Microsoft Exam 070-210 Preparation
Installing, Configuring, and Administering Microsoft Windows 2000 Professional.
For Exam 070-210 , you can read this book for reference:
MCSE Training Kit—Microsoft Windows 2000 Professional from Microsoft Press.
Here is Chapter and Appendix Overview:
This self-paced training course combines notes, hands-on procedures, and review questions to teach you how to install, configure, administer, and support Windows 2000 Professional. It is designed to be completed from beginning to end, but you can choose a customized track and complete only the sections that interest you. (See the next section, "Finding the Best Starting Point for You," for more information.) If you choose the customized track option, see the "Before You Begin" section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters refer to the appropriate chapters.
The book is divided into the following chapters:
The "About This Book" section contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete.
Chapter 1, "Introduction to Windows 2000," presents an overview of the Windows 2000 operating system and the four products that make up this family. It introduces some of the new features and benefits of Windows 2000 and explains why Windows 2000 is easier to use and manage and provides greater compatibility, file management capabilities, and security than previous versions of Windows. This chapter also provides an introduction to workgroups and domains.
Chapter 2, "Installing Windows 2000 Professional," presents a list of preinstallation tasks that you need to complete before you begin your installation, as well as the hardware requirements for installing Windows 2000 Professional. It then steps you through the process of installing from a CD-ROM, and as a hands-on exercise, has you install Windows 2000 Professional on your computer. Finally the chapter discusses installing Windows 2000 over the network and how to troubleshoot installation problems.
Chapter 3, "Using Microsoft Management Console and Task Scheduler," presents two of the primary administrative tools available in Windows 2000: the Microsoft Management Console (the MMC) and Task Scheduler. It defines custom consoles, console trees, details panes, snap-ins, and extensions, and discusses the differences between Author mode and User mode. It also explains how you can use custom consoles for remote administration and troubleshooting. The hands-on portion has you use the MMC to create custom consoles, and then add a snap-in to an existing custom console. In the second hands-on practice, you configure Task Scheduler to launch a program, at a specified time.
Chapter 4, "Using Windows Control Panel," presents some of the applications in Control Panel that you use to customize the hardware and software configuration for a computer. You use the System icon to configure hardware devices or services by creating and configuring hardware profiles. You also use it to configure performance options, environment variables, and startup and recovery settings. The hands-on practice allows you to change the paging file size and to add an environment variable. You use the Display icon to view or modify display properties. Windows 2000 supports a maximum of nine monitors. This chapter also includes a section on installing hardware, both Plug and Play hardware and non-Plug and Play hardware. It explains how to use the Add/Remove Hardware Wizard and how to manually install hardware.
Chapter 5, "Using the Registry," introduces the registry, the hierarchical database where Windows 2000 stores system configuration information. This chapter also presents an overview of Registry Editor, a tool that allows you to view and modify the registry. The hands-on practice has you use Registry Editor to view information in the registry, use the Find Key command to search the registry, modify the registry by adding a value to it, and save a subtree as a file so that you can use an editor, like Notepad, to search the file.
Chapter 6, "Managing Disks," presents an overview of Windows 2000 disk management. You can manage disks locally or on remote computers. You can create a custom console and add the Disk Management snap-in to it, or you can use the Disk Management snap-in included in the preconfigured Computer Management snap-in. The Disk Management snap-in provides shortcut menus to show you which tasks you can perform on the selected object, and it includes wizards to guide you through creating partitions and volumes and upgrading disks. The hands-on practice has you upgrade a basic disk to a dynamic disk, create a new volume, and mount a volume.
Chapter 7, "Installing and Configuring Network Protocols," presents the skills and knowledge necessary to configure Transmission Control Protocol/Internet Protocol (TCP/IP) and to install other network protocols, including NWLink, NetBIOS Enhanced User Interface (NetBEUI), and Data Link Control (DLC). The chapter also discusses the process for configuring network bindings. The hands-on practices allow you to verify your computer's configuration and then configure your computer to use a static IP address. Next you configure your computer to use a DHCP server to automatically assign an IP address to your computer, and test the Automatic Private IP Addressing feature in Windows 2000. Finally, you install and configure NWLink, change the binding order, unbind a protocol, and then bind a protocol.
