Windows 2000 Server
You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific Client-Server application to run on, because the application gets very slow returning query data. You want to have the fastest possible access for the Client-Server App to the HDD's. Which Raid should you apply?

RAID2
None of above
RAID1
RAIDS
RAID0

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Clear the Allow IIS to Control Password check box
Install Active Directory on the server
Select Basic Authentication check box
Clear the Allow Anonymous Connection check box
Disable the IUSE_inta user account on Intra

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the first adapter to use a TCP/IP metric of 100
Configure the second adapter to use a TCP/IP metric of 25
Set the second adapters status to disable
Configure the binding order on the second adapter to bind TCP/IP last
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Change the log rollover property in the website's logging properties
None of above
Change the time zone setting in the time properties on the web server
Configure the time service on the web server to use local system account
Ensure that the log type is set to W3C

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
How can you assign an application to one processor exclusively?

None of above.
Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor
Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor
Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor
Right click on application executable, select properties and select assign processor

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to use port 81 for the proxy server
Move the proxy server to the server segment of the network
Move the intranet server to the client segment of the network
Configure each client computer to bypass the proxy server for local addresses
None of above

ANSWER DOWNLOAD EXAMIANS APP