1. [单选题]You have 17GB of private files on drive D on your Windows 2000 Professional computer. You have shared the files as private_files. You do not want other users to see this share name in the browse list.You want all other share names to continue to appear in the browser list.What should you do?
A. Stop the computer browser service, and disable the startup state.
B. Change the comment for the share to hidden:Yes
C. Change the share name to private_files$.
D. Add a hidden entry to the HKLMSystem\currentcontrolset\services\larmanserver\shares\private_files registry value entry.
2. [单选题]Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named Share
A. You want to respond to the user's problem as quickly as possible by using an administrative tool.
B. What should you do?
C. Use Windows Explorer to display the file paths of your shared folders.
D. Use Storage in Computer Management to view logical drive properties.
E. Use Event Viewer in Computer Management to search for shared folder error messages.
F. Use System Tools in Computer Management to display the file paths of your shared folders.
3. [单选题]You are the network administrator for Ezonexam.Your Windows 2000 Server computer named Ezonexam1 contains two 36-GB hard disks. Disk 0 and Disk 1. Each disk is configured as a basic disc and has a single 36-GB NTFS partition. Both partitions are backed up to a tape each night. The partition on Disk 1 stores user data. Most users at Ezonexam encrypt their files. Disk 1 fails. You replace it with a new hard disk and create a single NTFS partition.
A. You need to recover the data as quickly as possible while maintaining the security of the files on Disk 1.
B. What should you do?
C. Restore the contents of Disk 1 from the most recent tape backup to a second file server. Instruct users to copy their files from the second file server to the new partition.
D. Restore the contents of Disk 1 from the most recent tape backup to a second file server. Log on to Ezonexam1 console as a recovery agent. Copy the files from the second file server to the new partition.
E. Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Instruct the users to verify the integrity of their files.
F. Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Run the cipher command to decrypt the files.
4. [单选题]You configure a Group Policy Object for the Marketing organizational unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers domain local group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel.What should you do?
A. Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the group policy.
B. Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.
C. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run System in Control Panel. Give the original GPO a higher priority than the new GPO.
D. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to read and apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.
5. [单选题]You are the administrator of a SQL Server 2000 computer. One of the databases on the server contains a table named complaints. This table is used to store information about customer complaints.The customer service representatives in your company add and edit the information in the complaints table. They work with this table by using a number of client applications, including a web-based application and a Microsoft Windows 32-bit application.
A. The customer service manager discovers that some customer complaints are marked as closed before they are resolved to the customer’s satisfaction.
B. You need to notify the customer service manager whenever a complaint is marked as closed. You do not want to make any changes to the client applications.
C. What should you do?
D. Create an UPDATE trigger that sends an e-mail message.
E. Create a stored procedure that sends an e-mail message. Use the stored procedures to make changes to the data.
F. Create a user-defined function that sends an e-mail message. Use the function to make changes to the data.
G. Create a rule that validates data entry. Bind the rule to the CompliantClosed column.