Chapter 8, "Using the DNS Service," introduces Domain Name System (DNS), a distributed database that is used in TCP/IP networks to translate computer names to IP addresses. It also presents the skills and knowledge necessary to configure clients to use the DNS Service. In the hands-on practice, you configure a computer running Windows 2000 Professional to be a DNS client.
Chapter 9, "Introducing Active Directory Directory Services," presents the Windows 2000 directory service, Active Directory directory services. A directory service uniquely identifies users and resources on a network. Active Directory directory services provide a single point of network management, allowing you to add, remove, and relocate users and resources easily. Active Directory directory services are available only with the Windows 2000 Server family of products.
Chapter 10, "Setting Up and Managing User Accounts," introduces you to user accounts and how to plan your user accounts. It also presents the skills and knowledge necessary to create local user accounts and to set properties for them. In the hands-on practices, you create local user accounts. You then test the user accounts, modify some of the user account properties, and then test the modified user account properties.
Chapter 11, "Setting Up and Managing Groups," introduces you to groups and to group user accounts to allow for easier assignment of permissions. It also presents the skills and knowledge necessary to implement local groups and built-in groups. In the hands-on practice, you create local groups, add members to the local groups when you create them, and add members to the groups after the groups have been created. You delete a member from one of the groups, and then you delete one of the local groups that you created.
Chapter 12, "Setting Up and Configuring Network Printers," introduces you to the Windows 2000 printing terminology, as well as presenting the skills and knowledge necessary to set up and share network printers. This chapter also presents how to troubleshoot common printing problems that are associated with setting up network printers. In the hands-on practice, you use the Add Printer wizard to install and share a local printer. This chapter also introduces printer pools and setting priorities.
Chapter 13, "Administering Network Printers," presents the four major types of tasks involved with administering network printers: managing printers, managing documents, troubleshooting printers, and performing tasks that require the Manage Printers permission. This chapter also explains how Microsoft Windows 2000 allows you to control printer usage and administration by assigning permissions. In the hands-on practices, you assign forms to paper trays, set up a separator page, and take ownership of a printer. You also print a document, set a notification for a document, change the priority for a document, and then cancel a document.
Chapter 14, "Securing Resources with NTFS Permissions," introduces the NTFS folder and file permissions and explains how to assign them to user accounts and groups. It explains how moving or copying files and folders affects NTFS file and folder permissions. It also explains how to troubleshoot common resource access problems. In the hands-on practices, you plan and apply NTFS permissions for folders and files based on business scenarios, and then test them. You also observe the effects of taking ownership of a file, and determine the effects of permission and ownership when you copy or move files.
Chapter 15, "Administering Shared Folders," explains how to share folders so that the folders and their contents are accessible over the network. This chapter also explains how sharing folders provides another way to secure file resources, one that can be used on FAT or FAT32 partitions. In the hands-on exercises, you share a folder, determine the current permissions for the shared folder and assign shared folder permissions to groups, and stop sharing a folder. In the optional hands-on exercises, you connect to a shared folder and test the combined effects of shared folder permissions and NTFS permissions.
Chapter 16, "Auditing Resources and Events," introduces the Microsoft Windows 2000 Local Security Policy and Group Policy. One of the features controlled by Local Security Policy or Group Policy is auditing. Auditing is a tool for maintaining network security that allows you to track user activities and systemwide events. This chapter also introduces audit policies and what you need to consider before you set one up, as well as how to set up auditing on resources and how to maintain security logs. In the hands-on practices, you plan an audit policy for your computer, set up an audit policy by enabling auditing on certain events, view the security log file, and configure Event Viewer to overwrite events when the log file is filled.
Chapter 17, "Configuring Group Policy and Local Security Policy," explains how to use the Windows 2000 Local Security Policy or Group Policy snap-in to improve the security on your computer. This chapter explains the Windows 2000 Account Policies and some of the available Security Options. In the first hands-on practice, you configure and test one of the Account Policies settings, Minimum Password Length. In the second hands-on practice, you configure and test three of the Security Policy settings.
