Computer Science - Windows 2000 Server MCQs Part 2
1. The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?
A.
Configure a client computer to use only TCP/IP for the connections to the remote access server
Configure a client computer to use only TCP/IP for the connections to the remote access server
B.
Configure the client computer to use a defined IPX network address for the connection to the remote access servers
Configure the client computer to use a defined IPX network address for the connection to the remote access servers
C.
Configure the remote access server to allow IPX based remote access demand dial connections
Configure the remote access server to allow IPX based remote access demand dial connections
D.
Configure the remote access server to disable multi-link connection
Configure the remote access server to disable multi-link connection
E.
None of above
None of above
Answer Option D
2. You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?
A.
Enable the background refresh settings to use the default group policy refresh date
Enable the background refresh settings to use the default group policy refresh date
B.
Enable the asynchronous group policy application settings
Enable the asynchronous group policy application settings
C.
Enable and configure the group policy refresh interval for domain controller
Enable and configure the group policy refresh interval for domain controller
D.
Enable and configure the group policy refresh interval for computers
Enable and configure the group policy refresh interval for computers
E.
None of above
None of above
Answer Option D
3. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?
A.
Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone
Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone
B.
Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone
Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone
C.
Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone
Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone
D.
Configure at least two servers with Active Directory integrated primary zones for the domain
Configure at least two servers with Active Directory integrated primary zones for the domain
E.
Configure at least two servers with standard primary zones for the domain
Configure at least two servers with standard primary zones for the domain
Answer Option D
4. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do?
A.
Configure the settings for Internet Connecting Sharing to allow POP3 access
Configure the settings for Internet Connecting Sharing to allow POP3 access
B.
Configure the settings for Internet Connecting Sharing to allow SMTP access
Configure the settings for Internet Connecting Sharing to allow SMTP access
C.
Give David's user account administrator privileges on the Windows 2000 Server computer
Give David's user account administrator privileges on the Windows 2000 Server computer
D.
Instruct David to log on as a domain administrator on the Windows 2000 Server computer
Instruct David to log on as a domain administrator on the Windows 2000 Server computer
E.
None of above
None of above
Answer Option C
5. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do?
A.
Grant the users the right to log on as a service
Grant the users the right to log on as a service
B.
Grant the users the right to log on locally
Grant the users the right to log on locally
C.
Grant the users the right to log on over the network
Grant the users the right to log on over the network
D.
Copy the users' prpfiles to the Terminal server
Copy the users' prpfiles to the Terminal server
E.
Copy the users' home folders to the Terminal server
Copy the users' home folders to the Terminal server
Answer Option B
6. How can you assign an application to one processor exclusively?
A. Right click on application executable, select properties and select assign processor
B. Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor
C. Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor
D. Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor
E. None of above.
Answer Option B
7. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?
A. Replace Disk 1 and restart the computer. The mirror will automatically regenerate
B. Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1
C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
E. None of above
Answer Option B
8. You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?
A. Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive
B. Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen
C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers
D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers
E. None of above
Answer Option B
9. You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?
A. On the second partition, create a shared folder named Temp
B. In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk
C. Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new partition
D. Add a second hard disk. Delete the contents of the SystemrootYTemp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the SystemrootYTemp folder
E. None of above
Answer Option D
10. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain. What should you do?
A. On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server
B. On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers
C. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows2000 domain as the existing Windows NT domain
D. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart the Windows NT PDC on the network and demote it to a BDC
E. None of above
Answer Option A
11. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?
A. During the text mode portion of the Windows 2000 setup install the customized HAL
B. After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition
C. After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup
D. After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL
E. None of above
Answer Option A
12. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?
A. Add the APP1 and APP2 instances to the processor time counter for the process object
B. Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
C. Add only the NTVDM instance for the percent processor time counter for the process object
D. Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
E. None of above
Answer Option D
13. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem?
A. Create a new hardware profile
B. Use Device Manager to remove the integrated 10-MB Ethernet adapter
C. Use Device Manager to disable the integrated 10-MB Ethernet adapter
D. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder
E. None of above
Answer Option C
14. Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_6r_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?
A. Restart the computer by using the last known good menu option
B. Perform an emergency repair and select fast repair, restart the computer
C. Restart the computer in the safe mode, remove the driver and restart the computer
D. Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver
E. None of above
Answer Option D
15. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?
A. Replace the third disk and restart the server. Use disk Management to repair the volume
B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
E. None of above
Answer Option B
16. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?
A. Convert both to dynamic disks
B. Create an empty extended partition on new disk
C. Create a single unformatted primary partition on new array
D. Format new disk array as a single NTFS primary partition
E. Format the new disk array as a single NTFS logical drive in an extended partition
Answer Option A
17. You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A. Move the intranet server to the client segment of the network
B. Move the proxy server to the server segment of the network
C. Configure each client computer to bypass the proxy server for local addresses
D. Configure each client computer to use port 81 for the proxy server
E. None of above
Answer Option C
18. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?
A. Convert the disk to dynamic disk shut down and restart the server
B. Backup the data on the stripe volume and delete the stripe volume. Create a raid5 volume on the four disks, restore the data to the new raidS volume
C. Backup the data on the stripe volume and delete the stripe volume. Create to mirror volume, shut down and restart the server. Restore the data to new mirror volumes
D. Backup the data on the stripe volume and delete the stripe volume. Create a span volume for the first two disks, create a second span volume for the last two disk. Mount the root of the second span volume in the root of the first span volume. Restore the data to the first span volume
E. None of above
Answer Option B
19. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?
A. Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package
B. Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy
C. Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy
D. Place the service pack in a Distributed file system (Dfs)
E. None of above
Answer Option B
20. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?
A. CHAP
B. MS-CHAP v2
C. PAP
D. SPAP
E. None of above
Answer Option B
21. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A. Install Active Directory on the server
B. Select Basic Authentication check box
C. Clear the Allow Anonymous Connection check box
D. Disable the IUSE_inta user account on Intra
E. Clear the Allow IIS to Control Password check box
Answer Option C
22. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
A. Set the CrashonAuditFail registry key to 0
B. Set the Security Log to overwrite events as needed
C. Delete the Liscense Trial registry key
D. Increase the size of the security log
E. Save the security log to a file, and clear it every morning
Answer Option A
23. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?
A. Install Network Monitor on Monitor 1
B. Install Network Monitor on Application Server
C. Configure the network monitor ECP port something for TCP
D. Configure the network monitor EDP port something for UDP
E. Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance
Answer Option C
24. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?
A. Use Computer Management to stop and restart the Server service
B. Use Computer Management to stop and restart the Workstation service
C. Use Task Manager to end any related child processes
D. Use Task Manager to end and automatically restart the Explorer.exe process
E. None of above
Answer Option C
25. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
A. Apply a less restrictive custom security template to DC1
B. Apply a less restrictive custom policy to Windows NT domain controller
C. Ensure the Windows 2000 domain is configured in the mixed mode
D. Ensure the Windows 2000 domain is configured to run in the native mode
E. None of above
Answer Option A
26. You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?
A. Convert the disk that contains the shared folders to a dynamic disk
B. Convert the partition that contains the shared folders to NTFS
C. Defragment the disk that contains the shared folders
D. Move the paging file to the partition that contains the shared folders
E. None of above
Answer Option C
27. You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?
A. End the task named Application
B. End the Application.exe process
C. End the Application.exe process tree
D. End both the Explorer.exe process and the Application.exe process
E. None of above
Answer Option C
28. You are the administrator of Windows 2000 Server network. On each server you format a separate system partition and a separate boot partition as NTFS. Several months later you shut down one of the computers for maintenance. When you try to restart the computer you receive the following error message "NTLDR is missing, press any key to restart". You want to install a new NTLDR file on the computer but you do not want to loose any settings you made since the installation. What should you do?
A. Start the computer by using Windows 2000 Server computer CD-ROM and choose tools to repair the installation. Select recovery console and copy the NTLDR file on the CD-ROM to the root of the system volume
B. Start the computer by using the Windows 2000 server CD- ROM, choose to reinstall. When the installation is complete copy the NTLDR to the root of the boot volume
C. Start the computer by using the Windows 2000 bootable floppy disk. From a command prompt run the sfc/scanboot command
D. Start the computer by using Windows 2000 bootable floppy disk. Run the file signature verification utility
E. None of above
Answer Option A
29. Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?
A. Compress the files in her home folder to save disk space
B. Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
C. Move some of the files from her home folder to the IN_PROGRESS shared folder
D. Remove files from her home folder until the total uncompressed file size is less than 100 MB
E. None of above
Answer Option D
30. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day. You use Disk Management and discover that the status of the third disk in the array is missing. You want to recover the failed RAID-5 volume. What should you do first?
A. Replace the third disk and restart the server. Use Disk Management to repair the volume
B. Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
C. Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
D. Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
E. None of above
Answer Option B
6. How can you assign an application to one processor exclusively?
A. Right click on application executable, select properties and select assign processor
B. Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor
C. Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor
D. Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor
E. None of above.
Answer Option B
7. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?
A. Replace Disk 1 and restart the computer. The mirror will automatically regenerate
B. Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1
C. Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
D. Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
E. None of above
Answer Option B
8. You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?
A. Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive
B. Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen
C. Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers
D. Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers
E. None of above
Answer Option B
9. You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?
A. On the second partition, create a shared folder named Temp
B. In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk
C. Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new partition
D. Add a second hard disk. Delete the contents of the SystemrootYTemp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the SystemrootYTemp folder
E. None of above
Answer Option D
10. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain. What should you do?
A. On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server
B. On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use Active Directory Sites and Services to force synchronization of the domain controllers
C. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows2000 domain as the existing Windows NT domain
D. Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory Installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart the Windows NT PDC on the network and demote it to a BDC
E. None of above
Answer Option A
Comments
Post a Comment