Sample paper of Installing and Configuring windows (bc0022 and mc0029(B)

Installing and Configuring windows 2k-Block 1
Q1. The Operating System family for windows 2000.
Ans. a. windows 2000 professional b. windows 2000 server c. windows 2000 advanced server. d. windows 2000 data center server. E. All Of These
Q2. matching
a. Dynamic Disks:- 1. This is a client authentication process.
b. winnt.exe & winnt32.exe:- 2. Windows 2000 operating system provides Dynamic disks facility
c. Kerberos version 5 protocol:- 3. In windows 2000
Ans. A. a=2,b=3,c=1 b. a=3,b=2,c=1 C. a=2, b=3,c=1 b. none of these
Q3.-------------is a storehouse of information about various types of network objects, including, including printers, shared folders, user accounts and computers.
Ans. a. non active Diretory B. Active Directory c. both a& b d.None of these
Q4. Track and control disk space usage for partitions volumes.
Ans. a. Distributed file system(DFs) B. Disk Quotas c. Smart cards d. Internet Protocol Security(IPSec)
Q5. ----------- is an integral part of the windows 2000 operating systems.
Ans. a. plug &play feature b. Enhancing print capabilities C. Internet Explorer d.None
Q6. Which include the -----------------of the operating system or environment.
Ans. a. Application environments B. Application Programming Interface(API) c. Non application Programming d. Non application environment
Q7.The operating system environments supported by windows 2000 include.
Ans. 1. MS-DOS applications b. 16-Bit windows applications: c.32-bit windows applications: d. POSIX applications: E. All of these
Q8.this is a 32 –Bit desktop operating system in Windows 2000 family.
Ans. a. Windows 2000 Server B. Windows 2000 Professional c.windows 2000 advanced server
d. windows 2000 data center server
Q9.This supports two new file management feature of windows 2000 family.
Ans. a. Distributed files systems(DFs) b. Disk Quotas C. Both A & B d. None of these
Q10.Windows 2000 advanced server also includes windows clustering, connecting multiple servers to appear as a single computer.
Ans. a. High availability b. Load Balancing C. Both A & B d.None of these
Q11.This feature lowers down the over utilization of computer in a cluster.
Ans. a. High availability B. Load Balancing c. Both a & b d. None of these
Q12.VPN stands
Ans.a.Virtual private Network b. very private Network c.virtual personal Network d.Personal private Network
Q13.ATM Stands
Ans. a. Active Transfer Mode B. Asynchronous Transfer Mode c. Actual Transfer Mode d. None of these
Q14 Minimum Hardware Requirements:-
Ans. a. CPU-Pentium 133 MHz (Recommended Pentium I I or higher) b. Networking-NIC E. All of these
c. Memory-64 MB(Recommended 128 MB or higher) d.Hard Disk Space-1.2 GB(Recommended 4GB or higher)
Q15. The Minimum hardware requirements of Windows 2000 Advanced Server are Similar to Windows 2000 Server.
Ans. A.Minimum Hardware Requirements b. maximum Hardware Requirements c. Both a&b d.None of these
Q16.Microsoft ----------------------------is again a 32-bit operating system is the most powerful of the Windows 2000 operating system, Microsoft has ever offered,with all features of windows 2000 advanced server.
Ans. A. windows 2000 Data Center Server b. window 98 data center server c. Both a & b d.None of these
Q17. Windows 2000 is most powerful network operating system in windows family.

