 65 computers.You find that the 30 PXE-Compliant computers can connect to the RIS server.
A. However, the 35 non-PXE-compliant computers fail to connect to the RIS server. What should you do?
B. Run Rbfg.exe to create a Non-PXE-compliant startup disk.
C. Run Riprep.exe to create a Non-PXE complaint startup disk.
D. Grant the Everyone group NTFS Read permission for the RIS image.
E. Grant the Administrators group NTFS Read permission for the RIS image.
3. [单选题]You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the computers in your company use the same hardware. However, several different peripheral devices are used throughout the company.You want to verify that the hardware in use is compatible with Windows 2000 Professional. You want to accomplish this with least amount of administrative effort.
A. What should you do?
B. Create several different computer configurations. Install Windows 2000 Professional and enable driver signing.
C. Create a bootable floppy disk that contains and automatically runsWinNT32.exe/CheckUpgradeOnlyQ. Send the floppy disk to each user on the network.
D. Copy the contents of Windows 2000 Professional CD-ROM to a network share. From the network, modify your network logon scripts to runWinNT32.exe/Unattended:ReportOnly.
E. Use Setup Manager to create a Setup.inf file. Add the entryReportOnly=Yes to the [Win9xUpg] section of the answer file. RunWinnt32.exe /Unattended:Setup.infon all of the different computer configurations.
4. [单选题]You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?
A. Configure an ADM template and add the template to the GPO.
B. Configure an INF policy and add the policy to the GPO.
C. Configure a Microsoft Windows installer package and add the package to the GPO.
D. Configure RIS to include the registry entry.
5. [多选题]You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.
A. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)
B. Enable the Always read properties from UDL file option in the Connection Properties dialog box.
C. Disable the Always read properties from UDL file option in the Connection Properties dialog box.
D. Delete the .udl files and store connection details in the registry by using system data source names.
E. Delete the .udl files, and store connection details in the registry by using user data source names.
F. Make the .udl files available on a network share.