Can You Pass This Toughest Microsoft Certification Exam?

62 Questions | Attempts: 249
Share
SettingsSettings
Please wait...
  • 1/62 Questions

    How do you log onto a computer running Windows 2000?

    • Select the Start button.
    • Press CTRL+ALT+DEL.
    • Press CTRL, then ALT, then DEL .
    • Press ESC twice .
    • Press SHIFT+TAB.
Please wait...
About This Quiz

This is a practice exam for Microsoft Certification Exam 70-210 developed in association with ProProfs. Take this exam at the end of your studies to verify that you are prepared for the real exam. The certification exam is timed. You will have 150 minutes to complete the test. Make sure you are able to pass the practice exam by a substantial margin before you take the real exam. So, let's try out this quiz and prove your worth. All the best!

Microsoft Certification Exam Quizzes & Trivia

Quiz Preview

  • 2. 

    In Windows 2000, how can you view a list of processes that are currently active on a computer?

    • Use the Device Manager to monitor CPU usage.

    • Use the System Monitor to monitor CPU usage.

    • Use the Processes Tab of the Task Manager to look at the processes that are running on the computer.

    • Use the Processes Tab of the System Monitor to look at the processes that are running on the computer.

    • Use the ProcessViewer to examine processes that are currently running.

    Correct Answer
    A. Use the Processes Tab of the Task Manager to look at the processes that are running on the computer.
    Explanation
    The Processes Tab of the Task Manager will provide information about the processes that are running on the computer.

    Rate this question:

  • 3. 

    Which network device forwards packets directly to their destination or to another network segment, uses complete addressing and improves the efficiency of the network?

    • A router.

    • A bridge.

    • A switch.

    • A hub.

    • A repeater.

    Correct Answer
    A. A router.
    Explanation
    A router forwards packets directly to their destination or to another network segment, uses complete addressing and improves the efficiency of the network.

    Rate this question:

  • 4. 

    Formerly, IP addresses were divided into classes. Each class of IP address determined how many hosts a network could support and each class range was determined by the network address. Identify the range of addresses that includes Class B networks.

    • 1.0.0.0 - 126.255.255.255

    • 128.0.0.0- 191.255.255.255

    • 192.0.0.0 - 223.255.255.255

    • 224.0.0.0 - 239.255.255.255

    • 240.0.0.0 - 255.255.255.254

    Correct Answer
    A. 128.0.0.0- 191.255.255.255
    Explanation
    129.0.0.0- 191.255.255.255 identify networks that were formerly designated as Class B addresses.

    Rate this question:

  • 5. 

    In TCP/UDP communications, what service can be found on port 25?

    • FTP

    • Telnet

    • SMTP

    • HTTP

    • NNTP

    Correct Answer
    A. SMTP
    Explanation
    SMTP can be found on port 25.

    Rate this question:

  • 6. 

    What is the primary purpose of Active Directory?

    • Active Directory stores and organizes information about domain resources.

    • Active Directory stores hardware profiles for network devices.

    • Active Directory stores user files.

    • Active Directory provides lookup services for the email server.

    • Active Directory manages user desktops.

    Correct Answer
    A. Active Directory stores and organizes information about domain resources.
    Explanation
    Active Directory stores information about domain resources and provides a hierarchical organization for domains.

    Rate this question:

  • 7. 

    Regardless of the size of the address block, two IP addresses are always reserved by convention. Identify the reserved addresses.

    • .1 and .255 are always reserved as the network start and end identifiers. .

    • 0 and .255 are always reserved as the network and broadcast addresses.

    • 0 and .1 are always reserved as the network and router addresses.

    • .1 and .2 are always reserved for the router and the firewall.

    • .1 and .42 are always reserved for the router and the DNS server.

    Correct Answer
    A. 0 and .255 are always reserved as the network and broadcast addresses.
    Explanation
    In any IP network, addresses .0 and .255 are always reserved as the network and broadcast addresses. These addresses cannot be assigned to hosts.

