Windows 2000 Server
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

Configure a Microsoft Windows Installer package and add the package to the GPO
Configure RIS to include the registry entry
Configure,an INF policy and add the policy to the GPO
None of above
Configure an ADM template and add the template to the GPO

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

None of above
Use Computer Management to stop and restart the Server service
Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Workstation service
Use Task Manager to end any related child processes

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data
Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data
Re scan the disk, format the span volume. Use windows back up to restore the data
Extend the span volume to include the new disk, rescan the disk
Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

Configure the client computer to use a defined IPX network address for the connection to the remote access servers
Configure the remote access server to disable multi-link connection
Configure the remote access server to allow IPX based remote access demand dial connections
None of above
Configure a client computer to use only TCP/IP for the connections to the remote access server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the intranet server to the client segment of the network
Configure each client computer to bypass the proxy server for local addresses
None of above
Configure each client computer to use port 81 for the proxy server
Move the proxy server to the server segment of the network

ANSWER DOWNLOAD EXAMIANS APP