Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
Your network consists of a single Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2003. You have a file server named Server1 that is used to store users' home folders and profiles. On Server1, you create a folder named D:data and share the folder as UserData. You create a new user account named TemplateUser in Active Directory. You need to ensure that each user account you create by copying TemplateUser is configured to have a unique home folder stored in the UserData share. Which home folder path should you specify?
A
D:\\data\\%homedrive%
B
D:\\data\\%username%
C
\\\\server1\\userdata\\%homedrive%
D
\\\\server1\\userdata\\%username%
Correct Answer:
\\\\server1\\userdata\\%username%
Accept
Reject
Dismiss
Your network consists of a single Active Directory domain. The domain includes a group named SalesUsers. You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users group the Full Control share permission. In the CorpData folder, you create a folder named Sales. You need to configure security for the Sales folder to meet the following requirements: -Members of the SalesUsers group must be able to read, create, and modify all files and folders. -All other users must be able to view items in the folder. What should you do?
A
On the Sales folder, block permission inheritance and remove permissions. Assign the Allow Modify permission to the SalesUsers group.
B
On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow Modify permission to the SalesUsers group.
C
On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow Modify permissions to the SalesUsers group.
D
On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow Modify permissions to the SalesUsers group.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). You install and configure Microsoft Windows Server Update Services (WSUS) 3.0 on a member server named Server1. You create a new Group Policy Object named GPO1 that enables automatic updating. You link GPO1 to the domain. You need to ensure that each client computer obtains software updates from Server1. What should you do?
A
On each client computer, run Gpupdate \/Force.
B
On each client computer, run wuauclt \/detectnow.
C
From GPO1, configure the Enable client side targeting setting.
D
From GPO1, configure the Specify intranet Microsoft update service location setting.
Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?
A
Compress the files in her home folder to save disk space
B
Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
C
Move some of the files from her home folder to the IN_PROGRESS shared folder
D
Remove files from her home folder until the total uncompressed file size is less than 100 MB
E
None of above
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
A
Apply a less restrictive custom security template to DC1
B
Apply a less restrictive custom policy to Windows NT domain controller
C
Ensure the Windows 2000 domain is configured in the mixed mode
D
Ensure the Windows 2000 domain is configured to run in the native mode
E
None of above
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A
Install Active Directory on the server
B
Select Basic Authentication check box
C
Clear the Allow Anonymous Connection check box
D
Disable the IUSE_inta user account on Intra
E
Clear the Allow IIS to Control Password check box
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A
Move the intranet server to the client segment of the network
B
Move the proxy server to the server segment of the network
C
Configure each client computer to bypass the proxy server for local addresses
D
Configure each client computer to use port 81 for the proxy server
E
None of above
Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do?
A
Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/ GIANT
B
Install Microsoft Print Services for Unix on users* Computers. Create a network printer, and specify that the printer name is \10.1.1.99GIANT
C
Create a network printer on PrintServ, and specify that the printer name is \16.1.1.99GIANT. Share this printer and connect to it from users computers
D
Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers
E
None of above
You are the administrator of a SQL Server 2000 computer. The server contains a database named FinanceData that is used by a client/server application. Each employee has a SQL Server login that the application uses to access the server.Your company hires a new employee named Andrew. You create a SQL Server login named Andrew. You also create a database user named Andrew in the database and grant the database user full permissions in the database.Whenever Andrew runs the client/server application, he receives the following error message: "Invalid object name." Andrew also reports that he cannot access the database by using the application.You need to ensure that Andrew can use the application. Which Transact-SQL statement should you execute?
A
EXEC sp_defaultdb 'Andrew','FinanceData'
B
GRANT ALL ON FinanceData TO Andrew
C
EXEC sp_addlogin 'Andrew'
D
EXEC sp_grantdbaccess 'FinanceData','Andrew'GOsp_addrolemember 'db_datareader','Andrew'
Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do?
A
Examine the System Event Log on the user's computer.
B
Examine the System Event Log on both domain controllers.
C
Examine the Security Event Log on both domain controllers.
D
Examine the Application Event Log on the user's computer.
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?
A
Set the second adapters status to disable
B
Configure the first adapter to use a TCP/IP metric of 100
C
Configure the second adapter to use a TCP/IP metric of 25
D
Configure the binding order on the second adapter to bind TCP/IP last
E
None of above