Windows 2000 Server
You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

None of above
Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down and restart the server. Restore the data to new mirror volumes
Backup the data on the stripe volume and delete the stripe
Backup the data on the stripe volume and delete the stripe volume. Create a raidS volume on the four disks, restore the data to the new raid5 volume
Convert the disk to dynamic disk shut doWn and restart the server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

None of above
Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Server service
Use Computer Management to stop and restart the Workstation service
Use Task Manager to end any related child processes

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Apply a less restrictive custom policy to Windows NT domain controller
None of above
Apply a less restrictive custom security template to DC1
Ensure the Windows 2000 domain is configured to run in the native mode
Ensure the Windows 2000 domain is configured in the mixed mode

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1
None of above
Replace Disk 1 and restart the computer. The mirror will automatically regenerate

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

Configure the client computer to use a defined IPX network address for the connection to the remote access servers
Configure a client computer to use only TCP/IP for the connections to the remote access server
Configure the remote access server to allow IPX based remote access demand dial connections
None of above
Configure the remote access server to disable multi-link connection

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

None of above
PAP
MS-CHAP v2
SPAP
CHAP

ANSWER DOWNLOAD EXAMIANS APP