    Rate this question:

  • 8. 

    A computer operating system is responsible for all but one of the following aspects of a computer's operation. Identify the function that the OS is not responsible for.

    • Software management.

    • Data management.

    • Hardware management.

    • Memory management.

    • Revision management.

    Correct Answer
    A. Revision management.
    Explanation
    The operating system manages hardware, software, memory and data.

    Rate this question:

  • 9. 

    Formerly, IP addresses were divided into classes. Each class of IP address determined how many hosts a network could support and each class range was determined by the network address. Identify the range of addresses that includes Class C networks.

    • 1.0.0.0 - 126.255.255.255

    • 128.0.0.0- 191.255.255.255

    • 192.0.0.0 - 223.255.255.255

    • 224.0.0.0 - 239.255.255.255

    • 240.0.0.0 - 255.255.255.254

    Correct Answer
    A. 192.0.0.0 - 223.255.255.255
    Explanation
    192.0.0.0 - 223.255.255.255 identify networks that were formerly designated as Class C addresses.

    Rate this question:

  • 10. 

    On a domain controller, where are groups stored?

    • A group is stored on the domain controller\'s SAM.

    • On a domain controller, a group is stored in Active Directory.

    • A group is stored in the local user database of the domain controller.

    • A group is stored in the group database in the domain controller.

    • A group is stored in the local security database of the domain controller.

    Correct Answer
    A. On a domain controller, a group is stored in Active Directory.
    Explanation
    On a Windows 2000 Professional computer that is acting as a domain controller, groups are stored in Active Directory.

    Rate this question:

  • 11. 

    Mobile users on your network want to manage the power consumption of their laptops. What function of Windows allows them to control their power usage?

    • Power Options in the Control Pane allows users to choose among several power schemes.

    • Using PowerManager, users can adjust their power consumption.

    • Users computers should be set up to sleep after 5 minutes of inactivity.

    • Users computers should be set up to hibernate after 10 minutes of inactivity.

    • Users computers should be set up to turn their monitors and hard disks off when their computers are inactive.

    Correct Answer
    A. Power Options in the Control Pane allows users to choose among several power schemes.
    Explanation
    Using Power Options in the Control Panel, users can select a power scheme that best meets their usage requirements.

    Rate this question:

  • 12. 

    What type of network server stores information about network users and permits centralized management of users?

    • A Network Management server.

    • A Network Access server.

    • A User Management server.

    • A Directory Services server.

    • An Active Desktop server.

    Correct Answer
    A. A Directory Services server.
    Explanation
    A Directory Services server is a centralized store of information about the network, network users, and their access to files and resources on the network.

    Rate this question:

  • 13. 

    You would like to set a security policy on one computer on the network. How can you do this using Windows 2000?

    • Place the computer in its own domain and set a domain security policy for it.

    • Set up a local security policy for the computer.

    • Remove the computer from the domain and use it in a workgroup configuration.

    • Set up a system security policy for the users on the computer.

    • Change the permissions for all users who use that computer.

    Correct Answer
    A. Set up a local security policy for the computer.
    Explanation
    You can set up a local security policy for an individual computer using the Local Security Policy option under Administrative Tools.

    Rate this question:

  • 14. 

    The Local Users and Groups Utility in Windows 2000 can do all but one of the following:

    • Create and delete user accounts.

    • Modify user account information.

    • Reset the password for the account.

    • Increase the disk space allocated to a user.

    • Enable and disable local user accounts.

    Correct Answer
    A. Increase the disk space allocated to a user.
    Explanation
    The Local Users and Groups utility cannot be used to increase the amount of disk space dedicated to a particular user.

    Rate this question:

  • 15. 

    If a Windows 2000 Professional computer is configured to obtain a DHCP address, but the DHCP server cannot be found, what does Windows 2000 do?

