Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the binding order on the second adapter to bind TCP/IP last
Configure the first adapter to use a TCP/IP metric of 100
Set the second adapters status to disable
Configure the second adapter to use a TCP/IP metric of 25
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
Restart the computer in safe mode. Then restart the computer again
Restart the computer by using the last known good configuration
Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

CHAP
MS-CHAP v2
None of above
SPAP
PAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

Configure the client computer to use a defined IPX network address for the connection to the remote access servers
None of above
Configure the remote access server to disable multi-link connection
Configure a client computer to use only TCP/IP for the connections to the remote access server
Configure the remote access server to allow IPX based remote access demand dial connections

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

None of above
Enable Anonymous access for the Sales virtual directory
Remove Nate fmm the Intern group
Enable Anonymous access for the intranet server
Make Nate a member of the Security group

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Change the log rollover property in the website's logging properties
None of above
Change the time zone setting in the time properties on the web server
Ensure that the log type is set to W3C
Configure the time service on the web server to use local system account

ANSWER DOWNLOAD EXAMIANS APP