1. [单选题]Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named Share
A. You want to respond to the user's problem as quickly as possible by using an administrative tool.
B. What should you do?
C. Use Windows Explorer to display the file paths of your shared folders.
D. Use Storage in Computer Management to view logical drive properties.
E. Use Event Viewer in Computer Management to search for shared folder error messages.
F. Use System Tools in Computer Management to display the file paths of your shared folders.
2. [多选题]You are the administrator of a SQL Server 2000 computer. The server contains a Data Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package.You want to ensure that connection properties, such as login names and passwords, cannot be read or modified by users. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A. Save the DTS package so that it has an owner password.
B. Save the DTS package so that it has a user password.
C. Encrypt the DTS package details in the command line of the dtsrun utility.
D. Store the DTS package in the Meta. Data Services repository.
E. Store the DTS package as a Microsoft Visual Basic file.
3. [多选题]You are the administrator of a new multiprocessor SQL Server 2000 computer. You are migrating data from other database management systems to this server. You need to load data from two data files into a new table on the server. The table is empty and has no indexes.You want to complete the data load as quickly as possible. What should you do? (Each correct answer represents part of the solution. Choose all that apply.)
A. Apply a bulk update lock to the table.
B. Use separate client connections to load the files into the table simultaneously.
C. Create a clustered index on the table.
D. Specify the Full Recovery model for the database.
E. Specify the Bulk-Logged Recovery model for the database.