    • It will continue to look for a DHCP server. Meanwhile, network services will be unavailable.

    • It will renew the lease on the most recent network address it obtained from the DHCP server.

    • It will give up. The user must manually get a DHCP address once the DHCP server is available again.

    • Windows 2000 Professional will assign a private adress from the 169.254.0.0/24 network range.

    • Windows 2000 Professional will select a network address at random.

    Correct Answer
    A. Windows 2000 Professional will assign a private adress from the 169.254.0.0/24 network range.
    Explanation
    Windows 2000 Professional will assign a private adress from the 169.254.0.0/24 network range, however DNS, WINS, and a default gateway information are not assigned.

    Rate this question:

  • 16. 

    Two computers are connected together by a high speed connection within an office. What type of network does this situation describe?

    • A workgroup.

    • A domain.

    • A local area network.

    • A wide area network.

    • A storage area network.

    Correct Answer
    A. A local area network.
    Explanation
    The question describes a local area network.

    Rate this question:

  • 17. 

    Three different branch offices are connected by leased high speed data lines that run between the buildings. What type of network does this describe?

    • A workgroup.

    • A domain.

    • A local area network.

    • A wide area network.

    • A storage area network.

    Correct Answer
    A. A wide area network.
    Explanation
    The question describes a wide area network.

    Rate this question:

  • 18. 

    What is the advantage of clustering?

    • Clustering doubles the processing power of a set of computers.

    • Clustering avoids a single point of failure.

    • Clustering doubles the memory available to a process.

    • Clustering permits multitasking.

    • Clustering triples the processing power of a cluster.

    Correct Answer
    A. Clustering avoids a single point of failure.
    Explanation
    Clustering eliminates a single point of failure. If one computer fails, another clustered computer can take its place.

    Rate this question:

  • 19. 

    You are a network administrator and you have several tasks that you normally perform. How can you automate the execution of these tasks in Windows 2000?

    • Write a shell script and run it manually.

    • Run the Automate Task Wizard.

    • Use the Scheduled Tasks tool.

    • Create a script that runs each time time computer is booted.

    • Create a batch file.

    Correct Answer
    A. Use the Scheduled Tasks tool.
    Explanation
    The Scheduled Tasks tool will schedule any application to run at a particular time. Tasks can be scheduled to run once, or they can be run regularly.

    Rate this question:

  • 20. 

    In Windows 2000, how can you determine whether your computer belongs to a domain or a workgroup?

    • Right-click on My Computer and select Properties>System Properties>Network Identification

    • Right-click on My Computer and Select Properties>Domains

    • Right-click on My Computer>About This Computer

    • Right-click on My Computer>System Properties>Domains

    • Right-click on My Computer>System Properties>Workgroups

    Correct Answer
    A. Right-click on My Computer and select Properties>System Properties>Network Identification
    Explanation
    Right-click on My Computer and select Properties>System Properties>Network Identification. This will provide information about the computer, including whether it is part of a domain or workgroup.

    Rate this question:

  • 21. 

    You wish to control the performance of the microprocessor when a particular application is running under Windows 2000. How should you do this?

    • System Properties>Advanced>Environment Variables

    • System Properties>Advanced>Performance Options

    • System Properties>Advanced>Process Control

    • System Properties>Advanced>Speed and Performance

    • System Properties>Advanced>CPU Options

    Correct Answer
    A. System Properties>Advanced>Performance Options
    Explanation
    The Performance options, under the Advanced Tab of System Properties will allow you to control the behavior of the microprocessor.

    Rate this question:

  • 22. 

    Identify three advantages of using TCP/IP networks.

    • TCP/IP is an industry standard.

    • TCP/IP allows dissimilar operating systems to connect and communicate.

    • TCP/IP is designed for LAN communications.

    • TCP/IP scales well to accommodate both small and large networks.

    • TCP/IP is non-routable.