Chapter 18, "Managing Data Storage," introduces data storage management on NTFS-formatted volumes. Data management includes using compression, using disk quotas, increasing the security of files and folders on your computer by using the Encrypting File System (EFS), and defragmenting a disk. In the hands-on practice, you compress files and folders, display the compressed files and folders in a different color, uncompress a file, and test the effects that copying and moving files have on compression. You also configure default quota management settings to limit the amount of data users can store on a drive and configure a custom quota setting for a user account. You test the disk quota and then turn off quota management. Finally, you encrypt a file and then attempt to access it.
Chapter 19, "Backing Up and Restoring Data," introduces the Windows Backup tool that allows you to back up and restore data. It explains the five types of backup—normal, copy, incremental, differential, and daily—and how these can be combined to meet your backup needs. In the hands-on practices, you use the Backup Wizard to back up some files to your hard disk, and you create a backup job to perform a backup operation later by using Task Scheduler. You then restore some of the files you backed up.
Chapter 20, "Monitoring Access to Network Resources," prepares you to monitor network resources. You learn about the Shared Folders snap-in and how to use it to view and create shares. You also learn how to use the Shared Folders snap-in to view sessions and open files and how to use it to disconnect users from shared folders. In the hands-on practices, you use the Shared Folders snap-in to view the shared folders, to open files, and to disconnect all users from all open files. You also use the Shared Folders snap-in to create a new share and then stop sharing it.
Chapter 21, "Configuring Remote Access," presents the new protocols for use with remote access, and it provides an understanding of the new options and interfaces in Windows 2000 to connect computers and configure protocols correctly to meet all your remote access requirements. In the hands-on practices, you use Network And Dial-up Connections to launch the Network Connection wizard to configure an inbound dial-up connection and allow Virtual Private Connections, and then to configure an outbound connection.
Chapter 22, "The Windows 2000 Boot Process," introduces the Microsoft Windows 2000 boot process for Intel-based computers. It also introduces the Boot.ini file and explains how to create a Windows 2000 boot disk. In the hands-on practice, you create a Windows 2000 boot disk for Intel-based computers and then test it. In addition, you repair a boot problem by using a Windows 2000 boot disk and by using the Last Known Good Configuration option.
Chapter 23, "Deploying Windows 2000," introduces Setup Manager and the system preparation tools. Setup Manager makes it easy to create the Unattend.txt files that are necessary for scripted installations, and the System Preparation tool helps you prepare master disk images for efficient mass installations. This chapter also explains remote installations, outlines how to install and configure remote installation servers, lists the client requirements for remote installations, and lists the steps to create boot floppies and a remote boot disk to help you efficiently deploy Windows 2000 Professional. Finally, this chapter explains how to upgrade previous versions of Windows to Windows 2000 and how to deploy service packs.
Chapter 24, "Configuring Windows 2000 for Mobile Computers," introduces the new features in Microsoft Windows 2000 Professional that make mobile computing easier to do. The features discussed in this chapter include using offline folders and files, using Synchronization Manager, configuring and using power schemes, enabling Hibernate mode, and enabling Advanced Power Management.
Chapter 25, "Implementing, Managing, and Troubleshooting Hardware Devices and Drivers," introduces Device Manager and explains how you use it to manage and troubleshoot devices. It also introduces the System Information snap-in and explains how it helps you manage your system. You learn how to use Device Manager, the System File Checker utility, and the Windows Signature Verification utility to configure, monitor, and troubleshoot driver signing. You also learn how to use Device Manager to upgrade your computer from a single processor to a multiprocessor system, and you learn how to use Performance Console as a tool to monitor system performance. Finally, you learn how to install, configure, and troubleshoot miscellaneous devices, including fax support, scanners, cameras, and mouse devices.
Appendix A, "Questions and Answers," lists all of the practice questions and review questions from the book, showing the chapter and section where the question appears, and the suggested answer.
Appendix B, "Creating Setup Boot Disks," outlines the steps to create the Windows 2000 Setup disks for computers that don't support booting from a CD-ROM drive.
Appendix C, "Understanding the DHCP Service," provides an introduction to the DHCP service.
Appendix D, "Managing Backup Tapes," provides an introduction to rotating and archiving backup tapes.
