Microsoft Certification Questions

Q:

You are archiving a Security Log for later analysis in a spreadsheet. Which file type should you assign to the log when you save it?

A) .evt B) ,txt
C) .csv D) .exe
 
Answer & Explanation Answer: C) .csv

Explanation:

Saving the Security Log as a comma - delimited file is probably the best choice if you want to analyze the data later in a spreadsheet.

Report Error

View Answer Report Error Discuss

0 3113
Q:

You are installing Windows 2000 on a computer that already has another operating system installed on it. You choose to install Windows 2000 in a different folder than the previously installed operating system. What will Windows 2000 do?

A) Abort the installation process B) Delete the previously installed operating system
C) Display an error message indicating that windows 2000 cannot be installed in a different folder D) Cause the computer to dual boot between Windows 2000 and the previously installed operating system
 
Answer & Explanation Answer: D) Cause the computer to dual boot between Windows 2000 and the previously installed operating system

Explanation:

When windows 2000 is installed in the same folder as the other operating system, Windows 2000 will delete the previously installed operating system. When Windows 2000 is installed in a different folder than the other operating system, it will automatically configure the computer to dual boot between Windows 2000 and the previously installed operating system.

Report Error

View Answer Report Error Discuss

1 3074
Q:

You are the administrator of a SQL Server 2000 computer. Your company uses the server to store service contract information for its customers. You are also the administrator of an Oracle relational database management system (RDBMS) server. This server is used to store your company's financial information. The financial information is updated frequently throughout the day.You need to create a series of reports that combine the service contract information and the financial information. These reports will be updated several times a day.You want to create these reports on the SQL Server computer by using the minimum amount of disk space. What should you do?

A) Set up SQL Server replication to replicate the data from the Oracle server to the SQL Server computer. B) Set up the Oracle server as a linked server. Create a view that joins the service contract information and the financial information.
C) Set up a Microsoft ActiveX script that connects to the Oracle server and imports the financial information into a SQL Server temporary table. Create a view that joins the service contract information and the temporary table. D) Set up a Data Transformation Services (DTS) package that imports and transforms the data from the Oracle server to the SQL Server computer. Use SQL Server Agent to execute the DTS package throughout the day as needed.
 
Answer & Explanation Answer: B) Set up the Oracle server as a linked server. Create a view that joins the service contract information and the financial information.

Explanation:

SQL Server 2000 permits the creation of links to OLE DB data sources called linked servers. After linking to an OLE DB data source, it is possible to reference rowsets from the OLE DB data sources as tables in Transact-SQL statements and to pass commands to the OLE DB data sources and include the resulting rowsets as tables in Transact-SQL statements. Each distributed query can reference multiple linked servers and can perform either update or read operations against each individual linked server. A single distributed query can perform read operations against some linked servers and update operations against other linked servers. The Microsoft OLE DB Provider for Oracle allows distributed queries to query data in Oracle databases.

Report Error

View Answer Report Error Discuss

0 3036
Q:

You create a System Policy file on a Windows 2000 Server computer to manage Windows NT 4.0 client computers  (and their users) on your Windows 2000 network. What filename should you assign to this System Policy file?

A) Config.pol B) Ntconfig.pol
C) Nt4config.pol D) Winntconfig.pol
 
Answer & Explanation Answer: B) Ntconfig.pol

Explanation:

A Windows NT 4.0 System Policy file should be named NTconfig.pol

Report Error

View Answer Report Error Discuss

0 2999
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. You use the ADO.NET Entity Framework to model entities. You write the following code segment. (Line numbers are included for reference only.)


01AdventureWorksEntities context = New AdventureWorksEntities
02
03var q = from c in context.Customers
04where c.City == "London"
05orderby c.CompanyName
06select c;


You need to ensure that the application meets the following requirements: "Compares the current values of unmodified properties with values returned from the data source". Marks the property as modified when the properties are not the same. Which code segment should you insert at line 02?

A) context.MergeOption = MergeOption.AppendOnly; B) context.MergeOption = MergeOption.PreserveChanges;
C) context.MergeOption = MergeOption.OverwriteChanges; D) context.MergeOption = MergeOption.NoTracking;
 
Answer & Explanation Answer: B) context.MergeOption = MergeOption.PreserveChanges;

Explanation:
Report Error

View Answer Report Error Discuss

0 2978
Q:

You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What should you do?

A) From Windows Firewall with Advanced Security, create a new rule. B) From the local Group Policy, modify the application control policies.
C) From Windows Firewall, modify the Allowed Programs and Features list. D) From Network and Sharing Center, modify the Advanced Sharing settings.
 
Answer & Explanation Answer: A) From Windows Firewall with Advanced Security, create a new rule.

Explanation:
Report Error

View Answer Report Error Discuss

0 2964
Q:

As part of trouble shooting errors in a VPN connection, what logs must be checked?

A) IPSec logging B) Event viewer
C) VPNSec Log D) All of above
 
Answer & Explanation Answer: A) IPSec logging

Explanation:
Report Error

View Answer Report Error Discuss

0 2937
Q:

Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You share a folder named Research. A user named User1 reports that he cannot access files in the Research share. You confirm that the Domain Users group is granted the Change permission for the Research share. You run the Cacls command as shown in the exhibit:

You need to ensure that User1 can modify files in the Research share. You must prevent User1 from modifying permissions for the Research folder. To which group should you add User1?

A) Administrators B) IT
C) Research D) ResearchManagers
 
Answer & Explanation Answer: D) ResearchManagers

Explanation:
Report Error

View Answer Report Error Discuss

1 2797