[RESOLVED] 70-240: LETS DO THIS!!
Results 1 to 15 of 15

Thread: [RESOLVED] 70-240: LETS DO THIS!!

Hybrid View

  1. #1
    70-240
    Guest

    Question 70-240: LETS DO THIS!!

    Hi everyone. Just like you, I am studying for my 70-240 test. I would like to study with you. I have some test questions I would like to go over with you. Every day I will post questions to the board and expect that you will come up with the correct answer. I will do this as long as this board gets traffic. We need to stick together for we have but a short time. Thank you all and lets start.
    2000 pro
    1.) 1. You use a Window 2000 Professional computer to run a weekly Accounts Payable (A/P) report named AP_Financial_Reports. You also use the computer to run a task named PERF_LOGS to connect to network routers and retrieve their performance logs.

    When the A/P report is running on the computer, the PERF_LOGS task stops responding and eventually times out. When you run the only PERF_LOGS task, the task completes successfully.

    You use Task Manager to view your system resources as shown in the exhibit (click the exhibit button)

    You want to resolve the performance log timeout problem by using Task Manager. What should you do?

    A. Decrease the base priority of the AP_Financial_Reports task.
    B. Decrease the number of threads available for the AP_Financial_Reports task.
    C. Increase the base priority of the Perf_Logs task.
    D. Increase the number of threads available for the Perf_Logs task.

    Exhibit: Windows Task Manager

    Apps Processes Performance

    ImageName/ PID/ CPU/ MEMUsage/ PeakMemUsage/ VMSize/ BasePri/ Thread

    AP_Financial_Reports 1296 96 1,600k 1,600k 524 Realtime 10
    Per_Logs.exe 668 00 1,640k 1,640k 524 Normal 1


    2. You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computer.

    To accommodate new users, you add two new user accounts named USER7 and USER8 to the computer. When USER7 attempts to log on to the computer, she receives the following error message. “Windows cannot copy file c:\documents and settings\default user to location c:\documents and settings\user7. Contact your network administrator. Detail-access is denied.” When USER8 attempts to log on to the computer, he receives the same type of error message.

    You want to allow the two new users, as well as other users in the sales department, to be able to log on to the computer.

    Which two methods can you use to accomplish your goal? (Choose two)

    A. Add the USER7 and USER8 user accounts to the DACL for the profiles shared folder on the network server.
    B. Add the USER7 and USER8 user accounts to the DACL for the c:\documents and settings\default user folder.
    C. Add the Everyone group to the DACL for the c:\documents and settings/default user folder.
    D. Add a Group Policy Object (GPO) for the Sales OU that redirects user profiles to a shared folder.
    E. Log on by using the local administrator account and create new folders for USER7 and USER8 in the c:\documents and settings folder.
    F. Select the “Allow Inheritable Permissions From Parent To Propagate To This Object” option on the c:\documents and settings\default user folder, and reset the permissions on all child objects.

    2.)3. You are the administrator of your company’s network. A user named peter requests assistance with his Windows 2000 Professional portable computer.

    Peter is preparing for extensive air travel and wants to optimize the battery life for his portable computer. You want to configure Peter’s computer to save the contents of memory to the hard disk and then to shut down when Peter presses the sleep button.

    What should you do?

    A. Configure the power settings to use the standby option.
    B. Configure the power settings to use the power off option.
    C. Configure the power settings to use the hibernation option.
    D. Configure the computer to use the always on power scheme.
    E. Configure the computer to use the portable/laptop on power scheme.

    3.) 4. You want to use Windows backup to perform a weekly backup of the user data on your Windows 2000 Professional computer. You want to ensure that your registry, boot files, and COM+ objects are backed up.

    What should you do?

    A. Configure Windows Backup to back up the system partition.
    B. Configure Windows Backup to back up the System State data.
    C. Create a script written in the Microsoft visual basic, scripting edition (vbscript) language to run rdisk.exe /s before the backup starts.
    D. Create a batch file to run rdisk.exe /s- before the backup starts.

    ok is that enough for today?
    thanks class.

  2. #2
    Ya_know
    Guest

    Post

    First of all, I am pleased by your presance, i just wish the reseption was less poignant.

    Anyway, I am going to play along...

    Question 1. A. Decrease the base priority of the AP_Financial_Reports task.

    Question 2. A. Add the USER7 and USER8 user accounts to the DACL for the profiles shared folder on the network server. and
    D. Add a Group Policy Object (GPO) for the Sales OU that redirects user profiles to a shared folder.

    Question 3. C. Configure the power settings to use the hibernation option.

    Question 4. D. Create a batch file to run rdisk.exe /s- before the backup starts.

    I am guessing on some of these, so I was hoping you could explain the answers for all of them when you divulge...

  3. #3
    70-240
    Guest

    Post

    great job!

    all were correct exept 4. the answer is d. here are some more questions for today.

    5 You want to install Windows 2000 Professional on 30 PXE-compliant computers and 35 non PXE-compliant computers. All 65 computers are included on the current hardware compatibility list (HCL).

    You create a RIS image. You load the image onto the RIS server. You then start the 65 computers

    You find that the 30 PXE-compliant computers can connect to the RIS server. However, the 35 non-PXE compliant computers cannot connect to the RIS server. You want to enable the non-PXE compliant computers to connect to the RIS server.

    What should you do?

    A. Run RBFG.exe to create a non-PXE compliant startup disk
    B. Run RIPrep.exe to create a non-PXE compliant startup disk
    C. Grant the Everyone group NTFS read permission for the RIS image
    D. Grant the Administrators Group NTFS read permission for the RIS image

    6 You are the administrator of your company’s network. The dial-up server on your network is configured to support certificate authentication.
    A user named Tom wants to use Smart Card Authentication on his Windows 2000 Professional portable computer. You verify that Tom’s computer has a PC Card Smart Card reader and the appropriate drivers installed. You give Tom a Smart Card to use.

    What else should you do to enable Smart Card Authentication on Tom’s computer?

    A. Configure a dialup connection to use EAP.
    Select the Smart Card device for authentication.
    B. Configure a dialup connection to use SPAP.
    Select the Smart Card device for authentication.
    C. Configure a dialup connection to use certificate authentication.
    Enable the user credentials for authentication.
    D. Configure a dialup connection to connect to a private network through the Internet. Enable L2TP to create a virtual private network (VPN) tunnel.

    1. You use a Window 2000 Professional computer to run a weekly Accounts Payable (A/P) report named AP_Financial_Reports. You also use the computer to run a task named PERF_LOGS to connect to network routers and retrieve their performance logs.

