Welcome to Certifiable, your exam prep headquarters. Here you'll find questions about some of the tricky areas that are fair game for the certification exams. Following the questions, you'll find the correct answers and explanatory text. We change the questions weekly.

Questions (March 30, 2001)
Answers (March 30, 2001)

This week, we have three questions about topics for Exam 70-210: Installing, Configuring, and Administering Microsoft Windows 2000 Professional.

Questions (March 30, 2001)

Question 1
Performance on your Windows 2000 system has become sluggish. As part of the troubleshooting process, you want to use System Monitor to view the performance of some resource usage and system activity tracking counters. When you try to collect logical-disk data for your system, you can't. What's the most likely reason for that you can't collect and view logical-disk data on a Win2K Professional computer?

  1. You can't view logical-disk data on a Win2K Pro computer; viewing logical-disk data is limited to Win2K Servers.
  2. For security purposes, the default local policy for a Win2K Pro machine prevents the viewing of logical-disk data. You must enable the logical-disk counter through the local policy editor.
  3. The OS can't collect logical-disk counter data. However, the OS can collect physical-disk data, and you should use this data to determine disk activity.
  4. By default, the OS doesn't collect logical-disk counter data. To enable collection of logical-disk counter data, you must run a command on your system.

Question 2
Roger is setting up dial-up connections for a group of users on the network that he administers. He wants to configure the dial-up connection to require data encryption for all connections. Which of the following protocols support data encryption? (Choose all that apply.)

  1. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
  2. MS-CHAP v2
  3. Password Authentication Protocol (PAP)
  4. Shiva Password Authentication Protocol (SPAP)
  5. Challenge Handshake Authentication Protocol (CHAP)
  6. Extensible Authentication Protocol/Transport Layer Security (EAP/TLS)

Question 3
You're composing a document that contains information designed to let the support personnel in your company quickly troubleshoot problems that might arise with Windows 2000 Professional. As part of this document, you list the situations in which using the Last Known Good Configuration as a recovery option is helpful. Which of the following scenarios represent appropriate situations in which to use the Last Known Good Configuration? (Choose all that apply.)

  1. You accidentally disable a critical device driver.
  2. You copy a new driver over an old one while the old one is active and subsequently encounter problems.
  3. You experience a startup failure caused by hardware failures or corrupted files.
  4. You install a new device driver, restart Win2K, and the system stops responding.
  5. You install a new video driver and can't restart the system.

Answers (March 30, 2001)

Answer to Question 1
The correct answer is D—By default, the OS doesn't collect logical-disk counter data. To enable collection of logical-disk counter data, you must run a command on your system.

To obtain performance counter data for logical drives or storage volumes, you must type the following command at a command prompt:

diskperf -yv

This command causes the disk performance statistics driver used for collecting disk performance data to report data for logical drives or storage volumes. By default, the OS uses the diskperf -yd command to obtain physical-drive data.

Answer to Question 2
The correct answers are A—MS-CHAP, B—MS-CHAP v2, and F—EAP/TLS. You can configure remote access connections, whether they are dial-up or VPN connections, to enforce various levels of password authentication and data encryption. Security considerations and usability issues determine which authentication and encryption methods to require. Authentication methods range from unencrypted to custom, such as the EAP.

Data is encrypted only if MS-CHAP, MS-CHAP v2, or EAP/TLS authentication is negotiated. These authentication protocols are the only ones that generate their own initial encryption keys, which encryption requires.

Answer to Question 3
The correct answers are A—You accidentally disable a critical device driver; D—You install a new device driver, restart Win2K, and the system stops responding, and E—You install a new video driver and can't restart the system.

Using the Last Known Good Configuration doesn't help in the following situations:

  • Any problem that isn't related to changes in control set information.
  • Once you have logged on after making changes.
  • Switching between different hardware profiles.
  • Copying a new driver over an old one while the old one is active.
  • Startup failures caused by hardware failures or corrupted files.