The glossary provides definitions for many of the key words and concepts presented in the course. It also contains some additional basic networking terminology.
Sample Question & Answer (Q&A) for Exam 070-086:
QUESTION 1
You are the senior desktop administrator for Certkiller . Your new trainee needs your advice. He needs to install Windows 2000 Professional on 35 new computers on the company LAN and has done some preparations. First, he created a distribution folder on the network server and a network boot disk to install Windows 2000 Professional from the distribution folder. Now he needs to create the batch file, which the network boot disk will execute to start the installation. The batch file must contain a source path and temporary drive for the installation files. He also needs the accessibility options to be installed with the batch file. The batch file must execute a hardware-specific application to run after the GUI-mode Setup has completed.
Which command should you tell him to use in the batch file?
A. Z:\i386\winnt /s:z:\i386 /t:d: /a /e:z:\hardware\setup.exe
B. Z:\i386\winnt /s:z:\i386 /rwinnt.tmp /a /e:z:\hardware\setup.exe
C. Z:\i386\winnt32 /s:z:\i386 /tempdrive:d /cmd:z\hardware\setup.exe
D. Z:\i386\winnt32 /s:z:\i386 /cmdcons:z:\hardware\setup /makelocalsource
Answer: A
QUESTION 2
You have received a request from the laboratory in your company to upgrade a Windows NT 4.0 Workstation. The users wish to use Windows 2000 Professional for everyday work. However, after studying the documentation for some laboratory equipment connected to the computer you find out that the equipment ONLY works under Windows NT 4.0 Workstation. You need to configure a multiboot system with Windows NT Workstation and Windows 2000 Professional.
What should you do?
A. When installing Windows 2000 Professional run chkdisk in Windows NT Workstation.
B. Disable the disk compression in Windows NT Workstation.
C. Install service pack four or later in Windows NT Workstation.
D. Install the distributed file system client on the Windows NT Workstation.
Answer: C
QUESTION 3
You are the administrator of a Windows 2000 network with 75 Windows NT Workstation 4.0 computers. You have received 50 new PXE-compliant computers and wish to add them to the network as soon as possible. All the new computers have identical hardware. You deploy Windows 2000 Professional to the 50 computers by using a RIS image. The first 10 computers successfully install Windows 2000 Professional. However, you cannot install Windows 2000 Professional on remaining 40 computers.
What should you do?
A. Configure the DHCP scope to add additional IP addresses.
B. Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.
C. Modify the startup sequence in the CMOS of the remaining computers.
D. Create computer accounts on the remaining computers in the Active Directory.
Answer: A
QUESTION 4
You have been assigned the task to install Windows 2000 Professional on 45 new computers on Certkiller 's network. You start by installing Windows 2000 Professional on one of the new computers. Microsoft Office 97, a virus scanner and other company-standard applications is installed by logging in as the local Administrator on the computer. Next you create a RIS image
of the newly configured computer. You have to ensure that the standard applications will be accessible to the user when the user first logs on to the network on the computers installed with this RIS image.
What should you do?
A. Run Rbfg.exe before installing the standard applications.
B. Run RIPrep.exe before installing the standard applications.
C. Copy the All Users profile to the Default Users profile.
D. Copy the local Administrator account profile to the Default Users profile
Answer: D
QUESTION 5
Certkiller has received a shipment with new computers that have to be installed with Windows 2000 Professional as soon as possible. 30 of the new computers have PXE-compliant NICs (Network Interface Cards) while 35 of the new computer are
non-PXE-compliant. All hardware in the new computers is included on the current hardware compatibility list (HCL). The administrator of Certkiller 's RIS server has created and loaded a RIS image that you will use to install these new computers. When you start the 65 computers you discover that only the 30 PXE-Compliant computers can connect to the RIS server. You need to install Windows 200 Professional on all 65 computers by using RIS.
What should you do?
A. Run Rbfg.exe to create a Non-PXE-compliant startup disk.
B. Run Riprep.exe to create a Non-PXE complaint startup disk.
C. Grant the Everyone group NTFS Read permission for the RIS image.
D. Grant the Administrators group NTFS Read permission for the RIS image.
Answer: A
Installing, Configuring, and Administering Microsoft Windows 2000 Professional.
