Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Delete the Liscense Trial registry key
Save the security log to a file, and clear it every morning
Increase the size of the security log
Set the CrashonAuditFail registry key to 0
Set the Security Log to overwrite events as needed

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Configure the time service on the web server to use local system account
Change the log rollover property in the website's logging properties
None of above
Change the time zone setting in the time properties on the web server
Ensure that the log type is set to W3C

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the intranet server to the client segment of the network
Configure each client computer to bypass the proxy server for local addresses
Move the proxy server to the server segment of the network
Configure each client computer to use port 81 for the proxy server
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server network that runs in mixed mode. You install a new Windows 2000 Server computer. You create and share a new HP LaserJet 4L printer. Your Windows 2000 Professional client computers can print to the new printer successfully. However, when users try to connect to the printer from Windows NT Workstation 4.0 client computers, they receive the dialog box shown in the exhibit. "The server on which the printer resides does not have a suitable HP LaserJet printer driver installed". You want the printer driver to be installed automatically on the Windows NT Workstation computers. What should you do?

None of above
Copy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator
Copy the Windows NT 4.0 printer drivers to the WinntSystem32 pri liter sdri vers folder on the Windows 2000 print server
Copy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs
Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

MS-CHAP v2
SPAP
PAP
CHAP
None of above

ANSWER DOWNLOAD EXAMIANS APP