FAQ | Поиск | Пользователи | Группы
Московское время -
вопросы по MCSE 2000 в ответах
 
Начать новую тему   Ответить на тему
Список форумов Ногинск - Неофициальный Сайт Ногинского Района (hchp.ru) -> Софт
Предыдущая тема :: Следующая тема  
Автор Сообщение
aids_
Мега-Звезда
Мега-Звезда


Зарегистрирован: 05.08.2003
Сообщения: 346

СообщениеДобавлено: Вт Сен 30, 2003 11:39 am
СообщениеЗаголовок сообщения: вопросы по MCSE 2000 в ответах
Ответить с цитатой

202 ВОПРОСА К ЭКЗАМЕНУ 070-215


Passed today with a little difficulty. There were atleast 6 new questions and some new exhibits. prepare well other wise this exam can give u tough time.

Here is final and best pool of questions.

1. You are an administrator of your company's network. You want to perform routine upgrades on your Windows 2000 Server computer. You use your non administrator user account in the domain to log on to the server. You want to update all of the critical system files and patches on the server in the shortest possible time.

What should you do?

A. Run Windows Update.
B. Run System File Checker.
C. Log on as an Administrator and run Windows Update.
D. Log on as an Administrator and run System File Checker.


Answer: C


2. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet.

A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and selects Product Update, he receives an error message stating that access is denied.

David needs to be able to update the files by using his account. What should you do?

A. Configure the settings for Internet Connecting Sharing to allow POP3 access.
B. Configure the settings for Internet Connecting Sharing to allow SMTP access.
C. Give David's user account administrator privileges on the Windows 2000 Server computer.
D. Instruct David to log on as a domain administrator on the Windows 2000 Server computer.


Answer: C


3. You install a second modem on a Windows 2000 Server computer configured with Routing and Remote Access. Dial-in users report that they are unable to connect to the server by using this new modem.

What can you do to help find out the cause of the problem? (Choose Three.)

A. Use the Diagnostics tab in Phone and Modem Options in Control Panel to query the modem.
B. Use device Manager to identify any port resource conflicts.
C. Use the Routing and Remote Access snap-in to find out whether the ports for both modems are operational.
D. From a command prompt, run the Net Config Server command.
E. From a command prompt, run the Net Statistics command.
F. Use Regedit32 to view the Error Control value in the HKEY_LOCAL_MACHINESystemCurrentControlSetServicesRemoteAccess Key.


Answer: A,B,C


4. Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modems are trying to use IRQ 5.

You want to resolve the problem. What should you do?

A. Use Device Manager to change the IRQ for the original modem to IRQ 9.
B. Use Device Manager to change the IRQ for the original modem to IRQ 10.
C. Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices.
D. Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices.


Answer: C


5. You are the administrator of the contoso.local domain. You organize the domain into organizational units (OUs) as shown in the exhibit.
(Exhibit)



You configure the Local Security Options and other settings for the Default Domain Policy object. You delegate administration of the Michigan and Florida OUs. You want to prevent those administrators from creating any other Group Policy objects (GPOs) with settings that conflict with those you configured.

What should you do?

A. From the Group Policy options for the contoso.local domain, set the option not to override.
B. From the Group Policy options for the Michigan and Florida OUs, set the option not to override.
C. Block Group Policy inheritance for the contoso.local domain.
D. Block Group Policy inheritance in the Michigan and Florida OUs.


Answer: A


6. You are the administrator of a Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domain trusts each of the Windows NT domains, and the Windows NT domains trust the Windows 2000 domain.

A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller security template. Users in the Windows NT domains report that they cannot access DC1.

You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

A. Apply a less restrictive custom security template to DC1.
B. Apply a less restrictive custom system policy to Windows NT domain controllers.
C. Ensure that the Windows 2000 domain is configured in the mixed mode.
D. Ensure that the Windows 2000 domain is configured to run in the native mode.


Answer: A


7. Your company has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each office has a network of between 5 and 20 client computers. The office networks are not connected to any other networks.

The company is buying 50 identical computers to run Windows 2000 Server in these offices. These servers must be installed to the company's standard configuration. You create a setup information file (SIF) that specifies the company's standard configuration.

You want to automate the installation process as much as possible in the least possible amount of time.
What should you do?

A. Use the makebt32.exe to create 4 installation startup disks and add the SIF to the first disk. Instruct an employee at each office to start the installation by using these disks.
B. Create an MS-DOS boot disk that contains the CD-ROM drivers and the SIF and that runs WinNT /SVery Happy:I386 command. Instruct an employee at each office to start the installation by using this disk.
C. Create a floppy disk that contains only the SIF. Instruct an employee at each office to start the installation by using the Windows 2000 Server CD-ROM with the floppy disk inserted.
D. Create a Windows 2000 folder on the hard disk, copy the Windows 2000 Server CD-ROM to the folder, add the SIF to the folder. Copy the folder to the writable CD. Instruct an employee at each office to start the installation by using this CD.


Answer: C


8. You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS.

Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart".

You want to install a new NTLDR file on the computer but you do not want to lose any settings you made since the installation. What should you do?

