Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the first adapter to use a TCP/IP metric of 100
Configure the second adapter to use a TCP/IP metric of 25
None of above
Configure the binding order on the second adapter to bind TCP/IP last
Set the second adapters status to disable

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

From the group policy options from the contoso.local domains set the option not override
From the group policy options from the Michigan and Florida OU, set the option not override
Block the group policy inheritance for the contoso.local domain
None of above
Block the group policy inheritance for Michigan and Florida OU

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

Configure RIS to include the registry entry
Configure an ADM template and add the template to the GPO
Configure a Microsoft Windows Installer package and add the package to the GPO
Configure,an INF policy and add the policy to the GPO
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

None of above
Move the proxy server to the server segment of the network
Configure each client computer to bypass the proxy server for local addresses
Move the intranet server to the client segment of the network
Configure each client computer to use port 81 for the proxy server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks?

Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks
None of above
Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1
Convert all three disks to dynamic disks. Create a RAID-5 volume
Convert all three disks to dynamic disks. Create a striped volume

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

PAP
MS-CHAP v2
SPAP
None of above
CHAP

ANSWER DOWNLOAD EXAMIANS APP