Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object
None of above
Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection.to the remote location?

You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted
L2TP does not work with Windows 2000 computers
You have not configured the NAT server to translate the IP Security packets
None of above
NAT does not allow for remote networking

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

Configure,an INF policy and add the policy to the GPO
Configure a Microsoft Windows Installer package and add the package to the GPO
None of above
Configure RIS to include the registry entry
Configure an ADM template and add the template to the GPO

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Change the time zone setting in the time properties on the web server
Change the log rollover property in the website's logging properties
None of above
Ensure that the log type is set to W3C
Configure the time service on the web server to use local system account

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do?

Run the Modem troubleshooter and remove the modem when prompted. Restart the server
Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server
Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
None of above
Delete all references to modems in the registry

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

CHAP
SPAP
None of above
MS-CHAP v2
PAP

ANSWER DOWNLOAD EXAMIANS APP