Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the proxy server to the server segment of the network
Configure each client computer to bypass the proxy server for local addresses
Configure each client computer to use port 81 for the proxy server
None of above
Move the intranet server to the client segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

None of above
Use Computer Management to stop and restart the Server service
Use Task Manager to end any related child processes
Use Computer Management to stop and restart the Workstation service
Use Task Manager to end and automatically restart the Explorer.exe process

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to provide Internet access for the clients on your network. You decide to use Network Address Translation (NAT). You have a Windows 2000 computer you try to establish a secure Virtual Private Networking session with. You try connecting to the Remote Windows 2000 computer using L2TP. You are unable to establish a connection with the remote node using L2TP. You are able to make a connection with another computer in your same office. Why are you unable to make a connection.to the remote location?

You can not establish a L2TP connection behind a computer running NAT. The L2TP session fails because the IP Security packets become corrupted
None of above
L2TP does not work with Windows 2000 computers
You have not configured the NAT server to translate the IP Security packets
NAT does not allow for remote networking

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do?

Add the applications service accounts to the Domain Administrator Group
None of above
Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy
Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy
Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

None of above
Block the group policy inheritance for Michigan and Florida OU
From the group policy options from the Michigan and Florida OU, set the option not override
Block the group policy inheritance for the contoso.local domain
From the group policy options from the contoso.local domains set the option not override

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

MS-CHAP v2
PAP
CHAP
None of above
SPAP

ANSWER DOWNLOAD EXAMIANS APP