Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Ensure that the log type is set to W3C
None of above
Change the time zone setting in the time properties on the web server
Configure the time service on the web server to use local system account
Change the log rollover property in the website's logging properties

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do?

Run the Modem troubleshooter and remove the modem when prompted. Restart the server
Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
None of above
Delete all references to modems in the registry
Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

None of above
Configure a Microsoft Windows Installer package and add the package to the GPO
Configure an ADM template and add the template to the GPO
Configure RIS to include the registry entry
Configure,an INF policy and add the policy to the GPO

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

Replace the third disk and restart the server. Use disk Management to repair the volume
None of above
Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to use port 81 for the proxy server
Configure each client computer to bypass the proxy server for local addresses
Move the intranet server to the client segment of the network
Move the proxy server to the server segment of the network
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Apply a less restrictive custom security template to DC1
Apply a less restrictive custom policy to Windows NT domain controller
None of above
Ensure the Windows 2000 domain is configured to run in the native mode
Ensure the Windows 2000 domain is configured in the mixed mode

ANSWER DOWNLOAD EXAMIANS APP