    When the A/P report is running on the computer, the PERF_LOGS task stops responding and eventually times out. When you run the only PERF_LOGS task, the task completes successfully.

    You use Task Manager to view your system resources as shown in the exhibit (click the exhibit button)

    You want to resolve the performance log timeout problem by using Task Manager. What should you do?

    A. Decrease the base priority of the AP_Financial_Reports task.
    B. Decrease the number of threads available for the AP_Financial_Reports task.
    C. Increase the base priority of the Perf_Logs task.
    D. Increase the number of threads available for the Perf_Logs task.

    Exhibit: Windows Task Manager

    Apps Processes Performance

    ImageName/ PID/ CPU/ MEMUsage/ PeakMemUsage/ VMSize/ BasePri/ Thread

    AP_Financial_Reports 1296 96 1,600k 1,600k 524 Realtime 10
    Per_Logs.exe 668 00 1,640k 1,640k 524 Normal 1


    2. You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computer.

    To accommodate new users, you add two new user accounts named USER7 and USER8 to the computer. When USER7 attempts to log on to the computer, she receives the following error message. “Windows cannot copy file c:\documents and settings\default user to location c:\documents and settings\user7. Contact your network administrator. Detail-access is denied.” When USER8 attempts to log on to the computer, he receives the same type of error message.

    You want to allow the two new users, as well as other users in the sales department, to be able to log on to the computer.

    Which two methods can you use to accomplish your goal? (Choose two)

    A. Add the USER7 and USER8 user accounts to the DACL for the profiles shared folder on the network server.
    B. Add the USER7 and USER8 user accounts to the DACL for the c:\documents and settings\default user folder.
    C. Add the Everyone group to the DACL for the c:\documents and settings/default user folder.
    D. Add a Group Policy Object (GPO) for the Sales OU that redirects user profiles to a shared folder.
    E. Log on by using the local administrator account and create new folders for USER7 and USER8 in the c:\documents and settings folder.
    F. Select the “Allow Inheritable Permissions From Parent To Propagate To This Object” option on the c:\documents and settings\default user folder, and reset the permissions on all child objects.


    3. You are the administrator of your company’s network. A user named peter requests assistance with his Windows 2000 Professional portable computer.

    Peter is preparing for extensive air travel and wants to optimize the battery life for his portable computer. You want to configure Peter’s computer to save the contents of memory to the hard disk and then to shut down when Peter presses the sleep button.

    What should you do?

    A. Configure the power settings to use the standby option.
    B. Configure the power settings to use the power off option.
    C. Configure the power settings to use the hibernation option.
    D. Configure the computer to use the always on power scheme.
    E. Configure the computer to use the portable/laptop on power scheme.

    4. You want to use Windows backup to perform a weekly backup of the user data on your Windows 2000 Professional computer. You want to ensure that your registry, boot files, and COM+ objects are backed up.

    What should you do?

    A. Configure Windows Backup to back up the system partition.
    B. Configure Windows Backup to back up the System State data.
    C. Create a script written in the Microsoft visual basic, scripting edition (vbscript) language to run rdisk.exe /s before the backup starts.
    D. Create a batch file to run rdisk.exe /s- before the backup starts.

    5 You want to install Windows 2000 Professional on 30 PXE-compliant computers and 35 non PXE-compliant computers. All 65 computers are included on the current hardware compatibility list (HCL).

    You create a RIS image. You load the image onto the RIS server. You then start the 65 computers

    You find that the 30 PXE-compliant computers can connect to the RIS server. However, the 35 non-PXE compliant computers cannot connect to the RIS server. You want to enable the non-PXE compliant computers to connect to the RIS server.

    What should you do?

    A. Run RBFG.exe to create a non-PXE compliant startup disk
    B. Run RIPrep.exe to create a non-PXE compliant startup disk
    C. Grant the Everyone group NTFS read permission for the RIS image
    D. Grant the Administrators Group NTFS read permission for the RIS image

    6 You are the administrator of your company’s network. The dial-up server on your network is configured to support certificate authentication.
    A user named Tom wants to use Smart Card Authentication on his Windows 2000 Professional portable computer. You verify that Tom’s computer has a PC Card Smart Card reader and the appropriate drivers installed. You give Tom a Smart Card to use.

    What else should you do to enable Smart Card Authentication on Tom’s computer?

    A. Configure a dialup connection to use EAP.
    Select the Smart Card device for authentication.
    B. Configure a dialup connection to use SPAP.
    Select the Smart Card device for authentication.
    C. Configure a dialup connection to use certificate authentication.
    Enable the user credentials for authentication.
    D. Configure a dialup connection to connect to a private network through the Internet. Enable L2TP to create a virtual private network (VPN) tunnel.


    7 Your routed TCP/IP network consists of 10 Windows 2000 server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol.

    You are installing 10 new 2000 Professional computers. You want to enable the new computers to use NETBios names to connect to all shared resources on the network. You configure a TCP/IP address and a subnet mask on each new computer.

    Which two additional TCP/IP properties should you configure on each new computer? (Choose two)

    A. The Bindings
    B. A DNS address
    C. A Gateway address
    D. A WINS Server address
    E. A DHCP Server address

    8 You are the administrator of your company’s network. Your network consists of 20 Windows 2000 Professional computers. You want to configure all of the computers to allow access to the internet.

    Your budget does not allow for installing a permanent Internet connection for the network. You do have a single dialup account at a local Internet service provider (ISP) and a 56-kbps modem. You want the computers to be able to access the Internet when web resources are requested.

    What should you do? (Choose all that apply)

    A. Configure the shared modem to use software handshaking.
    B. Configure the dialup connection to enable on-demand dialing.
    C. Configure the dialup connection to enable Internet connection sharing.
    D. Configure all of the other computers to have a dialup connection that uses the shared mode.
    E. Attach the modem to one of the Windows 2000 Professional computers, and create a dialup connection to the ISP.
    F. Attach the modem to one of the Windows 2000 Professional computers, and share the modem on the network.

    9 A user named Tom reports that applications on his Windows 2000 Professional computer are running slowly. You notice that Tom’s computer has 64MB of RAM and 100MB of free disk space.

    Which methods can you use to improve performance? (Chose all that apply)

    A. Add Tom to the Power Users group.
    B. Set the total paging file to 75 percent of physical memory.
    C. Perform a disk analysis, and use the disk defragmenter if recommended.
    D. Use Disk Cleanup to delete temporary files and unnecessary program files.
    E. Ensure that the performance options window is optimized for background services.


    10 You install window 2000 Professional on a computer named Client2. The computer is configured to have a TCP/IP address of 10.10.167.4 and a Default Gateway of 10.10.167.1. The network is configured as shown in the network configuration exhibit.

