1. Which are true regarding dynamic disks?
2. Which utilities are used to improve disk performance?
3. How to improve the performance of Windows XP Professional in one's computer?
4. Why does the administrator fail to rename the drive letter of the system partition in Basic Disk?
5. What do administrative shared folder names always end with?
6. User A in a network required the permissions to change the system time in Windows XP as workgroup. How should he be granted the above permissions without affecting others?
7. An error message is displayed 'Access is denied'. Troubleshoot this error message.
8. A basic disk has Windows 2000 professional installed on NTFS. When administrator converts it to dynamic disk and tries to install windows XP professional, installation fails. Identify the cause.
9. Internet Connection Firewall ( ICF) should be replaced with which of the following firewalls after installing Windows XP SP 2?
10. When the administrator tries to convert basic disk to dynamic disk from computer management, he finds no options for conversion. Identify the reason.
11. Which three additional features, among the following, are available in Windows XP Professional editions compared to the home edition?
12. Which tool is used for installing Win XP Professional onto multiple computers by using disk cloning?
13. What does the term 'member server' mean?
14. Choose the 24 bit format of IP Address in Decimal form.
15. A user in a network reports that someone in the network is sending him unwanted messages. How will the system administrator find out about the machine from where messages are generated?
16. A user in a company left the job. The administrator wants to decrypt all data because of loss of owner private key. Who can recover the decrypted data?
17. Which are the differences between NT DNS and 2000 DNS?
18. When can password reset disk be used?
19. What does 'Principle of Least Privilege' mean?
20. Which protocol/method is used to encrypt data over the network?
21. Which command is used to encrypt or decrypt files?
22. Which of the following protocols are used to establish a remote Desktop Connection?
23. Which protocols are used in authenticating RRAS users?
24. Where should the complete IRQ list in Windows XP be checked?
25. How can the priority of the processes be set?
26. What is the private IP range of Class-B?
27. Which feature is used at the folder level, so that any temporary copy of an encrypted file is also encrypted?
28. What does Author Mode mean in MMC (Microsoft Management Console)?
29. Why is a user not able to access the sharing and security permissions tab on folder?
30. Which protocol is used by Global catalog for searching objects in Domain?
31. How can you troubleshoot 'stop memory errors' and the drivers causing the errors?
32. What are the physical components of Active Directory?
33. How can the administrator access that folder?
34. Which command should be used for unattended installation on server1 if distribution share folder name is test located at server1?
35. Which command would be used to open registry?
36. Which items can be recovered if user account is deleted in Windows XP?
37. What is the binary form of 150.210.99.5?
38. What does represent when dir command is run on c
39. By which component can replication traffic be controlled and managed?
40. Which command is used to check the port status?
41. If a user gets 'Destination Host Unreachable' error, what is the root cause of message?
42. Which additional features are available in NTFS as compared to FAT?
43. Which protocol is used in class D?
44. How should the recovery console from a system be uninstalled?
45. Which command should be run to check the system file status?
46. Method to repair the following error - 'NTLDR is missing'?
47. How should the default Microsoft Error reporting feature in Windows XP be disabled?
48. Multiple display is configured for User A but one user application failed to display on the secondary display. Troubleshoot.
49. The administrator of XYZ company finds that one of the users in his network is trying to upload some unwanted material. He needs to prevent that user from uploading that immediately without effecting the work of other users who are accessing shared folders from the server. How should he disconnect that user without wasting time?
5G
Network Analysis
CCNP Routing
Hardware & Networking
MCTS: Configuring A DNS Zone Infrastructure
MCTS: Configuring IP Routing
Related MCQ's