Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A
Install Active Directory on the server
B
Select Basic Authentication check box
C
Clear the Allow Anonymous Connection check box
D
Disable the IUSE_inta user account on Intra
E
Clear the Allow IIS to Control Password check box
Correct Answer:
Clear the Allow Anonymous Connection check box
Accept
Reject
Dismiss
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A
Move the intranet server to the client segment of the network
B
Move the proxy server to the server segment of the network
C
Configure each client computer to bypass the proxy server for local addresses
D
Configure each client computer to use port 81 for the proxy server
E
None of above
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
A
Apply a less restrictive custom security template to DC1
B
Apply a less restrictive custom policy to Windows NT domain controller
C
Ensure the Windows 2000 domain is configured in the mixed mode
D
Ensure the Windows 2000 domain is configured to run in the native mode
E
None of above
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
A
Set the CrashonAuditFail registry key to 0
B
Set the Security Log to overwrite events as needed
C
Delete the Liscense Trial registry key
D
Increase the size of the security log
E
Save the security log to a file, and clear it every morning
You are the administrator of a SQL Server 2000 computer. The server contains a database named FinanceData that is used by a client/server application. Each employee has a SQL Server login that the application uses to access the server.Your company hires a new employee named Andrew. You create a SQL Server login named Andrew. You also create a database user named Andrew in the database and grant the database user full permissions in the database.Whenever Andrew runs the client/server application, he receives the following error message: "Invalid object name." Andrew also reports that he cannot access the database by using the application.You need to ensure that Andrew can use the application. Which Transact-SQL statement should you execute?
A
EXEC sp_defaultdb 'Andrew','FinanceData'
B
GRANT ALL ON FinanceData TO Andrew
C
EXEC sp_addlogin 'Andrew'
D
EXEC sp_grantdbaccess 'FinanceData','Andrew'GOsp_addrolemember 'db_datareader','Andrew'
Your network consists of a single Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2003. You have a file server named Server1 that is used to store users' home folders and profiles. On Server1, you create a folder named D:data and share the folder as UserData. You create a new user account named TemplateUser in Active Directory. You need to ensure that each user account you create by copying TemplateUser is configured to have a unique home folder stored in the UserData share. Which home folder path should you specify?
A
D:\\data\\%homedrive%
B
D:\\data\\%username%
C
\\\\server1\\userdata\\%homedrive%
D
\\\\server1\\userdata\\%username%
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). You install and configure Microsoft Windows Server Update Services (WSUS) 3.0 on a member server named Server1. You create a new Group Policy Object named GPO1 that enables automatic updating. You link GPO1 to the domain. You need to ensure that each client computer obtains software updates from Server1. What should you do?
A
On each client computer, run Gpupdate \/Force.
B
On each client computer, run wuauclt \/detectnow.
C
From GPO1, configure the Enable client side targeting setting.
D
From GPO1, configure the Specify intranet Microsoft update service location setting.
You are the administrator of a Microsoft Windows NT Server 4.0 computer. The server is the PDC in your domain and also runs SQL Server 2000. The server has four processors and 1 GB of RAM.Your network consists of 500 client computers that are running Microsoft Windows Millennium Edition. Users report that when they log on in the morning their computers respond slowly and occasionally return error messages.You use System Monitor to monitor processor performance and RAM utilization. You discover that the % Total Time and % User Time counters average 90 percent and the % Privileged Time counter averages 20 percent. The Available Mbytes counter averages 800 MB. You need to improve server performance for user logons. What should you do?
A
Increase the physical RAM on the computer to 2 GB.
B
Increase the virtual RAM on the computer to 4 GB.
C
Configure SQL Server to use only processors 0, 1, and 2.
D
Configure SQL Server to use only processors 1, 2, and 3.
Your network consists of a single Active Directory domain. The domain includes a group named SalesUsers. You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users group the Full Control share permission. In the CorpData folder, you create a folder named Sales. You need to configure security for the Sales folder to meet the following requirements: -Members of the SalesUsers group must be able to read, create, and modify all files and folders. -All other users must be able to view items in the folder. What should you do?
A
On the Sales folder, block permission inheritance and remove permissions. Assign the Allow Modify permission to the SalesUsers group.
B
On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow Modify permission to the SalesUsers group.
C
On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow Modify permissions to the SalesUsers group.
D
On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow Modify permissions to the SalesUsers group.
You are a Web developer for XYZ. You create an ASP.NET application that accesses sales and marketing data. The data is stored in a Microsoft SQL Server 2000 database on a server named XYZ01.
The company purchases a factory automation software application. The application is installed on XYZ01, where it creates a second instance of SQL Server 2000 named Factory and a database named FactoryDB. You connect to FactoryDB by using Windows Integrated authentication.
You want to add a page to your ASP.NET application to display inventory data from FactoryDB. You use a SqlConnection object to connect to the database. You need to create a connection string to FactoryDB in the instance of SQL Server named Factory on XYZ01. Which string should you use?
A
?Server=XYZ01;Data Source=Factory; Initial Catalog=FactoryDB;Integrated Security=SSPI?
B
?Server=XYZ01;Data Source=Factory; Database=FactoryDB;Integrated Security=SSP1?
C
?Data Source=XYZ01\\Factory; Initial Category=Factory; Integrated Security=SSP1?
D
?Data Source=XYZ01\\Factory; Database=FactoryDB; Integrated Security=SSP1?
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?
A
CHAP
B
MS-CHAP v2
C
PAP
D
SPAP
E
None of above