Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

From the group policy options from the Michigan and Florida OU, set the option not override
None of above
Block the group policy inheritance for Michigan and Florida OU
From the group policy options from the contoso.local domains set the option not override
Block the group policy inheritance for the contoso.local domain

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Use Computer Management to stop and restart the Workstation service
Use Task Manager to end and automatically restart the Explorer.exe process
None of above
Use Task Manager to end any related child processes
Use Computer Management to stop and restart the Server service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

Restart the computer by using the last known good configuration
Restart the computer in safe mode. Then restart the computer again
Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server. What should you do?

None of above
Install the Windows 2000 Resource Kit
Configure system file checker to notify the branch offices
Install Windows critical update notification
Configure Windows file protection to notify the branch offices

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

Enable and configure the group policy refresh interval for domain controller
Enable the asynchronous group policy application settings
Enable and configure the group policy refresh interval for computers
Enable the background refresh settings to use the default group policy refresh date
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

CHAP
MS-CHAP v2
PAP
SPAP
None of above

ANSWER DOWNLOAD EXAMIANS APP