Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?
A
CHAP
B
MS-CHAP v2
C
PAP
D
SPAP
E
None of above
Correct Answer:
MS-CHAP v2
You install the Routing and Remote Access service on a Windows 2000 Server computer in your network. Your network is not directly connected to the Internet and uses the private IP address range 192.168.0.0. When you use Routing and Remote Access to dial in to the server, your computer connects successfully, but you are unable to access any resources. When you try to piiig servers by using their IP addresses, you receive the following message: "Request timed out." When you run the ipconfig command, it shows that your dial-up connection has been given the IP address 169.254.75.182. What should you do to resolve the problem?
A
Configure the remote access server with the address of a DHCP server
B
Authorize the remote access server to receive multiple addresses from a DHCP server
C
Configure the remote access server to act as a DHCP Relay Agent
D
Ensure that the remote access server is able to connect to a DHCP server that has a scope for its subnet
E
None of above
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
A
Apply a less restrictive custom security template to DC1
B
Apply a less restrictive custom policy to Windows NT domain controller
C
Ensure the Windows 2000 domain is configured in the mixed mode
D
Ensure the Windows 2000 domain is configured to run in the native mode
E
None of above
You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection.to the remote location?
A
NAT does not allow for remote networking
B
L2TP does not work with Windows 2000 computers
C
You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted
D
You have not configured the NAT server to translate the IP Security packets
E
None of above
You have a Windows NT 4.0 Workstation computer with an NTFS file system that you use for software development. As your company upgrades their systems to Windows 2000, you will need to be able to test applications in both the Windows NT Workstation environment and the Windows 2000 environment. You decide that the easiest course of action would be to install Windows 2000 Professional in a dual boot environment with Windows NT 4.0 Workstation on your computer. What should you do before installing Windows 2000 Professional?
A
Edit the BOOT.INI file to reflect the new installation of Windows 2000 Professional.
B
Install Service Pack 3 or later for Windows NT Workstation 4.0.
C
Install Service Pack 4 or later for Windows NT Workstation 4.0.
D
Convert the NTFS file system to FAT.
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A
Move the intranet server to the client segment of the network
B
Move the proxy server to the server segment of the network
C
Configure each client computer to bypass the proxy server for local addresses
D
Configure each client computer to use port 81 for the proxy server
E
None of above
You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?
A
Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package
B
Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy
C
Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy
D
Place the service pack in a Distributed file system (Dfs)
E
None of above
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
A
Set the CrashonAuditFail registry key to 0
B
Set the Security Log to overwrite events as needed
C
Delete the Liscense Trial registry key
D
Increase the size of the security log
E
Save the security log to a file, and clear it every morning
You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do?
A
Copy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs
B
Copy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator
C
Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000
D
Copy the Windows NT 4.0 printer drivers to the WinntSystem32 pri liter sdri vers folder on the Windows 2000 print server
E
None of above
Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do?
A
Configure a Group policy for the Domain that blocks all unsigned drivers
B
Configure a Group policy for the Default Domain Controller to block all unsigned drivers
C
Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers
D
Do nothing, this is the default setting
E
None of above
You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks?
A
Convert all three disks to dynamic disks. Create a striped volume
B
Convert all three disks to dynamic disks. Create a RAID-5 volume
C
Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1
D
Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks
E
None of above