A. Start the computer by using the Windows 2000 Server CD-ROM and choose to repair the installation.
B. Select Recovery Console and copy the NTLDR file on the CD-ROM to the root of the system volume.
C. Start the computer by using the Windows 2000 server CD- ROM and choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume.
D. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command.
E. Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility.


Answer: A


9. Your network includes Windows 98 computers and Windows 2000 Server computers. You are adding a new computer to the network. You plan to install Windows 2000 Server on the new computer. The computer has one 20 GB hard disk with no partition defined.

The Windows 2000 Server CD ROM is unavailable. You want to install Windows 2000 server from the source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition.

What should you do?

A. On another Windows 2000 computer use makebt32.exe to create installation startup disks. Start the computer by using the first disk.
B. On another Windows 2000 computer format a floppy disk. Copy NTLDR, boot.ini, ntdetect.com, ntbottdd.sys to the disk. Start the computer by using the disk.
C. Start the new computer by using the Windows 98 network boot disk. Connect to the server. Run dsclient.exe. Create and format 20GB FAT32 partition.
D. Start the new computer by using the Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to network server. Run winnt.exe .
E. Start the computer by using Windows 98 network boot disk. Create and format a single Fat 32 partition. Start the new computer by using the Windows 2000 emergency repair disk.


Answer: D


10. You are the network administrator at Island Hopper News. The domain and network configuration is a single-site Windows 2000 domain that is configured as shown in the exhibit.



You must provide Terminal Services to the Pentium MMX client computers. You also need to able to manage user licenses and enable users to access term1.islandhoppernews.com

First, you install terminal services in application server mode on term1.islandhoppernews.com.
What should you do next?

A. Install terminal services licensing on term1.islandhoppernews.com. Select the Enterprise License server option.
B. Install terminal services licensing on term1.islandhoppernews.com. Select the domain license server option.
C. Install terminal services licensing on file1.islandhoppernews.com. Select the enterprise license server option.
D. Install terminal services licensing on file1.islandhoppernews.com. Select the domain license server option.
E. Install terminal services licensing on uu2.islandhoppernews.com. Select the enterprise license server option.
F. Install terminal services licensing on uu2.islandhoppernews.com. Select the Domain license server option.


Answer: F


11. You are a network administrator for Fabrikam Inc. Fabrikam Inc has three offices. The network consists of one native mode Windows 2000 domain. All servers are Windows 2000 Professional computers. The network is connected by a Frame Relay connection.

You install a third-party network management suite of applications on a server named Mon1.

You need to ensure that this new software will be able to interact with and manage the existing devices on your network.
What should you do?

A. Install SNMP on Mon1.
B. Install SNMP on all computers except Mon1.
C. Configure the SNMP service option in the TCP/IP installation properties on Mon1.
D. Configure the SNMP server option in the TCP/IP installation properties on all computers except Mon1.


Answer: A


12. Your network uses TCP/IP as the only network protocol. You configure a remote access server on this network.

Some users report that when they connect to the server they receive the following message: " IPX/SPX compatible CP reported error 733 - The PPP control network protocol for the network is not available".
If the users allow the connection to continue they are able to connect to services that use TCP/IP.

You want to prevent this message from being displayed. What should you do?

A. Configure the client computers to use only TCP/IP for the connection to the remote access server.
B. Configure the client computers to use a defined IPX network address for the connection to the remote access server.
C. Configure the remote access server to allow IPX based remote access and demand-dial connections.
D. Configure the remote access server to disable Multilink connections.


Answer: A


13. You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain.

On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory.

What should you do so that Nate can perform this task?

A. Enable Anonymous access for the intranet server.
B. Enable Anonymous access for the Sales virtual directory.
C. Remove Nate from the Intern group.
D. Make Nate a member of the Security group.


Answer: D


14. You are the administrator of a Windows NT 4.0 Terminal server edition computer. The server has one hard disk, which is divided into two partitions. The first partition contains the Windows NT 4.0 system files and is formatted as FAT. The second partition contains application data and user data. This second partition is formatted as NTFS. The server currently has Service Pack 3 installed.

You need to upgrade the server to Windows 2000 Server. You want to ensure that no application data or user data is lost during the upgrade. You also want to perform the minimum number of steps necessary to complete the upgrade.

What should you do? (Choose all that apply)

A. Convert the system partition to NTFS.
B. Install service pack4 or later on the server.
C. Use a Windows 2000 Server CD to start the server. In setup, select the option to upgrade.
D. Replace the Terminal Server installation with a standard Windows NT server 4.0 installation.


Answer: A,B,C


15. You are the administrator of a Windows 2000 Server computer. Your computer has a spanned volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the spanned volume by using Windows Backup.

One of the disks fails. You replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible.

What should you do?

A. Extend the spanned volume to include the new disk. Rescan the disk.
B. Extend the spanned volume to include the new disk. Shut down and restart the server. Use Windows Backup to restore the data.
C. Rescan the disk. Format the spanned volume. Use Windows Backup to restore the data.
D. Rescan the disk. Extend the spanned volume to include the new disk. Shut down and restart the server. Use Windows Backup to restore the new data.
E. Rescan the disks. Remove the spanned volume and create a new spanned volume that includes the new disk. Format the spanned volume. Use Windows Backup to restore the data.


Answer: E


16. Your Windows 2000 server computer contains data files that users of client computers access throughout the day. You install a driver for the new tape device on the computer.

After restarting the computer you log on as an administrator. Shortly after you log on you receive the following Stop error: "irql_not_less_or_equal". You need to bring the server back on line as quickly and reliably as possible.

What should you do?

A. Restart the computer by using the last known good configuration.
B. Perform an emergency repair and select Fast Repair. Restart the computer.
C. Restart the computer in safe mode. Remove the driver. Restart the computer.
D. Restart the computer by using the Recovery Console. Disable the driver. Restart the computer. Remove the driver.


Answer: D


17. A Windows 2000 Server computer named server2 runs numerous 32-bit applications and two 16-bit applications. Users start the 16-bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16-bit applications are configured to run in the separate memory spaces.

You want to create a performance baseline chart in System Monitor for all the applications on Server2. You add all of 32-bit applications and now you want to add the two 16-bit applications.

What should you do?

A. Add the APP1 and APP2 instances of the %Processor time counter for the process object.
B. Add the NTVDM, APP1 and APP2 instances of the % Processor time counter for the process object.
C. Add only the NTVDM instance of the %Processor time counter for the process object.
D. Add the NTVDM and NTVDM2 instances of the %Processor time counter for the process object.


Answer: D


18. Every afternoon you run Microsoft Excel locally on your Windows 2000 Server computer to update a performance spread sheet. Users report that, during this time, the server response to file requests appears to slow down.

What should you do to resolve the problem?

A. Run the start/normal csrss.exe command, before you start the Excel.
B. Run the start/normal Excel.exe command to start Excel.
C. Use task manager to set the priority for csrss.exe process to above normal.
D. Use task manager to set the priority for Excel.exe process to low.


Answer: D


19. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain.

What should you do?

A. On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server.
B. On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers.
C. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows 2000 domain as the existing Windows NT domain.
D. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart the Windows NT PDC on the network and demote it to a BDC.


Answer: A


20. You plan to install Windows 2000 Server on 10 new computers on your company's network. These servers will provide file and print services to departments within the company. The computers have identical hardware and will use the same software configuration.

You plan to use a centralized copy of the Windows 2000 installation files, which are stored on an existing Windows 2000 Server computer.

Which three actions should you take to install Windows 2000 Server on the new computer? (Choose three.)

A. Create a set of installation boot disks by using Makeboot.exe.
B. Create an MS-DOS network boot disk.
C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers.
D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers.
E. Begin the installation process by running the Winnt command with the /S, /U, and /udf switches.
F. Begin the installation process by running Winnt32 command with the /s, / unattend, and /udf switches.


Answer: B,C,E


21. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers.
You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain.

What should you do?

A. Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package.
B. Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy.
C. Create a Microsoft Windows Installer package for the service pack. Configure the package in the Local Computer Policy.
D. Place the service pack in a Distributed file system (Dfs).


Answer: B


22. Your network consists of numerous domains within a LAN, plus one remote location that is configured as another domain within the tree. Each domain contains several organizational units (OUs). The remote domain is connected to the main office network by a 56-Kbps connection.
See the EXHIBIT.



The remote location is running a previous service pack for Windows 2000, and the LAN is running the most recent service pack.
You want to configure a Group Policy for the remote location so that users can repair a problem with a service pack system file. You also want to reduce the traffic on the LAN and ease administration of the Group Policies. You want to retain the domain administrator's access to the Group Policy configuration.

What should you do?

A. Configure a Group Policy for each OU in the west.litware.com domain. Configure a service pack software package for each Group Policy.
B. Configure a Group Policy for each OU in the litware.com domain. Configure a service pack software package for each Group Policy.
C. Configure a Group Policy for the west.litware.com domain. Configure a service pack software package for the Group Policy.
D. Configure a Group Policy for the litware.com domain. Configure a service pack software package for the Group Policy.


Answer: C


23. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days. the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent.

You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running.

You want to return the CPU usage to its normal range. What should you do?

A. Use Computer Management to stop and restart the Server service.
B. Use Computer Management to stop and restart the Workstation service.
C. Use Task Manager to end any related child processes.
D. Use Task Manager to end and automatically restart the Explorer.exe process.


Answer: C


24. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operating and decide that you need to restart the application.

What should you do before you restart the application?

A. End the task named Application.
B. End the Application.exe process.
C. End the Application.exe process tree.
D. End both the Explorer.exe process and the Application.exe process.


Answer: C


25. Your Windows 2000 Server computer uses a SCSI adapter that is not included on the current Hardware Compatibility List (HCL). You install an updated driver for the SCSI adapter.

When you start the computer, you receive the following STOP error:
"INACCESSIBLE_BOOT_DEVICE."

Which two procedures can you use to resolve the problem? (Choose two.)

A. Start the computer in safe mode. Reinstall the old driver for the SCSI adapter.
B. Start the computer by using a Windows 2000 bootable floppy disk. Reinstall the old driver for the SCSI adapter.
C. Start the computer by using the Windows 2000 Server CD-ROM. Perform an emergency repair. Reinstall the old driver for the SCSI adapter.
D. Start the computer by using the Recovery Console. Run System File Checker. Restart the computer. Reinstall the old driver for the SCSI adapter.
E. Start the computer by using the Recovery Console. Copy the old driver for the SCSI adapter to the system volume and to C:NTbootdd.sys. Restart the computer.


Answer: C,E


26. A Windows 2000 Server computer named Server1 is a file server on your network. Server1 runs numerous 16-bit applications. One of the applications, named App1, stops responding, causing all of the other 16-bit applications to stop responding.

You want to isolate App1 for monitoring and troubleshooting purpose.
What can you do? (Choose all that apply.)

A. Create a batch file that starts App1 by running the start command with the / separate switch. Use this batch file to start App1.
B. Create a shortcut to App1, and select the Run in separate memory space option in the shortcut properties. Use this shortcut to start App1.
C. In the properties for File and Printer Sharing for Microsoft Networks, select the Maximize data throughput for file sharing option button.
D. In the properties for File and Printer Sharing for Microsoft Networks, select the Balance option button.


Answer: A,B


27. You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key.

You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears.

You want to return the computer to its previous configuration. What should you do?

A. Restart the computer in safe mode. Then restart the computer again.
B. Restart the computer by using the Recovery Console. Run the Fixboot C: command, and then run the Exit command.
C. Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command.
D. Restart the computer by using the last known good configuration.


Answer: D


28. You install a new server application on your Windows 2000 Server computer. Response times fail to meet user specifications. You want to use the Processes page in Task Manager to find out whether the response time of new application would improve by the addition of one or more processors.



Which two columns should you select to view? (Choose two.)
To answer, click the two appropriate check boxes in the Select Columns dialog box (see the exhibit).

A. CPU usage
B. Thread counts
C. I/O Writes
D. Memory Usage
E. Page Pooled


Answer: A,B


29. You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with a single NTFS partition.

You use a third-party tool to add a new partition to the disk. When you restart the server, you receive the following error message: "Windows 2000 could not start because the following file is missing or corrupt: system32 toskrnl.exe. Please re-install a copy of the above file."

What should you do to resolve the problem?

A. Start the computer by using the Recovery Console. Run System File Checker.
B. Start the computer by using the Recovery Console. Modify the Partition parameter in the operating system path in C:Boot.ini.
C. Start the emergency repair process. Choose the option to repair system files.
D. Start the computer in safe mode with command prompt. Modify the Partition parameter in the operating system path in C: oot.ini.


Answer: B


30. You are the administrator of a Windows 2000 domain that has three domain controllers. Each day, you use Windows Backup to perform full backups of each domain controller.

You run a script to make changes to account information in Active Directory. As a result of errors in the script, the incorrect user accounts are modified. Active Directory replication then replicates the changes to the other two domain controllers.

You want to revert Active Directory to the version that was backed up the previous day.
What should you do?

A. On a single domain controller, use Windows Backup to restore the System State data. Shut down and restart the computer.
B. Shut down and restart a single domain controller in directory services restore mode. Use Windows Backup to restore the System State data. Run the Ntdsutil utility. Restart the computer.
C. Shut down and restart a single domain controller by using the Recovery Console. Use Windows Backup to restore the System State data. Exit the Recovery Console. Restart the computer.
D. Shut down and restart each domain controller by using the Recovery Console. Use Windows Backup to restore the Sysvol folder. Exit the Recovery Console. Restart the computer .


Answer: B


31. You are the administrator of the contoso.local domain. You organize the domain into organization units (OUs) as shown in the exhibit.
(Exhibit)



You configure the Local Security Options and other setting for the Default Domain Policy object. You enable a local security option policy to display a logon message each time a user attempts to log on. Suzan Fine, the administrator of the Florida OU, wants to configure a different logon message for the Orlando OU without changing the other Local Security Options.

What should Suzan do?

A. Create a new Group Policy object (GPO) in the Orlando OU with the appropriate logon message. Block policy inheritance for the new GPO.
B. Create a new Group Policy object (GPO) in the Florida OU with the appropriate logon message. Set the option not to override for the new GPO.
C. Create a new Group Policy object (GPO) in the Orlando OU with the appropriate logon message. Enable policy inheritance for the new GPO.
D. Create two new Group Policy objects (GPOs) in the Miami and Orlando OUs. Configure the GPO for the Orlando OU with the appropriate logon message for the Orlando OU. Place the GPO for the Orlando OU at the top of the priority list.


Answer: C


32. Your company has a human resources (HR) manager named Sean Chai. He keeps your company's confidential HR files in a shared folder. To increase the security of the HR files, Sean set the folder to encrypt the files.

Sean leaves the company without resetting the permissions and encryption settings for the HR files. The files must be made accessible to the new HR manager.

Which two actions should you take to allow this access? (Choose two.)

A. Set the file permissions on the HR files to allow access to the new manager.
B. Back up the shared folder to tape and restore the files to a different folder.
C. Log on as an administrator and remove the encryption attribute from the HR files.
D. Log on as the new manager, connect to the shared folder, and run the cipher /e /s . command.
E. Configure the new manager's account to be an Encrypted Data Recovery Agent for Sean's account.


