1. [单选题]You copy the contents of the Windows 2000 Professional CD to a shared network folder named \\Server1\Win2000p. You use the shared folder to perform. over-the-network installations of Windows 2000 Professional on new computers purchased by your company.You receive a Windows 2000 Service Pack CD. You apply the Service Pack to Server1 and to the \\Server1\Win2000p folder.
A. You discover that the Service Pack contains several files that are incompatible with the new computers.
B. You want to make sure that the Service Pack files are not installed on any new computers until the problem has been corrected. What can you do?
C. Use Update.exe from the Service Pack CD on server1.
D. Select the Uninstall option.
E. Copy the contents of the Windows 2000 Professional CD to \\Server1\Win2000p again, allowing the operating system to overwrite newer files while copying.
F. Run\\Server1\Win2000p\WinNT32.exe/uon the new computer.
G. RunUpdate.exe/s:\\Server1\Win2000p/ufrom the Service Pack CD on Server1.
2. [多选题]You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.
A. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)
B. Enable the Always read properties from UDL file option in the Connection Properties dialog box.
C. Disable the Always read properties from UDL file option in the Connection Properties dialog box.
D. Delete the .udl files and store connection details in the registry by using system data source names.
E. Delete the .udl files, and store connection details in the registry by using user data source names.
F. Make the .udl files available on a network share.
3. [多选题]You are the administrator of a SQL Server 2000 computer. The server contains a Data Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package.You want to ensure that connection properties, such as login names and passwords, cannot be read or modified by users. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A. Save the DTS package so that it has an owner password.
B. Save the DTS package so that it has a user password.
C. Encrypt the DTS package details in the command line of the dtsrun utility.
D. Store the DTS package in the Meta. Data Services repository.
E. Store the DTS package as a Microsoft Visual Basic file.
4. [单选题]You are the administrator of Ezonexam.com's Windows 2000 network.Your computer is configured to use both Windows 2000 Professional and Windows NT Workstation 4.0 Service Pack 3. Your computer has three hard disks: Disk 0, Disk1, and Disk2. Windows NT Workstation 4.0 is installed on Disk 0. Windows 2000 Professional is installed on Disk1. You want to store your project files on Disk2. You configure Disk2 as a basic volume and format the volume as NTFS in Windows 2000 Professional. You then start Windows NT Workstation 4.0. You find that you cannot access your project files.
A. You want to be able to access your project files when using either of the operating systems.
B. What should you do?
C. Upgrade Windows NT Workstation 4.0 to Service Pack 4 or later.
D. Configure Disk 2 as a dynamic volume then format as an NTFS partition.
E. Configure Disk 2 to use Encrypting File System (EFS).
F. Configure Disk 2 as a basic volume and format the volume as FAT32.
5. [单选题]You are the administrator of a SQL Server 2000 computer. The server contains a database that stores financial data. You want to use Data Transformation Services packages to import numeric data from other SQL server computers. The precision and scale values of this data are not defined consistently on the other servers.You want to prevent any loss of data during the import operations. What should you do?
A. Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the source tables. Change the data types so that they will use the lowest precision and scale values of the data that will be transferred.
B. Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the destination tables. Change the data types to reflect the highest precision and scale values involved in data transfer.
C. Set a flag on each DTS transformation to require an exact match between source and destination columns.
D. Set the maximum error count for each DTS transformation task equal to the number of rows of data you are importing. Use an exception file to store any rows of data that generate errors.
E. Write Microsoft ActiveX script. for each DTS transformation. Use the script. to recast data types to the destinations precision and scale values.
6. [单选题]You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.Your company has two domains cohovineyard.com and westcoastsales.com.
A. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0
B. You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.
C. What should you do?
D. Add cohovineyard.com to the Domain Suffix Search Order on the computers.
E. Add westcoastsales.com to the Domain Suffix Search Order on the computers.
F. Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.
G. Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
7. [单选题]You are the administrator of a 12 SQL Server 2000 computers. These servers are located in company offices throughout the world.You configure a multiserver job on the server in your company's New York City office. You configure this server as a master server, and designate the remaining 11 servers as target servers.
A. After the job completes successfully, you decide to set up a new SQL Server 2000 computer as the master server. The new server will be named JobMaster and the other 12 servers will be target servers.
B. You need to make the New York City server a target server instead of a master server. What should you do?
C. On the New York City server, defect all 11 target servers. On the JobMaster server, enlist the 12 servers as target servers.
D. On the JobMaster server, enlist all other servers as target servers.
E. On the New York City server enlist the JobMaster server as a target server. Transfer the multiserver jobs from the New York City server to the JobMaster server.
F. On the JobMaster server, enlist the New York City server as a target server. On the JobMaster server, enlist the other 11 servers as target servers. On the JobMaster server, defect the New York City server.
8. [单选题]Ezonexam has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each office has a network of between five and 20 client computers. The office networks are connected to each other. The company is buying 50 identical computers to run Windows 2000 Server in these offices. The server must be installed to the company's standard configuration. You use Setup Manager to create a network shared distribution folder and a Unattend.txt file that specifies the company's standard configuration.You want to automate the installation process as much as possible, in the least possible amount of time.
A. What should you do?
B. Run Makebt32.exe to create four installation startup disks and add the Unattend.txt file to the first disk. Instruct an employee at each office to start the installation by using these disks.
C. Create a Microsoft MS-DOS network boot disk that makes a connection to the network shared distribution folder and runs the winnt command with the /s and /u switches. Instruct an employee at each office to start the installation by using this disk.
D. Create a floppy disk that contains only the Unattend.txt file. Instruct an employee at each office to start the installation by using the Windows 2000 Server compact disc, with the floppy disk inserted.
E. Create a Windows 2000 folder on a hard disk. Copy the Windows 2000 Server compact disc to the folder. Add the Unattend.txt file to the folder. Copy the folder to a writeable C Instruct an employee at each office to start the installation by suing this C
9. [多选题]You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users' files.What should you do to accomplish these goals? (Choose all that apply)
A. Add Maria's user account to the System group.
B. Add Maria's user account to the Interactive group.
C. Add Maria's user account to the Power Users group.
D. Add Maria's user account to the Administrators group.
E. Add Maria's user account to the Backup Operators group.
10. [单选题]You are the network administrator for Ezonexam. You are planning to upgrade 35 Windows NT Server 4.0 computers to Windows 2000 Server. You want to accomplish the upgrades by using a distribution server. The Windows NT Server 4.0 computers support a tight production schedule that requires them to be online from 8:00
A. M. to midnight, seven days a week. You schedule the upgrade to run during non-business hours. Because of the limited amount of time the upgrades must be performed as quickly as possible.You want to complete the upgrades before production begins in the morning.
B. What should you do?
C. Perform. an unattended installation by running the winnt32 command and the /cmdcons switch.
D. Perform. an unattended installation by running the winnt32 command and specify the use of a .txt file and a uniqueness database file.
E. Perform. an unattended installation by running the winnt command and specify the use of a .txt file and a uniqueness database file.
F. Perform. an unattended installation by using a Winnt.sif file with a commands section that initiates the Update.exe command in quiet mode.