Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Change the log rollover property in the website's logging properties
Change the time zone setting in the time properties on the web server
Ensure that the log type is set to W3C
Configure the time service on the web server to use local system account
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your computer has a mirrored volume and you wish to now install the Recovery Console for future troubleshooting. How do you do this?

Run X:i386winnt32.exe / cmdcons
None of above
Break the mirror, run X:i386winnt32.exe /cmdcons Reestablish the mirror
Reinstall Windows, this can only be applied during the installation
Run the add and remove programs and add the recovery console

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

Replace Disk 1 and restart the computer. The mirror will automatically regenerate
Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1
Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
Restart the computer in safe mode. Then restart the computer again
Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
Restart the computer by using the last known good configuration
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

Extend the span volume to include the new disk, rescan the disk
Re scan the disk, format the span volume. Use windows back up to restore the data
Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data
Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data
Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Clear the Allow IIS to Control Password check box
Select Basic Authentication check box
Disable the IUSE_inta user account on Intra
Clear the Allow Anonymous Connection check box
Install Active Directory on the server

ANSWER DOWNLOAD EXAMIANS APP