Answer: A,C


33. You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.

What should you do?

A. Configure an ADM template and add the template to the GPO.
B. Configure an INF policy and add the policy to the GPO.
C. Configure a Microsoft Windows Installer package and add the package to the GPO.
D. Configure RIS to include the registry entry.


Answer: A


34. Your company has a senior manager named Paul West. Paul uses computers in two different offices. Paul's home folder is stored on a server named UserServer.

Paul works with many files that are highly confidential. Paul keeps these files in a folder named Confidential in his home folder. You need to maximize the security of the Confidential folder. You also want Paul to be able to access the folder from computers in each office.

What should you do?

A. Obtain a signing and sealing certificate from a certificate server for Paul's account, and install the certificate on the computers that Paul uses.
B. Log on at UserServer as the administrator, connect to Paul's home folder, and set the encryption attribute.
C. Configure Paul's account to have a roaming user profile, and instruct Paul to use folder properties to set the encryption attribute for his folders.
D. Add the cipher /e /s . command to Paul's logon script.


Answer: C


35. You install the Routing and Remote Access service on a Windows 2000 Server computer in your network. Your network is not directly connected to the Internet and uses the private IP address range 192. 168.0.0.

When you use Routing and Remote Access to dial in to the server, your computer connects successfully, but you are unable to access any resources. When you try to ping servers by using their IP addresses, you receive the following message: "Request timed out." When you run the ipconfig command, it shows that your dial-up connection has been given the IP address 169.254.75.182.

What should you do to resolve the problem?

A. Configure the remote access server with the address of a DHCP server.
B. Authorize the remote access server to receive multiple addresses from a DHCP server.
C. Configure the remote access server to act as a DHCP Relay Agent.
D. Ensure that the remote access server is able to connect to a DHCP server that has a scope for its subnet.


Answer: D


36. Your company's network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day.

The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out what was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller.
You install Terminal Services.
The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application.

What should you do to enable the IP department to control users' sessions?

A. Configure the Terminal server to run in Remote Administration mode.
B. Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server.
C. Add the members of the IT department to the Power Users group on the Terminal server.
D. Use third-party software to enable remote control of users' sessions.


Answer: B


37. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally.

The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses, if a server fails.

How should you configure the DNS servers?

A. Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone.
B. Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone.
C. Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone.
D. Configure at least two servers with Active Directory integrated primary zones for the domain.
E. Configure at least two servers with standard primary zones for the domain.


Answer: D


38. Your network is configured as shown in the exhibit.
(Exhibit)



All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Sales1 and Sales2. The engineering department uses another subnet and has servers named Engineering1 and Engineering2.

Sales1 and Engineering1 are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay.

You want to allow Sales1 and Engineering1 to support client computers on each other's subnets. What should you do?

A. Set the router option in the DHCP Scopes to 192. 168.2.1 for Engineering1 and 192.168.1.1 for Sales1.
B. On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol.
C. On Engineering2 and Sales2, install and configure the DHCP Relay Agent service.
D. Configure Engineering2 and Sales2 as DHCP servers without any scopes.


Answer: C


39. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers.
Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully.

You want users to be able to log on to the Terminal server. What should you do?

A. Grant the users the right to log on as a service.
B. Grant the users the right to log on locally.
C. Grant the users the right to log on over the network.
D. Copy the users' profiles to the Terminal server.
E. Copy the users' home folders to the Terminal server.


Answer: B


40. Your company has a main office and 50 branch offices. The main office has a private network with 1,000 computers. Each branch office has a private network with between 10 and 20 computers and a 56-Kbps connection to the Internet.

The company plans to use the Network Address Translation (NAT) feature of Routing and Remote Access to provide each office with access to the Internet. When you test this configuration, you discover that connections cannot be made to sites by using fully qualified domain names. However, connections can be made to these sites by using their IP addresses.

You want to be able to make connections by using fully qualified domain names. What should you do?

A. Configure the computers on each of the branch office networks with the address of a WINS server.
B. Configure the computers on each of the branch office networks with the address of a DNS server on the Internet.
C. Configure a filter on the NAT servers to pass DNS packets.
D. Create a host file on each of the NAT servers.


Answer: B


41. You are the administrator of a routed Windows 2000 network. The network includes 25 Windows 2000 Server computers. You want to install a new Windows 2000 Server computer as the first computer on a new routed segment.

You configure the existing DHCP server with a scope that is valid for the new routed segment. During the installation of the new Windows 2000 Server, you specify that the server should obtain its IP address from an existing DHCP server.

After you complete the installation, you open My Network Places. You see the new server but no other computers. You run the ipconfig command and find that the new server's assigned IP address is 169.254.1.200, with a 16-bit subnet mask and no default gateway address.

You want to resolve the problem so that you can see other computers on the routed network.
What can you do? (Choose two.)

A. Configure all of the routers to route BOOTP broadcast frames.
B. Configure the default gateway to the TCP/IP properties of the new server.
C. Add the IP address for the default gateway to the TCP/IP properties of the new server.
D. Add a DHCP Relay Agent computer to the new routed segment.
E. Add a WINS server to the new routed segment.


Answer: A,D


42. You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support requests from client computers.
To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files.

