Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the intranet server to the client segment of the network
Configure each client computer to bypass the proxy server for local addresses
None of above
Configure each client computer to use port 81 for the proxy server
Move the proxy server to the server segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add only the NTVDM instance for the percent processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
None of above
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
Restart the computer by using the last known good configuration
Restart the computer in safe mode. Then restart the computer again
Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

Make Nate a member of the Security group
None of above
Enable Anonymous access for the intranet server
Enable Anonymous access for the Sales virtual directory
Remove Nate fmm the Intern group

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer that has one hard disk. This computer runs a custom application that writes a large number of small temporary files in a single directory to support request from client computers. To improve performance of the application, you add three new 100-GB SCSI disks to the server to hold these temporary files. You want to ensure that the application can use all 300 GB of space with a single drive letter. You also want to ensure the fastest possible performance when writing the temporary files. How should you configure the three disks?

Create a single volume on Disk 1. Format the volume as NTFS. Extend the volume to create a spanned volume that includes the space on all three disks
None of above
Create a single volume on each of the three disks. Format each volume as NTFS. Mount the roots of Disk 2 and Disk 3 in the root folder of Disk 1
Convert all three disks to dynamic disks. Create a striped volume
Convert all three disks to dynamic disks. Create a RAID-5 volume

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Computer accounts and user accounts in your domain have been seperated into OUs for administrative purpose. You want to require strong passwords for the local user accounts only. What should you do?

Set a Group Policy on the domain to enable the passwords must meet complexity requirements policy
Set a Group Policy on all OUs containing user accounts to enable the passwords must meet complexity requirements policy
Set a Group Policy on all OUs containing computer accounts to enable the passwords must meet complexity requirements policy
Set a Group Policy on each local computer to enable the passwords must meet complexity requirements policy
None of above

ANSWER DOWNLOAD EXAMIANS APP