    You want to connect to a shared folder on the server. When you attempt to connect to the network share, you receive the following error message: “The network location could not be reached” you run IPconfig to review the configuration as shown in the IP configuration exhibit.

    You want to allow Client2 to connect to server. What should you do?

    A. Place Client2 on the same segment as server.
    B. Place a computer running the WINS Proxy service on the same segment as Client2.
    C. Configure Client2 to use a Default Gateway of 10/10/13/1.
    D. Configure Client2 to use a DNS Server address of 10.10.13.24.
    E. Configure Client2 to use a WINS Server address of 10.10.13.14.

    IP configuration exhibit
    IPconfig /all
    Windows 2000 IP configuration
    Host name=client2
    Node type=hybrid
    IP routing enabled=no
    WINS proxy enabled=no
    DNS suffix search list= blank
    Ethernet adapter local area connection:
    Connection-specific DNS suffix=blank
    Description=Compaq integrated netflex-3/p control
    Ller 2.3
    Physical address=0008c7c313c4
    DHCP enabled=yes
    Auto configuration enabled=yes
    IP address=10.10.167.4
    Subnet mask=255.255.252.0
    Default gateway=10.10.167.1
    DHCP server=10.10.13.20
    Primary WINS server=10.10.13.20
    Secondary WINS server=10.20.13.20
    Lease obtained=Monday August 2, 1999 8:41
    Lease expires=Thursday, August 12, 1999 8:41

    Network configuration exhibit




    12 You want to upgrade 100 computers from Windows 98 to Windows 2000 Professional. You use setup manager to create the unattend.txt file. The hardware on each computer is configured identically.

    You upgrade 10 of the computers. You notice that the monitors on the 10 computers go blank after Windows 2000 Professional loads. You restart one of the computers in safe mode, and find that the monitor appears to be working.

    Which change should you make to unattend.txt to configure your video settings correctly?

    To answer, click the appropriate line on the unattend.txt-notepad screen.

    Unattend.txt-notepage
    ;setupmgrtag
    (unattended)
    Unattendmode=fullunattended
    Oemrpreinstall=no
    Targetpath=c:\win98
    (guiunattended)
    Adminpassword=*
    Autologon=no
    Timezone=4
    (userdata)
    Product id=111111-111111-111111-111111
    Fullname-contoso
    Orgname=contoso
    Computername=*
    (display)
    Bitsperpel=8
    Xresolution=640
    Yresolution=480
    Vrefresh=150
    (massstoragedrivers)
    OEM
    (oemboodfiles)
    (OEM_ads)
    (setupmgr)

    13 You are the administrator of a Windows 2000 network. You replace the uniprocessor computers in the graphics department with 25 new MPS-compliant computers. Each computer has two 550Mhz processors.

    You install the software that users need to perform their work. The software includes Win32-, Win16-, and Dos-based applications.

    Users report that when they use the Win16-based application, they do not notice an improvement in performance compared to using the uniprocessor computers. You want the users in the graphics department to be able to see a noticeable improvement in performance.

    What should you do?

    A. Use Device Manager to install the MPS-compliant drivers for the second processor.
    B. Use Device Manager to install the ACPI-compliant drivers for the second processor.
    C. Run the Win16-based application in a separate memory page.
    D. Replace the Win16-based applications with available Win32-based applications.



    14 You are the administrator of your company’s network. Your network has 20 Windows 2000 Server computers in the Contoso.com domain. Your network also has 250 Windows 98 computers.

    You want to perform a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE compliant.

    You want to accomplish the following goals:

    An unattended installation of Windows 2000 Professional will be performed.

    An unattended installation of company-standard applications will be performed during the installation of Windows 2000 Professional.

    Each computer will be assigned a unique SID.

    The unattended installation script will be modified so that the computers automatically join the Contoso.com domain.

    You take the following actions:

    Install Windows 2000 Professional on a Windows 98 computer named Computer1.

    Install and configure company-standard applications on Computer1.

    Use Setup Manager on Computer1 to create an unattended.txt file based on the current configuration, including domain membership.

    Start the remaining Windows 98 computers, and then install Windows 2000 Professional. Use the unattend.txt file to provide the settings for the installation.

    Which result or results do these actions produce? (Choose all that apply.)

    A. An unattended installation of Windows 2000 Professional will be performed.
    B. An unattended installation of company-standard applications will be performed during the installation of Windows 2000 Professional.
    C. Each computer will be assigned a unique SID.
    D. The unattended installation script will be modified so that the computers automatically join the Contoso.com domain.

    15 You are the administrator of your company’s network. You install 20 new Windows 2000 Professional computers in the Sales department. Two weeks later, users report that five of the computers have stopped responding.

    You troubleshoot the five computers. You find that the users have attached USB devices and have installed device drivers that are not supported by the Windows 2000 Professional.

    You want to ensure that this does not happen again. You decide to configure the computers to install device drivers only for devices that are included on the current HCL.

    What should you do?

    A. Use NTFS permissions to restrict user access to the \WINNT\Driver cache folder.
    B. Use NTFS permissions to restrict user access to the \WINNT\System32\Drivers folder.
    C. Configure Windows 2000 Professional to enable driver signing verification.
    D. Configure Windows 2000 Professional to trust the Microsoft certificate authority (CA).


    16 You are the administrator of your company’s network. A user named Michael has limited dexterity, which prevents him from using the standard keyboard to complete his daily computing tasks. You want to configure his Windows 2000 Professional computer to use the appropriate accessibility options.

    You log on to Michael’s computer by using Michael’s user account, which is a member of the Local Users group. You configure the Stickykeys, Filterkeys, and Togglekeys options. You then log off.

    Michael logs on to the computer by using his user account. Michael is able to use the accessibility options that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off.

    What should you do?

    A. Use Accessibility options in Control Panel to reconfigure the accessibility idle time setting.
    B. Use Accessibility options in Control Panel to enable filterkeys option to reconfigure the time setting.
    C. Use Utility Manager to configure the Accessibility options to start automatically when Windows 2000 Professional loads.
    D. Use Utility Manager to increase the accessibility idle time setting for Michael’s accessibility options, and save the settings.

    17 You are configuring five computers to use both Windows NT workstation 4.0 and Windows 2000 Professional. Each computer has an 8GB hard disk.

    You configure the hard disk on each computer to have two 4GB partitions. Windows NT workstation is installed on drive C. Windows 2000 Professional is installed on drive D.

    In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart the computers and load Windows NT workstation. You notice that users can still save files to drive D.