How should you configure the three disks?

A. Convert all three disks to dynamic disks. Create a striped volume.
B. Convert all three disks to dynamic disks. Create a RAID-5 volume.
C. Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1.
D. Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks.


Answer: A


43. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume.

Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is Missing.

You want to recover the failed RAID-5 volume.
What should you do first?

A. Replace the third disk and restart the server. Use disk Management to repair the volume.
B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk.
C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume.
D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition.


Answer: B


44. You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootTemp folder.

There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server.

What should you do?

A. On the second partition, create a shared folder named Temp.
B. In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk.
C. Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new partition.
D. Add a second hard disk. Delete the contents of the SystemrootTemp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the SystemrootTemp folder.


Answer: D


45. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1.

Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing.

You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy.

What should you do next?

A. Replace Disk 1 and restart the computer. The mirror will automatically regenerate.
B. Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1.
C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer.
D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror.


Answer: B


46. You install the boot volume D on your Windows 2000 Server computer on dynamic Disk 0. You mirror volume D on dynamic Disk 1.
One year later, during routine server maintenance, you open Disk Management and find that the status of volume D is Failed Redundancy. The status of Disk 1 is Online (Errors). A symbol with an exclamation point appears in the graphical view of the disk.

You want to return the status of the boot volume to Healthy. What can you do? (Choose two.)

A. Break the mirror, delete the volume on Disk 1, and re-create the mirror.
B. Replace Disk 1, copy the data from the boot volume to the new disk, and then use Disk Management to rescan the disks.
C. Replace Disk 1, Ensure that the new disk is a basic disk, and repair the volume.
D. Reactivate the mirror on Disk 1.
E. Convert Disk 1 to a basic disk, and reconvert it to a dynamic disk.


Answer: A,D


47. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared.

The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled.

When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open."

What should Amy do to allow this document to be saved? (Choose all that apply.)

A. Compress the files in her home folder to save disk space.
B. Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level.
C. Move some of the files from her home folder to the IN_PROGRESS shared folder.
D. Remove files from her home folder until the total uncompressed file size is less than 100 MB.


Answer: D


48. You upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The computer has two hard disks. The system and boot partitions are located on two primary partitions on Disk 0. Both partitions are mirrored on Disk 1.

One month later, Disk 1 fails. You replace the disk with a disk taken from another Windows 2000 computer. When you try to repair the fault-tolerant volumes by using Disk Management, you find that the Repair Volume option is unavailable.

You want to repair the mirror set. What can you do? (Choose two.)

A. Delete all volumes on Disk 1. Change Disk 1 back to a basic disk. Repair the fault-tolerant volumes on Disk 0.
B. Create two new volumes on Disk 1. Copy all the data from the two disk partitions on Disk 0 to the two volumes on Disk 1.
C. Break the mirror set. Convert Disk 0 to a dynamic disk. Create a mirror on Disk 1.
D. Create a single volume on Disk 1. Copy all the data from Disk 0 to the single volume. Convert Disk 0 to a dynamic disk.


Answer: A,C


49. Trey Research has a Windows 2000 Server computer named User_srv. This computer has a RAID-5 controller. The RAID array is configured as two partitions. Drive C is a 2-GB partition that holds the operating system and paging file. Drive D is a 30-GB partition that will hold the home folders for 200 users.

Trey Research employs 10 scientists. The user accounts for scientists are members of a group named Scientists. The scientists use a data capture application that generates files that can be larger than 100 MB.

Trey Research wants to use disk quotas. Ordinary users should be allowed to store a maximum of 75 MB of data in their home folder. The storage for users in the Scientists group should not be limited by quotas.

What should you do to configure this disk quota scheme? (Choose two.)

A. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit Check box. Set the default quota limit to 75 MB.
B. Create a Scientist template account. Create a new quota entry for this account. Select the Do not limit disk usage for this entry option button.
C. Create new quota entries for the 10 scientists' user accounts. Select the Do not limit disk usage for this entry option button.
D. Enable quota management on drive D. Select the Deny disk space to users exceeding quota limit check box. Select the Do not limit disk usage option button for the default quota limit.
E. Create a Scientist template account. Create a quota entry for this account. Set the quota limit to 30 GB.


Answer: A,C


50. You share a folder on a Windows 2000 Server computer for users in your company's London office. You place several subfolders (Marketing, Sales, Research and Marketing-2) in the London folder. See the exhibit.



The Marketing-2 folder is compressed. You want to move some files from the Research folder into Marketing-2, and you want to make sure that the files are compressed when you move them. However, you do not want to compress the remaining files in Research.

What should you do?

A. Move each of the files from Research to Marketing-2.
B. Copy the files from Research to Marketing-2, and then delete the original files.
C. Compress Research, apply changes to the folder only, and then move the files from Research to Marketing-2.
D. Encrypt Marketing-2, move the files from Research to Marketing-2, and then decrypt Marketing-2.


Answer: B

51. You are the administrator of a Windows 2000 Server network. You configure two sites: one for your New York office and one for your Paris office. You configure two organizational units (OUs) named New York and Paris. In each of these OUs, you create subordinate OUs named Sales, Marketing, and Research. You place user accounts, stand-alone member servers, and Windows 2000 Professional computers in their appropriate subordinate OUs.