    Correct Answer(s)
    A. TCP/IP is an industry standard.
    A. TCP/IP allows dissimilar operating systems to connect and communicate.
    A. TCP/IP scales well to accommodate both small and large networks.
    Explanation
    TCP/IP is the industry standard for communication between networks and applications. TCP/IP is not proprietary, so it is used by many dissimilar operating systems and networks. TCP/IP can accommodate both small and large networks.

    Rate this question:

  • 23. 

    Which utility does Windows 2000 Professional provide to assist you with converting octal numbers to binary?

    • Calculator has a Scientific feature that will convert octal to binary.

    • Windows 2000 Professional does not provide any utilities, however several free utilities are available for download.

    • The Convert utility will convert octal to binary and vice versa.

    • The Octal utility will convert octal to binary, hexidecimal and decimal.

    • BaseConverter will convert a number in any base to a number in any other base.

    Correct Answer
    A. Calculator has a Scientific feature that will convert octal to binary.
    Explanation
    Calculator has a scientific feature that will permit conversion between octal and binary.

    Rate this question:

  • 24. 

    How much memory can Windows 2000 support?

    • 64 megabits.

    • 64 megabytes.

    • 64 gigabits.

    • 64 gigabytes.

    • 64 terabytes.

    Correct Answer
    A. 64 gigabytes.
    Explanation
    Windows 2000 can support 64 gigabytes of memory.

    Rate this question:

  • 25. 

    How can you monitor a dial-up connection in Windows 2000?

    • Use the Dial Up Networking Tool.

    • Select Modems in the Device Manager.

    • Use the Dial-up Monitor Tool in the Control Panel.

    • Use the Network and Dial-up Connections tool in the Control Panel.

    • Use the Network Connections Tool in the Control Panel.

    Correct Answer
    A. Use the Network and Dial-up Connections tool in the Control Panel.
    Explanation
    The Network and Dial-up Connections Tool in the Control Panel will allow you to monitor dial-up connections.

    Rate this question:

  • 26. 

    You administer a computer running a RAID 5 array. One portion of the array failed, and before you could restore the data, a second fault occurred. In this case, what must you do to retrieve the lost data?

    • Repair the faults in the order in which they occurred to restore the data.

    • Repair the second fault first, and then the first fault to retrieve the data.

    • You must restore the data from backup.

    • You need only repair the first fault, since the second fault was probably caused by the first.

    • You need only repair the most recent fault.

    Correct Answer
    A. You must restore the data from backup.
    Explanation
    If a second fault occurs before the first one can be addressed, you must restore the lost data from backup.

    Rate this question:

  • 27. 

    Identify three critical functions performed by the network administrator.

    • Monitoring network resources and events.

    • Maintaining system integrity.

    • Performing application upgrades.

    • Performing backups and restorations.

    • Installing middleware upgrades.

    Correct Answer(s)
    A. Monitoring network resources and events.
    A. Maintaining system integrity.
    A. Performing backups and restorations.
    Explanation
    Network administrators are usually responsible for monitoring the network; maintaining the integrity of the network by keeping it free of viruses and other security threats; and performing regular backups and restorations.

    Rate this question:

  • 28. 

    What type of network server can store large amounts of data in a central location and allow users to retrieve only the data they\'re interested in?

    • A file server.

    • A database server.

    • A storage area network.

    • A print server.

    • A local storage server.

    Correct Answer
    A. A database server.
    Explanation
    A database server allows users to retrieve information from a database without downloading the entire database.

    Rate this question:

  • 29. 

    How many addresses will a Class C network provide?

    • 16,777,216

    • 8,388,608

    • 65,536

    • 32,768

    • 256

    Correct Answer
    A. 256
    Explanation
    A Class C network address block will provide 256 IP addresses.

    Rate this question:

  • 30. 

    Which utility in Windows 2000 Professional would you use to view TCP/IP protocol session information?

