正确答案: D
In the UserData section of the answer file, specify theProductIDvariable
题目:You need to install Windows 2000 Professional on a new computer in your network. You use the setup manager wizard to configure a fully automated installation script. file. You begin an unattended installation and leave the office.When you return, the installation has reached the GUI-mode setup and you see the following error message "Unattended setup is unable to continue because a setup parameter specified by your system administrator or computer manufacturer is missing or invalid."
解析:解析:Explanation: For a fully unattended installation to complete, the ProductID or product registration key, must be specified in the UserData section of the answer file. The syntax of this key is ProductId = "XXXXX-XXXXX-XXXXX-XXXXX-XXXXX". If this key is missing the error message is returned.
查看原题 点击获取本科目所有试题
举一反三的答案和解析:
[多选题]You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform. a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.You want to accomplish the following goals:
An unattended installation of Windows 2000 Professional will be performed.
Each computer will be assigned a unique security identifier description.
解析:解析:Explanation:Thesetupmanagerisusedtocreateanunattend.txtanswerfile.Usingtheanswerfileanunattendedinstallationwillbeperformed.Newsecurityidentifierdescriptions(SIDs)arecreatedbydefaultduringtheinstallationprocess.Incorrectanswers:B:TheSysprep.exeutilityshouldberunaftertheinstallationoftheapplicationssothattheapplicationscanbeincludedintheunattendedinstallation.D:Thecomputerswillnotautomaticallyjointhecontoso.comdomain.YouneedtoprestagecomputeraccountsanduseaUDF(UniquenessDatabaseFile)forthecomputernames.
[单选题]You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.
Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.
解析:解析:Explanation: DBCC CHECKIDENT is used to check the current identity value for the specified table. It can be set to correct the identity value by specifying the RESEED option with DBCC CHECKIDENT.
[多选题]You want to upgrade a Windows NT Server 4.0 computer named Server34 to Windows 2000 Server. Server34 is a member server in a Windows 2000 domain named marketing.fabrikam.local. The domain runs in native mode.You want to change the role of Server34 from a member server to a domain controller in the same domain. What should you do? (Choose Two)
D
in the marketing domain.
解析:解析:Explanation: To upgrade a Windows NT 4.0 member server to a Windows 2000 Domain Controller we must first upgrade the Windows NT 4.0 member server to Windows 2000 Server and then install Active Directory Services through the Active Directory Installation Wizard, which can be started with the DCPROMO.EXE command or by the Configure Your Server utility in Administrative tools.
[单选题]You are the network administrator for Ezonexam.The network includes a Windows 2000 Server computer that contains a single 36-GB hard disk. The drive is configured as a basic disk and has two partitions. Partition C is 4 GB in size and contains the operating system files. Partition D is 32 GB in size and contains user data that is updated frequently.
Start the computer by using a Windows 2000 Server compact disc. Select the Repair option in Setup.
解析:解析:Explanation:Therearefourwaystoperform.anattendedinstallation:1.BoottoaCD-ROM,therebyinvokingthesetuproutine.2.BoottoacurrentoperatingsystemwithCD-ROMsupportandmanuallyinvokethesetuproutine.3.BoottoasetoffoursetupdisksandthenprovidetheCD-ROMwhenprompted.4.Boottoanetwork-awareoperatingsystemandinvokesetupoverthenetwork.IfyouhaveacomputerwhoseBIOSsupportsbootingfromaCD-ROM,youcansetupWindows2000Serverwithoutinstallinganoperatingsystemonyourharddriveandwithoutrequiringnetworksupport.Todoso,configureyourcomputertoboottotheCD-ROMintheBIOS.IntheabovescenariotheserverfailedandforyoutorecovertheserverasquicklyaspossibleandrecoveringasmuchdataaspossibleyouneedtousetheWindows2000ServerCDandselecttheRepairoptioninSetup.Incorrectanswers:B:Thisoptionwillnotbethebesttofollowiftheserveristoberecoveredwithintheshortestpossibletime.Youwillalsolosesomedatasincere-creatingthesharedfoldersonthefirstharddiskwouldalreadyhavedatamissingsincePartitionCiscorrupted.C:EmergencyRepairDiskenablesyoutorecoverfromRegistrysettingsthatrenderyoursysteminoperable.ThismightbemisconfigurationthatcouldnotbecaughtwiththeLastKnownGoodConfiguration,oritmightbedeleteduseraccountsorotherRegistrychanges.Thisisnotaregistryproblem.TheEmergencyRepairDiskcanbeusedtofacilitatesomesystemrepairsonyourWindows2000server.Essentially,thediskcanbeusedtorepairstartupproblems,likewhenessentialstartupfilesarenotpresentandyourServerrefusestoboot.However,thisproblemneedstobeaddressesasquicklyaspossibleandmakinguseoftheRepairoptioninSetupfromtheWindows2000ServerCDwouldbethequickermethod.D:TheRecoveryconsoleisapowerfultext-basedbootalternativeforWindows2000Server.Ifyoursystembecomessocorruptthatitwillnotbootandnootherrepairprocesswillhelp,youcanboottotheRecoveryconsoleandcopyfilestoorfromyourserver.Inaddition,youcanstopandstartservices,ifaservicethatyouhaveinstalledcausesproblemswithbooting.Thisoptiondoesnotrepresentthequickestwaytoaddresstheproblemathand.
