Windows 2000 Server Quiz

Description: Windows 2000 Server Quiz
Number of Questions: 20
Created by:
Tags: server
Attempted 0/20 Correct 0 Score 0

What interface in Windows 2000 can you use for creating local shares?

  1. Netstat

  2. Domain Manager

  3. User Manager

  4. Windows Explorer

  5. Administrative tool


Correct Option: D
  1. host based IDS

  2. network based IDS

  3. network perimeter

  4. network entrapment point


Correct Option: C

John Doe wants to make IPX/SPX and TCP/IP the two protocols used on his computer but is not sure whether he can do that on one nic card or if he needs a second one. How many protocols can you bind to a single nic card?

  1. Two

  2. Ten

  3. Five

  4. Unlimited

  5. One


Correct Option: D

You are the administrator of a large E-commerce site. Lately there have been a number of complaints about error pages popping up due to pages being deleted but the links not removed. What would be the best way to make the site more user friendly.

  1. Create a custom pop-up window to redirect the user

  2. Reinstall the missing pages

  3. Create a custom error page with a link back to the main site.

  4. Redirect the broken links to another page on the site


Correct Option: C
Explanation:

To make the site more user-friendly and address the issue of error pages popping up due to deleted pages, the best option would be:

C. Create a custom error page with a link back to the main site.

This option is the best choice because it provides a user-friendly experience when a user encounters a deleted page or a broken link. By creating a custom error page, you can include a clear message explaining that the page the user is trying to access is no longer available. Additionally, including a link back to the main site allows the user to easily navigate back to the main site and continue their browsing experience.

Now let's go through each option and explain why it is right or wrong:

A. Create a custom pop-up window to redirect the user: This option is not the best choice because using pop-up windows can be intrusive and disruptive to the user experience. It may also cause frustration for users if they encounter multiple pop-up windows when trying to access deleted pages.

B. Reinstall the missing pages: This option may not be feasible or practical, especially if there are a large number of missing pages. Reinstalling the missing pages would require identifying and locating each missing page and then restoring them, which can be time-consuming and may not be a permanent solution if the issue continues to occur.

C. Create a custom error page with a link back to the main site: This option is the best choice because it provides a user-friendly experience when encountering deleted pages or broken links. By creating a custom error page, you can inform the user about the issue and provide a clear message, along with a link back to the main site, allowing them to easily navigate back to the main site and continue their browsing experience.

D. Redirect the broken links to another page on the site: This option may not be the best choice because redirecting broken links to another page on the site without informing the user about the issue can lead to confusion and frustration. It is important to provide clear communication to the user when encountering deleted pages or broken links.

The Answer is: C. Create a custom error page with a link back to the main site.

Which Unix command will give the contents of the root directory?

  1. ls

  2. ls -l

  3. ls -al

  4. ls /


Correct Option: D

Host based IDS works by scanning:

  1. the log files of the local host

  2. the log files of the desktop client only

  3. the log files of the local host and the dump terminal

  4. the log files of the dump terminal only

  5. the log files of the central server only


Correct Option: A

What is a security tradeoff when you utilize an intrusion detection system?

  1. Changes in file permissions

  2. Unexplained or common system shutdown and restarts

  3. Host performance degradation

  4. Failed logins

  5. Changes in user privileges


Correct Option: C

You are trying to contact a host in a different department of your company but can't seem to get through.You have no problem communicating with others on your subnet but cannot even ping any remote hosts. Other hosts on your subnet can reach remote hosts.

  1. Incorrect subnet mask on the remote subnet

  2. Incorrect subnet mask on your computer

  3. Incorrect default gateway on your computer

  4. The WINS server is down


Correct Option: C
Explanation:

To solve this problem, the user needs to have basic knowledge of networking and troubleshooting. The user should check the possible causes of the issue and try to eliminate each cause until the correct one is identified.

In this scenario, the user is unable to communicate with a host on a different department of the company but has no issue communicating with others on the same subnet. Other hosts on the subnet can also reach remote hosts. Based on this information, we can eliminate options A and B as incorrect subnet masks would affect all communication outside the subnet, not just one specific host.