You suspect that someone is trying to log on to your domain by guessing user account names and passwords. You want to find out which computers are being used for these logon attempts.

What should you do?

A. Edit the Default Domain Controllers Policy object to audit directory services access failures.
B. Edit the Default Domain Policy object to audit account logon failures.
C. Edit the New York OU and Paris OU Group Policy objects (GPOs) to audit logon failures.
D. Edit the Group Policy object (GPO) of each subordinate OU to audit directory service access failures.


Answer: B


52.You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware Raid-5 disk array.

You want to create a mirror of the original array on the new array. However, when you right-click the free space on the new array in Disk Management, you see no option to create a new volume or a mirrored volume.

Bsfore you create a mirrored volume on the new array, what should you do?

A. Convert both arrays to dynamic disks.
B. Create an empty single extended partition on the new disk array.
C. Create a single unformatted primary partition on the new disk array.
D. Format the new disk array as a single NTFS primary partition.
E. Format the new disk array as a single NTFS logical drive in an extended partition.


Answer: A


53. You are the administrator of the homeoffice.local domain. You want to create a shared printer for the company's executives so that they do not have to wait for their documents to print when the default printer's queue contains a large number of documents.

You configure the new high-priority printer and want to set permissions for the groups shown in the exhibit.
(Exhibit. Note: The default settings have been cleared.)



You select the check box to allow Print permission for the Executives group. You want only the Administrators, Print Operators, Server Operators, and Executives groups to be able to print to the printer.

What can you do? (Choose two.)

A. Remove the Everyone group.
B. Select the check box to deny Print permission for the Everyone group.
C. Select the check box to deny Manage Documents permission for the Everyone group.
D. Select all Deny check boxes for the Everyone group.
E. Clear all check boxes for the Everyone group.


Answer: A,E


54. You are the administrator of Coho Vineyard. You are responsible for all remote locations, each of which has at least one Windows 2000 Server computer.

After you install a new video adapter, one of the users at a remote location reports that Routing and Remote Access does not accept calls. After you resolve the Routing and Remote Access problem, you need to configure the server to prevent users from installing any unsigned device drivers.

What two actions should you take in the Driver Signing Option dialog box? (choose two)

A. Set File Signature Verification to Ignore.
B. Set File Signature Verification to Block.
C. Set File Signature Verification to Warn.
D. Select the Apply Settings As System Default check box.


Answer: B,D


55. You want to upgrade a Windows NT Server 4.0 computer named Server34 to Windows 2000 Server. Server34 is a member server in a Windows 2000 domain named marketing.fabrikam.local. The domain runs in native mode. You want to change the role of Server 34 from a member server to a domain controller in the same domain.

What should you do? (Choose two.)

A. Reinstall Windows NT Server 4.0 on Server 34 in the same WINNT folder, and make Server 34 a BDC in the marketing domain.
B. Use Server Manager on Server34 and promote Server34 to a PDC for the marketing domain.
C. Upgrade Server34 to Windows 2000 Server.
D. Run the Active Directory Installation wizard to make Server34 a domain controller in the marketing.fabrikam.local domain.
E. Run the Active Directory Installation wizard to convert Server34 to a domain controller in the fabrikam.local domain.


Answer: C,D


56. You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator.

You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server.

What should you do?

A. Install the Windows 2000 Resource Kit.
B. Install Windows Critical Update notification.
C. Configure System File Checker to notify the branch offices.
D. Configure Windows File Protection to notify the branch offices.


Answer: B


57. You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of your company's client computers are connected to this server.

A shared folder named Data on the server is on an NTFS partition. The Data folder contains more than 200 files. The permissions for the Data folder are shown in the following table.
(Exhibit)



You discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effect on users who are using other files on the server.

Which two actions should you take? (Choose two.)

A. Modify the NTFS permissions for the 10 files.
B. Modify the NTFS permissions for the Data folder.
C. Modify the share permissions for the Data folder.
D. Log off the users from the network.
E. Disconnect the users from the Data folder.


Answer: A,E


58. You are the administrator of the Intranet at Blue Sky Airlines. You install and configure a new Windows 2000 Server computer named server1.departments.blueskyairlines.com as an intranet server. This server hosts the multiple departmental and resource Web links to the network and databases.

You configure a ticketing Web site. You also configure a finance virtual directory in the department's Web site, as shown in the exhibit.
See the Exhibit.



During the first morning that the new server is available, users report that the only information they are seeing in their browser is a list of HTM and ASP files. For security reasons the first action you need to take is to disable the users' ability to view the files of all WEB sites in the form of a list.

What should you do?

A. Clear the Directory Browsing checkbox for the Server Properties, and then apply the settings to the child WEB sites.
B. Clear the Directory Browsing checkbox for the Ticketing WEB site, and then apply the setting to child virtual directories.
C. Clear the Directory Browsing checkbox for the Department's WEB site, and then apply the setting to the child virtual directories.
D. Clear the Directory Browsing checkbox for the Financing virtual directory.


