Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the binding order on the second adapter to bind TCP/IP last
Configure the second adapter to use a TCP/IP metric of 25
Configure the first adapter to use a TCP/IP metric of 100
None of above
Set the second adapters status to disable

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your network consists of Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers, Windows 2000 file servers. You must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. What should you do?

Configure the Windows 2000 file servers, Windows 2000 print servers, Windows 2000 professional computers and Windows 2000 file servers to block unsigned drivers
None of above
Configure a Group policy for the Default Domain Controller to block all unsigned drivers
Configure a Group policy for the Domain that blocks all unsigned drivers
Do nothing, this is the default setting

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?

None of above
End the Application.exe process
End the task named Application
End the Application.exe process tree
End both the Explorer.exe process and the Application.exe process

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
None of above
Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
Replace the third disk and restart the server. Use disk Management to repair the volume

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Select Basic Authentication check box
Disable the IUSE_inta user account on Intra
Install Active Directory on the server
Clear the Allow Anonymous Connection check box
Clear the Allow IIS to Control Password check box

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

Block the group policy inheritance for the contoso.local domain
From the group policy options from the contoso.local domains set the option not override
Block the group policy inheritance for Michigan and Florida OU
None of above
From the group policy options from the Michigan and Florida OU, set the option not override

ANSWER DOWNLOAD EXAMIANS APP