All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
New
Search
Search
Sign In
Register
study help
business
nutshell the windows 2000 exams
Questions and Answers of
Nutshell The Windows 2000 Exams
One of the users is storing files on the hard disk of his Windows 98 machine and has noticed that they are not secure. What can you do to improve security?a. Install EFS.b. Use smart card
Which of the following certificate authorities require Active Directory? (Select all that apply.)a. Standalone root CAb. Standalone subordinate CAc. Enterprise root CAd. Enterprise subordinate CA
Which two objects are combined to make a certificate?a. A password and a private keyb. A root key and a user's public keyc. A root key and a user's private keyd. A user's public and private keys
Which of the following is used by clients to request a certificate from a CA?a. Certificate Authority Managerb. MMCc. A web browserd. An email program
Which of the following is a dial-up service designed for high volume and centralized accounting?a. RASb. RRASc. RADIUSd. PPP
Which of the following services use clear-text authentication? (Select all that apply.)a. Telnetb. FTPc. PPTPd. SLIP
You have just installed a new Windows 2000 Server computer as a domain controller for a new domain in an existing Active Directory forest. Which of the following roles will be assigned to this server
Which of the following are the three basic roles of Windows 2000 Server computers? (Select two answers.)a. Primary domain controllerb. Backup domain controllerc. Domain controllerd. Member server
What is RADIUS commonly used for?a. Dial-up authentication with an ISPb. Dedicated T1 or cable authentication with an ISPc. Storing the IP addresses of all computers behind a firewalld. Storing the
Which functions can a standalone subordinate certificate authority perform?a. Issue certificates to usersb. Issue certificates to authorize other standalone subordinate certificate authoritiesc.
Which of the following Windows 2000 features is incompatible with EFS?a. NTFSb. File compressionc. File sharingd. Certificate Services
Which of the following are the two modes Windows 2000 Terminal Services can operate in? (Select two.)a. Remote administration modeb. RIS modec. Application sharing moded. Thin client mode
What is Microsoft's implementation of RADIUS called?a. MS-RADIUSb. Kerberosc. Active Directory Authentication Service (ADAS)d. Internet Authentication Service (IAS)
You are designing a smart card login solution for your Windows 2000 network.You have already bought the smart cards and the readers and installed Certificate Services. What else must you do before
Which of the following operating systems use case-sensitive passwords by default? (Select all that apply.)a. Windows 3.11b. Windows 98c. Windows NTd. Windows 2000
Which of the following certificate types are used to authenticate outside organizations or individuals? (Select all that apply.)a. Standalone root CAb. Standalone subordinate CAc. Enterprise root
Which of the following protocols is used for encryption between web servers and clients?a. NTLMb. SSLc. IASd. EFS
Which of the following is required to allow a new Macintosh computer to access shares on a Windows 2000 server?a. File Services for Macintoshb. AppleTalk protocolc. Both of the aboved. None of the
Which of the following operating systems support NTLM? (Select all that apply.)a. Windows 3.1b. Windows 98c. Windows NT 4.0d. Windows 2000
Which of the following is Windows 2000's standard authentication method?a. LMb. NTLMc. Kerberosd. Certificate authority
Which of the following refers to Microsoft's implementation of RADIUS?a. RASb. IASc. SMBd. PPTP
Which of the following are Windows 2000 VPN protocols? (Select all that apply.)a. PPTPb. SMBc. PPPd. L2TP
1. You are running NAT to provide Internet access to 10 computers on a network.How many public IP addresses are required?a. 0b. 1c. 10d. 11
Two of the Windows 2000 Professional workstations and one of the Windows 98 machines are used remotely via dial-up connections. You have recently had a number of outside attempts to gain access via
Create a table with the headings Less Secure and More Secure. Place each of the following pairs of items into the appropriate columns on a line of the table.a. LM vs. NTLMb. NAT vs. Proxy Serverc.
You suspect that one or more users have been accessing files they should not have access to. Which of the following could you use to help determine whether this is a problem?a. NTLMb. Auditingc.