    • Hostname

    • Ipconfig

    • Nbstat

    • Netstat

    • Ping

    Correct Answer
    A. Netstat
    Explanation
    The Netstat utility reports TCP/IP protocol session information.

    Rate this question:

  • 31. 

    Which statement about the Administrator account is true?

    • Administrators should use the administrator account for ordinary user tasks on a local computer.

    • The Administrator account on a computer running Windows 2000 Professional cannot be deleted or disabled.

    • The Administrator account on a computer running Windows 2000 Professional cannot be deleted but it may be disabled.

    • The only way to disable the Administrator account on a computer running Windows 2000 Professional is to delete it.

    • The Administrator account serves as the default for local user accounts on Windows 2000 Professional.

    Correct Answer
    A. The Administrator account on a computer running Windows 2000 Professional cannot be deleted or disabled.
    Explanation
    Windows 2000 requires an Administrator account to operate.Therefore, the Administrator Account on a computer running Windows 2000 Professional cannot be deleted or disabled.

    Rate this question:

  • 32. 

    You are the administrator of a Windows 2000 network with 8 workstations and one Windows 2000 server but your organization may do a large expansion sometime in the next year. Which licensing mode should you select for your Windows 2000 Server?

    • Per seat. Your expansion plans will be covered regardless of when they occur.

    • Per seat. It is much less expensive to pay on a per-seat basis.

    • Per server. You can change your licensing mode once from Per Server to Per Seat, but you cannot change from Per Seat to Per Server.

    • Per Seat. You can change your licensing mode once from Per Seat to Per Server but you cannot change from Per Server to Per Seat.

    • Neither. If you only have one Windows 2000 Server, you do not need Client Access Licenses.

    Correct Answer
    A. Per server. You can change your licensing mode once from Per Server to Per Seat, but you cannot change from Per Seat to Per Server.
    Explanation
    Per server. You can change your licensing mode once from Per Server to Per Seat, but you cannot change from Per Seat to Per Server.

    Rate this question:

  • 33. 

    Identify three requirements for user names in Windows 2000.

    • User names must be unique in Active Directory.

    • User names cannot exceed eight characters.

    • User names must contain both uppercase and lowecase characters.

    • User names must be alphanumeric.

    • User names cannot exceed 20 characters.

    Correct Answer(s)
    A. User names must be unique in Active Directory.
    A. User names must be alphanumeric.
    A. User names cannot exceed 20 characters.
    Explanation
    User names must be unique. Also, they cannot exceed 20 alphanumeric characters in length.

    Rate this question:

  • 34. 

    TCP/IP based communications use a four layer communications model to describe their operations. Identify the layer that is responsible for putting data on and taking data off the network.

    • The Internet Layer

    • The Presentation Layer

    • The Network Interface Layer

    • The Transport Layer

    • The Application Layer

    Correct Answer
    A. The Network Interface Layer
    Explanation
    The Network Interface Layer is responsible for moving traffic onto and off of the network. This layer includes standards for the physical connections needed for data transmission.

    Rate this question:

  • 35. 

    Which of the following two functions do Terminal Services enable?

    • Terminal services allow a user to run client applications from a server across the network.

    • A user can run an application from the command line.

    • A system administrator can administer the server remotely.

    • A system administrator can deploy a new version of the operating system remotely.

    • A system administrator can dynamically allocate memory to a network process.

    Correct Answer(s)
    A. Terminal services allow a user to run client applications from a server across the network.
    A. A system administrator can administer the server remotely.
    Explanation
    Terminal services allow a user to run an application from a server and allow the system administrator to administer a server remotely.

    Rate this question:

  • 36. 

    Identify three considerations when setting up a central location for users to store their home folders.

    • It will be your responsibility to provide backup and restore capabilities.

    • You must provide enough storage space on the central store.

    • Users will store very large files in a central store, whereas if they were required to keep files on their own disks, they would not save as much information.

    • You can reduce the size of the local hard drive if you use a central file store.

    • Network performance may change if you have many users attempting to access the central store at the same time.