    You want to prevent users from saving files to drive D in either OS. You also want to ensure that users can access both drives while using either OS.

    What should you do on each computer?

    A. Use Windows 2000 Professional to configure drive D as a dynamic partition.
    B. Use Windows 2000 Professional to enable EFS on drive D.
    C. Use Windows NT workstation to configure NTFS permissions on drive D to deny the users write permission.
    D. Reinstall Windows NT workstation after configuring the disk quotas.

    18 You use Windows Backup to back up the files on your Windows 2000 Professional computer. Your computer is configured to perform a daily backup of your files on drive D.

    On Thursday morning, drive D on your computer fails. You replace the failed hard disk with a new hard disk. You want to restore your files on drive D to the new hard disk. You view your backup log as shown in the exhibit.

    In which order should you restore your data?

    A. Friday, Wednesday. Files will be current as of Wednesday night.
    B. Friday, Thursday. Files will be current as of Thursday morning.
    C. Friday, Saturday, Sunday, Monday. Files cannot be restored after this time.
    D. Friday, Saturday, Sunday, Monday, Tuesday, Wednesday. Files will be current as of Wednesday night.

    Exhibit:

    Friday Saturday Sunday Monday Tuesday Wednesday
    D: D: D: D: D: D:
    Normal Incremental Incremental Incremental Incremental Incremental
    9/8/1999 9/9/1999 9/10/1999 9/11/1999 9/12/1999 9/13/1999
    11pm 11pm 11pm 11pm 11pm 11pm

    19 You are the administrator of your company’s network. You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the Marketing segment of your network. The new computers do not have OS’s installed.

    You create a RIS image. You load the image onto the RIS server. You then start the new computers.

    You find that the new computers cannot connect to the RIS server. You verify that existing client computers on the network can connect to network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.

    What should you do?

    To answer, click the select and place button, and then drag the appropriate server to the “place server here” box on the network.

    Exhibit:




    20 You are the administrator of your company’s network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network.

    You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled basis.

    What should you do?

    A. Use the at command to schedule a weekly job to back up the boot partition.
    B. Use the at command to schedule a weekly job to run the system file checker.
    C. Use Windows Backup to schedule a backup of the System State data.
    D. Use Windows Backup to schedule a backup of the system partition and the boot partition


    21 You are delegated administrative control of the Graphics OU. You install Windows 2000 Professional on 25 PXE-compliant computers in the Graphics OU by using disk-duplicating software. The reference computer was configured to have Windows 2000 Professional default desktop settings.

    Users in the Graphics OU have Home folders specified in their user account settings. The Home folders are located on the \\server1\users network share. You want to change the default path of the users’ My Documents folders to their respective Home folders whenever users log on to the network. You want to accomplish this with the least amount of administrative effort.

    What should you do?

    A. In the properties of the My Documents folder, select move, and define the UNC path \\server1\users
    B. Reconfigure each domain user account properties on the profile tab, and define the UNC path \\server1\users.
    C. Enable a local computer policy to redirect the My Documents folder, and define the UNC path \\server1\users\%username%
    D. Create a GPO for the Graphics OU to redirect the My Documents folder, and define the UNC path \\server1\users\%username%

    22 You want to configure your Windows 2000 Professional computer to support two monitors. Your computer is configured to use 16-bit color, 1024x768 resolution, and an optimal refresh rate.

    You physically install two identical PNP PCI video adapters and their appropriate drivers. The video adapters are included on the current HCL.

    You start the computer. After Windows 2000 Professional loads, you notice that the secondary monitor does not display an image.

    What should you do?

    A. Move the video adapters to different PCI slots so that the primary video adapter is in slot 0.
    B. Use the hardware troubleshooter to update the video adapter drivers for the secondary video adapter.
    C. Run DXDIAG.exe to configure the video adapters. Configure the secondary video adapter to use the optimal refresh rate.
    D. Change the resolution of the primary video adapter to 640x480, and use the default refresh settings for
    the primary video adapter.



  4. #4
    Registered User
    Join Date
    Nov 2006
    Posts
    1
    Quote Originally Posted by 70-240

    12 You want to upgrade 100 computers from Windows 98 to Windows 2000 Professional. You use setup manager to create the unattend.txt file. The hardware on each computer is configured identically.

    You upgrade 10 of the computers. You notice that the monitors on the 10 computers go blank after Windows 2000 Professional loads. You restart one of the computers in safe mode, and find that the monitor appears to be working.

    Which change should you make to unattend.txt to configure your video settings correctly?

    To answer, click the appropriate line on the unattend.txt-notepad screen.

    Unattend.txt-notepage
    ;setupmgrtag
    (unattended)
    Unattendmode=fullunattended
    Oemrpreinstall=no
    Targetpath=c:\win98
    (guiunattended)
    Adminpassword=*
    Autologon=no
    Timezone=4
    (userdata)
    Product id=111111-111111-111111-111111
    Fullname-contoso
    Orgname=contoso
    Computername=*
    (display)
    Bitsperpel=8
    Xresolution=640
    Yresolution=480
    Vrefresh=150
    (massstoragedrivers)
    OEM
    (oemboodfiles)
    (OEM_ads)
    (setupmgr)
    does it really have to be 150?
    is the 150 constant?
    what happens if i changed it to.. lets say.. 120..
    what will happen?

  5. #5
    Ya_know
    Guest

    Post

    I did answer D for # 4. Are you pullin' my chain?

    Anyway, I printed out the list (damn that is allot of questions). I will post my answers when I get done with them...

  6. #6
    Ya_know
    Guest

    Post


    Man, some of these were tough. I think I did alright though...break it to me gently.

    Question 1. A. Decrease the base priority of the AP_Financial_Reports task.

    Question 2. A. Add the USER7 and USER8 user accounts to the DACL for the profiles shared folder on the network server. and
    D. Add a Group Policy Object (GPO) for the Sales OU that redirects user profiles to a shared folder.

    Question 3. C. Configure the power settings to use the hibernation option.

    Question 4. D. Create a batch file to run rdisk.exe /s- before the backup starts.

    Question 5. A. Run RBFG.exe to create a non-PXE compliant startup disk

    Question 6. C. Configure a dialup connection to use certificate authentication.
    Enable the user credentials for authentication.

    Question 7. B. A DNS address and D. A WINS Server address

    Question 8. B. Configure the dialup connection to enable on-demand dialing.
    C. Configure the dialup connection to enable Internet connection sharing. and
    E. Attach the modem to one of the Windows 2000 Professional computers, and create a dialup connection to the ISP.

