问题:You are the database administrator for an accounting company. You are installing SQL Server 2000 on a new Microsoft Windows 2000 Server computer. The computer will run two client/server database applications that your company has purchased. Each application uses a separate database.During the installation, you specify SQL_Latin1_General_CP1_CI_AI as the default collation for the SQL server computer. After completing the installation, you discover that one of the new applications, named Financials, is sorting information incorrectly.You contact the application vendor and discover that the Financials application requires the SQL_Latin1_CP437_BIN collation. You need to configure the correct collation for the applications without diminishing the performance of the SQL Server computer.What should you do?A.Rerun the SQL Server Setup and specify the SQL_Latin1_General_CP437_BIN collation.B.Run the rebuildm utility and specify the SQL_Latin1_General_CP437_BIN collation.C.Use the ALTER DATABASE statement to specify the SQL_Latin1_General_CP437_BIN collation for the Financials database.D.Use the ALTER TABLE statement to specify the SQL_Latin1_General_CP437_BIN collation for each table in the Financials database.
Monday, October 14, 2024
问题:You are the network administrator for Ezonexam.You plan to upgrade 550 computers from Windows 95 to Windows 2000 Professional. You create an Unattend.txt file by using Setup Manager. You copy the file to the network share that will be used to install Windows 2000 Professional. You start the installation on a test computer by using a network shared folder and an answer file. When the installation is complete, you realize that the upgraded computers are not utilizing their entire hard disks.You want to ensure that the unattended installation utilizes the entire hard drive on all computers.What should you do? (Each correct answer presents part of the solution. Choose two)A.Add an [Unattended] section to Unattend.txt, and set the File System parameter to Convert NTFS.B.Rename Unattend.txt to Cmdlines.txt and copy it to the \$OEM$ subdirectory.C.Add a [GUIRunOnce] section to answer file, and add an entry for the Unattend.txt file.D.Create a \$OEM$\S$ folder on the hard disk of the test computer, and copy Unattend.txt to the folder.E.Add an [Unattended] section to Unattend.txt, and set the Extend OEM Partition to 1.F.Add an [Unattended] section to Unattend.txt, and set the Extend OEM Partition parameter to 999.
问题:You are the administrator of a new Microsoft Windows 2000 server computer named HQSQL5. HQSQL5 is a member server in your company's Windows NT 4.0 domain, which is named HQMAIN.After installing SQL Server 2000 on HQSQL5, you configure the MSSQLServer service account to use the HQMAIN\sqladmin user account, which is a member of the local administrators group on HQSQL5.You can use the HQMAIN\sqladmin user account to log on the HQSQL5. However, the MSSQLServer service fails to start. You need to start the service. What should you do?A.Revoke Log on interactivity rights for the HQMAIN\sqladmin user account.B.Add the HQMAIN\sqladmin user account to the HQMAIN\Domain Admins group.C.Select the Password Never Expires check box for the HQMAIN\sqladmin user account.D.Grant Log on as a service rights to the HQMAIN\sqladmin user account.
Tuesday, September 10, 2024
问题:You are the administrator of the homeoffice.local domain. You want to create a shared printer for the company's executives so that they do not have to wait for their documents to print when the default printer's queue contains a large number of documents.You configure the new high-priority printer and want to set permissions for the groups shown in the exhibit. Note: The default settings have been cleared.You select the check box to allow Print permission for the Executives group. You want only the Administrators, Print Operators, Server Operators, and Executives group to be able to print to the printer. What can you do? (Select all that apply).A.Remove the Everyone group.B.Select the check box to deny Print permission for the Everyone group.C.Select the check box to deny Manage Documents permission for Everyone group.D.Select all Deny check boxes for the Everyone group.E.Clear all check boxes for Everyone group.
Friday, August 2, 2024
问题:You are the administrator of a Windows 2000 network. Your network includes 75 Windows NT Workstation 4.0 computers. You are adding 50 new PXE-compliant computers to the network. The hardware on each computer is configured identically.You are using a RIS image to deploy Windows 2000 Professional to the 50 computers. You successfully install Windows 2000 Professional on the first 10 computers. However, you cannot install Windows 2000 Professional on remaining 40 computers.What should you do?A.Configure the DHCP scope to add additional IP addresses.B.Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.C.Modify the startup sequence in the CMOS of the remaining computers.D.Create computer accounts on the remaining computers in the Active Directory.
Friday, July 12, 2024
问题:You want to install Windows 2000 Professional on 45 new computers on your company's network. You first install Windows 2000 Professional on one of the new computers.You log on to the computer by using the local Administrator account. You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured.You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network. What should you do?A.Run Rbfg.exe before installing the standard applications.B.Run RIPrep.exe before installing the standard applications.C.Copy the All Users profile to the Default Users profile.D.Copy the local Administrator account profile to the Default Users profile
问题:You configure a Group Policy Object for the Marketing organizational unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers domain local group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel.What should you do?A.Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the group policy.B.Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.C.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run System in Control Panel. Give the original GPO a higher priority than the new GPO.D.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to read and apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.
