Searching for "CH"

Q:

You are archiving a Security Log for later analysis in a spreadsheet. Which file type should you assign to the log when you save it?

A) .evt B) ,txt
C) .csv D) .exe
 
Answer & Explanation Answer: C) .csv

Explanation:

Saving the Security Log as a comma - delimited file is probably the best choice if you want to analyze the data later in a spreadsheet.

Report Error

View Answer Report Error Discuss

Q:

You want to use a single group to organise users from multiple domains that perform similar job tasks. Which kind of group should you use?

A) Universal group B) Global group
C) Domain Local group D) Built-in special group
 
Answer & Explanation Answer: A) Universal group

Explanation:

Universal groups are used to organize users from multiple domains  that perform similar job tasks or have similar network access requirements, and / or to control access to shared resources in multiple domains.

Report Error

View Answer Report Error Discuss

Q:

You want to move the Philadelphia OU from the acme1.com domain to the acme2.com domain. Which tool should you use?

A) MoveTree.exe B) The move command -line utility
C) Server Extensions Administrator D) Active Directory Domains and Trusts
 
Answer & Explanation Answer: A) MoveTree.exe

Explanation:

Use MoveTree.exe to move Active Directory objects from one domain to another.

Report Error

View Answer Report Error Discuss

Q:

You want to use System Monitor to see how much of the paging file on your Windows 2000 computer is being utilized. Which counter should you use?

A) Paging File-% Usage B) Paging File-% Usage Peak
C) Memory-Pages/sec D) Memory-Pool Paged Bytes
 
Answer & Explanation Answer: A) Paging File-% Usage

Explanation:

The Paging File-% Usage counter is used to measure the percentage of paging file utilization.

Report Error

View Answer Report Error Discuss

Q:

Which tool should you use to authorize a RIS server in Active Directory?

A) The DHCP administrative tool B) The DNS administrative tool
C) Active Directory Users and Computers D) Active Directory Sites and Services
 
Answer & Explanation Answer: A) The DHCP administrative tool

Explanation:

You must use the DHCP administrative tool to authorize a RIS server in Active Directory.

Report Error

View Answer Report Error Discuss

Q:

Which authentication method provides the highest level of security?

A) Microsoft encrypted authentication version 2 (MS-CHAP v2) B) Microsoft encrypted authentication (MS-CHAP)
C) Encrypted authentication (CHAP) D) Shiva password Authentication Protocol (SPAP)
 
Answer & Explanation Answer: A) Microsoft encrypted authentication version 2 (MS-CHAP v2)

Explanation:

Microsoft encrypted auhentication version 2 (MS-CHAP v2) is the most secure authentication method.

Report Error

View Answer Report Error Discuss

Q:

You want to monitor and configure your organization's removable media, including a tape library and optical discs. Which Windows 2000 tool can you use to do this?

A) Remote Storage B) Sounds and Multimedia
C) Imaging D) Removable Storage
 
Answer & Explanation Answer: D) Removable Storage

Explanation:

Removable Storage is the Windows 2000 tool used to manage removable media. Remote Storage is not the correct answer here because it is used  to manage nonremovable (fixed) media on a Windows 2000 computer

Report Error

View Answer Report Error Discuss

Q:

Which Event Viewer log can you use to view the results of auditing?

A) Application Log B) Security Log
C) System Log D) Directory Service Log
 
Answer & Explanation Answer: B) Security Log

Explanation:

Audited events are written to the Security Log in Event Viewer.

Report Error

View Answer Report Error Discuss