    Question 9. C. Perform a disk analysis, and use the disk defragmenter if recommended.
    D. Use Disk Cleanup to delete temporary files and unnecessary program files.

    Question 10. There is no network config exhibit, but if i had to guess, it would be...D. Configure Client2 to use a DNS Server address of 10.10.13.24.

    Question 11. you skipped this one

    Question 12. Vrefresh=150

    Question 13. D. Replace the Win16-based applications with available Win32-based applications.

    Question 14. A. An unattended installation of Windows 2000 Professional will be performed.
    B. An unattended installation of company-standard applications will be performed during the installation of Windows 2000 Professional.
    C. Each computer will be assigned a unique SID.
    D. The unattended installation script will be modified so that the computers automatically join the Contoso.com domain.

    Question 15. C. Configure Windows 2000 Professional to enable driver signing verification.

    Qustion 16. A. Use Accessibility options in Control Panel to reconfigure the accessibility idle time setting.

    Question 17. B. Use Windows 2000 Professional to enable EFS on drive D.

    Question 18. A. Friday, Wednesday. Files will be current as of Wednesday night.

    Question 19. No picture, can't select answer...

    Question 20. B. Use the at command to schedule a weekly job to run the system file checker.

    Question 21. D. Create a GPO for the Graphics OU to redirect the My Documents folder, and define the UNC path \\server1\users\%username%

    Question 22. A. Move the video adapters to different PCI slots so that the primary video adapter is in slot 0.

  7. #7
    70-240
    Guest

    Post

    wow! your fast!

    here are the answers. which topic do you wish to do next? network infrastructure, 2000 server, or directory services.
    Lemme know.

    1.a
    2.a,d
    3.c
    4.b
    5.a
    6.a
    7.b,c
    8.b,c,e
    9.c,d
    12=vrefresh=150
    13.a
    14.a,c,d
    15.c
    16.a
    17.c
    18.d
    19.dhcp goes in the blank
    20.c
    21.d
    22.b

  8. #8
    Ya_know
    Guest

    Post

    That last one really kicked my a$$. I barely got 50%.

    Lets try network infrastructure next, while I lick my wounds.

  9. #9
    70-240
    Guest

    Post

    you got it.
    here are all the questions so take your time and lemme know when you get the answers.


    HAVE FUN!!!!!


    1 You are the administrator of your company’s network. Your network is configured as shown in the exhibit.

    Your company has an Intranet web application named Appz that utilizes resources on Internet Information Services (IIS)

    For performance reasons, your company mirrors the content of Appz on three web servers: IIS1, IIS2, and IIS3. You want to configure your network to allow access to the other web servers in the event of failures. You want to configure DNS by using the fewest possible resources.

    What should you do?

    A. Configure one DNS Server so that is has one DNS zone. Enable Round Robin. Create an A (host) record for Appz for each web server’s IP address
    B. Configure one DNS Server so that is has one DNS zone. Disable Round Robin. Create an A (host) record for Appz for each web server’s IP address
    C. Configure three DNS servers so that each one has one DNS zone. Enable Round Robin. Add an A (host) record for Appz for each web server on each DNS Server.
    D. Configure three DNS Servers so that each one has one DNS zone. Disable Round Robin. Add an A (host) record for Appz for each web server on each DNS Server.

    Exhibit:



    2 You are the administrator of a windows 2000 network. The network consists of 30 Windows 2000 Professional computers and two Windows 2000 Server computers named Athens and Boston. Athens has a permanent cable modem connection to the Internet.

    All Wndows 2000 Professional computers on the network are configured to use automatic private IP addressing (APIPA). The network does not contain a DHCP Server.

    To allow all Windows 2000 Professional computers on the network to access the Internet through the cable modem connection of Athens, you install and configure the Network Address Translation (NAT) routing protocol on Athens.

    You decide to use IP addresses in the range of 192.168.40.1 through 192.168.40.50 for the network. Athens is configured to use an IP address of 192.168.40.1.

    Boston is a web server configured with an IP address of 192.168.40.2 and a Default
    Gateway of 192.168.40.1.

    Your Internet Service Provider (ISP) has allocated two IP addresses, 207.46.179.16 and 207.46.179.17 to your network.

    The network is shown in the exhibit.

    You want to allow Internet users from outside your internal network to use an IP address of 207.46.179.17 to access the resources on Boston through the NAT service on Athens.

    How should you configure the network to accomplish this goal?

    A. Configure Athens with a static route on the private interface of the NAT routing protocol. Use a destination address of 207.46.179.17, a network mask of 255.255.255.255, and a gateway of 207.46.179.17
    B. Configure Boston with a static route on the LAN interface. Use a destination address of 192.168.40.1, a network mask of 255.255.255.255, and a gateway of 207.46.179.17
    C. Configure the LAN interface of Boston to use multiple IP addresses. Assign the additional IP address of 207.46.179.17 to the interface.
    D. Configure the public interface of the NAT routing protocol to use an address pool with a starting address of 207.46.179.16 and a mask of 255.255.255.254. Reserve a public address of 207.46.179.17 for a private IP address of 192.168.40.2

    Exhibit:



    3 You are the administrator of one standard primary DNS Server and two standard secondary DNS Servers in a Windows 2000 domain. There are no other DNS Servers on the network. The domain includes Windows 2000 Professional computers and Windows 98 computers.

    The DNS zone for the Windows 2000 domain is configured to allow dynamic updates. All three servers are located on domain controllers. You want client computers to be able to register with any DNS Server.

    What should you do?

    A. Change the zone type of the DNS zone for the windows 2000 domain on all three DNS servers to active directory integrated
    B. Change the settings on the standard primary DNS Server to notify the two standard secondary DNS Servers when the zone is updated
    C. Change the settings on the standard primary DNS Server to allow zone transfers to only the two standard secondary DNS Servers
    D. Change they dynamic update option on the standard primary DNS Server to
    allow only secure updates

    4 You are the administrator of a windows 2000 network. Your company wants its customers to be able to connect to its web server to make credit card transactions.

    You want to ensure that these transactions are secured through encryption. You want to assure customers of the identity of your web server when they make online transactions. You also want to assure customers that you can support certificate-based logons for employees of your company who need access to private areas of your web server.

    What should you do?