Tuesday, October 8, 2024
问题:You are the network administrator for Ezonexam.Your Windows 2000 Server computer named Ezonexam1 contains two 36-GB hard disks. Disk 0 and Disk 1. Each disk is configured as a basic disc and has a single 36-GB NTFS partition. Both partitions are backed up to a tape each night. The partition on Disk 1 stores user data. Most users at Ezonexam encrypt their files. Disk 1 fails. You replace it with a new hard disk and create a single NTFS partition.You need to recover the data as quickly as possible while maintaining the security of the files on Disk 1.What should you do?A.Restore the contents of Disk 1 from the most recent tape backup to a second file server. Instruct users to copy their files from the second file server to the new partition.B.Restore the contents of Disk 1 from the most recent tape backup to a second file server. Log on to Ezonexam1 console as a recovery agent. Copy the files from the second file server to the new partition.C.Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Instruct the users to verify the integrity of their files.D.Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Run the cipher command to decrypt the files.
问题:You are the administrator for Ezonexam.com's network.Your network includes Windows 2000 Professional client computers, Windows NT Workstation 4.0 client computers, Windows 98 client computers, and UNIX client computers. Users of the Windows operating systems store files on shared folders on a Windows 2000 Server computer named FileServ.You want to make the shared folders on FileServ available to the UNIX computers.What should you do?A.Install and configure Network File System (NFS) on FileServ.B.Configure data volumes on FileServ to be FAT volumes.C.Disable Server Message Block (SMB) signing on FileServ.D.Install Simple TCP/IP Services on FileServ.
Wednesday, May 29, 2024
问题:You are the administrator of Ezonexam's Windows 2000 network.You need to store secured files for Ezonexam's accounting and legal departments on a Windows 2000 Professional computer. You create two shared folders named Accounting and Legal with the default NTFS and share permissions. You also create two groups named Accounting and Legal and add the appropriate user accounts into the appropriate groups.To meet the security requirements for the shared folders the following criteria must be met:1. Users in both departments must be able to update their own files from the network.2. Users in the accounting department must be able to view the legal department's documents from the network.3. Users in the legal department must be prevented from being able to view the accounting department's documents from the network.You want to ensure that all security requirements are met using the least amount of administrative effort.What should you do?A.Allow the Accounting groupReadpermission on the Accounting share and the Legal shared folder. Allow the Legal groupReadpermissions on the Legal shared folder.B.Allow the Accounting groupFull Controlpermissions on the Accounting shared folder and the Legal shared folder. Allow the Legal groupFull Controlpermission on the Legal shared folder.C.Deny the Everyone groupFull Controlpermissions on the Accounting shared folder.D.Deny the Legal groupFull Controlpermission on the Accounting shared folder.
Wednesday, July 10, 2024
问题:You are configuring five computers for Windows NT Workstation 4.0 and Windows 2000 Professional.Each computer has an 8 GB hard disk.You configure the hard disk on each computer to have two 4 GB partitions. Windows NT Workstation is installed on drive C and Windows 2000 Professional on drive D.In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart your computer and load Windows NT Workstation. You notice that users can save files to drive D.You want to prevent users from saving the files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system.What should you do?A.Use Windows 2000 Professional to configure drive D as a dynamic partition.B.Use Windows 2000 Professional to enable encrypting file system on drive D.C.Use Windows NT workstation to configure NTFS permissions on drive D to deny the users write permission.D.Reinstall Windows NT Workstation after configuring disk quotas.
问题:You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.
Friday, May 3, 2024
问题:You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators.The shared permissions and NTFS permissions are shown in the following table.Share permissions:Everyone: FULL ControlNTFS permissionsDomain Admins: ReadKatrin: Full ControlKatrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted.Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions for other files in the HR-Data folder. You want your actions to have least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file.What should you do?A.Grant yourself Full Control permission for only the HR-data folder and not its subobjects. Delete the file. Then remove Full Control permission for HR-Data folder.B.Take ownership of the HR-Data folder. When prompted, take ownership of the existing files. Grant yourself Full Control permission for the file. Delete the file.C.Take ownership of the file. Grant yourself Modify permission for the file. Delete the file.D.Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.
问题:You are the domain administrator for Ezonexam.com. The network contains a Windows 2000 domain and two Windows NT domains. The Windows 2000 domain trusts each of the Windows NT domains, and the Windows NT domains trust the Windows 2000 domain.You are required to configure one of the Windows 2000 domain controllers named Ezonexam4 to support several legacy applications that are not Windows 2000 certified.What should you do? (Select two. Each answer specifies a complete solution).A. On Ezonexam4, type secedit /configure /db secedit.sdb /cfgC:\winnt\security\templates\hisecdc.inf /overwrite.B. On Ezonexam4, type secedit /configure /db secedit.sdb /cfgC:\winnt\security\templatescompatws.inf /overwrite.C. On Ezonexam4, use the Security Configuration and Analysis snap-in to apply the Compatws.inf security template.D. On Ezonexam4, use the Security Configuration and Analysis snap-in to apply the Hisecdc.infE. On Ezonexam4, use the Security Templates snap-in to open the Compatws.inf security template.F. On Ezonexam4, use the Security Templates snap-in to open the Hisecdc.inf security template.