    Correct Answer(s)
    A. It will be your responsibility to provide backup and restore capabilities.
    A. You must provide enough storage space on the central store.
    A. Network performance may change if you have many users attempting to access the central store at the same time.
    Explanation
    You must be able to backup and restore user files if you create a space for these on the network. Additionally, you must maintain enough disk space to hold user files. Finally, your network performanace may change, especially if you have many users on your network.

    Rate this question:

  • 37. 

    You have installed a new computer on your network. The Windows 2000 computers on the network do not have the new printer driver installed. What will happen when a Windows 2000 user tries to use the new printer?

    • Windows 2000 will download the proper driver when a client connects to the print server.

    • The Windows 2000 user will not be able to use the new printer until a driver is downloaded and installed.

    • The printer will not work.

    • The print server will redirect the print job to a printer for which the Windows 2000 computer has an installed driver.

    • The print server will use a generic print driver if the correct one cannot be found.

    Correct Answer
    A. Windows 2000 will download the proper driver when a client connects to the print server.
    Explanation
    Windows 2000 will automatically download the new driver when a client connects to the print server.

    Rate this question:

  • 38. 

    Which of the following two statements are true about the Backup Operators group in Windows 2000 Professional?

    • The Backup Operators group can backup and restore files, regardless of the permissions on the file.

    • The Backup Operators group is automatically created only on Windows 2000 Professional local computers.

    • The Backup Operators group can backup and restore files, only on files for which they have read and write permissions.

    • Backup Operators group members can alter the security settings of a computer running Windows 2000.

    • Backup Operators is a built in group on all computers running Windows 2000, whether or not they are domain controllers.

    Correct Answer(s)
    A. The Backup Operators group can backup and restore files, regardless of the permissions on the file.
    A. Backup Operators is a built in group on all computers running Windows 2000, whether or not they are domain controllers.
    Explanation
    The Backup Operators group is automatically created on all computers running Windows 2000 Professional. Backup Operators can back up and restore files regardless of the state of the permissions on the file.

    Rate this question:

  • 39. 

    You need to filter client requests to limit traffic to certain sites from your network. What is the best way to do this?

    • Use a proxy server.

    • Use a content filtering service.

    • Use a firewall.

    • Configure the router to drop packets to disallowed sites.

    • Install content filters on each workstation.

    Correct Answer
    A. Use a proxy server.
    Explanation
    A proxy server will allow you to control traffic on your network, and filter client requests.

    Rate this question:

  • 40. 

    In a Windows 2000 domain, who can share folders on a domain server?

    • The Administrators group members.

    • The Power Users group members

    • The Server Operators group members

    • The Administrators and Power Users group members

    • The Administrators and Server Operators group members.

    Correct Answer
    A. The Administrators and Server Operators group members.
    Explanation
    In a Windows 2000 domain, only the Administrators and Server Operators group members can share folders.

    Rate this question:

  • 41. 

    You wish to establish a new volume set on a Windows 2000 basic disk. What do you need to do to accomplish this?

    • You must create an extended partition to support a new volume set.

    • Using Disk Managent, extend the volume as needed.

    • Windows 2000 will not support new volume sets on basic disks.

    • Create simple volumes using Disk Management.

    • Create a striped volume using free space from two or more disks.

    Correct Answer
    A. Windows 2000 will not support new volume sets on basic disks.
    Explanation
    Windows 2000 will not support new volume sets on basic disks. You must upgrade to a dynamic disk for this setup.

    Rate this question:

  • 42. 

    What are the three major responsibilities of the network operating system?

    • Providing connectivity to networked devices.

    • Ensuring communication between devices

    • Running applications.

    • Providing equitable access for all users to shared network devices.

    • Providing access control for resources and information on the network.