    A. Install an Enterprise Certificate Authority (CA)
    B. Install a subordinate Enterprise Certificate Authority (CA) that uses a commercial CA as the parent.
    C. Install a stand alone Certificate Authority (CA).
    D. Install a subordinate stand-alone Certificate Authority (CA) that uses a commercial CA as the parent


    5 You are the network administrator for your company. Your network has three subnets connected by a router. The router is configured as follows:

    Interface 0 - subnet 0 - IP address 172.30.4.1 subnet mask 255.255.255.0
    Interface 1 - subnet 1 - IP address 172.30.5.1 subnet mask 255.255.255.0
    Interface 2 - subnet 2 - IP address 172.30.6.2 subnet mask 255.255.255.0

    Only subnet 1 and subnet 2 contain client computers. Subnets 1 and 2 each contain a Windows 2000 DHCP Server, which is responsible for assigning addresses to client computers on the local subnet. The scopes are configured as show in subnet 1 scope properties and subnet 2 scope properties in the exhibit.

    Subnet 0 contains a web server and provides connectivity to the Internet.

    Users are experiencing connectivity problems. Computers on subnet 1 can communicate with any host on their own subnet, but cannot communicate with hosts on subnet 0 or subnet 2. Computers on subnet 2 cannot communicate with hosts on subnet 1, but they are not experiencing any problems with connectivity to subnet 0.

    What should you do to correct this problem?

    A. Modify the routing tables on the router to enable routing from subnet 1 to subnet 0 and subnet 2
    B. Modify the routing tables on each host on subnet 1 to enable direct connectivity to hosts on subnet 0 and subnet 2
    C. Delete and re-create the scope on the DHCP Server on subnet 1 to reflect the correct subnet mask
    D. Delete and re-create the scope on the DHCP Server on subnet 2 to reflect the correct subnet mask
    E. Delete and re-create the scopes on both DHCP Servers to reflect the same configuration information for each subnet

    Exhibit:
    Subnet 1 Scope Subnet 2 Scope

    Start IP 172.30.5.100 172.30.6.100
    End IP 172.30.5.254 172.30.6.254
    Subnet 255.255.0.0 255.255.255.0

    6 You are the administrator of your company’s network. The network consists of 10 Windows 2000 Server computers, 2000 Windows 2000 Professional computers, 250 Windows 98 computers, and 25 UNIX workstation computers running SMB Server software. The network runs only TCP/IP as its transport protocol. You implement WINS in the network for NETBios name resolution.

    Users of the Windows-based client computers report that they cannot access resources based on the UNIX computers by NETBios name. There is no problem accessing windows-based resources by NETBios name.

    What should you do to resolve this problem?

    A. Install a WINS Proxy Agent on one of the UNIX computers
    B. Install a WINS Proxy Agent on one of the Windows-based computers.
    C. On the WINS Server, create static mappings for the UNIX computers.
    D. On the WINS Server, create static mappings for the Windows-based computers.


    7 You are the administrator of your company’s network. Your network is configured to use DHCP to automate the TCP/IP configuration of client computers on your network. The network consists of three subnets connected by a bootp-enable router. All client computers are running Windows 2000 Professional. You have configured a DHCP Server with a scope for each subnet, as shown in the exhibit.

    Users on subnet 2 and subnet 3 report that they periodically cannot access network resources. You discover that at times of high network usage, client computers on the remove subnets are being configured with addresses in the network address range of 169.254.0.0, which is not a valid address range on your network.

    You want to ensure that all client computers receive address from DHCP and do not get configured with invalid addresses. What should you do?

    A. Install a DHCP Server on each remote subnet and configure a subnet-specific scope on each DHCP Server.
    B. Install a DHCP Server on each remote subnet and configure identical scopes on each DHCP Server
    C. Install a DHCP relay agent on each remote subnet
    D. Create an administrative template entry in group policy to enable automatic private IP addressing (APIPA) in the registry of each client computer.

    Exhibit:



    8 You are the administrator of your company’s network. Your company has branch offices in New York and Paris. Because each branch office will support its own Routing and Remote Access Server, you implement a remote authentication dial-in user service (RADIUS) Server to centralize administration.

    You remove the default remote access policy. You need to implement one company policy that requires all dial-up communications to use 40-bit encryption. You want to configure your network to require secure communications by using the least amount of administrative effort.

    What should you do? (Choose two)

    A. Create one remote access policy on each Routing and Remote Access Server
    B. Create a remote access policy on the radius server
    C. Set encryption to basic in the remote access policy or policies.
    D. Set encryption to strong in the remote access policy or policies
    E. Enable the secure server IPSEC policy on the RADIUS Server
    F. Enable the server IPSEC policy on the RADIUS Server.


    9 You are the administrator of your company’s network. Your Windows 2000 Server computer named Srv2 cannot communicate with your UNIX server named Srv1. Srv2 can communicate with other computers on your network. You try to ping Srv1, but you receive the following error message: “unknown host Srv1”.

    You create an A (host) record that has the correct name and IP address. However, when you try to ping Srv1 again, you receive the same error message.

    What should you do to resolve this problem?

    A. Restart the DNS Server
    B. Clear the DNS Server cache
    C. Run the IPConfig /registerdns command on Srv2
    D. Run the IPConfig /flushdns command on Srv2

    10 You are the administrator of a windows 2000 network. Some of the members of your company’s Graphics department use Macintosh computers and are not using Internet explorer as their browser. These users inform you that they cannot request valid user certificates from your Enterprise Certificate Authority (CA). You want to make it possible for these uses to request certificates by using web-based enrollment.

    What should you do?

    A. In the Internet Information Services (IIS) console, access the properties for the certsrv virtual directory. On the directory security tab, set the authentication type to basic authentication
    B. In the policy settings container in the CA console for your CA, add a new enrollment agent certificate.
    C. Edit the ACL on the user certificate template to grant the Graphics department users enroll access.
    D. In the Internet Information Services (IIS) console, access the properties for the Certsrv virtual directory. On the directory security tab, set the authentication type to integrated windows authentication

    11 You are the administrator of your company’s network. Your network consists of 15 Windows 2000 server computers, 100 windows 2000 Professional computers, and one NetWare server. Your users need to access the SYS: volume on the NetWare Server. You want your company’s administrators to have complete access to the SYS: volume. You want all other uses to have read-only access.

    You configure Gateway Service for NetWare on a Windows 2000 server computer. You want to configure the appropriate access to the NetWare Server.

    What should you do? (Choose two)

    A. To the NTGateway group on the NetWare Server, add the user accounts that need access to the NetWare Server
    B. To the NTGateway group on the Windows 2000 server computer, add the user accounts that need access to the NetWare Server
    C. To the NTGateway group on the NetWare Server, add the NTGateway user account
    D. To the NTGateway group on the Windows 2000 Server computer, add the NTGateway user account
    E. On the Windows 2000 Server computer, grant full control permission to Administrators and read permission to Users.


