Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

Block the group policy inheritance for Michigan and Florida OU
From the group policy options from the contoso.local domains set the option not override
From the group policy options from the Michigan and Florida OU, set the option not override
Block the group policy inheritance for the contoso.local domain
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

None of above
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

CHAP
None of above
SPAP
MS-CHAP v2
PAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do?

Create a network printer on PrintServ, and specify that the printer name is \16.1.1.99GIANT. Share this printer and connect to it from users computers
Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/ GIANT
None of above
Install Microsoft Print Services for Unix on users* Computers. Create a network printer, and specify that the printer name is \10.1.1.99GIANT
Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks?

None of above
Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1
Convert all three disks to dynamic disks. Create a RAID-5 volume
Convert all three disks to dynamic disks. Create a striped volume
Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

Replace the third disk and restart the server. Use disk Management to repair the volume
None of above
Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition

ANSWER DOWNLOAD EXAMIANS APP