21. By default a printer is set to "Always Available". However, you can choose "Available from" button and set the timings for the availability of the printer. To go to this option, Right click on the desired printer, select Properties, and then click on Advanced tab. You can also set the separator page in the Advanced tab.
22. To configure a standby print device, use Properties -> Ports
Here you have two options:
23. The various file systems supported by Windows 2000 are:
24. Windows 2000 Operating systems support 5 different volume types:
Windows 2000 Professional doesn't support Mirrored and RAID-5 volumes, where as other Windows 2000 Server Operating Systems (2000 Server, Advanced Server) support.
25. If you are creating a striped volume on a new Windows 2000 machine, it can only be created on dynamic disks. However, if you are upgrading a Windows NT computer to Windows 2000, any existing stripe set will be supported.
26. Fault tolerance boot disk is a floppy disk that enables you to boot a computer in the event that the first disk in a mirrored volume fails. Even if you mirror the installation folder in a Windows 2000 OS, you will not be able to boot because boot.ini points to the first volume. Therefore, you need to create a fault tolerance boot disk that contains an edited Boot.ini file that points to the mirrored volume.
27. You can use convert.exe command to change a FAT file system to an NTFS file system on a disk volume.
28. Roaming user profile retains its own customized desktop and work environment settings, irrespective of which Windows 2000 computer that a given user logs on.
29. The default Minimum password length is set to 0 characters. The password can be anywhere between 0 and 14 characters. Password length of 0 characters mean that there is no password or a blank password.
30. Disk quotas can only be used on NTFS volumes. This is because only NTFS volumes maintain ownership information on files and folders. Windows Explorer can be used to configure and monitor disk quotas.
31. The default permission for "Everyone" group on a Shared folder is "Full Control". Share permissions are applied only to folders created on FAT (FAT32) partitions.
32. When both Share and NTFS permissions are applied, the most restrictive permissions will apply.
33. If you choose "Print Directly to the Printer" option in the Advanced tab of the Printer Properties, the spooler is bypassed. The document goes directly to the printer. This option can be used to check whether the spooler is corrupt.
34. Disk Management is used to create, manage, and delete simple volumes, spanned volumes, mirrored volumes, striped, and stripe set with parity volumes. Disk Administrator is NT 4 tool and is not available in Windows 2000.
35. By renaming ntuser.dat to ntuser.man, you can assign a mandatory profile to any specific user. To have a uniform looking desktop environment, an administrator can assign mandatory roaming user profile to multiple user accounts.
36. You can rename the Guest and Admin accounts, so that it will be difficult to guess the user name.
37. Print Services for Unix must be installed before adding a Unix printer to a Windows 2000 computer. Further, when you add a Unix printer, it must be assigned LPR port. The Unix server that connects to the print device runs LPD. When you are installing the LPR port, you will be prompted to provide the name or IP address of the Unix computer to which print device is attached.
38. When you install Peer Web Services (PWS) on a Windows 2000 Professional computer, FTP, HTTP, and SMTP services get installed.
39. Diskperf command controls the types of counters that can be viewed using System Monitor.
The syntax for setting the system to start both physical and logical disk performance counters when the system is restarted is
40. You can use System Monitor as well as Task Manager to monitor Processor and Memory usage on your computer.
41. Windows Update is a catalog of items such as drivers, patches, the latest help files, and Internet products that you can download to keep your computer up to date. You must be logged on as an administrator or a member of the Administrators group in order to access the Product Updates section of Windows Update for downloading help files.
42. You create an ERD by choosing Choose Start -> Programs -> Accessories -> System Tools -> Backup. Click on the Emergency Repair button. Provide a blank 31/2 inch Floppy Disk when prompted. Note that in NT, you can create ERD by typing RDISK command. This command is not available in Windows 2000.
43. WINS and LMHOSTS file resolve NetBIOS names to IP addresses, whereas DNS and HOSTS file resolve FQDN to IP addresses.
44. Placing the paging file on different physical disks is optimal. This will improve faster access to the Paging file, and also distribute the load.
45. Some of the important System Monitor counters are:
46. By default, you can start recovery console using,
Also, you can have "Recovery Console" as a start up option by typing \i386\winnt32.exe /cmdcons at the command prompt, after switching to the CD ROM drive letter.
47. Recovery Console allows you to Start and stop services, format drives, read and write data on a local drive (including drives formatted to use NTFS). The Recovery Console is very useful if you need to repair your system by copying a file from a floppy disk or CD-ROM to your hard drive, or if you need to reconfigure a service that is preventing your computer from starting properly. You must be an administrator to use the Recovery Console.
