1. [多选题]The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.You want to prevent all users from browsing the network.
A. What should you do? (Each correct answer presents a complete solution. Choose two.)
B. Create a Windows Group Policy that denies user access to My Network Places.
C. Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.
D. Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.
E. Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.
F. Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.
2. [多选题]You are the network administrator for Ezonexam.com. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves Ezonexam.com. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied."You want the manager to be able to access the files.
A. What should do? (Each correct answer presents a complete solution. Choose two.)
B. Move the files from Sandra's folder to the manager's folder.
C. Grant the manager NTFSFull Controlpermission to the files.
D. Run theciphercommand to create a new file encryption key for the manager.
E. Run theciphercommand to generate an EFS recovery agent key and certificate.
F. Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra's files.
3. [单选题]You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the computers in your company use the same hardware. However, several different peripheral devices are used throughout the company.You want to verify that the hardware in use is compatible with Windows 2000 Professional. You want to accomplish this with least amount of administrative effort.
A. What should you do?
B. Create several different computer configurations. Install Windows 2000 Professional and enable driver signing.
C. Create a bootable floppy disk that contains and automatically runsWinNT32.exe/CheckUpgradeOnlyQ. Send the floppy disk to each user on the network.
D. Copy the contents of Windows 2000 Professional CD-ROM to a network share. From the network, modify your network logon scripts to runWinNT32.exe/Unattended:ReportOnly.
E. Use Setup Manager to create a Setup.inf file. Add the entryReportOnly=Yes to the [Win9xUpg] section of the answer file. RunWinnt32.exe /Unattended:Setup.infon all of the different computer configurations.