问题:You are the administrator of a Windows 2000 Server network at Ezonexam.You configure a server named print10.marketing.Ezonexam.com.local as a print server at the Los Angeles office. You create and share printers on the server for use by employees in the marketing,Ezonexam.local domain.You want to review the configured properties of all of the shared printers on the print10.marketing.Ezonexam.local server. You want to perform. this review from a Windows 2000 Professional computer at the London office of Ezonexam.What can you do? (Each correct answer presents a complete solution. Choose two)A. Use your Web browser to connect to http://print10.london.Ezonexam.local/printers/.B. Use your Web browser to connect to http://print10.marketing.Ezonexam.local/printers/.C. Run the net view \\print10 command.D. Run the net view \\print10.marketing.Ezonexam.com command.E. Browse to \\print10.marketing.Ezonexam.local and open the Printers folder.F. Browse to \\print10.london.Ezonexam.local and open the Printers folder.
问题:You are the administrator of a SQL server 2000 computer that contains a database named Acct. The database contains 1.5 GB of data. The server has one 9-GB hard disk that is configured as shown in the Exhibit.You need to import data into the database without adversely affecting database performance. The data will require an additional 2GB of storage space.What should you do?A.Add another data file on drive E, and then add the file to the PRIMARY filegroup.B.Move the transaction log file to drive E, and set the file growth of Acc_Data.mdf by selecting the Unrestricted file growth option.C.Rebuild all clustered indexes so that they have a fill factor of 100.D.Compress drive D.
Saturday, April 8, 2023
问题:You are the network administrator of a small Windows 2000 Active Directory domain Ezonexam.com.The domain contains one shared print device with default settings. An employee named Tess frequently prints high-priority documents that she needs to have immediately.Tess reports missing critical deadlines because of the large number of print jobs ahead of hers in the queue.You need to ensure that Tess's print jobs are always the next to be printed, regardless of the number of other jobs waiting in the print queue.Which action or actions should you take to achieve this goal? (Choose all that reply)A. Create a new printer on the print server that points to the same print device.B. Create another print port on the print server that points to the same print device.C. In the properties of the new printer, click the Advanced tab and change the priority to 10.D. In the properties of the new printer, change the priority to 1.E. . In the properties of the original printer, click the Advanced tab and change the priority to 10.F. Configure Tess's computer to use the new printer.G. Configure the Internet Printing Protocol (IPP) Client on Barbara's computer.
Saturday, September 28, 2024
问题:You are the administrator of a Windows 2000 Server computer at Blue sky Airlines. You onfigure a server named print10.marketing.blueskyairlines.local as a print server at the Los Angeles site. You create and share a variety of printers on the server for use by employees in the arketing.blueskyairlines.local domain.You want to review the configured properties of all the shared printers on the rint10.marketing.blueskyairlines.local server. You want to perform. this review from a Windows 2000 Professional computer at theLondon site of Blue sky Airlines.What should you do?A.Use your web browser to connect to http://print10.marketing.blueskyairlines.local/printers.B.Use your web browser to connect to http://print10.blueskyairlines.local/printers.C.Run the net view\\print 10 command.D.Run the net view\\print 10.blueskyairlines.com command.
问题:You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the computers in your company use the same hardware. However, several different peripheral devices are used throughout the company.You want to verify that the hardware in use is compatible with Windows 2000 Professional. You want to accomplish this with least amount of administrative effort.What should you do?A.Create several different computer configurations. Install Windows 2000 Professional and enable driver signing.B.Create a bootable floppy disk that contains and automatically runsWinNT32.exe/CheckUpgradeOnlyQ. Send the floppy disk to each user on the network.C.Copy the contents of Windows 2000 Professional CD-ROM to a network share. From the network, modify your network logon scripts to runWinNT32.exe/Unattended:ReportOnly.D.Use Setup Manager to create a Setup.inf file. Add the entryReportOnly=Yes to the [Win9xUpg] section of the answer file. RunWinnt32.exe /Unattended:Setup.infon all of the different computer configurations.
问题:You are the network administrator for Ezonexam. You are planning to upgrade Windows NT Server 4.0 computers to Windows 2000 Server. You want to perform. the upgrades by means of a distribution folder. You want to install a custom application as part of the upgrade.You need to include the necessary commands so that the custom application is automatically installed as part of the upgrade process.What should you do?A.Create a command file named Cmdlines.txt to install the application. Copy the Cmdlines.txt file to the subfolder named $OEM$ under the i386 folder.B.Create a command file named Unattend.txt to install the application. Copy the Unattend.txt file to the subfolder $OEM$\textmode under the i386 folder.C.Create a subfolder named $OEM$\$C\Applications under the i386 folder. Copy the application files to that subfolder.D.Create a second network shared folder named $OEM$. Copy the application to that share point.
Wednesday, May 8, 2024