For Exam 070-210 , you can read this book for reference:
MCSE Training Kit—Microsoft Windows 2000 Professional from Microsoft Press.
Here is Chapter and Appendix Overview:
This self-paced training course combines notes, hands-on procedures, and review questions to teach you how to install, configure, administer, and support Windows 2000 Professional. It is designed to be completed from beginning to end, but you can choose a customized track and complete only the sections that interest you. (See the next section, "Finding the Best Starting Point for You," for more information.) If you choose the customized track option, see the "Before You Begin" section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters refer to the appropriate chapters.
The book is divided into the following chapters:
The "About This Book" section contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete.
Chapter 1, "Introduction to Windows 2000," presents an overview of the Windows 2000 operating system and the four products that make up this family. It introduces some of the new features and benefits of Windows 2000 and explains why Windows 2000 is easier to use and manage and provides greater compatibility, file management capabilities, and security than previous versions of Windows. This chapter also provides an introduction to workgroups and domains.
Chapter 2, "Installing Windows 2000 Professional," presents a list of preinstallation tasks that you need to complete before you begin your installation, as well as the hardware requirements for installing Windows 2000 Professional. It then steps you through the process of installing from a CD-ROM, and as a hands-on exercise, has you install Windows 2000 Professional on your computer. Finally the chapter discusses installing Windows 2000 over the network and how to troubleshoot installation problems.
Chapter 3, "Using Microsoft Management Console and Task Scheduler," presents two of the primary administrative tools available in Windows 2000: the Microsoft Management Console (the MMC) and Task Scheduler. It defines custom consoles, console trees, details panes, snap-ins, and extensions, and discusses the differences between Author mode and User mode. It also explains how you can use custom consoles for remote administration and troubleshooting. The hands-on portion has you use the MMC to create custom consoles, and then add a snap-in to an existing custom console. In the second hands-on practice, you configure Task Scheduler to launch a program, at a specified time.
Chapter 4, "Using Windows Control Panel," presents some of the applications in Control Panel that you use to customize the hardware and software configuration for a computer. You use the System icon to configure hardware devices or services by creating and configuring hardware profiles. You also use it to configure performance options, environment variables, and startup and recovery settings. The hands-on practice allows you to change the paging file size and to add an environment variable. You use the Display icon to view or modify display properties. Windows 2000 supports a maximum of nine monitors. This chapter also includes a section on installing hardware, both Plug and Play hardware and non-Plug and Play hardware. It explains how to use the Add/Remove Hardware Wizard and how to manually install hardware.
Chapter 5, "Using the Registry," introduces the registry, the hierarchical database where Windows 2000 stores system configuration information. This chapter also presents an overview of Registry Editor, a tool that allows you to view and modify the registry. The hands-on practice has you use Registry Editor to view information in the registry, use the Find Key command to search the registry, modify the registry by adding a value to it, and save a subtree as a file so that you can use an editor, like Notepad, to search the file.
Chapter 6, "Managing Disks," presents an overview of Windows 2000 disk management. You can manage disks locally or on remote computers. You can create a custom console and add the Disk Management snap-in to it, or you can use the Disk Management snap-in included in the preconfigured Computer Management snap-in. The Disk Management snap-in provides shortcut menus to show you which tasks you can perform on the selected object, and it includes wizards to guide you through creating partitions and volumes and upgrading disks. The hands-on practice has you upgrade a basic disk to a dynamic disk, create a new volume, and mount a volume.
Chapter 7, "Installing and Configuring Network Protocols," presents the skills and knowledge necessary to configure Transmission Control Protocol/Internet Protocol (TCP/IP) and to install other network protocols, including NWLink, NetBIOS Enhanced User Interface (NetBEUI), and Data Link Control (DLC). The chapter also discusses the process for configuring network bindings. The hands-on practices allow you to verify your computer's configuration and then configure your computer to use a static IP address. Next you configure your computer to use a DHCP server to automatically assign an IP address to your computer, and test the Automatic Private IP Addressing feature in Windows 2000. Finally, you install and configure NWLink, change the binding order, unbind a protocol, and then bind a protocol.
