MCSE-Microsoft Certified Solutions Expert Questions

Q:

Which authentication method provides the highest level of security?

A) Microsoft encrypted authentication version 2 (MS-CHAP v2) B) Microsoft encrypted authentication (MS-CHAP)
C) Encrypted authentication (CHAP) D) Shiva password Authentication Protocol (SPAP)
 
Answer & Explanation Answer: A) Microsoft encrypted authentication version 2 (MS-CHAP v2)

Explanation:

Microsoft encrypted auhentication version 2 (MS-CHAP v2) is the most secure authentication method.

Report Error

View Answer Report Error Discuss

0 2184
Q:

John is a system administrator for a renowned travel agency.The agency is planning to upgrade its computer systems to Windows XP Professional.Most of the computers are networked but some computers do not have CD-ROM drives.How can John upgrade the computer systems without CD-ROM drives to Windows XP Professional?

A) can attach a portable tape backup unit to each computer and install the operating system from it. B) can use the windows installer program to push out the operating system.
C) can perfom the installation over a network share. D) can not install windows XP Professional unless he installs a CD-ROM drive in the computer systems that do not have them.
 
Answer & Explanation Answer: C) can perfom the installation over a network share.

Explanation:
Report Error

View Answer Report Error Discuss

0 2179
Q:

You are the database administrator of a SQL Server 2000 computer. The server contains your company's Accounts database. Hundreds of users access the database each day.Because you have had power interruptions in the past, you want to protect the physical integrity of the Accounts database. You do not want to slow down server operations.What should you do?

A) Create a database maintenance plan to check database integrity and make repairs each night. B) Enable the torn page detection database option for each database.
C) Disablewrite caching on all disk controllers. D) Ensure that write caching disk controllers have battery backups.
 
Answer & Explanation Answer: D) Ensure that write caching disk controllers have battery backups.

Explanation:

The scenario states that power interruptions have occurred in the past. By buying a battery backup solution for the disk controllers the power interruption problem would be prevented.

Report Error

View Answer Report Error Discuss

0 2177
Q:

You want to search for a specific shared folder object in Active Directory. Which tool should you use?

A) Search B) Windows Explorer
C) Active Directory Sites and Services D) Active Directory Users and Computers
 
Answer & Explanation Answer: D) Active Directory Users and Computers

Explanation:

To search for a specific shared folder in Active Directory, use Active Directory Users and computers. You can use Windows Explorer to browse Active Directory, but you can't use it to search for a specific  shared folder.

Report Error

View Answer Report Error Discuss

0 2171
Q:

Which Windows 2000 tool can you use to initiate the transfer of images from a digital camera to your Windows 2000 computer?

A) Imaging B) Wireless Link
C) Scanners and Cameras D) Sounds and Multimedia
 
Answer & Explanation Answer: A) Imaging

Explanation:

The Imaging application (Start => Programs => Accessories => Imaging) is the only windows 2000 application that can be used to initiate image transfer. You can use Wireless Link to configure how Windows 2000 will handle received image files, but you can't use Wireless Link to initiate the image transfer.

Report Error

View Answer Report Error Discuss

0 2125
Q:

You want to add an additional paging file to your Windows 2000 Server computer. Which tool should you use?

A) System B) Folder Options
C) Windows Explorer D) Add/Remove Programs
 
Answer & Explanation Answer: A) System

Explanation:

The System application is used to create, configure, and manage paging files.

Report Error

View Answer Report Error Discuss

0 2120
Q:

For most large companies, in terms of ease of network administration, what is the optimum number of Active Directory domains to use on their Windows 2000 network?

A) 1 B) 2
C) 3 D) More than 3
 
Answer & Explanation Answer: A) 1

Explanation:

Using a single domain greatly simplifies the administration of your network

Report Error

View Answer Report Error Discuss

0 2118
Q:

Which Event Viewer log can you use to view the results of auditing?

A) Application Log B) Security Log
C) System Log D) Directory Service Log
 
Answer & Explanation Answer: B) Security Log

Explanation:

Audited events are written to the Security Log in Event Viewer.

Report Error

View Answer Report Error Discuss

0 2100