    Correct Answer(s)
    A. Providing connectivity to networked devices.
    A. Ensuring communication between devices
    A. Providing access control for resources and information on the network.
    Explanation
    A network operating system ensures that communication between networked users takes place; provides physical and logical pathways to networked devices; and ensures that access to data and resources is properly granted or restricted.

    Rate this question:

  • 43. 

    Identify the software RAID types supported by Windows 2000

    • RAID 0

    • RAID 1

    • RAID 3

    • RAID 4

    • RAID 5

    Correct Answer(s)
    A. RAID 0
    A. RAID 1
    A. RAID 5
    Explanation
    Windows 2000 supports RAID 0, RAID 1, and RAID 5 software arrays.

    Rate this question:

  • 44. 

    You would like to check the frame type on your configuration of NWLink. What command will provide this information?

    • Ipconfig

    • Ipconfig -f

    • Ipxroute config

    • Iproute config

    • Ipconfig -frametype

    Correct Answer
    A. Ipxroute config
    Explanation
    ipxroute config will allow you to verify the frame type for NWLink.

    Rate this question:

  • 45. 

    Identify the two different group types in Active Directory.

    • User groups.

    • Security groups.

    • Power User groups.

    • Broadcast groups.

    • Distribution groups.

    Correct Answer(s)
    A. Security groups.
    A. Distribution groups.
    Explanation
    Security groups and distribution groups are the two group types in Active Directory.

    Rate this question:

  • 46. 

    You are attempting to make an application available for your network users. Using the Add/Remove Programs tool, you attempt to install the application on the Terminal server. This does not work. What should you do?

    • If any portion of the program files have installed, use the Add/Remove Programs tool to remove the application. Reinstall as before.

    • Log onto the Terminal server as the Administrator and use the change user /execute option.

    • Log onto the Terminal server as the Administrator and use the change user /install option.

    • Verify that the permissions are correct on the directory you\'ve tried to install the application into.

    • Make sure the application is installed into a directory that all users have access to.

    Correct Answer
    A. Log onto the Terminal server as the Administrator and use the change user /install option.
    Explanation
    You should first try the Add/Remove Programs option. If this does not work, log onto the Terminal server as the Administrator and use the change user /install option. After installation, use the change user /execute option to return the system to execute mode.

    Rate this question:

  • 47. 

    Which version of Windows 2000 is ideal for online transaction processing?

    • Windows 2000 Datacenter Server.

    • Windows 2000 Advanced Server.

    • Windows 2000 Professional.

    • Windows XP Professional.

    • Windows 2000 E-Commerce Server.

    Correct Answer
    A. Windows 2000 Datacenter Server.
    Explanation
    Windows 2000 Datacenter Server is designed to process large volumes of online transactions.

    Rate this question:

  • 48. 

    Identify three of the functions of the Performance Logs and Alerts utility in Windows 2000.

    • Collect performance information and compare it with performance information from other computers.

    • Collect and archive performance data.

    • Set sampling intervals for hardware and system resources.

    • Create reusable monitoring configurations for networked computers.

    • Configure notifications to alert the system administrator of certain operating conditions.

    Correct Answer(s)
    A. Collect and archive performance data.
    A. Set sampling intervals for hardware and system resources.
    A. Configure notifications to alert the system administrator of certain operating conditions.
    Explanation
    Performance Logs and Alerts will allow performance data to be collected and archived; will permit the configuration of the sampling interval for data collection; and will permit the configuration of notification messages when certain limits or thresholds have been reached.

    Rate this question:

  • 49. 

    Identify the two types of files are used to automate a Windows 2000 installation.

    • Settings files.

    • Answer files.

    • Response files.

    • Uniqueness Database Files.

    • Domain Configuration files.

    Correct Answer(s)
    A. Answer files.
    A. Uniqueness Database Files.
    Explanation
    Windows 2000 uses Answer files and Uniqueness Database Files (UDF)

    Rate this question:

Quiz Review Timeline (Updated): Mar 19, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 27, 2006
    Quiz Created by
    Eileen
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.