Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
None of above
Add only the NTVDM instance for the percent processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Set the CrashonAuditFail registry key to 0
Set the Security Log to overwrite events as needed
Increase the size of the security log
Save the security log to a file, and clear it every morning
Delete the Liscense Trial registry key

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

Configure the remote access server to allow IPX based remote access demand dial connections
Configure the remote access server to disable multi-link connection
Configure a client computer to use only TCP/IP for the connections to the remote access server
Configure the client computer to use a defined IPX network address for the connection to the remote access servers
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Use Task Manager to end any related child processes
Use Task Manager to end and automatically restart the Explorer.exe process
None of above
Use Computer Management to stop and restart the Server service
Use Computer Management to stop and restart the Workstation service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Select Basic Authentication check box
Install Active Directory on the server
Clear the Allow Anonymous Connection check box
Clear the Allow IIS to Control Password check box
Disable the IUSE_inta user account on Intra

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the first adapter to use a TCP/IP metric of 100
Configure the second adapter to use a TCP/IP metric of 25
None of above
Configure the binding order on the second adapter to bind TCP/IP last
Set the second adapters status to disable

ANSWER DOWNLOAD EXAMIANS APP