Option D can also be eliminated as the WINS server is not used for basic network communication, and the issue is only with one specific host.

Therefore, the correct answer is:

C. Incorrect default gateway on your computer

This option is the most likely cause of the issue as the default gateway is responsible for forwarding traffic to remote networks. If the default gateway is not configured correctly, the traffic will not be directed to the correct destination, resulting in the inability to communicate with remote hosts.

DNS and WINS are often being considered as the:

  1. Netbios services for a network

  2. file services for a network

  3. ARP services for a network

  4. foundation services for a network


Correct Option: D

If you saw the output in the example below, what tool would you be using?

  1. TRACERT

  2. NSLOOKUP

  3. DNSLOOKOUT

  4. TRACEROUTE


Correct Option: B

Which of the following is the graphical interface for managing a Netware 5 server from your windows client?

  1. NWAdmin

  2. Server Manager

  3. Object Tree

  4. Directory Manager

  5. NDS Manager


Correct Option: A

The security log of your Windows 2000 server is best to be used for which of the following purposes?

  1. troubleshooting

  2. planning

  3. auditing

  4. system design


Correct Option: C
Explanation:

To answer this question, the user needs to understand the purpose of the security log in Windows 2000 server.

The security log in Windows 2000 server is primarily used for auditing purposes. It records events related to security and authentication, such as successful or failed logon attempts, changes to user accounts and permissions, and other security-related events.

Therefore, the correct option is:

The Answer is: C. auditing.

Which port is the NetBIOS User Datagram Protocol (UDP) port?

  1. PORT 137

  2. PORT 135

  3. PORT 138

  4. PORT 139


Correct Option: A

SSL can be viewed as its own layer between what two layers of the four layer IP stack?

  1. Network

  2. Transport

  3. Application

  4. Session

  5. B&C


Correct Option: E

Windows NT provides two group types. How would you place these groups in order to provide access to resources?

  1. Local groups into global groups

  2. Global groups into local groups

  3. User groups into global groups

  4. User groups into local groups


Correct Option: B

What is the default NTFS setting for shares on an NT system?

  1. Full control to the administrators group

  2. Full control to the users group

  3. Full control to the everyone group

  4. Full control to the global group

  5. Full control to the local group


Correct Option: C

AI Explanation

To answer this question, you need to understand the default NTFS settings for shares on an NT system.

Option A) Full control to the administrators group - This option is incorrect. By default, NTFS shares on an NT system do not grant full control to the administrators group.

Option B) Full control to the users group - This option is incorrect. By default, NTFS shares on an NT system do not grant full control to the users group.

Option C) Full control to the everyone group - This option is correct. By default, NTFS shares on an NT system grant full control to the everyone group. This means that all users, including guests and anonymous users, have full control over the shared files and folders.

Option D) Full control to the global group - This option is incorrect. There is no such concept as the "global group" in the context of NTFS shares on an NT system.

Option E) Full control to the local group - This option is incorrect. There is no such concept as the "local group" in the context of NTFS shares on an NT system.

The correct answer is C) Full control to the everyone group. This option is correct because, by default, NTFS shares on an NT system grant full control to the everyone group, allowing all users to have full control over the shared files and folders.

On a Windows NT system, where would you go to manage shares to work with other computers?

  1. Windows Explorer

  2. User manager

  3. Primary Domain Controller

  4. Server manager


Correct Option: D

What is the first thing to do when implementing a security policy?

  1. Train the users

  2. Install a firewall

  3. Create a written plan

  4. Use a strong password


Correct Option: C

What is the Order of Name resolution on Windows NT4.0 machines?

  1. Lmhosts file, Local Host Name, Hosts File, DNS Server, NetBIOS Name Cache, WINS Server, Broadcast,

  2. Local Host Name, Hosts File, DNS Server, NetBIOS Name Cache, WINS Server, Broadcast, Lmhosts file

  3. DNS Server, Local Host Name, Hosts File, NetBIOS Name Cache, WINS Server, Broadcast, Lmhosts file

  4. Local Host Name, NetBIOS Name Cache, Hosts File, DNS Server, WINS Server, Broadcast, Lmhosts file


Correct Option: B
- Hide questions