Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

From the group policy options from the contoso.local domains set the option not override
None of above
Block the group policy inheritance for Michigan and Florida OU
Block the group policy inheritance for the contoso.local domain
From the group policy options from the Michigan and Florida OU, set the option not override

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?

None of above
Add a second hard disk. Delete the contents of the SystemrootYTemp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the SystemrootYTemp folder
On the second partition, create a shared folder named Temp
In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk
Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new p

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection.to the remote location?

You have not configured the NAT server to translate the IP Security packets
You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted
L2TP does not work with Windows 2000 computers
None of above
NAT does not allow for remote networking

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data
Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data
Re scan the disk, format the span volume. Use windows back up to restore the data
Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data
Extend the span volume to include the new disk, rescan the disk

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the second adapter to use a TCP/IP metric of 25
Configure the first adapter to use a TCP/IP metric of 100
Set the second adapters status to disable
None of above
Configure the binding order on the second adapter to bind TCP/IP last

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

None of above
Add only the NTVDM instance for the percent processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP