Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?
A
Use Computer Management to stop and restart the Server service
B
Use Computer Management to stop and restart the Workstation service
C
Use Task Manager to end any related child processes
D
Use Task Manager to end and automatically restart the Explorer.exe process
E
None of above
Correct Answer:
Use Task Manager to end any related child processes
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?
A
Add the APP1 and APP2 instances to the processor time counter for the process object
B
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
C
Add only the NTVDM instance for the percent processor time counter for the process object
D
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
E
None of above
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?
A
Restart the computer in safe mode. Then restart the computer again
B
Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
C
Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
D
Restart the computer by using the last known good configuration
E
None of above
You have a Windows NT 4.0 Workstation computer with an NTFS file system that you use for software development. As your company upgrades their systems to Windows 2000, you will need to be able to test applications in both the Windows NT Workstation environment and the Windows 2000 environment. You decide that the easiest course of action would be to install Windows 2000 Professional in a dual boot environment with Windows NT 4.0 Workstation on your computer. What should you do before installing Windows 2000 Professional?
A
Edit the BOOT.INI file to reflect the new installation of Windows 2000 Professional.
B
Install Service Pack 3 or later for Windows NT Workstation 4.0.
C
Install Service Pack 4 or later for Windows NT Workstation 4.0.
D
Convert the NTFS file system to FAT.
You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do?
A
Copy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs
B
Copy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator
C
Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000
D
Copy the Windows NT 4.0 printer drivers to the WinntSystem32 pri liter sdri vers folder on the Windows 2000 print server
E
None of above
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
A
Apply a less restrictive custom security template to DC1
B
Apply a less restrictive custom policy to Windows NT domain controller
C
Ensure the Windows 2000 domain is configured in the mixed mode
D
Ensure the Windows 2000 domain is configured to run in the native mode
E
None of above
You are a Web developer for XYZ. You create an ASP.NET application that accesses sales and marketing data. The data is stored in a Microsoft SQL Server 2000 database on a server named XYZ01.
The company purchases a factory automation software application. The application is installed on XYZ01, where it creates a second instance of SQL Server 2000 named Factory and a database named FactoryDB. You connect to FactoryDB by using Windows Integrated authentication.
You want to add a page to your ASP.NET application to display inventory data from FactoryDB. You use a SqlConnection object to connect to the database. You need to create a connection string to FactoryDB in the instance of SQL Server named Factory on XYZ01. Which string should you use?
A
?Server=XYZ01;Data Source=Factory; Initial Catalog=FactoryDB;Integrated Security=SSPI?
B
?Server=XYZ01;Data Source=Factory; Database=FactoryDB;Integrated Security=SSP1?
C
?Data Source=XYZ01\\Factory; Initial Category=Factory; Integrated Security=SSP1?
D
?Data Source=XYZ01\\Factory; Database=FactoryDB; Integrated Security=SSP1?
You are the administrator of a SQL Server 2000 computer. The server contains a database named FinanceData that is used by a client/server application. Each employee has a SQL Server login that the application uses to access the server.Your company hires a new employee named Andrew. You create a SQL Server login named Andrew. You also create a database user named Andrew in the database and grant the database user full permissions in the database.Whenever Andrew runs the client/server application, he receives the following error message: "Invalid object name." Andrew also reports that he cannot access the database by using the application.You need to ensure that Andrew can use the application. Which Transact-SQL statement should you execute?
A
EXEC sp_defaultdb 'Andrew','FinanceData'
B
GRANT ALL ON FinanceData TO Andrew
C
EXEC sp_addlogin 'Andrew'
D
EXEC sp_grantdbaccess 'FinanceData','Andrew'GOsp_addrolemember 'db_datareader','Andrew'
You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?
A
End the task named Application
B
End the Application.exe process
C
End the Application.exe process tree
D
End both the Explorer.exe process and the Application.exe process
E
None of above
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A
Move the intranet server to the client segment of the network
B
Move the proxy server to the server segment of the network
C
Configure each client computer to bypass the proxy server for local addresses
D
Configure each client computer to use port 81 for the proxy server
E
None of above
Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do?
A
Configure a Group policy for the Domain that blocks all unsigned drivers
B
Configure a Group policy for the Default Domain Controller to block all unsigned drivers
C
Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers
D
Do nothing, this is the default setting
E
None of above