Chapter 8, "Using the DNS Service," introduces Domain Name System (DNS), a distributed database that is used in TCP/IP networks to translate computer names to IP addresses. It also presents the skills and knowledge necessary to configure clients to use the DNS Service. In the hands-on practice, you configure a computer running Windows 2000 Professional to be a DNS client.
Chapter 9, "Introducing Active Directory Directory Services," presents the Windows 2000 directory service, Active Directory directory services. A directory service uniquely identifies users and resources on a network. Active Directory directory services provide a single point of network management, allowing you to add, remove, and relocate users and resources easily. Active Directory directory services are available only with the Windows 2000 Server family of products.
Chapter 10, "Setting Up and Managing User Accounts," introduces you to user accounts and how to plan your user accounts. It also presents the skills and knowledge necessary to create local user accounts and to set properties for them. In the hands-on practices, you create local user accounts. You then test the user accounts, modify some of the user account properties, and then test the modified user account properties.
Chapter 11, "Setting Up and Managing Groups," introduces you to groups and to group user accounts to allow for easier assignment of permissions. It also presents the skills and knowledge necessary to implement local groups and built-in groups. In the hands-on practice, you create local groups, add members to the local groups when you create them, and add members to the groups after the groups have been created. You delete a member from one of the groups, and then you delete one of the local groups that you created.
Chapter 12, "Setting Up and Configuring Network Printers," introduces you to the Windows 2000 printing terminology, as well as presenting the skills and knowledge necessary to set up and share network printers. This chapter also presents how to troubleshoot common printing problems that are associated with setting up network printers. In the hands-on practice, you use the Add Printer wizard to install and share a local printer. This chapter also introduces printer pools and setting priorities.
Chapter 13, "Administering Network Printers," presents the four major types of tasks involved with administering network printers: managing printers, managing documents, troubleshooting printers, and performing tasks that require the Manage Printers permission. This chapter also explains how Microsoft Windows 2000 allows you to control printer usage and administration by assigning permissions. In the hands-on practices, you assign forms to paper trays, set up a separator page, and take ownership of a printer. You also print a document, set a notification for a document, change the priority for a document, and then cancel a document.
Chapter 14, "Securing Resources with NTFS Permissions," introduces the NTFS folder and file permissions and explains how to assign them to user accounts and groups. It explains how moving or copying files and folders affects NTFS file and folder permissions. It also explains how to troubleshoot common resource access problems. In the hands-on practices, you plan and apply NTFS permissions for folders and files based on business scenarios, and then test them. You also observe the effects of taking ownership of a file, and determine the effects of permission and ownership when you copy or move files.
Chapter 15, "Administering Shared Folders," explains how to share folders so that the folders and their contents are accessible over the network. This chapter also explains how sharing folders provides another way to secure file resources, one that can be used on FAT or FAT32 partitions. In the hands-on exercises, you share a folder, determine the current permissions for the shared folder and assign shared folder permissions to groups, and stop sharing a folder. In the optional hands-on exercises, you connect to a shared folder and test the combined effects of shared folder permissions and NTFS permissions.
Chapter 16, "Auditing Resources and Events," introduces the Microsoft Windows 2000 Local Security Policy and Group Policy. One of the features controlled by Local Security Policy or Group Policy is auditing. Auditing is a tool for maintaining network security that allows you to track user activities and systemwide events. This chapter also introduces audit policies and what you need to consider before you set one up, as well as how to set up auditing on resources and how to maintain security logs. In the hands-on practices, you plan an audit policy for your computer, set up an audit policy by enabling auditing on certain events, view the security log file, and configure Event Viewer to overwrite events when the log file is filled.
Chapter 17, "Configuring Group Policy and Local Security Policy," explains how to use the Windows 2000 Local Security Policy or Group Policy snap-in to improve the security on your computer. This chapter explains the Windows 2000 Account Policies and some of the available Security Options. In the first hands-on practice, you configure and test one of the Account Policies settings, Minimum Password Length. In the second hands-on practice, you configure and test three of the Security Policy settings.