[单选题]Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named Share
Use System Tools in Computer Management to display the file paths of your shared folders.
解析:解析:Explanation: The System Tools component of the Computer Management console can be used to locate shared folders. The Computer Management console can be accessed through the Administrative Tools applet in the Control Panel. In the Computer Management console, expand System Tools, expand Shared Folders and then open Shares to display all shared folders.
[单选题]You are the administrator of your company's network. A user named Paul in the service department has a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.What should you do?
Remove Paul from any other group that has been explicitly denied access to the Sales folder.
解析:解析:Explanation: The Sales group, which Paul is a member of, has permission to access the files. However, Paul still cannot access the files. It would seem that Paul has a permissions conflict. A user can be granted file permissions in a number of contexts: as a user or as a member of a user group. When a user has different file permissions in multiple contexts, the most restrictive permission is applied. Furthermore, the deny permission overrides all other permissions. As Paul does not have access to the file you must therefore assume Paul has explicitly been denied access to the file in some context, as member of one or more groups that have been denied access to the file. You would thus have to remove Paul from such a group so that the restriction is not applied to Paul.
[多选题]You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:
Users in both departments can access to their own files from the network.
Users in the legal department cannot view the accounting department's documents.
Company managers can access and modify both departments' files.
解析:解析:Explanation:
[单选题]The company is buying 50 identical computers to run Windows 2000 Server in these offices. These servers must be installed to the company's standard configuration. You create a setup information file (SIF) that specifies the company's standard configuration.You want to automate the installation process as much as possible in the least possible amount of time.
Create a floppy disk that contains only the SIF. Instruct an employee at each office to start the installation by using the Windows 2000 Server CD-ROM, with the floppy disk inserted.
解析:解析:Explanation:InthisscenariowemustuseSetupManagertocreateawinnt.sif.Wemustthencopythisfiletoafloppy.ThenstarttheinstallationprocessfromtheCD-ROMandinsertthefloppydisk.Theinstallationprocesswillbeafullyautomatedunattendedinstallation.Incorrectanswers:A:The.SIFfileisusedtoperform.anunattendedinstallation.Makebt32.exeisusedtocreatefourinstallationstartupdisks.B:Thewinnt.execommandisrunfromtheCD-ROMnotfromthediskette.D:TheSIFfilemustresideonadiskettenotontheCD-ROM.
[单选题]You create two shared printers on a Windows 2000 Server computer in Ezonexam.com Ezonexam. One printer is shared as Admin, and the other printer is shared as Executive. Both printers are connected to the same print device. You set the priority of the Admin printer to 90 and the priority of the Executive printer to 50.You want all users at the Ezonexam network to be able to send print jobs to either printer. However, you do not want the Executive printer to appear in the browse list when employees other than executives and administrative assistants create a new printer connection on their client computers.
Change the share name of the Executive printer to Executive$. Manually reconfigure client computers that are already connected to the Executive printer.
解析:解析:Explanation: If a shared resource has a share name with a trailing $, such as Executive$, every one can use the shared resource but it will not be visible when browsing the network.