Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to use port 81 for the proxy server
Move the proxy server to the server segment of the network
None of above
Configure each client computer to bypass the proxy server for local addresses
Move the intranet server to the client segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?

Configure the network monitor ECP port something for TCP
Install Network Monitor on Application Server
Configure the network monitor EDP port something for UDP
Install Network Monitor on Monitor 1
Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?

Move some of the files from her home folder to the IN_PROGRESS shared folder
None of above
Compress the files in her home folder to save disk space
Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
Remove files from her home folder until the total uncompressed file size is less than 100 MB

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

Enable the background refresh settings to use the default group policy refresh date
None of above
Enable the asynchronous group policy application settings
Enable and configure the group policy refresh interval for computers
Enable and configure the group policy refresh interval for domain controller

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

Block the group policy inheritance for Michigan and Florida OU
Block the group policy inheritance for the contoso.local domain
From the group policy options from the contoso.local domains set the option not override
From the group policy options from the Michigan and Florida OU, set the option not override
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Select Basic Authentication check box
Disable the IUSE_inta user account on Intra
Install Active Directory on the server
Clear the Allow IIS to Control Password check box
Clear the Allow Anonymous Connection check box

ANSWER DOWNLOAD EXAMIANS APP