    12 You are the administrator of your company’s network. The network consists of 10 Windows 2000 Server computers, 2000 Windows 2000 Professional computers, and 20 UNIX Servers. You are using Windows 2000 as your DNS Server. Your DNS zone is configured as an Active Directory integrated zone. Your DNS zone is also configured to allow dynamic updates.

    Users report that although they can access the Windows 2000 computers by host name, they cannot access the UNIX Servers by host name. What should you do to correct this problem?

    A. Manually enter A (host) records for the UNIX Servers to the zone database
    B. Manually add the UNIX Servers to the Windows 2000 domain
    C. On the DNS Server, manually create a hosts file that contains the records for the UNIX Servers
    D. Configure a UNIX computer to be a DNS Server in a secondary zone

    13 You are the enterprise administrator of a Windows 2000 domain. The domain has 3 Windows 2000 Server computers named Athens, Barcelona, and Cairo, and 90 Windows 2000 Professional computers.

    Your network consists of three segments connected by a router. Each segment contains one on the servers. The 90 Windows 2000 Professional computers are evenly distributed over the 3 segments

    Athens is a DHCP Server. The TCP/IP configuration of all the Windows 2000 Professional computers on the three segments is provided by the Athens DHCP Server. The DHCP Server has three scopes, one for each segment. The lease time for all three is eight days.

    For performance reasons, you want to move the DHCP Server service from Athens to Barcelona.

    You take the following actions.

    On Athens, stop and disable the DHCP Server service
    On Barcelona, install, authorize and stop the DHCP Server service
    Copy the entire systemroot/system32/dhcp folder from Athens to Barcelona

    You want to configure Barcelona to use the scope information and the leased
    Addresses currently in use by the Windows 2000 Professional computers

    What should you do next on Barcelona? (Choose two)

    A. Enable the DHCP relay agent. Use a boot threshold of 0 seconds
    B. Use the jetpack utility to manually repair the DHCP database
    C. Use the regedit32.exe registry editor to restore the DHCP registry configuration from the systemroot\system32\dhcp\backup location
    D. Copy the systemroot\system32\dhcp\j50.chk file to dhcp.mdb file
    E. Start the DHCP Server and reconcile all scopes
    F. Start the DHCP Server and create a new superscope that contains the three
    original scope ranges

    14 You are the administrator of your company’s network. To automate the configuration of TCP/IP client computers and network printers on your network, you install and configure the DHCP Server service on a Windows 2000 Server computer. You also create a scope that contains the range of valid IP addresses for your network.

    You ensure that the TCP/IP network printers will always receive the same address, you create an exclusion range for the addresses in use by the printers. You also create address reservations for each printer.

    You discover that none of the printers are receiving addresses from the DHCP Server. The client computers report no configuration problems.

    What should you do to correct this problem?

    A. Remove the address reservations for the printers
    B. Remove the exclusion range for the addresses that are in use by the printers
    C. Disable the address conflict detection feature of the DHCP Server service
    D. Enable the address conflict detection feature of the DHCP Server service

    15 You are the administrator of a Windows 2000 network. You want to create a DHCP scope for the 192.168.1.32/28 subnet. The computers on this subnet are running Windows 95. Windows 98 and Windows 2000. You also have two UNIX computers on this subnet that will have static IP addresses. These UNIX computers will be assigned the two highest available IP addresses on the subnet. The subnet’s default gateway will be assigned the lowest available IP address on the subnet. The scope should only include the available addresses.

    Which scope should you create on your DHCP Server for this subnet?

    A. 192.168.1.34 - 192.168.1.46
    B. 192.168.1.34 - 192.168.1.44
    C. 192.168.1.33 - 192.168.1.45
    D. 192.168.1.34 - 192.168.1.61
    E. 192.168.1.33 - 192.168.1.60

    16. You are the administrator of your company’s network. The network consists of four IP subnets connected by a router. The network contains 12 Windows 2000 Server computers and 100 Windows 2000 Professional computers, evenly distributed across the four subnets. All of the servers are used to serve file and print resources to the client computers.

    You install the WINS Server service on a server on one subnet. You configure the wins option in a DHCP scope to configure all of the other computers on the network to register with and query the WINS Server for NETBios name resolution.

    Within four hours of the installation and configuration, users on the remote subnets report that they cannot access resources located on the wins server by NETBios name. Other TCP/IP connectivity is not affected. Users located on the same subnet as the WINS Server are experiencing no problems accessing these same resources.

    What should you do to resolve this problem?

    A. Install a WINS Proxy Agent on each remote subnet
    B. Install a WINS Proxy Agent on the same subnet as the WINS Server
    C. Configure the WINS Server to include the IP addresses of each gateway on the
    router
    D. Configure the WINS Server to include its own IP address as a WINS client
    computer


    17 You are the administrator of your company’s network. The network consists of 10 Windows 2000 Server computers, 200 Windows 2000 Professional computers, 250 Windows 98 computers, and 25 UNIX workstation computers running SMB Server software. The network runs only TCP/IP as its transport protocol. You implement WINS in the network for NETBios name resolution.

    Users of the windows-based client computers report that they cannot access resources based on the UNIX computers by NETBios name. There is not problem accessing Windows-based resources by NETBios name

    What should you do to resolve this problem?

    A. Install a WINS Proxy Agent on one of the UNIX computers
    B. Install a WINS Proxy Agent on one of the Windows-based computers
    C. On the WINS Server, create static mappings for the UNIX computers
    D. On the WINS Server, create static mappings for the Windows-based computers

    18 You are the administrator of your company’s network. Your network is configured as shown in the exhibit.

    You are configuring your Windows 2000 Srver computer that runs InternetInformation Services (IIS) your server uses the IP address of 131.107.2.2 to support Internet users. Your servers uses the IP address of 10.1.1.2 to support an Intranet application.

    You want to configure your server to permit only web communications from the Internet. You also want to configure your server to allow access to shared folders and other resources for users on the intranet?

    What should you do?

    A. Enable a TCP/IP filter
    Permit only port 80 on the network adapter that uses the IP address of 131.107.2.2

    B. Enable a TCP/IP filter
    Permit only port 21 and port 20 on the network adapter that uses the IP address of 131.107.2.2

    C. Permit all ports on the network adapter that uses the IP address of 131.107.2.2

    D. Enable a TCP/IP filter
    Permit only port 80 on the network adapter that uses the IP address of 10.1.1.2

    E. Enable a TCP/IP filter
    Permit only port 21 and port 20 on the network adapter that uses the IP address of 10.1.1.2

    Exhibit:


    19 You are the administrator of your company’s network. Your company has a main office, two large branch offices, and two small branch offices. The company’s network consists of one Windows 2000 domain. The main office and the two large branch offices are connected by dedicated t1 lines, as shown in the exhibit

    The two small branch offices use 128-kbps ISDN lines and Routing and Remote Access over the Internet to connect to the company’s internal network

    You are designing your DNS name resolution environment. You want to accomplish the following goals.

