Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object
None of above
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

PAP
CHAP
MS-CHAP v2
None of above
SPAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your company's network includes Windows 3.1 client computers, Windows 95 client computers, and Windows 2000 Professional client computers. The company's manufacturing facilities run 24 hours per day. The company has developed its own 32-bit application that collects information from the manufacturing process so that workers on one shift can find out that was manufactured during the previous shift. The company wants to make the application available on all of the client computers by using Terminal Service on a Windows 2000 Server computer. This server will not run as a domain controller. You install Terminal Services. The information technology (IT) department needs to be able to remote control users' sessions to support and troubleshoot the application. What should you do to enable the IT department to control users' sessions?

Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server
Configure the Terminal server to run in Remote Administration mode
None of above
Use third-party software to enable remote control of users' sessions
Add the members of the IT department to the Power Users group on the Terminal server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

None of above
Enable and configure the group policy refresh interval for domain controller
Enable the background refresh settings to use the default group policy refresh date
Enable the asynchronous group policy application settings
Enable and configure the group policy refresh interval for computers

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the intranet server to the client segment of the network
Configure each client computer to bypass the proxy server for local addresses
None of above
Configure each client computer to use port 81 for the proxy server
Move the proxy server to the server segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

Configure an ADM template and add the template to the GPO
Configure,an INF policy and add the policy to the GPO
Configure a Microsoft Windows Installer package and add the package to the GPO
Configure RIS to include the registry entry
None of above

ANSWER DOWNLOAD EXAMIANS APP