MCSE-Microsoft Certified Solutions Expert Questions

Q:

You are archiving a Security Log for later analysis in a spreadsheet. Which file type should you assign to the log when you save it?

A) .evt B) ,txt
C) .csv D) .exe
 
Answer & Explanation Answer: C) .csv

Explanation:

Saving the Security Log as a comma - delimited file is probably the best choice if you want to analyze the data later in a spreadsheet.

Report Error

View Answer Report Error Discuss

0 3214
Q:

You create a System Policy file on a Windows 2000 Server computer to manage Windows NT 4.0 client computers  (and their users) on your Windows 2000 network. What filename should you assign to this System Policy file?

A) Config.pol B) Ntconfig.pol
C) Nt4config.pol D) Winntconfig.pol
 
Answer & Explanation Answer: B) Ntconfig.pol

Explanation:

A Windows NT 4.0 System Policy file should be named NTconfig.pol

Report Error

View Answer Report Error Discuss

0 3107
Q:

As part of trouble shooting errors in a VPN connection, what logs must be checked?

A) IPSec logging B) Event viewer
C) VPNSec Log D) All of above
 
Answer & Explanation Answer: A) IPSec logging

Explanation:
Report Error

View Answer Report Error Discuss

0 3043
Q:

Sachin works for a computer training institute in North America.After discussing the steps of installing Windows XP professional in the class room, sachin divided the students in a group of two and asked them to complete the installation on their respective machines.But none of the students were able to complete the installation process.Identify the solution that is the cause to the above problem.

A) Needs to run XP Upgrade Adviser to avoid compatibility problem B) Needs to run XP Upgrade Professional to avoid compatibility problem
C) Needs to run XP Upgrade Home Edition to avoid compatibility problem D) Needs to run XP Service Pack to avoid compatibility problem
 
Answer & Explanation Answer: A) Needs to run XP Upgrade Adviser to avoid compatibility problem

Explanation:
Report Error

View Answer Report Error Discuss

2 2772
Q:

You want to use System Monitor to see how much of the paging file on your Windows 2000 computer is being utilized. Which counter should you use?

A) Paging File-% Usage B) Paging File-% Usage Peak
C) Memory-Pages/sec D) Memory-Pool Paged Bytes
 
Answer & Explanation Answer: A) Paging File-% Usage

Explanation:

The Paging File-% Usage counter is used to measure the percentage of paging file utilization.

Report Error

View Answer Report Error Discuss

0 2755
Q:

You are considering upgrading a Windows NT Workstation 4.0 computer on your network to Windows 2000 Professional. The computer has 12 applications installed in addition to the operating system. All the applications are compatible with Windows 2000. The end user would benefit from the additional features Windows 2000 provides. What action should you take? 

A) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Server B) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Professional
C) Perform a clean install of Windows 2000 Professional on the Windows NT Workstation 4.0 computer D) Don't upgrade the Windows NT Workstation 4.0 computer, but install the Directory Service Client on it instead
 
Answer & Explanation Answer: B) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Professional

Explanation:

Upgrading the computer to Windows 2000 Professional is probably the best choice given that the current operating system is Windows NT Workstation 4.0 (which upgrades easily to Windows 2000 Professional) and the fact that the computer has 12 additional applications installed on it that would need to be reinstalled and reconfigured if a clean install was performed.

Report Error

View Answer Report Error Discuss

0 2745
Q:

You want to prevent the creation of administrative shares on a Windows 2000 server computer. What should you do?

A) Nothing. You can't prevent the creation of administrative shares. B) Configure the Advanced options in Configure Your Server
C) Configure the Advanced settings on the View tab in Folder Options D) Use Reged32.exe or the System Policy Editor to edit the registry
 
Answer & Explanation Answer: D) Use Reged32.exe or the System Policy Editor to edit the registry

Explanation:

Edit the registry to prevent the creation of administrative shares.

Report Error

View Answer Report Error Discuss

0 2745
Q:

Which master role causes the domain controller that performs this role to be the only domain controller in the forest that can add a new domain to the forest?

A) PDC emulator B) Schema master
C) Relative ID master D) Domain naming master
 
Answer & Explanation Answer: D) Domain naming master

Explanation:

The domain naming master is the only domain controller that can add or remove domains to/form the forest

Report Error

View Answer Report Error Discuss

0 2744