    You take the following actions:

    Install the DNS Server service on one server at each office
    Create a standard primary zone at the main office
    Create a standard secondary zone at the four other offices
    Configure client computers to query their local DNS Server

    Which result or results to these actions produce? (Choose all that apply)

    A. DNS name resolution traffic across the wan links is minimized
    B. DNS replication traffic across the wan links is minimized
    C. DNS replication traffic across the public wan links is secured
    D. Name resolution performance for client computers is optimized

    Exhibit:



    20 You are the administrator of a Windows 2000 network. The network contains a Windows 2000 Server computer named RouterA, Routing and Remote Access is enabled as a router on RouterA. RouterA has a LAN interface named Net1. The Net1 interface uses an IP address of 192.168.1.2

    You want to specify which type of network traffic will be allowed into the router through the net interface. The only traffic that should be allowed into the Net1 interface is HTTP traffic. HTTP uses TCP port 80 or TCP port 443. The other interfaces of the router have no restrictions on the type of network traffic allowed.

    You configure two input packet filters on the Nnet1 interface as shown in the following dialog box: “ receive all packets is marked”

    When you monitor RouterA, you notice that other network traffic is still allowed into the router through the Net1 interface

    What should you do?

    A. Configure the network connection to use the TCP/IP filtering. Permit only TCP
    port 80 and TCP port 443
    B. Configure the input packet filters to drop all packets except packets allowed by
    the filters
    C. Configure two output packet filters to filter on both TCP port 80 and TCP port 443
    D. Configure the net1 interface to drop all UDP packets


    21 You are the administrator of your company’s network. The network is configured as shown in the exhibit.

    All client computers on your network receive their IP address information from the DHCP Server. The user of Prof4 accesses most of his network resources from computers on segment A. The users on Prof5 and Prof6 access most of their resources from computers on segment C.

    You want to configure your DHCP Server to issue gateway addresses to Prof4, Prof5 and Prof6. You want these gateway addresses to offer optimum access time.

    How should you configure your DHCP Server? (Choose two)

    A. Create a reservation for Prof4. For this reservation, configure the router option that has the value of 172.16.64.2
    B. Create a reservation for Prof5 and a reservation for Prof6. For each reservation, configure the router option that has the value of 172.16.64.2
    C. Configure the DHCP Server’s predefined router option so that it has the value of 172.16.64.2
    D. Configure the DHCP Servers predefined router option so that it has the value of 172.16.64.1
    E. On the DHCP Server’s scope for segment B, configure the router options so that it has the value of 172.16.64.2
    E. On the DHCP Server’s scope for segment B, configure the router options so that it has the value of 172.16.64.1

    Exhibit:



    22 You are the administrator of a Windows 2000 network. The network consists of 85 Windows 2000 Professional computers and two Windows 2000 Server clients named Amsterdam and Utrecht. Amsterdam has a permanent cable modem connection to the Internet

    All Windows 2000 Professional computers on the network are configured to use automatic private IP addressing (APIPA). The network does not contain a DHCP Server.

    To allow all Windows 2000 Professional computers on the network to access the Internet through the cable modem connection of Amsterdam, you install and configure the network address translation (NAT) routing protocol on Amsterdam

    You decide to use IP addresses in the range of 172.20.20.1 thru 172.20.20.150 for the network. Amsterdam is configured to use an IP address of 172.20.20.1

    Utrecht is a web server configured with an IP address of 172.20.20.2 and a Default Gateway of 172.20.20.1

    You want to allow Internet users from outside your internal network to access the resources on Utrecht through the NAT on Amsterdam.

    How should you configure the network to accomplish this goal?

    A. Configure the NAT routing protocol to enable the use of a network application.
    Specify web server as the name of the application.
    Use the web port number as the remote server port number.

    B. Configure the public interface of the NAT routing protocol to use an address pool
    with an address of 172.20.20.2

    C. Configure the public interface NAT routing protocol to use a special port that
    maps to the web server port and an address of 172.20.20.2

    D. Configure Amsterdam so that it has a static route on the private interface.
    Use a destination address of 172.20.20.2, a network mask of 255.255.255.255, and a gateway of 172.20.20.1


  10. #10
    celeste9519
    Guest

    Post

    Thanks for posting all those questions. I'm always on the look out for more study material.

    ------------------
    The truth is out there, you just need to decrypt it.

  11. #11
    70-240
    Guest

    Post

    your welcome.

    did you want the answers?

  12. #12
    Ya_know
    Guest

    Post

    <font face="Tahoma, Arial, Helvetica, Verdana, Geneva" size="2">Originally posted by 70-240:
    your welcome.

    did you want the answers?
    </font>
    Ok...

    I would love the answers, but it won't do me any good. I don't understand half of the questions. I got to three and gave up. Maybe someone else is ready to play...unless you have time to explain each of the answers.


    ------------------

  13. #13
    Driver Terrier NooNoo's Avatar
    Join Date
    Dec 2000
    Location
    UK
    Posts
    31,824
    Welcome to Windrivers Decrypted...talk about ressurecting old threads, but the explanation is

    Answer: Click on the Vrefresh=150 Explanation: The video adapter’s refresh rate defines the number of times that the screen must be rewritten per second. The higher the resolution, the larger the number of dots that have to be written in every refresh cycle. Video adapters and monitors have a default refresh rate of 60 Hz. This is the setting guaranteed to work on most modern video adapters and monitors, even with the standard video adapter driver installed. Not all video adapters and monitors support a refresh rate of above 80 Hz. When the refresh rate is not supported, the monitor goes blank or the image becomes distorted
    example answers

    In other words, the vRefresh listed in the example question is wrong. Setting a refresh rate of 150 is beyond the abilities of most office monitors.
    Never, ever approach a computer saying or even thinking "I will just do this quickly."

  14. #14
    Registered User
    Join Date
    Feb 2012
    Posts
    1
    Hello,
    i have to add two textbox value and display the resultant sum in third text box
    please help me.....

  15. #15
    Driver Terrier NooNoo's Avatar
    Join Date
    Dec 2000
    Location
    UK
    Posts
    31,824
    Quote Originally Posted by i need you View Post
    Hello,
    i have to add two textbox value and display the resultant sum in third text box
    please help me.....
    In what programming langugage?
    Never, ever approach a computer saying or even thinking "I will just do this quickly."

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •