|
Question 1. Which statistics enable you to view the impact of SQL statements on input/output (I/O) statistics? A. file statistics in Performance Manager B. statistics obtained from the sar and vmstat commands C. sorts and parse calls values in Top SQL D. buffer gets and disk reads values in Top SQL E. CPU chart group in Performance Manager Answer: D Question 2. Which Oracle Net utility or tool is integrated with Oracle Enterprise Manager? A. Oracle Net Configuration Assistant B. Oracle Names Control utility C. Oracle Connection Manager Control utility D. Oracle Net Manager E. Listener Control utility Answer: D Question 3. You have specified the configuration in the sysctl.conf file. However, when you restart the system, Linux does not start. Which statement describes the steps that you would take to troubleshoot the problem? A. Use the root login to access the system in run level 6 and edit the /root/.bashrc file. B. Use the root login to mount the file system and edit the sysctl.conf file. C. Use the boot loader to enter the emergency mode and switch to run level 3. D. Use the boot loader program to access the available kernels and recompile the kernel. E. Use the single-user mode to access the /proc file system and edit the kernel parameters. F. Use the boot loader program to boot into run level 1 and edit the sysctl.conf file. Answer: F Question 4. Which operating system (OS) group normally manages the Oracle database files? A. apache B. oper C. users D. oinstall E. root F. dba Answer: F Question 5. Which two statements are true about %user to %system ratio for Oracle server processes? (Choose two.) A. If the %user to %system ratio is less than 60/40, then you must look for input/output (I/O) or virtual memory problems. B. If the %user to %system ratio is less than 60/40, then you must check sar -wW for swapping activity. C. If the %user to %system ratio is greater than 60/40, then you must tune the application code. D. If the %system to %user ratio is greater than 40/60, then you must measure the data flow between disk devices. E. If the %user to %system ratio is greater than 60/40, then you must run vmstat for switching activity. F. If the %system to %user ratio is greater than 40/60, then you must check the division of work within the system. Answer: A, C Question 6. You plan to start with an Oracle9i stand-alone database system and then upgrade to a Real Application Cluster (RAC) environment in the near future. You need to ensure that the process of migrating an Oracle instance and database to enable RAC goes well. Which file system would you recommend for the data files in the stand-alone database system? A. ext3 B. ReiserFS C. ext2 D. Oracle Cluster File System (OCFS) E. General Parallel File System (GPFS) F. Network File System (NFS) Answer: D Question 7. Examine the following SELECT command: SELECT sum(pga_alloc_mem) FROM V$PROCESS; Which statement about this command is correct? A. This command displays the PGA size of each process that is started up by the instance. B. If this command displays low values, then increase the PGA_AGGREGATE_TARGET value. C. This command displays the size of each SQL work area that is allocated to an instance. D. This command displays the Program Global Area (PGA) size allocated to an instance. Answer: D Question 8. Which three methods can you use to correlate Statspack and operating system (OS) measurements? (Choose three.) A. Use Oracle Enterprise Manager (OEM) Outline Management to manage plan stability outlines. B. Use the at command to schedule the OS statistics through OEM. C. Use the cron utility to schedule a job to collect database and OS statistics. D. Use OEM Performance Manager to view and record OS statistics. E. Print Statspack reports from sar . F. Run Statspack and the sar task continuously. Answer: C, D, F Question 9. Which two statements are true about Oracle Clustered File System (OCFS)? (Choose two.) A. You can use OCFS for database files as well as general files. B. There is no limit on the number of files on OCFS. C. Standard file system commands, such as mkdir , rmdir , and mv , are available on OCFS. D. You can create an OCFS on Logical Volume Manager (LVM). E. You must modify Linux kernel parameters before mounting OCFS. Answer: B, C Question 10. What are the four roles of the semaphores parameters? (Choose four.) A. The semmsl parameter sets the maximum number of semaphores per set. B. The semopm parameter sets the maximum number of operations per semop call. C. The semopm parameter sets the total number of semaphores in the system. D. The semmns parameter sets the total number of semaphores in the system. E. The semmsl parameter sets the maximum number of semaphore sets. F. The semmni parameter sets the maximum number of operations per semop call. G. The semmns parameter sets the maximum number of semaphores per set. H. The semmni parameter sets the maximum number of semaphore sets. Answer: A, B, D, H Question 11. Which information about your system will help you to determine if CPU is a bottleneck? (Choose three.) A. bigpages B. pages in C. average load D. load factor E. number of CPUs Answer: C, D, E Question 12. Which three statements about the root.sh script are correct? (Choose three.) A. It updates the contents of the /etc/oraInst.loc file. B. It must be executed as user oracle . C. It changes the permissions on the dbsnmp executable. D. It places the oraenv , coraenv , and dbhome scripts in the local bin directory. E. It creates and populates the oratab file. F. It must be run before running the Oracle Universal Installer (OUI). Answer: C, D, E Question 13. Which two statements are true about Oracle Clustered File System (OCFS)? (Choose two.) A. You can use OCFS partitions for archive logs. B. OCFS is a file system designed specifically for Oracle on Linux operating system. C. OCFS can be automatically mounted at startup. D. You must modify Linux kernel parameters before mounting OCFS. E. Linux developers cannot access OCFS source code. Answer: A, C Question 14. All your sessions are using shared servers. Examine the following SQL command: SELECT sum(value) FROM v$sesstat, v$statname WHERE name = 'session uga memory' AND v$sesstat.statistic# = v$statname.statistic#; Which statement best describes this SQL command? A. This SQL command enables you to monitor the PGA memory allocated from the shared pool. B. This SQL command enables you to monitor memory usage by each user process. C. This SQL command enables you to monitor system memory usage. D. This SQL command enables you to monitor the Program Global Area (PGA) memory allocated from the SGA memory. E. This SQL command enables you to monitor overall memory usage. Answer: D Question 15. You have successfully installed the Intelligent Agent (IA) on Oracle 9.2. You executed the following command to start the I A: lsnrctl dbsnmp_start You received the following error message: NL-00853: undefined command "dbsnmp_start". What would you do to rectify the problem and start IA ? A. Set the TNS_ADMIN environment variable to point to the location of listener.ora and then execute the lsnrctl dbsnmp_start command. B. Execute the agentctl start agent command. C. Start the HTTP Server and then execute the lsnrctl dbsnmp_start command. D. Configure Oracle Simple Network Management Protocol (SNMP) and then execute the lsnrctl dbsnmp_start command. E. Run the root.sh script and then execute the lsnrctl dbsnmp_start command. F. Create the snmp.ora file in Oracle home directory for the agent and then execute the lsnrctl dbsnmp_start command. Answer: B Question 16. You need to test the connection to a database by using the net service name orcl21. You executed the following tnsping command : tnsping orcl21. Which three statements are correct in this scenario? (Choose three.) A. If the net service name is not added to the tnsnames.ora file or to the name service in use, then the command will return an error message. B. The tnsping command tests if the database is up and running. C. The tnsping command returns all the hops taken by the tns packet to reach the destination service. D. The tnsping command contacts the listener corresponding to the service name, and checks if the listener is running. E. The tnsping command connects to the database as user scott/tiger by default. F. The tnsping command returns the time (in milliseconds) it took to reach the listener, if the connection is successful. Answer: A, D, F Question 17. You have created the automatic database startup script oracle_start in /etc/rc.d/init.d. While starting up the server, you have been receiving the error service oracle_start does not support chkconfig . What must you do to fix this error? A. Place a copy of the oracle_start script in the rc2.d and rc3.d run level directories. B. Include the line #chkconfig: 2345 20 90 in the oracle_start script. C. Schedule a cron task to start up the database. D. Specify the path to the startup script in the oratab file. E. Run the root.sh script to add the script to the run level directories. Answer: B Question 18. You are working in a multiple instance environment. In which file would you place references to all the local databases so that Intelligent Agent can discover them? A. oemclient.properties B. emca.properties C. omsconfig.properties D. oratab E. src.lst Answer: D Question 19. Which four sources contribute to network traffic? (Choose four.) A. Samba B. swap partition C. additional Host Bus Adapters D. HTTP Server E. Oracle Net F. Network file system Answer: A, D, E, F Question 20. Which two statements are correct regarding the apache user? (Choose two.) A. The apache user must be granted minimal privileges to ensure the security of Oracle HTTP Server. B. apache is a database user account that is created during Oracle software installation. C. The apache user must be a member of the oper group for the successful functioning of the HTTP Server. D. You should move the apache user into the apache group after the installation is complete. E. The Oracle HTTP Server must be started by the apache user in order for ports reserved for apache to be made available to the database. Answer: A, D