Ans. A. Managing User Account b. Management User Account c. User Accout d. None of these
Q18. Basically user accounts are of two types:-
Ans. A. Domain User Accounts& Local User Acccounts b. Domain user & Not user accounts
c. undomain user accounts& local user accounts d. None of these
Q19.This is the process by which, system validates the user’s logon information.
Ans. A. Authentication process b. User Authentication process c. both a & b d. None of these
Q20. Windows 2000 supports different authentication protocols:-
Ans. a. Kerberos V5 b. Windows NT LAN Manger(NTLM) c. Secure Sockets layer/Transport layer Security(SSL/TLS) D. All of These
Q21.This is an internet standard security protocol for handling authentication of user or system identity.
Ans. a. NTLM b. SSL/TLS C. Kerberos V5 d. None of these
Q22. Once a User is logged on to the computer, he can access the entire network and its resources with respect to the permission he has.
Ans. a. Network process B. Network Authentication Process c. Authentication process d. All of these
Q23. Windows 2000 also provides built in user accounts, like administrator and guest to perform administrative tasks or to gain access to network resources.
Ans. a.Built-in account B. Built-in User Account c. user account d. Domain Account
Q24. Following naming convention must be followed while creating a user account.
Ans. a. user names should be small and descriptive b. user name should be descriptive c. use only alphanumeric characters d. user account should be unique E. All of These
Q25. To configure a local user account, right click on the account, click properties from shortcut. A dialog box appears
With at least following tabs.
Ans. a. General b. Member of c. Profile d. Dial-in E. All of These
Q26. These are general in nature and same that we configured at the time of creating local user account.
Ans. A. General b. Member of c. Profile d. Dial-in
Q27. is used genrally to configure dial in properties for the local user account.
Ans. a. General b. Member of c. Profile D. Dial-in
Q28 When we have bigger size of network, their configuring permission individually becomes tedious job for administrator.
Ans. a. General B. Member Of c. Profile d. Dial-in
Q29 Configuring Domain User Accounts can have the following tabs once you click the properties dialog box as
Ans. a. General b. Address c. Account D. All of These
Q30.In the account tab, ten options are there to configure domain user account. Some are already discussed in local user accounts.
Ans. a. Store password using reversible encryption b.use DES encryption types for this account
c. Account usage D. All of these
Q31. Two options are there in account tab i.e. Logon hours and logon to as -----------------
Ans. a. Logon Hours b. Log On To C.Both A&B d. None of these
Q32. When the administrator rename nay account, all the properties remain as they are local user account can be renamed through my computer in local computer and domain user accounts through active Directory
Ans. a. Deleting B. Renaming c. Both a and b d. None of these
Q33. To remove accounts permanenty, delete a user account.
Ans. a. Renaming b. Deleting & Renaming C. Deleting d .None of these
Q34. In network administration it has been fined that numbers of user accounts are similar in nature with respect to their properties and access to network resources.
Ans. A. Managing Groups b. recourses Groups c. resources Groups d. All of these
Q34. Built-in Groups are.
Ans. a. Administrators b. Back up operators c. Guests and Users d. Power users and Replicator E. All of These
Q35. Built in Global Groups and on all computers in the windows 2000 domain.
Ans. a. Domain users b. Domain Admins c. Domain Guests D. All of These
Q36 -----------------------do not have their own permissions; they get their permissions form their parent built in domain local groups.
Ans. A. Built-in Global Groups b. Built-in universal Groups c. Built-in Local Groups d.Built-in System Groups
Q37.Likewise Built-in Global Group’s, ---------------------also get their permissions from their parent groups.
Ans. a.Built-in Global Groups B. Built-in Universal Groups c. Built-in Local Groups d.Built-in System Groups
Q38.Members of this universal group can modify the active Directory schema.
Ans. a. Enterprise Admins B. Schema Admins c. both a & b d. None of these
Q39. System groups are created by Windows 2000 operating system by default for some specific purpose.
Ans. a.Built-in Global Groups b. Built-in Universal Groups c. Built-in Local Groups D.Built-in System Groups
Q40. Built-in System Groups are given below:-
Ans. a. Everyone Group b. Authenticated users c. creator Owner & Network d. Interactive & System E.All of these
Q41. matching the following
a. Server Operators 1. Members of this domain can manage active Directory and all the resources in the enter
prise network.
b. Accounts Operators 2. Members of this group manage servers and disk resources
c. Administrators 3. Members of this group manage user and group accounts in the active Directory
d. Print operators 4.Members of this group can manage printers and print documents.
e. Backup operators 5.Members of this group manage backup devices, support backup and restore data.

Ans. A. a-2,b-3,c-1,d-4,e-5 b. a-3,b-2,c-4,d-1,e-5 c. a-1,b-2,c-3,d-4,e-5 d. None of these
Q42. a security group that can contain universal groups, global groups, and accounts from any domain in the domain tree or forest.
Ans. A. Domain Local Groups b.Global Groups c. Universal Groups d. Distribution Groups
Q43. When making a user member of the groups the following impact arises.
Ans. a. Logon impact b. Group replication c. Bandwidth D. All of These
Q44.Roaming User profiles are of two types
Ans.a. Personal User Profiles b. Mandatory user profiles. C. Both A & B d. None of these
Q45. The User profile includes the Following Folders:-
Ans. a. Application Data b. Cookies c. Desktop d. Local setting e. Favorites F. All Of These
Q46. This seldom-used hidden folder can contain shortcuts to item in the printers and Faxes folder
Ans. a. NetHood B. PrintHood c. SendTo d. Start Menu e. All of these
Q47. An Advanced file System Designed for use specifically within the windows 2000 operating System.
Ans. A. NTFS File System b. NTFS Permissions c. NTFS Files & Folder Permissions d. None of these
Q48. There are two types of NTFS Permissions:-
Ans. a. NTFS Folder Permissions b. NTFS File permissions C. Both A & B d. None of these
Q49. Permission on an object that are automatically inherited from its parent object.
Ans. A. Inherited Permissions b. Inherited File Permissions c. Both a& b d. None of these
Q50. Read Permission Allows;
Ans. a. Viewing file names and subfolder names b. Traversing to subfolders c. Viewing data in files d. Running program files E. All of These
Q51. Change permission allows all read permissions, plus:-
Ans. a. Adding files and subfolders b. Changing data in files c. deleting subfolders and files D. All of These
Q52 Accessing shared folders:-
Ans.a. My Network Place b. By Run on the Start Menu C. Both A & B d. None of these
Q53. A share that allows administrative personnel to connect to the root directory of a storage device.
Ans. a. Admin$ B. Drive Letter$ c. IPC$ d. Print$
Q54. Disk Quotas monitor the partition used by individual user, each user’s utilization of disk space does not affect the disk quotas for other users of the same volume.
Ans. A. Monitoring b.unMonitoring c. Disk quotas management d. None of these
Q55.Network resources that are used by multiple users are typically installed in central location.
Ans. A. Shared Folders b. Computer Management c. unshared Folders d. All of these
Q56.Share folders provide following three basic information regarding resource management:-
Ans. a. Share b. Sessions c. open Files D. All of These
Q57. In the windows 2000 Domain administrator can perform all of his tasks for shared folders In network through
Computer management.
Ans. a. Connecting to Another computer b.Monitoring the Shared folders c. Creating the shared folders
d. Sending console messages to the users e. Stop sharing the Folders F. All Of These
Q58. Dfs Root Type:-
Ans. a. Domain Dfs Root b. Standalone Dfs Root C. Both A & B d. None of these
Q59 The -----------------allows Administrator to create a single Logical Directory tree from a variety of physical systems.
Ans. A. Distributed File System (Dfs) b. Data File System c. Physical Data file System d. All of these
Q60. Stores the Dfs topology in Active Directory.
Ans. a. Stand-Alone Dfs B. Fault-Tolerant Dfs c. Both a & b d. None
Q61 Dfs provides the following features:-
Ans. a. Easy access to files b.Availability c. Server Load Balancing D. All Of these
Q62 Stores the Dfs topology in Single Directory.
Ans. A. Stand-Alone Dfs b. Fault-Tolerant Dfs c. Both a & b d. None
Q63.The System and Application logs recognize three types of events:-
Ans. a. Errors b. Warning c. Information D. All Of These
Q64.Some of the Security event categories are as follows:- Total9 event
Ans. a. System events b. Process tracking c. Policy change d. Privilege use E. All Of These
Q65.Considering security issues he can take appropriate actions to prevent or to suspend particular activities from such computers or Users.
Ans. a. Logon Failure b. File read failure c. Deletion of data failure d. Permission access failure e. Shut down of server failure F. All Of These
Q66. Terms used in windows 2000 printing
Ans. a. printer b. print server c. Print Driver d. Print Device E. All Of These
Q67. Windows 2000 supports several new and advanced printing features.
Ans. a. Printing Setup b. Printing Administration c. User Settings D. All Of These
Q68 The Following are the properties pages of the printer:-
Ans. a. General and sharing b. ports & advances c. Security d. sharing a printer E. All Of These
Q69.Windows 2000 provides three levels of printer permissions:-
Ans. a. Print b. Manage Documents c. Manage Printers D. All Of These
Q70. The Following table lists the file names and functions of each of the included separator page files:-
Ans. a. Sysprint Sep b. Pcl.sep c. Pscript.sep d. Sysprtj.sep E. All Of These
Q71. There are basically two types of backup concepts:-
Ans. Local Backup b. Network Backup C. Both A & B d. None of these
Q72. The Backup utility supports five methods of backing up data on a computer or network as follows:-
Ans. a. Copy Backup b. Daily Backup c. Differential Backup d. Incremental Backup e. Normal Backup D. All Of These
Q73. The Following Four steps describe a simple backup operation:-
Ans. a. Selecting files and folders for backup b. Select storage media c. set backup options d. start the backup e. select whether you want a log file to record backup actions F. All Of These
Q74. There are a number of acceptable backup strategies of which three fairly common ones are as follows:-
Ans. a. Perform a normal backup every day b. Perform a weekly normal backup and daily differential backup c. Perform a weekly normal backup and daily incremental backup. E.All Of These
Q75. Backup allows to select one of the three destinations for restoration of files and folder:-
Ans. a. Original Location b. Alternate Location c. Single Folder D. All Of these

Comments

  1. Hello Sir,

    Please Provide me the sample papers of Digital System/Lgoic Design (Bscit-1)bt0064

    Rahul 521019320

    ReplyDelete

Post a Comment

Popular posts from this blog

MCA-3 COMPUTER GRAPHICS

MCA-5 Data warehouse & Data Mining

BCA-1, COMMUNICATION SKILLS IN ENGLISH