Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to bypass the proxy server for local addresses
Move the proxy server to the server segment of the network
Move the intranet server to the client segment of the network
Configure each client computer to use port 81 for the proxy server
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Save the security log to a file, and clear it every morning
Increase the size of the security log
Set the CrashonAuditFail registry key to 0
Delete the Liscense Trial registry key
Set the Security Log to overwrite events as needed

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Change the time zone setting in the time properties on the web server
Change the log rollover property in the website's logging properties
None of above
Configure the time service on the web server to use local system account
Ensure that the log type is set to W3C

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add only the NTVDM instance for the percent processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
None of above
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

None of above
Configure the remote access server to allow IPX based remote access demand dial connections
Configure the remote access server to disable multi-link connection
Configure the client computer to use a defined IPX network address for the connection to the remote access servers
Configure a client computer to use only TCP/IP for the connections to the remote access server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Ensure the Windows 2000 domain is configured to run in the native mode
Apply a less restrictive custom security template to DC1
Ensure the Windows 2000 domain is configured in the mixed mode
None of above
Apply a less restrictive custom policy to Windows NT domain controller

ANSWER DOWNLOAD EXAMIANS APP