Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

From the group policy options from the contoso.local domains set the option not override
Block the group policy inheritance for Michigan and Florida OU
Block the group policy inheritance for the contoso.local domain
From the group policy options from the Michigan and Florida OU, set the option not override
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks?

Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks
Convert all three disks to dynamic disks. Create a RAID-5 volume
Convert all three disks to dynamic disks. Create a striped volume
Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
How can you assign an application to one processor exclusively?

Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor
Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor
Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor
Right click on application executable, select properties and select assign processor
None of above.

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

None of above
Configure the remote access server to disable multi-link connection
Configure the remote access server to allow IPX based remote access demand dial connections
Configure the client computer to use a defined IPX network address for the connection to the remote access servers
Configure a client computer to use only TCP/IP for the connections to the remote access server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

None of above
CHAP
PAP
SPAP
MS-CHAP v2

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Set the Security Log to overwrite events as needed
Increase the size of the security log
Set the CrashonAuditFail registry key to 0
Delete the Liscense Trial registry key
Save the security log to a file, and clear it every morning

ANSWER DOWNLOAD EXAMIANS APP