Win2000
1 Your boss asks you to do a hardware inventory on your equipment. How can you determine how much memory and what type of CPU is in all of your computers.
2 If you needed to suport Long Filenames on all partitions and you needed the ability to dual-boot MS-DOS and Windows NT Workstation, which file system(s) would you choose?
3 For a RAS client to be able to use the FTP utility over a RAS connection, what protocal must be installed on the client?
4 In which two disk files is the Windows NT/95/98 registry stored?
5 Which of the following is true?
6 Which hive of HKEY_LOCAL_MACHINE is used to store configuration information for applications installed as a service on Windows NT?
7 What type of value in the Windows NT Registry allows you to have variables in the string?
8 What is a major difference between the Windows 95 Registry and the Windows NT Registry?
9 Before an application can open a registry key, the application must first do which of the fillowing
10 What does the registry enforce?
11 All registry data entries
12 The registry is organized into sections called
13 A registry key value consists of which of the following segments?
14 User preferences, including color settings, environment variables, program groups, and network connections would be found under which key?
15 In a 32-bit Windows environment, when two processes use the same DLL:
16 What is the advantage of dynamic linking over static linking/
17 In a 32-bit windows process, the termination of which thread causes the process to terminate?
18 In a 32 bit windows environment, what is the maximum amount of virtual address space each process can use
19 What are units of virtual memory called
20 You are planning to upgrade a computer running windows NT 3.5 Server to Windows 2000 Advances Server.The computer has 64 MB of RAM and 3 GB of free hard disk space. Which of the following steps do you need to perform to upgrade this computer?
21 Your intranet Web site containing general information and white papers is spread across multiple domains. You want to allow all employees of the company to have access to the information.Which method of authentication would you use to achieve this/
22 You want to authenticate all the users accessing the official web site of your organization through any web browser or proxy server. Which of the following methods of authentication is best suited for your requirements?
23 Which of the following is true of BackOffice applications?
24 A development application requires maintaining an index to a large number of Web sites as hyperlinks. To satisfy this requirement, what is the optimum development tool?
25 A registry key under Win 9.x/WINNT may contain how many individual values?
No comments