Chapter 18, "Managing Data Storage," introduces data storage management on NTFS-formatted volumes. Data management includes using compression, using disk quotas, increasing the security of files and folders on your computer by using the Encrypting File System (EFS), and defragmenting a disk. In the hands-on practice, you compress files and folders, display the compressed files and folders in a different color, uncompress a file, and test the effects that copying and moving files have on compression. You also configure default quota management settings to limit the amount of data users can store on a drive and configure a custom quota setting for a user account. You test the disk quota and then turn off quota management. Finally, you encrypt a file and then attempt to access it.
Chapter 19, "Backing Up and Restoring Data," introduces the Windows Backup tool that allows you to back up and restore data. It explains the five types of backup—normal, copy, incremental, differential, and daily—and how these can be combined to meet your backup needs. In the hands-on practices, you use the Backup Wizard to back up some files to your hard disk, and you create a backup job to perform a backup operation later by using Task Scheduler. You then restore some of the files you backed up.
Chapter 20, "Monitoring Access to Network Resources," prepares you to monitor network resources. You learn about the Shared Folders snap-in and how to use it to view and create shares. You also learn how to use the Shared Folders snap-in to view sessions and open files and how to use it to disconnect users from shared folders. In the hands-on practices, you use the Shared Folders snap-in to view the shared folders, to open files, and to disconnect all users from all open files. You also use the Shared Folders snap-in to create a new share and then stop sharing it.
Chapter 21, "Configuring Remote Access," presents the new protocols for use with remote access, and it provides an understanding of the new options and interfaces in Windows 2000 to connect computers and configure protocols correctly to meet all your remote access requirements. In the hands-on practices, you use Network And Dial-up Connections to launch the Network Connection wizard to configure an inbound dial-up connection and allow Virtual Private Connections, and then to configure an outbound connection.
Chapter 22, "The Windows 2000 Boot Process," introduces the Microsoft Windows 2000 boot process for Intel-based computers. It also introduces the Boot.ini file and explains how to create a Windows 2000 boot disk. In the hands-on practice, you create a Windows 2000 boot disk for Intel-based computers and then test it. In addition, you repair a boot problem by using a Windows 2000 boot disk and by using the Last Known Good Configuration option.
Chapter 23, "Deploying Windows 2000," introduces Setup Manager and the system preparation tools. Setup Manager makes it easy to create the Unattend.txt files that are necessary for scripted installations, and the System Preparation tool helps you prepare master disk images for efficient mass installations. This chapter also explains remote installations, outlines how to install and configure remote installation servers, lists the client requirements for remote installations, and lists the steps to create boot floppies and a remote boot disk to help you efficiently deploy Windows 2000 Professional. Finally, this chapter explains how to upgrade previous versions of Windows to Windows 2000 and how to deploy service packs.
Chapter 24, "Configuring Windows 2000 for Mobile Computers," introduces the new features in Microsoft Windows 2000 Professional that make mobile computing easier to do. The features discussed in this chapter include using offline folders and files, using Synchronization Manager, configuring and using power schemes, enabling Hibernate mode, and enabling Advanced Power Management.
Chapter 25, "Implementing, Managing, and Troubleshooting Hardware Devices and Drivers," introduces Device Manager and explains how you use it to manage and troubleshoot devices. It also introduces the System Information snap-in and explains how it helps you manage your system. You learn how to use Device Manager, the System File Checker utility, and the Windows Signature Verification utility to configure, monitor, and troubleshoot driver signing. You also learn how to use Device Manager to upgrade your computer from a single processor to a multiprocessor system, and you learn how to use Performance Console as a tool to monitor system performance. Finally, you learn how to install, configure, and troubleshoot miscellaneous devices, including fax support, scanners, cameras, and mouse devices.
Appendix A, "Questions and Answers," lists all of the practice questions and review questions from the book, showing the chapter and section where the question appears, and the suggested answer.
Appendix B, "Creating Setup Boot Disks," outlines the steps to create the Windows 2000 Setup disks for computers that don't support booting from a CD-ROM drive.
Appendix C, "Understanding the DHCP Service," provides an introduction to the DHCP service.
Appendix D, "Managing Backup Tapes," provides an introduction to rotating and archiving backup tapes.