48. TCP/IP protocol stack is installed by default when you install Windows 2000 on a computer.
49. The Advantages of VPN are:
50. IIS: To install Internet Information Services:
51. Task scheduler can be used to automate the scheduled tasks.
52. The Windows 2000 Performance tool is composed of two parts:
With System Monitor, you can collect and view real-time data about memory, disk, processor, network, and other activity in chart (graph), histogram, or report form.
By using Performance Logs and Alerts you can configure logs to record performance data and also to set system alerts so that you are notified when a specified counter's value is above or below a defined threshold.
53. Recovery console:
54. You can use both Ping Localhost and Ping 127.0.0.1 to see whether the TCP/IP stack is installed properly. Ipconfig is used to obtain the TCP/IP configuration information, such as the IP address, subnet mask, default gateway etc. on the local computer.
55. Any computer that uses SMB protocol can support offline files and folders. All Microsoft Operating systems support this feature.
56. You can use both "Ping Localhost" and "Ping 127.0.0.1" (don't put double quotes) to see whether the TCP/IP stack is installed properly. Ipconfig is used to obtain the TCP/IP configuration information, such as the IP address, subnet mask, default gateway etc. on the local computer.
57. The various options available with Ipconfig for managing DHCP are:
58. To map a network drive letter to a share, we use the command NET USE. The correct command syntax is "net use Z:\\Server01\Myfiles".
59. Computer Management -> Shared Folders can be used to view some very useful information like
60. You can use the View tab in Folder Options applet in the Control Panel to show / hide files and folders that have "Hidden" attribute set. You can also use Windows Explorer -> Tools -> Folder Options -> View tab.
61. To find the effective NTFS permissions, you add up all the permissions given to different groups that a user is member of, and remove all entries with "Deny" permissions (if any). In other words, if any user or group is denied access to a file or folder, it overrides any "Allow" permissions.
62. In Windows 2000 Professional, the default permissions for a subfolders or files are inherited from the parent folder. Compare this with Windows NT 4 where, any subfolder newly created will not inherit any permission from the parent folder. Only files created will inherit permissions from the folder.
63. Compression and encryption:
If you encrypt a folder on an NTFS volume, all files and subfolder created the encrypted folder are automatically encrypted. Therefore, it is recommended that you use encryption at the parent folder level.
Also note that you can't encrypt a file or folder that is compressed. If you want to encrypt a file or folder that is compressed, you need to first decompress the file or folder and then encrypt. Only NTFS volumes support file or folder encryption.
64. Windows 2000 provides two versions of Registry Editor
Regedt32.exe is automatically installed in the systemroot\system32 folder, while Regedit.exe is automatically installed in the systemroot folder. Regedit.exe is primarily used for its search capabilities, as it doesn't support all functions and data types.
65. Disk Quotas:
66. RIS server is used to deploy Windows 2000 Professional over the network. RIS requires Windows 2000 networks that use DHCP, DNS, and Active Directory. A Remote Installation Services (RIS) Server can support any of the following two types of images:
67. A RIS client computer must support one of the following configurations:
68. rbfg.exe, RISETUP, sysprep, deploy.cab, and .sif:
69. The services that are required to be running on the RIS server or accessible to the RIS server as below:
70. On a Windows 2000 Professional computer, you can configure the number of users accessing a Share between 1 and 10 (10 max limit).
71. Sysprep.inf is required to fully or partially automate the installation process on the target computer. To run sysprep, you need to have the following files in the folder C:\sysprep folder of the master computer:
72. The default spool folder is located at: Systemroot\System32\spool\printers. For example, if the OS is residing on C drive, the default location will be: "C:\\WINNT\System32\spool\printers".
You can access this location through: Start -> Printers -> File -> Server Properties -> Advanced tab. Type in the new spool location over the default location.
73. To insert a new file extension, you use Windows explorer, and select the application. Then, Tools -> Folder Option -> File Types. Configure the extension appropriately.
74. To connect a USB device, ensure that
75. Sysprep can be run on:
76. An encrypted file copied to another NTFS Share remains encrypted.
77. Power Users on a Windows 2000 Professional computer can:
Power Users do not have access to the data of other users on an NTFS volume.
The above notes is provided AS IS. ExamGuides.com assumes no responsibility about the accuracy or compliance with vendor's stated Exam objectives