1. [单选题]You are the administrator of a SQL Server 2000 computer. The server contains a database that stores financial data. You want to use Data Transformation Services packages to import numeric data from other SQL server computers. The precision and scale values of this data are not defined consistently on the other servers.You want to prevent any loss of data during the import operations. What should you do?
A. Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the source tables. Change the data types so that they will use the lowest precision and scale values of the data that will be transferred.
B. Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the destination tables. Change the data types to reflect the highest precision and scale values involved in data transfer.
C. Set a flag on each DTS transformation to require an exact match between source and destination columns.
D. Set the maximum error count for each DTS transformation task equal to the number of rows of data you are importing. Use an exception file to store any rows of data that generate errors.
E. Write Microsoft ActiveX script. for each DTS transformation. Use the script. to recast data types to the destinations precision and scale values.
2. [多选题]The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.You want to prevent all users from browsing the network.
A. What should you do? (Each correct answer presents a complete solution. Choose two.)
B. Create a Windows Group Policy that denies user access to My Network Places.
C. Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.
D. Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.
E. Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.
F. Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.
3. [单选题]You need to install Windows 2000 Professional on 300 computers for a customer company called Ezonexam. The computers have different manufacturers and different hardware abstraction layers (HALs). You plan to use a Windows 2000 Server computer running Remote Installation Services (RIS) to perform. the installation.After the installation is complete for the first 25 computers, users of those computers report problems. You discover that the latest Windows 2000 service pack resolves those problems.
A. You want to apply the service pack to the remaining 275 computers during the installation. What should you do?
B. Install the service pack on a reference Windows 2000 Professional computer, and then run the Riprep command on that computer. Use the resulting image for RIS.
C. Install the service pack on the RIS server, and then run the Riprep command on that server. Use the resulting image for RIS.
D. Copy the service pack to the CD-based image shared folder used by RIS.
E. Slipstream the service pack into a new i386 distribution shared folder, and then run the Risetup command to create a new CD-based image for the RIS server.
4. [单选题]Ezonexam has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each office has a network of between five and 20 client computers. The office networks are connected to each other. The company is buying 50 identical computers to run Windows 2000 Server in these offices. The server must be installed to the company's standard configuration. You use Setup Manager to create a network shared distribution folder and a Unattend.txt file that specifies the company's standard configuration.You want to automate the installation process as much as possible, in the least possible amount of time.
A. What should you do?
B. Run Makebt32.exe to create four installation startup disks and add the Unattend.txt file to the first disk. Instruct an employee at each office to start the installation by using these disks.
C. Create a Microsoft MS-DOS network boot disk that makes a connection to the network shared distribution folder and runs the winnt command with the /s and /u switches. Instruct an employee at each office to start the installation by using this disk.
D. Create a floppy disk that contains only the Unattend.txt file. Instruct an employee at each office to start the installation by using the Windows 2000 Server compact disc, with the floppy disk inserted.
E. Create a Windows 2000 folder on a hard disk. Copy the Windows 2000 Server compact disc to the folder. Add the Unattend.txt file to the folder. Copy the folder to a writeable C Instruct an employee at each office to start the installation by suing this C
5. [多选题]You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.
A. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)
B. Enable the Always read properties from UDL file option in the Connection Properties dialog box.
C. Disable the Always read properties from UDL file option in the Connection Properties dialog box.
D. Delete the .udl files and store connection details in the registry by using system data source names.
E. Delete the .udl files, and store connection details in the registry by using user data source names.
F. Make the .udl files available on a network share.