Answer: A


59. You are the administrator of your company's network. You are configuring the security policy for a group of users in the Finance organizational unit (OU). You need to configure a Group Policy so that future changes to Group Policy will be applied within 15 minutes to any computers that are logged on to the network.

What should you do?

A. Enable the background refresh settings to use the default Group Policy refresh rate.
B. Enable the asynchronous Group Policy application settings.
C. Enable and configure the Group Policy refresh interval for domain controller.
D. Enable and configure the Group Policy refresh interval for computers.


Answer: D


60. You are the network administrator at Contoso Ltd. You work at the main office in Seattle. The branch office in Denver is a call center. The network consists of a Windows 2000-only domain.

Denver is a token ring network. Seattle is an ethernet network. None of your network adapters at Contoso Ltd support promiscuous mode. The Brouter does not support multicast traffic.
Wks1.contoso.com and mem1.contoso.com are available for use as network monitor clients.

You want to be able to detect and identify rogue installations of network monitor on your network by using the fewest possible computers.
What should you do? (Choose all that apply)

A. Install network monitor tools on wks1.contoso.com by using the Windows components wizard.
B. Install the SNMP protocol on wks1. contoso.com by using the Windows components wizard.
C. Install network monitor tools on mem1.contoso.com by using the Windows components wizard.
D. Install the SNMP protocol on mem1.contoso.com by using the Windows components wizard.
E. Install network monitor tools on wks1.contoso.com that supports promiscuous mode.
F. Install network monitor tools on mem 1.contoso.com that supports promiscuous mode.


Answer: A,C


61. The Litware, Inc. network has three main network segments and six domain controllers. Part of the network is shown in the exhibit.
See the Exhibit.



You back up all of the System State data for each domain controller and place the data on a single tape. That tape is currently attached to the srv1.west.litware.com computer.

To which server or servers can you restore the System State data from srv1.west.litware.com? (Choose all that apply).

A. srv1.west.litware.com.
B. srv2.west. litware.com.
C. srv3.central.litware.com.
D. srv4.central.litware.com.
E. srv5.east.litware.com.
F. srv6.east. litware.com.


Answer: A


62. You configure a HP JetDirect print device as shown in the exhibit. See the Exhibit.

You want to create and share a printer at Srv2.sales.justtogs.com that is connected to the TCP/IP port of the print device. However, when you enter the IP address of the device, you receive the dialog box shown in the Printer Port Wizard.
See the exhibit.




What should you do?

A. Select Hewlett Packard JetDirect from the standard drop-down list.
B. Select the Custom option button, click the Settings command button, and select the LPR protocol.
C. Change the IP address of the print device to 10.5.20.200.
D. Change the subnet mask of the print device to 255.0.0.0.
E. Change the default gateway address on Srv2.sales.justtogs.com to 10.5.20.100.


Answer: C


63. You install a new modem on your Windows 2000 Server computer. Windows 2000 detects the modem and installs the default driver. Occasionally the modem stops communicating, and the only way to reactivate it is to restart your computer.

You download an updated modem driver from the manufacturer's web site and save it in the WINNT folder on your hard drive.

You want to install the new driver. What should you do?

A. In the Properties sheet for the modem in the Device Manager, click the Update Driver command button.
B. Use Device Manager to scan for hardware changes.
C. Delete the modem within the Device Manager and restart the computer.
D. Move the new driver to the Winnt/driver Cache folder, and then restart the computer.


Answer: A


64. Your Windows 2000 Server computer has a 10- GB hard disk with two partitions; Drive C and drive D. Windows 2000 Server is installed on Drive D. Both partitions are formatted as NTFS.

Your office experiences a power failure that causes your Windows 2000 Server computer to restart.
When the computer is restarting, you receive the following error message “NTLDR is missing. Press any key to restart”.

What should you do?

A. Start the computer by using Windows 2000 Server computer CD-ROM and choose to repair the installation.
B. Select the Recovery Console and copy the NTLDR file on the CD-ROM to the root of the system partition.
C. Start the computer in debugging mode. Copy the NTLDR file on the CD-ROM to the root of the system partition .
D. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt, run the sfc/scanboot command.
E. Start the computer by using a Windows 2000 bootable floppy disk. Run the File Signature Verification utility.


Answer: B


65. You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produces by the web sites.

You notice that all data from 7:00 P.M to midnight each night is included in the following day’s log file.

You want all data to be included in the correct day’s log file. What should you do?

A. Ensure that the log type is set to W3C.
B. Change the log rollover property in the web site logging properties.
C. Change the time zone setting in the time properties on the web server.
D. Configure the time server service o the web server to use the LocalSystem account.


Answer: B


66. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized hardware abstraction layer (HAL) to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL designed for the computer.

What should you do?

A. During the text mode portion of the Windows 2000 setup, install the customized HAL.
B. After text mode portion of Windows 2000 setup is complete use
Вернуться к началу
Посмотреть профиль Отправить личное сообщение
Показать сообщения:   
Список форумов Ногинск - Неофициальный Сайт Ногинского Района (hchp.ru) -> Софт Часовой пояс: GMT + 3
Начать новую тему   Ответить на тему
Страница 1 из 1
Перейти:  

 
Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете голосовать в опросах


phpBB
Template by Style

Яндекс цитирования  M M M-100