Microsoft Certification Questions

Q:

You want to create and format a simple volume on a Windows 2000 computer. Which tool should you use?

A) Disk Administrator B) Disk Management
C) The Convert.exe command -line utility D) The Format.exe command-line utility
 
Answer & Explanation Answer: B) Disk Management

Explanation:

Windows 2000 includes a powerful tool to manage disks - it's called Disk Management. You can use Disk Management to create and manage several different volume types on a Windows 2000 computer.

Report Error

View Answer Report Error Discuss

1 2419
Q:

You provide technical support for a company with several locations. In a remote sales office, there are 5 Windows 2000 Professional computers. All computers are connected in a workgroup, as shown in the exhibit. (See the exhibit below). The manager's computer has a 56K dial up connection to the Internet. The manager calls and explains that she had enabled ICS (Internet Connection Sharing) on her computer. Once ICS had been enabled, none of the other users were able to access a shared folder on the manager's computer. What should you instruct her to do ?

 

A) Configure the dial-up connection to disable shared access. B) Configure the dial-up connection to disable on-demand dialing.
C) Disable data encryption in the new dial-up connection. D) Use the ipconfig command to release and renew your network TCP/IP address.
 
Answer & Explanation Answer: A) Configure the dial-up connection to disable shared access.

Explanation:
Report Error

View Answer Report Error Discuss

0 2416
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Communication Foundation (WCF) Data Services service. You discover that when an application submits a PUT or DELETE request to the Data Services service, it receives an error. You need to ensure that the application can access the service. Which header and request type should you use in the application?

A) an X-HTTP-Method header as part of a POST request B) an X-HTTP-Method header as part of a GET request
C) an HTTP ContentType header as part of a POST request D) an HTTP ContentType header as part of a GET request
 
Answer & Explanation Answer: A) an X-HTTP-Method header as part of a POST request

Explanation:
Report Error

View Answer Report Error Discuss

0 2413
Q:

You want to configure synchronization settings for your office files. Which tool should you use?

A) Folder options B) Scheduled Tasks
C) Windows Explorer D) System Information
 
Answer & Explanation Answer: C) Windows Explorer

Explanation:

Use Windows explorer to configure a synchronization schedule for offline files. (Select Tools => Synchronize to start this process.) You can also access the same synchronization tool by selecting Start => Programs => Accessories => Synchronize.

Report Error

View Answer Report Error Discuss

0 2394
Q:

A large document contains meeting notes from all meeting that took place between HR and Finance. You need to find all instances of 'derive' or 'dive' or 'dave'. What would be the most efficient way to find these terms using the Find & Replace dialog box?

A) Choose Wildcard option and search for d?ve B) Choose Wildcard option and search for d*ve
C) Choose Wildcard option and search for ?ve D) Choose Wildcard option and search for *ve
 
Answer & Explanation Answer: B) Choose Wildcard option and search for d*ve

Explanation:
Report Error

View Answer Report Error Discuss

5 2390
Q:

You are upgrading your single master Windows NT Server 4.0 network to Windows 2000. Which computer should you upgrade first?

A) The stand-alone server in the Windows NT 4.0 domain that will become the root domain in your Windows 2000 network B) The primary domain controller (PDC) in the Windows NT 4.0 domain that will become a child domain in your Windows 2000 network
C) The backup domain controller (BDC) in the Windows NT 4.0 domain that will become a child domain in your Windows 2000 network D) The Primary domain controller (PDC) in the Windows NT 4.0 domain that will become the root domain in your Windows 2000 network
 
Answer & Explanation Answer: D) The Primary domain controller (PDC) in the Windows NT 4.0 domain that will become the root domain in your Windows 2000 network

Explanation:

When upgrading from a Windows NT 4.0 single master domain model to windows 2000, the first computer you should upgrade is the PDC of the Windows NT 4.0 domain that will become the root domain of your Windows 2000 network.

Report Error

View Answer Report Error Discuss

0 2383
Q:

You get a great deal on a refurbished laser printer. The printer is plug and play compliant and connects to your USB port. The printer is on the current Windows 2000 Hardware Compatibility List (HCL). You install the printer and run the manufacturers setup program. During the installation, you receive the error shown in the exhibit (See the exhibit below). What should you do?

A) Change the USB port setting to enable legacy Plug and Play detection. B) Configure the USB port to Disable Error Detection.
C) Connect the printer as a shared device on a non-Windows 2000 computer. D) Install the WDM-compliant device drivers using the Add New Hardware wizard.
 
Answer & Explanation Answer: D) Install the WDM-compliant device drivers using the Add New Hardware wizard.

Explanation:
Report Error

View Answer Report Error Discuss

0 2315
Q:

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do?

A) From the Security Templates snap in, open the hisecdc template. Modify the Retain System Log setting. B) From the Security Templates snap in, open the securedc template. Modify the Retain Security Log setting.
C) Open the Default Domain Policy. Modify the Retain System Log setting. D) Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
 
Answer & Explanation Answer: D) Open the Default Domain Controller Policy. Modify the Retain Security Log setting.

Explanation:
Report Error

View Answer Report Error Discuss

1 2304