1. [单选题]You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.
A. You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.
B. What should you do?
C. Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.
D. Copy the Windows NT policy file to the 20 Windows NT Workstation computers.
E. Create a Windows 2000 Group Policy that denies user access to My Network Places.
F. Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.
2. [多选题]You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.
A. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)
B. Enable the Always read properties from UDL file option in the Connection Properties dialog box.
C. Disable the Always read properties from UDL file option in the Connection Properties dialog box.
D. Delete the .udl files and store connection details in the registry by using system data source names.
E. Delete the .udl files, and store connection details in the registry by using user data source names.
F. Make the .udl files available on a network share.
3. [多选题]You are the administrator of a SQL Server 2000 computer. The server contains a Data Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package.You want to ensure that connection properties, such as login names and passwords, cannot be read or modified by users. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A. Save the DTS package so that it has an owner password.
B. Save the DTS package so that it has a user password.
C. Encrypt the DTS package details in the command line of the dtsrun utility.
D. Store the DTS package in the Meta. Data Services repository.
E. Store the DTS package as a Microsoft Visual Basic file.
4. [单选题]You configure a Group Policy Object for the Marketing organizational unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers domain local group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel.What should you do?
A. Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the group policy.
B. Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.
C. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run System in Control Panel. Give the original GPO a higher priority than the new GPO.
D. Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to read and apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.
5. [单选题]You are the administrator of a SQL server computer. The server is running SQL Server 6.5 and SQL Server 7.0.You install a named instance of SQL Server 2000, and then run the SQL server upgrade wizard. On the database selection screen, some of the SQL Server 6.5 databases are not listed.
A. You cancel the SQL Server upgrade wizard.
B. You need to ensure that the SQL Server 6.5 databases are listed in the wizard. What should you do?
C. Uninstall SQL Server 7.0, and then rerun the SQL Server upgrade wizard.
D. Run the Microsoft SQL Server-switch application, and then rerun the SQL Server upgrade wizard.
E. Create a data transformation services package that imports the databases from SQL Server 6.5 to SQL Server 2000, and then execute the package.
F. Uninstall SQL Server 2000, and then reinstall SQL Server 2000 as the default instance.
6. [多选题]You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.
A. However, users report that they can see EzonexamDocs when they browse for shared folders.
B. How should you solve this problem?
C. Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.
D. Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.
E. Change the share name to EzonexamDocs .
F. Change the share name to EzonexamDocs $.
7. [多选题]You are the network administrator for Ezonexam.com. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves Ezonexam.com. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied."You want the manager to be able to access the files.
A. What should do? (Each correct answer presents a complete solution. Choose two.)
B. Move the files from Sandra's folder to the manager's folder.
C. Grant the manager NTFSFull Controlpermission to the files.
D. Run theciphercommand to create a new file encryption key for the manager.
E. Run theciphercommand to generate an EFS recovery agent key and certificate.
F. Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra's files.
8. [单选题]You have 17GB of private files on drive D on your Windows 2000 Professional computer. You have shared the files as private_files. You do not want other users to see this share name in the browse list.You want all other share names to continue to appear in the browser list.What should you do?
A. Stop the computer browser service, and disable the startup state.
B. Change the comment for the share to hidden:Yes
C. Change the share name to private_files$.
D. Add a hidden entry to the HKLMSystem\currentcontrolset\services\larmanserver\shares\private_files registry value entry.
9. [单选题]The company is buying 50 identical computers to run Windows 2000 Server in these offices. These servers must be installed to the company's standard configuration. You create a setup information file (SIF) that specifies the company's standard configuration.You want to automate the installation process as much as possible in the least possible amount of time.
A. What should you do?
B. Use Makebt32.exe to create four installation startup disks and add the SIF to the first disk. Instruct an employee at each office to start the installation by using these disks.
C. Create an MS-DOS boot disk that contains CD ROM drivers and the SIF and that runs the Winnt/S: D:\i386 command. Instruct an employee at each office to start the installation by using this disk.
D. Create a floppy disk that contains only the SIF. Instruct an employee at each office to start the installation by using the Windows 2000 Server CD-ROM, with the floppy disk inserted.
E. Create a Windows 2000 folder on a hard disk. Copy the Windows 2000 Server CD-ROM to the folder. Add the SIF to the folder. Copy the folder to a writable C Instruct an employee at each office to start the installation by using this C
10. [单选题]You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.
A. How should you configure the database?
B. Configure the database on the two servers as a SQL Server 2000 cluster.
C. Configure the database on one server, and then configure a standby database on the second server.
D. Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.
E. Configure the database as a federated database, and then partition half the data on each server.