1. [多选题]The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.You want to prevent all users from browsing the network.
A. What should you do? (Each correct answer presents a complete solution. Choose two.)
B. Create a Windows Group Policy that denies user access to My Network Places.
C. Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.
D. Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.
E. Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.
F. Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.
2. [单选题]You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports. You name the share WebReports and allow Read permissions on the share.You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, 'You are not authorized to view this page.'
A. You need to be able to access the folder. What must you do?
B. Allow write permission on WebReports.
C. Allow directory browsing permissions on WebReports.
D. In the IIS console, enable anonymous access to WebReports.
E. In the IIS console, set the execute permissions option to script. and executables on WebReports.
3. [多选题]You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.
A. You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
B. Implement merge replication.
C. Implement snapshot replication.
D. Implement transactional replication.
E. Schedule replication to run continuously.
F. Schedule replication to run during off-peak hours.
4. [多选题]You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users' files.What should you do to accomplish these goals? (Choose all that apply)
A. Add Maria's user account to the System group.
B. Add Maria's user account to the Interactive group.
C. Add Maria's user account to the Power Users group.
D. Add Maria's user account to the Administrators group.
E. Add Maria's user account to the Backup Operators group.
5. [单选题]You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.
A. What should you do?
B. Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.
C. Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.
D. Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.
E. Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.