2. Place the following RAS authentication methods under the headings encrypted or unencrypted:a. CHAPb. PAPc. SPAPd. MS-CHAPe. EAP
1. Place the following protocols under the headings name resolution or IP addressing:a. DNSb. DHCPc. WINSd. NATe. ICS
3. After installing the service you chose above, which additional services will be required to provide for the original requirement of Internet access and IP addressing?a. DNSb. DHCPc. NATd. WINS
2. Along with the requirements mentioned above, you want to ensure that the web servers are secured against attacks and to monitor and control Internet access by employees. Which of the following
1. You are considering using ICS (Internet Connection Sharing) to provide IP addresses and Internet connectivity. Which of the following might be a problem with this approach? (Select all that
20. Which of the following is the encryption method used with PPTP virtual private networks under Windows 2000?a. IPSecb. MS-CHAPc. MPPEd. SPAP
19. Which of the following DNS zones is available only in Windows 2000?a. Traditional primary zoneb. Traditional secondary zonec. Active Directory integrated zoned. Reverse lookup zone
18. For client computers running Windows 2000 Professional, which of the following DNS records are updated by the DHCP server?a. PTR recordb. A recordc. MX recordd. None of the above
17. Which one of the following Internet connectivity methods requires a public IP address for each computer that will access the Internet?a. Proxy Serverb. NATc. Routerd. ICS
16. How many PPTP or L2TP ports are supported by default in routing and remote access?a. 1b. 2c. 5d. 16
15. Which of the following routing protocols support router authentication? (Select all that apply.)a. RIP v1b. RIP v2c. OSPFd. L2TP
14. Which Proxy Server feature allows you to support a web or other Internet server on a machine with a private IP address?a. Web Publishingb. Proxy Serverc. Special portsd. Connection sharing
13. Which NAT feature allows you to configure a web or other Internet server on a machine with a private IP address?a. Web Publishingb. Proxy Serverc. Special portsd. Connection sharing
12. Which of the following services are performed by NAT along with address translation? (Select all that apply.)a. DNSb. DHCPc. WINSd. RAS
11. Which of the following is not included with Windows 2000 Server?a. NATb. Proxy Server 2.0c. ICSd. DHCP
10. In Windows 2000, how many WINS server addresses can a client be configured with?a. 1b. 2c. 6d. 12
9. Which of the following can be used to forward DHCP requests between subnets in a network? (Select all that apply.)a. DHCP relayb. RIPc. Hardware routersd. Superscopes
8. Which of the following is a Windows 2000 DHCP feature that allows multiple non-consecutive pools of IP addresses to be used?a. Scopesb. Superscopesc. DNS updatesd. DHCP relay
7. Which of the following operating systems can operate as a DHCP server? (Select all that apply.)a. Windows Meb. Windows NT Serverc. Windows 2000 Professionald. Windows 2000 Server
6. Which of the following is a routing protocol new to Windows 2000?a. RIP v1b. RIP v2c. OSPFd. L2TP
5. Which of the following IPSec policies should you choose for maximum security?a. Respond Onlyb. Require Securityc. Request Security
4. Which of the following are advantages of a proxy server over IP filtering for security? (Select all that apply.)a. Protocol-specific filteringb. Cachingc. Improved speedd. Support for new protocols
3. Which of the following protocols can assign IP addresses to clients from a pool of available addresses? (Select all that apply.)a. DHCPb. NATc. DNSd. ICS
2. Which of the following is not a reserved private IP address?a. 192.168.0.12b. 10.0.10.10c. 209.68.11.152d. 169.254.0.5
Which of the following are used for NetBIOS name resolution? (Select all that apply.)a. DNSb. WINSc. HOSTSd. LMHOSTS
Which of the following is not a network transport protocol?a. TCP/IPb. IPX/SPXc. DLCd. NetBEUI
Which of the following protocols are routable? (Select all that apply.)a. TCP/IPb. IPX/SPXc. NetBEUId. AppleTalk
Which of the following is Windows 2000's default transport protocol?a. TCP/IPb. IPX/SPXc. DLCd. NetBEUI
Why can't the prototyping department open all of the newly moved files?a. The prototyping department's domain controller hasn't been rebooted.b. Any files transferred into an OU never inherit
Active Directory appears to be malfunctioning. What's the first step for troubleshooting Active Directory?a. Reboot the global catalog server.b. Check the Event Viewer for the Directory Service
You've had to seize the role of a malfunctioning relative ID master. It turned out to be some bad RAM, which was replaced. What else must you do before putting that computer back on the network?a.