The glossary provides definitions for many of the key words and concepts presented in the course. It also contains some additional basic networking terminology.
Sample Question & Answer (Q&A) for Exam 070-086:
QUESTION 1
You are the senior desktop administrator for Certkiller . Your new trainee needs your advice. He needs to install Windows 2000 Professional on 35 new computers on the company LAN and has done some preparations. First, he created a distribution folder on the network server and a network boot disk to install Windows 2000 Professional from the distribution folder. Now he needs to create the batch file, which the network boot disk will execute to start the installation. The batch file must contain a source path and temporary drive for the installation files. He also needs the accessibility options to be installed with the batch file. The batch file must execute a hardware-specific application to run after the GUI-mode Setup has completed.
Which command should you tell him to use in the batch file?
A. Z:\i386\winnt /s:z:\i386 /t:d: /a /e:z:\hardware\setup.exe
B. Z:\i386\winnt /s:z:\i386 /rwinnt.tmp /a /e:z:\hardware\setup.exe
C. Z:\i386\winnt32 /s:z:\i386 /tempdrive:d /cmd:z\hardware\setup.exe
D. Z:\i386\winnt32 /s:z:\i386 /cmdcons:z:\hardware\setup /makelocalsource
Answer: A
QUESTION 2
You have received a request from the laboratory in your company to upgrade a Windows NT 4.0 Workstation. The users wish to use Windows 2000 Professional for everyday work. However, after studying the documentation for some laboratory equipment connected to the computer you find out that the equipment ONLY works under Windows NT 4.0 Workstation. You need to configure a multiboot system with Windows NT Workstation and Windows 2000 Professional.
What should you do?
A. When installing Windows 2000 Professional run chkdisk in Windows NT Workstation.
B. Disable the disk compression in Windows NT Workstation.
C. Install service pack four or later in Windows NT Workstation.
D. Install the distributed file system client on the Windows NT Workstation.
Answer: C
QUESTION 3
You are the administrator of a Windows 2000 network with 75 Windows NT Workstation 4.0 computers. You have received 50 new PXE-compliant computers and wish to add them to the network as soon as possible. All the new computers have identical hardware. You deploy Windows 2000 Professional to the 50 computers by using a RIS image. The first 10 computers successfully install Windows 2000 Professional. However, you cannot install Windows 2000 Professional on remaining 40 computers.
What should you do?
A. Configure the DHCP scope to add additional IP addresses.
B. Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.
C. Modify the startup sequence in the CMOS of the remaining computers.
D. Create computer accounts on the remaining computers in the Active Directory.
Answer: A
QUESTION 4
You have been assigned the task to install Windows 2000 Professional on 45 new computers on Certkiller 's network. You start by installing Windows 2000 Professional on one of the new computers. Microsoft Office 97, a virus scanner and other company-standard applications is installed by logging in as the local Administrator on the computer. Next you create a RIS image
of the newly configured computer. You have to ensure that the standard applications will be accessible to the user when the user first logs on to the network on the computers installed with this RIS image.
What should you do?
A. Run Rbfg.exe before installing the standard applications.
B. Run RIPrep.exe before installing the standard applications.
C. Copy the All Users profile to the Default Users profile.
D. Copy the local Administrator account profile to the Default Users profile
Answer: D
QUESTION 5
Certkiller has received a shipment with new computers that have to be installed with Windows 2000 Professional as soon as possible. 30 of the new computers have PXE-compliant NICs (Network Interface Cards) while 35 of the new computer are
non-PXE-compliant. All hardware in the new computers is included on the current hardware compatibility list (HCL). The administrator of Certkiller 's RIS server has created and loaded a RIS image that you will use to install these new computers. When you start the 65 computers you discover that only the 30 PXE-Compliant computers can connect to the RIS server. You need to install Windows 200 Professional on all 65 computers by using RIS.
What should you do?
A. Run Rbfg.exe to create a Non-PXE-compliant startup disk.
B. Run Riprep.exe to create a Non-PXE complaint startup disk.
C. Grant the Everyone group NTFS Read permission for the RIS image.
D. Grant the Administrators group NTFS Read permission for the RIS image.
Answer: A
0 Comments:
<< Home | << Add a comment