1. [单选题]You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports. You name the share WebReports and allow Read permissions on the share.You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, 'You are not authorized to view this page.'
A. You need to be able to access the folder. What must you do?
B. Allow write permission on WebReports.
C. Allow directory browsing permissions on WebReports.
D. In the IIS console, enable anonymous access to WebReports.
E. In the IIS console, set the execute permissions option to script. and executables on WebReports.
2. [单选题]You want to configure a multiboot system with Windows NT Workstation and Windows 2000 Professional.What should you do?
A. When installing Windows 2000 Professional run chkdisk in Windows NT Workstation.
B. Disable the disk compression in Windows NT Workstation.
C. Install service pack four or later in Windows NT Workstation.
D. Install the distributed file system client on the Windows NT Workstation.
3. [多选题]You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.
A. You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
B. Implement merge replication.
C. Implement snapshot replication.
D. Implement transactional replication.
E. Schedule replication to run continuously.
F. Schedule replication to run during off-peak hours.
4. [单选题]You are the network administrator for Ezonexam.Your Windows 2000 Server computer named Ezonexam1 contains two 36-GB hard disks. Disk 0 and Disk 1. Each disk is configured as a basic disc and has a single 36-GB NTFS partition. Both partitions are backed up to a tape each night. The partition on Disk 1 stores user data. Most users at Ezonexam encrypt their files. Disk 1 fails. You replace it with a new hard disk and create a single NTFS partition.
A. You need to recover the data as quickly as possible while maintaining the security of the files on Disk 1.
B. What should you do?
C. Restore the contents of Disk 1 from the most recent tape backup to a second file server. Instruct users to copy their files from the second file server to the new partition.
D. Restore the contents of Disk 1 from the most recent tape backup to a second file server. Log on to Ezonexam1 console as a recovery agent. Copy the files from the second file server to the new partition.
E. Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Instruct the users to verify the integrity of their files.
F. Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Run the cipher command to decrypt the files.
5. [单选题]You are the administrator of your company's network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him.Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.
A. You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort.
B. What should you do?
C. Rename Mark's user account to Eric and change the account password.
D. Create Eric's account by copying Mark's profile to Eric's account. Delete Mark's account.
E. Create Eric's account by copying Marks account. Delete Mark's account.
F. Delete Mark's account. Add Eric's account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.