You have decided to become a Windows 2000 Networking consultant. Your first client has had a networking disaster, during which multiple operations masters have failed. Which operations master failure
Which TCP/IP protocols operate at the Host-to-Host layer of the DoD model?(Select all that apply.)a. TCPb. IPc. UDPd. ICMP
Which of the following protocols translates IP addresses to hardware (MAC)addresses?a. IPb. ARPc. RARPd. ICMP
HTTP (Hypertext Transfer Protocol) operates at which layer of the DoD model?a. Network Accessb. Host-to-Hostc. Internetd. Process/Application
Which of the following IP Security options should you choose on a server to maintain the highest level of security?a. Respond Onlyb. Require Securityc. Request Securityd. All of the above
Which of the following are routing protocols used with Windows 2000? (Select all that apply.)a. RIPb. IPXc. RRASd. OSPF
Which type of routing uses routing protocols rather than a manually configured routing table?a. Static routingb. Dynamic routing
Which of the following Windows 2000 features is used to prevent unauthorized ports or protocols from being accessed on a computer?a. IPSecb. IP Filteringc. Certificate Authorityd. ISAKMP
Which of the following protocols are related to email? (Select all that apply.)a. POPb. SNMPc. SMTPd. IMAP
Which of the following techniques is used to combine several consecutive network addresses into a single network?a. Supernettingb. Subnettingc. CIDRd. DHCP
Which of the following techniques is used to divide an IP network into smaller network segments?a. Supernettingb. Subnettingc. CIDRd. DHCP
Of the following IP address classes, which allows for the greatest number of network addresses?a. Class Ab. Class Bc. Class C
You have 2 RIS servers which have been configured to install Windows 2000 Professional on 20 RIS-compatible clients. Each RIS server is copying a slightly different set of files and everything
Which of the following statements best describes how group policies affect permissions?a. Permissions are not inherited from a parent group to a child group.b. Permissions are inherited from a parent
100.152.137b. 2cecfa7b-9316-11d4-bf01-004005a3ae74c. www.oreilly.comd. 78/38*rbl
What is the difference between intrasite and intersite replication?a. Intrasite replication takes place between sites, and intersite replication takes place within a site.b. Intersite replication
What is the name of the universal configuration framework that can be customized to perform almost any configuration task in Windows 2000?a. Microsoft Snap-in Consoleb. Microsoft Administration
Where can you look to verify your domain is being recognized properly after a Windows 2000 installation?a. My Computerb. Control Panelc. My Network Placesd. Network Neighborhood
Which servers need to be installed before Active Directory can run?a. A primary domain controllerb. A backup domain controllerc. A DNS serverd. A web server
When using the Active Directory Installation Wizard, which are valid options?a. Create a new treeb. Create a new Organizational Unit (OU)c. Join an existing treed. a and ce. All of the above
How many backup domain controllers should be upgraded to Windows 2000 Server before the Windows NT Workstations are upgraded to Windows 2000 Professional, assuming no hardware changes are made?a.
How many backup domain controllers should be upgraded to Windows 2000 Server before the primary domain controller?a. Oneb. Twoc. Threed. None
You are trying to log on using the recovery console by booting the computer from the Windows 2000 setup disks. What type of logon account do you need?a. A valid user account on the domainb. A valid
Where can sites be created?a. Within a subnetb. Within a domainc. Across domainsd. All of the above, if given adequate bandwidth
Which protocols can be used to transfer site replication data? (Select all that apply.)a. IPX/SPXb. TCP/IPc. HTTPd. SMTP
What type of trust relationship is automatically observed between computers running Windows 2000 in native mode who reside in the same tree?a. Transitive trustb. Nontransitive trustc. Transitional
Object security information is stored in an Access Control List (ACL). Which permissions are stored in the ACL? (Select all that apply.)a. NTFS permissionsb. Group permissionsc. FAT permissionsd.
What is the name of the utility that can move objects between domains?a. Microsoft Management Console (MMC)b. MOVETREEc. Domain Transfer Console (DTC)d. Windows Explorer
Which objects can't be moved between domains? (Select all that apply.)a. Domain controllersb. User accountsc. Organizational Unitsd. System files
Which of the following could be a globally unique identifier (GUID) for an Active Directory object?a.
Which server is automatically configured as the global catalog server?a. The first domain controller in a subnetb. The first domain controller in a forestc. The first domain controller in a treed.
Which topology best describes the path that replication follows in Active Directory?a. Ringb. Starc. Busd. Mesh
What does a site link cost determine?a. The amount of money needed to link subnetsb. The total bandwidth needed between sitesc. The connection that will be used for intersite replicationd. The
What is an SNMP community?a. A group of computers participating in SNMP monitoringb. The domain where an SNMP Network Management Station residesc. A passwordd. A type of global group
What does the above chart indicate regarding replication?a. Latencyb. Costc. Distanced. Security
If site A is connected to site B for replication and site B is connected to site C for replication, what is the connection between A and C called?a. A transitive trustb. A bridgeheadc. A site link
Which of the following changes will decrease the replication cost value between sites?a. Upgrading from a 10 Mbs to 100 Mbs Ethernet setupb. Decreasing the number of domain controllersc. Increasing
Which group can apply Group Policies at the site level?a. Domain Adminsb. Enterprise Adminsc. Replication Adminsd. Power Users
When can shortcut trusts be used?a. Between two domains in the same forestb. Between two domains in different forestsc. Between two users in the same OUd. Between two users in the same forest
When can external trusts be used in Windows 2000?a. Between trees in a forestb. Between domains in a treec. Between trees in a domaind. Between domains in different forests
What is the process of putting one group inside of another called?a. Hive managementb. Nestingc. Inheritanced. Subfolders
Which type of Active Directory container is most useful in mapping company departmental structure for the assignment and inheritance of permissions?a. Domain local accountsb. Global accountsc.
Two companies are merging, neither of which has a computer network. They decide they want to use Windows 2000 and Active Directory. They have a small IT staff and would like to have a single domain.
Showing 1 - 100
of 217
1
2
3