|
Question 1. You work as the IT Admin at ABC.com. All servers on the domain run Windows Server 2003. A file server named ABC-SR23 is running low on disk space. You add a new hard drive to the server. You must configure a partition on the new hard disk. But when trying to open the Disk Management console, you encounter an error message regarding an inability to connect to the Logical Manager service. In the Services console in Administrative Tools, you make sure that Logical Disk Manager is in operation. Which of the following actions should you take to enable Disk Manager? A. Create more free space on the boot partition by deleting unnecessary files and folders on it. B. Enable and start the Logical Disk Manager Administrative service on ABC-SR23. C. Install the Windows XP Service Pack 2 on ABC-SR23. D. Arrange the hard disks in a mirrored volume. E. Use the hard disks in a RAID-10 array. Answer: B Explanation: A disabled Logical Disk Manager Administrative service manifests as an inability to connect to Logical Disk Manager. Reference: Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 3 Question 2. You work as the network admin at ABC.com. ABC.com currently makes use of a computer named ABC-SR22 configured as a File server running Windows Server 2003 that hosts the ABCProjects shared folder. Full backups of ABCProjects are run on a daily basis. One morning ABC.com users complained that they are unable to access files saved to ABCProjects. You then find ABCProjects files are inaccessible due to bad sectors on the hard disk. You need to restore the folder to a different location from the most recent backup. The only uncertainty thus is the matter of when the folder became corrupted. Which of the following actions should you take to make sure that the backup ABCProjects files will be accessible? A. You should first set up a test for successful backup procedures and document the process. B. You should execute the ntbackup command with the /restore parameter. C. You should use a temporary folder to restore the file to. Check that the proper data is on the database file. Shift the restored file to the ABCProjects folder. D. You should execute the ntbackup command with the /L:f|s|n parameters. E. You should test every day’s backup for the previous seven days before restoring the files to ABCProjects. Answer: C Explanation: To verify backup and restore procedures, many administrators will perform a test restore of a backup set. So as not to damage production data that test restore is targeted not at the original location of the data, but at another folder, which can then be discarded following the test? Thus if you apply this information on the scenario in the question then you should restore the file to a temporary folder, verify whether the correct data is contained in the database file and then copy the restored file to the ABCProjects folder. Reference: Dan Holme and Orin Thomas, MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Microsoft Press, pp. 16 and pp. 17. Question 3. You work as the IT admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR01 configured as a File server. You are preparing a backup plan for ABC-SR01. To this end you set up an account named TestBackup in the Backup Operators group on ABC-SR01. The ABC.com Backup Operators members will make use of the TestBackup account to perform the scheduled backups. After performing successfully for a month, the backups failed because of an expired password but even changing the password didnot work. How can you ensure successful backups? A. By adding the TestBackup account to the Network Configuration Operators group and Changing the password. B. By adding the TestBackup account to the Remote Desktop Users group and changing the password. C. By replacing the password with a new one for the backup job and unlocking the TestBackup account. D. In the properties of the TestBackup account by resetting the Account lockout threshold setting. Answer: C Explanation: The backup job schedule properties have not been changed, leaving it configured with the old username and password combination. As a result of this the ABCBackup account is locked out. Therefore we need to change the password for the backup job on every file server and unlock the ABCBackup account to let it work again. It could be that the password for the backup jobs could have expired causing the failure to backup. References: Dan Holme and Thomas Orin, MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Microsoft Press, pp. 7:12-13 Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System, pp. 317-318. Question 4. You work as the IT Network Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR01 which runs Internet Information Services as well as Remote Desktop. ABC-SR01 is used to host web content for the ABC.com internal web site. Web content is updated on a regular basis by a web developer who has been assigned a client computer named ABC-WS290. Which of the following actions should you take to make sure that Remote Desktop Connection can be used to post Web content on ABC-SR01 from ABC-WS290? A. Check the Disk Drives option in the properties of Remote Desktop Connection on ITCERTKEYSWS290. B. You should consider making use of the changeuser / execute command on ABC-WS290. C. You should execute the tscon /edit command on ABC-WS290. D. You should execute the changeuser / query command on ABC-WS290. Answer: A Explanation: When this option is enabled, you can open My Computer on the remote server, and view the disk drives from the client computer listed alongside the disk drives from the server. Also a connection to a Web Client Network is attempted only when the first two providers fail to respond. The “Disk Drives” option will make the Web Developer’s local disk drives available to them when they connect to the web servers using a remote desktop connection. Reference: J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, p. 8:34 Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, pp. 36, 574, 583 Question 5. You work as the IT Admin on the ABC.com domain. ABC.com has its office located in Chicago. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR01 configured as a File server. ABC.com has a partner company named Weyland Industries. Weyland Industries has their office located in Miami. The Weyland Industries network makes use of a computer named WEYLANDSR01 configured as an application server which is configured to prevent Remote Desktop Protocol connections. The Weyland Industries network administrator is responsible for performing normal backups on WEYLAND-SR01. WEYLAND-SR01 suffers a catashtophic failure and is removed from the network and you need to grant assistance. Which of the following actions should you take to remove the backup job on WEYLAND-SR01 from a ABC.com computer? A. You should use a Power Users account to log on to WEYLAND-SR01 and execute the ntbackup command with the / SNAP:on|off parameters. B. You should use a Network Configuration Operator account to log on and then execute the ntbackup command with the /A parameter. C. You should use an Administrator account to log on and then execute the schtasks command with the /delete parameter. D. You should use a Remote Desktop User account to log on and execute the ntbackup Command with the /UM parameter. Answer: C Explanation: The correct syntax is: schtasks /delete /tn { TaskName | * } [/f] [/s computer [/u [domain\]user /p password]] [/?] References: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/schtasks.mspx Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 9 Question 6. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR29 configured as a File server. ABC-SR29 hosts a shared folder named TestData which contains two subfolders named Temporary and Permanent and has various files with various NTFS permissions because it was created and saved by different users. You need to shift around certain files from Temporary to Permanent. Which of the following actions should you take to make sure that the existing file permissions are kept intact with the least amount of administrative effort? A. You need to archive the files in Temporary and then restore the archived files including the permissions, on Permanent. B. You should execute the xcopy command on ABC-SR29 and shift around the share Permissions from Temporary to Permanent. C. You should shift the files and folders from Temporary to Permanent. D. You should manually configure the NTFS and share permissions after moving the files and folders accordingly. E. You should make exact replicas of the files on both Temporary and Permanent and then copy them over accordingly. Answer: C Explanation: A number of factors impact the security settings that will be placed on the file in its new location, including the following: • Whether the file is copied or moved • Whether the destination is an NTFS volume or not • Whether the destination is on the same volume as the original location Files and folders that are moved or copied to non-NTFS volumes lose all permissions. If the destination is on an NTFS volume, the security permissions the file will have after the transfer will depend on several factors. When copying files or folders to a location on an NTFS volume, the user must have permission to create files in the destination location. When the file or folder is copied, it is created as a new object in the destination, and the user object that copied the file or folder becomes the owner of the newly created item. Destination Permissions Objects moved within the same NTFS volume Objects retain their original NTFS permissions in the new location Objects moved to a different NTFS volume Objects inherit the permissions of the new location The question states pertinently to move the files and folders from ABC-SR32 to ABC-SR33 which resides in the same NTFS volume. Not copy. Moving the files will ensure that the permissions as assigned to the various creators of these files and folders will not be modified. Copying it would result in modification. Since both ABC-SR32 and ABC-SR33 reside within the same volume, it will retain its original NTFS permissions in the new location. Reference: Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Laura E. Hunter & Will Schmied, MCSA/MCSE: Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment, Study Guide and DVD training system, Syngress Publishing, Rockland, MA, 2003, pp. 423-424 Question 7. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003 and all client computers are configured with Windows XP Professional. ABC.com currently makes use of a computer named ABC-SR04 configured as a File and Print server that also holds all the user profiles. ABC.com has a partner company named Weyland Industries. The Weyland Industries network users make use of two ABC.com client computers. There is now a concern that the Weyland Industries users will be able to access the documents that was saved on these client computers by ABC.com users. Which of the following actions should you take to negate this concern? A. Configure the sharing policy between ABC.com and Weyland Industries not to remove the Prevent Roaming Profile changes from propagating to the server policy option. B. Configure the Default Domain Policy to apply the Delete cached copies of roaming profiles policy option. C. Configure the Default Domain Policy to apply the Prevent Roaming Profile changes from propagating to the server policy setting. D. You should consider adding the Weyland Industries users to roaming user profiles policy Setting to the Default Domain Policy Group Policy object (GPO). E. You should consider adding the ABC.com users to roaming user profiles policy setting to the Default Domain Policy Group Policy object (GPO). F. You should consider making use of User.dat files in future. Answer: B Explanation: When users on your network regularly move from one profile-creating workstation to another, every machine they use will store a copy of their local profile. You may use System Policy Editor or Group Policies to compel the workstations to delete cached copies of roaming profiles when the user logs out. This is a machine-specific setting that is implemented in the Registry in HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON. What this setting also does is to prevent users from being able to access the My Documents folder of other domain users on the client computers as is the case in this question. Reference: Mark Minasi, Christa Anderson, Michele Beveridge, C.A. Callahan & Lisa Justice, Mastering™Windows Server 2003, Sybex Inc., Alameda, 2003, p.815 Question 8. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003. ABC.com currently makes use of a computer named ABC-DC01 configured as a domain controller. ABC.com recently merged with Weyland Industries. The Weyland Industries network users access resources in the ABC.com domain. You are preparing to create an Orginizational structure for ABC.com and Weyland Industries which has one top-level structure and a single child organizational structure. During the merger some of the Weyland Industries network users and ABC.com users have retired from service. Which of the following actions can be used to obtain a list of disabled user accounts? A. You should open the Properties page for the specific user who requires a Shadow Copy. B. You should consider executing dsadd/users command. C. You should open the commandline and execute the dsquery command with the /user parameter. D. You should open the commandline and execute the dsmove command with the /users parameter for each user. Answer: C Explanation: To generate the list of disabled users’ accounts as quickly as possible, you need to create a saved query in Active Directory Users and Computer. After this, execute dsquery user command. The ability to reuse queries can save time and speed up the process of locating objects within your AD environment. The Active Directory Users and Computers tool is included in the AD implementation used by Windows Server 2003. Your query will appear saved beneath Saved Queries in the left pane of the console. To execute the query, right-click it and choose Refresh. If you select the query without refreshing, the results from the last time you ran the query will appear. Dsquery is a command-line tool that is built into Windows Server 2008. It is available if you have the Active Directory Domain Services (AD DS) server role installed. To use dsquery, you must run the dsquery command from an elevated command prompt Reference: http://technet.microsoft.com/en-us/library/cc732952.aspx, http://blogs.techrepublic.com.com/datacenter/?p=178 Question 9. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003. ABC.com currently makes use of a computer named ABC-DC01 configured as a domain controller. ABC.com recently entered into partnership with Weyland Industries. The Weyland Industries network users access resources in the ABC.com domain. The new ABC.com written security policy states that Weyland Industries and ABC.com network users should not be able to log on to the domain outside of business hours. Which of the following actions should you take to ensure that network users automatically disconnect from the domain when still active after business hours whilst ensuring you use the minimum amount of administrative effort? (Choose two) A. Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all domain users. B. You should create a Group Policy Object (GPO) that specifies the restricted logon times and apply compulsory logging off in the GPO then link the GPO to the Default Domain Policy. C. Select all domain user accounts and modify the account properties to restrict logon hours to business hours. D. Create a domain user account named TempUser and configure the account properties to restrict logon hours to business hours. E. Modify the DACL on the Default Domain Policy Group Policy Object (GPO) to assign the Allow – Read permission to the Users group. Answer: B, C Explanation: When you restrict logon hours, you might also want to force users to log off after a certain point. If you apply this policy, users cannot log on to a new computer, but they can stay logged on even during restricted logon hours. To force users to log off when logon hours expire for their account, apply the Network security: Force logoff when logon hours expire policy. You can assign logon hours as a means to ensure that employees are using computers only during specified hours. This setting applies both to interactive logon, in which a user unlocks a computer and has access to the local computer, and network logon, in which a user obtains credentials that allow him or her to access resources on the network. References: Dan Holme and Thomas Orin, MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, p. 582 Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System, pp. 58, 442. Question 10. You work as the IT Admin at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network are configured with Windows Server 2003. ABC.com currently makes use of a computer named ABC-SR34 which has hard disks configured as basic NTFS storage connected to separate controllers. ABC.com uses ABC-SR34 to hosts network applications. You are preparing to install an additional disk drive to ABC-SR34 as storage is becoming a problem. You started your maintenance by formatting the hard disk as a basic disk using NTFS and started the computer. Whilst booting the computer you receive the error message shown below: “Windows could not start because of a computer disk hardware configuration problem. Could not read the selected boot disk.” Which of the following actions should you take to start ABC-SR34 successfully whilst ensuring the applications would be available to ABC.com network users as soon as possible? (Choose Two.) A. You should reboot ABC-SR34 with the Windows Server 2003 installation CD-ROM in the CDROM drive. B. You should reboot ABC-SR34 with the Advanced Boot options Last Known Good Configuration option. C. You should reboot ABC-SR34 with the Advanced Boot options Safe Mode with Networking option. D. You should reboot ABC-SR34 with the Advanced Boot options Directory Services Restore Mode option. E. You should repair ABC-SR34 with the Recovery Console after a successful reboot. F. You should repair ABC-SR34 with the Performance and Reliability Monitor after a successful reboot. G. You should monitor and repair ABC-SR34 with the System Monitor after a successful reboot. Answer: A, E Explanation: Adding the extra hard disk has probably caused the problem. The boot.ini file needs to be corrected to reflect the new disk configuration. We can use the Bootcfg utility in the Recovery Console to correct this problem. Use the Bootcfg utility in the Recovery Console to correct the Boot.ini file: 1. Use the Windows XP CD-ROM to start your computer. 2. When you receive the message to press R to repair Windows by using the Recovery Console, press the R key. 3. Select the Windows installation that you want, and then type the administrator password when prompted. 4. Type bootcfg /rebuild, and then press ENTER. 5. When the Windows installation is located, the following instructions are displayed: Add installation to boot list? (Yes/No/All) [Type Y in response to this message.] Reference: Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System, p.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.