Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the proxy server to the server segment of the network
Configure each client computer to use port 81 for the proxy server
Configure each client computer to bypass the proxy server for local addresses
None of above
Move the intranet server to the client segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the second adapter to use a TCP/IP metric of 25
None of above
Configure the binding order on the second adapter to bind TCP/IP last
Configure the first adapter to use a TCP/IP metric of 100
Set the second adapters status to disable

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

None of above
Use Computer Management to stop and restart the Workstation service
Use Task Manager to end and automatically restart the Explorer.exe process
Use Task Manager to end any related child processes
Use Computer Management to stop and restart the Server service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do?

Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
None of above
Delete all references to modems in the registry
Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server
Run the Modem troubleshooter and remove the modem when prompted. Restart the server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

From the group policy options from the contoso.local domains set the option not override
None of above
Block the group policy inheritance for Michigan and Florida OU
Block the group policy inheritance for the contoso.local domain
From the group policy options from the Michigan and Florida OU, set the option not override

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data
Re scan the disk, format the span volume. Use windows back up to restore the data
Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data
Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data
Extend the span volume to include the new disk, rescan the disk

ANSWER DOWNLOAD EXAMIANS APP